Ç¥ÁØÈ­ Âü¿©¾È³»

TTAÀÇ Ç¥ÁØÇöȲ

Ȩ > Ç¥ÁØÈ­ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ

Ç¥ÁعøÈ£ TTAK.KO-12.0358 ±¸Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2019-12-11 ÃÑÆäÀÌÁö 14
ÇѱÛÇ¥Áظí Á¤º¸ºÐÇÒ¿¡ ÀÇÇÑ ¹ÙÀÌ¿ÀÀÎ½Ä Á¤º¸ º¸È£
¿µ¹®Ç¥Áظí Biometric reference protection using information splitting
Çѱ۳»¿ë¿ä¾à ÀÌ Ç¥ÁØÀº ¹ÙÀÌ¿ÀÀÎ½Ä ½Ã½ºÅÛÀ» ±¸ÇöÇÔ¿¡ À־, ´ÙÁß ±â°ü°£ÀÇ ¹ÙÀÌ¿ÀÀÎ½Ä Á¤º¸ °øÀ¯¿¡ ÀÇÇؼ­ ¾î´À ÇÑ°÷¿¡¼­ ºÒ¹ýÀ¸·Î ¹ÙÀÌ¿ÀÀÎ½Ä Á¤º¸°¡ À¯ÃâµÇ´õ¶óµµ ´ë»óÀÚÀÇ ¹ÙÀÌ¿ÀÀÎ½Ä Á¤º¸°¡ ħÇØ ´çÇÒ ¼ö ÀÖ´Â °æ¿ì¸¦ ¹èÁ¦Çϱâ À§ÇÑ ±â¹ýÀ» ±â¼úÇÑ´Ù. ´ÙÀ½°ú °°Àº Á¤º¸ºÐÇÒ ±â¹ý¿¡ ÀÇÇÑ ¹ÙÀÌ¿ÀÀÎ½Ä Á¤º¸ º¸È£ ±¸Çö ¹æ¹ý°ú ÀÀ¿ë¸ðµ¨À» ±â¼úÇÑ´Ù.

1) ·£´ý ºÐÇÒ¿¡ ÀÇÇÑ ¹ÙÀÌ¿ÀÀÎ½Ä Á¤º¸ÀÇ ºÐÇÒ°ú ÀÎÁõ
2) ¾ÏÈ£ÇÐÀû ±â¹ýÀ» ÀÌ¿ëÇÑ ¹ÙÀÌ¿ÀÀÎ½Ä Á¤º¸ÀÇ ºÐÇÒ°ú ÀÎÁõ
¿µ¹®³»¿ë¿ä¾à The standard describes a scheme for protecting a subject¡¯s biometric reference even if his/her biometric reference is illegally leaked from one place due to the sharing of biometric reference among multiple parties in implementing the biometric recognition system. The implementation method and application model of biometric reference protection by following information splitting techniques are given.

1) biometric reference splitting and authentication scheme using random techniques
2) biometric reference splitting and authentication scheme using cryptographic techniques
±¹Á¦Ç¥ÁØ
°ü·ÃÆÄÀÏ TTAK.KO-12.0358.pdf TTAK.KO-12.0358.pdf            

ÀÌÀü
3GPP - EPC; SRVCC¸¦ À§ÇÑ 3GPP Sv ÀÎÅÍÆäÀ̽º (R10)
´ÙÀ½
3GPP - EPS AAA ÀÎÅÍÆäÀ̽º (R10)