Ȩ > ÀڷḶ´ç > ÀÚ·á°Ë»ö > Ç¥ÁØ
ÀÚ·á °Ë»ö°á°ú
Ç¥ÁØÁ¾·ù | Á¤º¸Åë½Å±â¼úº¸°í¼(TTAR) | ||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Ç¥ÁعøÈ£ | [ÆóÁö] TTAR-06.0066 | ±¸ Ç¥ÁعøÈ£ | |||||||||||||||
Á¦°³Á¤ÀÏ | 2010-05-18 | ÃÑ ÆäÀÌÁö | 6 | ||||||||||||||
ÇÑ±Û Ç¥Áظí | ¸ð¹ÙÀÏ RFID ¼ºñ½º ÅÂ±× ÆÐ½º¿öµå ȹµæÀ» À§ÇÑ ¿ä±¸»çÇ× | ||||||||||||||||
¿µ¹® Ç¥Áظí | Requirements for Tag Passwords Acquisition of Mobile RFID Service | ||||||||||||||||
ÇÑ±Û ³»¿ë¿ä¾à | ¸ð¹ÙÀÏ RFID ¼ºñ½º¿¡¼ RFID ű×ÀÇ ¼ÒÀ¯ÀÚ°¡ ű×ÀÇ ±â´ÉÀ» Á¤Áö ½ÃŰ°Å³ª ű×ÀÇ ³»¿ëÀ» ¼öÁ¤Çϱâ À§Çؼ´Â ÅÂ±× ¹«È¿È ÆÐ½º¿öµå(kill password)¿Í ÅÂ±× Á¢±Ù Á¦¾î ÆÐ½º¿öµå(access password)¸¦ ȹµæÇØ¾ß ÇÑ´Ù.
űװ¡ ºÎÂøµÇ¾î ÀÖ´Â »óǰÀ» ±¸¸ÅÇÑ ¼ÒºñÀÚ´Â ÅÂ±× ±â´ÉÀ» Á¤ÁöÇϱâ À§ÇØ ³×Æ®¿öÅ©·ÎºÎÅÍ ÅÂ±× ¹«È¿È ÆÐ½º¿öµå¸¦ ȹµæÇÑ ÈÄ, ÀÚ½ÅÀÇ ¸ð¹ÙÀÏ RFID ´Ü¸»¿¡ ÅÂ±× Á¢±Ù °ü¸® API¸¦ »ç¿ëÇÏ¿© ÆÐ½º¿öµå¸¦ ÀúÀåÇϰí, À̸¦ ÀÌ¿ëÇÏ¿© ¾ðÁ¦µçÁö ÅÂ±× ±â´ÉÀ» Á¤Áö½Ãų ¼ö ÀÖ´Ù. À̸¦ À§ÇØ, º» ±â¼úº¸°í¼¿¡¼´Â ű×ÀÇ ÆÐ½º¿öµå¸¦ ¸ð¹ÙÀÏ RFID ³×Æ®¿öÅ©·ÎºÎÅÍ È¹µæÇϱâ À§ÇÑ ³×Æ®¿öÅ© ±¸¼º, ¼ºñ½º ½Ã³ª¸®¿À ¹× ¿ä±¸»çÇ×À» Á¤ÀÇÇÑ´Ù. |
||||||||||||||||
¿µ¹® ³»¿ë¿ä¾à |
The owner of RFID tag should acquire tag¡¯s kill/access passwords, if he or she wants to kill the tag functionality or access tag memory.
For example, a consumer, who purchases a product equipped with RFID tag, receives tag¡¯s kill-password from the mobile RFID network, then he saves the password at his mobile RFID device and he kills the tag functionality for his privacy protection. This technical report defines the network reference model, service scenario for the acquisition of tag¡¯s passwords and the needed requirements between mobile RFID device and the mobile RFID service network. |
||||||||||||||||
°ü·Ã IPR È®¾à¼ | Á¢¼öµÈ IPR È®¾à¼ ¾øÀ½ | ||||||||||||||||
ÆóÁöÀÏ | 2021-10-21 | ||||||||||||||||
ÆóÁö»çÀ¯ | RFID °ü·Ã Ãʱâ±â¼úÀ» ±â¹ÝÀ¸·Î Á¦Á¤µÈ ³»¿ëÀ̰í, ISO±¹Á¦Ç¥Áذú ÀÏÄ¡ÇÏÁö ¾Ê´Â °ÍÀ¸·Î ÆÇ´ÜµÇ¾î ÆóÁö | ||||||||||||||||
°ü·ÃÆÄÀÏ | TTAR-06.0066.zip | ||||||||||||||||
Ç¥ÁØÀÌ·Â |
|
||||||||||||||||
Ç¥ÁØÀ¯Áöº¸¼öÀÌ·Â |
|