Information security technology—Security techniques requirement for citizen cyber electronic identity—Part 2:Security technique requirements of carrier
Information security technology—Security technique requirements for citizen cyber electronic identity—Part 3: Verification service message and processing rules