2025-12-5 216.73.216.21
Code of China Chinese Classification Professional Classification ICS Classification Latest News Value-added Services

Position: Chinese Standard in English/GB 35114-2017
GB 35114-2017   Technical requirements for information security of video surveillance network system for public security (English Version)
Standard No.: GB 35114-2017 Status:valid remind me the status change

Email:

Target Language:English File Format:PDF
Word Count: 60000 words Translation Price(USD):1500.0 remind me the price change

Email:

Implemented on:2018-11-1 Delivery: via email in 1 business day

→ → →

,,2018-11-1,15120077173110009e4a5b3035a270f0
Standard No.: GB 35114-2017
English Name: Technical requirements for information security of video surveillance network system for public security
Chinese Name: 公共安全视频监控联网信息安全技术要求
Chinese Classification: A91    Guard and alarm system
Professional Classification: GB    National Standard
Source Content Issued by: AQSIQ; SAC
Issued on: 2017-11-01
Implemented on: 2018-11-1
Status: valid
Target Language: English
File Format: PDF
Word Count: 60000 words
Translation Price(USD): 1500.0
Delivery: via email in 1 business day
1 Scope This standard specifies the technical requirements for security protection of the video information in video surveillance network for public security and the control signaling information, including interconnection structure, certificate and key requirements, basic functional requirements, performance requirements and other technical requirements of the information security system in video surveillance network in public security use. This standard is applicable to the information security scheme design of video surveillance system for public security, system testing and acceptance, as well as related equipment development and testing. 2 Normative references The following referenced documents are indispensable for the application of this document. For dated references, only the edition cited applies. For undated references, the latest edition of the referenced document (including any amendments) applies. GB/T 2260-2007 Codes for the administrative divisions of the People’s Republic of China GB/T 2659-2000 Codes for the representation of names of countries and regions GB/T 7408-2005 Data elements and interchange formats—Information interchange—Representation of dates and times GB/T 15843.3-2008 Information technology—Security techniques—Entity authentication—Part 3: Mechanisms using digital signature techniques GB/T 25724-2017 Technical specifications for surveillance video and audio coding for public security GB/T 28181-2016 Technical requirements for information transport, switch and control in video surveillance network system for public security GM/T 0005-2012 Randomness test specification GM/T 0014-2012 Digital certificate authentication system cryptography protocol specification GM/T 0015-2012 Digital certificate format based on SM2 algorithm GM/T 0034-2014 Specifications of cryptograph and related security technology for certification system based on SM2 cryptographic algorithm IETF RFC 2976 The SIP INFO Method IETF RFC 3261 SIP: Session Initiation Protocol IETF RFC 3548 The Base16, Base32, and Base64 Data Encodings IETF RFC 3550 RTP: A Transport Protocol for Real-Time Applications IETF RFC 3725 Best Current Practices for Third Party Call Control (3PCC) in the Session Initiation Protocol (SIP) IETF RFC 4566 Session Description Protocol 3 Terms, definitions and abbreviations 3.1 Terms and definitions For the purposes of this document, the terms and definitions given in GB/T 28181- 2016 and the following apply. 3.1.1 video encryption key a symmetric key randomly generated by a front-end device with safety function (FDWSF), which changes according to a certain rule and is used for directly encrypting the video content to realize confidentiality protection of video transmission 3.1.2 video key encryption key a symmetric key generated by security management platform in video surveillance and distributed to a front-end device with safety function (FDWSF), which changes according to a certain rule and is used for encrypting the video encryption key to realize confidentiality protection of its transmission
Foreword i 1 Scope 2 Normative references 3 Terms, definitions and abbreviations 3.1 Terms and definitions 3.2 Abbreviations 4 Interconnection structure of information security system in video surveillance network in public security use 4.1 Interconnection structure 4.2 In-system networking 4.3 Inter-system networking 4.4 Networking mode 5 Certificate and key requirements 5.1 Cryptographic algorithm 5.2 Digital certificate type 5.3 Digital certificate format 5.4 Key type 6 Basic functional requirements 6.1 Unified encoding rule 6.2 User identity authentication 6.3 Front-end device grading 6.4 Device ID authentication 6.5 Authentication between management platforms 6.6 Authorization and access control 6.7 Control signaling authentication 6.8 Video source signature and integrity verification 6.9 Video/audio encryption 6.10 Device exception management alarm 6.11 Security management 6.12 Log management 6.13 Asymmetric key management 6.14 Symmetric key management 7 Performance requirements 7.1 Device ID authentication 7.2 Video data signature 7.3 Video encryption/decryption Annex A (Normative) Digital certificate format Annex B (Normative) Encoding rules of cryptographic module Annex C (Normative) Process and protocol Annex D (Informative) Examples of signaling messages Annex E (Informative) Export of encrypted video Bibliography
Referred in GB 35114-2017:
*GB/T 2260-2007/XG1-2016 Codes for the administrative divisions of the Peoples Republic of China
*GB/T 2659-2000 Codes for the representation of names of countries and regions
*GB/T 7408-2005 Data elements and interchange formats—Information interchange—Representation of dates and times
*GB/T 15843.3-2008 Information technology - Security techniques - Entity authentication - Part 3: Mechanisms using digital signature techniques
*GB/T 25724-2017 Technical specifications for surveillance video and audio coding for public security
*GB/T 28181-2016 Technical requirements for information transport, switch and control in video surveillance network system for public security
*GM/T 0005-2012 Randomness Test Specification
*GM/T 0014-2012 Digital certificate authentication system cryptography protocol specification
*GM/T 0015-2012 Digital certificate format based on SM2 algorithm
*GM/T 0034-2014 Specifications of cryptograph and related security technology for certification system based on SM2 cryptographic algorithm
GB 35114-2017 is referred in:
*GB/T 28181-2022 Technical requirements for information transmission, switch and control in video surveillance networking system for public security
*GB 11567-2017 Motor vehicles and trailers-lateral and rear underrun protection requirements
*CQC-C0301-2014 China Compulsory Certification Implementation Detailed-Rules - Low-voltage switchgear and low voltage electrical equipment
*CJ/T 157-2017 Hotplate of lacquered toughened glass for gas appliance
*JTG D81-2017 Design Specification for Highway Safety Facilities
*T/CECS 488-2017 Rating standard for data centers
*GB/T 34857-2017 Bath agents and shower agents
*GB/T 13304.1-2008 Steels classification - Part 1: Classification of according to chemical composition
*GB/T 13304.1-2008/XG1-2017 Steels classification - Part 1: Classification of according to chemical composition, includes Amendment 1
*GB/T 4336-2016 Carbon and low-alloy steel―Determination of multi-element contents―Spark discharge atomic emission spectrometric method (routine method)
Code of China
Standard
GB 35114-2017  Technical requirements for information security of video surveillance network system for public security (English Version)
Standard No.GB 35114-2017
Statusvalid
LanguageEnglish
File FormatPDF
Word Count60000 words
Price(USD)1500.0
Implemented on2018-11-1
Deliveryvia email in 1 business day
Detail of GB 35114-2017
Standard No.
GB 35114-2017
English Name
Technical requirements for information security of video surveillance network system for public security
Chinese Name
公共安全视频监控联网信息安全技术要求
Chinese Classification
A91
Professional Classification
GB
ICS Classification
Issued by
AQSIQ; SAC
Issued on
2017-11-01
Implemented on
2018-11-1
Status
valid
Superseded by
Superseded on
Abolished on
Superseding
Language
English
File Format
PDF
Word Count
60000 words
Price(USD)
1500.0
Keywords
GB 35114-2017, GB/T 35114-2017, GBT 35114-2017, GB35114-2017, GB 35114, GB35114, GB/T35114-2017, GB/T 35114, GB/T35114, GBT35114-2017, GBT 35114, GBT35114
Introduction of GB 35114-2017
1 Scope This standard specifies the technical requirements for security protection of the video information in video surveillance network for public security and the control signaling information, including interconnection structure, certificate and key requirements, basic functional requirements, performance requirements and other technical requirements of the information security system in video surveillance network in public security use. This standard is applicable to the information security scheme design of video surveillance system for public security, system testing and acceptance, as well as related equipment development and testing. 2 Normative references The following referenced documents are indispensable for the application of this document. For dated references, only the edition cited applies. For undated references, the latest edition of the referenced document (including any amendments) applies. GB/T 2260-2007 Codes for the administrative divisions of the People’s Republic of China GB/T 2659-2000 Codes for the representation of names of countries and regions GB/T 7408-2005 Data elements and interchange formats—Information interchange—Representation of dates and times GB/T 15843.3-2008 Information technology—Security techniques—Entity authentication—Part 3: Mechanisms using digital signature techniques GB/T 25724-2017 Technical specifications for surveillance video and audio coding for public security GB/T 28181-2016 Technical requirements for information transport, switch and control in video surveillance network system for public security GM/T 0005-2012 Randomness test specification GM/T 0014-2012 Digital certificate authentication system cryptography protocol specification GM/T 0015-2012 Digital certificate format based on SM2 algorithm GM/T 0034-2014 Specifications of cryptograph and related security technology for certification system based on SM2 cryptographic algorithm IETF RFC 2976 The SIP INFO Method IETF RFC 3261 SIP: Session Initiation Protocol IETF RFC 3548 The Base16, Base32, and Base64 Data Encodings IETF RFC 3550 RTP: A Transport Protocol for Real-Time Applications IETF RFC 3725 Best Current Practices for Third Party Call Control (3PCC) in the Session Initiation Protocol (SIP) IETF RFC 4566 Session Description Protocol 3 Terms, definitions and abbreviations 3.1 Terms and definitions For the purposes of this document, the terms and definitions given in GB/T 28181- 2016 and the following apply. 3.1.1 video encryption key a symmetric key randomly generated by a front-end device with safety function (FDWSF), which changes according to a certain rule and is used for directly encrypting the video content to realize confidentiality protection of video transmission 3.1.2 video key encryption key a symmetric key generated by security management platform in video surveillance and distributed to a front-end device with safety function (FDWSF), which changes according to a certain rule and is used for encrypting the video encryption key to realize confidentiality protection of its transmission
Contents of GB 35114-2017
Foreword i 1 Scope 2 Normative references 3 Terms, definitions and abbreviations 3.1 Terms and definitions 3.2 Abbreviations 4 Interconnection structure of information security system in video surveillance network in public security use 4.1 Interconnection structure 4.2 In-system networking 4.3 Inter-system networking 4.4 Networking mode 5 Certificate and key requirements 5.1 Cryptographic algorithm 5.2 Digital certificate type 5.3 Digital certificate format 5.4 Key type 6 Basic functional requirements 6.1 Unified encoding rule 6.2 User identity authentication 6.3 Front-end device grading 6.4 Device ID authentication 6.5 Authentication between management platforms 6.6 Authorization and access control 6.7 Control signaling authentication 6.8 Video source signature and integrity verification 6.9 Video/audio encryption 6.10 Device exception management alarm 6.11 Security management 6.12 Log management 6.13 Asymmetric key management 6.14 Symmetric key management 7 Performance requirements 7.1 Device ID authentication 7.2 Video data signature 7.3 Video encryption/decryption Annex A (Normative) Digital certificate format Annex B (Normative) Encoding rules of cryptographic module Annex C (Normative) Process and protocol Annex D (Informative) Examples of signaling messages Annex E (Informative) Export of encrypted video Bibliography
About Us   |    Contact Us   |    Terms of Service   |    Privacy   |    Cancellation & Refund Policy   |    Payment
Tel: +86-10-8572 5655 | Fax: +86-10-8581 9515 | Email: coc@codeofchina.com | QQ: 672269886
Copyright: Beijing COC Tech Co., Ltd. 2008-2040
 
 
Keywords:
GB 35114-2017, GB/T 35114-2017, GBT 35114-2017, GB35114-2017, GB 35114, GB35114, GB/T35114-2017, GB/T 35114, GB/T35114, GBT35114-2017, GBT 35114, GBT35114