HOME   Cart(0)   Quotation   About-Us Tax PDFs Standard-List Powered by Google www.ChineseStandard.net Database: 189760 (15 Mar 2025)

GM/T 0117-2022 PDF English


Search result: GM/T 0117-2022 English: PDF (GM/T0117-2022)
Standard IDContents [version]USDSTEP2[PDF] delivered inName of Chinese StandardStatus
GM/T 0117-2022English395 Add to Cart 0-9 seconds. Auto-delivery. Technical requirements for cryptographic applications of identity service in network Valid


PDF Preview: GM/T 0117-2022


GM/T 0117-2022: PDF in English (GMT 0117-2022)

GM/T 0117-2022 GM CRYPTOGRAPHY INDUSTRY STANDARD OF THE PEOPLE’S REPUBLIC OF CHINA ICS 35.030 CCS L 80 Technical Requirements for Cryptographic Applications of Identity Service in Network ISSUED ON: NOVEMBER 20, 2022 IMPLEMENTED ON: JUNE 1, 2023 Issued by: State Cryptography Administration Table of Contents Foreword ... 3 1 Scope ... 4 2 Normative References ... 4 3 Terms and Definitions ... 5 4 Abbreviations ... 7 5 Overview ... 7 5.1 Network Identity Service Model ... 7 5.2 Security Levels of Network Identity Service ... 9 5.3 Cryptographic Application Demands Framework ... 11 6 Cryptographic Application Security Objective for Identity Service in Network ... 12 6.1 Overview ... 12 6.2 Confidentiality ... 13 6.3 Integrity ... 13 6.4 Authenticity ... 13 6.5 Non-repudiation ... 13 7 Technical Requirements for Cryptographic Applications of Identity Service in Network ... 13 7.1 General Requirements ... 13 7.2 Requirements for Identity Proofing Service ... 14 7.3 Requirements for Identity Authentication Service ... 16 7.4 Requirements for Identity Federation Service ... 24 Appendix A (informative) Risk Mitigation of Identity Services in Network ... 34 Appendix B (informative) Authenticator Types and Authentication Modes ... 37 Bibliography ... 40 Technical Requirements for Cryptographic Applications of Identity Service in Network 1 Scope This document stipulates the technical requirements for cryptographic applications of identity service in network for natural persons, provides network identity service model, network identity service security level, cryptographic application demands framework and cryptographic application security objective, and provides specific technical requirements for cryptographic applications of identity verification service, identity authentication service and identity federation service. This document is applicable to the planning, design, development, deployment and application of cryptographic applications of identity service in network for natural persons. 2 Normative References The contents of the following documents constitute indispensable clauses of this document through the normative references in the text. In terms of references with a specified date, only versions with a specified date are applicable to this document. In terms of references without a specified date, the latest version (including all the modifications) is applicable to this document. GB/T 15843 (all parts) Information Technology - Security Techniques - Entity Authentication GB/T 22239 Information Security Technology - Baseline for Classified Protection of Cybersecurity GB/T 25069 Information Security Techniques - Terminology GB/T 35273 Information Security Technology - Personal Information Security Specification GB/T 37036 (all parts) Information Technology - Biometrics Used with Mobile Devices GB/T 37092 Information Security Technology - Security Requirements for Cryptographic Modules GB/T 38556 Information Security Technology - Technical Specifications for One-time- password Cryptographic Application GB/T 39786 Information Security Technology - Baseline for Information System Cryptography Application GB/T 40660 Information Security Technology - General Requirements of Biometric Information Protection 6.2 Confidentiality Important data in network identity services (such as: identity authentication information, sensitive personal information and authenticator keys, etc.) will not be obtained by unauthorized entities during the collection, storage, use and transmission, etc., and thus be exploited or leaked. Confidentiality is achieved using encryption and decryption techniques, etc. 6.3 Integrity Important data in network identity services (such as: identity authentication information, sensitive personal information and authenticator keys, etc.) will not be modified or destroyed without authorization during the collection, storage, use and transmission, etc. Integrity is achieved using cryptographic technology, such as: message authentication code mechanisms based on symmetric cryptographic algorithms or cryptographic hash algorithms, and digital signature mechanisms based on public key cryptographic algorithms, etc. 6.4 Authenticity In identity services in network, confirm the authenticity of the identities of participating entities to prevent identities from being appropriated or counterfeited. Authenticity is achieved using cryptographic technology, such as: message authentication code mechanisms based on symmetric cryptographic algorithms or cryptographic hash algorithms, digital signature mechanisms based on public key cryptographic algorithms, and dynamic password mechanisms, etc. 6.5 Non-repudiation Participating entities in identity services in network cannot deny their data originating behavior and data receiving behavior in the network identity services. Non-repudiation is achieved using cryptographic technology, for example, digital signature mechanisms based on public key cryptographic algorithms. 7 Technical Requirements for Cryptographic Applications of Identity Service in Network 7.1 General Requirements In identity proofing service, identity authentication service and identity federation service, Level 1 to Level 4 shall comply with the following general requirements: a) The cryptographic algorithms, cryptographic technology, cryptographic products and cryptographic services used in network identity services shall comply with the provisions of laws and regulations, and the relevant requirements of cryptography- related national standards and industry standards; b) The collection, storage, use, entrusted processing, sharing, transfer and public disclosure of personal information, and the handling of personal information security incidents shall comply with the provisions of GB/T 35273, and the protection requirements for biometric features recognition shall comply with the provisions of GB/T 40660. 7.2 Requirements for Identity Proofing Service 7.2.1 Level 1 The requirements for Level 1 are as follows. a) Requirements for identity proofing: real names are not required, and anonymous, pseudonymous or real names may be used. b) Requirements for communication protection: cryptographic technology may be adopted to ensure the integrity of data in the communication process; cryptographic technology may be adopted to ensure the confidentiality of important data in the communication process; cryptographic technology may be adopted to authenticate communication entities. c) Requirements for recording and storage: 1) The identity service provider shall record and store the necessary information for the identity proofing service, including but not limited to collected user identity information and identification documents, process information generated by identity proofing, and proofing results, etc.; 2) Cryptographic technology may be adopted to ensure the confidentiality and integrity of important data storage. d) Requirements for risk mitigation: see A.1 in Appendix A for possible risks. Cryptographic technology may be adopted to mitigate possible risks. e) Requirements for system security protection: the network identity service system shall at least comply with Level 1 security requirements specified in GB/T 22239 and shall at least comply with Level 1 cryptographic application technical requirements specified in GB/T 39786. 7.2.2 Level 2 The requirements for Level 2 are as follows. a) Requirements for identity proofing: user identity shall be verified using any mode of remote identity proofing, in-person over remote channel identity proofing and in- person identity proofing, and real-name verification shall be performed. b) Requirements for communication protection: cryptographic technology may be used data storage, and cryptographic technology shall be adopted to ensure the confidentiality of important data storage. d) Requirements for risk mitigation: see A.1 for possible risks. When there are means of cryptographic technology that can mitigate risks, cryptographic technology shall be adopted to deal with the risks. e) Requirements for system security protection: the network identity service system shall at least comply with Level 2 security requirements specified in GB/T 22239 and shall at least comply with Level 2 cryptographic application technical requirements specified in GB/T 39786. 7.2.4 Level 4 The requirements for Level 4 are as follows. a) Requirements for identity proofing: user identity shall be verified using the mode of in-person identity proofing, and real-name verification shall be performed. b) Requirements for communication protection: cryptographic technology should be used to ensure the integrity of data in the communication process. Cryptographic technology should be adopted to ensure the confidentiality of important data in the communication process (such as: citizen identity numbers, addresses, and scanned copies of important documents, etc.), and cryptographic technology shall be adopted to perform two-way authentication on communication entities. c) Requirements for recording and storage: 1) The identity service provider shall record and store the necessary information for the identity proofing service, including but not limited to the collected user identity information and identification documents, process information generated by identity proofing, and proofing results, etc.; 2) Cryptographic technology shall be adopted to ensure the integrity and confidentiality of important data storage. d) Requirements for risk mitigation: see A.1 for possible risks. When there are means of cryptographic technology that can mitigate risks, cryptographic technology shall be adopted to deal with the risks. e) Requirements for system security protection: the network identity service system shall at least comply with Level 3 security requirements specified in GB/T 22239 and shall at least comply with Level 3 cryptographic application technical requirements specified in GB/T 39786. 7.3 Requirements for Identity Authentication Service 7.3.1 Level 1 The requirements for Level 1 are as follows. a) Requirements for authentication mode: it shall support at least single-factor authentication mode, and any type of authenticator may be used for identity authentication (see Appendix B for authenticator types and authentication modes). b) Requirements for authentication protocol: 1) Dynamic information (such as: random numbers and challenge codes) and timestamps, etc. shall be adopted to prevent replay attacks; 2) When using cryptographic technology for identity authentication, it shall comply with the provisions of GB/T 15843 (all parts); 3) The number of identity authentication attempts within a certain period of time shall be limited, for example, the number of attempts within one minute shall not be higher than 5 times; 4) The requirements for biometric features recognition of mobile equipment shall comply with the provisions of GB/T 37036 (all parts); 5) If dynamic passwords are involved in the authentication, the technical requirements for cryptographic applications of dynamic passwords shall comply with the provisions of GB/T 38556. c) Requirements for authenticator life cycle management: 1) Authenticator binding: two or more types of authenticators may be bound to user identities (see Appendix B for authenticator types and authentication modes); 2) Requirements for authenticator update: users shall be required to update the authenticator at an appropriate time before the existing authenticator expires; shall maintain consistent with the initial authenticator issuance procedure; after the update is successful, the replaced authenticator shall be revoked; 3) Requirements for authenticator theft, damage and duplication: security measures shall be taken to prevent the secret information in the authenticator from being extracted; the suspension and re-activation of the authenticator shall be supported; re-proofing of user identity and binding of a new authenticator shall be supported; 4) Requirements for authenticator expiration: expired authenticators shall no longer be used for identity authentication; when users use an expired authenticator, they shall be informed that the authenticator has expired; expired authenticators shall be properly disposed of; 5) Requirements for authenticator revocation: regularly check whether the identity exists, whether the identity satisfies the qualification requirements, and the risk status of the authenticator, etc. When the identity does not exist, or when the user b) Requirements for authentication protocol: 1) Dynamic information (such as: random numbers and challenge codes) and timestamps, etc. shall be adopted to prevent replay attacks; 2) Cryptographic technology should be used for identity authentication. When using cryptographic technology for identity authentication, it shall comply with the provisions of GB/T 15843 (all parts); 3) The number of identity authentication attempts within a certain period of time shall be limited, for example, the number of attempts within one minute shall not be higher than 5 times; 4) If biometric features are used for authentication, the requirements for biometric features recognition of mobile equipment shall comply with the provisions of GB/T 37036 (all parts); 5) If dynamic passwords are involved in the authentication, the technical requirements for cryptographic applications of dynamic passwords shall comply with the provisions of GB/T 38556. c) Requirements for authenticator life cycle management: 1) Authenticator binding: two or more types of authenticators should be bound to user identities (see Appendix B for authenticator types and authentication modes); 2) Requirements for authenticator update: users shall be required to update the authenticator at an appropriate time before the existing authenticator expires; shall maintain consistent with the initial authenticator issuance procedure; after the update is successful, the replaced authenticator shall be revoked; 3) Requirements for authenticator theft, damage and duplication: security measures shall be taken to prevent the secret information in the authenticator from being extracted; the suspension and re-activation of the authenticator shall be supported; re-proofing of user identity and binding of a new authenticator shall be supported; 4) Requirements for authenticator expiration: expired authenticators shall no longer be used for identity authentication; when users use an expired authenticator, they shall be informed that the authenticator has expired; expired authenticators shall be properly disposed of; 5) Requirements for authenticator revocation: regularly check whether the identity exists, whether the identity satisfies the qualification requirements, and the risk status of the authenticator, etc. When the identity does not exist, or when the user makes a revocation request, or when it is determined that the identity no longer satisfies the qualification requirements, or after the authenticator is updated, the authenticator bound to the identity shall be revoked in time; the revoked authenticator shall no longer be used for identity authentication; when the authenticator is revoked, the authenticator shall be properly disposed of, such as: by destroying it after recycling, and completely eliminating relevant data of the authenticator, etc. d) Requirements for session management: after identity authentication is successful, cryptographic technology may be used to establish a secure session between the identity service provider and the user. Effective technical means shall be adopted to ensure the randomness of information related to the session identifier and to ensure the secure storage and use of generated session-related secret information. e) Requirements for communication protection: cryptographic technology may be adopted to ensure the integrity of data in the communication process, cryptographic technology should be adopted to ensure the confidentiality of important data in the communication process, and cryptographic technology should be adopted to authenticate communication entities. f) Requirements for recording and storage: 1) The identity service provider shall record and store the necessary information for identity authentication, including but not limited to the identity authentication protocols used, identity authentication methods, authenticator-related data, process information generated by identity authentication, and authentication results, etc.; 2) Cryptographic technology should be adopted to ensure the confidentiality and integrity of important data storage. g) Requirements for risk mitigation: see A.2 for possible risks. Cryptographic technology should be adopted to mitigate the possible risks. h) Requirements for system security protection: the network identity service system shall at least comply with Level 1 security requirements specified in GB/T 22239 and shall at least comply with Level 1 cryptographic application technical requirements specified in GB/T 39786. 7.3.3 Level 3 The requirements for Level 3 are as follows. a) Requirements for authentication mode: multi-factor authentication mode shall be used, at least one of the authentication factors is implemented using a cryptographic software authenticator or a cryptographic device authenticator, and the cryptographic module used shall reach Level 2 and above security requirements in GB/T 37092. b) Requirements for authentication protocol: authenticator, etc. d) Requirements for session management: after identity authentication is successful, cryptographic technology may be used to establish a secure session between the identity service provider and the user. Effective technical means shall be adopted to ensure the randomness of information related to the session identifier and to ensure the secure storage and use of generated session-related secret information. e) Requirements for communication protection: cryptographic technology should be adopted to ensure the integrity of data in the communication process, cryptographic technology shall be adopted to ensure the confidentiality of important data in the communication process, and cryptographic technology shall be adopted to authenticate communication entities. f) Requirements for recording and storage: 1) The identity service provider shall record and store the necessary information for identity authentication, including but not limited to the identity authentication protocols used, identity authentication methods, authenticator-related data, process information generated by identity authentication, and authentication results, etc.; 2) Cryptographic technology should be adopted to ensure the integrity of important data storage, and cryptographic technology shall be adopted to ensure the confidentiality of important data storage. g) Requirements for risk mitigation: see A.2 for possible risks. When there are means of cryptographic technology that can mitigate risks, cryptographic technology shall be adopted to deal with the risks. h) Requirements for system security protection: the network identity service system shall at least comply with Level 2 security requirements specified in GB/T 22239 and shall at least comply with Level 2 cryptographic application technical requirements specified in GB/T 39786. 7.3.4 Level 4 The requirements for Level 4 are as follows. a) Requirements for authentication mode: multi-factor authentication mode shall be used, at least one of the authentication factors is implemented using a cryptographic device authenticator, and the cryptographic module used shall reach Level 3 and above security requirements in GB/T 37092. The multi-factor authentication mode should include biometric features authentication factors, including but not limited to face, voiceprint, fingerprint and iris, etc. b) Requirements for authentication protocol: 1) Dynamic information (such as: random numbers and challenge codes) and timestamps, etc. shall be adopted to prevent replay attacks; 2) Cryptographic technology shall be used for identity authentication and shall comply with the provisions of GB/T 15843 (all parts); 3) The number of identity authentication attempts within a certain period of time shall be limited, for example, the number of attempts within one minute shall not be higher than 5 times; 4) If biometric features are used for authentication, the requirements for biometric features recognition of mobile equipment shall comply with the provisions of GB/T 37036 (all parts); 5) If dynamic passwords are involved in the authentication, the technical requirements for cryptographic applications of dynamic passwords shall comply with the provisions of GB/T 38556. c) Requirements for authenticator life cycle management: 1) Authenticator binding: two or more types of authenticators should be bound to user identities (see Appendix B for authenticator types and authentication modes); 2) Requirements for authenticator update: users shall be required to update the authenticator at an appropriate time before the existing authenticator expires; shall maintain consistent with the initial authenticator issuance procedure; after the update is successful, the replaced authenticator shall be revoked; 3) Requirements for authenticator theft, damage and duplication: security measures shall be taken to prevent the secret information in the authenticator from being extracted; the suspension and re-activation of the authenticator shall be supported; re-proofing of user identity and binding of a new authenticator shall be supported; 4) Requirements for authenticator expiration: expired authenticators shall no longer be used for identity authentication; when users use an expired authenticator, they shall be informed that the authenticator has expired; expired authenticators shall be properly disposed of; 5) Requirements for authenticator revocation: regularly check whether the identity exists, whether the identity satisfies the qualification requirements, and the risk status of the authenticator, etc. When the identity does not exist, or when the user makes a revocation request, or when it is determined that the identity no longer satisfies the qualification requirements, or after the authenticator is updated, the authenticator bound to the identity shall be revoked in time; the revoked authenticator shall no longer be used for identity authentication; when the authenticator is revoked, the authenticator shall be properly disposed of, such as: by destroying it after recycling, and completely eliminating relevant data of the 1) Subject [required]: user’s identifier; 2) Issuer [required]: identifier of the identity service provider that issues the assertion; 3) Receiver [required]: identifier of the relying party that receivers the assertion; 4) Issuance time [required]: timestamp when the identity service provider issues the assertion; 5) Deadline [required]: timestamp of when the assertion expires; 6) Identifier [required]: a value that uniquely identifies this assertion; 7) Signature [required]: the identity service provider’s digital signature or message authentication code for the assertion; 8) Authentication time [required]: timestamp of the last time that the identity service provider performs identity authentication on the user; 9) Key binding [optional]: key identifier or public key owned by the user; 10) Attributes and attribute references [optional]: user attribute information; 11) Attribute metadata [optional]: additional information describing user attributes. c) The assertions can be divided into bearer assertion and holder-of-key assertion. When using bearer assertion, there is no need to verify that the holder of the assertion is the assertion subject. When using holder-of-key assertion, it is necessary to adopt cryptographic technology to verify that the holder of the assertion is the assertion subject. The assertion type may use bearer assertion or holder-of-key assertion. d) The assertion shall be signed. See the requirements below: 1) The signature content shall cover all important fields, including but not limited to identifier, issuer, recipient, subject and deadline; 2) The assertion shall be signed by the identity service provider, and the signature of the identity service provider shall be verified by the relying party to ensure the integrity of the assertion; 3) Assertion signature can be implemented in the following modes: ---Use the signature private key of the identity service provider to generate the digital signature of the assertion; ---Use the secret information shared by the identity service provider and the relying party to generate the message authentication code of the assertion; ......
 
Source: Above contents are excerpted from the PDF -- translated/reviewed by: www.chinesestandard.net / Wayne Zheng et al.