Ç¥ÁØÈ­ Âü¿©¾È³»

TTAÀÇ Ç¥ÁØÇöȲ

Ȩ > Ç¥ÁØÈ­ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ

Ç¥ÁعøÈ£ TTAK.KO-12.0358 ±¸Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2019-12-11 ÃÑÆäÀÌÁö 14
ÇѱÛÇ¥Áظí Á¤º¸ºÐÇÒ¿¡ ÀÇÇÑ ¹ÙÀÌ¿ÀÀÎ½Ä Á¤º¸ º¸È£
¿µ¹®Ç¥Áظí Biometric reference protection using information splitting
Çѱ۳»¿ë¿ä¾à ÀÌ Ç¥ÁØÀº ¹ÙÀÌ¿ÀÀÎ½Ä ½Ã½ºÅÛÀ» ±¸ÇöÇÔ¿¡ À־, ´ÙÁß ±â°ü°£ÀÇ ¹ÙÀÌ¿ÀÀÎ½Ä Á¤º¸ °øÀ¯¿¡ ÀÇÇؼ­ ¾î´À ÇÑ°÷¿¡¼­ ºÒ¹ýÀ¸·Î ¹ÙÀÌ¿ÀÀÎ½Ä Á¤º¸°¡ À¯ÃâµÇ´õ¶óµµ ´ë»óÀÚÀÇ ¹ÙÀÌ¿ÀÀÎ½Ä Á¤º¸°¡ ħÇØ ´çÇÒ ¼ö ÀÖ´Â °æ¿ì¸¦ ¹èÁ¦Çϱâ À§ÇÑ ±â¹ýÀ» ±â¼úÇÑ´Ù. ´ÙÀ½°ú °°Àº Á¤º¸ºÐÇÒ ±â¹ý¿¡ ÀÇÇÑ ¹ÙÀÌ¿ÀÀÎ½Ä Á¤º¸ º¸È£ ±¸Çö ¹æ¹ý°ú ÀÀ¿ë¸ðµ¨À» ±â¼úÇÑ´Ù.

1) ·£´ý ºÐÇÒ¿¡ ÀÇÇÑ ¹ÙÀÌ¿ÀÀÎ½Ä Á¤º¸ÀÇ ºÐÇÒ°ú ÀÎÁõ
2) ¾ÏÈ£ÇÐÀû ±â¹ýÀ» ÀÌ¿ëÇÑ ¹ÙÀÌ¿ÀÀÎ½Ä Á¤º¸ÀÇ ºÐÇÒ°ú ÀÎÁõ
¿µ¹®³»¿ë¿ä¾à The standard describes a scheme for protecting a subject¡¯s biometric reference even if his/her biometric reference is illegally leaked from one place due to the sharing of biometric reference among multiple parties in implementing the biometric recognition system. The implementation method and application model of biometric reference protection by following information splitting techniques are given.

1) biometric reference splitting and authentication scheme using random techniques
2) biometric reference splitting and authentication scheme using cryptographic techniques
±¹Á¦Ç¥ÁØ
°ü·ÃÆÄÀÏ TTAK.KO-12.0358.pdf TTAK.KO-12.0358.pdf            

ÀÌÀü
IMT2000 3GPP - 3¼¼´ë À̵¿Åë½Å½Ã½ºÅÛ 1999³âµµÆÇ ±Ô°Ý
´ÙÀ½
IMT2000 3GPP - 3GPP ÀÛ¾÷¹æ¹ý