GB/T 37036.2-2019 PDF EnglishUS$190.00 · In stock · Download in 9 seconds
GB/T 37036.2-2019: Information Technology - Biometrics Used with Mobile Devices - Part 2: Fingerprint Delivery: 9 seconds. True-PDF full-copy in English & invoice will be downloaded + auto-delivered via email. See step-by-step procedure Status: Valid
Similar standardsGB/T 37036.2-2019: Information Technology - Biometrics Used with Mobile Devices - Part 2: Fingerprint---This is an excerpt. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.), auto-downloaded/delivered in 9 seconds, can be purchased online: https://www.ChineseStandard.net/PDF.aspx/GBT37036.2-2019 NATIONAL STANDARD OF THE PEOPLE’S REPUBLIC OF CHINA ICS 35.240.15 L 71 Information Technology - Biometrics Used with Mobile Devices - Part 2: Fingerprint ISSUED ON: OCTOBER 18, 2019 IMPLEMENTED ON: MAY 1, 2020 Issued by: State Administration for Market Regulation; Standardization Administration of the People’s Republic of China. Table of ContentsForeword ... 3 1 Scope ... 4 2 Normative References ... 4 3 Terms and Definitions ... 4 4 Abbreviations ... 6 5 Technology Architecture ... 6 6 Operational Process ... 8 7 Functional Requirements ... 10 8 Performance Requirements ... 12 9 Security Requirements ... 13 Appendix A (informative) Mobile Device Fingerprint Recognition Application Modes ... 16 Bibliography ... 20 Information Technology - Biometrics Used with Mobile Devices - Part 2: Fingerprint1 ScopeThis Part of GB/T 37036 provides the technology architecture applied to the fingerprint recognition system used with mobile devices, and specifies the operational process, functional requirements, performance requirements and security requirements of fingerprint recognition used with mobile devices. This Part is applicable to the design, production, integration and application of the fingerprint recognition system used with mobile devices.2 Normative ReferencesThe following documents are indispensable to the application of this document. In terms of references with a specified date, only versions with a specified date are applicable to this document. In terms of references without a specified date, the latest version (including all the modifications) is applicable to this document. GB/T 26238-2010 Information Technology - Terminology for Biometrics GB/T 33767.4-2018 Information Technology - Biometric Sample Quality - Part 4: Finger Image Data GB/T 37036.1-2018 Information Technology - Biometrics Used with Mobile Devices - Part 1: General Requirement3 Terms and DefinitionsWhat is defined in GB/T 26238-2010, and the following terms and definitions are applicable to this document. 3.1 Fingerprint Characteristic Fingerprint characteristic refers to distinguishable and repeatable characteristic information that can be extracted from individual’s fingerprint information, so as to achieve the purpose of individual recognition. 3.2 Fingerprint Recognition Fingerprint recognition refers to the process of individual recognition based on c) The main function of the presentation attach detection sub-function is to evaluate and judge the fingerprint samples; block the non-fingerprint samples; d) The main function of the fingerprint feature extraction sub-function is to extract fingerprint feature of fingerprint samples that have passed the quality judgment and presentation attack detection. The main function of the fingerprint characteristic storage module to form fingerprint template through fingerprint characteristic verified by the fingerprint characteristic capture module and store it on the physical chip. The main function of the fingerprint characteristic comparison module is to compare the fingerprint feature verified by the fingerprint characteristic capture module with the fingerprint template of the fingerprint characteristic storage module; output the comparison result to the mobile application. The server side includes the fingerprint characteristic storage module, the fingerprint characteristic comparison module and the three sub-functions (quality judgment, presentation attack detection and fingerprint feature extraction) in the fingerprint characteristic capture module. The functions of these functions and sub-functions are the same as the corresponding functions and sub-functions of the mobile device side. The application of biometrics in mobile devices may have multiple modes, which mainly include two modes: local recognition and remote recognition. The mode of local recognition means the fingerprint characteristic recognition process of mobile device is locally completed in the mobile device. In addition, the recognition result is output to the mobile application that calls the fingerprint recognition service. The mode of remote recognition means some functions (such as: fingerprint characteristic storage and / or fingerprint characteristic comparison functions) or sub- functions (such as: quality judgment, presentation attack detection and / or fingerprint feature extraction sub-functions) of fingerprint recognition are executed on the remote server. Generally speaking, the mode of local recognition is adopted. The specific recognition mode to be used depends on the application purpose and application environment of the biometric system used with mobile devices, as well as the overall design considerations. It is set in the recognition system solution. The description of the local recognition and remote recognition mode is shown in Appendix A.6 Operational ProcessThe operational process of fingerprint recognition used with mobile devices generally 3) End the fingerprint log-out process.7 Functional Requirements7.1 General Requirements 7.1.1 Basic functions It shall comply with the requirements of 6.1.1 in GB/T 37036.1-2018, which include, but are not limited to: a) Applicable to users of different races, different ages and different skin colors; b) Applicable to mobile device users and fingerprint recognition system administrators; c) Based on corresponding hardware and software conditions of the mobile device, it shall be able to support multi-modal or multi-factor fingerprint recognition. 7.1.2 Functional management It shall comply with the requirements of 6.1.2 in GB/T 37036.1-2018, which include, but are not limited to: a) Fingerprint enrollment: 1) It shall be able to complete fingerprint enrollment in one session; 2) It shall be able to support timeout constraints. b) Fingerprint recognition: 1) It shall be able to support consecutive failure number constraints; 2) It shall be able to output fingerprint recognition result. c) During fingerprint log-out, the object of log-out shall pass identity verification. d) It shall support log management function and generate log recording events. The events to be recorded include (but are not limited to) success or failure events during the enrollment process and the recognition process. The log record of each event should include the event occurrence time, the type of event, the user, the event execution result or the failure cause. 7.2 Fingerprint Characteristic Capture Module 7.2.1 Basic Functions It shall comply with the requirements of 6.3 in GB/T 37036.1-2018, which include, but are not limited to: a) The stored data does not contain the original image data of the fingerprint; b) It shall support already enrolled user’s operations (such as: add and log-out) of fingerprint templates in the fingerprint characteristic storage module; c) Encrypt the stored fingerprint characteristic data; d) When it comes to using cryptographic technology to provide security (confidentiality, integrity, authenticity and non-repudiation), comply with relevant national standards and industry standards related to cryptography. 7.4 Fingerprint Characteristic Comparison Module 7.4.1 Basic functions Based on the relevant stipulations of 6.4.1 in GB/T 37036.1-2018, the fingerprint characteristic comparison module shall be able to support 1:N comparison (where, N signifies the number of templates, with the value range of an integer from 1 to 99). 7.4.2 Comparison determination and processing It shall comply with the requirements of 6.4.2 in GB/T 37036.1-2018, which include, but are not limited to: a) It shall be able to compare the input user’s fingerprint feature with the already enrolled fingerprint characteristic templates, so as to calculate the comparison score; b) It shall be able to determine the recognition result in accordance with the comparison score; output the recognition result; c) It shall be equipped with the function of determining and handling abnormal conditions, which include, but are not limited to, the definition of the number of consecutive errors and recovery modes.8 Performance Requirements8.1 Resolution Resolution shall be not less than 300DPI. 8.2 Capture Time The process from the sending of the fingerprint capture command to the completion of the reception of fingerprint sample data shall not exceed 250 ms. It shall comply with the requirements of 7.2 in GB/T 37036.1-2018, which include, but are not limited to: a) It should set up a fingerprint characteristic capture timeout processing mechanism. In other words, within the set effective time, if fingerprint samples that meet the quality requirements and pass the presentation attack detection cannot be captured, the module will automatically withdraw from the operation; b) The sensitive data input by the user, or the collected user’s fingerprint data shall be protected; c) The fingerprint characteristic capture module shall receive security protection through a trusted environment; d) Under the remote recognition mode, the involved keys should be stored in a trusted environment, for example, keys involved in the secure communication with a remote server. 9.3 Security of Fingerprint Characteristic Storage Module It shall comply with the requirements of 7.3 in GB/T 37036.1-2018, which include, but are not limited to: a) In combination with the trusted environment, in an effective and secure mode, security protection shall be performed on the fingerprint templates stored in the fingerprint characteristic storage module; b) Under the remote recognition mode, the user’s fingerprint reference shall be de-marked or desensitized; be stored in a separate library with the user’s identity information. 9.4 Security of Fingerprint Characteristic Comparison Module It shall comply with the requirements of 7.4 in GB/T 37036.1-2018, which include, but are not limited to: a) The fingerprint characteristic comparison module is generally implemented in the form of software. Effective security measures are adopted to ensure the security of the module. In addition, effective security measures are adopted to ensure the confidentiality and integrity of the user’s fingerprint data and recognition decision-making result during the comparison process, and ensure that they are not stolen or tampered with; b) Combine the trusted execution environment or security unit processed by the mobile device to implement the fingerprint characteristic comparison module; c) Under the remote recognition mode, in combination with the trusted environment, reinforce the security of the fingerprint characteristic comparisonAppendix A(informative) Mobile Device Fingerprint Recognition Application Modes A.1 Mode 1 -- Local Recognition Figure A.1 describes typical mode 1. Under this mode, the fingerprint characteristic capture, storage and comparison modules are located in the mobile device. In consideration of security, the various modules of the fingerprint recognition system are protected by the trusted execution environment in the mobile device. The fingerprint capture subsystem merely allows shared access by rich execution environment and trusted execution environment, or, merely allows access by trusted execution environment. Generally speaking, mobile application is located in the rich execution environment. Through an external interface provided by the trusted execution environment, the fingerprint recognition system is called. Then, the fingerprint recognition system calls the fingerprint capture subsystem, which is located in the mobile device, to capture fingerprint samples: a) After the quality judgment is performed, extract fingerprint characteristic; perform the fingerprint log-out process. After this process is completed, offer feedbacks of the result to the mobile application that calls fingerprint recognition; b) After the quality judgment and presentation attack detection, extract fingerprint characteristic; perform the fingerprint recognition process. After this process is completed, offer feedbacks of the result to the mobile application that calls fingerprint recognition. ......Source: Above contents are excerpted from the full-copy PDF -- translated/reviewed by: www.ChineseStandard.net / Wayne Zheng et al. Tips & Frequently Asked Questions:Question 1: How long will the true-PDF of English version of GB/T 37036.2-2019 be delivered?Answer: The full copy PDF of English version of GB/T 37036.2-2019 can be downloaded in 9 seconds, and it will also be emailed to you in 9 seconds (double mechanisms to ensure the delivery reliably), with PDF-invoice.Question 2: Can I share the purchased PDF of GB/T 37036.2-2019_English with my colleagues?Answer: Yes. The purchased PDF of GB/T 37036.2-2019_English will be deemed to be sold to your employer/organization who actually paid for it, including your colleagues and your employer's intranet.Question 3: Does the price include tax/VAT?Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countriesQuestion 4: Do you accept my currency other than USD?Answer: Yes. www.ChineseStandard.us -- GB/T 37036.2-2019 -- Click this link and select your country/currency to pay, the exact amount in your currency will be printed on the invoice. Full PDF will also be downloaded/emailed in 9 seconds.How to buy and download a true PDF of English version of GB/T 37036.2-2019?A step-by-step guide to download PDF of GB/T 37036.2-2019_EnglishStep 1: Visit website https://www.ChineseStandard.net (Pay in USD), or https://www.ChineseStandard.us (Pay in any currencies such as Euro, KRW, JPY, AUD).Step 2: Search keyword "GB/T 37036.2-2019". Step 3: Click "Add to Cart". If multiple PDFs are required, repeat steps 2 and 3 to add up to 12 PDFs to cart. Step 4: Select payment option (Via payment agents Stripe or PayPal). Step 5: Customize Tax Invoice -- Fill up your email etc. Step 6: Click "Checkout". Step 7: Make payment by credit card, PayPal, Google Pay etc. After the payment is completed and in 9 seconds, you will receive 2 emails attached with the purchased PDFs and PDF-invoice, respectively. Step 8: Optional -- Go to download PDF. Step 9: Optional -- Click Open/Download PDF to download PDFs and invoice. See screenshots for above steps: Steps 1~3 Steps 4~6 Step 7 Step 8 Step 9 |