2025-12-5 216.73.216.21
Code of China Chinese Classification Professional Classification ICS Classification Latest News Value-added Services

Position: Chinese Standard in English/GB/T 22186-2016
GB/T 22186-2016   Information security techniques―Security technical requirements for IC card chip with CPU (English Version)
Standard No.: GB/T 22186-2016 Status:valid remind me the status change

Email:

Target Language:English File Format:PDF
Word Count: 18500 words Translation Price(USD):550.0 remind me the price change

Email:

Implemented on:2017-3-1 Delivery: via email in 1 business day

→ → →

,,2017-3-1,9A4AC0A4C544AFC11478694801297
Standard No.: GB/T 22186-2016
English Name: Information security techniques―Security technical requirements for IC card chip with CPU
Chinese Name: 信息安全技术 具有中央处理器的IC卡芯片安全技术要求
Chinese Classification: L80    Data encryption
Professional Classification: GB    National Standard
Source Content Issued by: AQSIQ; SAC
Issued on: 2016-08-29
Implemented on: 2017-3-1
Status: valid
Superseding:GB/T 22186-2008 Information Security techniques Security technical requirements for IC card chip with CPU(EAL4+)
Target Language: English
File Format: PDF
Word Count: 18500 words
Translation Price(USD): 550.0
Delivery: via email in 1 business day
ICS 35.040 L 80 National Standard of the People’s Republic of China GB/T 22186-2016 Replaces GB/T 22186-2008 Information security techniques - Security technical requirements for IC card chip with CPU (English Translation) Issue date: 2016-08-29 Implementation date: 2017-03-01 Issued by the General Administration of Quality Supervision, Inspection and Quarantine of the People's Republic of China the Standardization Administration of the People's Republic of China Information security techniques - Security technical requirements for IC card chip with CPU 1 Scope This standard specifies the security functional requirements and security assurance requirements for the IC card chip with CPU (EAL4+, EAL5+ and EAL6+), including the security problem definition, security objectives, extended components definition, security requirements, rationale, etc. This standard is applicable to the test, evaluation and procurement of IC card chip products, and is also useful as a guide for the research and development of such products. 2 Normative references The following referenced documents are indispensable for the application of this document. For dated references, only the edition cited applies. For undated references, the latest edition of the referenced document (including any amendments) applies. GB/T 18336 (All parts) Information technology - Security techniques - Evaluation criteria for IT security GB/T 25069-2010 Information security technology - Glossary 3 Terms, definitions and abbreviations 3.1 Terms and definitions For the purposes of this document, the terms and definitions given in GB/T 25069-2010, GB/T 18336.1 and the followings apply. 3.1.1 IC dedicated software dedicated software developed by the IC card chip designer and existing in the IC card integrated circuit. The dedicated software is usually used for testing purposes during production, and can also be used to provide additional services to facilitate usage of the hardware. Some functions of the dedicated testing software are limited to specific stages 3.1.2 initialization data data defined by the IC card chip manufacturer and used to identify the chip in order to track the production process and life cycle stage, e.g. the unique identification number of the IC card chip 3.1.3 pre-personalization data data written into the non-volatile memory by the manufacturer in the IC card chip manufacturing stage, for the convenience of tracing the manufacturing process of the IC card chip in the subsequent life cycle stage 3.1.4 IC card embedded software software stored in the non-volatile memory of the IC card with CPU (such as ROM, EEPROM or Flash) and running in IC card chip. The software is used to manage the hardware resources and data of the chip, and exchange information with IC card terminal device through the communication interface of the chip, so as to respond to application requests such as data encryption, data signature and authentication initiated by users, and realize the support for application functions 3.2 Abbreviations For the purposes of this document, the following abbreviations apply. CPU: Central Processing Unit CM: Configuration Management EAL: Evaluation Assurance Level EEPROM: Electrically-Erasable Programmable Read-only Memory IC: Integrated Circuit I/O: Input/Output IT: Information Technology RAM: Random-Access Memory ROM: Read-Only Memory ST: Security Target TOE: Target of Evaluation TSF: TOE Security Functionality USB: Universal Serial Bus 4 Description of IC card chip The Target of Evaluation (TOE) of this standard refers to the IC card chip with CPU (hereinafter referred to as IC card chip), which is generally composed of processing unit, volatile memory RAM and non-volatile memory ROM/EEPROM/Flash, I/O interfaces (contact, contactless or similar interfaces like USB), random number generator, cryptographic co-processor, security measure circuit (such as hardware module for preventing physical detection and environmental stress threat), etc. The TOE may also include the IC dedicated software delivered by the IC designer/manufacturer. Such software (also known as IC firmware) is often used for testing purposes during production but may also provide additional services to facilitate usage of the hardware (for instance in the form of a library). The IC card embedded software is that running in the IC card chip by the user of the TOE, but is not part of the TOE. The general structure and operational environment of the IC card chip are shown in Figure 1 (it is worth noting that the IC card chip may not contain some circuit modules, such as ROM and EEPROM according to the actual use of the chip). In this operational environment, the administrator can basically configure the IC card chip through the IC dedicated software (or directly through the chip interface or circuit); on the other hand, attackers can attack by using IC card embedded software interface or detecting IC card chip circuit, so as to destroy the sensitive data information of the IC card chip or abuse its security function. Therefore, protective measures shall be taken for the IC card chip to ensure the data and functional security of the chip.
Foreword i Introduction iii 1 Scope 2 Normative references 3 Terms, definitions and abbreviations 3.1 Terms and definitions 3.2 Abbreviations 4 Description of IC card chip 5 Security problem definition 5.1 Assets 5.2 Threats 5.3 Organizational security policies 5.4 Assumptions 6 Security objectives 6.1 Security objectives for the IC card chip 6.2 Security objective for environment 7 Extended components definition 7.1 Definition of the Family FMT_LIM 7.2 Definition of the Family FPT_TST 8 Security requirements 8.1 Security functional requirements 8.2 Security assurance requirements 9 Rationale 9.1 Security objectives rationale 9.2 Security requirement rationale 9.3 Component dependency rationale Bibliography
Referred in GB/T 22186-2016:
*GB/T 18336-2001 Information technology--Security techniques--Evaluation criteria for IT security
*GB/T 25069-2010 Information security technology—Glossary
Code of China
Standard
GB/T 22186-2016  Information security techniques―Security technical requirements for IC card chip with CPU (English Version)
Standard No.GB/T 22186-2016
Statusvalid
LanguageEnglish
File FormatPDF
Word Count18500 words
Price(USD)550.0
Implemented on2017-3-1
Deliveryvia email in 1 business day
Detail of GB/T 22186-2016
Standard No.
GB/T 22186-2016
English Name
Information security techniques―Security technical requirements for IC card chip with CPU
Chinese Name
信息安全技术 具有中央处理器的IC卡芯片安全技术要求
Chinese Classification
L80
Professional Classification
GB
ICS Classification
Issued by
AQSIQ; SAC
Issued on
2016-08-29
Implemented on
2017-3-1
Status
valid
Superseded by
Superseded on
Abolished on
Superseding
GB/T 22186-2008 Information Security techniques Security technical requirements for IC card chip with CPU(EAL4+)
Language
English
File Format
PDF
Word Count
18500 words
Price(USD)
550.0
Keywords
GB/T 22186-2016, GB 22186-2016, GBT 22186-2016, GB/T22186-2016, GB/T 22186, GB/T22186, GB22186-2016, GB 22186, GB22186, GBT22186-2016, GBT 22186, GBT22186
Introduction of GB/T 22186-2016
ICS 35.040 L 80 National Standard of the People’s Republic of China GB/T 22186-2016 Replaces GB/T 22186-2008 Information security techniques - Security technical requirements for IC card chip with CPU (English Translation) Issue date: 2016-08-29 Implementation date: 2017-03-01 Issued by the General Administration of Quality Supervision, Inspection and Quarantine of the People's Republic of China the Standardization Administration of the People's Republic of China Information security techniques - Security technical requirements for IC card chip with CPU 1 Scope This standard specifies the security functional requirements and security assurance requirements for the IC card chip with CPU (EAL4+, EAL5+ and EAL6+), including the security problem definition, security objectives, extended components definition, security requirements, rationale, etc. This standard is applicable to the test, evaluation and procurement of IC card chip products, and is also useful as a guide for the research and development of such products. 2 Normative references The following referenced documents are indispensable for the application of this document. For dated references, only the edition cited applies. For undated references, the latest edition of the referenced document (including any amendments) applies. GB/T 18336 (All parts) Information technology - Security techniques - Evaluation criteria for IT security GB/T 25069-2010 Information security technology - Glossary 3 Terms, definitions and abbreviations 3.1 Terms and definitions For the purposes of this document, the terms and definitions given in GB/T 25069-2010, GB/T 18336.1 and the followings apply. 3.1.1 IC dedicated software dedicated software developed by the IC card chip designer and existing in the IC card integrated circuit. The dedicated software is usually used for testing purposes during production, and can also be used to provide additional services to facilitate usage of the hardware. Some functions of the dedicated testing software are limited to specific stages 3.1.2 initialization data data defined by the IC card chip manufacturer and used to identify the chip in order to track the production process and life cycle stage, e.g. the unique identification number of the IC card chip 3.1.3 pre-personalization data data written into the non-volatile memory by the manufacturer in the IC card chip manufacturing stage, for the convenience of tracing the manufacturing process of the IC card chip in the subsequent life cycle stage 3.1.4 IC card embedded software software stored in the non-volatile memory of the IC card with CPU (such as ROM, EEPROM or Flash) and running in IC card chip. The software is used to manage the hardware resources and data of the chip, and exchange information with IC card terminal device through the communication interface of the chip, so as to respond to application requests such as data encryption, data signature and authentication initiated by users, and realize the support for application functions 3.2 Abbreviations For the purposes of this document, the following abbreviations apply. CPU: Central Processing Unit CM: Configuration Management EAL: Evaluation Assurance Level EEPROM: Electrically-Erasable Programmable Read-only Memory IC: Integrated Circuit I/O: Input/Output IT: Information Technology RAM: Random-Access Memory ROM: Read-Only Memory ST: Security Target TOE: Target of Evaluation TSF: TOE Security Functionality USB: Universal Serial Bus 4 Description of IC card chip The Target of Evaluation (TOE) of this standard refers to the IC card chip with CPU (hereinafter referred to as IC card chip), which is generally composed of processing unit, volatile memory RAM and non-volatile memory ROM/EEPROM/Flash, I/O interfaces (contact, contactless or similar interfaces like USB), random number generator, cryptographic co-processor, security measure circuit (such as hardware module for preventing physical detection and environmental stress threat), etc. The TOE may also include the IC dedicated software delivered by the IC designer/manufacturer. Such software (also known as IC firmware) is often used for testing purposes during production but may also provide additional services to facilitate usage of the hardware (for instance in the form of a library). The IC card embedded software is that running in the IC card chip by the user of the TOE, but is not part of the TOE. The general structure and operational environment of the IC card chip are shown in Figure 1 (it is worth noting that the IC card chip may not contain some circuit modules, such as ROM and EEPROM according to the actual use of the chip). In this operational environment, the administrator can basically configure the IC card chip through the IC dedicated software (or directly through the chip interface or circuit); on the other hand, attackers can attack by using IC card embedded software interface or detecting IC card chip circuit, so as to destroy the sensitive data information of the IC card chip or abuse its security function. Therefore, protective measures shall be taken for the IC card chip to ensure the data and functional security of the chip.
Contents of GB/T 22186-2016
Foreword i Introduction iii 1 Scope 2 Normative references 3 Terms, definitions and abbreviations 3.1 Terms and definitions 3.2 Abbreviations 4 Description of IC card chip 5 Security problem definition 5.1 Assets 5.2 Threats 5.3 Organizational security policies 5.4 Assumptions 6 Security objectives 6.1 Security objectives for the IC card chip 6.2 Security objective for environment 7 Extended components definition 7.1 Definition of the Family FMT_LIM 7.2 Definition of the Family FPT_TST 8 Security requirements 8.1 Security functional requirements 8.2 Security assurance requirements 9 Rationale 9.1 Security objectives rationale 9.2 Security requirement rationale 9.3 Component dependency rationale Bibliography
About Us   |    Contact Us   |    Terms of Service   |    Privacy   |    Cancellation & Refund Policy   |    Payment
Tel: +86-10-8572 5655 | Fax: +86-10-8581 9515 | Email: coc@codeofchina.com | QQ: 672269886
Copyright: Beijing COC Tech Co., Ltd. 2008-2040
 
 
Keywords:
GB/T 22186-2016, GB 22186-2016, GBT 22186-2016, GB/T22186-2016, GB/T 22186, GB/T22186, GB22186-2016, GB 22186, GB22186, GBT22186-2016, GBT 22186, GBT22186