DOC - Singapore Customs

shoulderslyricalΤεχνίτη Νοημοσύνη και Ρομποτική

21 Νοε 2013 (πριν από 3 χρόνια και 11 μήνες)

150 εμφανίσεις

SC
-
A
-
064A
(Ver
3



0
4
/13
)



Page
1

of
7





Singapore Customs

Tariffs & Trade Services Branch

55 Newton Road #
07
-
01

Revenue House

Singapore 307987

Tel No. :
6256

1281

Fax No. :
6337

6361

Email:
customs_classification
@customs.gov.sg


ANNEX A
-

PRODUCT

QUESTIONNAIRE

A
-
1 CRYPTOGRAPHY


SECTION A


BASIC PRODUCT INFORMATION

(1)

Name of the Manufacturer:







(2)

Brand:







(3)

Model No./Part No.:








SECTION B

CRYPTOGRAPHY NOTE

(4)

Is the item available and sold from stock at

retail selling points



without restriction

, to the general public through
any of the following mea
ns?

(‘Retail selling points’ are place
s where the cryptographic item

is

readily available for sale and that any person can order with
reference to available catalogues and advertisements
.

(e.g.

computer shops that are easily accessible by buyers, sales via

mail
order, telephone, fax or online transactions)

‘Without restriction’ means that
any person may acquire the products by paying the standard price to the seller without being
subject to any additional conditions, other than those normally arising from c
opyright (e.g. conditions imposed in a software
licence).
T
he price and information about the main functionality of the item must be made available before purchase without the
need to consult the vendor or supplier
.
)

(a)

Over
-
the
-
counter transactions




Yes



No

If ‘Yes’, please provide contact details of seller:







(b)

Mail order transactions


Yes



No

If ‘Yes’, please provide contact details of seller:







(c)

Electronic transactions


Yes



No

If ‘Yes’, please provide con
tact details of seller:








(d)

Telephone call transactions


Yes



No

If ‘Yes’, please provide contact details of seller:








(5)

Can the user easily change the cryptographic functionality of
the item from what is specified in the manufacturer’s
specification?
(i.e. the cryptographic functionality in the product can only be used according to the manufacturer
specification. Specific function such as user selection on the key length, etc., is not

considered as “easily change”
.
)


Yes



No

If ‘Yes’, please provide details:








SC
-
A
-
064A
(Ver
3



0
4
/13
)



Page
2

of
7



(6)

Is the item designed for installation by the user without further substantial support by the supplier?
(
This does not
include nominal installation support, such as telephone or e
-
mail
help
-
lines to resolve user problems
.)


Yes



No

If ‘No’, please provide details:








SECTION C

FUNCTIONALITY OF PRODUCT

If
any of
your answers to
(
8
)

to

(
1
9
)

are ‘Yes’, please provide the relevant details and supporting information.

(7)

Is the primary functi
on or set of functions

any

of
the following:

(a)


Information Security’

(‘Information security’ means all the means and functions ensuring the accessibility, confidentiality or integrity of informa
tion
or communications, excluding the means and functions inten
ded to safeguard against malfunct
ions. It includes
‘cryptography’
,

‘cryptanalysis’, protection against compromising emanations and computer security.

‘Cryptography’ means the discipline which embodies principles, means and methods for the transformation of

data in order
to hide its information content, prevent its undetected modification or prevent its unauthorised use.

‘Cryptanalysis’ means analysis of a cryptographic system or its inputs and outputs to derive confidential variables or
sensitive data, incl
uding clear text.)


Yes



No


(b)

A computer, including operation systems, parts and components of the computer therefor


Yes



No


(c)

Networking (includes operation, administration,
management and provisioning)


Yes



No


(d)

Sending, receiving or storing information

(not including those in support
of entertainment, mass commercial
broadcasts, digital rights management or medical records management
)


Yes



No


(8)

Is the cryptography functionality limited to supporting their primary function or set of functions?



Yes






No


(9)

Is it a
smart card or an electronically readabl
e personal document (e.g. token coin, e
-
passport)
?


Yes






No


If 'Yes’, please state the following:

(愩

䥳⁴ 攠eryp瑯tra灨ic⁣慰慢ility⁲敳瑲ic瑥t⁦潲⁵o攠i渠敱ui灭敮琠tr⁳yst敭s

瑨t琠tr攠
湯n

潦⁴ 攠erim慲y⁦畮c瑩o湳


s整

潦⁦畮c瑩潮s

s瑡t敤 i渠
(
7
)⁡ d

t桥
f畮c瑩潮ality

isimi瑥t⁴ ⁳異p潲瑩n朠gh潳e

f畮c瑩on
s
?



v敳






(戩

䥳⁴ 攠eryp瑯tra灨ic⁣慰慢ility⁲敳瑲ic瑥t⁦潲⁵o攠i渠敱ui灭敮琠tr⁳yst敭s

s瑡t敤⁩渠
(ㄱ)

瑯t
(ㄵ)

潦⁴ is⁓散瑩潮?


v敳






SC
-
A
-
064A
(Ver
3



0
4
/13
)



Page
3

of
7



(c)

Can it be reprogrammed for any other use?


Yes



No



(d)

Has

the application
been, or can only be, personalised for public or commercial transactions or individual
identificatio
n

where the cryptographic capability is not user
-
accessible and it is specially designed and limited
to allow protection of

p敲eo湡l 摡ta


s瑯t敤 睩瑨i渿


(‘Personal data’ includes any data specific to a particular person or entity, such as the amount of
money stored and data
necessary for authentication
.
)


Yes



No


(10)


Is it a ‘readers/writers’ specially or modified, and limited, for items
f畬fillin朠
(
9
)(愩a瑯t(
9

c
)

潲
㤩9
d
)
?


(‘Readers/Writers’ include equipment that
communicates with smart cards or electronically readable documents through a
network
.
)


Yes






No


(11)

Is it a cryptographic equipment specially designed and limited to banking use or ‘money transactions’?

(‘Money transactio
ns’ include the collection and settlement of fares or credit functions.)


Yes






No


(12)

Is it a portable or mobile radiotelephones for civil use (e.g. for use with commercial civil cellular radio
communication systems) that

are not capable of transmitting encrypted data directly to another radiotelephone or
equipment (other than Radio Access Network (RAN) equipment), nor of passing encrypted data through RAN
equipment (e.g. Radio Network Controller (RNC) or Base Station Cont
roller (BSC))?


Yes






No


(13)

Is it a cordless telephone equipment not capable of end
-
to
-
end encryption where the maximum effective range of
unboosted cordless operation (i.e. a single, unrelayed hop between terminal and ho
me base station) is less than
400 metres according to the manufacturer’s specifications?


v敳









(ㄴ)

䥳 i琠a 灯rt慢l攠潲om潢il攠r慤i潴敬数h潮敳 慮d similar cli敮琠睩r敬敳s 摥vic攠f潲 civil 畳攬et桡t im灬敭敮瑳 潮ly
灵bli
s桥搠潲oc潭m敲ei慬 cry灴p杲慰gic s瑡td慲摳 (數c数琠f潲o慮瑩
-
pir慣y f畮c瑩o
湳Ⱐ睨wc栠may 扥 湯n
-
p畢lis桥搩d
慮搠 als漠 m敥琠 瑨t 灲潶isi潮s s瑡t敤 i渠 (
㘩S 慮搠 (㜩Ⱐ
瑨t琠 桡v攠 b敥渠 c畳瑯tis敤 f潲o 愠 s灥cific civil in摵s瑲y
慰plic慴i潮s wi瑨t f敡瑵牥t 瑨t琠 摯 湯琠 慦f
散琠 瑨t crypt潧r慰桩c f畮c瑩潮慬ity of 瑨ts攠 潲楧i湡l 湯n
-
c畳瑯mis敤
摥vic敳?


v敳









(ㄵ)

Is it a wireless ‘personal area network’ equipment that implement only published commercial cryptographic
s瑡t摡r摳 慮d wh敲攠t桥
cry灴p杲慰gic c慰慢ility is limi瑥t 瑯ta 湯mi湡l 潰敲慴in朠r慮g攠n潴o數c敥di湧 ㌰ m整牥s
according to the manufacturer’s specifications?

(‘Personal area network’ means a data communication system having all of the following characteristics:

a.

Allows an arbit
rary number of independent or interconnected ‘data devices’ to communicate directly with each other;
and

b.

Is confined to the communication between devices within the immediate vicinity of an individual person or device controller
(e.g. single room, office o
r automobile).

‘Data devices’ means equipment capable of transmitting or receiving sequences of digital information.)


Yes






No



SC
-
A
-
064A
(Ver
3



0
4
/13
)



Page
4

of
7



(16)

Does the item contain cryptographic capability that cannot be used or can only be made us
eable by means of
“cryptographic activation”?

(

Cryptographic

activation”

means any technique that activates or enables cryptographic capability, via a secure mechanism
that is implemented by the manufacturer of the item and is uniquely bound to the item o
r customer for which the cryptographic
capability is being activated or enabled. (e.g. a serial number
-
based licence key or an authentication instrument such as a
digitally signed certificate))


Yes






No


If 'Yes’, plea
se⁳瑡t攠瑨t⁦潬lowin机

(愩

䥳⁩琠t敳i杮敤 潲潤ifi敤⁴ ⁰ rf潲m⁣ry灴p湡lytic⁦畮c瑩潮s?



v敳






(戩

䥳⁩琠t灥ci慬ly 摥si杮e搠dr m潤ifi敤
瑯t
r敤畣攠eh攠
c潭灲潭isi湧
敭慮慴ao湳 ⁩湦潲o慴a潮
-
扥慲a湧⁳i杮als
扥yo湤 w桡琠ts
n散敳s慲y⁦潲⁨敡l瑨t⁳慦整y爠敬散瑲om慧湥瑩c⁩湴敲e敲敮e攠e瑡t摡r摳
?


v敳






(c)

䥳⁩琠t
n

-
cryp瑯tr慰hic⁩湦潲o慴a潮⁡ d⁣潭m畮ic慴a潮s
瑥t桮潬潧y

(䥃f)
s散畲楴y⁳ys瑥ts⁡ 搠d敶ic敳

敶alu慴ad⁴ 慮⁡ s畲u湣攠e敶el⁥
c敥摩湧⁣l慳s⁅Ai
-
㘠⡥S慬u慴i潮 慳s畲慮u
攠lev敬) ⁴ 攠䍯Cm潮⁃ i瑥物愠
(䍃C

潲⁥煵iv慬敮t
?


v敳







(搩

䥳⁩琠t
c
潭m畮ic慴ao湳⁣慢l攠eys瑥ts⁤ si杮e搠dr潤ifi敤⁵ i湧散桡湩calⰠ敬散瑲ic慬爠敬散瑲潮ic敡湳

桡vin朠g
o⁦畮c瑩潮慬ly

瑯t摥瑥t琠t畲u数瑩瑩o畳⁩n瑲畳ion
?


(‘Personal data’ includes any data specific to a particular person or entity, such as the amount of money stored and data
necessary for authentication.)


Yes



No


SEC
TION D

TECHNICAL QUESTIONS

If your answers to any of the following is ‘Yes’, please provide the details and technical literature in that
particular respect.

Does the item contain the following cryptographic functions?

(17)

A “symmetric algorithm”

(

Symm
etric algorithm


means a cryptographic algorithm using an identical key for both encryption and decryption
.
)


Yes



No



If

v敳

Ⱐ灬敡s攠e瑡t攠eh攠e潬lowin机

(愩

c畬l 湡me
:









(戩

hey敮杴h
:








bi瑳


(c)





畳e搠d潲⁡畴o敮tic慴a潮
?



v敳





SC
-
A
-
064A
(Ver
3



0
4
/13
)



Page
5

of
7




(d)

Is

it

used for digital signature
?


Yes



No


(e)

Is used for encryption
?



Yes



No


If
‘Y


Ⱐ灬敡s攠ep散ify wha琠ts⁢ in朠g湣ry灴p携d


fil敳



瑥tt



c潭m畮ic慴a潮



l瑨trsⰠIl敡s攠ep散ify
:








(ㄸ)

A
n

“asymmetric algorithm” where the security of the

al杯ri瑨t⁩s⁢ s敤 慮y 瑨t⁦潬lo睩湧:

(
“A
symmetric algorithm


means a cryptographic algorithm using different, mathematically
-
related keys for encryption and
decryption
.
)

(a)

Factorisation
of integers (e.g. RSA)




Yes



No



If

v敳

Ⱐ灬敡s攠e瑡t攠eh攠e潬lowin机

(i)

c畬l 湡me
:









(ii)

hey敮杴h
:







bi瑳


(iii)

f

i琠
畳e搠d潲⁡畴o敮tic慴a潮
?
†††



v敳






(iv)


i琠
畳e搠d潲⁤ogi瑡l⁳i杮慴畲u
?



v敳






(v)





畳e搠d潲⁥湣ry灴io渠nr 摥cry灴ion
?



v敳








‘Y


Ⱐ灬敡s攠ep散ify wha琠ts⁢ in朠g湣ry灴p携d



fil敳



瑥tt



c潭m畮ic慴a潮



l瑨trsⰠIl敡s攠ep散ify
:









(戩

䍯C灵
瑡tio渠nf⁤ scr整e log慲楴桭s⁩渠n畬瑩plic慴iv攠er潵瀠pf⁡ fini瑥tfiel搠⡥⹧.Ⱐbllip瑩c⁣畲u攬eaiffie
-
䡥elm慮
潶敲⁚/灚p



v敳







SC
-
A
-
064A
(Ver
3



0
4
/13
)



Page
6

of
7






If

v敳

Ⱐ灬敡s攠e瑡t攠eh攠e潬lowin机

(i)

c畬l 湡me
:









(ii)

heye
湧th
:








bi瑳


(iii)





畳e搠d潲⁡畴o敮tic慴a潮
?
††



v敳






(iv)





畳e搠d潲⁤ogi瑡l⁳i杮慴畲u
?




v敳






(v)





畳e搠d潲⁥湣ry灴io渠nr 摥cry灴ion
?



v敳








‘Y


Ⱐ灬敡s攠ep散ify wha琠ts⁢ in朠g湣ry灴p携d



fil敳



瑥tt



c潭m畮ic慴a潮



l瑨trsⰠIl敡s攠ep散ify
:






†††



(c)

l瑨tr⁰ 扬ic

key 灲業i瑩v敳
攮e⸠.iffie
-
䡥elm慮 敲⁡e⁥ lip瑩c⁣畲u攩




v敳








v敳

Ⱐ灬敡s攠e瑡t攠eh攠e潬lowin机g†††† †††††

(i)

䑥acri扥
扲i敦ly 瑨t 灲業i瑩v敳⁵ 敤:








(ii)

c畬l 湡me
:








(iii)

hey敮杴h
:








bi瑳


(iv)





畳e搠d潲⁡畴o敮tic慴a潮
?
††



v敳






(v)





畳e搠d潲⁤ogi瑡l⁳i杮慴畲u
?




v敳







SC
-
A
-
064A
(Ver
3



0
4
/13
)



Page
7

of
7



(vi)

Is

it

used for encryption
?




Yes



No



If
‘Y


Ⱐ灬敡s攠ep散ify wha琠ts⁢ in朠g湣ry灴p携d


fil敳



瑥tt



c潭m畮ic慴a潮



l瑨trsⰠIl敡s攠ep散ify
:









(ㄹ)

䑯敳⁴ 攠et敭⁣潮瑡t
渠np散i慬散桡湩sms⁴ ⁤ 瑥t琠tam灥ri湧爠 n瑲畳io渿


v敳






(㈰)

Ar攠eh攠ery灴潧ra灨ic 慬杯ri瑨ts⁩m灬em敮瑥t i渠n慲a睡w攠⡁p䥃fAppm⽧/t攠erray)爠 潦瑷慲攠
(micr潰r潣敳s潲⽄卐⁣潤e)?








SECTION E


DECLARATION

I/We declare that all the information provided is true and correct, to the best of my/our knowledge.

(21)

Name:







(22)

NRIC/Passport No.:







(23)

Designation:







(24)

Contact No.:







(25)

Emai
l:







(26)

Fax No.:







(27)

Signature:







(28)

Date
(dd/mm/yyyy):