{"id":4129,"date":"2011-08-16T03:41:00","date_gmt":"2011-08-16T01:41:00","guid":{"rendered":"http:\/\/10.0.1.197\/?p=4129"},"modified":"2024-08-13T03:49:43","modified_gmt":"2024-08-13T01:49:43","slug":"atsec-zte-cmvp","status":"publish","type":"post","link":"http:\/\/192.168.0.78\/atsec-zte-cmvp\/","title":{"rendered":"atsec\u4fe1\u606f\u5b89\u5168\u4e3a\u4e2d\u5174\u901a\u8baf\u4e24\u6b3e\u6a21\u5757\u5b8c\u6210CMVP\u6d4b\u8bd5"},"content":{"rendered":"\n
\u4e2d\u56fd\uff0c\u5317\u4eac <\/strong>– atsec\u4fe1\u606f\u5b89\u5168\u8363\u5e78\u5730\u5ba3\u5e03\u5b8c\u6210\u4e2d\u5174\u901a\u8baf\uff08\u4ee5\u4e0b\u7b80\u79f0\uff1a”ZTE”\uff09\u4e24\u6b3e\u5bc6\u7801\u6a21\u5757\uff0c\u5373UPCL\uff08Unified Platform Cryptographic Library\uff1a\u7edf\u4e00\u5e73\u53f0\u5bc6\u7801\u5e93\uff09\u548cUEPCM \uff08UEP Cryptographic Module\uff1a UEP\u5bc6\u7801\u6a21\u5757\uff09\u57fa\u4e8eFIPS 140-2\u6807\u51c6\u5bc6\u7801\u6a21\u5757\u9a8c\u8bc1\u4f53\u7cfb\uff08CMVP\uff1aCryptographic Module Validation Program\uff09\u4f53\u7cfb\u7684\u9a8c\u8bc1\uff0c\u8be5\u4f53\u7cfb\u7531\u7f8e\u56fdNIST\uff08National Institute for Standards and Technology\uff1a\u56fd\u5bb6\u6807\u51c6\u548c\u6280\u672f\u59d4\u5458\u4f1a\uff09\u548c\u52a0\u62ff\u5927CSEC\uff08Communication Security Establishment Canada\uff1a\u56fd\u5bb6\u901a\u4fe1\u5b89\u5168\u5c40\uff09\u7684\u5171\u540c\u7ef4\u62a4\u3002ZTE\u662f\u7b2c\u4e00\u4e2a\u6765\u81ea\u4e2d\u56fd\u7684\u5382\u5546\u6210\u529f\u5730\u5728CMVP\u4f53\u7cfb\u4e0b\u6839\u636eFIPS 140-2 \u6807\u51c6\u901a\u8fc7\u5176\u6a21\u5757\u7684\u9a8c\u8bc1\u3002<\/p>\n\n\n\n \u6210\u529f\u7684\u9a8c\u8bc1\u7ed3\u679c\u5728CMVP\u7684\u5b98\u65b9\u7f51\u7ad9\u4e0a\u516c\u5e03\uff1ahttp:\/\/csrc.nist.gov\/groups\/STM\/cmvp\/documents\/140-1\/1401val2011.htm<\/a>\uff0c\u8bc1\u4e66\u7f16\u53f7\u4e3a#1586\u548c#1589\u3002\u6bcf\u4e2a\u6a21\u5757\u7684\u8bc1\u4e66\u548c\u5b89\u5168\u7b56\u7565\uff0c\u4ee5\u53ca\u76f8\u5173\u5382\u5546\u4fe1\u606f\u4e5f\u53ef\u4ee5\u4ece\u6b64\u5904\u83b7\u5f97\u3002<\/p>\n\n\n\n atsec CST\u5b9e\u9a8c\u5ba4\u4e3b\u4efbApostol Vassilev\u8868\u793a\uff1a\u201c\u5728FIPS 140-2 \u6807\u51c6\u4e0b\u83b7\u5f97\u5bc6\u7801\u6a21\u5757\u7684\u9a8c\u8bc1\u5728\u8bb8\u591a\u884c\u4e1a\u548c\u653f\u5e9c\u90e8\u95e8\u4e2d\u8d8a\u6765\u8d8a\u91cd\u8981\uff0c\u4e0d\u4ec5\u4ec5\u662f\u7f8e\u56fd\u548c\u52a0\u62ff\u5927\uff0c\u8fd8\u5305\u62ec\u5168\u7403\u5f88\u591a\u56fd\u5bb6\u3002\u6211\u4eec\u8d5e\u8d4fZTE\u7684\u4ea7\u54c1\u5728\u5b89\u5168\u4fdd\u969c\u65b9\u9762\u6240\u505a\u51fa\u7684\u8d21\u732e\uff0c\u6839\u636e\u5f00\u653e\u548c\u4e25\u683c\u7684\u56fd\u9645\u6807\u51c6\uff08\u4f8b\u5982FIPS 140-2\uff09\u6267\u884c\u6d4b\u8bd5\u548c\u9a8c\u8bc1\u3002\u201d\uff08\u5176\u82f1\u6587\u539f\u6587\u5982\u4e0b\uff1a”The validation of cryptographic modules under the FIPS 140-2 standard is increasingly important in many industry and government sectors, not just in the United States and Canada, but in many countries around the world. We applaud ZTE\u2019s commitment to providing security assurance for their products through testing and validation under open and rigorous international standards such as FIPS 140-2.”\uff09<\/p>\n\n\n\n \u201cZTE\u76f8\u4fe1\u6ee1\u8db3\u56fd\u9645\u6807\u51c6\u7684\u8981\u6c42\u662f\u4ea4\u4ed8\u7ed9\u6765\u81ea\u5ba2\u6237\u8981\u6c42\u7684\u6700\u4e3a\u5b89\u5168\u548c\u53ef\u9760\u7684\u89e3\u51b3\u65b9\u6848\u7684\u5173\u952e\u201d\uff0cZTE\u7f8e\u56fd\u9996\u5e2d\u6267\u884c\u5b98CEO Lixin Cheng\u8bf4\u9053\uff1a\u201c\u83b7\u5f97FIPS 140-2\u6807\u51c6\u7684\u8ba4\u8bc1\u8fdb\u4e00\u6b65\u5c55\u793a\u4e86\u6211\u4eec\u7684\u5de5\u4f5c\uff0c\u786e\u4fdd\u6211\u4eec\u7684\u7814\u7a76\u548c\u7814\u53d1\uff08R&D\uff09\u6218\u7565\u6620\u5c04\u4e86\u8fd9\u4e9b\u6807\u51c6\u7684\u91cd\u8981\u6027\uff0c\u4f7f\u6211\u4eec\u4ea7\u54c1\u7684\u8d28\u91cf\u548c\u53ef\u9760\u6027\u9010\u6b65\u8d62\u5f97\u5ba2\u6237\u7684\u4fe1\u5fc3\u3002\u201d\uff08\u5176\u82f1\u6587\u539f\u6587\u5982\u4e0b\uff1a”ZTE believes that meeting international standards is key to delivering the most secure and reliable solutions demanded by customers. Earning the FIPS 140-2 standard certification further demonstrates the work we are doing to ensure that our R&D strategy reflects the importance of these standards to instilling customer confidence in our products\u2019 quality and reliability.”\uff09<\/p>\n\n\n\n \u8054\u90a6\u4fe1\u606f\u5904\u7406\u6807\u51c6\uff08FIPS 140-2\uff1a Federal Information Processing Standard 140-2\uff09\u63cf\u8ff0\u4e86\u7f8e\u56fd\u548c\u52a0\u62ff\u5927\u7684\u8054\u90a6\u653f\u5e9c\u7684\u8981\u6c42\uff0c\u9488\u5bf9IT\u4ea7\u54c1\u4e2d\u673a\u5bc6\u7684\u4f46\u672a\u7ecf\u5206\u7c7b\u7684\u4f7f\u7528\u3002 FIPS 140-2\u7531NIST\u548cCSEC\u5171\u540c\u7ef4\u62a4\u7684CMVP\u4f53\u7cfb\u53d1\u5e03\u3002\u7b26\u5408\u6807\u51c6\u7684\u8981\u6c42\u5bf9\u4e8e\u7528\u4e8e\u7f8e\u56fd\u548c\u52a0\u62ff\u5927\u8054\u90a6\u673a\u6784\u7684\u5bc6\u7801\u4ea7\u54c1\u7684\u4f7f\u7528\u6765\u8bf4\u662f\u5f3a\u5236\u7684\u3002 \u5173\u4e8eatsec\u4fe1\u606f\u5b89\u5168<\/strong> atsec\u63d0\u4f9b\u7f8e\u56fd\u56fd\u5bb6\u6807\u51c6\u4e0e\u6280\u672f\u7814\u7a76\u59d4\u5458\u4f1a\uff08NIST\uff1aNational Institute of Standards and Technology\uff09\u548c\u52a0\u62ff\u5927\u901a\u8baf\u5b89\u5168\u534f\u4f1a\uff08CSEC\uff1aCommunications Security Establishment Canada\uff09\u5236\u5b9a\u7684\u5bc6\u7801\u6a21\u5757\u9a8c\u8bc1\u4f53\u7cfb\u4e0b\u7684\u5bc6\u7801\u6a21\u5757\u548c\u7b97\u6cd5\u6d4b\u8bd5\u670d\u52a1\u3002atsec\u540c\u65f6\u63d0\u4f9bNIST\u4e2a\u4eba\u8eab\u4efd\u9a8c\u8bc1\u4f53\u7cfb\uff08NPIVP\uff09\u3001\u5bc6\u7801\u7b97\u6cd5\u6d4b\u8bd5\uff08CAVP\uff1aCryptographic Algorithm Validation Program\uff09\u548c\u5b89\u5168\u5185\u5bb9\u81ea\u52a8\u5316\u534f\u8bae\uff08SCAP\uff1aSecurity Content Automation Protocol Program\uff09\u4e0b\u7684\u6b63\u5f0f\u7684\u6d4b\u8bd5\uff0c\u4ee5\u53caGSA FIPS 201 EP\u4e0b\u7684\u4ea7\u54c1\u8ba4\u53ef\u6d4b\u8bd5\u3002 \u5173\u4e8e\u4e2d\u5174\u901a\u8baf<\/strong><\/strong> \u4e2d\u56fd\uff0c\u5317\u4eac – atsec\u4fe1\u606f\u5b89\u5168\u8363\u5e78\u5730\u5ba3\u5e03\u5b8c\u6210\u4e2d\u5174\u901a\u8baf\uff08\u4ee5\u4e0b\u7b80\u79f0\uff1a”ZTE […]<\/p>\n","protected":false},"author":6,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[11],"tags":[],"_links":{"self":[{"href":"http:\/\/192.168.0.78\/wp-json\/wp\/v2\/posts\/4129"}],"collection":[{"href":"http:\/\/192.168.0.78\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/192.168.0.78\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/192.168.0.78\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"http:\/\/192.168.0.78\/wp-json\/wp\/v2\/comments?post=4129"}],"version-history":[{"count":1,"href":"http:\/\/192.168.0.78\/wp-json\/wp\/v2\/posts\/4129\/revisions"}],"predecessor-version":[{"id":4132,"href":"http:\/\/192.168.0.78\/wp-json\/wp\/v2\/posts\/4129\/revisions\/4132"}],"wp:attachment":[{"href":"http:\/\/192.168.0.78\/wp-json\/wp\/v2\/media?parent=4129"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/192.168.0.78\/wp-json\/wp\/v2\/categories?post=4129"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/192.168.0.78\/wp-json\/wp\/v2\/tags?post=4129"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}
\u66f4\u591a\u5173\u4e8eFIPS 140-2\u6807\u51c6\u7684\u4fe1\u606f\uff0c\u8bf7\u8bbf\u95ee\u6211\u4eec\u7684\u7f51\u7ad9www.atsec.com<\/a>\u4ee5\u53caNIST\u7684\u7f51\u7ad9www.nist.gov<\/a>\u3002<\/p>\n\n\n\n
\u827e\u7279\u8d5b\u514b\u4fe1\u606f\u5b89\u5168\uff08atsec information security\uff09\u662f\u4e00\u5bb6\u72ec\u7acb\u4e14\u57fa\u4e8e\u6807\u51c6\u7684\u4fe1\u606f\u6280\u672f\uff08IT\uff1aInformation Technology\uff09\u5b89\u5168\u670d\u52a1\u516c\u53f8(www.atsec.com)\uff0c\u5b83\u5f88\u597d\u5730\u5c06\u5546\u4e1a\u5bfc\u5411\u7684\u4fe1\u606f\u5b89\u5168\u65b9\u6cd5\u548c\u6df1\u5165\u7684\u6280\u672f\u77e5\u8bc6\u4ee5\u53ca\u5168\u7403\u7684\u7ecf\u9a8c\u76f8\u7ed3\u5408\u3002atsec\u5728\u5fb7\u56fd\u6155\u5c3c\u9ed1\u6210\u7acb\u4e8e2000\u5e74\uff0c\u5e76\u4e14\u901a\u8fc7\u7f8e\u56fd\u3001\u5fb7\u56fd\u3001\u745e\u5178\u548c\u4e2d\u56fd\u7684\u529e\u516c\u5ba4\u5f00\u5c55\u4e86\u5e7f\u6cdb\u7684\u56fd\u9645\u4e1a\u52a1\u3002atsec\u63d0\u4f9b\u7684\u670d\u52a1\u5305\u62ec\u6b63\u5f0f\u7684\u5b9e\u9a8c\u5ba4\u6d4b\u8bd5\u548c\u8bc4\u4f30\u3001\u72ec\u7acb\u7684\u6d4b\u8bd5\u548c\u8bc4\u4f30\u4ee5\u53ca\u4fe1\u606f\u5b89\u5168\u54a8\u8be2\u3002<\/p>\n\n\n\n
atsec\u7684\u5ba2\u6237\u5305\u62ec\u5168\u7403\u9996\u5c48\u4e00\u6307\u7684\u516c\u53f8\u5982\u82f9\u679c\u3001IBM\u3001Hewlett-Packard\u3001 Red Hat\u3001Wind River\u3001SUSE \u548cZTE Corporation\uff0c\u5e76\u4e00\u76f4\u7ef4\u6301\u5bc6\u5207\u5408\u4f5c\u5173\u7cfb\u3002<\/p>\n\n\n\n
\u4e2d\u5174\u901a\u8baf\u662f\u5168\u7403\u9886\u5148\u7684\u7efc\u5408\u901a\u4fe1\u89e3\u51b3\u65b9\u6848\u63d0\u4f9b\u5546\u3002\u516c\u53f8\u6210\u7acb\u4e8e1985\u5e74\uff0c\u5728\u9999\u6e2f\u548c\u6df1\u5733\u4e24\u5730\u4e0a\u5e02\uff0c\u662f\u4e2d\u56fd\u6700\u5927\u7684\u901a\u4fe1\u8bbe\u5907\u4e0a\u5e02\u516c\u53f8\u3002
\u516c\u53f8\u901a\u8fc7\u4e3a\u5168\u7403140\u591a\u4e2a\u56fd\u5bb6\u548c\u5730\u533a\u7684\u7535\u4fe1\u8fd0\u8425\u5546\u63d0\u4f9b\u521b\u65b0\u6280\u672f\u4e0e\u4ea7\u54c1\u89e3\u51b3\u65b9\u6848\uff0c\u8ba9\u5168\u4e16\u754c\u7528\u6237\u4eab\u6709\u8bed\u97f3\u3001\u6570\u636e\u3001\u591a\u5a92\u4f53\u3001\u65e0\u7ebf\u5bbd\u5e26\u7b49\u5168\u65b9\u4f4d\u6c9f\u901a\u3002<\/strong>\u66f4\u591a\u4fe1\u606f\u8bf7\u767b\u9646\uff1awww.zte.com.cn<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"