Standard No. |
Title |
Price(USD) |
Delivery |
Status |
Add to Cart |
GB/T 34976-2017 |
Information security technology-Security technical requirements and testing and evaluation approaches for operating system of smart mobile terminals |
$370.00 |
via email in 1~5 business day |
valid,,2018-5-1 |
|
GB/T 34977-2017 |
Information security technology-Security technology requirements and testing and evaluation approaches for data storage of mobile intelligent terminals |
$250.00 |
via email in 1~3 business day |
valid,,2018-5-1 |
|
GB/T 34978-2017 |
Information security technology-Technology requirements for personal information protection of smart mobile terminal |
$160.00 |
via email in 1~3 business day |
valid,,2018-5-1 |
|
GB/T 34998-2017 |
Technology requirement of mobile terminal browser software |
$310.00 |
via email in 1~5 business day |
valid,,2018-5-1 |
|
GB/T 35101-2017 |
Information security technology-Smart card reader security technology requirements ( EAL4+) |
$550.00 |
via email in 1~5 business day |
valid,,2018-5-1 |
|
GB/T 35143-2017 |
Smart home for internet of things―Unicode of data and device |
$430.00 |
via email in 1~5 business day |
valid,,2018-7-1 |
|
GB/T 35273-2017 |
Information security technology—Personal information security specification |
$160.00 |
immediately |
superseded,2020-10-1,2018-5-1 |
|
GB/T 35273-2020 |
Information security technology—Personal information security specification |
$400.00 |
immediately |
valid,,2020-10-1 |
|
GB/T 35274-2017 |
Information security technology—Security capability requirements for big data services |
$360.00 |
immediately |
superseded,2024-3-1,2018-7-1 |
|
GB/T 35275-2017 |
Information security technology―SM2 cryptographic algorithm encrypted signature message syntax specification |
$220.00 |
via email in 1~3 business day |
valid,,2018-7-1 |
|
GB/T 35276-2017 |
Information security technology―SM2 cryptography algorithm usage specification |
$160.00 |
via email in 1~3 business day |
valid,,2018-7-1 |
|
GB/T 35277-2017 |
Information security technology―Security technical requirements and testing and evaluation approaches for antivirus gateway products |
$610.00 |
via email in 1~5 business day |
valid,,2018-7-1 |
|
GB/T 35278-2017 |
Information security technology―Technical requirements for mobile terminal security protection |
$430.00 |
via email in 1~5 business day |
valid,,2018-7-1 |
|
GB/T 35279-2017 |
Information security technology—Security reference architecture of cloud computing |
$310.00 |
via email in 1~5 business day |
valid,, |
|
GB/T 35280-2017 |
Information security technology―Requirement and code of conduct for security testing bodies of information technology products |
$220.00 |
via email in 1~3 business day |
abolished2018-01-22,,2018-7-1 |
|
GB/T 35281-2017 |
Information security technology—Security technique requirements for application servers in mobile internet |
$220.00 |
via email in 1~3 business day |
valid,,2018-7-1 |
|
GB/T 35282-2017 |
Information security technology―Security technology specifications of mobile e-government system |
$220.00 |
via email in 1~3 business day |
superseded,2023-12-1,2018-7-1 |
|
GB/T 35283-2017 |
Information security techniques—Specification for the structure of desktop core configuration baseline |
$480.00 |
via email in 1~5 business day |
to be superseded,2025-6-1,2018-7-1 |
|
GB/T 35284-2017 |
Information security technology—Requirements and assessment methods for website identity and system security |
$310.00 |
via email in 1~5 business day |
valid,,2018-7-1 |
|
GB/T 35285-2017 |
Information security technology―Public key infrastructure―Technical requirements for digital certificate based reliable electronic signature creation and verification |
$220.00 |
via email in 1~3 business day |
valid,,2018-7-1 |
|
|