|
US$339.00 · In stock Delivery: <= 4 days. True-PDF full-copy in English will be manually translated and delivered via email. GB/T 39720-2020: Information security technology. Security technical requirements and test evaluation approaches for smart mobile terminal Status: Valid
| Standard ID | Contents [version] | USD | STEP2 | [PDF] delivered in | Standard Title (Description) | Status | PDF |
| GB/T 39720-2020 | English | 339 |
Add to Cart
|
4 days [Need to translate]
|
Information security technology. Security technical requirements and test evaluation approaches for smart mobile terminal
| Valid |
GB/T 39720-2020
|
PDF similar to GB/T 39720-2020
Basic data | Standard ID | GB/T 39720-2020 (GB/T39720-2020) | | Description (Translated English) | Information security technology. Security technical requirements and test evaluation approaches for smart mobile terminal | | Sector / Industry | National Standard (Recommended) | | Classification of Chinese Standard | L80 | | Classification of International Standard | 35.040 | | Word Count Estimation | 18,121 | | Date of Issue | 2020-12-14 | | Date of Implementation | 2021-07-01 | | Quoted Standard | GB/T 25069; GB/T 32927; GB/T 35273 | | Regulation (derived from) | National Standard Announcement No. 28 of 2020 | | Issuing agency(ies) | State Administration for Market Regulation, China National Standardization Administration | | Summary | This standard specifies the security technical requirements and test evaluation methods for mobile smart terminals, including hardware security, system security, application software security, communication connection security, and user data security. This standard applies to the design, development, testing and evaluation of mobile smart terminals. |
GB/T 39720-2020: Information security technology. Security technical requirements and test evaluation approaches for smart mobile terminal ---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order.
(Information security technology Mobile smart terminal security technical requirements and test evaluation methods)
ICS 35:040
CCSL80
National Standards of People's Republic of China
Information Security Technology Mobile Intelligent Terminal Security Technology
Requirements and test evaluation methods
2020-12-14 release
2021-07-01 implementation
State Administration for Market Regulation
Issued by the National Standardization Management Committee
Table of contents
Foreword Ⅰ
1 Scope 1
2 Normative references 1
3 Terms and definitions 1
4 Abbreviations 2
5 Overview 2
6 Safety technical requirements 3
6:1 Hardware Security 3
6:2 System Security 3
6:3 Application Software Security 4
6:4 Communication connection security 5
6:5 User data security 5
7 Test evaluation method 6
7:1 Hardware Security 6
7:2 System Security 6
7:3 Application software security 10
7:4 Communication connection security 11
7:5 User data security 12
Reference 15
Foreword
This document is in accordance with the provisions of GB/T 1:1-2020 Standardization Guidelines Part 1: Structure and Drafting Rules of Standardization Documents
Drafting:
Please note that certain contents of this document may involve patents: The issuing agency of this document is not responsible for identifying patents:
This document was proposed and managed by the National Information Security Standardization Technical Committee (SAC/TC260):
Drafting organizations of this document: Shenzhen Academy of Information and Communications Technology, China Academy of Information and Communications Technology, OPPO Guangdong Mobile Communications Co:, Ltd:, China
Institute of Information Engineering, National Academy of Sciences, Beijing University of Posts and Telecommunications, Beijing Samsung Communication Technology Research Co:, Ltd:, Vivo Mobile Communication Co:, Ltd:, China
It is Technology Co:, Ltd:, Beijing Qihoo Technology Co:, Ltd:, Wuhan Antiy Information Technology Co:, Ltd:, and Nanchang Black Shark Technology Co:, Ltd:
The main drafters of this document: Ning Hua, Zhang Bojun, Yao Yinan, Liu Tao, Wang Yanhong, Lu Yemian, Wang Yuxiao, Zhang Yan, Wei Fanxing, Dong Ji, Fu Shan,
Zhou Fei, Du Yun, Su Zhangkai, Zhai Shijun, Xu Zhen, Liang Hongliang, Liu Zhen, Li Teng, Wang Jiangsheng, Wu Chunyu, Chang Xinmiao, Yi Qiang, Pan Xuanchen, Luo Cheng,
Zhang Yi, Jia Ke, Wang Guoping:
Information Security Technology Mobile Intelligent Terminal Security Technology
Requirements and test evaluation methods
1 Scope
This document specifies the security technical requirements and test evaluation methods for mobile smart terminals, including hardware security, system security, and application software security:
All, communication connection security, user data security:
This document applies to the design, development, testing and evaluation of mobile smart terminals:
2 Normative references
The contents of the following documents constitute indispensable clauses of this document through normative references in the text: Among them, dated quotations
Only the version corresponding to the date is applicable to this document; for undated reference documents, the latest version (including all amendments) is applicable to
This document:
GB/T 25069 Information Security Technical Terms
GB/T 32927 Information Security Technology Mobile Intelligent Terminal Security Architecture
GB/T 35273 Information Security Technology Personal Information Security Specification
3 Terms and definitions
The following terms and definitions defined in GB/T 25069, GB/T 32927, and GB/T 35273 apply to this document:
3:1
Smartmobileterminal
It has an open system that can provide application development interfaces, and a mobile terminal that can install and run third-party application software:
[Source: GB/T 32927-2016, 3:1:9, with modification]
3:2
User
Use the mobile smart terminal to interact with the mobile smart terminal:
[Source: GB/T 32927-2016,3:1:11]
3:3
Userdata
Data generated by users or serving users, including data generated locally by users, data generated locally for users, in-use
After the user’s permission, the data entered into the user data area from the outside:
[Source: GB/T 32927-2016,3:1:12]
3:4
Mobile application software
Application software installed on the mobile intelligent terminal system to provide users with service functions:
3:5
Access control
A means to ensure that the resources of the data processing system can only be accessed by authorized subjects in an authorized manner:
Tips & Frequently Asked Questions:Question 1: How long will the true-PDF of GB/T 39720-2020_English be delivered?Answer: Upon your order, we will start to translate GB/T 39720-2020_English as soon as possible, and keep you informed of the progress. The lead time is typically 2 ~ 4 working days. The lengthier the document the longer the lead time. Question 2: Can I share the purchased PDF of GB/T 39720-2020_English with my colleagues?Answer: Yes. The purchased PDF of GB/T 39720-2020_English will be deemed to be sold to your employer/organization who actually pays for it, including your colleagues and your employer's intranet. Question 3: Does the price include tax/VAT?Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countriesQuestion 4: Do you accept my currency other than USD?Answer: Yes. If you need your currency to be printed on the invoice, please write an email to [email protected]. In 2 working-hours, we will create a special link for you to pay in any currencies. Otherwise, follow the normal steps: Add to Cart -- Checkout -- Select your currency to pay.
|