PayPal, credit cards. Download editable-PDF & invoice in 1 second!
GM/T 0095-2020 English PDF (GMT0095-2020)
GM/T 0095-2020 English PDF (GMT0095-2020)
Precio habitual
$255.00 USD
Precio habitual
Precio de oferta
$255.00 USD
Precio unitario
/
por
Los gastos de envío se calculan en la pantalla de pago.
No se pudo cargar la disponibilidad de retiro
Delivery: 3 seconds. Download true-PDF + Invoice.
Get QUOTATION in 1-minute: Click GM/T 0095-2020
Historical versions: GM/T 0095-2020
Preview True-PDF (Reload/Scroll if blank)
GM/T 0095-2020: Technical requirements for applications of cryptography in electronic bidding
GM/T 0095-2020
GM
CRYPTOGRAPHIC INDUSTRY STANDARD
OF THE PEOPLE’S REPUBLIC OF CHINA
ICS 35.040
CCS L 80
Technical requirements for applications of
cryptography in electronic bidding
ISSUED ON: DECEMBER 28, 2020
IMPLEMENTED ON: JULY 01, 2021
Issued by: National Cryptography Administration
Table of Contents
Foreword ... 4
1 Scope ... 5
2 Normative references ... 5
3 Terms and definitions ... 6
4 Abbreviations ... 8
5 Reference model ... 8
6 Cryptographic application requirements for electronic bidding business
process ... 10
6.1 User registration ... 10
6.2 Bidding plan ... 10
6.3 Tender invitation ... 10
6.4 Bid issuing ... 11
6.5 Tendering ... 11
6.6 Bid opening ... 12
6.8 Bid awarding ... 13
6.9 Objection ... 13
6.10 Supervision ... 13
6.11 Bidding exception ... 14
6.12 Filing ... 14
7 Technical requirements for applications of cryptography in electronic bidding
... 14
7.1 Algorithm requirements ... 14
7.2 Cryptographic device requirements ... 14
7.3 Identity authentication technical requirements ... 15
7.4 Data encryption technology requirements ... 16
7.5 Technical requirements for electronic signature ... 16
7.6 Electronic seal ... 17
7.7 Key management requirements ... 17
7.8 Certificate management requirements ... 18
7.9 Emergency remediation requirements ... 20
Annex A (informative) Examples of typical electronic bidding business process
... 21
Annex B (informative) Examples of emergency remedies ... 23
Bibliography ... 25
Technical requirements for applications of
cryptography in electronic bidding
1 Scope
This document specifies the technical requirements for the application of
cryptographic technology in electronic bidding, including in the electronic
bidding process, the technical requirements for the use of cryptographic
algorithms and cryptographic products.
This document is applicable to guiding the design, implementation and use of
the cryptographic subsystem in the electronic bidding system. The test and
management of the cryptographic subsystem in the electronic bidding system
can use it as reference.
2 Normative references
The following referenced documents are indispensable for the application of
this document. For dated references, only the edition cited applies. For undated
references, the latest edition of the referenced document (including any
amendments) applies.
GB/T 20518, Information security technology - Public key infrastructure -
Digital certificate format
GB/T 32905, Information security technology SM3 cryptographic hash
algorithm
GB/T 32907, Information security techno1ogy - SM4 block cipher algorithm
GB/T 32918 (all parts), Information security technology - Public key
cryptographic algorithm SM2 based on elliptic curves
GB/T 35275, Information security technology - SM2 cryptographic algorithm
encrypted signature message syntax specification
GB/T 35276, Information security technology - SM2 cryptography algorithm
usage specification
GM/T 0031, Secure electronic seal cryptography technical specification
GM/T 0054, General requirements for information system cryptography
A: User registration B: Bidding plan C: Tender invitation D: Bid Issuing E: Tendering F: Bid
opening G: Bid evaluation H: Bid awarding I: Objection J: Supervision K: Bidding exception
L: Filing
1: Business participant identity authentication service
2: Electronic signature and verification service of bidding document
3: Encryption and decryption service of bidding document
4: Electronic seal and verification service of bidding document
5: Digital certificate service of electronic bidding system
6: Key management service of electronic bidding system
a: Digital signature system
b: Electronic seal system
c: Time stamp system
d: Encryption and decryption system
Figure 1 -- Reference model of cryptographic application of electronic
bidding system
The reference model of the cryptographic application of the electronic bidding
system is a security service system based on cryptographic technology. It
provides cryptographic services such as authenticity, confidentiality, integrity
and non-repudiation, to form a complete security support system, so as to
protect the security of electronic bidding business.
The reference model of the cryptographic application of the electronic bidding
system is guided by laws, regulations and standards. It is divided into electronic
bidding business layer, cryptographic service layer, cryptographic support layer,
and infrastructure layer. Its functions are divided as follows:
a) Business layer
The business layer refers that the electronic bidding business system, in
all processes of its bidding business, uses the services provided by the
business support layer to complete the business of electronic bidding.
b) Cryptographic service layer
The cryptographic service layer comprehensively uses the cryptographic
functions provided by the cryptographic infrastructure to provide a series
of comprehensive cryptographic services for the business layer, including
identity authentication service for business participants, electronic
signature and verification services for bidding documents, encryption and
decryption services for bidding documents, electronic signature and
verification services for bidding documents, electronic bidding system
digital certificate service, key management service of electronic bidding
system.
c) Cryptographic support layer
certificate of the tenderee or agency to conduct electronic signature to
documents such as procurement bidding announcements, prequalification
announcements and tender invitations. It shall be time stamped at the same
time. It is advisable to use electronic signature at the same time. When the
relevant parties receive the documents, they shall check the validity of
electronic signature, electronic signature and time stamp.
If the bidder is required to issue a receipt, the bidder shall, according to the
business process requirements, provide the requested receipt to the tenderee.
It shall be electronically signed before submitting the receipt.
After the tenderee receives the receipt submitted by the bidder, it shall verify its
electronic signature. Confirm that the bidder has received the sent documents
or responded as required.
Electronic signature and verification shall follow the requirements of 7.5.
Electronic sesal and verification shall follow the requirements of 7.6.
6.4 Bid issuing
During the bid issuing, the tenderee shall conduct electronic signature and time
stamp to the published documents. It is advisable to use electronic seal at the
same time. The bidding documents can include bidding announcements,
bidding change announcements, bidding documents, bidding
changes/supplementary documents, prequalification changes/supplementary
announcements, site survey notices, document clarification and Q and A,
document clarification instructions, and download receipts.
After the bidder receives the corresponding documents, it shall verify the
electronic signature and time stamp of the documents. According to business
process requirements, provide the required documents to the tenderee,
including announcement of document receipt and document clarification. The
documents shall be electronically signed before submission.
After the tenderer receives the receipt and documents subm...
Get QUOTATION in 1-minute: Click GM/T 0095-2020
Historical versions: GM/T 0095-2020
Preview True-PDF (Reload/Scroll if blank)
GM/T 0095-2020: Technical requirements for applications of cryptography in electronic bidding
GM/T 0095-2020
GM
CRYPTOGRAPHIC INDUSTRY STANDARD
OF THE PEOPLE’S REPUBLIC OF CHINA
ICS 35.040
CCS L 80
Technical requirements for applications of
cryptography in electronic bidding
ISSUED ON: DECEMBER 28, 2020
IMPLEMENTED ON: JULY 01, 2021
Issued by: National Cryptography Administration
Table of Contents
Foreword ... 4
1 Scope ... 5
2 Normative references ... 5
3 Terms and definitions ... 6
4 Abbreviations ... 8
5 Reference model ... 8
6 Cryptographic application requirements for electronic bidding business
process ... 10
6.1 User registration ... 10
6.2 Bidding plan ... 10
6.3 Tender invitation ... 10
6.4 Bid issuing ... 11
6.5 Tendering ... 11
6.6 Bid opening ... 12
6.8 Bid awarding ... 13
6.9 Objection ... 13
6.10 Supervision ... 13
6.11 Bidding exception ... 14
6.12 Filing ... 14
7 Technical requirements for applications of cryptography in electronic bidding
... 14
7.1 Algorithm requirements ... 14
7.2 Cryptographic device requirements ... 14
7.3 Identity authentication technical requirements ... 15
7.4 Data encryption technology requirements ... 16
7.5 Technical requirements for electronic signature ... 16
7.6 Electronic seal ... 17
7.7 Key management requirements ... 17
7.8 Certificate management requirements ... 18
7.9 Emergency remediation requirements ... 20
Annex A (informative) Examples of typical electronic bidding business process
... 21
Annex B (informative) Examples of emergency remedies ... 23
Bibliography ... 25
Technical requirements for applications of
cryptography in electronic bidding
1 Scope
This document specifies the technical requirements for the application of
cryptographic technology in electronic bidding, including in the electronic
bidding process, the technical requirements for the use of cryptographic
algorithms and cryptographic products.
This document is applicable to guiding the design, implementation and use of
the cryptographic subsystem in the electronic bidding system. The test and
management of the cryptographic subsystem in the electronic bidding system
can use it as reference.
2 Normative references
The following referenced documents are indispensable for the application of
this document. For dated references, only the edition cited applies. For undated
references, the latest edition of the referenced document (including any
amendments) applies.
GB/T 20518, Information security technology - Public key infrastructure -
Digital certificate format
GB/T 32905, Information security technology SM3 cryptographic hash
algorithm
GB/T 32907, Information security techno1ogy - SM4 block cipher algorithm
GB/T 32918 (all parts), Information security technology - Public key
cryptographic algorithm SM2 based on elliptic curves
GB/T 35275, Information security technology - SM2 cryptographic algorithm
encrypted signature message syntax specification
GB/T 35276, Information security technology - SM2 cryptography algorithm
usage specification
GM/T 0031, Secure electronic seal cryptography technical specification
GM/T 0054, General requirements for information system cryptography
A: User registration B: Bidding plan C: Tender invitation D: Bid Issuing E: Tendering F: Bid
opening G: Bid evaluation H: Bid awarding I: Objection J: Supervision K: Bidding exception
L: Filing
1: Business participant identity authentication service
2: Electronic signature and verification service of bidding document
3: Encryption and decryption service of bidding document
4: Electronic seal and verification service of bidding document
5: Digital certificate service of electronic bidding system
6: Key management service of electronic bidding system
a: Digital signature system
b: Electronic seal system
c: Time stamp system
d: Encryption and decryption system
Figure 1 -- Reference model of cryptographic application of electronic
bidding system
The reference model of the cryptographic application of the electronic bidding
system is a security service system based on cryptographic technology. It
provides cryptographic services such as authenticity, confidentiality, integrity
and non-repudiation, to form a complete security support system, so as to
protect the security of electronic bidding business.
The reference model of the cryptographic application of the electronic bidding
system is guided by laws, regulations and standards. It is divided into electronic
bidding business layer, cryptographic service layer, cryptographic support layer,
and infrastructure layer. Its functions are divided as follows:
a) Business layer
The business layer refers that the electronic bidding business system, in
all processes of its bidding business, uses the services provided by the
business support layer to complete the business of electronic bidding.
b) Cryptographic service layer
The cryptographic service layer comprehensively uses the cryptographic
functions provided by the cryptographic infrastructure to provide a series
of comprehensive cryptographic services for the business layer, including
identity authentication service for business participants, electronic
signature and verification services for bidding documents, encryption and
decryption services for bidding documents, electronic signature and
verification services for bidding documents, electronic bidding system
digital certificate service, key management service of electronic bidding
system.
c) Cryptographic support layer
certificate of the tenderee or agency to conduct electronic signature to
documents such as procurement bidding announcements, prequalification
announcements and tender invitations. It shall be time stamped at the same
time. It is advisable to use electronic signature at the same time. When the
relevant parties receive the documents, they shall check the validity of
electronic signature, electronic signature and time stamp.
If the bidder is required to issue a receipt, the bidder shall, according to the
business process requirements, provide the requested receipt to the tenderee.
It shall be electronically signed before submitting the receipt.
After the tenderee receives the receipt submitted by the bidder, it shall verify its
electronic signature. Confirm that the bidder has received the sent documents
or responded as required.
Electronic signature and verification shall follow the requirements of 7.5.
Electronic sesal and verification shall follow the requirements of 7.6.
6.4 Bid issuing
During the bid issuing, the tenderee shall conduct electronic signature and time
stamp to the published documents. It is advisable to use electronic seal at the
same time. The bidding documents can include bidding announcements,
bidding change announcements, bidding documents, bidding
changes/supplementary documents, prequalification changes/supplementary
announcements, site survey notices, document clarification and Q and A,
document clarification instructions, and download receipts.
After the bidder receives the corresponding documents, it shall verify the
electronic signature and time stamp of the documents. According to business
process requirements, provide the required documents to the tenderee,
including announcement of document receipt and document clarification. The
documents shall be electronically signed before submission.
After the tenderer receives the receipt and documents subm...
Share










