Ȩ > ÀڷḶ´ç > ÀÚ·á°Ë»ö > Ç¥ÁØ
ÀÚ·á °Ë»ö°á°ú
Ç¥ÁØÁ¾·ù | Á¤º¸Åë½Å±â¼úº¸°í¼(TTAR) | ||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Ç¥ÁعøÈ£ | [ÆóÁö] TTAR-06.0093 | ±¸ Ç¥ÁعøÈ£ | |||||||||||||||
Á¦°³Á¤ÀÏ | 2011-05-25 | ÃÑ ÆäÀÌÁö | 11 | ||||||||||||||
ÇÑ±Û Ç¥Áظí | RFID ±â¹Ý À¯°¡Áõ±Ç º¸È£ ½Ã½ºÅÛ ÇÁ·ÎÆÄÀÏ (±â¼úº¸°í¼) | ||||||||||||||||
¿µ¹® Ç¥Áظí | Profiles of RFID-based securities protection system | ||||||||||||||||
ÇÑ±Û ³»¿ë¿ä¾à | º» ±â¼úº¸°í¼´Â RFID ±â¹Ý À¯°¡Áõ±Ç º¸È£ ½Ã½ºÅÛ ±¸ÃàÀ» À§ÇÑ 3°¡Áö ÇÁ·ÎÆÄÀÏÀ» Á¦¾ÈÇÑ´Ù.
ù ¹øÂ° ÇÁ·ÎÆÄÀÏÀº Àбâ Àü¿ë ű׸¦ »ç¿ëÇÏ´Â RFID ±â¹Ý À¯°¡Áõ±Ç º¸È£ ½Ã½ºÅÛ ±¸¼ºÀ» Á¤ÀÇÇϸç, µÎ ¹øÂ° ÇÁ·ÎÆÄÀÏÀº Àбâ/¾²±â ű׸¦ »ç¿ëÇÏ´Â RFID ±â¹Ý À¯°¡Áõ±Ç º¸È£ ½Ã½ºÅÛ ±¸¼º°ú º¸¾È ¼ºñ½º¸¦ Á¤ÀÇÇÑ´Ù. ±×¸®°í ¼¼ ¹øÂ° ÇÁ·ÎÆÄÀÏÀº ¾ÏÈ£ ¿¬»ê ű׸¦ »ç¿ëÇÏ´Â RFID ±â¹Ý À¯°¡Áõ±Ç º¸È£ ½Ã½ºÅÛ ±¸¼º°ú º¸¾È ¼ºñ½º¸¦ Á¤ÀÇÇÑ´Ù. |
||||||||||||||||
¿µ¹® ³»¿ë¿ä¾à |
This technical report includes three profiles for security methods to protect RFID-based securities system.
The first profile defines an RFID-based securities protection system using a read-only tag. The second profile defines an RFID-based securities protection system using a read/write tag and the last profile is related to an RFID-based securities protection system using a tag with a crypto module. |
||||||||||||||||
°ü·Ã IPR È®¾à¼ | Á¢¼öµÈ IPR È®¾à¼ ¾øÀ½ | ||||||||||||||||
ÆóÁöÀÏ | 2015-11-18 | ||||||||||||||||
ÆóÁö»çÀ¯ | |||||||||||||||||
°ü·ÃÆÄÀÏ | TTAR-06.0093.zip | ||||||||||||||||
Ç¥ÁØÀÌ·Â |
|
||||||||||||||||
Ç¥ÁØÀ¯Áöº¸¼öÀÌ·Â |
|