HOME   Cart(0)   Quotation   About-Us Policy PDFs Standard-List
www.ChineseStandard.net Database: 189760 (18 Oct 2025)

GB/T 37036.8-2022 English PDF

US$419.00 ยท In stock
Delivery: <= 4 days. True-PDF full-copy in English will be manually translated and delivered via email.
GB/T 37036.8-2022: Information technology - Biometrics used with mobile devices - Part 8: Presentation attack detection
Status: Valid
Standard IDContents [version]USDSTEP2[PDF] delivered inStandard Title (Description)StatusPDF
GB/T 37036.8-2022English419 Add to Cart 4 days [Need to translate] Information technology - Biometrics used with mobile devices - Part 8: Presentation attack detection Valid GB/T 37036.8-2022

PDF similar to GB/T 37036.8-2022


Standard similar to GB/T 37036.8-2022

GB/T 38633   GB/T 38666   GB/T 38672   GB/T 37036.7   GB/T 37036.9   GB/T 37036.5   

Basic data

Standard ID GB/T 37036.8-2022 (GB/T37036.8-2022)
Description (Translated English) Information technology - Biometrics used with mobile devices - Part 8: Presentation attack detection
Sector / Industry National Standard (Recommended)
Classification of Chinese Standard L67
Classification of International Standard 35.240.01
Word Count Estimation 20,297
Date of Issue 2022-12-30
Date of Implementation 2023-07-01
Issuing agency(ies) State Administration for Market Regulation, China National Standardization Administration

GB/T 37036.8-2022: Information technology - Biometrics used with mobile devices - Part 8: Presentation attack detection


---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order.
ICS 35.240.01 CCSL67 National Standards of People's Republic of China Information technology mobile device biometrics Part 8.Rendering attack detection Posted on 2022-12-30 2023-07-01 implementation State Administration for Market Regulation Released by the National Standardization Management Committee

table of contents

Preface III Introduction IV 1 Scope 1 2 Normative references 1 3 Terms and Definitions 1 4 Abbreviations 1 5 PAD process 2 5.1 General framework of PAD system 2 5.2 PAD Technical Architecture 2 6 PAD system detection technical requirements 3 6.1 Overview of PAD implementation 3 6.2 PAD local detection mode 3 6.3 PAD remote detection mode 4 6.4 PAD Local Remote Hybrid Detection Mode 4 6.5 PAD functional requirements 5 7 PAD test report and evaluation 6 7.1 General requirements 6 7.2 Attacker types 6 7.3 Assessment Types of PAD 6 7.4 Evaluation Objects of PAD Mechanism 6 7.5 Business process dependencies 7 Appendix A (informative) Presentation attacks on mobile devices8 Appendix B (informative) PAD classification and model 11 Reference 13

foreword

This document is in accordance with the provisions of GB/T 1.1-2020 "Guidelines for Standardization Work Part 1.Structure and Drafting Rules for Standardization Documents" drafting. This document is part 8 of GB/T 37036 "Biometric Identification of Information Technology Mobile Devices". GB/T 37036 has been published the following sections. --- Part 1.General requirements; --- Part 2.Fingerprint; --- Part 3.Human face; --- Part 4.Iris; --- Part 6.Finger veins; --- Part 7.Multimodal; --- Part 8.Presentation attack detection. Please note that some contents of this document may refer to patents. The issuing agency of this document assumes no responsibility for identifying patents. This document is proposed and managed by the National Information Technology Standardization Technical Committee (SAC/TC28). This document was drafted by. Alipay (China) Network Technology Co., Ltd., East China Branch of China Electronics Standardization Institute, Human Resources Source and Information Center of the Ministry of Social Security, Xiamen Yicheng Information Technology Co., Ltd., Newland Digital Technology Co., Ltd., Beijing Megvii Technology Co., Ltd., Ant Technology Group Co., Ltd., China Electronics Standardization Research Institute, Zhejiang Standardization Research Institute, Beijing Zhongke Hongba Technology Co., Ltd., Beijing Shuguang Yitong Technology Co., Ltd., Beijing Deyi Yintong Technology Co., Ltd., Beijing Eyes Intelligent Technology Co., Ltd. Co., Ltd., Lenovo Zhongtian Technology Co., Ltd., Shanghai SenseTime Intelligent Technology Co., Ltd., Xiaomi Technology Co., Ltd., Huawei Terminal Co., Ltd. Company, Guangdong Jiulian Technology Co., Ltd., Beijing Zunguan Technology Co., Ltd., Xi'an Kaihong Electronic Technology Co., Ltd., Beijing University of Posts and Telecommunications Science, Beijing Qihoo Technology Co., Ltd., Jianxin Financial Technology Co., Ltd., Wuhan Hongshi Technology Co., Ltd., Zhejiang University, Huizhou University, Beijing Wanlihong Technology Co., Ltd., Tianfu (Dongguan) Standard Technology Co., Ltd., Shenzhen Mingtu Innovation Technology Co., Ltd., State Grid Blockchain Technology (Beijing) Co., Ltd., Ziguang Tongxin Microelectronics Co., Ltd., and Guangdong Zhongke Zhenheng Information Technology Co., Ltd. The main drafters of this document. Lin Guanchen, Zhong Chen, Wang Wenfeng, Li Liang, Song Jiwei, Peng Jin, Chen Jidong, Ding Jingting, Lang Junqi, Guo Mingyu, Chen Tao, Wang Zhifei, Shi Hongyan, Chen Jianlong, Mei Jingqing, Gao Jian, Liu Qianying, Jiang Jianping, Lu Xiaosi, Li Xingguang, Yang Chunlin, Zhang Yahao, Zheng Fang, Li Yang, Jiang Hui, Zhu Yajun, Wang Sishan, He Qiang, Gong Qiong, Huang Guiling, Xu Jianmin, He Zhaofeng, Zhang Yi, Liu Lijuan, Gao Junxiong, Zhang Bingsheng, Wei Xiaohui, Luo Sixin, Zhang Xiaoliang, Yang Zhanjin, Wang Cheng, Li Qingshun, Wang Dong, Lai Huatian, Yang Jingfeng.

Introduction

GB/T 37036 "Information Technology Mobile Device Biometric Identification" is proposed to be composed of 9 parts. --- Part 1.General requirements. The purpose is to establish the technical framework, common process and ticket requirements for biometric identification of mobile devices. --- Part 2.Fingerprints. The purpose is to establish the processes and requirements for fingerprint biometric identification of mobile devices. --- Part 3.Human face. The purpose is to establish the process and requirements for face biometrics on mobile devices. --- Part 4.Iris. The purpose is to establish the processes and requirements for iris biometrics on mobile devices. --- Part 5.Voiceprint. The purpose is to establish the procedures and requirements for voiceprint biometric identification of mobile devices. --- Part 6.Finger veins. The purpose is to establish the process and requirements for finger vein biometrics on mobile devices. --- Part 7.Multimodal. The purpose is to establish the processes and requirements for multimodal biometric identification on mobile devices. --- Part 8.Presentation attack detection. The purpose is to specify mobile device presentation attack detection requirements. --- Part 9.Test methods. The purpose is to describe functional and performance testing methods for different types of biometric identification in mobile devices. With the gradual maturity of mobile device biometric identification technology and industrial development, for mobile device fingerprint, face, iris, voiceprint, fingerprint Concerns about presenting attacks in modalities such as veins and multimodality also increase, and the importance of presenting attack detection is further highlighted, and the demand for standardization is becoming more and more It is becoming more and more intense that it is necessary to formulate relevant standards to ensure the healthy, benign and orderly development of the mobile device biometric identification industry. This document gives Mobile devices present attack detection technical requirements. Information technology mobile device biometrics Part 8.Rendering attack detection

1 Scope

This document defines the biometric identification presentation attack detection process of mobile devices, and puts forward the technical requirements for presentation attack system detection. The testing and reporting requirements for the evaluation of mobile device presentation attack detection are given. This document is applicable to activities such as the design, application, and evaluation of biometric presence attack detection on mobile devices.

2 Normative references

This document has no normative references.

3 Terms and Definitions

The following terms and definitions apply to this document. 3.1 presentation attack An attack on the biometric data acquisition module for the purpose of interfering with the operation of the biometric identification system. [Source. GB/T 5271.37-2021, 3.6.25] 3.2 Automatic detection of rendering attacks. 3.3 biometric impostor biometricimposter Destructive biometric capture agents that perform biometric impersonation attacks. [Source. GB/T 5271.37-2021, 3.7.13] 3.4 biometric concealer biometricconcealer A biometric collection subject that performs a biometric masking attack. Note. The biometric masker is generally the biometric subject himself. 3.5 Presents a fake biometric or object used in the attack.

4 Abbreviations

The following acronyms apply to this document. IUT. Object Under Test (ItemUnderTest)

Tips & Frequently Asked Questions:

Question 1: How long will the true-PDF of GB/T 37036.8-2022_English be delivered?

Answer: Upon your order, we will start to translate GB/T 37036.8-2022_English as soon as possible, and keep you informed of the progress. The lead time is typically 2 ~ 4 working days. The lengthier the document the longer the lead time.

Question 2: Can I share the purchased PDF of GB/T 37036.8-2022_English with my colleagues?

Answer: Yes. The purchased PDF of GB/T 37036.8-2022_English will be deemed to be sold to your employer/organization who actually pays for it, including your colleagues and your employer's intranet.

Question 3: Does the price include tax/VAT?

Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countries

Question 4: Do you accept my currency other than USD?

Answer: Yes. If you need your currency to be printed on the invoice, please write an email to [email protected]. In 2 working-hours, we will create a special link for you to pay in any currencies. Otherwise, follow the normal steps: Add to Cart -- Checkout -- Select your currency to pay.