Home Cart Quotation Policy About-Us
www.ChineseStandard.net
Database: 221581 (27 Mar 2026)
SEARCH
Path: Home > GB/T > Page224 > GB/T 45910-2025

GB/T 45910-2025 PDF English

Price & Delivery

US$524.00 · In stock · Download in 9 seconds
GB/T 45910-2025: Information technology - Performance testing of biometric template protection schemes
Delivery: 9 seconds. True-PDF full-copy in English & invoice will be downloaded + auto-delivered via email. See step-by-step procedure
Status: Valid
Std IDVersionUSDBuyDeliver [PDF] inTitle (Description)
GB/T 45910-2025English524 Add to Cart 5 days [Need to translate] Information technology - Performance testing of biometric template protection schemes

Click to Preview a similar PDF

Basic data

Standard ID GB/T 45910-2025 (GB/T45910-2025)
Description (Translated English) Information technology - Performance testing of biometric template protection schemes
Sector / Industry National Standard (Recommended)
Classification of Chinese Standard L70
Classification of International Standard 35.240
Word Count Estimation 26,252
Date of Issue 2025-06-30
Date of Implementation 2026-01-01
Issuing agency(ies) State Administration for Market Regulation, China National Standardization Administration

GB/T 45910-2025: Information technology - Performance testing of biometric template protection schemes




---This is an excerpt. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.), auto-downloaded/delivered in 9 seconds, can be purchased online: https://www.ChineseStandard.net/PDF.aspx/GBT45910-2025
ICS 35.240 CCSL70 National Standard of the People's Republic of China Information technology biometric recognition template protection Performance testing of the solution (ISO /IEC 30136.2018, IDT) Released on June 30, 2025 Implementation on January 1, 2026 State Administration for Market Regulation The National Standardization Administration issued

Table of Contents

Preface III Introduction IV 1 Scope 1 2 Normative references 1 3 Terms and Definitions 1 4 Abbreviations 3 5 Compliance 3 6 Biometric identification template protection method (informative) 4 6.1 Overview 4 6.2 General Architecture of Biometric Template Protection System 5 6.3 Data Separation 6 6.4 Typical Architecture Example of Template Protection System 7 7 Overview of Performance Evaluation of Biometric Template Protection Schemes 9 7.1 Methods of attacking biometric template protection systems 9 7.2 The need for metrics beyond traditional recognition performance 9 7.3 Technical Assessment 9 7.4 Theoretical and Experimental Evaluation 9 7.5 Threat Model 9 8 Performance metrics of biometric template protection systems 11 8.1 General Principles 11 8.2 Multi-biometric access control system case 11 8.3 Registration and Verification Performance Metrics 11 8.4 Security and Privacy Protection Performance Metrics 13 Appendix A (Informative) Performance Evaluation Using Algorithms or Publications 17 Reference 18 Preface This document is in accordance with the provisions of GB/T 1.1-2020 "Guidelines for standardization work Part 1.Structure and drafting rules for standardization documents" Drafting. This document is equivalent to ISO /IEC 30136.2018 "Information technology - Performance testing of protection schemes for biometric templates". Please note that some of the contents of this document may involve patents. The issuing organization of this document does not assume the responsibility for identifying patents. This document was proposed and coordinated by the National Technical Committee for Information Technology Standardization (SAC/TC28). This document was drafted by. SDIC Intelligent (Xiamen) Information Co., Ltd., China Electronics Technology Standardization Institute, Xiamen University, China East China Branch of the Electronics Standardization Institute, Lenovo Zhongtian Technology Co., Ltd., Beijing Yanshen Technology Co., Ltd., Beijing Wanlihong Technology Co., Ltd. Co., Ltd., Shanxi Sanyouhe Smart Information Technology Co., Ltd., Dongguan Yihao Electronic Technology Co., Ltd., Rockwell Automation Technology Group Co., Ltd. Co., Ltd., Jianxin Financial Technology Co., Ltd., Shanghai Point and Surface Intelligent Technology Co., Ltd., Beijing University of Civil Engineering and Architecture, Xiamen Entropy Technology Co., Ltd., Enki Technology Co., Ltd., Shengdian Century Technology Co., Ltd., Shanghai Qingbiao Information Technology Service Co., Ltd., Xiamen Ruiwei Information Technology Co., Ltd., Hangzhou Jinglianwen Technology Co., Ltd., Institute of Automation, Chinese Academy of Sciences, Guangdong Keruitai Technology Co., Ltd. Company, Shanghai University of Electric Power, Guangdong Zhongke Zhenheng Information Technology Co., Ltd., Huizhou University, Shenzhen Tencent Computer Systems Co., Ltd., Xingtang Communications Technology Co., Ltd., Hangzhou Hikvision Digital Technology Co., Ltd., Guangzhou Mailun Information Technology Co., Ltd., Mashang Consumer Finance Co., Ltd., Guangdong Liangde Intelligent Technology Co., Ltd., Jiangsu Fulian Communication Technology Co., Ltd., Hebei Jiaqiang Energy Saving Technology Co., Ltd. Company, Shenzhen Jingshi Technology Co., Ltd., Guangdong Jiulian Technology Co., Ltd., Changchun Boli Electronic Technology Co., Ltd., Xiamen Meiya PARKCO INFORMATION SECURITY INSTITUTE LIMITED. The main drafters of this document are. Li Xiaochao, Li Wei, Su Liwei, Li Yang, Wang Haibin, Geng Li, Zhong Chen, Zhou Yang, Que Jinlong, Yan Xiaoge, Li Qiang, Li Wei, Wang Xiaohua, Zhong Huaxi, Song Fangfang, Yang Zhanjin, Ren Xiaoli, Shen Wenzhong, Tian Qichuan, He Yuhong, Lin Xiaoqing, Hu Wenmao, Xia Xusheng, Zhan Donghui, Wang Linhao, Li Qi, Wang Yunlong, Xu Qitui, Shao Jie, Yang Jingfeng, Luo Zhongliang, Sun Shiyou, Cai Zifan, Zhang Peng, Wang Jin, Zeng Dingheng, Feng Yue, Li Guangyu, Niu Tao, Wang Qiang, Yi Liang, Ling Jun, Zhang Lihua, and Zhao Jianqiang.

introduction

The protection method and protection scheme performance evaluation in the field of biometric recognition template protection, and stipulates the accuracy, The confidentiality and privacy assessment method aims to scientifically and objectively evaluate the biometric recognition template protection scheme. A biometric template is a set of reference biometric features obtained from an individual's biological and behavioral characteristics and stored in a registration database. The general system allows a limited number of times to revoke and update the biometric registration information that has been violated. However, the unique information that an individual can extract is The number of unique biometric features is limited, so biometric registration information cannot be revoked indefinitely like a credit card number or password. and update. The infringement of biometric registration records stored in the registration database is a serious problem. In a control system, an attacker can obtain biometric data of registered individuals by invading the registration database. If the attacker can perform a presentation attack or replay attack, the attacker can disguise himself as an individual through the biometric data of the individual registered database that he has hacked into. Furthermore, if the biometric registration database contains unprotected patterns, If the same biometric recognition modality is used in multiple applications, the attacker can link individual accounts in these applications. Therefore, we need to adopt various methods and procedures to reduce the risk of infringement and protect the individual biometrics in the registration database. Confidentiality of object feature recognition templates. Currently, biometric recognition template protection technology has achieved the goal of not needing to store individual biometric items directly in access control devices. The basic principle of this method is that the access control system does not store the biometric items directly, but obtains the biometric information from the biometric information. The system derives some data from the item and stores the extracted derived data on the device. Individuals collect biometric samples, which are then compared with derived data to produce biometric verification results. Derivative data has almost or completely The key features of the biometric information collected during the registration phase are not revealed. Even if the access control device is compromised by an attacker, only The derived data falls into the hands of an attacker, but this data does not enable the attacker to recover the biometric characteristics of the individual in the registration database. In addition, if an attacker attempts to access the user's biometric sample through forged biometric samples, system, then a well-designed biometric recognition system can identify forged biometric samples by comparing derived data, thus Therefore, this technology not only protects the confidentiality of individuals in the registration database, but also realizes the security of biometric verification. Feature verification. Principle of the new measure There are many ways to achieve biometric template protection. Regardless of the method used to construct the derived data, Consider the following issues when selecting a template protection system. a) What is the probability that the system will reject the real individual and accept the imposter? This is an inevitable consideration for any biometric verification system. FNMR and FMR are two metrics used to measure the performance of traditional biometric systems (see GB/T 29268.1), biometric recognition template protection systems also continue to use these measurement items. b) What is the probability that an attacker with knowledge of the database of registered individuals can successfully authenticate as one of the registered individuals? c) How much information can an attacker obtain by attacking an access control device and stealing the derived registration information stored on the device? In traditional biometric recognition systems, attackers can obtain important information, including biometric information stored on the device. The goal of the biometric template protection system is to ensure that these derived data stored on the device It does not reveal too much information about the registered individual. d) After the attacker successfully breaches one or more access control devices and steals the data stored on the devices, he or she may use the information obtained to What is the probability of successful authentication on the access control device? These questions form the basis for evaluating the accuracy, confidentiality, and privacy of biometric template protection systems and are successfully introduced. A new set of metrics that differ from those previously used to evaluate traditional biometric systems. The need for standardization There are many architectures of biometric template-based protection systems, such as fuzzy safe-based systems, security profile-based systems, Therefore, it is necessary to define a system that is applicable to various biometric recognition systems. The template protection architecture key metrics and answers the above questions, thus providing a common basis for comparing systems based on different architectures. The goal of this document is to define these new metrics for use in evaluating template-based biometric authentication and identification systems. Chapter 8 provides theoretical and empirical definitions for each metric. Information technology biometric recognition template protection Performance testing of the solution 1 Scope This document supports the evaluation of accuracy, confidentiality, and privacy of biometric template protection schemes. Definitions, terminology, and metrics for the performance of signature recognition template protection schemes. This document specifically specifies the testing and reporting requirements for. --- Theoretical and experimental accuracy of biometric template protection schemes; --- Theoretical and experimental probabilities of successfully attacking biometric template protection schemes (single or multiple); ---Information about the original biometrics that is leaked when one or more biometric template protection schemes are violated. This document is suitable for evaluating the accuracy, confidentiality and privacy of biometric template protection schemes. This document does not apply to. ---Establish template protection plan; ---Tests for traditional encryption schemes. 2 Normative references The contents of the following documents constitute the essential clauses of this document through normative references in this document. For referenced documents without a date, only the version corresponding to that date applies to this document; for referenced documents without a date, the latest version (including all amendments) applies to This document. cabulary-Part 37.Biometrics) Note. GB/T 5271.37-2021 Information technology vocabulary Part 37.Biometric identification (ISO /IEC 2382-37.2017, MOD) ISO /IEC 19795-1 Information technology — Biometric performance testing and reporting — Part 1.Principles and framework work) Note. GB/T 29268.1-2012 Information technology biometric performance testing and reporting Part 1.Principles and framework (ISO /IEC 19795-1. 2006, IDT) ISO /IEC 19795-2 Information technology — Biometric performance testing and reporting — Part 2.Tests for technology and scenario evaluation Note. GB/T 29268.2-2012 Information technology biometric recognition performance testing and reporting Part 2.Test methods for technology and scenario evaluation (ISO /IEC 19795-2.2007, IDT) ISO /IEC 24745.2022 Information technology – Digital security and privacy protection – Protection of biometric information NOTE. There are no technical differences between the referenced content of ISO /IEC 24745.2022 and the referenced content of ISO /IEC 24745.2011. 3 Terms and Definitions For this document, the terms and definitions defined in ISO /IEC 2382-37 and ISO /IEC 24745 and the following apply.
...

Tips & Frequently Asked Questions:

Question 1: How long will the true-PDF of GB/T 45910-2025_English be delivered?


Answer: Upon your order, we will start to translate GB/T 45910-2025_English as soon as possible, and keep you informed of the progress. The lead time is typically 3 ~ 5 working days. The lengthier the document the longer the lead time.

Question 2: Can I share the purchased PDF of GB/T 45910-2025_English with my colleagues?


Answer: Yes. The purchased PDF of GB/T 45910-2025_English will be deemed to be sold to your employer/organization who actually pays for it, including your colleagues and your employer's intranet.

Question 3: Does the price include tax/VAT?

Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countries

Question 4: Do you accept my currency other than USD?

Answer: Yes. If you need your currency to be printed on the invoice, please write an email to Sales@ChineseStandard.net. In 2 working-hours, we will create a special link for you to pay in any currencies. Otherwise, follow the normal steps: Add to Cart -- Checkout -- Select your currency to pay.
Refund Policy Privacy Policy Terms of Service