HOME   Cart(0)   Quotation   About-Us Policy PDFs Standard-List
www.ChineseStandard.net Database: 189760 (18 Oct 2025)

GB/T 38542-2020 English PDF

US$339.00 · In stock
Delivery: <= 4 days. True-PDF full-copy in English will be manually translated and delivered via email.
GB/T 38542-2020: Information security technology - Technical framework for authentication of mobile smart terminals based on biometric
Status: Valid
Standard IDContents [version]USDSTEP2[PDF] delivered inStandard Title (Description)StatusPDF
GB/T 38542-2020English339 Add to Cart 4 days [Need to translate] Information security technology - Technical framework for authentication of mobile smart terminals based on biometric Valid GB/T 38542-2020

PDF similar to GB/T 38542-2020


Standard similar to GB/T 38542-2020

GB/T 38561   GB/T 38626   GB/T 38558   GB/T 38541   

Basic data

Standard ID GB/T 38542-2020 (GB/T38542-2020)
Description (Translated English) Information security technology - Technical framework for authentication of mobile smart terminals based on biometric
Sector / Industry National Standard (Recommended)
Classification of Chinese Standard L80
Classification of International Standard 35.040
Word Count Estimation 18,170
Date of Issue 2020-03-06
Date of Implementation 2020-10-01
Issuing agency(ies) State Administration for Market Regulation, China National Standardization Administration

GB/T 38542-2020: Information security technology - Technical framework for authentication of mobile smart terminals based on biometric


---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order.
Information security technology - Technical framework for authentication of mobile smart terminals based on biometric ICS 35.040 L80 National Standards of People's Republic of China Information security technology based on biometric mobile Intelligent terminal identification technology framework 2020-03-06 released 2020-10-01 implementation State Administration for Market Regulation Issued by the National Standardization Management Committee

Table of contents

Foreword Ⅰ Introduction Ⅱ 1 Scope 1 2 Normative references 1 3 Terms and definitions, abbreviations 1 3.1 Terms and definitions 1 3.2 Abbreviations 2 4 Overview 3 5 Technical architecture 3 5.1 Overall Architecture 3 5.2 Mobile smart terminal side functional unit 4 5.3 Server side functional unit 5 6 Business Process 6 7 Communication protocol 6 7.1 Identity Authentication Protocol 6 7.2 Trusted Management Protocol 6 8 Functional requirements 6 8.1 Mobile smart terminal side functional unit 6 8.2 Server side functional unit 8 9 Safety requirements 8 9.1 Security requirements for mobile smart terminals 8 9.2 Server-side security requirements 9 9.3 Communication security requirements 10 9.4 Security requirements for identity authentication protocols 10 Appendix A (informative appendix) Identification application based on fingerprint recognition 11 Appendix B (informative appendix) Trusted Environment Safety Instructions 13 Reference 14 Information security technology based on biometric mobile Intelligent terminal identification technology framework

1 Scope

This standard specifies the technical framework of mobile smart terminal identity authentication based on biometrics, including technical architecture, business processes, Functional requirements and safety requirements. This standard applies to the design, development and integration of mobile smart terminal identification systems based on biometrics.

2 Normative references

The following documents are indispensable for the application of this document. For dated reference documents, only the dated version applies to this article Pieces. For undated references, the latest version (including all amendments) applies to this document. GB/T 26238-2010 Information technology biometric terms GB/T 34975-2017 Information security technology mobile smart terminal application software security technical requirements and test evaluation methods GB/T 34978-2017 Information Security Technology Mobile Smart Terminal Personal Information Protection Technical Requirements GB/T 35273-2017 Information Security Technology Personal Information Security Specification GB/T 35281-2017 Information Security Technology Mobile Internet Application Server Security Technical Requirements GB/T 36651-2018 Information Security Technology Biometric Identification Protocol Framework Based on Trusted Environment 3 Terms and definitions, abbreviations 3.1 Terms and definitions The following terms and definitions defined in GB/T 26238-2010 apply to this document. For ease of use, the following is repeated Some terms and definitions in GB/T 26238-2010. 3.1.1 Biometrics Automatic identification of the individual based on the individual's behavioral and biological characteristics. Note. "Individual" is limited to people. [GB/T 26238-2010, definition 2.1.2] 3.1.2 Biometric item A numerical value or marker extracted from a biometric sample for comparison. [GB/T 26238-2010, definition 2.2.2.2.2.4] 3.1.3 Biometric identifier Component used when performing user authentication based on individual behavioral and biological characteristics. 3.1.4 Biometric sample It is the representation of the analog or digital biometric features obtained from the biometric acquisition subsystem prior to the extraction of biometric items. [GB/T 26238-2010, definition 2.2.2.2.2.10] 3.1.5 Biometric template The set of reference biometric items, the set of stored biometric items, can be directly linked to the biometric items of the probe biometric sample Compare. [GB/T 26238-2010, definition 2.2.2.2.2.9.2] 3.1.6 Comparison Estimate, calculate or measure the similarity and dissimilarity between the biometric probe and the biometric reference. [GB/T 26238-2010, definition 2.2.4.1.2] 3.1.7 Execution environment A collection of software and hardware that exists in mobile devices and can provide necessary capabilities to support the running of applications in mobile devices. Note. Generally include hardware processing unit, volatile storage unit, non-volatile storage unit, operating system, calling interface and other components. 3.1.8 Identification The act of verifying the claimed identity of an entity. 3.1.9 Presentation attack To interfere with the operation of the biometric identification system, an attack against the biometric data collection module. [ISO /IEC 30107-1.2016, definition 3.5] 3.1.10 Relying party Rely on the user's authentication results provided by other entities (such as the identity authentication server), and the resources or system used by the user The entity that authorizes the system. [GB/T 36651-2018, definition 3.6] 3.1.11 Mobile smart terminal Can access the mobile communication network, have an open operating system that can provide application development interfaces, and can install and run application software Piece of mobile terminal. 3.1.12 Trusted application Software that runs in a trusted environment and provides security-related services for client software or other applications. 3.1.13 Trusted application management A system that provides application release management and security module management functions. 3.1.14 Trusted environment The security area on the user's device can ensure the security of the data loaded into it, including confidentiality, integrity and availability, etc. Trusted execution environment (TEE), secure element (SE), trusted cryptographic module (TCM) or other protected areas with security boundaries. [GB/T 36651-2018, definition 3.1] 3.2 Abbreviations The following abbreviations apply to this document. Note. REE (Rich Execution Environment) generally refers to the open execution environment running in mobile devices, which provides open and rich operating capabilities for applications running in it Strong support, but relatively weak security protection capabilities. 5.2.2 Identity authentication middleware Identity authentication middleware is an independent identity authentication system software or service program located between the underlying system resources and applications. It can apply different operating systems and hardware platforms, provide mobile applications with relevant operating interfaces for identity authentication services, and is responsible for REE Communication related to identity authentication between mobile applications and trusted applications in the trusted environment. The identity authentication middleware can be the identity authentication system service integrated in the mobile smart terminal operating system, or it can be integrated in the mobile The proprietary SDK in the application, or the independent application software running in the mobile smart terminal. 5.2.3 Identity authentication trusted application The identity authentication trusted application is responsible for the analysis and processing of the identity authentication protocol, and is responsible for managing the biometric identifiers it supports. The biometric identifier selected in the authentication protocol completes the process of biometric verification of the user. The identity authentication trusted application is responsible for the management of user authentication keys related to identity authentication, including the generation, storage, and Use and delete. The identity authentication trusted application can be installed in the mobile smart terminal before the factory through the preset method, or through the remote dynamic download method Installed in the mobile smart terminal. 5.2.4 Biometric recognizer The biometric identification device is a biometric identification system located on a mobile smart terminal, which can be based on biometric identification technology. The verification of user biometrics is generally composed of a feature collection module, a feature storage module, and a feature comparison module, among which. a) The feature collection module collects the user’s biometric samples through the biometric collection component, The biological feature samples are further extracted from the biological feature items to be used in the subsequent feature storage module or feature comparison module; b) The feature storage module is used to store the biometric template entered by the user; c) The feature comparison module compares the entered user biometric probe with one or more biometrics entered in the feature storage module. The feature templates are compared, and the results are compared to make a recognition decision, and judge whether the user has passed the verification. 5.2.5 Acquisition components The collection element is connected with the biometric recognizer and can be called by the biometric recognizer and collect the user's biometric samples. 5.3 Server side functional unit 5.3.1 Relying party The relying party is mainly responsible for providing the background services of the mobile application, based on the identity authentication protocol with the mobile application and the identity authentication server Interaction to complete the various business processes of identity authentication. In the identity authentication process, the relying party obtains the user’s identity authentication result from the identity authentication server, and provides corresponding Authorized service or resource. 5.3.2 Identity authentication server 5.3.2.1 Overview The identity authentication server includes an identity authentication service module and a trusted management module. Among them, the identity authentication service module is a required module, and the main Responsible for managing the identity authentication registration relationship on the server side, analyzing and verifying the identity authentication protocol, and providing identity to the relying party Identification results. The trusted management module is mainly responsible for trusted management of mobile smart terminals and identity authentication trusted applications. 5.3.2.2 Identity authentication service module The identity authentication service module is mainly responsible for. a) In the identity authentication registration business process, verify the authenticity and integrity of the biometric identifier used in the registration process, and create And store the identity authentication registration relationship of the user's new application, store the user authentication key generated during the registration process and the registration relationship Bind; b) In the identity authentication business process, verify the authenticity and integrity of the biometric identifier used in the authentication process, and identify the The identity authentication registration relationship used in the business, and the bound user authentication key is used to enter the information in the identity authentication protocol Line verification; c) In the identity authentication cancellation business process, delete the corresponding identity authentication registration relationship and the bound user authentication key; d) Transmit the identity authentication result to the relying party in a credible way. 5.3.2.3 Trusted management Trusted management is an optional functional module, which mainly includes. a) Trusted application management module, responsible for the life cycle management of identity authentication trusted applications, including downloading, installing, updating and deleting And so on. If a secure element is used on the mobile smart terminal side, it is also responsible for the life cycle of trusted applications in the secure element To manage. b) The trusted device management module is responsible for managing the trusted device list of mobile smart terminals.

6 Business Process

The identity authentication of mobile smart terminals based on biometrics generally includes three business processes. registration, authentication, and cancellation. GB/T 36651-2018 regulations on business processes.

7 Communication protocol

7.1 Identity authentication protocol The identity authentication protocol should comply with the provisions and descriptions of the protocol interface in Chapter 7 and Appendix C of GB/T 36651-2018. 7.2 Trusted Management Protocol The server side can manage the life cycle of trusted applications and trusted devices on the smart terminal side through the trusted management protocol, including Management operations such as application installation, uninstallation, and update. This standard does not specify a trusted management protocol. Before the management operation, the communication parties should be authenticated and a secure channel should be established.

8 Functional requirements

8.1 Mobile smart terminal side functional unit 8.1.1 Mobile Application The mobile application requirements are as follows. a) It should be able to interact with the relying party based on the identity authentication protocol to realize identity authentication registration, identity authentication, identity authentication cancellation, etc. Business process; b) It should be able to interact with trusted applications for identity authentication by invoking identity authentication middleware to realize identity authentication registration, identity authentication, Business processes such as identity verification and cancellation; c) It should be able to uniquely identify the user's identity, one user can correspond to multiple identity authentication registration relationships, and one identity authentication registration The relationship should only correspond to one user; d) A limit on the number of failed biometric authentication attempts should be set. After the number of failed attempts exceeds the limit, users should be restricted from continuing to try. Try or guide users to use other methods for identification. 8.1.2 Identity authentication middleware The functional interface requirements provided by the identity authentication middleware are as follows. a) It is advisable to support obtaining the version number of a trusted application for identity authentication; b) It should support the acquisition of biometric identifier information that can be supported by trusted applications for identity authentication, such as the implementation model of biometric identifiers. Type (fingerprint, iris, face, etc.), version number, etc.; c) It should support identity authentication registration, identity authentication and identity authentication cancellation operation interface, etc.; d) It should support obtaining the unique identification of mobile smart terminals; e) It can verify the calling authority of mobile applications, such as by directly interacting with the identity authentication server. 8.1.3 Identity authentication trusted application The requirements for trusted applications for identity authentication are as follows. a) It should be able to provide the identity authentication credible application version number to the identity authentication middleware; b) It should be able to analyze the identity authentication protocol and verify its authenticity and integrity, and realize identity authentication registration, identity authentication and identity verification. Business processes such as authentication and cancellation; c) It should be able to support the management of the identity authentication registration relationship on the side of the mobile smart terminal, including the user bound to the registration relationship The management of authentication keys, such as generation, storage, use, and deletion; d) It is advisable to establish a correspondence between the verification process of the biometric identifier and the user identity authentication and registration relationship, such as through biometrics Association of template summary values, etc.; e) It should be able to manage the supported biometric identifiers located in mobile smart terminals, including obtaining biometric identifiers Information, call the biometric identifier to verify the user's identity and obtain the verification result, etc.; f) There should be control over the use of user authentication keys, only when the verification result obtained from the biometric identifier indicates the user's identity The user authentication key can only be used after verification; g) The mobile smart terminal should be uniquely identified for the trusted device management on the server side. 8.1.4 Biometric recognizer The functional requirements of the biometric identifier are as follows. a) Model and version information should be provided, and have a unique identification. b) It should have the ability to detect and prevent appearance attacks. c) Feature acquisition module. 1) It should support the use of collection components to collect user biometric samples and convert them into data suitable for biometric identification processing. According to the format; 2) There should be clear user prompts to inform users that their biometric samples have been collected. If the collection process is divided into multiple entries Yes, it should be clear to the user the progress of each collection; 3) It should support the quality judgment of the collected user biometric samples, and use the user biometric samples that pass the quality judgment. Extract user biometric items in this book for subsequent biometric storage or biometric comparison; 4) It is advisable to use irreversible methods to extract biometric items from user biometric samples. d) Feature storage module. 1) The same user should only correspond to a unique identity in the same biometric storage module; the same user identity cannot be used To identify two or more different users; it should be possible to associate the registered user’s biometric template with the user’s identity Logo for association; 2) Only entities with legal authority should be allowed to enter, access, read or delete user biometrics in the biometric storage module. Levy data; 3) It should support the same user to register two or more biometric templates in the biometric storage module; 4) It should have the ability to determine and handle abnormal situations, such as when the registration, reading or deletion of the biometric template fails. 理mechanism. e) Feature comparison module. 1) It should be able to perform the input user biometric probe and the biometric template registered in the biometric storage module Compare, calculate the comparison score, judge the recognition result based on the comparison score, and be able to output the recognition result; 2) It shall have the function of judging and handling abnormal situations, including but not limited to the corresponding handling when the comparison fails and the identification decision fails mechanism. 8.2 Server side functional unit 8.2.1 Relying party The relying party requirements are as follows. a) It should be able to interact with mobile applications based on the identity authentication protocol to realize identity authentication registration, identity authentication, identity authentication cancellation, etc. Business Process; b) It should be able to interact with the identity authentication server based on the identity authentication protocol to realize identity authentication registration, identity authentication, and identity authentication Business processes such as cancellation; c) It should be able to authorize users to access corresponding services or resources of the server based on the result of identity authentication. 8.2.2 Identity authentication server The authentication server requirements are as follows. a) It should be able to interact with the relying party based on the identity authentication protocol, analyze and verify the identity authentication protocol, and realize the identity authentication. Business processes such as registration, identity authentication, and identity authentication cancellation; b) It should be able to manage the identity authentication registration relationship on the server side, including generation, maintenance, and deletion; c) The corresponding relationship between the verification process of the biometric identifier and the user identity authentication registration relationship should be verified on the server side. Through biometric template summary values, etc.; d) It should be capable of trusted application management and trusted device management.

9 Safety requirements

9.1 Security requirements for mobile smart terminals 9.1.1 Mobile Application The mobile application requirements are as follows. a) It should meet the safety requirements specified in Chapter 4 of GB/T 34975-2017; b) Effective technical means should be adopted to confirm the authenticity of the relying party or identity authentication server communicating with it. 9.1.2 Trusted environment The trusted environment should have a security boundary, and technical means should be provided within the environment to ensure the security of the code and data in the trusted environment Provide guarantees such as confidentiality, integrity and availability. Please refer to Appendix B for instructions on trusted environment security. 9.1.3 Identity authentication trusted application Effective technical means should be adopted to ensure the safety of life cycle management of trusted applications such as download, installation, update, uninstall, etc. Controllable. The security requirements for identity authentication trusted applications are as follows. a) Effective technical means can be adopted to verify the authenticity and completeness of the biometric identifier; b) There should be an access control mechanism to ensure that only mobile applications with access rights can authenticate the identity through the identity authentication middleware. Don't use trusted applications to make access calls; c) It should support the verification of the authenticity and completeness of the biometric identifier; d) After completing the identity authentication business process, the identity authentication trusted application should clear the temporary data in the memory in time; e) Effective technical means should be adopted to ensure the randomness of the user authentication key generated in the identity authentication registration process, and Effective technical means to ensure the safe storage and use of the generated user authentication key. 9.1.4 Biometric recognizer There should be effective technical means to verify the authenticity and completeness of the biometric identifier. Safety requirements for biometrics as follows. a) Feature acquisition module. 1) There should be an effective security mechanism to ensure the collection of biometric samples, quality judgment, presentation of attack detection, and biometric item extraction. The confidentiality and integrity of the user's biometric data in the process of retrieval and transmission; 2) The user's biometric samples that have not passed the quality judgment should be removed in time, and it should be ensured that they are unrecoverable; 3) After the extraction of biometric items is completed, the user's biometric samples should be cleared in time and ensure that they are unrecoverable; 4) The above-mentioned security mechanism should be implemented in combination with the trusted execution environment or secure elements of the mobile smart terminal. b) Feature storage module. 1) There should be an effective security mechanism to ensure the correct association between the registered user's biometric template and the user ID System to prevent illegal modification and acquisition; 2) There should be an effective security mechanism to ensure that when operating the user's biometric data in the biometric storage module, such as When storing and transmitting, the confidentiality and integrity of the user's biometric data, and the Time data (such as data stored in the dynamic memory of the device and biometric samples during storage or transmission), conduct and Clear at time and ensure that it is unrecoverable; 3) It is advisable to use encryption to store user biometric template data; 4) The deleted user biometric template data should be cleared in time and ensure that it is unrecoverable; 5) The above security mech...

Tips & Frequently Asked Questions:

Question 1: How long will the true-PDF of GB/T 38542-2020_English be delivered?

Answer: Upon your order, we will start to translate GB/T 38542-2020_English as soon as possible, and keep you informed of the progress. The lead time is typically 2 ~ 4 working days. The lengthier the document the longer the lead time.

Question 2: Can I share the purchased PDF of GB/T 38542-2020_English with my colleagues?

Answer: Yes. The purchased PDF of GB/T 38542-2020_English will be deemed to be sold to your employer/organization who actually pays for it, including your colleagues and your employer's intranet.

Question 3: Does the price include tax/VAT?

Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countries

Question 4: Do you accept my currency other than USD?

Answer: Yes. If you need your currency to be printed on the invoice, please write an email to [email protected]. In 2 working-hours, we will create a special link for you to pay in any currencies. Otherwise, follow the normal steps: Add to Cart -- Checkout -- Select your currency to pay.