2025-12-14 216.73.216.3
Code of China Chinese Classification Professional Classification ICS Classification Latest News Value-added Services

Position: Chinese Standard in English/GB/T 41815.3-2023
GB/T 41815.3-2023   Information technology— Biometric presentation attack detection—Part 3: Testing and reporting (English Version)
Standard No.: GB/T 41815.3-2023 Status:valid remind me the status change

Email:

Target Language:English File Format:PDF
Word Count: 20500 words Translation Price(USD):615.0 remind me the price change

Email:

Implemented on:2023-12-1 Delivery: via email in 1~3 business day

→ → →

,,2023-12-1,C643100BF36C81C81685420157857
Standard No.: GB/T 41815.3-2023
English Name: Information technology— Biometric presentation attack detection—Part 3: Testing and reporting
Chinese Name: 信息技术 生物特征识别呈现攻击检测 第3部分:测试与报告
Chinese Classification: L67    Computer application
Professional Classification: GB    National Standard
ICS Classification: 35.240.15 35.240.15    Identification cards and related devices 35.240.15
Source Content Issued by: SAMR; SAC
Issued on: 2023-05-23
Implemented on: 2023-12-1
Status: valid
Target Language: English
File Format: PDF
Word Count: 20500 words
Translation Price(USD): 615.0
Delivery: via email in 1~3 business day
GB/T 41815.3-2023 Information technology - Biometric presentation attack detection - Part 3: Testing and reporting 1 Scope This document establishes: ——principles and methods for the performance assessment of presentation attack detection (PAD) mechanisms; ——reporting of testing results from evaluations of PAD mechanisms; and ——a classification of known attack types (Annex A). Outside the scope are: ——standardization of specific PAD mechanisms; ——detailed information about countermeasures (i.e. anti-spoofing techniques), algorithms or sensors; and ——overall system-level security or vulnerability assessment. The attacks considered in GB/T 41815 take place at the biometric capture device during presentation. Any other attacks are considered outside the scope of this document. This document is applicable to the design, development, integration and detection of hardware and software products related to biometric presentation attack detection. 2 Normative references The following documents are referred to in the text in such a way that some or all of their content constitutes requirements of this document. For dated references, only the edition cited applies. For undated references, the latest edition of the referenced document (including any amendments) applies. ISO/IEC 2382-37 Information technology - Vocabulary - Part 37: Biometrics ISO/IEC 15408-1 Information security, cybersecurity and privacy protection - Evaluation criteria for IT security - Part 1: Introduction and general model ISO/IEC 15408-2 Information security, cybersecurity and privacy protection - Evaluation criteria for IT security - Part 2: Security functional components ISO/IEC 15408-3 Information security, cybersecurity and privacy protection - Evaluation criteria for IT security - Part 3: Security assurance components ISO/IEC 19795-1 Information technology - Biometric performance testing and reporting - Part 1: Principles and framework ISO/IEC 30107-1 Information technology - Biometric presentation attack detection - Part 1: Framework 3. Terms and definitions For the purposes of this document, the terms and definitions given in ISO/IEC 19795-1, ISO/IEC 2382-37, ISO/IEC 30107-1 and the following apply. 3.1 Attack elements 3.1.1 presentation attack attack presentation presentation to the biometric data capture subsystem with the goal of interfering with the operation of the biometric system Note: An attack presentation can be a single attempt, a multi-attempt transaction, or another type of interaction with a subsystem. 3.1.2 bona fide presentation interaction of the biometric test subject and the biometric data capture subsystem in the fashion intended by the policy of the biometric system Note 1: Bona fide is analogous to normal or routine, when referring to a bona fide presentation. Note 2: Bona fide presentations can include those in which the user has a low level of training or skill. Bona fide presentations encompass the totality of good-faith presentations to a biometric data capture subsystem. 3.1.3 attack type elements and characteristics of a presentation attack, including presentation attack instrument (PAI) species, concealer or impostor attack, degree of supervision, and method of interaction with the capture device 3.1.4 test approach totality of considerations and factors involved in presentation attack detection (PAD) evaluation Note 1: Elements of a test approach are given in Clauses 6–10. Note 2: A test approach refers to all processes, factors and aspects specified in the course of the evaluation. 3.1.5 item under test implementation that is the object of a test assertion or test case Note: The IUT is the equivalent of the "target of evaluation" (TOE) in Common Criteria evaluations. 3.1.6 presentation attack instrument species class of presentation attack instruments (PAIs) created using a common production method and based on different biometric characteristics EXAMPLE 1: A set of fake fingerprints all made in the same way with the same materials but with different friction ridge patterns would constitute a PAIS. EXAMPLE 2: A specific type of alteration made to the fingerprints of several test subjects would constitute a PAIS. Note 1: The term “recipe” is often used to refer to how to make a PAIS. Note 2: PAIs of the same species can have different success rates due to variability in the production process or in the PAI source. 3.1.7 PAI series class of presentation attack instruments (PAIs) created using a common production method and based on the same biometric characteristics EXAMPLE: A set of fake fingerprints all made in the same way with the same materials and with the same friction ridge pattern. Note: Depending on the experimental goals, an evaluation can potentially utilize multiple series, each with different production methods or sources. While tests involving several biometric sources can demonstrate generality of a PAI species, they add variation associated with individual human traits. 3.1.8 target of evaluation IT product that is the subject of the evaluation within the context of the Common Criteria Note: The TOE is the equivalent of the "item under test" (IUT) in Common Criteria evaluations. 3.1.9 attack potential measure of the capability to attack a target of evaluation (TOE) given the attacker’s knowledge, proficiency, resources and motivation 3.2 Metrics 3.2.1 attack presentation classification error rate proportion of attack presentations using the same presentation attack instrument (PAI) species incorrectly classified as bona fide presentations by a presentation attack detection (PAD) subsystem in a specific scenario 3.2.2 attack presentation classification error rate at the given attack potential attack presentation classification error rate (APCER) of the most successful presentation attack instrument (PAI) species within a given attack potential 3.2.3 bona fide presentation classification error rate proportion of bona fide presentations incorrectly classified as presentation attacks in a specific scenario 3.2.4 attack presentation acquisition rate proportion of attack presentations using the same presentation attack instrument (PAI) species from which the data capture subsystem acquires a biometric sample of sufficient quality 3.2.5 attack presentation non-response rate proportion of attack presentations using the same presentation attack instrument (PAI) species that cause no response at the presentation attack detection (PAD) subsystem or data capture subsystem EXAMPLE: A fingerprint system can potentially not register or react to the presentation of a PAI due to the PAI’s lack of realism. 3.2.6 bona fide presentation non-response rate proportion of bona fide presentations that cause no response at the presentation attack detection (PAD) subsystem or data capture subsystem
Code of China
Standard
GB/T 41815.3-2023  Information technology— Biometric presentation attack detection—Part 3: Testing and reporting (English Version)
Standard No.GB/T 41815.3-2023
Statusvalid
LanguageEnglish
File FormatPDF
Word Count20500 words
Price(USD)615.0
Implemented on2023-12-1
Deliveryvia email in 1~3 business day
Detail of GB/T 41815.3-2023
Standard No.
GB/T 41815.3-2023
English Name
Information technology— Biometric presentation attack detection—Part 3: Testing and reporting
Chinese Name
信息技术 生物特征识别呈现攻击检测 第3部分:测试与报告
Chinese Classification
L67
Professional Classification
GB
ICS Classification
Issued by
SAMR; SAC
Issued on
2023-05-23
Implemented on
2023-12-1
Status
valid
Superseded by
Superseded on
Abolished on
Superseding
Language
English
File Format
PDF
Word Count
20500 words
Price(USD)
615.0
Keywords
GB/T 41815.3-2023, GB 41815.3-2023, GBT 41815.3-2023, GB/T41815.3-2023, GB/T 41815.3, GB/T41815.3, GB41815.3-2023, GB 41815.3, GB41815.3, GBT41815.3-2023, GBT 41815.3, GBT41815.3
Introduction of GB/T 41815.3-2023
GB/T 41815.3-2023 Information technology - Biometric presentation attack detection - Part 3: Testing and reporting 1 Scope This document establishes: ——principles and methods for the performance assessment of presentation attack detection (PAD) mechanisms; ——reporting of testing results from evaluations of PAD mechanisms; and ——a classification of known attack types (Annex A). Outside the scope are: ——standardization of specific PAD mechanisms; ——detailed information about countermeasures (i.e. anti-spoofing techniques), algorithms or sensors; and ——overall system-level security or vulnerability assessment. The attacks considered in GB/T 41815 take place at the biometric capture device during presentation. Any other attacks are considered outside the scope of this document. This document is applicable to the design, development, integration and detection of hardware and software products related to biometric presentation attack detection. 2 Normative references The following documents are referred to in the text in such a way that some or all of their content constitutes requirements of this document. For dated references, only the edition cited applies. For undated references, the latest edition of the referenced document (including any amendments) applies. ISO/IEC 2382-37 Information technology - Vocabulary - Part 37: Biometrics ISO/IEC 15408-1 Information security, cybersecurity and privacy protection - Evaluation criteria for IT security - Part 1: Introduction and general model ISO/IEC 15408-2 Information security, cybersecurity and privacy protection - Evaluation criteria for IT security - Part 2: Security functional components ISO/IEC 15408-3 Information security, cybersecurity and privacy protection - Evaluation criteria for IT security - Part 3: Security assurance components ISO/IEC 19795-1 Information technology - Biometric performance testing and reporting - Part 1: Principles and framework ISO/IEC 30107-1 Information technology - Biometric presentation attack detection - Part 1: Framework 3. Terms and definitions For the purposes of this document, the terms and definitions given in ISO/IEC 19795-1, ISO/IEC 2382-37, ISO/IEC 30107-1 and the following apply. 3.1 Attack elements 3.1.1 presentation attack attack presentation presentation to the biometric data capture subsystem with the goal of interfering with the operation of the biometric system Note: An attack presentation can be a single attempt, a multi-attempt transaction, or another type of interaction with a subsystem. 3.1.2 bona fide presentation interaction of the biometric test subject and the biometric data capture subsystem in the fashion intended by the policy of the biometric system Note 1: Bona fide is analogous to normal or routine, when referring to a bona fide presentation. Note 2: Bona fide presentations can include those in which the user has a low level of training or skill. Bona fide presentations encompass the totality of good-faith presentations to a biometric data capture subsystem. 3.1.3 attack type elements and characteristics of a presentation attack, including presentation attack instrument (PAI) species, concealer or impostor attack, degree of supervision, and method of interaction with the capture device 3.1.4 test approach totality of considerations and factors involved in presentation attack detection (PAD) evaluation Note 1: Elements of a test approach are given in Clauses 6–10. Note 2: A test approach refers to all processes, factors and aspects specified in the course of the evaluation. 3.1.5 item under test implementation that is the object of a test assertion or test case Note: The IUT is the equivalent of the "target of evaluation" (TOE) in Common Criteria evaluations. 3.1.6 presentation attack instrument species class of presentation attack instruments (PAIs) created using a common production method and based on different biometric characteristics EXAMPLE 1: A set of fake fingerprints all made in the same way with the same materials but with different friction ridge patterns would constitute a PAIS. EXAMPLE 2: A specific type of alteration made to the fingerprints of several test subjects would constitute a PAIS. Note 1: The term “recipe” is often used to refer to how to make a PAIS. Note 2: PAIs of the same species can have different success rates due to variability in the production process or in the PAI source. 3.1.7 PAI series class of presentation attack instruments (PAIs) created using a common production method and based on the same biometric characteristics EXAMPLE: A set of fake fingerprints all made in the same way with the same materials and with the same friction ridge pattern. Note: Depending on the experimental goals, an evaluation can potentially utilize multiple series, each with different production methods or sources. While tests involving several biometric sources can demonstrate generality of a PAI species, they add variation associated with individual human traits. 3.1.8 target of evaluation IT product that is the subject of the evaluation within the context of the Common Criteria Note: The TOE is the equivalent of the "item under test" (IUT) in Common Criteria evaluations. 3.1.9 attack potential measure of the capability to attack a target of evaluation (TOE) given the attacker’s knowledge, proficiency, resources and motivation 3.2 Metrics 3.2.1 attack presentation classification error rate proportion of attack presentations using the same presentation attack instrument (PAI) species incorrectly classified as bona fide presentations by a presentation attack detection (PAD) subsystem in a specific scenario 3.2.2 attack presentation classification error rate at the given attack potential attack presentation classification error rate (APCER) of the most successful presentation attack instrument (PAI) species within a given attack potential 3.2.3 bona fide presentation classification error rate proportion of bona fide presentations incorrectly classified as presentation attacks in a specific scenario 3.2.4 attack presentation acquisition rate proportion of attack presentations using the same presentation attack instrument (PAI) species from which the data capture subsystem acquires a biometric sample of sufficient quality 3.2.5 attack presentation non-response rate proportion of attack presentations using the same presentation attack instrument (PAI) species that cause no response at the presentation attack detection (PAD) subsystem or data capture subsystem EXAMPLE: A fingerprint system can potentially not register or react to the presentation of a PAI due to the PAI’s lack of realism. 3.2.6 bona fide presentation non-response rate proportion of bona fide presentations that cause no response at the presentation attack detection (PAD) subsystem or data capture subsystem
Contents of GB/T 41815.3-2023
About Us   |    Contact Us   |    Terms of Service   |    Privacy   |    Cancellation & Refund Policy   |    Payment
Tel: +86-10-8572 5655 | Fax: +86-10-8581 9515 | Email: coc@codeofchina.com | QQ: 672269886
Copyright: Beijing COC Tech Co., Ltd. 2008-2040
 
 
Keywords:
GB/T 41815.3-2023, GB 41815.3-2023, GBT 41815.3-2023, GB/T41815.3-2023, GB/T 41815.3, GB/T41815.3, GB41815.3-2023, GB 41815.3, GB41815.3, GBT41815.3-2023, GBT 41815.3, GBT41815.3