2025-12-5 10.1.6.65
Code of China Chinese Classification Professional Classification ICS Classification Latest News Value-added Services

Position: Chinese Standard in English/GB/T 37378-2019
GB/T 37378-2019   Transportation—Information security specification (English Version)
Standard No.: GB/T 37378-2019 Status:valid remind me the status change

Email:

Target Language:English File Format:PDF
Word Count: 8500 words Translation Price(USD):180.0 remind me the price change

Email:

Implemented on:2019-12-1 Delivery: via email in 1 business day

→ → →

,,2019-12-1,1558318911585000b2ba9e86e38e88b3
Standard No.: GB/T 37378-2019
English Name: Transportation—Information security specification
Chinese Name: 交通运输 信息安全规范
Chinese Classification: R85    Traffic information management
Professional Classification: GB    National Standard
ICS Classification: 03.220.20 03.220.20    Road transport 03.220.20
Source Content Issued by: SAMR; SAC
Issued on: 2019-05-10
Implemented on: 2019-12-1
Status: valid
Target Language: English
File Format: PDF
Word Count: 8500 words
Translation Price(USD): 180.0
Delivery: via email in 1 business day
Codeofchina.com is in charge of this English translation. In case of any doubt about the English translation, the Chinese original shall be considered authoritative. This standard is developed in accordance with the rules given in GB/T 1.1-2009. This standard was proposed by and is under the jurisdiction of SAC/TC 268 National Technical Committee 268 on Intelligent Transport Systems of Standardization Administration of China. Transportation - Information security specification 1 Scope The Standard specifies the system architecture and general technical requirements of information security technology for transportation, including the general and special technical requirements for information security of user terminals, vehicle side units, infrastructure side units, computing centers, and network and communication basic components that constitute the transport information system. The Standard is applicable to guiding the operators of transport information system to put forward specific information security standards, specifications, implementation guidelines, etc. according to the specific information security requirements of non-confidential systems, and can also be used to guide the planning, design, construction, operation and maintenance, evaluation, etc. of information security technology systems. 2 Normative references The following referenced documents are indispensable for the application of this document. For dated references, only the edition cited applies. For undated references, the latest edition of the referenced document (including any amendments) applies. GB/T 20839-2007 Intelligent transport systems - General terminology GB/T 25069-2010 Information security technology - Glossary 3 Terms and definitions For the purposes of this document, the terms and definitions given in GB/T 20839-2007 and GB/T 25069-2010 as well as the following apply. For the convenience of application, some terms and definitions in GB/T 20839-2007 and GB/T 25069-2010 are listed again. 3.1 transport information system system composed of computers or other information terminals and relevant equipment and networks for collecting, storing, transmitting, exchanging and processing information according to certain rules and procedures in the field of transportation, which usually consists of terminals, vehicle side units, infrastructure side units, computing centers, networks and communications in whole or in part   3.2 information security protecting and maintaining the confidentiality, integrity and availability of information, with authenticity, verifiability, non-repudiation and reliability includible [GB/T 25069-2010, Definition 2.1.52] 3.3 operators of transport information system owners, administrators and service providers of non-confidential information systems for transport 3.4 general user terminal for transport general desktop terminal equipment and mobile intelligent terminal equipment used in transport business, including desktop computers, laptop computers, smart phones, tablet computers, etc. 3.5 special user terminal for transport equipment used in transport business, which has specific functions and can realize man-machine interaction 3.6 infrastructure side unit equipment or modules deployed on roadside and/or shore side in order to realize the function of transport information system, including communication equipment, information release equipment, condition monitoring equipment, environment monitoring equipment, etc. 3.7 vehicle side unit device or communication module in transport equipment such as vehicles, ships and containers that communicates with infrastructure side units, terminals or computing centers   3.8 security element; SE integrated circuit module with central processing unit, which is responsible for access permission, information authentication and encryption protection of general and special user terminals, vehicle side units and infrastructure side units 3.9 safety related application applications for emergency collision and injury reduction, potential collision and injury reduction and prevention, emergency incident notification (such as emergency brake of front vehicle), etc. as well as those for emergency condition notification (such as accident, emergency vehicle, sudden environmental degradation notification) 3.10 driving aid application applications for notification related to high-priority public security information from the infrastructure side unit to vehicle, emergency notification of safety-related road conditions such as traffic light cycle and sharp turn, and driving assistance messages such as automatic driving, roadside periodic broadcasting, positioning differential signals, traffic information broadcasting, etc. 3.11 value-added service application applications for non-priority services such as online payment and recharge, personalized navigation services, driving route suggestions, and e-commerce 3.12 confidentiality feature that prevents data from being leaked to or exploited by unauthorized individuals, entities or processes [GB/T 25069-2010, Definition 2.1.1] 3.13 integrity feature that data has not been altered or destroyed in an unauthorized manner [GB/T 25069-2010, Definition 2.1.42] 3.14 availability feature of data and resources that can be accessed and used by authorized entities upon request [GB/T 25069-2010, Definition 2.1.20] 3.15 data freshness feature of preventing the history data that has been successfully received from being received again, or the data that has exceeded the data reception time from being received, or the data that has exceeded the data validity range from being received 3.16 driving assistance providing drivers with functions such as information service and support, and early warning and control intervention support in emergency using sensing detection, automatic control, communication and other technologies by virtue of intelligent detection of vehicle side unit and infrastructure side unit, vehicle-vehicle and vehicle-infrastructure side unit communication and other methods so as to improve drivers' travel safety and efficiency [GB/T 20839-2007, Definition 7.2] 4 Abbreviations For the purposes of this document, the following abbreviations apply. RFID: Radio Frequency Identification T-BOX: Telematics BOX TPMS: Tire Pressure Monitoring System USB: Universal Serial Bus VIN: Vehicle Identification Number   5 Architecture of information security technology for transportation The architecture of information security technology for transportation consists of six parts, namely user terminal security, vehicle side unit security, infrastructure side unit security, computing center security, network and communication security, and security general technology, with security general technology being the common requirement for the other five parts. The operators of transport information system shall ensure that their information systems meet the special security technical requirements of the five system components, namely the user terminal security, vehicle side unit security, infrastructure side unit security, computing center security, and network and communication security and the security general technical requirements. When the technical requirements of network and communication security is adopted, reference shall be made to the security technical requirements of user terminal, vehicle side unit, infrastructure side unit, and computing center according to the characteristics of different transport information systems, and reasonable technical measures shall be taken to ensure the coordination and complementarity among the security protection mechanisms of various components of the transport information system and form longitudinal-depth protection capabilities. See Figure 1 for the transport information security system architecture. Figure 1 Transport information security system architecture 6 General technical requirements for transport information system security 6.1 Identity authentication The technical requirements for identity authentication include the following: a) The logged-in user shall be subjected to identity identification and authentication; the identity identification of the user shall be unique and the identity authentication information shall be required to have certain complexity; b) The user shall modify the initial password set by the system when logging in for the first time and change it regularly; c) The combination of two or more authentication technologies should be adopted to carry out identity authentication for user, with one of the authentication technologies realized by using cryptographic technique; d) Necessary measures shall be taken to avoid the transmission of authentication information in plaintext when remote management is carried out; e) The function of login failure handling shall be provided, and necessary protection measures, such as session shutdown, limiting illegal login times and automatic exit in case of login connection timeout, shall be configured and enabled; f) Authentication information reset or other technical measures shall be taken to ensure system security when the user identity authentication information is lost or invalid; g) The users shall be required to register with their real names (based on name, ID number, VIN number, mobile phone number, etc.) in various transportation applications according to the principle of "using real-name at background and voluntary at the foreground", and the system shall verify the real names. 6.2 Access control The technical requirements for access control include the following: a) The function of access control shall be provided, with accounts and authorities assigned to logged-in users; b) Default account shall be renamed or deleted and the default password of the default account shall be changed; c) The redundant and expired account shall be deleted; d) The minimum authority shall be granted to different accounts to complete their respective tasks, with a mutually restrictive relationship formed between them; e) The access control policy shall be configured by authorized subject and the subject-to-object access rules shall be specified in the access control policy; f) The granularity of access control shall be at the user level for the subject and at least at the file level for the object; g) Security markings shall be set for sensitive information resources, and subjects' access to information resources with security markings shall be controlled. 6.3 Malicious code prevention The technical requirements for malicious code prevention include the following: a) It shall be able to detect and remove malicious codes such as viruses, worms and Trojans; b) It shall be able to upgrade and update the malicious code prevention mechanism, and technical means shall be adopted for dedicated network and local area network of transport to upgrade the malicious code prevention mechanism timely.
Foreword i 1 Scope 2 Normative references 3 Terms and definitions 4 Abbreviations 5 Architecture of information security technology for transportation 6 General technical requirements for transport information system security 7 Technical requirements for user terminal security 8 Technical requirements for vehicle side unit security 9 Technical requirements for infrastructure side unit security 10 Technical requirements for computing center security 11 Technical requirements for network and communication security Bibliography
Referred in GB/T 37378-2019:
*GB/T 20839-2007 Intelligent transport systems-General terminology
*GB/T 25069-2010 Information security technology—Glossary
*GB/T 22239-2008 Information security technology - Baseline for classified protection of information system security
*GB 3565-2005 Safety requirements for bicycles
*TSG 21-2016/XG1-2020 Supervision Regulation on Safety Technology for Stationary Pressure Vessel,includes Amendment 1
*GB 14748-2006 Safety Requirements for Wheeled Child Conveyances
*GB 2763-2021 National Food Safety Standard-Maximum Residue Limits for Pesticides in Food
*GB/T 22849-2014 Knitted T-shirt
*FZ/T 81006-2017 Jeanswear
*GB 4943.1-2011 Information technology equipment -Safety - Part 1: General requirements
Code of China
Standard
GB/T 37378-2019  Transportation—Information security specification (English Version)
Standard No.GB/T 37378-2019
Statusvalid
LanguageEnglish
File FormatPDF
Word Count8500 words
Price(USD)180.0
Implemented on2019-12-1
Deliveryvia email in 1 business day
Detail of GB/T 37378-2019
Standard No.
GB/T 37378-2019
English Name
Transportation—Information security specification
Chinese Name
交通运输 信息安全规范
Chinese Classification
R85
Professional Classification
GB
ICS Classification
Issued by
SAMR; SAC
Issued on
2019-05-10
Implemented on
2019-12-1
Status
valid
Superseded by
Superseded on
Abolished on
Superseding
Language
English
File Format
PDF
Word Count
8500 words
Price(USD)
180.0
Keywords
GB/T 37378-2019, GB 37378-2019, GBT 37378-2019, GB/T37378-2019, GB/T 37378, GB/T37378, GB37378-2019, GB 37378, GB37378, GBT37378-2019, GBT 37378, GBT37378
Introduction of GB/T 37378-2019
Codeofchina.com is in charge of this English translation. In case of any doubt about the English translation, the Chinese original shall be considered authoritative. This standard is developed in accordance with the rules given in GB/T 1.1-2009. This standard was proposed by and is under the jurisdiction of SAC/TC 268 National Technical Committee 268 on Intelligent Transport Systems of Standardization Administration of China. Transportation - Information security specification 1 Scope The Standard specifies the system architecture and general technical requirements of information security technology for transportation, including the general and special technical requirements for information security of user terminals, vehicle side units, infrastructure side units, computing centers, and network and communication basic components that constitute the transport information system. The Standard is applicable to guiding the operators of transport information system to put forward specific information security standards, specifications, implementation guidelines, etc. according to the specific information security requirements of non-confidential systems, and can also be used to guide the planning, design, construction, operation and maintenance, evaluation, etc. of information security technology systems. 2 Normative references The following referenced documents are indispensable for the application of this document. For dated references, only the edition cited applies. For undated references, the latest edition of the referenced document (including any amendments) applies. GB/T 20839-2007 Intelligent transport systems - General terminology GB/T 25069-2010 Information security technology - Glossary 3 Terms and definitions For the purposes of this document, the terms and definitions given in GB/T 20839-2007 and GB/T 25069-2010 as well as the following apply. For the convenience of application, some terms and definitions in GB/T 20839-2007 and GB/T 25069-2010 are listed again. 3.1 transport information system system composed of computers or other information terminals and relevant equipment and networks for collecting, storing, transmitting, exchanging and processing information according to certain rules and procedures in the field of transportation, which usually consists of terminals, vehicle side units, infrastructure side units, computing centers, networks and communications in whole or in part   3.2 information security protecting and maintaining the confidentiality, integrity and availability of information, with authenticity, verifiability, non-repudiation and reliability includible [GB/T 25069-2010, Definition 2.1.52] 3.3 operators of transport information system owners, administrators and service providers of non-confidential information systems for transport 3.4 general user terminal for transport general desktop terminal equipment and mobile intelligent terminal equipment used in transport business, including desktop computers, laptop computers, smart phones, tablet computers, etc. 3.5 special user terminal for transport equipment used in transport business, which has specific functions and can realize man-machine interaction 3.6 infrastructure side unit equipment or modules deployed on roadside and/or shore side in order to realize the function of transport information system, including communication equipment, information release equipment, condition monitoring equipment, environment monitoring equipment, etc. 3.7 vehicle side unit device or communication module in transport equipment such as vehicles, ships and containers that communicates with infrastructure side units, terminals or computing centers   3.8 security element; SE integrated circuit module with central processing unit, which is responsible for access permission, information authentication and encryption protection of general and special user terminals, vehicle side units and infrastructure side units 3.9 safety related application applications for emergency collision and injury reduction, potential collision and injury reduction and prevention, emergency incident notification (such as emergency brake of front vehicle), etc. as well as those for emergency condition notification (such as accident, emergency vehicle, sudden environmental degradation notification) 3.10 driving aid application applications for notification related to high-priority public security information from the infrastructure side unit to vehicle, emergency notification of safety-related road conditions such as traffic light cycle and sharp turn, and driving assistance messages such as automatic driving, roadside periodic broadcasting, positioning differential signals, traffic information broadcasting, etc. 3.11 value-added service application applications for non-priority services such as online payment and recharge, personalized navigation services, driving route suggestions, and e-commerce 3.12 confidentiality feature that prevents data from being leaked to or exploited by unauthorized individuals, entities or processes [GB/T 25069-2010, Definition 2.1.1] 3.13 integrity feature that data has not been altered or destroyed in an unauthorized manner [GB/T 25069-2010, Definition 2.1.42] 3.14 availability feature of data and resources that can be accessed and used by authorized entities upon request [GB/T 25069-2010, Definition 2.1.20] 3.15 data freshness feature of preventing the history data that has been successfully received from being received again, or the data that has exceeded the data reception time from being received, or the data that has exceeded the data validity range from being received 3.16 driving assistance providing drivers with functions such as information service and support, and early warning and control intervention support in emergency using sensing detection, automatic control, communication and other technologies by virtue of intelligent detection of vehicle side unit and infrastructure side unit, vehicle-vehicle and vehicle-infrastructure side unit communication and other methods so as to improve drivers' travel safety and efficiency [GB/T 20839-2007, Definition 7.2] 4 Abbreviations For the purposes of this document, the following abbreviations apply. RFID: Radio Frequency Identification T-BOX: Telematics BOX TPMS: Tire Pressure Monitoring System USB: Universal Serial Bus VIN: Vehicle Identification Number   5 Architecture of information security technology for transportation The architecture of information security technology for transportation consists of six parts, namely user terminal security, vehicle side unit security, infrastructure side unit security, computing center security, network and communication security, and security general technology, with security general technology being the common requirement for the other five parts. The operators of transport information system shall ensure that their information systems meet the special security technical requirements of the five system components, namely the user terminal security, vehicle side unit security, infrastructure side unit security, computing center security, and network and communication security and the security general technical requirements. When the technical requirements of network and communication security is adopted, reference shall be made to the security technical requirements of user terminal, vehicle side unit, infrastructure side unit, and computing center according to the characteristics of different transport information systems, and reasonable technical measures shall be taken to ensure the coordination and complementarity among the security protection mechanisms of various components of the transport information system and form longitudinal-depth protection capabilities. See Figure 1 for the transport information security system architecture. Figure 1 Transport information security system architecture 6 General technical requirements for transport information system security 6.1 Identity authentication The technical requirements for identity authentication include the following: a) The logged-in user shall be subjected to identity identification and authentication; the identity identification of the user shall be unique and the identity authentication information shall be required to have certain complexity; b) The user shall modify the initial password set by the system when logging in for the first time and change it regularly; c) The combination of two or more authentication technologies should be adopted to carry out identity authentication for user, with one of the authentication technologies realized by using cryptographic technique; d) Necessary measures shall be taken to avoid the transmission of authentication information in plaintext when remote management is carried out; e) The function of login failure handling shall be provided, and necessary protection measures, such as session shutdown, limiting illegal login times and automatic exit in case of login connection timeout, shall be configured and enabled; f) Authentication information reset or other technical measures shall be taken to ensure system security when the user identity authentication information is lost or invalid; g) The users shall be required to register with their real names (based on name, ID number, VIN number, mobile phone number, etc.) in various transportation applications according to the principle of "using real-name at background and voluntary at the foreground", and the system shall verify the real names. 6.2 Access control The technical requirements for access control include the following: a) The function of access control shall be provided, with accounts and authorities assigned to logged-in users; b) Default account shall be renamed or deleted and the default password of the default account shall be changed; c) The redundant and expired account shall be deleted; d) The minimum authority shall be granted to different accounts to complete their respective tasks, with a mutually restrictive relationship formed between them; e) The access control policy shall be configured by authorized subject and the subject-to-object access rules shall be specified in the access control policy; f) The granularity of access control shall be at the user level for the subject and at least at the file level for the object; g) Security markings shall be set for sensitive information resources, and subjects' access to information resources with security markings shall be controlled. 6.3 Malicious code prevention The technical requirements for malicious code prevention include the following: a) It shall be able to detect and remove malicious codes such as viruses, worms and Trojans; b) It shall be able to upgrade and update the malicious code prevention mechanism, and technical means shall be adopted for dedicated network and local area network of transport to upgrade the malicious code prevention mechanism timely.
Contents of GB/T 37378-2019
Foreword i 1 Scope 2 Normative references 3 Terms and definitions 4 Abbreviations 5 Architecture of information security technology for transportation 6 General technical requirements for transport information system security 7 Technical requirements for user terminal security 8 Technical requirements for vehicle side unit security 9 Technical requirements for infrastructure side unit security 10 Technical requirements for computing center security 11 Technical requirements for network and communication security Bibliography
About Us   |    Contact Us   |    Terms of Service   |    Privacy   |    Cancellation & Refund Policy   |    Payment
Tel: +86-10-8572 5655 | Fax: +86-10-8581 9515 | Email: coc@codeofchina.com | QQ: 672269886
Copyright: Beijing COC Tech Co., Ltd. 2008-2040
 
 
Keywords:
GB/T 37378-2019, GB 37378-2019, GBT 37378-2019, GB/T37378-2019, GB/T 37378, GB/T37378, GB37378-2019, GB 37378, GB37378, GBT37378-2019, GBT 37378, GBT37378