Home Cart Quotation Policy About-Us
www.ChineseStandard.net
Database: 221581 (27 Mar 2026)
SEARCH
Path: Home > GB/T > Page225 > GB/T 44285.1-2024

GB/T 44285.1-2024 PDF English

Price & Delivery

US$1039.00 · In stock · Download in 9 seconds
GB/T 44285.1-2024: Cards and security devices for personal identification - Building blocks for identity management via mobile devices - Part 1: Generic system architectures of mobile eID systems
Delivery: 9 seconds. True-PDF full-copy in English & invoice will be downloaded + auto-delivered via email. See step-by-step procedure
Status: Valid
Std IDVersionUSDBuyDeliver [PDF] inTitle (Description)
GB/T 44285.1-2024English1039 Add to Cart 7 days [Need to translate] Cards and security devices for personal identification - Building blocks for identity management via mobile devices - Part 1: Generic system architectures of mobile eID systems

Click to Preview a similar PDF

Basic data

Standard ID GB/T 44285.1-2024 (GB/T44285.1-2024)
Description (Translated English) Cards and security devices for personal identification - Building blocks for identity management via mobile devices - Part 1: Generic system architectures of mobile eID systems
Sector / Industry National Standard (Recommended)
Classification of Chinese Standard L70
Word Count Estimation 52,583
Date of Issue 2024-08-23
Date of Implementation 2024-08-23
Issuing agency(ies) State Administration for Market Regulation, China National Standardization Administration

GB/T 44285.1-2024: Cards and security devices for personal identification - Building blocks for identity management via mobile devices - Part 1: Generic system architectures of mobile eID systems







---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order.
National Standard of the People's Republic of China ICS 35.240.15CCS L 70 Cards and identity security devices via mobile Building blocks for device identity management Part 1. General system architecture of mobile electronic identity system Cards and security devices for personal identification- Part 1.Generic system architectures of mobile eID systems (ISO /IEC 23220⁃1.2023, MOD) 2024-08-23 Release 2025-03-01 Implementation State Administration for Market Regulation The National Standardization Administration issued

Table of Contents

Preface Ⅲ Introduction Ⅳ 1 Scope...1 2 Normative references 1 3 Terms and Definitions 1 4 Abbreviations...6 5 Design and Privacy Principles of Mobile Credential Systems ...6 6 Common Life Cycle Phases and Components of a Mobile Credential System ...8 7 General system architecture of mobile ID system installation phase 11 8 General system architecture of the mobile certificate system issuance phase 12 9 On-site identification system architecture during operation phase 17 10 Remote ID System Architecture in Operation Phase 19 Appendix A (Informative) Examples of publisher deployment options during the release phase 24 Appendix B (Informative) Examples of Deployment Options during Installation 30 Appendix C (Informative) Example of holder registration 35 Appendix D (Informative) Examples of other physical factors for identification 38 References ...41

Foreword

This document is in accordance with the provisions of GB/T 1.1-2020 "Guidelines for standardization work Part 1.Structure and drafting rules for standardization documents" Drafting is required. This document is part 1 of GB/T 44285 "Cards and identity security devices for identity management via mobile devices" GB/T 44285 has published the following parts. --Part 1.Generic system architecture for mobile electronic identity systems. This document is modified to adopt ISO /IEC 23220-1.2023 "Cards and identity security devices for identity management via mobile devices" Components of a mobile electronic identity system Part 1.Generic system architecture for mobile electronic identity systems. Compared with ISO /IEC 23220-1.2023, this document has the following structural adjustments. --3.7 "Discovery service" of this document corresponds to 3.18 of ISO /IEC 23220-1.2023. 3.8~3.18 of the document will be deferred to 3.7~3.17 of ISO /IEC 23220-1.2023 in sequence; --B.6 of this document corresponds to the content of B.5 in ISO /IEC 23220-1.2023. The technical differences between this document and ISO /IEC 23220-1.2023 and their reasons are as follows. --Replace ISO /IEC 29100 and ISO /IEC 19286 with the normative references GB/T 35273 and GB/T 40660 (see 5.2.1) to adapt to my country's technical conditions and increase operability. The following editorial changes were made to this document. -- Added the abbreviation "TRE" (see Chapter 4); --Added content of B.5. Please note that some of the contents of this document may involve patents. The issuing organization of this document does not assume the responsibility for identifying patents. This document was proposed and coordinated by the National Technical Committee for Information Technology Standardization (SAC/TC 28). This document was drafted by. China Electronics Standardization Institute, Jiangsu CESI Technology Development Co., Ltd., Shenzhen CESI Information Technology Co., Ltd., China Mobile Financial Technology Co., Ltd., Newland Digital Technology Co., Ltd., Beijing Anyudaohe Technology Co., Ltd., Fei Tianchengxin Technology Co., Ltd., Beijing CEC Huada Electronic Design Co., Ltd., Shanghai Fudan Microelectronics Group Co., Ltd., Shenzhen Xiongdi Technology Co., Ltd., Zhongguancun Xinhai Zeyou Technology Co., Ltd., Datang Microelectronics Technology Co., Ltd., Chutianlong Shares Co., Ltd., Beijing Zhixin Microelectronics Technology Co., Ltd., Eastcompeace Technology Co., Ltd., Beijing Watchdata Co., Ltd., Goldpac Co., Ltd., Wuhan Tianyu Information Industry Co., Ltd., Ant Technology Group Co., Ltd., Beijing Yanshen Intelligent Technology Co., Ltd. Co., Ltd., Shenzhen Yuanmingjie Technology Co., Ltd., Beijing Huada Zhibao Electronic System Co., Ltd., China Post and Telecommunications Equipment Group Co., Ltd. Co., Ltd., Shanghai Pudong Aifa Financial Technology Identity Authentication Technology Innovation Center, China UnionPay Co., Ltd., and Xingtang Communication Technology Co., Ltd. The main drafters of this document are. Gao Jian, Cai Chunshui, Guo Yanhong, Cao Guoshun, Xie Yifu, Lin Guanchen, Zhu Pengfei, Pan Liang, Zhang Hui, Zheng Song, He Fan, Li Kun, Bai Jing, Lou Shuiyong, Zhao Yi, Cheng Wenjie, Huang Haiming, Xu Wenjun, Jiang Quming, Lin Jing, Fu Yingchun, Su Kun, Yang Chunlin, Li Yan, Wang Yongtao, Wang Hao, Zhou Jitianbai, Li Liming, Wang Xuecong, Qian Tao, Ma Liqun, Wu Sijie, Shu Min, Liu Zhiqiang.

Introduction

Electronic ID applications (eID applications) are usually used in badges and ID cards with integrated circuits, allowing users to complete electronic identity recognition, authentication, and Many different application areas have a fundamental need for these mechanisms and use different means to provide them. some functions (for example, the human resources system has social security cards or medical insurance cards, the financial sector uses bank cards, and the government sector has identity cards, electronic passports or driver's licenses). The education system has a student ID or library card, the company has an employee card, and individuals have a membership card, etc.). Mobile devices (such as mobile phones or smartphones, wearable devices) are a core part of many people’s daily lives. They are not only used for communication It is also used for sending emails, accessing social media, gaming, shopping, managing finances, and storing private content such as photos, videos, and music. Today, they are used as personal devices for business and private applications. With the ubiquity of mobile devices in daily activities, users strongly Requires electronic identity applications (eID-Apps) or services with identity/authentication mechanisms on their mobile devices, i.e. mdoc Use the program. An mdoc application can be deployed to provide many different digital ID credentials. In addition, it can reside on a mobile device. In addition, users may have multiple mobile devices with mdoc applications installed, which leads to credential and enhancements to the attribute management mechanism. The technical prerequisites for deploying mdoc applications already exist and are partially standardized to support security and Privacy. Examples of containers for eID application solutions are software-based trusted execution environments (TEEs), hardware-based secure elements, (e.g., universal integrated circuit card (UICC), embedded or integrated UICC (eUICC or iUICC), embedded secure element, secure storage card[19] or other dedicated internal secure device resident on the mobile device), and server-based security means Solution. Since mdoc applications can be located on different forms of mobile devices with different security means, they are as universal as possible to This diversity also leads to different levels of security, trust, and assurance. Therefore, trusted eID management means the (remote) management and use of one or several security elements (e.g. in the form of smart networks), credentials and User attributes, with different security levels appropriate to their capabilities and strengths. The outside world accesses the mdoc application through available transmission channels. Typical local channels are 2D barcode scanning, BLE, Near Field Communication (NFC) and WLAN, etc., while long-distance communication is usually Internet connection through mobile network and WLAN network. The selection of identification method and transmission interface and protocol is an important part of trusted eID management. mdoc applications are used in different areas of daily life and are the focus of different standardization activities. mechanisms and protocols to provide interoperability and interchangeability. With these basic considerations in mind, future mdoc applications can Derived from and may expand GB/T 44285. GB/T 44285 builds on existing standards and includes four main features. a) Establishment of secure channel; b) API call serialization method; c) data element naming conventions; d) Payload transmission over the communication channel protocol. Furthermore, it adds a means of establishing Trust on First Use (TOFU). Note. GB/T 44285 inherits and enhances the functions adopted by the mobile driving license application, thereby ensuring backward compatibility with ISO /IEC 18013-5. GB/T 44285 "Components of cards and identity security devices for identity management via mobile devices" is divided into the following six part. --Part 1.Generic system architecture of mobile electronic identity system. The purpose is to determine the system generic architecture and application-related processes. -- Part 2.Data objects and encoding rules for mobile electronic identity systems. The purpose is to determine the common data format of the system. Easy to exchange. --Part 3.Installation and Release Phase Protocols and Services. The purpose is to specify the release phase protocols and services. --Part 4.Protocols and services during the operation phase. The purpose is to specify the protocols and services during the operation phase. --Part 5.Trust model and trustworthiness assessment. The purpose is to specify the trust model and trust level. --Part 6.Mechanisms for authenticating the trustworthiness of security zones. The purpose is to define the mechanisms for authenticating the trustworthiness of security zones. Cards and identity security devices via mobile Building blocks for device identity management Part 1. General system architecture of mobile electronic identity system

1 Scope

This document specifies the common system architecture and common life cycle of the infrastructure components of the mobile eID system, and also specifies The interfaces and services of the mdoc application and mobile verification application. This document is intended for entities involved in the specification, architecture, design, testing, maintenance, administration and operation of mobile eID systems.

2 Normative references

The contents of the following documents constitute the essential clauses of this document through normative references in this document. For referenced documents without a date, only the version corresponding to that date applies to this document; for referenced documents without a date, the latest version (including all amendments) applies to This document. GB/T 35273 Information security technology Personal information security specification GB/T 40660 Information security technology Basic requirements for biometric identification information protection

3 Terms and definitions

The following terms and definitions apply to this document. 3.1 attribute user attribute Characteristics or properties of an entity (3.6) Examples. Entity type, address information, phone number, permissions, MAC address, domain name are all possible attributes. [Source. ISO /IEC 24760-1.2019, 3.1.3] 3.2 attribute statement A statement or assertion describing a user property (3.1), including predicates on the property. [Source. ISO /IEC 19286.2018, 3.6] 3.3 authentication Provide assurance about the identity (3.11) of an entity (3.6). [Source. ISO /IEC 29115.2013, 3.2] 3.4 authentication protocol A defined sequence of messages between an entity (3.6) and a verifier (3.40) that enables the verifier to authenticate the entity (3.3) [Source. ISO /IEC 29115.2013, 3.4]
...

Tips & Frequently Asked Questions:

Question 1: How long will the true-PDF of GB/T 44285.1-2024_English be delivered?


Answer: Upon your order, we will start to translate GB/T 44285.1-2024_English as soon as possible, and keep you informed of the progress. The lead time is typically 4 ~ 7 working days. The lengthier the document the longer the lead time.

Question 2: Can I share the purchased PDF of GB/T 44285.1-2024_English with my colleagues?


Answer: Yes. The purchased PDF of GB/T 44285.1-2024_English will be deemed to be sold to your employer/organization who actually pays for it, including your colleagues and your employer's intranet.

Question 3: Does the price include tax/VAT?

Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countries

Question 4: Do you accept my currency other than USD?

Answer: Yes. If you need your currency to be printed on the invoice, please write an email to Sales@ChineseStandard.net. In 2 working-hours, we will create a special link for you to pay in any currencies. Otherwise, follow the normal steps: Add to Cart -- Checkout -- Select your currency to pay.
Refund Policy Privacy Policy Terms of Service