Skip to product information
1 of 12

www.ChineseStandard.us -- Field Test Asia Pte. Ltd.

YD/T 2408-2013 English PDF (YD/T2408-2013)

YD/T 2408-2013 English PDF (YD/T2408-2013)

Regular price $480.00
Regular price Sale price $480.00
Sale Sold out
Shipping calculated at checkout.

YD/T 2408-2013: Test methods for security capability of smart mobile terminal

Delivery: 9 seconds. Download (and Email) true-PDF + Invoice.
Get Quotation: Click YD/T 2408-2013 (Self-service in 1-minute)
Newer / historical versions: YD/T 2408-2013

Preview True-PDF


Scope

This Standard specifies the test methods for security capability of smart mobile
terminal, including the test methods for security capability of smart mobile
terminal’s hardware, the test methods for security capability of smart mobile
terminal’s operator system, the test methods for security capability of smart
mobile terminal’s peripheral interface, the test methods for security capability of
smart mobile terminal’s application layer, the test methods for security capability
of smart mobile terminal’s user data protection, etc.
This Standard is applicable to various types of smart mobile terminal.
Individual terms do not apply to special industries and professional applications.
Other terminals shall use this Standard for reference only.

Basic Data

Standard ID YD/T 2408-2013 (YD/T2408-2013)
Description (Translated English) Test methods for security capability of smart mobile terminal
Sector / Industry Telecommunication Industry Standard (Recommended)
Classification of Chinese Standard M36
Classification of International Standard 33.060
Word Count Estimation 41,447
Quoted Standard YD/T 1886; YD/T 2407-2013
Regulation (derived from) Ministry of Industry and Information Technology Bulletin No. 23 of 2013
Issuing agency(ies) Ministry of Industry and Information Technology
Summary This standard specifies test methods mobile intelligent terminal security capabilities, including mobile terminal hardware security capabilities Chi Bear test methods, mobile intelligent terminal operating system security capabilities of testing methods,


View full details