US$419.00 ยท In stock Delivery: <= 4 days. True-PDF full-copy in English will be manually translated and delivered via email. GB/T 37036.8-2022: Information technology - Biometrics used with mobile devices - Part 8: Presentation attack detection Status: Valid
Standard ID | Contents [version] | USD | STEP2 | [PDF] delivered in | Standard Title (Description) | Status | PDF |
GB/T 37036.8-2022 | English | 419 |
Add to Cart
|
4 days [Need to translate]
|
Information technology - Biometrics used with mobile devices - Part 8: Presentation attack detection
| Valid |
GB/T 37036.8-2022
|
PDF similar to GB/T 37036.8-2022
Basic data Standard ID | GB/T 37036.8-2022 (GB/T37036.8-2022) | Description (Translated English) | Information technology - Biometrics used with mobile devices - Part 8: Presentation attack detection | Sector / Industry | National Standard (Recommended) | Classification of Chinese Standard | L67 | Classification of International Standard | 35.240.01 | Word Count Estimation | 20,297 | Date of Issue | 2022-12-30 | Date of Implementation | 2023-07-01 | Issuing agency(ies) | State Administration for Market Regulation, China National Standardization Administration |
GB/T 37036.8-2022: Information technology - Biometrics used with mobile devices - Part 8: Presentation attack detection ---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order.
ICS 35.240.01
CCSL67
National Standards of People's Republic of China
Information technology mobile device biometrics
Part 8.Rendering attack detection
Posted on 2022-12-30
2023-07-01 implementation
State Administration for Market Regulation
Released by the National Standardization Management Committee
table of contents
Preface III
Introduction IV
1 Scope 1
2 Normative references 1
3 Terms and Definitions 1
4 Abbreviations 1
5 PAD process 2
5.1 General framework of PAD system 2
5.2 PAD Technical Architecture 2
6 PAD system detection technical requirements 3
6.1 Overview of PAD implementation 3
6.2 PAD local detection mode 3
6.3 PAD remote detection mode 4
6.4 PAD Local Remote Hybrid Detection Mode 4
6.5 PAD functional requirements 5
7 PAD test report and evaluation 6
7.1 General requirements 6
7.2 Attacker types 6
7.3 Assessment Types of PAD 6
7.4 Evaluation Objects of PAD Mechanism 6
7.5 Business process dependencies 7
Appendix A (informative) Presentation attacks on mobile devices8
Appendix B (informative) PAD classification and model 11
Reference 13
foreword
This document is in accordance with the provisions of GB/T 1.1-2020 "Guidelines for Standardization Work Part 1.Structure and Drafting Rules for Standardization Documents"
drafting.
This document is part 8 of GB/T 37036 "Biometric Identification of Information Technology Mobile Devices". GB/T 37036 has been published
the following sections.
--- Part 1.General requirements;
--- Part 2.Fingerprint;
--- Part 3.Human face;
--- Part 4.Iris;
--- Part 6.Finger veins;
--- Part 7.Multimodal;
--- Part 8.Presentation attack detection.
Please note that some contents of this document may refer to patents. The issuing agency of this document assumes no responsibility for identifying patents.
This document is proposed and managed by the National Information Technology Standardization Technical Committee (SAC/TC28).
This document was drafted by. Alipay (China) Network Technology Co., Ltd., East China Branch of China Electronics Standardization Institute, Human Resources
Source and Information Center of the Ministry of Social Security, Xiamen Yicheng Information Technology Co., Ltd., Newland Digital Technology Co., Ltd., Beijing Megvii
Technology Co., Ltd., Ant Technology Group Co., Ltd., China Electronics Standardization Research Institute, Zhejiang Standardization Research Institute, Beijing Zhongke
Hongba Technology Co., Ltd., Beijing Shuguang Yitong Technology Co., Ltd., Beijing Deyi Yintong Technology Co., Ltd., Beijing Eyes Intelligent Technology Co., Ltd.
Co., Ltd., Lenovo Zhongtian Technology Co., Ltd., Shanghai SenseTime Intelligent Technology Co., Ltd., Xiaomi Technology Co., Ltd., Huawei Terminal Co., Ltd.
Company, Guangdong Jiulian Technology Co., Ltd., Beijing Zunguan Technology Co., Ltd., Xi'an Kaihong Electronic Technology Co., Ltd., Beijing University of Posts and Telecommunications
Science, Beijing Qihoo Technology Co., Ltd., Jianxin Financial Technology Co., Ltd., Wuhan Hongshi Technology Co., Ltd., Zhejiang University, Huizhou University,
Beijing Wanlihong Technology Co., Ltd., Tianfu (Dongguan) Standard Technology Co., Ltd., Shenzhen Mingtu Innovation Technology Co., Ltd., State Grid Blockchain
Technology (Beijing) Co., Ltd., Ziguang Tongxin Microelectronics Co., Ltd., and Guangdong Zhongke Zhenheng Information Technology Co., Ltd.
The main drafters of this document. Lin Guanchen, Zhong Chen, Wang Wenfeng, Li Liang, Song Jiwei, Peng Jin, Chen Jidong, Ding Jingting, Lang Junqi, Guo Mingyu,
Chen Tao, Wang Zhifei, Shi Hongyan, Chen Jianlong, Mei Jingqing, Gao Jian, Liu Qianying, Jiang Jianping, Lu Xiaosi, Li Xingguang, Yang Chunlin, Zhang Yahao, Zheng Fang,
Li Yang, Jiang Hui, Zhu Yajun, Wang Sishan, He Qiang, Gong Qiong, Huang Guiling, Xu Jianmin, He Zhaofeng, Zhang Yi, Liu Lijuan, Gao Junxiong, Zhang Bingsheng, Wei Xiaohui,
Luo Sixin, Zhang Xiaoliang, Yang Zhanjin, Wang Cheng, Li Qingshun, Wang Dong, Lai Huatian, Yang Jingfeng.
Introduction
GB/T 37036 "Information Technology Mobile Device Biometric Identification" is proposed to be composed of 9 parts.
--- Part 1.General requirements. The purpose is to establish the technical framework, common process and ticket requirements for biometric identification of mobile devices.
--- Part 2.Fingerprints. The purpose is to establish the processes and requirements for fingerprint biometric identification of mobile devices.
--- Part 3.Human face. The purpose is to establish the process and requirements for face biometrics on mobile devices.
--- Part 4.Iris. The purpose is to establish the processes and requirements for iris biometrics on mobile devices.
--- Part 5.Voiceprint. The purpose is to establish the procedures and requirements for voiceprint biometric identification of mobile devices.
--- Part 6.Finger veins. The purpose is to establish the process and requirements for finger vein biometrics on mobile devices.
--- Part 7.Multimodal. The purpose is to establish the processes and requirements for multimodal biometric identification on mobile devices.
--- Part 8.Presentation attack detection. The purpose is to specify mobile device presentation attack detection requirements.
--- Part 9.Test methods. The purpose is to describe functional and performance testing methods for different types of biometric identification in mobile devices.
With the gradual maturity of mobile device biometric identification technology and industrial development, for mobile device fingerprint, face, iris, voiceprint, fingerprint
Concerns about presenting attacks in modalities such as veins and multimodality also increase, and the importance of presenting attack detection is further highlighted, and the demand for standardization is becoming more and more
It is becoming more and more intense that it is necessary to formulate relevant standards to ensure the healthy, benign and orderly development of the mobile device biometric identification industry. This document gives
Mobile devices present attack detection technical requirements.
Information technology mobile device biometrics
Part 8.Rendering attack detection
1 Scope
This document defines the biometric identification presentation attack detection process of mobile devices, and puts forward the technical requirements for presentation attack system detection.
The testing and reporting requirements for the evaluation of mobile device presentation attack detection are given.
This document is applicable to activities such as the design, application, and evaluation of biometric presence attack detection on mobile devices.
2 Normative references
This document has no normative references.
3 Terms and Definitions
The following terms and definitions apply to this document.
3.1
presentation attack
An attack on the biometric data acquisition module for the purpose of interfering with the operation of the biometric identification system.
[Source. GB/T 5271.37-2021, 3.6.25]
3.2
Automatic detection of rendering attacks.
3.3
biometric impostor biometricimposter
Destructive biometric capture agents that perform biometric impersonation attacks.
[Source. GB/T 5271.37-2021, 3.7.13]
3.4
biometric concealer biometricconcealer
A biometric collection subject that performs a biometric masking attack.
Note. The biometric masker is generally the biometric subject himself.
3.5
Presents a fake biometric or object used in the attack.
4 Abbreviations
The following acronyms apply to this document.
IUT. Object Under Test (ItemUnderTest)
Tips & Frequently Asked Questions:Question 1: How long will the true-PDF of GB/T 37036.8-2022_English be delivered?Answer: Upon your order, we will start to translate GB/T 37036.8-2022_English as soon as possible, and keep you informed of the progress. The lead time is typically 2 ~ 4 working days. The lengthier the document the longer the lead time. Question 2: Can I share the purchased PDF of GB/T 37036.8-2022_English with my colleagues?Answer: Yes. The purchased PDF of GB/T 37036.8-2022_English will be deemed to be sold to your employer/organization who actually pays for it, including your colleagues and your employer's intranet. Question 3: Does the price include tax/VAT?Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countriesQuestion 4: Do you accept my currency other than USD?Answer: Yes. If you need your currency to be printed on the invoice, please write an email to [email protected]. In 2 working-hours, we will create a special link for you to pay in any currencies. Otherwise, follow the normal steps: Add to Cart -- Checkout -- Select your currency to pay.
|