ÀÚ·á°Ë»ö-Ç¥ÁØ

Ȩ > ÀڷḶ´ç > ÀÚ·á°Ë»ö > Ç¥ÁØ

ÀÚ·á °Ë»ö°á°ú

°Ë»öÆäÀÌÁö·Î
Ç¥ÁØÁ¾·ù Á¤º¸Åë½Å±â¼úº¸°í¼­(TTAR)
Ç¥ÁعøÈ£ [ÆóÁö] TTAR-06.0093 ±¸ Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2011-05-25 ÃÑ ÆäÀÌÁö 11
ÇÑ±Û Ç¥Áظí RFID ±â¹Ý À¯°¡Áõ±Ç º¸È£ ½Ã½ºÅÛ ÇÁ·ÎÆÄÀÏ (±â¼úº¸°í¼­)
¿µ¹® Ç¥Áظí Profiles of RFID-based securities protection system
ÇÑ±Û ³»¿ë¿ä¾à º» ±â¼úº¸°í¼­´Â RFID ±â¹Ý À¯°¡Áõ±Ç º¸È£ ½Ã½ºÅÛ ±¸ÃàÀ» À§ÇÑ 3°¡Áö ÇÁ·ÎÆÄÀÏÀ» Á¦¾ÈÇÑ´Ù.
ù ¹øÂ° ÇÁ·ÎÆÄÀÏÀº Àбâ Àü¿ë ű׸¦ »ç¿ëÇÏ´Â RFID ±â¹Ý À¯°¡Áõ±Ç º¸È£ ½Ã½ºÅÛ ±¸¼ºÀ» Á¤ÀÇÇϸç, µÎ ¹øÂ° ÇÁ·ÎÆÄÀÏÀº Àбâ/¾²±â ű׸¦ »ç¿ëÇÏ´Â RFID ±â¹Ý À¯°¡Áõ±Ç º¸È£ ½Ã½ºÅÛ ±¸¼º°ú º¸¾È ¼­ºñ½º¸¦ Á¤ÀÇÇÑ´Ù. ±×¸®°í ¼¼ ¹øÂ° ÇÁ·ÎÆÄÀÏÀº ¾ÏÈ£ ¿¬»ê ű׸¦ »ç¿ëÇÏ´Â RFID ±â¹Ý À¯°¡Áõ±Ç º¸È£ ½Ã½ºÅÛ ±¸¼º°ú º¸¾È ¼­ºñ½º¸¦ Á¤ÀÇÇÑ´Ù.
¿µ¹® ³»¿ë¿ä¾à This technical report includes three profiles for security methods to protect RFID-based securities system.
The first profile defines an RFID-based securities protection system using a read-only tag. The second profile defines an RFID-based securities protection system using a read/write tag and the last profile is related to an RFID-based securities protection system using a tag with a crypto module.
°ü·Ã IPR È®¾à¼­ Á¢¼öµÈ IPR È®¾à¼­ ¾øÀ½
ÆóÁöÀÏ 2015-11-18
ÆóÁö»çÀ¯
°ü·ÃÆÄÀÏ  TTAR-06.0093.zip
Ç¥ÁØÀÌ·Â
Ç¥Áظí Ç¥ÁعøÈ£ Á¦°³Á¤ÀÏ ±¸ºÐ À¯È¿
¿©ºÎ
IPR
È®¾à¼­
ÆÄÀÏ
RFID ±â¹Ý À¯°¡Áõ±Ç º¸È£ ½Ã½ºÅÛ ÇÁ·ÎÆÄÀÏ (±â¼úº¸°í¼­) TTAR-06.0093 2011-05-25 Á¦Á¤ ÆóÁö ¾øÀ½
Ç¥ÁØÀ¯Áöº¸¼öÀÌ·Â
°ËÅäÀÏÀÚ °ËÅä°á°ú °ËÅä³»¿ë
2015-06-03 ÆóÁö -