2025-12-15 216.73.216.3
Code of China Chinese Classification Professional Classification ICS Classification Latest News Value-added Services

Position: Chinese Standard in English/GB/T 38308-2019
GB/T 38308-2019   Weather forecast verification—Typhoon forecast (English Version)
Standard No.: GB/T 38308-2019 Status:valid remind me the status change

Email:

Target Language:English File Format:PDF
Word Count: 5500 words Translation Price(USD):160.0 remind me the price change

Email:

Implemented on:2020-7-1 Delivery: via email in 1~3 business day

→ → →

,,2020-7-1,B96A2FC9EF6288481583820417505
Standard No.: GB/T 38308-2019
English Name: Weather forecast verification—Typhoon forecast
Chinese Name: 天气预报检验 台风预报
Chinese Classification: A47    Meteorology
Professional Classification: GB    National Standard
Source Content Issued by: SAMR; SAC
Issued on: 2019-12-10
Implemented on: 2020-7-1
Status: valid
Target Language: English
File Format: PDF
Word Count: 5500 words
Translation Price(USD): 160.0
Delivery: via email in 1~3 business day
GB/T 38308-2019 Processes, data elements and documents in commerce, industry and administration - Long term signature - Part 4: Attributes pointing to proof of existence objects used in long term signature formats 1 Scope This document specifies the attributes and objects to proof of existence (PoE) used in long term signature formats, it describes the basic concept and attribute character of PoE, and provides the type, basic fields and associated examples of PoE objects. This document is applicable to (external) PoE used in long term signature formats, i.e. achieving long term signature validation through existing digital signatures and trusted time values. 2 Normative references The following referenced documents are indispensable for the application of this document. For dated references, only the edition cited applies. For undated references, the latest edition of the referenced document (including any amendments) applies. ISO 32000-2 Document management - Portable document format - Part 2: PDF 2.0 ISO/IEC8825-1 Information technology - ASN.1 encoding rules: Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER) Note: GB/T16263.1-2006 Information technology- ASN. 1 encoding rules- Part 1 :Specification Of Basic Encoding Rules(BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules(DER) (ISO/IEC 8825-1:2002, IDT) ISO/IEC 9594-8 Information technology - Open Systems Interconnection - The Directory - Part 8 : Public-key and attribute certificate frameworks Note: GB/T16264.8-2005 Information technology-Open systems Interconnection-The Directory-Part 8:Public-key and attribute certificate frameworks (ISO/IEC 9594-8:2001, IDT) ETSI EN 319122-1 V1.1.1: 2016 Electronic Signatures and Infrastructures(ESI); CAdES digital signatures; Part 1:Building blocks and CAdES baseline signatures IETF RFC 31611 Timestamp Protocol (TSP) IETF RFC 46482) The Basel6,Base32,and Base64 Data Encodings IETF RFC 49983) Evidence Record Syntax(ERS) IETF RFC 56524) Cryptographic Message Syntax (CMS) IETF RFC 62835) Extensible Markup Language Evidence Record Syntax (XMLERS) IETF RFC 6960 Online Certificate Status Protocol (OCSP) 3 Terms and definitions For the purposes of this document, the terms and definitions given in ISO/IEC 9594-8, ISO 32000-2, ISO/IEC 8825-1, IETF RFC 3161, IETF RFC 6960 and the following apply. ISO and IEC maintain terminological databases for use in standardization at the following addresses: - ISO Online browsing platform: available at https://www.iso.org/obp - IEC Electropedia :available athttp://www.electropedia.org/ 3.1 digital signature data appended to, or cryptographic transformation of, a data string that proves the origin and the integrity of the data string and protects against forgery, e.g.by the recipient of the data string Note: Digital signatures in the present document cover also electronic signatures, advanced electronic signatures, qualified electronic signatures, electronic seals, advanced electronic seals, qualified electronic seals, electronic time stamps and qualified electronic time stamps as per Regulation (EU) No 910/2014[6] and ISO/IEC 9594-8 certificate, CRL (see ISO/IEC 9594-8) or OCSP response and signatures defined in the configuration document. [Source: ISO/IEC 7816-4:2013, 3.21, modified] 3.2 document identifier; DId indirect identifier for machine processing in the form of DER encoded ASN.1 type MessageImprint defined in IETF RFC 3161 covering the electronic document 3.3 document signature identifier; DSId indirect identifier of signature of a document for machine processing in the form of DER encoded ASN.1 type MessageImprint defined in IETF RFC 3161 covering the DER encoded result of the asymmetric signature algorithm Example: ECDSA or RSA result included in the digital signature (3.1) of the signed electronic document. Note 1: DSId is mainly used for indirect machine processing identification of the electronic document which is electronically signed, e.g .DSId is used for PDF document identification if PDF file contains many versions of PDF document created by including incremental updates (see ISO 32000-2:2017, 7.5.6 for details) after more than one PDF document timestamps (see ISO 32000-2:2017, 12.8.5) or by including incremental updates after PDF signature or after PDF document timestamp. Note 2: Indirect identifier means a relatively unique changeable hash value changing according to the used hash algorithm. A hash collision is when two different input strings of a hash function produce the same hash result. 3.4 document type identifier; DTId sequence of the characters associated with the electronic document used for determining the format and interpretation of the electronic document Note 1: DTld is crucial for correct interpretation of the content of electronic document protected by digital signature (3.1). DTId is implemented as the file name extension or the value of the content type (see IETF RFC 2231 or IETF RFC 2045), whose value is included in the fields protected by the digital signature (see Annex F). 3.5 end-of-line marker; EOL marker sequence of one or two characters marking the end of a line, consisting of a CARRIAGE RETURN character (0Dh) or a LINE FEED character (0Ah) or a CARRIAGE RETURN followed immediately by a LINE FEED 3.6 evidence record; ER collection of evidence created for one or more given data objects over time, which can be used to prove the integrity and existence of a data object or a data object group at a certain time Note 1: See IETF RFC 4998, IETF RFC 6283 and ETSI SR 019510. 3.7 long term period of time long enough for there to be concern about the impacts of changing technologies, including support for new media and data formats, and of a changing user community, on the information being held in a repository, which may extend into the indefinite future Note 1: Cryptographic algorithms could become weak. 3.8 long-term integrity preservation long-term preservation; LTI extension of the validity status of a digital signature (3.1) overlong periods of time and/or of provision of proofs of existence of data over long periods of time, in spite of the obsolescence of cryptographic technology such as crypto algorithms, key sizes or hash functions, key compromises or of the loss of the ability to check the validity status of public key certificates 3.9 object identifier as a hash; ObjectId hash reference of the PoE object (3.12), PoE attribute (3.11) or data object, consisting of object identifier like Did (3.2) or DSId (3.3) 3.10 proof of existence; PoE evidence that proves that an object existed at a specific date/time Note: See ETSI SR 019510. 3.11 proof of existence attribute PoE attribute reference to the PoE object (3.12) containing also PoE object type, optional PoE object location, optional storage for the PoE object and optional data object references as additional clarification of data object(s), protected by PoE object, thus unambiguously specifying their semantics Note: PoE attribute can be a signed or unsigned object of the digital signature (3.1) or the file containing the Objectld (3.9), e.g. Did (3.2) or DSId (3.3), of PoE object. See 4.1 or Annex G, where the type of PoE object is the file name extension like, e.g."timestampedFile.EXTTST.DSId" containing PoE object. The file is stored in "timestampedFile.EXT". The timestamp is stored in timestamp file "timestampedFile.EXTTST" 3.12 proof of existence object PoE object property that represents information about a protected data object like type, status or integrity, a trustworthy information of date and time and a digital signature, possibly as part of a timestamp, which proves the integrity of the PoE object and optionally also the origin of the PoE object
Code of China
Standard
GB/T 38308-2019  Weather forecast verification—Typhoon forecast (English Version)
Standard No.GB/T 38308-2019
Statusvalid
LanguageEnglish
File FormatPDF
Word Count5500 words
Price(USD)160.0
Implemented on2020-7-1
Deliveryvia email in 1~3 business day
Detail of GB/T 38308-2019
Standard No.
GB/T 38308-2019
English Name
Weather forecast verification—Typhoon forecast
Chinese Name
天气预报检验 台风预报
Chinese Classification
A47
Professional Classification
GB
ICS Classification
Issued by
SAMR; SAC
Issued on
2019-12-10
Implemented on
2020-7-1
Status
valid
Superseded by
Superseded on
Abolished on
Superseding
Language
English
File Format
PDF
Word Count
5500 words
Price(USD)
160.0
Keywords
GB/T 38308-2019, GB 38308-2019, GBT 38308-2019, GB/T38308-2019, GB/T 38308, GB/T38308, GB38308-2019, GB 38308, GB38308, GBT38308-2019, GBT 38308, GBT38308
Introduction of GB/T 38308-2019
GB/T 38308-2019 Processes, data elements and documents in commerce, industry and administration - Long term signature - Part 4: Attributes pointing to proof of existence objects used in long term signature formats 1 Scope This document specifies the attributes and objects to proof of existence (PoE) used in long term signature formats, it describes the basic concept and attribute character of PoE, and provides the type, basic fields and associated examples of PoE objects. This document is applicable to (external) PoE used in long term signature formats, i.e. achieving long term signature validation through existing digital signatures and trusted time values. 2 Normative references The following referenced documents are indispensable for the application of this document. For dated references, only the edition cited applies. For undated references, the latest edition of the referenced document (including any amendments) applies. ISO 32000-2 Document management - Portable document format - Part 2: PDF 2.0 ISO/IEC8825-1 Information technology - ASN.1 encoding rules: Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER) Note: GB/T16263.1-2006 Information technology- ASN. 1 encoding rules- Part 1 :Specification Of Basic Encoding Rules(BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules(DER) (ISO/IEC 8825-1:2002, IDT) ISO/IEC 9594-8 Information technology - Open Systems Interconnection - The Directory - Part 8 : Public-key and attribute certificate frameworks Note: GB/T16264.8-2005 Information technology-Open systems Interconnection-The Directory-Part 8:Public-key and attribute certificate frameworks (ISO/IEC 9594-8:2001, IDT) ETSI EN 319122-1 V1.1.1: 2016 Electronic Signatures and Infrastructures(ESI); CAdES digital signatures; Part 1:Building blocks and CAdES baseline signatures IETF RFC 31611 Timestamp Protocol (TSP) IETF RFC 46482) The Basel6,Base32,and Base64 Data Encodings IETF RFC 49983) Evidence Record Syntax(ERS) IETF RFC 56524) Cryptographic Message Syntax (CMS) IETF RFC 62835) Extensible Markup Language Evidence Record Syntax (XMLERS) IETF RFC 6960 Online Certificate Status Protocol (OCSP) 3 Terms and definitions For the purposes of this document, the terms and definitions given in ISO/IEC 9594-8, ISO 32000-2, ISO/IEC 8825-1, IETF RFC 3161, IETF RFC 6960 and the following apply. ISO and IEC maintain terminological databases for use in standardization at the following addresses: - ISO Online browsing platform: available at https://www.iso.org/obp - IEC Electropedia :available athttp://www.electropedia.org/ 3.1 digital signature data appended to, or cryptographic transformation of, a data string that proves the origin and the integrity of the data string and protects against forgery, e.g.by the recipient of the data string Note: Digital signatures in the present document cover also electronic signatures, advanced electronic signatures, qualified electronic signatures, electronic seals, advanced electronic seals, qualified electronic seals, electronic time stamps and qualified electronic time stamps as per Regulation (EU) No 910/2014[6] and ISO/IEC 9594-8 certificate, CRL (see ISO/IEC 9594-8) or OCSP response and signatures defined in the configuration document. [Source: ISO/IEC 7816-4:2013, 3.21, modified] 3.2 document identifier; DId indirect identifier for machine processing in the form of DER encoded ASN.1 type MessageImprint defined in IETF RFC 3161 covering the electronic document 3.3 document signature identifier; DSId indirect identifier of signature of a document for machine processing in the form of DER encoded ASN.1 type MessageImprint defined in IETF RFC 3161 covering the DER encoded result of the asymmetric signature algorithm Example: ECDSA or RSA result included in the digital signature (3.1) of the signed electronic document. Note 1: DSId is mainly used for indirect machine processing identification of the electronic document which is electronically signed, e.g .DSId is used for PDF document identification if PDF file contains many versions of PDF document created by including incremental updates (see ISO 32000-2:2017, 7.5.6 for details) after more than one PDF document timestamps (see ISO 32000-2:2017, 12.8.5) or by including incremental updates after PDF signature or after PDF document timestamp. Note 2: Indirect identifier means a relatively unique changeable hash value changing according to the used hash algorithm. A hash collision is when two different input strings of a hash function produce the same hash result. 3.4 document type identifier; DTId sequence of the characters associated with the electronic document used for determining the format and interpretation of the electronic document Note 1: DTld is crucial for correct interpretation of the content of electronic document protected by digital signature (3.1). DTId is implemented as the file name extension or the value of the content type (see IETF RFC 2231 or IETF RFC 2045), whose value is included in the fields protected by the digital signature (see Annex F). 3.5 end-of-line marker; EOL marker sequence of one or two characters marking the end of a line, consisting of a CARRIAGE RETURN character (0Dh) or a LINE FEED character (0Ah) or a CARRIAGE RETURN followed immediately by a LINE FEED 3.6 evidence record; ER collection of evidence created for one or more given data objects over time, which can be used to prove the integrity and existence of a data object or a data object group at a certain time Note 1: See IETF RFC 4998, IETF RFC 6283 and ETSI SR 019510. 3.7 long term period of time long enough for there to be concern about the impacts of changing technologies, including support for new media and data formats, and of a changing user community, on the information being held in a repository, which may extend into the indefinite future Note 1: Cryptographic algorithms could become weak. 3.8 long-term integrity preservation long-term preservation; LTI extension of the validity status of a digital signature (3.1) overlong periods of time and/or of provision of proofs of existence of data over long periods of time, in spite of the obsolescence of cryptographic technology such as crypto algorithms, key sizes or hash functions, key compromises or of the loss of the ability to check the validity status of public key certificates 3.9 object identifier as a hash; ObjectId hash reference of the PoE object (3.12), PoE attribute (3.11) or data object, consisting of object identifier like Did (3.2) or DSId (3.3) 3.10 proof of existence; PoE evidence that proves that an object existed at a specific date/time Note: See ETSI SR 019510. 3.11 proof of existence attribute PoE attribute reference to the PoE object (3.12) containing also PoE object type, optional PoE object location, optional storage for the PoE object and optional data object references as additional clarification of data object(s), protected by PoE object, thus unambiguously specifying their semantics Note: PoE attribute can be a signed or unsigned object of the digital signature (3.1) or the file containing the Objectld (3.9), e.g. Did (3.2) or DSId (3.3), of PoE object. See 4.1 or Annex G, where the type of PoE object is the file name extension like, e.g."timestampedFile.EXTTST.DSId" containing PoE object. The file is stored in "timestampedFile.EXT". The timestamp is stored in timestamp file "timestampedFile.EXTTST" 3.12 proof of existence object PoE object property that represents information about a protected data object like type, status or integrity, a trustworthy information of date and time and a digital signature, possibly as part of a timestamp, which proves the integrity of the PoE object and optionally also the origin of the PoE object
Contents of GB/T 38308-2019
About Us   |    Contact Us   |    Terms of Service   |    Privacy   |    Cancellation & Refund Policy   |    Payment
Tel: +86-10-8572 5655 | Fax: +86-10-8581 9515 | Email: coc@codeofchina.com | QQ: 672269886
Copyright: Beijing COC Tech Co., Ltd. 2008-2040
 
 
Keywords:
GB/T 38308-2019, GB 38308-2019, GBT 38308-2019, GB/T38308-2019, GB/T 38308, GB/T38308, GB38308-2019, GB 38308, GB38308, GBT38308-2019, GBT 38308, GBT38308