Information technology — Technical requirements for online game minor guardianship system
1 Scope
This document specifies the overall requirements, functional requirements, information security requirements and usability requirements of the online game minor guardianship system (hereinafter referred to as the "guardianship system").
This document is applicable to the design, development and application of the guardianship system, and provides technical reference for online game publishers, online game platform operators, and third-party service providers.
2 Normative references
The following documents contain requirements which, through reference in this text, constitute provisions of this document. For dated references, only the edition cited applies. For undated references, the latest edition of the referenced document (including any amendments) applies.
GB/T 22239 Information security technology - Baseline for classified protection of cybersecurity
GB/T35273 Information security technology - Personal information security specification
3 Terms and definitions
For the purpose of this document, the following term and definition apply.
3.1
minor user
online game users under the age of 18
3.2
guardian
system users who provide guidance and supervision to minor users
Note: Guardians generally refer to parents and teachers.
3.3
online game minor guardianship system
information system that provides guardians with the function of monitoring minors in online games
4 General Requirements
4.1 Monitoring system framework
The monitoring system framework includes monitoring system functions and monitoring system interfaces, as shown in Figure 1.
Contents
Foreword
1 Scope
2 Normative references
3 Terms and definitions
4 General Requirements
4.1 Monitoring system framework
4.2 Monitoring system functions
4.3 Monitoring system interfaces
5 Functional requirements
5.1 User registration
5.2 Query and reminder
5.3 Time management
5.4 Authority management
5.5 Consumption management
6 Information security requirements
6.1 Personal information protection
6.2 System cyber security
7 Usability requirements
Information technology — Technical requirements for online game minor guardianship system
1 Scope
This document specifies the overall requirements, functional requirements, information security requirements and usability requirements of the online game minor guardianship system (hereinafter referred to as the "guardianship system").
This document is applicable to the design, development and application of the guardianship system, and provides technical reference for online game publishers, online game platform operators, and third-party service providers.
2 Normative references
The following documents contain requirements which, through reference in this text, constitute provisions of this document. For dated references, only the edition cited applies. For undated references, the latest edition of the referenced document (including any amendments) applies.
GB/T 22239 Information security technology - Baseline for classified protection of cybersecurity
GB/T35273 Information security technology - Personal information security specification
3 Terms and definitions
For the purpose of this document, the following term and definition apply.
3.1
minor user
online game users under the age of 18
3.2
guardian
system users who provide guidance and supervision to minor users
Note: Guardians generally refer to parents and teachers.
3.3
online game minor guardianship system
information system that provides guardians with the function of monitoring minors in online games
4 General Requirements
4.1 Monitoring system framework
The monitoring system framework includes monitoring system functions and monitoring system interfaces, as shown in Figure 1.
Contents of GB/T 44163-2024
Contents
Foreword
1 Scope
2 Normative references
3 Terms and definitions
4 General Requirements
4.1 Monitoring system framework
4.2 Monitoring system functions
4.3 Monitoring system interfaces
5 Functional requirements
5.1 User registration
5.2 Query and reminder
5.3 Time management
5.4 Authority management
5.5 Consumption management
6 Information security requirements
6.1 Personal information protection
6.2 System cyber security
7 Usability requirements