Ç¥ÁØÈ­ Âü¿©¾È³»

TTAÀÇ Ç¥ÁØÇöȲ

Ȩ > Ç¥ÁØÈ­ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ

Ç¥ÁعøÈ£ TTAK.KO-12.0358 ±¸Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2019-12-11 ÃÑÆäÀÌÁö 14
ÇѱÛÇ¥Áظí Á¤º¸ºÐÇÒ¿¡ ÀÇÇÑ ¹ÙÀÌ¿ÀÀÎ½Ä Á¤º¸ º¸È£
¿µ¹®Ç¥Áظí Biometric reference protection using information splitting
Çѱ۳»¿ë¿ä¾à ÀÌ Ç¥ÁØÀº ¹ÙÀÌ¿ÀÀÎ½Ä ½Ã½ºÅÛÀ» ±¸ÇöÇÔ¿¡ À־, ´ÙÁß ±â°ü°£ÀÇ ¹ÙÀÌ¿ÀÀÎ½Ä Á¤º¸ °øÀ¯¿¡ ÀÇÇؼ­ ¾î´À ÇÑ°÷¿¡¼­ ºÒ¹ýÀ¸·Î ¹ÙÀÌ¿ÀÀÎ½Ä Á¤º¸°¡ À¯ÃâµÇ´õ¶óµµ ´ë»óÀÚÀÇ ¹ÙÀÌ¿ÀÀÎ½Ä Á¤º¸°¡ ħÇØ ´çÇÒ ¼ö ÀÖ´Â °æ¿ì¸¦ ¹èÁ¦Çϱâ À§ÇÑ ±â¹ýÀ» ±â¼úÇÑ´Ù. ´ÙÀ½°ú °°Àº Á¤º¸ºÐÇÒ ±â¹ý¿¡ ÀÇÇÑ ¹ÙÀÌ¿ÀÀÎ½Ä Á¤º¸ º¸È£ ±¸Çö ¹æ¹ý°ú ÀÀ¿ë¸ðµ¨À» ±â¼úÇÑ´Ù.

1) ·£´ý ºÐÇÒ¿¡ ÀÇÇÑ ¹ÙÀÌ¿ÀÀÎ½Ä Á¤º¸ÀÇ ºÐÇÒ°ú ÀÎÁõ
2) ¾ÏÈ£ÇÐÀû ±â¹ýÀ» ÀÌ¿ëÇÑ ¹ÙÀÌ¿ÀÀÎ½Ä Á¤º¸ÀÇ ºÐÇÒ°ú ÀÎÁõ
¿µ¹®³»¿ë¿ä¾à The standard describes a scheme for protecting a subject¡¯s biometric reference even if his/her biometric reference is illegally leaked from one place due to the sharing of biometric reference among multiple parties in implementing the biometric recognition system. The implementation method and application model of biometric reference protection by following information splitting techniques are given.

1) biometric reference splitting and authentication scheme using random techniques
2) biometric reference splitting and authentication scheme using cryptographic techniques
±¹Á¦Ç¥ÁØ
°ü·ÃÆÄÀÏ TTAK.KO-12.0358.pdf TTAK.KO-12.0358.pdf            

ÀÌÀü
3rd Generation Partnership Project;Technical Specification Group Core Network and Terminals;5G System; Session Management Policy Control Service; Stage 3(Release 17)
´ÙÀ½
3rd Generation Partnership Project;Technical Specification Group Core Network and Terminals;5G System; Policy and Charging Control signalling flows and QoS parameter mapping; Stage 3(Release 17)