付费计量系统通用功能(13)

11.17 Class 17: Security function

Capability of maintaining the integrity of data elements, functions and processes.

数据单元、功能和过程的可靠性

Maintains the integrity of the system.系统的可靠

Some examples of security function attributes are given in Table 7 below.

Table 7 -- Examples of security function attributes 安全功能属性举例

Identification识别

Method of uniquely identifying an entity within the system (log-on name, account number, meter number, card number, record identifier, batch number, receipt number, personal ID number, street name and number, bank name and branch code, token identifier, etc.)

在系统中唯一识别实体的方法(登陆名、帐号、表号、卡号、记录标识符、BATCH号、收据号、个人身份证号、街道名称门牌号、银行号和支行代码、TOKEN标识符)。

Authentication鉴定

Method of determining that the sender of a given piece of information is who it claims to be or represent (password, message authentication code, signature, biometric, private and public cryptographic keys)

决定由谁给出信息的方法(密码、信息权限代码、信号、个人和公共秘钥)

Integrity可靠性

Method of determining that a given piece of information is true to the original (Cyclic_Redundancy_Code, parity check, etc.) Non-repudiation Method of ensuring that the sender of a given piece of information cannot deny having sent it (RSA signature, message sequencing)

决定发出的信息可靠的方法(循环冗余编码、奇偶校验等)。信息的发送者不能否认有信息送

出(RSA签字)

Confidentiality机密

Rendering a private message unintelligible to an unauthorized reader (using encryption like DES, AES, RSA, proprietary algorithms, etc.)

使非权限的读者不能理解相关的秘密信息(使用加密技术如DES、AES、RSA、四则运算)

Authorization权限

Giving approval to perform defined actions within the system (user registration, access rights assignment, free token issues, transaction reversals, access rights to records (read, write, modify), etc.)

批准在系统中执行规定的动作使用者注册、处理权限分配、发行TOKEN、交易撤消、记录的处理权读、写、更改等。

Verification检查

Checking that a claimed activity had taken place or that a reported status is true (calibration accuracy, meter audit, cash register reconciliation, bank statement reconciliation, etc.)

检查某一动作发生或报告状态是正确的校准精度、表计检查、收银机、银行结算等。

Certification证明

Giving legal and traceable standing to the results of a verification process (metrology type certification, safety, code of practice, etc.)

对检查的过程的结果给出合法的可追溯的证明(校准证明、安全、操作码等)

Validation确认

Making new information valid (token generation, etc.)

使新的信息有效化(生成TOKEN等)

Cancellation取消

Making currently valid information permanently invalid (token acceptance in meter, returned

tokens, etc.)

使现在有效的信息形成永久的无效的(表计接收TOKEN,返回TOKEN等)

Expiration期满

Making information valid for a given period of time only (cryptographic key expiry, tariff expiry, password expiry, vendor credit expiry, etc.)

给有效的信息一个时间期限(密钥到期、费率到期、密码到期、买方CREDIT到期等)

Registration注册

Keeping a register of assigned security attributes of entities within the system (public cryptographic key registry, user registration)

系统中对实体安全属性的注册(公共密钥注册、用户注册)

Rights-assignment权限分配

Trusted responsibility for administering the assignment of security rights to other entities within the system (usually performed by the highest trusted officer in the user hierarchy)

对系统中其他实体的安全权利的分配(通常是用户层次中最高层管理者执行)

Supervision管理

A level of trust and authorized security rights to monitor and control activities of other entities within the system (for example: the person in charge of one or more cashiers and who might also do the banking)

授权对系统中其他实体的监视和控制(例如管理一个或多个出纳的人也可以做BANKING)

Sealing铅封

Limiting physical access to sensitive parts within the system in such a way that renders such intrusion obvious and detectable (meter terminal seals, physical protection of secure module for storage of crypto keys, a marked seal may also be the indicator of a certification)

从物理角度限制触及系统中敏感器件,如果发生,就可以察觉和检测出来(表计端子铅封,用于储存密钥的物理保护安全模块、可以指示的被标志了的铅封)

Detection探测

Reporting of the fact when a security attribute of the system has been breached

(broken meter seals, deviations in purchase pattern analysis, energy balancing)

当系统的安全属性被破坏时破坏表计铅封、破坏购买流程、或电量平衡),要输出报告

Prosecution检举

Law enforcement processes applied to a perpetrator as a consequence of committing

fraud or breaching unauthorized security attributes of the system

因为欺骗或破坏系统的安全属性使用法律惩罚犯罪者

相关推荐
刘一说2 小时前
Java 中实现多租户架构:数据隔离策略与实践指南
java·oracle·架构
国科安芯2 小时前
火箭传感器控制单元的抗辐照MCU选型与环境适应性验证
单片机·嵌入式硬件·架构·risc-v·安全性测试
晚霞的不甘2 小时前
Flutter for OpenHarmony 打造沉浸式呼吸引导应用:用动画疗愈身心
服务器·网络·flutter·架构·区块链
喵叔哟2 小时前
67.【.NET8 实战--孢子记账--从单体到微服务--转向微服务】--新增功能--分摊功能总体设计与业务流程
数据库·微服务·架构
CHENKONG_CK2 小时前
化工危化品桶装追溯:RFID 全流程可视化解决方案
网络
roman_日积跬步-终至千里2 小时前
【MLOps(1)】MLOps 架构总览与全方位基础:从实验室到生产环境的实战指南
架构
龙山云仓2 小时前
MES系统超融合架构
大数据·数据库·人工智能·sql·机器学习·架构·全文检索
临水逸2 小时前
一次路径穿越漏洞引发的NAS安全危机:飞牛fnOS漏洞深度剖析与用户自救指南
网络·安全·web安全
未来龙皇小蓝2 小时前
RBAC前端架构-02:集成Vue Router、Vuex和Axios实现基本认证实现
前端·vue.js·架构
Tadas-Gao3 小时前
深度学习与机器学习的知识路径:从必要基石到独立范式
人工智能·深度学习·机器学习·架构·大模型·llm