Standard No. |
Title |
Price(USD) |
Delivery |
Status |
Add To Cart |
GB/T 38542-2020 |
Information security technology—Technical framework for authentication of mobile smart terminals based on biometric |
300 (USD) |
via email in
1-3 business day
|
TO BE VALID
|
|
YY/T 1630-2018 |
Fundamental requirements for unique device identifier |
180 (USD) |
via email in
1-3 business day
|
VALID
|
|
GB/T 29261.4-2012 |
Information technology—Automatic identification and data capture(AIDC) techniques—Vocabulary—Part 4:Radio communications |
480 (USD) |
via email in
1-5 business day
|
VALID
|
|
GB/T 18139.1-2000 |
Information technology--General structure for the interchange of code values--Part 1:Identification of coding schemes |
180 (USD) |
via email in
1-3 business day
|
VALID
|
|
GB/T 18238.1-2000 |
Information technology-Security techniques-Hash-function-Part 1:General |
105 (USD) |
via email in
1-3 business day
|
VALID
|
|
GB/T 38638-2020 |
Information security technology—Trusted computing—Architecture of trusted computing |
180 (USD) |
via email in
1-3 business day
|
TO BE VALID
|
|
GB 29274-2012 |
Information technology—Tibetan ideogram coded character set (basic set & extension set A)—16×32 dot matrix font—Bkav bstan bold |
300 (USD) |
via email in
1-3 business day
|
VALID
|
|
GA/T 2000.106-2015 |
Information codes for public security industry—Part 106:Codes for categories of commiting crime opportunities |
120 (USD) |
via email in
1-3 business day
|
VALID
|
|
GB/T 33475.1-2019 |
Information technology—High efficiency media coding—Part 1:System |
1020 (USD) |
via email in
1-8 business day
|
VALID
|
|
GA/T 704.2-2007 |
Management information standards for exit/entry administration-Part 2:Codes for names and type of entry and exit ports |
|
via email in
|
VALID
|
please email coc@codeofchina.com for quotation
|
GB/T 15852.1-2008 |
Information technology - Security techniques - Message Authentication Codes(MACs) - Part 1: Mechanisms using a block cipher |
420 (USD) |
via email in
1-3 business day
|
VALID
|
|
GB/Z 36442.1-2018 |
Information technology—Radio frequency identification for item management—Implementation guidelines—Part 1:Passive UHF RFID labels |
540 (USD) |
via email in
1-5 business day
|
VALID
|
|
GA/T 556.7-2007 |
The codes for finance security manage information-Part 7:The codes for Automatic Teller Machine |
|
via email in
|
VALID
|
please email coc@codeofchina.com for quotation
|
GB/T 17172-1997 |
417 Bar code |
|
via email in
1-3 business day
|
VALID
|
please email coc@codeofchina.com for quotation
|
GB/T 20945-2007 |
Information security technology—Technical requirements testing and evaluation approaches for information system security audit products |
465 (USD) |
via email in
1-5 business day
|
ABOLISHED
|
|
GB/T 15843.2-2008 |
Information technology - Security techniques - Entity authentication - Part 2:Mechanisms using symmetric encipherment algorithm |
195 (USD) |
via email in
1-3 business day
|
ABOLISHED
|
|
GB/T 12053-1989 |
Alphanumeric character sets for optical recognition -Part 1: Character set OCR-A-Shapes and dimensions of the printed image |
|
via email in
1-3 business day
|
VALID
|
please email coc@codeofchina.com for quotation
|
GB/T 13443-1992 |
128×128 Dot matrix kaiti font set and data set of Chinese ideograms for information interchange |
|
via email in
1-3 business day
|
ABOLISHED
|
please email coc@codeofchina.com for quotation
|
GA 519.5-2004 |
The management information code of public security accouterments -- Part 5: Code of classification of clothing |
60 (USD) |
via email in
1-3 business day
|
VALID
|
|
GA/T 1253-2015 |
Codes for information security event levels of police information network |
120 (USD) |
via email in
1-3 business day
|
VALID
|
|
|