ÀÚ·á°Ë»ö-Ç¥ÁØ

Ȩ > ÀڷḶ´ç > ÀÚ·á°Ë»ö > Ç¥ÁØ

ÀÚ·á °Ë»ö°á°ú

°Ë»öÆäÀÌÁö·Î
Ç¥ÁØÁ¾·ù Á¤º¸Åë½Å´ÜüǥÁØ(TTAS)
Ç¥ÁعøÈ£ TTAK.KO-12.0160 ±¸ Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2010-12-23 ÃÑ ÆäÀÌÁö 24
ÇÑ±Û Ç¥ÁØ¸í ¹ÙÀÌ¿À ÀÎ½Ä Á¤º¸ ¹× °³ÀÎ ½Äº° Á¤º¸ µ¥ÀÌÅͺ£À̽ºÀÇ ºÐ¸® ¿î¿µ ¹æ¹ý
¿µ¹® Ç¥Áظí Separative Operation Method for Biometric Reference and Identity Reference Databases
ÇÑ±Û ³»¿ë¿ä¾à °³ÀÎ ½Äº° Á¤º¸¿Í ¹ÙÀÌ¿À ÀÎ½Ä Á¤º¸ DB¸¦ ³í¸®ÀûÀ̳ª ¹°¸®ÀûÀ¸·Î ºÐ¸®ÇÏ¿© ¿î¿µÇÏ´Â °ÍÀº ¹Ù¶÷Á÷Çϳª, Çʿ信 µû¶ó¼­´Â µÎ °³ÀÇ ½Äº° Á¤º¸¸¦ °øÅëÀ¸·Î ÁöĪÇÒ ¼ö ÀÖ´Â °øÅë ½Äº°ÀÚ(Common Identifier)°¡ ÇÊ¿äÇÏ´Ù. ÀÌ·¯ÇÑ »óȲ¿¡¼­µµ ´ÙÀ½°ú °°Àº º¸¾È ¿ä±¸ »çÇ×À» ¸¸Á·ÇÏ´Â ¿î¿µ ¹æ¾ÈÀ» Á¦½ÃÇÑ´Ù.
¿µ¹® ³»¿ë¿ä¾à Secure binding of a pair of IR and BR assuming separated databases for IR and BR with separated control and their usages is described. The database for identity reference is called DBIR and that for biometric reference is called DBBR. It is assumed that DBIR uses a secret key Ki, and DBBR uses a secret key Kb to protect their database contents. In addition, it is assumed that the databases share a secret key Ke for securing communication messages.
°ü·Ã IPR È®¾à¼­    [È®¾à¼­ º¸±â]
°ü·ÃÆÄÀÏ    TTAK.KO-12.0160.pdf TTAK.KO-12.0160.pdf
Ç¥ÁØÀÌ·Â
Ç¥Áظí Ç¥ÁعøÈ£ Á¦°³Á¤ÀÏ ±¸ºÐ À¯È¿
¿©ºÎ
IPR
È®¾à¼­
ÆÄÀÏ
¹ÙÀÌ¿À ÀÎ½Ä Á¤º¸ ¹× °³ÀÎ ½Äº° Á¤º¸ µ¥ÀÌÅͺ£À̽ºÀÇ ºÐ¸® ¿î¿µ ¹æ¹ý TTAK.KO-12.0160 2010-12-23 Á¦Á¤ À¯È¿ 2010-049
TTAK.KO-12.0160.pdf
Ç¥ÁØÀ¯Áöº¸¼öÀÌ·Â
°ËÅäÀÏÀÚ °ËÅä°á°ú °ËÅä³»¿ë
2019-05-31 À¯Áö ÇöÀç Ȱ¿ë µÇ°í Àִ ǥÁØÀ¸·Î À¯Áö°¡ ÇÊ¿ä