Understanding Various Symbols on Circuit Boards

Understanding Various Symbols on Circuit Boards

On many circuit boards or electronic products, we often see the following symbols, for example: FCC, CE, Hand Symbol, and Trash Can Symbol on Atmel Development Boards RoHS and RU Symbols on NXP Development Boards Hand Symbol, Trash Can Symbol, and Pb Symbol on NXP Development Boards CE and FCC Symbols on Arduino Development Boards … Read more

Understanding GCC Certification in the USA

Understanding GCC Certification in the USA

GCC stands for General Certificate of Conformity. It is a written general conformity certificate that manufacturers and importers of general use products (i.e., non-children’s products) must issue based on reasonable testing, as stipulated in the U.S. Consumer Product Safety Improvement Act (CPSIA). Manufacturers and importers of general use products subject to consumer product safety rules … Read more

Seven Major Data Compliance Challenges in IoT Edge Computing

Seven Major Data Compliance Challenges in IoT Edge Computing

Source: On August 6, 2022, the Global Edge Computing Conference in Shenzhen, organized by the Edge Computing Community, concluded successfully. At the conference, Wang Jie, Executive Director of Kenting (Guangzhou) Law Firm, was invited to give a speech titled “Edge Computing – Seven Major Data Compliance Challenges in IoT Scenarios.” Speaker: Wang Jie, Executive Director … Read more

Privacy By Design: Challenges for Chinese Automotive Companies

Privacy By Design: Challenges for Chinese Automotive Companies

The development of new energy vehicles in China is booming, and many domestic car manufacturers are expanding globally. In 2023, China exported 4.91 million cars, surpassing Japan’s 4.42 million, becoming the world’s largest car exporter. As one of the major automotive markets globally, the EU has always been an important destination for Chinese automotive companies. … Read more

Industrial Control System Cybersecurity Protection Guide

Industrial Control System Cybersecurity Protection Guide

No.1 New Baseline for Industrial Control System Cybersecurity As the core foundation of industrial production operations, industrial control systems are crucial for economic development, social stability, and national security. To enhance the cybersecurity protection level of industrial control systems, the Ministry of Industry and Information Technology issued the MIIT [2011] No. 451 “Notice on Strengthening … Read more

Interpretation of Basic Hardware and Identity Management

Interpretation of Basic Hardware and Identity Management

Introduction The China Banknote Blockchain Technology Research Institute participated in the preparation of the “Security Specification for Financial Distributed Ledger Technology” (hereinafter referred to as the “Security Specification”). This article interprets Section 6 “Basic Hardware” and Section 13 “Identity Management” and provides compliance recommendations. Lian Na China Bank Credit Card Industry Development Co., Ltd. Hangzhou … Read more

Interpretation and Compliance Suggestions for Basic Hardware and Identity Management

Interpretation and Compliance Suggestions for Basic Hardware and Identity Management

The China Banknote Blockchain Technology Research Institute participated throughout the drafting process of the “Security Norms for Financial Distributed Ledger Technology” (hereinafter referred to as “Security Norms”). This article interprets Section 6 “Basic Hardware” and Section 13 “Identity Management” and provides compliance suggestions. China Banknote Credit Card Industry Development Co., Ltd. Hangzhou Blockchain Technology Research … Read more

Research on Data Compliance Business Encryption Algorithms (Part 1)

Research on Data Compliance Business Encryption Algorithms (Part 1)

This article has a total of1,0414 words, recommended reading time18 minutes. Introduction Data compliance business is receiving increasing attention. However, unlike other compliance businesses, data compliance is closely related to information technology and involves a large number of technical concepts. Among these technical concepts, the most difficult to understand is the issue of “encryption algorithms”. … Read more