2025-12-5 10.1.6.65
Code of China Chinese Classification Professional Classification ICS Classification Latest News Value-added Services

Position: Chinese Standard in English/GB/T 20276-2016
GB/T 20276-2016   Information security technology - Security requirements for embedded software in IC card with CPU (English Version)
Standard No.: GB/T 20276-2016 Status:valid remind me the status change

Email:

Target Language:English File Format:PDF
Word Count: 16500 words Translation Price(USD):500.0 remind me the price change

Email:

Implemented on:2017-3-1 Delivery: via email in 1 business day

→ → →

,,2017-3-1,9401356AD06EFB171513905635838
Standard No.: GB/T 20276-2016
English Name: Information security technology - Security requirements for embedded software in IC card with CPU
Chinese Name: 信息安全技术 具有中央处理器的IC卡嵌入式软件安全技术要求
Chinese Classification: L80    Data encryption
Professional Classification: GB    National Standard
Source Content Issued by: AQSIQ; SAC
Issued on: 2016-08-29
Implemented on: 2017-3-1
Status: valid
Superseding:GB/T 20276-2006 Information security technology Security requirements for smartcard embedded software(EAL4+)
Target Language: English
File Format: PDF
Word Count: 16500 words
Translation Price(USD): 500.0
Delivery: via email in 1 business day
1 Scope This standard specifies the security requirements for the security protection of embedded software in IC card with CPU of EAL4 enhanced level and EAL5 enhanced level, including the security problem definition, security objectives, security requirements, rationale, etc. This standard is applicable to the testing, evaluation and procurement of embedded software products in IC card with CPU, and may also be used to guide the research and development of such products. 2 Normative references The following referenced documents are indispensable for the application of this document. For dated references, only the edition cited applies. For undated references, the latest edition of the referenced document (including any amendments) applies. GB/T 18336 (All parts) Information technology - Security techniques - Evaluation criteria for IT security GB/T 25069-2010 Information security technology - Glossary 3 Terms, definitions and abbreviations 3.1 Terms and definitions For the purposes of this document, the terms and definitions given in GB/T 25069-2010, GB/T 18336.1 and the followings apply. 3.1.1 personalization data data written in the personalization process of embedded software in IC card, which is used to configure parameters related to specific applications or users 3.2 Abbreviations For the purposes of this document, the following abbreviations apply.   CM: Configuration Management EAL: Evaluation Assurance Level EEPROM: Electrically-Erasable Programmable Read-only Memory IC: Integrated Circuit I/O: Input/Output RAM: Random-Access Memory ROM: Read-Only Memory ST: Security Target TOE: Target of Evaluation TSF: TOE Security Functionality
Foreword i Introduction iii 1 Scope 2 Normative references 3 Terms, definitions and abbreviations 3.1 Terms and definitions 3.2 Abbreviations 4 Descriptions of embedded software in IC card 5 Security problem definition 5.1 Assets 5.2 Threats 5.3 Organizational security policies 5.4 Assumptions 6 Security objectives 6.1 Security objectives for the TOE 6.2 Security objective for environment 7 Security requirements 7.1 Security functional requirements 7.2 Security assurance requirements 8 Rationale 8.1 Rationale of security objectives 8.2 Rationale of security requirements 8.3 Component dependencies Bibliography
Referred in GB/T 20276-2016:
*GB/T 18336-2001 Information technology--Security techniques--Evaluation criteria for IT security
*GB/T 25069-2010 Information security technology—Glossary
*GB 3404-1982 Methods for chemical analysis of glass making sands
*AQ/T 3033-2010 Safety disign management guidelines for chemical construction projects
*CNCA-13C-070:2010
*GB/T 23615.1-2017 Thermal barrier materials for architecture aluminium alloy extruded profiles - Part 1: Polyamide profiles
*GB/T 34370.6-2017 Nondestructive testing of amusement equipments-Part 6:Radiographic testing
*GB/T 32836-2016 Spherical bearing for steel building structure
*FZ/T 93048-1998 Felting needles
*GB 5347-1985 External fixed faucets of bathtub
*GB/T 34549-2017 Sanitary ware - Smart toilet
*GB/T 34590.2-2017 Road vehicles - Functional safety - Part 2: Management of functional safety
*GB/T 34635-2017 Flange connections
GB/T 20276-2016 is referred in:
*CNCA C12-01-2015 Rules for the Implementation of Compulsory Product Certification - Tyres for Motor Vehicles
*CQC-C1105-2014 Detailed Rules for the Implementation of Compulsory Product Certification -Horns for Motor Vehicles
*GB/T 14184-1993 The methods of measurement for imageconverter tubes and image intensifier tubes
*GB/T 34590.3-2017 Road vehicles - Functional safety - Part 3: Concept phase
*JB/T 10506-2005 Internal combustion engines - Charge air coolers - Specification
*JB/T 9127-2000 Coiled helical compression springs shot-blasting technical specification
Code of China
Standard
GB/T 20276-2016  Information security technology - Security requirements for embedded software in IC card with CPU (English Version)
Standard No.GB/T 20276-2016
Statusvalid
LanguageEnglish
File FormatPDF
Word Count16500 words
Price(USD)500.0
Implemented on2017-3-1
Deliveryvia email in 1 business day
Detail of GB/T 20276-2016
Standard No.
GB/T 20276-2016
English Name
Information security technology - Security requirements for embedded software in IC card with CPU
Chinese Name
信息安全技术 具有中央处理器的IC卡嵌入式软件安全技术要求
Chinese Classification
L80
Professional Classification
GB
ICS Classification
Issued by
AQSIQ; SAC
Issued on
2016-08-29
Implemented on
2017-3-1
Status
valid
Superseded by
Superseded on
Abolished on
Superseding
GB/T 20276-2006 Information security technology Security requirements for smartcard embedded software(EAL4+)
Language
English
File Format
PDF
Word Count
16500 words
Price(USD)
500.0
Keywords
GB/T 20276-2016, GB 20276-2016, GBT 20276-2016, GB/T20276-2016, GB/T 20276, GB/T20276, GB20276-2016, GB 20276, GB20276, GBT20276-2016, GBT 20276, GBT20276
Introduction of GB/T 20276-2016
1 Scope This standard specifies the security requirements for the security protection of embedded software in IC card with CPU of EAL4 enhanced level and EAL5 enhanced level, including the security problem definition, security objectives, security requirements, rationale, etc. This standard is applicable to the testing, evaluation and procurement of embedded software products in IC card with CPU, and may also be used to guide the research and development of such products. 2 Normative references The following referenced documents are indispensable for the application of this document. For dated references, only the edition cited applies. For undated references, the latest edition of the referenced document (including any amendments) applies. GB/T 18336 (All parts) Information technology - Security techniques - Evaluation criteria for IT security GB/T 25069-2010 Information security technology - Glossary 3 Terms, definitions and abbreviations 3.1 Terms and definitions For the purposes of this document, the terms and definitions given in GB/T 25069-2010, GB/T 18336.1 and the followings apply. 3.1.1 personalization data data written in the personalization process of embedded software in IC card, which is used to configure parameters related to specific applications or users 3.2 Abbreviations For the purposes of this document, the following abbreviations apply.   CM: Configuration Management EAL: Evaluation Assurance Level EEPROM: Electrically-Erasable Programmable Read-only Memory IC: Integrated Circuit I/O: Input/Output RAM: Random-Access Memory ROM: Read-Only Memory ST: Security Target TOE: Target of Evaluation TSF: TOE Security Functionality
Contents of GB/T 20276-2016
Foreword i Introduction iii 1 Scope 2 Normative references 3 Terms, definitions and abbreviations 3.1 Terms and definitions 3.2 Abbreviations 4 Descriptions of embedded software in IC card 5 Security problem definition 5.1 Assets 5.2 Threats 5.3 Organizational security policies 5.4 Assumptions 6 Security objectives 6.1 Security objectives for the TOE 6.2 Security objective for environment 7 Security requirements 7.1 Security functional requirements 7.2 Security assurance requirements 8 Rationale 8.1 Rationale of security objectives 8.2 Rationale of security requirements 8.3 Component dependencies Bibliography
About Us   |    Contact Us   |    Terms of Service   |    Privacy   |    Cancellation & Refund Policy   |    Payment
Tel: +86-10-8572 5655 | Fax: +86-10-8581 9515 | Email: coc@codeofchina.com | QQ: 672269886
Copyright: Beijing COC Tech Co., Ltd. 2008-2040
 
 
Keywords:
GB/T 20276-2016, GB 20276-2016, GBT 20276-2016, GB/T20276-2016, GB/T 20276, GB/T20276, GB20276-2016, GB 20276, GB20276, GBT20276-2016, GBT 20276, GBT20276