Information security technology—Security techniques requirement for citizen cyber electronic identity—Part 2:Security technique requirements of carrier (English Version)
The National Standard of the People's Republic of China GB/T 36629.2-2018 "Information Security Technology Citizen Network Electronic Identity Security Technical Requirements Part 2: Carrier Security Technical Requirements" is an important standard in the field of information security, which mainly regulates the carrier security of citizen network electronic identity. This standard is proposed and coordinated by the National Information Security Standardization Technical Committee, and aims to ensure the security, reliability and compliance of citizens' network electronic identities.
With the development of information technology, network security issues are becoming increasingly severe, especially systems involving citizens' personal information and identity authentication face higher security requirements. The formulation of GB/T 36629.2-2018 fills the gap in my country's field of citizen network electronic identity carrier security technology, and provides clear technical specifications for the design, development and application of related products.
Dimensions | Technical requirements for traditional carriers | Requirements of GB/T 36629.2-2018 |
---|---|---|
Security domain division | Single-level management | Support for coexistence of multiple security domains and independent application management |
Chip requirements | Basic encryption functions | Support for advanced security features such as public key cryptography algorithms and random number generators |
Key management | Simple key storage | Support for multiple types of keys, strict permission control and life cycle management |
GB/T 36629.2-2018 requires that the carrier chip must have an independent security mechanism and realize unified management of multiple security domains through the chip operating system (COS). Each application should run in an independent security domain to ensure the isolation of code and data.
The standard emphasizes the strict management requirements of carrier keys and digital certificates, including:
In order to ensure the effective implementation of GB/T 36629.2-2018 standard, the following measures are recommended:
As cybersecurity threats continue to evolve, the GB/T 36629.2-2018 standard may be further expanded and optimized in the future. Expected highlights include:
Copyright ©2007-2025 ANTPEDIA, All Rights Reserved