﻿<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
<title>BTL检测集团</title>
<meta name="keywords" content="Inspection、certification" />
<meta name="description" content="BTL electronic product testing and certification, providing electronic product certification services in many regions at home and abroad.  " />
<meta name="viewport" content="width=1100,target-densitydpi=high-dpi,user-scalable=yes"/>
<link rel="stylesheet" type="text/css" href="css/css.css">
<link rel="stylesheet" type="text/css" href="css/banner.css">
<link rel="stylesheet" type="text/css" href="css/animate.min.css">
<script language="JavaScript" type="text/JavaScript" src="js/jquery-1.7.1.min.js"></script>
<script language="JavaScript" type="text/javascript" src="js/banner.js"></script>
<script language="JavaScript" type="text/JavaScript" src="js/images.js"></script>
<script language="JavaScript" type="text/JavaScript" src="js/clearbox.js"></script>
<script language="JavaScript" type="text/JavaScript" src="js/wow.min.js"></script> 
<script>
function uaredirect(f){
	try{
		var b=false;
		if(arguments[1]){
			var e=window.location.host;var a=window.location.href;
			if(isSubdomain(arguments[1],e)==1){
				f=f+"/#m/"+a;b=true
			}else{
				if(isSubdomain(arguments[1],e)==2){
					f=f+"/#m/"+a;b=true
				}else{
					f=a;b=false
				}
			}
		}else{
			b=true
		}
		if(b){
			var c=window.location.hash;
			if(!c.match("fromapp")){
				if((navigator.userAgent.match(/(iPhone|iPod|Android|ios|iPad)/i))){
					location.replace(f)
				}
			}
		}
	}catch(d){}
}
uaredirect('men/newshow.php?id=747');

wow = new WOW({animateClass: 'animated',offset:100}); 
wow.init();
$(document).ready(function(){
  $(".menu li").hover(function(){
  	$("div",this).fadeIn();
  },function(){
  	$("div",this).fadeOut();
  });
  $(".menu2 ul li").hover(function(){
  	$("div",this).fadeIn();
  },function(){
  	$("div",this).fadeOut();
  });
});
</script>
</head>
<body>
<div class="toper">
	<div class="topcen">
    <form name="topform" method="post" action="serach.php">
    	<input type="text" name="topword" value="" class="topinp" />
        <input type="submit" name="topsub" value="" class="topsub" />
    </form>
	<span class="language"><a href="cn/index.php">简</a> | <a href="ft/index.php">繁</a> | <a href="index.php" >EN</a></span>
	<div class="fl logoer"><a href="index.php" ><img src="images/logo.png"></a></div>
    <ul class="menu">
        <li><a href="product.php" class="m">Service Center</a>
    	<div>
        	<a href=product.php?cid=477>NCC RCB</a>        </div>
    </li>
        <li><a href="industry.php" class="m">Technical platform</a>
    	<div>
        	<a href=industry.php?cid=473>Mobile Communication</a><a href=industry.php?cid=479>BQB</a><a href=industry.php?cid=472>SAR / OTA</a><a href=industry.php?cid=480>IoT</a><a href=industry.php?cid=413>EMC</a><a href=industry.php?cid=424>RF</a><a href=industry.php?cid=474>Telecom</a><a href=industry.php?cid=425>Safety</a><a href=industry.php?cid=485>New Energy</a><a href=industry.php?cid=481>Other</a><a href=industry.php?cid=486>Information security</a>        </div>
    </li>
        <li><a href="zhengshu.php" class="m">Certificate</a>
    	<div>
        	<a href=zhengshu.php?cid=444>Certificate</a>        </div>
    </li>
        <li><a href="about.php" class="m">About BTL</a>
    	<div>
        	<a href=about.php?id=487>Group Profile</a><a href=about.php?id=73>Complaints process</a><a href=about.php?id=237>Declaration of impartiality</a>        </div>
    </li>
        <li><a href="join.php" class="m">Join us</a>
    	<div>
        	<a href=join.php?cid=428>Talent recruitment</a><a href=join.php?cid=429>Employees demeanor</a><a href=join.php?cid=449>The enterprise information</a>        </div>
    </li>
        
    </ul>
    </div>
    <div class="menu2">
    	<ul>
        <li>Global market access: </li>
		        <li><a href="global.php?cid=416" class="m">East Asia & South Asia</a>
        	<div>
            	<a href=news.php?cid=440>China</a><a href=news.php?cid=456>Japan</a><a href=news.php?cid=458>Indian</a><a href=news.php?cid=459>Korea</a><a href=news.php?cid=460>Taiwan</a>            </div>
        </li>
                <li><a href="global.php?cid=417" class="m">Southeast Asia</a>
        	<div>
            	<a href=news.php?cid=433>Indonesia</a><a href=news.php?cid=434>Malaysia</a><a href=news.php?cid=435>Thailand</a><a href=news.php?cid=436>Vietnam</a>            </div>
        </li>
                <li><a href="global.php?cid=418" class="m">Middle East</a>
        	<div>
            	<a href=news.php?cid=461>Saudi Arabia</a>            </div>
        </li>
                <li><a href="global.php?cid=419" class="m">Africa</a>
        	<div>
            	<a href=news.php?cid=463>South Africa</a>            </div>
        </li>
                <li><a href="global.php?cid=420" class="m">Europe</a>
        	<div>
            	<a href=news.php?cid=465>European Union</a><a href=news.php?cid=484>United Kingdom</a><a href=news.php?cid=464>Russia</a>            </div>
        </li>
                <li><a href="global.php?cid=421" class="m">South America</a>
        	<div>
            	<a href=news.php?cid=469>Argentina</a><a href=news.php?cid=470>Brazil</a>            </div>
        </li>
                <li><a href="global.php?cid=422" class="m">North America</a>
        	<div>
            	<a href=news.php?cid=466>USA</a><a href=news.php?cid=467>Canada</a><a href=news.php?cid=468>Mexico</a>            </div>
        </li>
                </ul>
    </div>
</div><div class="main"><img src="upload_files/2018-12/201812111001018722.jpg" /></div>
<div class="bgw">

<div class="m2pos">
 <div class="main"><span class="m2posNm">Location：<a href='index.php'>Home</a> -  &gt; North America &gt; USA - U.S. Cyber Trust Mark Program Countdown to Relaunch: ioXt Takes Over as Lead Administrator</span></div>
 </div>
 <div class="p50">



 
<div class="m2proBox" style="border-bottom:0;">
<div class="main clear">
	<div class="lyleft">
    	<p style="text-align:center;"><img src="upload_files/2018-12/201812110958163025.jpg" /><br />USA</p><p style="font-size:11px;">Voltage: 120V<br />
Frequency: 60Hz<br />
Official Language: English<br />
<br />
1.Close cooperation and connection with the certification body <br />
2.Thoughtful aftersales assistance<br />
3.Rich practical experience guidance for kinds of product<br />
4.Reduce the deadline and costs</p>
    	<ul>
		<li><a href=news.php?cid=466 class=cur>USA</a></li><li><a href=news.php?cid=467 class=>Canada</a></li><li><a href=news.php?cid=468 class=>Mexico</a></li>        </ul>
    </div>
    <div class="lyright">
    <div class="pp2">
    <div class="tt">U.S. Cyber Trust Mark Program Countdown to Relaunch: ioXt Takes Over as Lead Administrator</div>
    <div class="txt2 txtimg"><p>The U.S. Federal Communications Commission (FCC) officially announced on April 13 the appointment of the non-profit organization ioXt Alliance as Lead Administrator of the U.S. Cyber Trust Mark program, succeeding UL Solutions, which withdrew at the end of last year. This decision injects fresh momentum into a consumer IoT cybersecurity labeling program that has been in limbo for roughly half a year. For global IoT suppliers, however, the key questions remain: <strong>When will the label officially open for product applications? And what will the final version of the technical requirements look like?</strong></p><p>&nbsp;</p><p>This article provides suppliers with the comprehensive information needed to evaluate compliance investments — covering the program&#39;s overall development trajectory, the latest timeline progress, the expected regulatory implementation date, and the key technical requirements defined by NIST IR 8425.</p><p>&nbsp;</p><p><strong><span style="color: rgb(54, 96, 146);">I. Program Development Trajectory: A Three-Year Journey from Concept to Implementation</span></strong></p><p>The U.S. Cyber Trust Mark is a voluntary FCC-led cybersecurity certification and labeling program for consumer IoT products, modeled after the successful Energy Star framework.&nbsp;</p><p><strong>Key milestones include:</strong></p><table cellspacing="0"><tbody><tr class="firstRow"><td width="185.33333333333334" valign="middle" style="padding: 8px 10px; border-width: 1px; border-style: solid; border-color: rgb(204, 204, 204); background: rgb(213, 232, 240);" align="center"><p><strong>Date</strong></p></td><td valign="middle" style="padding:8px 10px 8px 10px ;border-left:none;border-right:1px solid rgb(204,204,204);border-top:1px solid rgb(204,204,204);border-bottom:1px solid rgb(204,204,204);background:rgb(213,232,240)" width="646.3333333333334" align="center"><p><strong>Key Event</strong></p></td></tr><tr><td valign="middle" style="padding:8px 10px 8px 10px ;border-left:1px solid rgb(0,0,0);border-right:1px solid rgb(0,0,0);border-top:none;border-bottom:1px solid rgb(0,0,0);background:rgb(255,255,255)" width="185.33333333333334" align="left"><p>Sep 2022</p></td><td valign="middle" style="padding:8px 10px 8px 10px ;border-left:none;border-right:1px solid rgb(0,0,0);border-top:none;border-bottom:1px solid rgb(0,0,0);background:rgb(255,255,255)" width="646.3333333333334" align="left"><p>NIST publishes IR 8425, establishing the core cybersecurity baseline for consumer IoT</p></td></tr><tr><td valign="middle" style="padding:8px 10px 8px 10px ;border-left:1px solid rgb(0,0,0);border-right:1px solid rgb(0,0,0);border-top:none;border-bottom:1px solid rgb(0,0,0);background:rgb(247,250,252)" width="185.33333333333334" align="left"><p>Jul 2023</p></td><td valign="middle" style="padding:8px 10px 8px 10px ;border-left:none;border-right:1px solid rgb(0,0,0);border-top:none;border-bottom:1px solid rgb(0,0,0);background:rgb(247,250,252)" width="646.3333333333334" align="left"><p>White House announces the Cyber Trust Mark initiative</p></td></tr><tr><td valign="middle" style="padding:8px 10px 8px 10px ;border-left:1px solid rgb(0,0,0);border-right:1px solid rgb(0,0,0);border-top:none;border-bottom:1px solid rgb(0,0,0);background:rgb(255,255,255)" width="185.33333333333334" align="left"><p>Aug 2023</p></td><td valign="middle" style="padding:8px 10px 8px 10px ;border-left:none;border-right:1px solid rgb(0,0,0);border-top:none;border-bottom:1px solid rgb(0,0,0);background:rgb(255,255,255)" width="646.3333333333334" align="left"><p>FCC issues Notice of Proposed Rulemaking (NPRM) and solicits public comment</p></td></tr><tr><td valign="middle" style="padding:8px 10px 8px 10px ;border-left:1px solid rgb(0,0,0);border-right:1px solid rgb(0,0,0);border-top:none;border-bottom:1px solid rgb(0,0,0);background:rgb(247,250,252)" width="185.33333333333334" align="left"><p>Mar 14, 2024</p></td><td valign="middle" style="padding:8px 10px 8px 10px ;border-left:none;border-right:1px solid rgb(0,0,0);border-top:none;border-bottom:1px solid rgb(0,0,0);background:rgb(247,250,252)" width="646.3333333333334" align="left"><p>FCC adopts Report and Order (FCC 24-26), establishing the program framework</p></td></tr><tr><td valign="middle" style="padding:8px 10px 8px 10px ;border-left:1px solid rgb(0,0,0);border-right:1px solid rgb(0,0,0);border-top:none;border-bottom:1px solid rgb(0,0,0);background:rgb(255,255,255)" width="185.33333333333334" align="left"><p>Dec 2024</p></td><td valign="middle" style="padding:8px 10px 8px 10px ;border-left:none;border-right:1px solid rgb(0,0,0);border-top:none;border-bottom:1px solid rgb(0,0,0);background:rgb(255,255,255)" width="646.3333333333334" align="left"><p>FCC conditionally approves 11 CLAs and selects UL Solutions as Lead Administrator</p></td></tr><tr><td valign="middle" style="padding:8px 10px 8px 10px ;border-left:1px solid rgb(0,0,0);border-right:1px solid rgb(0,0,0);border-top:none;border-bottom:1px solid rgb(0,0,0);background:rgb(247,250,252)" width="185.33333333333334" align="left"><p>Jan 7, 2025</p></td><td valign="middle" style="padding:8px 10px 8px 10px ;border-left:none;border-right:1px solid rgb(0,0,0);border-top:none;border-bottom:1px solid rgb(0,0,0);background:rgb(247,250,252)" width="646.3333333333334" align="left"><p>White House officially launches the program</p></td></tr><tr><td valign="middle" style="padding:8px 10px 8px 10px ;border-left:1px solid rgb(0,0,0);border-right:1px solid rgb(0,0,0);border-top:none;border-bottom:1px solid rgb(0,0,0);background:rgb(255,255,255)" width="185.33333333333334" align="left"><p>Jun 2025</p></td><td valign="middle" style="padding:8px 10px 8px 10px ;border-left:none;border-right:1px solid rgb(0,0,0);border-top:none;border-bottom:1px solid rgb(0,0,0);background:rgb(255,255,255)" width="646.3333333333334" align="left"><p>UL Solutions submits technical requirements and label design recommendations to the FCC</p></td></tr><tr><td valign="middle" style="padding:8px 10px 8px 10px ;border-left:1px solid rgb(0,0,0);border-right:1px solid rgb(0,0,0);border-top:none;border-bottom:1px solid rgb(0,0,0);background:rgb(247,250,252)" width="185.33333333333334" align="left"><p>Dec 19, 2025</p></td><td valign="middle" style="padding:8px 10px 8px 10px ;border-left:none;border-right:1px solid rgb(0,0,0);border-top:none;border-bottom:1px solid rgb(0,0,0);background:rgb(247,250,252)" width="646.3333333333334" align="left"><p>UL Solutions withdraws following a national security review of its China ties</p></td></tr><tr><td valign="middle" style="padding:8px 10px 8px 10px ;border-left:1px solid rgb(0,0,0);border-right:1px solid rgb(0,0,0);border-top:none;border-bottom:1px solid rgb(0,0,0);background:rgb(255,255,255)" width="185.33333333333334" align="left"><p>Jan 6, 2026</p></td><td valign="middle" style="padding:8px 10px 8px 10px ;border-left:none;border-right:1px solid rgb(0,0,0);border-top:none;border-bottom:1px solid rgb(0,0,0);background:rgb(255,255,255)" width="646.3333333333334" align="left"><p>FCC reopens the Lead Administrator application window</p></td></tr><tr><td valign="middle" style="padding:8px 10px 8px 10px ;border-left:1px solid rgb(0,0,0);border-right:1px solid rgb(0,0,0);border-top:none;border-bottom:1px solid rgb(0,0,0);background:rgb(247,250,252)" width="185.33333333333334" align="left"><p>Jan 27 – Feb 24, 2026</p></td><td valign="middle" style="padding:8px 10px 8px 10px ;border-left:none;border-right:1px solid rgb(0,0,0);border-top:none;border-bottom:1px solid rgb(0,0,0);background:rgb(247,250,252)" width="646.3333333333334" align="left"><p>CLA application window opens</p></td></tr><tr><td valign="middle" style="padding:8px 10px 8px 10px ;border-left:1px solid rgb(0,0,0);border-right:1px solid rgb(0,0,0);border-top:none;border-bottom:1px solid rgb(0,0,0);background:rgb(255,255,255)" width="185.33333333333334" align="left"><p>Apr 13, 2026</p></td><td valign="middle" style="padding:8px 10px 8px 10px ;border-left:none;border-right:1px solid rgb(0,0,0);border-top:none;border-bottom:1px solid rgb(0,0,0);background:rgb(255,255,255)" width="646.3333333333334" align="left"><p>FCC announces ioXt Alliance as the new Lead Administrator</p></td></tr></tbody></table><p>&nbsp;</p><hr/><p><span style="color: rgb(54, 96, 146);"><strong>II. When Will the Regulation Take Effect? Key Timeline Projections</strong></span><br/></p><p><strong><span style="color: rgb(0, 176, 240);">Current Official Position</span></strong></p><p>The FCC&#39;s official page clearly states: &quot;The FCC will issue a separate announcement when the program is ready to accept product label applications.&quot; In other words, <strong>manufacturers cannot yet apply for the Cyber Trust Mark for their products.</strong></p><p>&nbsp;</p><p>The FCC has also indicated that it is still reviewing public responses to the <strong>Further Notice of Proposed Rulemaking (FNPRM)</strong>, which addresses additional national security-related disclosure requirements. This remains a critical variable that will shape the final rules.</p><p>&nbsp;</p><p><span style="color: rgb(0, 176, 240);"><strong>Remaining Required Steps</strong></span></p><p><strong>Before product applications can formally open, the following work must be completed:</strong></p><p>1. ioXt submits technical standards and testing procedure recommendations: As Lead Administrator, ioXt must identify or develop IoT-specific standards and testing procedures and recommend them to the FCC for approval. While UL Solutions submitted initial recommendations in June 2025, ioXt is expected to revise and resubmit them.</p><p>2. FCC approves the label design and placement requirements.</p><p>3. FCC finalizes the national security disclosure rulemaking.</p><p>4. ioXt and CLAs establish operational infrastructure: including the CyberLAB accreditation mechanism, application review workflows, and the public-facing product registry.</p><p>5. Consumer education and outreach campaign launches.</p><p>&nbsp;</p><hr/><p><span style="color: rgb(54, 96, 146);"><strong>III. Key Technical Requirements: The Ten Core Criteria of NIST IR 8425</strong></span><br/></p><p>The technical foundation of the Cyber Trust Mark is built upon <strong>NIST IR 8425: Profile of the IoT Core Baseline for Consumer IoT Products</strong>. Suppliers must understand that the standard applies to <strong>the entire IoT product system</strong>, covering the device itself, gateway hardware, mobile applications, cloud services, and data processing and storage components — not just the device alone.</p><p>&nbsp;</p><p><strong>NIST IR 8425 divides the requirements into two main categories comprising 10 core criteria:</strong></p><p><strong><span style="color: rgb(0, 176, 240);"><span style="margin: 0px; padding: 0px;">▶&nbsp;</span>Technical Capability Requirements (Items 1–6)</span></strong></p><p><span style="color: rgb(0, 176, 240);">1. Asset Identification</span></p><p><span style="color: rgb(51, 51, 51); font-family: 微软雅黑; font-size: 14px; background-color: rgb(255, 255, 255);">•&nbsp;</span>Devices must have unique identifiers that users can identify</p><p><span style="color: rgb(51, 51, 51); font-family: 微软雅黑; font-size: 14px; background-color: rgb(255, 255, 255);">•&nbsp;</span>Maintain a detailed inventory of all components (including Software Bill of Materials, SBOM)</p><p><span style="color: rgb(0, 176, 240);">2. Product Configuration</span></p><p><span style="color: rgb(51, 51, 51); font-family: 微软雅黑; font-size: 14px; background-color: rgb(255, 255, 255);">•&nbsp;</span>Authorized users can change configuration settings through one or more device components</p><p><span style="color: rgb(51, 51, 51); font-family: 微软雅黑; font-size: 14px; background-color: rgb(255, 255, 255);">•&nbsp;</span>Support for restoring secure default settings</p><p><span style="color: rgb(0, 176, 240);">3. Data Protection</span></p><p><span style="color: rgb(51, 51, 51); font-family: 微软雅黑; font-size: 14px; background-color: rgb(255, 255, 255);">•&nbsp;</span>Device components must protect the security of stored data</p><p><span style="color: rgb(51, 51, 51); font-family: 微软雅黑; font-size: 14px; background-color: rgb(255, 255, 255);">•&nbsp;</span>Users can delete sensitive information or render it inaccessible</p><p><span style="color: rgb(51, 51, 51); font-family: 微软雅黑; font-size: 14px; background-color: rgb(255, 255, 255);">•&nbsp;</span>Data transmission between devices, components, and networks must be encrypted</p><p><span style="color: rgb(0, 176, 240);">4. Interface Access Control</span></p><p><span style="color: rgb(51, 51, 51); font-family: 微软雅黑; font-size: 14px; background-color: rgb(255, 255, 255);">•&nbsp;</span>Device components restrict interface access to authorized users only</p><p><span style="color: rgb(51, 51, 51); font-family: 微软雅黑; font-size: 14px; background-color: rgb(255, 255, 255);">•&nbsp;</span>All interfaces limit access and configuration change privileges</p><p><span style="color: rgb(51, 51, 51); font-family: 微软雅黑; font-size: 14px; background-color: rgb(255, 255, 255);">•&nbsp;</span>Default weak passwords are prohibited</p><p><span style="color: rgb(0, 176, 240);">5. Software Update</span></p><p><span style="color: rgb(51, 51, 51); font-family: 微软雅黑; font-size: 14px; background-color: rgb(255, 255, 255);">•&nbsp;</span>Device components can download, verify, and apply authenticated software updates</p><p><span style="color: rgb(51, 51, 51); font-family: 微软雅黑; font-size: 14px; background-color: rgb(255, 255, 255);">•&nbsp;</span>All components regularly update onboard software</p><p><span style="color: rgb(51, 51, 51); font-family: 微软雅黑; font-size: 14px; background-color: rgb(255, 255, 255);">•&nbsp;</span>Support for update integrity verification and rollback mechanisms</p><p><span style="color: rgb(0, 176, 240);">6. Cybersecurity State Awareness</span></p><p><span style="color: rgb(51, 51, 51); font-family: 微软雅黑; font-size: 14px; background-color: rgb(255, 255, 255);">•&nbsp;</span>Devices capture component vulnerability information to detect potential cybersecurity risks</p><p><span style="color: rgb(51, 51, 51); font-family: 微软雅黑; font-size: 14px; background-color: rgb(255, 255, 255);">•&nbsp;</span>Identify and log anomalous behavior</p><p><br/></p><p><strong><span style="margin: 0px; padding: 0px; color: rgb(0, 176, 240);">▶&nbsp;</span><span style="color: rgb(0, 176, 240);">Non-Technical Practice Requirements (Items 7–10)</span></strong></p><p><span style="color: rgb(0, 176, 240);">7. Documentation</span></p><p><span style="color: rgb(51, 51, 51); font-family: 微软雅黑; font-size: 14px; background-color: rgb(255, 255, 255);">•&nbsp;</span>Manufacturers establish and maintain documentation of all product security-related information</p><p><span style="color: rgb(0, 176, 240);">8. Information and Query Reception</span></p><p><span style="color: rgb(51, 51, 51); font-family: 微软雅黑; font-size: 14px; background-color: rgb(255, 255, 255);">•&nbsp;</span>Provide a vulnerability disclosure channel (CVD, Coordinated Vulnerability Disclosure)</p><p><span style="color: rgb(51, 51, 51); font-family: 微软雅黑; font-size: 14px; background-color: rgb(255, 255, 255);">•&nbsp;</span>Receive security inquiries from users and researchers</p><p><span style="color: rgb(0, 176, 240);">9. Information Dissemination</span></p><p><span style="color: rgb(51, 51, 51); font-family: 微软雅黑; font-size: 14px; background-color: rgb(255, 255, 255);">•&nbsp;</span>Communicate security updates, known vulnerabilities, and mitigation measures to users</p><p><span style="color: rgb(51, 51, 51); font-family: 微软雅黑; font-size: 14px; background-color: rgb(255, 255, 255);">•&nbsp;</span>Clearly disclose the minimum security update support period</p><p><span style="color: rgb(0, 176, 240);">10. Product Education and Awareness</span></p><p><span style="color: rgb(51, 51, 51); font-family: 微软雅黑; font-size: 14px; background-color: rgb(255, 255, 255);">•&nbsp;</span>Provide product cybersecurity education to users</p><p><span style="color: rgb(51, 51, 51); font-family: 微软雅黑; font-size: 14px; background-color: rgb(255, 255, 255);">•&nbsp;</span>Offer secure configuration guides and best practices</p><p><br/></p><p><strong style="margin: 0px; padding: 0px; color: rgb(51, 51, 51); font-family: 微软雅黑; font-size: 14px; white-space: normal; background-color: rgb(255, 255, 255);"><span style="margin: 0px; padding: 0px; color: rgb(0, 176, 240);">▶&nbsp;</span></strong><strong><span style="color: rgb(0, 176, 240);">Label Display Requirements (QR Code Disclosure Information)</span></strong></p><p>In addition to displaying the shield logo, certified products must also carry a QR Code that, when scanned, discloses the following information:</p><p><span style="color: rgb(51, 51, 51); font-family: 微软雅黑; font-size: 14px; background-color: rgb(255, 255, 255);">•&nbsp;</span>Product name, manufacturer, certification date</p><p><span style="color: rgb(51, 51, 51); font-family: 微软雅黑; font-size: 14px; background-color: rgb(255, 255, 255);">•&nbsp;</span>The minimum support period end date, or an explicit statement that the manufacturer does not provide security updates (a critical field for consumer risk identification)</p><p><span style="color: rgb(51, 51, 51); font-family: 微软雅黑; font-size: 14px; background-color: rgb(255, 255, 255);">•&nbsp;</span>List of supported security features</p><p><span style="color: rgb(51, 51, 51); font-family: 微软雅黑; font-size: 14px; background-color: rgb(255, 255, 255);">•&nbsp;</span>Link to vulnerability disclosure policy</p><p><span style="color: rgb(51, 51, 51); font-family: 微软雅黑; font-size: 14px; background-color: rgb(255, 255, 255);">•&nbsp;</span>Software update policy</p><p><br/></p><p><strong style="margin: 0px; padding: 0px; color: rgb(51, 51, 51); font-family: 微软雅黑; font-size: 14px; white-space: normal; background-color: rgb(255, 255, 255);"><span style="margin: 0px; padding: 0px; color: rgb(0, 176, 240);">▶&nbsp;</span></strong><span style="color: rgb(0, 176, 240);"><strong>Extended Requirements for Specific Product Categories</strong></span></p><p>NIST has released dedicated profiles for high-risk product categories:</p><p><span style="color: rgb(51, 51, 51); font-family: 微软雅黑; font-size: 14px; background-color: rgb(255, 255, 255);">•&nbsp;</span>NIST IR 8425A: Dedicated cybersecurity requirements for consumer-grade routers, providing additional protection needed due to routers&#39; role as network traffic hubs.</p><p><span style="color: rgb(51, 51, 51); font-family: 微软雅黑; font-size: 14px; background-color: rgb(255, 255, 255);">•&nbsp;</span>Future extended profiles are expected for smart home hubs, baby monitors, smart locks, and other categories.</p><p><br/></p><hr/><p><span style="color: rgb(54, 96, 146);"><strong>IV. Integration with International Standards: The Bridging Value of ETSI EN 303 645</strong></span><br/></p><p>For global suppliers, <strong>NIST IR 8425 and the EU&#39;s ETSI EN 303 645 have significant overlap</strong>, particularly in core areas such as password management, software updates, data protection, and vulnerability disclosure. Establishing an integrated validation plan covering both standards allows manufacturers to qualify for both U.S. and EU markets after a single round of compliance testing, which materially reduces compliance costs.</p><p>&nbsp;</p><p>Furthermore, once the EU Cyber Resilience Act (CRA) takes full effect in December 2027, the IoT cybersecurity requirements of these two major economies will form the de facto global standard. Supply chains that build internal compliance frameworks around NIST IR 8425 + ETSI EN 303 645 will gain significant competitive advantages.</p><p>&nbsp;</p><hr/><p><span style="color: rgb(54, 96, 146);"><strong>V. Assessment Recommendations for Global IoT Suppliers</strong></span><br/></p><p>Although the Cyber Trust Mark is a voluntary program, the following factors will make it <strong>effectively a de facto requirement for the U.S. market:</strong></p><p><strong><span style="color: rgb(51, 51, 51); font-family: 微软雅黑; font-size: 14px; background-color: rgb(255, 255, 255);">•&nbsp;</span>Retail channel pressure:</strong> Major retailers and brands including Amazon, Best Buy, Google, LG, Samsung, and Logitech have expressed support, and may list the label as a shelf priority condition in the future.</p><p><strong><span style="color: rgb(51, 51, 51); font-family: 微软雅黑; font-size: 14px; background-color: rgb(255, 255, 255);">•&nbsp;</span>Enterprise procurement drivers:</strong> Federal government procurement and large enterprise IT departments may include the label as a supplier evaluation criterion.</p><p><strong><span style="color: rgb(51, 51, 51); font-family: 微软雅黑; font-size: 14px; background-color: rgb(255, 255, 255);">•&nbsp;</span>Rising consumer awareness: </strong>QR Code disclosure of the product support period will directly influence consumer purchasing decisions.</p><p><strong><span style="color: rgb(51, 51, 51); font-family: 微软雅黑; font-size: 14px; background-color: rgb(255, 255, 255);">•&nbsp;</span>Potential impact of national security disclosure provisions:</strong> If the final rules require disclosure of manufacturing location, component sources, and software development origin, supply chain transparency will become a hidden threshold for obtaining the label.</p><p><br/></p><p><strong><span style="color: rgb(0, 176, 240);">Recommended Immediate Assessment Items for Suppliers</span></strong></p><table cellspacing="0"><tbody><tr class="firstRow"><td width="235" valign="middle" style="padding: 8px 10px; border-width: 1px; border-style: solid; border-color: rgb(204, 204, 204); background: rgb(213, 232, 240);" align="center"><p><strong>Assessment Area</strong></p></td><td valign="middle" style="padding:8px 10px 8px 10px ;border-left:none;border-right:1px solid rgb(204,204,204);border-top:1px solid rgb(204,204,204);border-bottom:1px solid rgb(204,204,204);background:rgb(213,232,240)" width="617.3333333333334" align="center"><p><strong>Key Question</strong></p></td></tr><tr><td valign="middle" style="padding:8px 10px 8px 10px ;border-left:1px solid rgb(0,0,0);border-right:1px solid rgb(0,0,0);border-top:none;border-bottom:1px solid rgb(0,0,0);background:rgb(255,255,255)" width="242.33333333333334" align="left"><p>Compliance Gap Analysis</p></td><td valign="middle" style="padding:8px 10px 8px 10px ;border-left:none;border-right:1px solid rgb(0,0,0);border-top:none;border-bottom:1px solid rgb(0,0,0);background:rgb(255,255,255)" width="617.3333333333334" align="left"><p>What is the current product&#39;s compliance level with the ten NIST IR 8425 criteria?</p></td></tr><tr><td valign="middle" style="padding:8px 10px 8px 10px ;border-left:1px solid rgb(0,0,0);border-right:1px solid rgb(0,0,0);border-top:none;border-bottom:1px solid rgb(0,0,0);background:rgb(247,250,252)" width="122.00000000000001" align="left"><p>SBOM Implementation</p></td><td valign="middle" style="padding:8px 10px 8px 10px ;border-left:none;border-right:1px solid rgb(0,0,0);border-top:none;border-bottom:1px solid rgb(0,0,0);background:rgb(247,250,252)" width="617.3333333333334" align="left"><p>Has a complete Software Bill of Materials management mechanism been established?</p></td></tr><tr><td valign="middle" style="padding:8px 10px 8px 10px ;border-left:1px solid rgb(0,0,0);border-right:1px solid rgb(0,0,0);border-top:none;border-bottom:1px solid rgb(0,0,0);background:rgb(255,255,255)" width="122.00000000000001" align="left"><p>Firmware Update Mechanism</p></td><td valign="middle" style="padding:8px 10px 8px 10px ;border-left:none;border-right:1px solid rgb(0,0,0);border-top:none;border-bottom:1px solid rgb(0,0,0);background:rgb(255,255,255)" width="617.3333333333334" align="left"><p>Does it support signature verification, integrity checks, and rollback capabilities?</p></td></tr><tr><td valign="middle" style="padding:8px 10px 8px 10px ;border-left:1px solid rgb(0,0,0);border-right:1px solid rgb(0,0,0);border-top:none;border-bottom:1px solid rgb(0,0,0);background:rgb(247,250,252)" width="122.00000000000001" align="left"><p>Vulnerability Disclosure Process</p></td><td valign="middle" style="padding:8px 10px 8px 10px ;border-left:none;border-right:1px solid rgb(0,0,0);border-top:none;border-bottom:1px solid rgb(0,0,0);background:rgb(247,250,252)" width="617.3333333333334" align="left"><p>Has a CVD policy and reporting channel been established?</p></td></tr><tr><td valign="middle" style="padding:8px 10px 8px 10px ;border-left:1px solid rgb(0,0,0);border-right:1px solid rgb(0,0,0);border-top:none;border-bottom:1px solid rgb(0,0,0);background:rgb(255,255,255)" width="122.00000000000001" align="left"><p>Support Period Policy</p></td><td valign="middle" style="padding:8px 10px 8px 10px ;border-left:none;border-right:1px solid rgb(0,0,0);border-top:none;border-bottom:1px solid rgb(0,0,0);background:rgb(255,255,255)" width="617.3333333333334" align="left"><p>Can a clear minimum security update support period be committed to?</p></td></tr><tr><td valign="middle" style="padding:8px 10px 8px 10px ;border-left:1px solid rgb(0,0,0);border-right:1px solid rgb(0,0,0);border-top:none;border-bottom:1px solid rgb(0,0,0);background:rgb(247,250,252)" width="122.00000000000001" align="left"><p>Supply Chain Transparency</p></td><td valign="middle" style="padding:8px 10px 8px 10px ;border-left:none;border-right:1px solid rgb(0,0,0);border-top:none;border-bottom:1px solid rgb(0,0,0);background:rgb(247,250,252)" width="617.3333333333334" align="left"><p>Can the source of key components be traced to address national security disclosure provisions?</p></td></tr><tr><td valign="middle" style="padding:8px 10px 8px 10px ;border-left:1px solid rgb(0,0,0);border-right:1px solid rgb(0,0,0);border-top:none;border-bottom:1px solid rgb(0,0,0);background:rgb(255,255,255)" width="122.00000000000001" align="left"><p>Testing Partners</p></td><td valign="middle" style="padding:8px 10px 8px 10px ;border-left:none;border-right:1px solid rgb(0,0,0);border-top:none;border-bottom:1px solid rgb(0,0,0);background:rgb(255,255,255)" width="617.3333333333334" align="left"><p>Have FCC-recognized CyberLAB partners been identified?</p></td></tr><tr><td valign="middle" style="padding:8px 10px 8px 10px ;border-left:1px solid rgb(0,0,0);border-right:1px solid rgb(0,0,0);border-top:none;border-bottom:1px solid rgb(0,0,0);background:rgb(247,250,252)" width="122.00000000000001" align="left"><p>Multi-Standard Integration</p></td><td valign="middle" style="padding:8px 10px 8px 10px ;border-left:none;border-right:1px solid rgb(0,0,0);border-top:none;border-bottom:1px solid rgb(0,0,0);background:rgb(247,250,252)" width="617.3333333333334" align="left"><p>Does the testing plan cover both NIST IR 8425 and ETSI EN 303 645?</p></td></tr></tbody></table><p>&nbsp;</p><p><br/></p></div>
    </div>


	</div>

<div style="float:right"><a href="javascript:history.back(-1)"><img src=images/back.gif border=0></a><a href=#><img src=images/top_x.gif border=0></a></div>

</div>

</div>

 </div>




</div>
<div class="bommenu">
	<ul>
        <li><a href="product.php">Service Center</a>
    	<div>
        	<a href=product.php?cid=477>NCC RCB</a>        </div>
    </li>
        <li><a href="industry.php">Technical platform</a>
    	<div>
        	<a href=industry.php?cid=473>Mobile Communication</a><a href=industry.php?cid=479>BQB</a><a href=industry.php?cid=472>SAR / OTA</a><a href=industry.php?cid=480>IoT</a><a href=industry.php?cid=413>EMC</a><a href=industry.php?cid=424>RF</a><a href=industry.php?cid=474>Telecom</a><a href=industry.php?cid=425>Safety</a><a href=industry.php?cid=485>New Energy</a><a href=industry.php?cid=481>Other</a><a href=industry.php?cid=486>Information security</a>        </div>
    </li>
        <li><a href="zhengshu.php">Certificate</a>
    	<div>
        	<a href=zhengshu.php?cid=444>Certificate</a>        </div>
    </li>
        <li><a href="about.php">About BTL</a>
    	<div>
        	<a href=about.php?id=487>Group Profile</a><a href=about.php?id=73>Complaints process</a><a href=about.php?id=237>Declaration of impartiality</a>        </div>
    </li>
        <li><a href="join.php">Join us</a>
    	<div>
        	<a href=join.php?cid=428>Talent recruitment</a><a href=join.php?cid=429>Employees demeanor</a><a href=join.php?cid=449>The enterprise information</a>        </div>
    </li>
    		<li><p><img src="images/BTLewm.jpg" /></p><p>WeChat account</p></li>
    </ul>
</div>
<div class="end">
	<p><strong>LINK: </strong>
	<a href=https://www.globalcertificationforum.org/ target=_blank>GCF</a><a href=https://www.ptcrb.com/ target=_blank>PTCRB</a></p>
Copyright © 2008-2019 BTL Inc.  All Rights Reserved  ICP NO.18145055<a href="https://beian.miit.gov.cn" target="_blank">粤ICP备18145055号</a>&nbsp;&nbsp;技术支持：<a href="https://www.0769net.com/" target="_blank">东莞网站设计</a>
</div>
</body>
</html>