|
US$419.00 · In stock Delivery: <= 4 days. True-PDF full-copy in English will be manually translated and delivered via email. GA/T 1723.4-2020: CTID online authentication - Authentication services - Part 4:TEchnical requirements for facial image capture control Status: Valid
| Standard ID | Contents [version] | USD | STEP2 | [PDF] delivered in | Standard Title (Description) | Status | PDF |
| GA/T 1723.4-2020 | English | 419 |
Add to Cart
|
4 days [Need to translate]
|
CTID online authentication - Authentication services - Part 4:TEchnical requirements for facial image capture control
| Valid |
GA/T 1723.4-2020
|
PDF similar to GA/T 1723.4-2020
Basic data | Standard ID | GA/T 1723.4-2020 (GA/T1723.4-2020) | | Description (Translated English) | CTID online authentication - Authentication services - Part 4:TEchnical requirements for facial image capture control | | Sector / Industry | Public Security (Police) Industry Standard (Recommended) | | Classification of Chinese Standard | A90 | | Classification of International Standard | 35.240.15 | | Word Count Estimation | 18,113 | | Date of Issue | 2020-06-03 | | Date of Implementation | 2020-10-01 | | Issuing agency(ies) | Ministry of Public Security |
GA/T 1723.4-2020: CTID online authentication - Authentication services - Part 4:TEchnical requirements for facial image capture control ---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order.
CTID online authentication - Authentication services - Part 4:Technical requirements for facial image capture control
ICS 35:240:15
A90
Public Safety Industry Standards of the People's Republic of China
Resident identity network authentication service
Part 4: Technical requirements for face image acquisition controls
2020-06-03 released
2020-10-01 implementation
Issued by the Ministry of Public Security of the People's Republic of China
Table of contents
Preface Ⅲ
Introduction Ⅳ
1 Scope 1
2 Normative references 1
3 Terms, definitions and abbreviations 1
3:1 Terms and definitions 1
3:2 Abbreviations 2
4 General 2
4:1 Overview 2
4:2 Function 3
5 Functional requirements 3
5:1 Overview 3
5:2 Video interaction 3
5:3 Anti-prosthesis attack 4
5:4 Image acquisition 4
6 Performance requirements 4
7 Image requirements 4
7:1 Image format 4
7:2 File size 4
7:3 Image Security 4
7:4 Shading 4
7:5 Distance between eyes 4
7:6 Posture 4
7:7 Glasses 4
7:8 Brightness and contrast 5
7:9 Clarity 5
Appendix A (informative appendix) Example 6 of ambient light requirements for collection equipment
A:1 Self-service collection equipment 6
A:2 Mobile collection equipment 8
Appendix B (Normative Appendix) Requirements for Anti-Prosthesis Attack 9
B:1 Two-dimensional anti-prosthesis attack 9
B:2 Three-dimensional anti-prosthesis attack 10
Reference 11
Figure 1 The overall technical framework of the resident identity network authentication system 3
Figure A:1 Front view 6
Figure A:2 Side view 7
Figure A:3 Top view 7
Table 1 Anti-prosthesis attack performance requirements 4
Table B:1 Two-dimensional static paper image attack 9
Table B:2 Two-dimensional static electronic image attack 9
Table B:3 Two-dimensional dynamic image attack 9
Table B:4 Three-dimensional mask attack 10
Table B:5 Three-dimensional headform attack 10
Foreword
GA/T 1723 "Resident Online Identity Authentication Service" is divided into five parts:
---Part 1: Certification classification;
---Part 2: Service interface requirements;
---Part 3: Information acquisition control interface requirements;
---Part 4: Technical requirements for face image acquisition controls;
---Part 5: Face comparison engine interface requirements:
This part is part 4 of GA/T 1723:
This section was drafted in accordance with the rules given in GB/T 1:1-2009:
Please note that certain contents of this document may involve patents: The issuing agency of this document is not responsible for identifying these patents:
This part was proposed and managed by the Technical Committee for the Standardization of Social and Public Security Applications of the Ministry of Public Security:
Drafting organizations of this section: The First Research Institute of the Ministry of Public Security, Beijing Zhongdun Anxin Technology Development Co:, Ltd:, Beijing Zhongdun Security Technology Development Corporation
Company, Guangzhou Pixel Data Technology Co:, Ltd:, Beijing Shangtang Technology Development Co:, Ltd:, Chongqing Zhongke Yuncong Technology Co:, Ltd:, Zhejiang
Ant Small and Micro Financial Services Group Co:, Ltd:, Shenzhen Tencent Computer System Co:, Ltd:, Beijing Megvii Technology Co:, Ltd:, Ministry of Public Security
Quanyu Police Electronic Product Quality Inspection Center, Hangzhou Hikvision Digital Technology Co:, Ltd:, etc:
The main drafters of this section: Tian Qiang, Li Zhiyuan, Lu Zhanbin, Yao Ruoguang, Xie Yufeng, Li Jun, Gu Chen, Wang Xin, Yang Xiaoguang, Lu Meng, Liu Jun,
Xu Lu, Du Wei, Chen Setao:
Introduction
Resident identity network authentication is one of the important links in the national implementation of the network credible identity strategy: Due to the virtual nature of the Internet
Point, the traditional identity authentication method can no longer meet the needs of network user applications, and network identity authentication has a variety of authentication methods,
Identity information is difficult to distinguish between true and false and other disadvantages, and it has caused new security issues such as data leakage, identity fraud, and privacy dissemination, and even threatened the country:
Safety: For this reason, it is urgent to carry out research from the perspective of standardization to build a safe, convenient, and unified resident identity network authentication technical framework, so as
The identity and authentication of residents in the network space provide security guarantees, which will improve my country’s network identity management level and realize the modernization of network social governance
For technical support:
In order to meet the factors of defending against malicious prosthetic attacks, resisting illegal data tampering and improving image quality differences in the process of face image collection
The application requirements of the face image collection control require the technical indicators of the anti-prosthesis attack technology and the output image quality requirements of the face image collection control
And the encryption method of the image is standardized, and this part is specially formulated:
Resident identity network authentication service
Part 4: Technical requirements for face image acquisition controls
1 Scope
This part of GA/T 1723 specifies the functions, performance, and requirements of the output image of the face image acquisition control in the resident identity network authentication:
Please wait:
This part is applicable to the collection and storage of facial images in resident identity network authentication:
2 Normative references
The following documents are indispensable for the application of this document: For dated reference documents, only the dated version applies to this article
Pieces: For undated references, the latest version (including all amendments) applies to this document:
GB/T 17235:1-1998 Information Technology Digital Compression and Coding of Continuous Tone Still Images Part 1: Requirements and Guidelines
GB/T 35275-2017 Information Security Technology SM2 Cryptographic Algorithm Encrypted Signature Message Syntax Specification
GB/T 37036:1-2018 Information Technology Mobile Device Biometric Recognition Part 1: General Requirements
GA/T 1212-2014 Security face recognition application anti-prosthesis attack test method
GA/T 1721 General Terms for Resident Identity Network Authentication
GA/T 1722 Overall Technical Framework of Resident Identity Network Authentication
3 Terms, definitions and abbreviations
3:1 Terms and definitions
The following terms and definitions defined in GB/T 37036:1-2018, GA/T 1212-2014 and GA/T 1721 apply to this article
Pieces: For ease of use, some terms and terms in GB/T 37036:1-2018 and GA/T 1212-2014 are repeatedly listed below:
definition:
3:1:1
Liveface
Real human face with life:
[GA/T 1212-2014, definition 3:2]
3:1:2
Facial liveness detection
The process of detecting whether the collected face image is from a living face:
3:1:3
Fakeface
A fake face posing as a real person:
Note: Counterfeit products such as face photos, face videos and artificial face masks:
[GA/T 1212-2014, definition 3:1]
Tips & Frequently Asked Questions:Question 1: How long will the true-PDF of GA/T 1723.4-2020_English be delivered?Answer: Upon your order, we will start to translate GA/T 1723.4-2020_English as soon as possible, and keep you informed of the progress. The lead time is typically 2 ~ 4 working days. The lengthier the document the longer the lead time. Question 2: Can I share the purchased PDF of GA/T 1723.4-2020_English with my colleagues?Answer: Yes. The purchased PDF of GA/T 1723.4-2020_English will be deemed to be sold to your employer/organization who actually pays for it, including your colleagues and your employer's intranet. Question 3: Does the price include tax/VAT?Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countriesQuestion 4: Do you accept my currency other than USD?Answer: Yes. If you need your currency to be printed on the invoice, please write an email to [email protected]. In 2 working-hours, we will create a special link for you to pay in any currencies. Otherwise, follow the normal steps: Add to Cart -- Checkout -- Select your currency to pay.
|