GB/T 41815.2-2022 English PDFUS$409.00 ยท In stock
Delivery: <= 4 days. True-PDF full-copy in English will be manually translated and delivered via email. GB/T 41815.2-2022: Information technology - Biometric presentation attack detection - Part 2: Data formats Status: Valid
Basic dataStandard ID: GB/T 41815.2-2022 (GB/T41815.2-2022)Description (Translated English): Information technology - Biometric presentation attack detection - Part 2: Data formats Sector / Industry: National Standard (Recommended) Classification of Chinese Standard: L71 Classification of International Standard: 35.040 Word Count Estimation: 22,263 Date of Issue: 2022-10-14 Date of Implementation: 2023-05-01 Issuing agency(ies): State Administration for Market Regulation, China National Standardization Administration GB/T 41815.2-2022: Information technology - Biometric presentation attack detection - Part 2: Data formats---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order. Information technology -- Biometric presentation attack detection -- Part 2.Data formats ICS 35.040 CCSL71 National Standards of People's Republic of China Information Technology Biometrics Presentation Attack Detection Part 2.Data Format Part 2.Dataformats (ISO /IEC 30107-2.2017, MOD) Published on 2022-10-12 2023-05-01 Implementation State Administration for Market Regulation Released by the National Standardization Administration directory Preface I Introduction II 1 Scope 1 2 Normative references 1 3 Terms and Definitions 1 4 Compliance 1 5 Data Element 2 5.1 Overview 2 5.2 PAD output 2 5.3 PAD input 4 Appendix A (Normative) Standard Format 7 Appendix B (Informative) PAD Coding Example 17 Reference 19 forewordThis document is in accordance with the provisions of GB/T 1.1-2020 "Guidelines for Standardization Work Part 1.Structure and Drafting Rules of Standardization Documents" drafted. This document is part 2 of GB/T 41815 "Information Technology Biometrics Presenting Attack Detection". GB/T 41815 has The following sections were published. --- Part 1.Framework; --- Part 2.Data format; --- Part 3.Testing and reporting. This document is modified to adopt ISO /IEC 30107-2.2017 "Information Technology Biometric Presence Attack Detection Part 2.Data Format". The technical differences between this document and ISO /IEC 30107-2.2017 and their reasons are as follows. --- Replaced ISO /IEC 2382-37 (see Chapter 3) with the normatively cited GB/T 5271.37, increasing operability; --- Replaced ISO /IEC 30107-1 (see Chapter 3) with the normatively cited GB/T 41815.1 to adapt to my country's technical regulations parts to increase operability; --- Replaced ISO /IEC 8824-1 (see Appendix A.1.1) with the normatively cited GB/T 16262.1 to adapt to my country's technical regulations parts to increase operability; --- Replaced ISO /IEC 8825-1 (see Appendix A.1.1, Appendix A.1.3) with the normatively cited GB/T 16263.1 to adapt to the The technical conditions of the country increase the operability. The following editorial changes have been made to this document. --- Added the notes of 5.2.2, 5.2.3, 5.2.5, 5.2.6, 5.3.8. Please note that some content of this document may be patented. The issuing agency of this document assumes no responsibility for identifying patents. This document is proposed and managed by the National Information Technology Standardization Technical Committee (SAC/TC28). This document is drafted by. China Electronics Standardization Institute, Yuncong Technology Group Co., Ltd., Shanghai SenseTime Intelligent Technology Co., Ltd. Co., Ltd., Xiamen Meiya Pike Information Co., Ltd., Wuhan Hongshi Technology Co., Ltd., Beijing Megvii Technology Co., Ltd., Shenzhen Aiku Intelligent Technology Co., Ltd., Fuzhou Data Technology Research Institute Co., Ltd., Guangdong Jiulian Technology Co., Ltd., Guangzhou Myron Information Technology Co., Ltd. Co., Ltd., Hangzhou Hikvision Digital Technology Co., Ltd., Huizhou University, Ant Technology Group Co., Ltd., Newland Digital Technology Co., Ltd., Beijing Shuguang Yitong Technology Co., Ltd., Beijing Zhongke Hongba Technology Co., Ltd., Hangzhou Jinglianwen Technology Co., Ltd., Kazakhstan Erbin University of Technology, Guangzhou Guangdian Express Financial Electronics Co., Ltd., Beijing Chichuang North Technology Co., Ltd., Shanghai Yitu Network Technology Co., Ltd., Xi'an Kaihong Electronic Technology Co., Ltd., Shenzhen Mingtu Innovation Technology Co., Ltd., Beijing Wanlihong Technology Co., Ltd. Company, Shanghai Dian and Mian Intelligent Technology Co., Ltd. The main drafters of this document. Zhong Chen, Shi Chunteng, Li Jun, Jiang Hui, Chen Chen, Chen Zifeng, Wang Wenfeng, Song Jiwei, Liu Qianying, Yi Kaijun, Mei Jingqing, Yang Chunlin, Zheng Wenqiang, He Qiang, Cui Fengke, Peng Jin, Wang Jun, Ren Wenqi, Huang Jianfeng, Lin Guanchen, Cai Chunshui, Yu Xueping, Li Xingguang, Liu Yuntao, Song Fangfang, Luo Zhongliang, Zhang Yahao, Zhang Wei, Fan Lei, Zhao Chunhao, Xu Jianmin, Li Qingshun, Zhang Xiaoliang, Cheng Zhiguo, Jiang Yan, Quan Manli, Luo Heng.IntroductionThe process of presenting prosthetic or human features to the biometric acquisition subsystem in a manner that may interfere with the intended strategy of the biometric system. This process is called a presentation attack. GB/T 41815 focuses on automatic detection mechanisms for presentation attacks. These mechanisms are called presence attack detection (PAD) mechanism. This document constructs a common data format for conveying the type of attack detection method and the results of the attack detection method. this document Specifies the meaning of the data elements in the presentation attack detection data format, see clause 5.These include an extensible specification based on ASN.1 Tagged binary PAD data format, see A.1 in Appendix A; text PAD data format defined based on XML schema, see Appendix A.2 in A. Normative Appendix A includes formal coding specifications, and informative Appendix B gives coding examples. GB/T 41815 "Information Technology Biometric Recognition Present Attack Detection" stipulates the present attack detection phase in the field of biometric identification. The relevant framework, data format, and test-related content are used to facilitate the evaluation of the design of the attack detection function and its ability. GB/T 41815 is intended to consist of three parts. --- Part 1.Framework. The purpose is to establish an overall framework related to attack detection in biometric identification systems. --- Part 2.Data format. The purpose is to standardize the data format for presenting attack detection. --- Part 3.Testing and reporting. The purpose is to clearly present the various factors that need to be considered in the assessment of attack detection capabilities and the evaluation Evaluation principles and methods. To standardize the objects related to attack detection, it is necessary to first clearly present the attack detection framework as a whole to guide the attack detection. The definition of classification and tools, secondly, in order to exchange and share related data elements, it is necessary to define a clear and unified data format, and finally in the When evaluating the presentation attack detection capability, it is necessary to clarify the test object, test environment and test indicators to guide the presentation attack detection capability. Conduct scientific and objective assessments. Information Technology Biometrics Presentation Attack Detection Part 2.Data Format1 ScopeThis document specifies the use of binary format and Extensible Markup Language (XML) representation in biometric identification to present attack detection methods. Use specific mechanisms and a common data format for the exchange of detection results. This document is intended to regulate the presence of attack detection related to sensor acquisition of biometric identification characteristics in different application fields. data. This document does not apply to specifications presenting attack detection data in relation to authenticity, integrity and confidentiality during storage and transmission information. NOTE. Although addressing security issues is beyond the scope of this document, see GB/T 28826.1, by encoding PAD data as raw materials containing optional security blocks Object feature information records to protect PAD data.2 Normative referencesThe contents of the following documents constitute essential provisions of this document through normative references in the text. Among them, dated citations documents, only the version corresponding to that date applies to this document; for undated references, the latest edition (including all amendments) applies to this document. GB/T 5271.37 Information Technology Vocabulary Part 37.Biometric Identification (GB/T 5271.37-2021, ISO / IEC 2382-37.2017, MOD) GB/T 16262.1 Information Technology Abstract Syntax Notation One (ASN.1) Part 1.Basic Notation Specification (GB/T 16262.1- 2006, ISO /IEC 8824-1.2002, IDT) GB/T 16263.1 Information Technology ASN.1 Coding Rules Part 1.Basic Coding Rules (BER), Regular Coding Rules (CER) and Atypical Encoding Rules (DER) specification (GB/T 16263.1-2006, ISO /IEC 8825-1.2002, IDT) GB/T 41815.1 Information Technology Biometrics Presentation Attack Detection Part 1.Framework (GB/T 41815.1-2022, ISO /IEC 30107-1.2016, IDT) ISO /IEC 19785-1 Information Technology Common Biometric Exchange Format Framework Part 1.Specification of Data Elements (Infor- cation) Note. GB/T 28826.1-2012 Information Technology Common Biometrics Exchange Format Framework Part 1.Data Element Specification (ISO / IEC 19785-1.2006, MOD) ISO 80000 (all parts) Quantities and units Terms and definitions defined in GB/T 5271.37 and GB/T 41815.1 apply to this document.4 ComplianceA Presence Attack Detection (PAD) data block complies with this document if it meets the relevant requirements of Clause 5 and Annex A, A.1 or A.2, respectively ......Tips & Frequently Asked Questions:Question 1: How long will the true-PDF of GB/T 41815.2-2022_English be delivered?Answer: Upon your order, we will start to translate GB/T 41815.2-2022_English as soon as possible, and keep you informed of the progress. The lead time is typically 2 ~ 4 working days. The lengthier the document the longer the lead time.Question 2: Can I share the purchased PDF of GB/T 41815.2-2022_English with my colleagues?Answer: Yes. The purchased PDF of GB/T 41815.2-2022_English will be deemed to be sold to your employer/organization who actually pays for it, including your colleagues and your employer's intranet.Question 3: Does the price include tax/VAT?Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countriesQuestion 4: Do you accept my currency other than USD?Answer: Yes. If you need your currency to be printed on the invoice, please write an email to Sales@ChineseStandard.net. In 2 working-hours, we will create a special link for you to pay in any currencies. Otherwise, follow the normal steps: Add to Cart -- Checkout -- Select your currency to pay. |