2025-12-19 216.73.216.41
Code of China Chinese Standard Classification Professional Classification ICS Classification Latest
Position: Search valid to be valid superseded to be superseded abolished to be abolished
Standard No. Title Price(USD) Delivery Status Add to Cart
GB/T 36466-2018 Information security technology—Implementation guide to risk assessment of industrial control systems 670.0 via email in 1~5 business day valid,,2019-1-1
GB/T 20518-2018 Information security technology—Public key infrastructure—Digital certificate format 750.0 via email in 1~5 business day valid,,2019-1-1
GB/T 35274-2017 Information security technology—Security capability requirements for big data services 360.0 via email in 1 business day superseded,2024-3-1,2018-7-1
GB/T 36470-2018 Information security technology—Common security functional requirements for data acquisition and control field devices of industrial control systems 610.0 via email in 1~5 business day valid,,2019-1-1
GB/T 25056-2018 Information security technology—Specifications of cryptograph and related security technology for certificate authentication system 550.0 via email in 1~5 business day valid,,2019-1-1
GB/Z 24294.1-2018 Information security technology—Guide of implementation for internet-basede-government information security—Part 1:General 430.0 via email in 1~5 business day valid,,2018-10-1
GM/T 0054-2018 General requirements for information system cryptography application 260.0 via email in 1 business day valid,,2018-2-8
GB/T 20985.1-2017 Information technology—Security techniques—Information security incident management—Part 1:Principles of incident management 310.0 via email in 1~5 business day valid,,2018-7-1
GB/T 35787-2017 Security technical requirement for the read-write equipment ofthe electronic identification of motor vehicles 80.0 via email in 1 business day valid,,2018-7-1
GB/T 31495.2-2015 Information security technology―Indicator system of information security assurance and evaluation methods―Part 2:Indicator system 610.0 via email in 1~5 business day valid,,2016-1-1
GB/T 15843.2-2017 Information technology―Security techniques―Entity authentication―Part 2:Mechanisms using symmetric encipherment algorithms 220.0 via email in 1~3 business day superseded,2025-4-1,2018-7-1
GB/T 20276-2016 Information security technology - Security requirements for embedded software in IC card with CPU 500.0 via email in 1 business day valid,,2017-3-1
GB/T 17903.2-1999 Information technology--Security techniques--Non-repudiation--Part 2:Mechanisms using symmetric techniques 240.0 via email in 1~3 business day superseded,2008-11-1,2000-5-1
GB/T 31495.1-2015 Information security technology―Indicator system of information security assurance and evaluation methods―Part 1:Concepts and model 160.0 via email in 1~3 business day valid,,2016-1-1
GB/T 25056-2010 Information security techniques—Specifications of cryptograph and related security technology for certificate authentication system 1140.0 via email in 1~3 business day superseded,2019-1-1,2011-2-1
GM/T 0041-2015 Cryptographic test specification for smart card 140.0 via email in 1~3 business day superseded2025-07-01,2024-12-27,2015-4-1
LD/T 30.4-2009 Human resources and social security electronic authentication system—Part 4:Management specification of digital certificate application 480.0 via email in 1~5 business day valid,,2010-3-1
GB/T 31496-2015 Information technology―Security techniques―Information security management system implementation guidance 690.0 via email in 1~5 business day superseded,2023-12-1,2016-1-1
GB/T 15277-1994 Information processing--Modes of operation for a 64-bit block cipher algorithm 130.0 via email in 1~3 business day abolished2005-10-14,,1995-8-1
GB/T 35275-2017 Information security technology―SM2 cryptographic algorithm encrypted signature message syntax specification 220.0 via email in 1~3 business day valid,,2018-7-1
Previous Page     Next Page



Code of China
Search

GB/T 36466-2018 Information security technology—Implementation guide to risk assessment of industrial control systems 
  Issued on: 2018-06-07   Price(USD): 670.0
GB/T 20518-2018 Information security technology—Public key infrastructure—Digital certificate format 
  Issued on: 2018-06-07   Price(USD): 750.0
GB/T 35274-2017 Information security technology—Security capability requirements for big data services 
  Issued on: 2017-12-29   Price(USD): 360.0
GB/T 36470-2018 Information security technology—Common security functional requirements for data acquisition and control field devices of industrial control systems 
  Issued on: 2018-06-07   Price(USD): 610.0
GB/T 25056-2018 Information security technology—Specifications of cryptograph and related security technology for certificate authentication system 
  Issued on: 2018-06-07   Price(USD): 550.0
GB/Z 24294.1-2018 Information security technology—Guide of implementation for internet-basede-government information security—Part 1:General 
  Issued on: 2018-03-15   Price(USD): 430.0
GM/T 0054-2018 General requirements for information system cryptography application 
  Issued on: 2018-02-08   Price(USD): 260.0
GB/T 20985.1-2017 Information technology—Security techniques—Information security incident management—Part 1:Principles of incident management 
  Issued on: 2017-12-29   Price(USD): 310.0
GB/T 35787-2017 Security technical requirement for the read-write equipment ofthe electronic identification of motor vehicles 
  Issued on: 2017-11-29   Price(USD): 80.0
GB/T 31495.2-2015 Information security technology―Indicator system of information security assurance and evaluation methods―Part 2:Indicator system 
  Issued on: 2015-05-15   Price(USD): 610.0
GB/T 15843.2-2017 Information technology―Security techniques―Entity authentication―Part 2:Mechanisms using symmetric encipherment algorithms 
  Issued on: 2017-12-29   Price(USD): 220.0
GB/T 20276-2016 Information security technology - Security requirements for embedded software in IC card with CPU 
  Issued on: 2016-08-29   Price(USD): 500.0
GB/T 17903.2-1999 Information technology--Security techniques--Non-repudiation--Part 2:Mechanisms using symmetric techniques 
  Issued on: 1999-01-01   Price(USD): 240.0
GB/T 31495.1-2015 Information security technology―Indicator system of information security assurance and evaluation methods―Part 1:Concepts and model 
  Issued on: 2015-05-15   Price(USD): 160.0
GB/T 25056-2010 Information security techniques—Specifications of cryptograph and related security technology for certificate authentication system 
  Issued on: 2010-9-2   Price(USD): 1140.0
GM/T 0041-2015 Cryptographic test specification for smart card 
  Issued on: 2025-07-01   Price(USD): 140.0
LD/T 30.4-2009 Human resources and social security electronic authentication system—Part 4:Management specification of digital certificate application 
  Issued on: 2009-12-14   Price(USD): 480.0
GB/T 31496-2015 Information technology―Security techniques―Information security management system implementation guidance 
  Issued on: 2015-05-15   Price(USD): 690.0
GB/T 15277-1994 Information processing--Modes of operation for a 64-bit block cipher algorithm 
  Issued on: 1994-01-02   Price(USD): 130.0
GB/T 35275-2017 Information security technology―SM2 cryptographic algorithm encrypted signature message syntax specification 
  Issued on: 2017-12-29   Price(USD): 220.0
About Us   |    Contact Us   |    Terms of Service   |    Privacy   |    Cancellation & Refund Policy   |    Payment
Tel: +86-10-8572 5655 | Fax: +86-10-8581 9515 | Email: coc@codeofchina.com | QQ: 672269886
Copyright: Beijing COC Tech Co., Ltd. 2008-2040