Announcement regarding the addition of 7 units as technical support units for the Ministry of Industry and Information Technology's mobile Internet APP product security vulnerability database

0 29
The China Software Evaluation Center (China Software and Integrated Circuit Prom...

The China Software Evaluation Center (China Software and Integrated Circuit Promotion Center of the Ministry of Industry and Information Technology) issued an announcement on October 20, 2021, planning to select a batch of excellent technical support units with high technical level and strong sense of social responsibility in the fields of APP products, mobile Internet security, and other enterprises and institutions. As of November 8, more than 40 units have applied for the second batch of technical support units for the MIIT Mobile Internet APP Product Security Vulnerability Database. The Special Working Group for Vulnerability Management has conducted preliminary review of the application materials, selected some units for review and defense, and a total of 7 units have passed the capability examination. From the date of this announcement, the following 7 units are newly added as technical support units for the CAPPVD vulnerability database (in no particular order):

01 Shanghai Douxiang Information Technology Co., Ltd.

Announcement regarding the addition of 7 units as technical support units for the Ministry of Industry and Information Technology's mobile Internet APP product security vulnerability database

02 Beijing Hongteng Intelligent Technology Co., Ltd.

03 Wuhan Antiy Information Technology Co., Ltd.

04 Software Research Institute of China United Network Communications Co., Ltd.

05 Beijing Yongxinzheng Technology Co., Ltd.

06 Beijing Anpuno Information Technology Co., Ltd.

07 Beijing Baidu Netcom Technology Co., Ltd.

At the same time, the Special Working Group for Vulnerability Management plans to conduct capability examinations for the following applicants from November 26, 2021, to December 25, 2021. During this period, the units under examination are required to report vulnerabilities on the MIIT Mobile Internet APP Product Security Vulnerability Database platform to prove their relevant capabilities.

Currently, the units that need to be examined for capabilities are (in no particular order):

Beijing Nagas Information Technology Development Co., Ltd., Beijing Huitert Technology Co., Ltd., Beijing Times Newwei Information Technology Co., Ltd., Beijing Yunce Information Technology Co., Ltd., Beijing Zhenan Tianxia Technology Co., Ltd., Xinjiang Quantum Communication Technology Co., Ltd., Jiangsu Tongfudun Information Security Technology Co., Ltd., Jiangsu Junan Information Technology Evaluation and Certification Co., Ltd., Zhejiang Yuanan Information Technology Co., Ltd., Shandong Xinchao Information Technology Co., Ltd., Zhejiang Dahua Technology Co., Ltd., Zhaowang Digital Technology (Shenzhen) Co., Ltd., Shenzhen Net Security Computer Security Detection Technology Co., Ltd., Shenzhen Nengxin'an Science and Technology Co., Ltd., Zhengzhou Yunzhixin Security Technology Co., Ltd.

The Special Working Group for Vulnerability Management will continue to select and publicize some support units based on the relevant capabilities reported by the units during the examination period.

The attached table is the list of technical support units for the CAPPVD vulnerability database as of November 26, 2021:

Contact Person: Huang Zeng/Qin Xiaolei

Contact Phone: 13811563856/18510844188

Email: cappvd@cstc.org.cn

Address: No. 66 Zizhu Yuan Road, Haidian District, Beijing


China Software Evaluation Center

(China Software and Integrated Circuit Promotion Center of the Ministry of Industry and Information Technology)

November 25, 2021 

Source: https://mp.weixin.qq.com/s/uaYBFw9lacI0kg4VTqSexw

你可能想看:

d) Adopt identification technologies such as passwords, password technologies, biometric technologies, and combinations of two or more to identify users, and at least one identification technology sho

b) It should have a login failure handling function, and should configure and enable measures such as ending the session, limiting the number of illegal login attempts, and automatically logging out w

Ensure that the ID can be accessed even if it is guessed or cannot be tampered with; the scenario is common in resource convenience and unauthorized vulnerability scenarios. I have found many vulnerab

b) It should have the login failure handling function, and should configure and enable measures such as ending the session, limiting the number of illegal logins, and automatically exiting when the lo

It is possible to perform credible verification on the system boot program, system program, important configuration parameters, and application programs of computing devices based on a credible root,

Article 2 of the Cryptography Law clearly defines the term 'cryptography', which does not include commonly known terms such as 'bank card password', 'login password', as well as facial recognition, fi

Data security can be said to be a hot topic in recent years, especially with the rapid development of information security technologies such as big data and artificial intelligence, the situation of d

In today's rapidly developing digital economy, data has become an important engine driving social progress and enterprise development. From being initially regarded as part of intangible assets to now

As announced today, Glupteba is a multi-component botnet targeting Windows computers. Google has taken action to disrupt the operation of Glupteba, and we believe this action will have a significant i

Interpretation of Meicreate Technology's 'Security Protection Requirements for Key Information Infrastructure' (Part 1)

最后修改时间:
admin
上一篇 2025年03月27日 03:45
下一篇 2025年03月27日 04:08

评论已关闭