ÀÚ·á°Ë»ö-Ç¥ÁØ

Ȩ > ÀڷḶ´ç > ÀÚ·á°Ë»ö > Ç¥ÁØ

ÀÚ·á °Ë»ö°á°ú

°Ë»öÆäÀÌÁö·Î
Ç¥ÁØÁ¾·ù Á¤º¸Åë½Å±â¼úº¸°í¼­(TTAR)
Ç¥ÁعøÈ£ [ÆóÁö] TTAR-06.0066 ±¸ Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2010-05-18 ÃÑ ÆäÀÌÁö 6
ÇÑ±Û Ç¥ÁØ¸í ¸ð¹ÙÀÏ RFID ¼­ºñ½º ÅÂ±× ÆÐ½º¿öµå ȹµæÀ» À§ÇÑ ¿ä±¸»çÇ×
¿µ¹® Ç¥Áظí Requirements for Tag Passwords Acquisition of Mobile RFID Service
ÇÑ±Û ³»¿ë¿ä¾à ¸ð¹ÙÀÏ RFID ¼­ºñ½º¿¡¼­ RFID ű×ÀÇ ¼ÒÀ¯ÀÚ°¡ ű×ÀÇ ±â´ÉÀ» Á¤Áö ½ÃŰ°Å³ª ű×ÀÇ ³»¿ëÀ» ¼öÁ¤Çϱâ À§Çؼ­´Â ÅÂ±× ¹«È¿È­ ÆÐ½º¿öµå(kill password)¿Í ÅÂ±× Á¢±Ù Á¦¾î ÆÐ½º¿öµå(access password)¸¦ ȹµæÇØ¾ß ÇÑ´Ù.
űװ¡ ºÎÂøµÇ¾î ÀÖ´Â »óǰÀ» ±¸¸ÅÇÑ ¼ÒºñÀÚ´Â ÅÂ±× ±â´ÉÀ» Á¤ÁöÇϱâ À§ÇØ ³×Æ®¿öÅ©·ÎºÎÅÍ ÅÂ±× ¹«È¿È­ ÆÐ½º¿öµå¸¦ ȹµæÇÑ ÈÄ, ÀÚ½ÅÀÇ ¸ð¹ÙÀÏ RFID ´Ü¸»¿¡ ÅÂ±× Á¢±Ù °ü¸® API¸¦ »ç¿ëÇÏ¿© ÆÐ½º¿öµå¸¦ ÀúÀåÇϰí, À̸¦ ÀÌ¿ëÇÏ¿© ¾ðÁ¦µçÁö ÅÂ±× ±â´ÉÀ» Á¤Áö½Ãų ¼ö ÀÖ´Ù.
À̸¦ À§ÇØ, º» ±â¼úº¸°í¼­¿¡¼­´Â ű×ÀÇ ÆÐ½º¿öµå¸¦ ¸ð¹ÙÀÏ RFID ³×Æ®¿öÅ©·ÎºÎÅÍ È¹µæÇϱâ À§ÇÑ ³×Æ®¿öÅ© ±¸¼º, ¼­ºñ½º ½Ã³ª¸®¿À ¹× ¿ä±¸»çÇ×À» Á¤ÀÇÇÑ´Ù.
¿µ¹® ³»¿ë¿ä¾à The owner of RFID tag should acquire tag¡¯s kill/access passwords, if he or she wants to kill the tag functionality or access tag memory.
For example, a consumer, who purchases a product equipped with RFID tag, receives tag¡¯s kill-password from the mobile RFID network, then he saves the password at his mobile RFID device and he kills the tag functionality for his privacy protection.
This technical report defines the network reference model, service scenario for the acquisition of tag¡¯s passwords and the needed requirements between mobile RFID device and the mobile RFID service network.
°ü·Ã IPR È®¾à¼­ Á¢¼öµÈ IPR È®¾à¼­ ¾øÀ½
ÆóÁöÀÏ 2021-10-21
ÆóÁö»çÀ¯ RFID °ü·Ã Ãʱâ±â¼úÀ» ±â¹ÝÀ¸·Î Á¦Á¤µÈ ³»¿ëÀ̰í, ISO±¹Á¦Ç¥Áذú ÀÏÄ¡ÇÏÁö ¾Ê´Â °ÍÀ¸·Î ÆÇ´ÜµÇ¾î ÆóÁö
°ü·ÃÆÄÀÏ  TTAR-06.0066.zip
Ç¥ÁØÀÌ·Â
Ç¥Áظí Ç¥ÁعøÈ£ Á¦°³Á¤ÀÏ ±¸ºÐ À¯È¿
¿©ºÎ
IPR
È®¾à¼­
ÆÄÀÏ
¸ð¹ÙÀÏ RFID ¼­ºñ½º ÅÂ±× ÆÐ½º¿öµå ȹµæÀ» À§ÇÑ ¿ä±¸»çÇ× TTAR-06.0066 2010-05-18 Á¦Á¤ ÆóÁö ¾øÀ½
Ç¥ÁØÀ¯Áöº¸¼öÀÌ·Â
°ËÅäÀÏÀÚ °ËÅä°á°ú °ËÅä³»¿ë
2019-05-31 À¯Áö ÇöÀç±îÁö Ȱ¿ëÁßÀ̰ųª ÀÀ¿ë °¡´É¼ºÀÌ ³ôÀ½¿¡ µû¶ó À¯Áö