Ç¥ÁØÈ­ Âü¿©¾È³»

TTAÀÇ Ç¥ÁØÇöȲ

Ȩ > Ç¥ÁØÈ­ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ

Ç¥ÁعøÈ£ TTAK.KO-12.0397 ±¸Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2023-12-06 ÃÑÆäÀÌÁö 21
ÇѱÛÇ¥ÁØ¸í µ¥ÀÌÅÍ ÁÖ±Ç °­È­¸¦ À§ÇÑ °³ÀÎ °£ ½Å¿øÈ®ÀνýºÅÛ
¿µ¹®Ç¥Áظí Peer-to-peer Identification System for Data Sovereignty Enhancing
Çѱ۳»¿ë¿ä¾à ÀÌ Ç¥ÁØÀº ¹«¼±Åë½Å ¸ðµâ(¿¹: Bluetooth, Wi-Fi Direct), ½Å¿ø Áõ¸í¼­ °ü¸® ¸ðµâ, °³ÀÎÁ¤º¸ °ü¸® ¸ðµâ, ¾ÏȣŰ °ü¸® ¸ðµâ, ¿ÀÇÁüÀÎ(off-chain), ¿ÂüÀÎ(on-chain) µîÀ¸·Î ±¸¼ºµÇ´Â ±Ù°Å¸® ¹«¼±Åë½ÅÀ» ÀÌ¿ëÇÑ °³ÀÎ °£ ½Å¿øÈ®ÀνýºÅÛÀ» ±â¼úÇÑ´Ù. ¶ÇÇÑ ÇØ´ç ½Ã½ºÅÛ¿¡ ´ëÇÑ º¸¾È À§ÇùÀ» ½Äº°ÇÏ°í ±×¿¡ ´ëÀÀÇÏ´Â º¸¾È ¿ä±¸»çÇ×À» ±â¼úÇÑ´Ù.
¿µ¹®³»¿ë¿ä¾à The standard should specify a peer-to-peer identification system using short-range wireless communication including wireless communication module (e.g., Bluetooth, Wi-Fi Direct), certificate management module, PII management module, cryptographic key management module, off-chain, on-chain. It also identifies security threats to the system and specify security requirements against the identified security threats.
±¹Á¦Ç¥ÁØ
°ü·ÃÆÄÀÏ TTAK.KO-12.0397.pdf TTAK.KO-12.0397.pdf            

ÀÌÀü
ºñÄÁ ±â¹Ý µ¿Àû ÀÎÁõÁ¤º¸¸¦ ÀÌ¿ëÇÑ ¸ð¹ÙÀÏ °áÁ¦ ÇÁ·¹ÀÓ¿öÅ©
´ÙÀ½
È£½ºÆ® ³» ¾Ç¼ºÄÚµå °ø°ÝÀ¸·ÎºÎÅÍ ½ºÅ丮Áö¸¦ º¸È£Çϱâ À§ÇÑ º¸¾È ÇÁ·¹ÀÓ¿öÅ©