Ç¥ÁØÈ­ Âü¿©¾È³»

TTAÀÇ Ç¥ÁØÇöȲ

Ȩ > Ç¥ÁØÈ­ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ

Ç¥ÁعøÈ£ TTAK.KO-12.0397 ±¸Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2023-12-06 ÃÑÆäÀÌÁö 21
ÇѱÛÇ¥ÁØ¸í µ¥ÀÌÅÍ ÁÖ±Ç °­È­¸¦ À§ÇÑ °³ÀÎ °£ ½Å¿øÈ®ÀνýºÅÛ
¿µ¹®Ç¥Áظí Peer-to-peer Identification System for Data Sovereignty Enhancing
Çѱ۳»¿ë¿ä¾à ÀÌ Ç¥ÁØÀº ¹«¼±Åë½Å ¸ðµâ(¿¹: Bluetooth, Wi-Fi Direct), ½Å¿ø Áõ¸í¼­ °ü¸® ¸ðµâ, °³ÀÎÁ¤º¸ °ü¸® ¸ðµâ, ¾ÏȣŰ °ü¸® ¸ðµâ, ¿ÀÇÁüÀÎ(off-chain), ¿ÂüÀÎ(on-chain) µîÀ¸·Î ±¸¼ºµÇ´Â ±Ù°Å¸® ¹«¼±Åë½ÅÀ» ÀÌ¿ëÇÑ °³ÀÎ °£ ½Å¿øÈ®ÀνýºÅÛÀ» ±â¼úÇÑ´Ù. ¶ÇÇÑ ÇØ´ç ½Ã½ºÅÛ¿¡ ´ëÇÑ º¸¾È À§ÇùÀ» ½Äº°ÇÏ°í ±×¿¡ ´ëÀÀÇÏ´Â º¸¾È ¿ä±¸»çÇ×À» ±â¼úÇÑ´Ù.
¿µ¹®³»¿ë¿ä¾à The standard should specify a peer-to-peer identification system using short-range wireless communication including wireless communication module (e.g., Bluetooth, Wi-Fi Direct), certificate management module, PII management module, cryptographic key management module, off-chain, on-chain. It also identifies security threats to the system and specify security requirements against the identified security threats.
±¹Á¦Ç¥ÁØ
°ü·ÃÆÄÀÏ TTAK.KO-12.0397.pdf TTAK.KO-12.0397.pdf            

ÀÌÀü
3Â÷¿ø ¸ðµ¨±â¹Ý ¹«ÀÎÇ×°ø±â¸¦ ÀÌ¿ëÇÑ ½Ç½Ã°£ ±¸Á¶¹° ¾ÈÀü Á¡°Ë ¼­ºñ½º ÂüÁ¶¸ðµ¨
´ÙÀ½
¹°·ù¿ë ¹«ÀÎÇ×°ø±â »óÈ£¿î¿ë¼º ÇÁ·¹ÀÓ¿öÅ© – Á¦1ºÎ: »ó¿ë¸Á Åë½Å ¼­ºñ½º ¿ä±¸»çÇ× ¹× ÂüÁ¶ ¸ðµ¨