Ȩ > Ç¥ÁØÈ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ
Ç¥ÁعøÈ£ | TTAK.KO-12.0358 | ±¸Ç¥ÁعøÈ£ | |
---|---|---|---|
Á¦°³Á¤ÀÏ | 2019-12-11 | ÃÑÆäÀÌÁö | 14 |
ÇѱÛÇ¥Áظí | Á¤º¸ºÐÇÒ¿¡ ÀÇÇÑ ¹ÙÀÌ¿ÀÀÎ½Ä Á¤º¸ º¸È£ | ||
¿µ¹®Ç¥Áظí | Biometric reference protection using information splitting | ||
Çѱ۳»¿ë¿ä¾à | ÀÌ Ç¥ÁØÀº ¹ÙÀÌ¿ÀÀÎ½Ä ½Ã½ºÅÛÀ» ±¸ÇöÇÔ¿¡ ÀÖ¾î¼, ´ÙÁß ±â°ü°£ÀÇ ¹ÙÀÌ¿ÀÀÎ½Ä Á¤º¸ °øÀ¯¿¡ ÀÇÇؼ ¾î´À ÇÑ°÷¿¡¼ ºÒ¹ýÀ¸·Î ¹ÙÀÌ¿ÀÀÎ½Ä Á¤º¸°¡ À¯ÃâµÇ´õ¶óµµ ´ë»óÀÚÀÇ ¹ÙÀÌ¿ÀÀÎ½Ä Á¤º¸°¡ ħÇØ ´çÇÒ ¼ö ÀÖ´Â °æ¿ì¸¦ ¹èÁ¦Çϱâ À§ÇÑ ±â¹ýÀ» ±â¼úÇÑ´Ù. ´ÙÀ½°ú °°Àº Á¤º¸ºÐÇÒ ±â¹ý¿¡ ÀÇÇÑ ¹ÙÀÌ¿ÀÀÎ½Ä Á¤º¸ º¸È£ ±¸Çö ¹æ¹ý°ú ÀÀ¿ë¸ðµ¨À» ±â¼úÇÑ´Ù.
1) ·£´ý ºÐÇÒ¿¡ ÀÇÇÑ ¹ÙÀÌ¿ÀÀÎ½Ä Á¤º¸ÀÇ ºÐÇÒ°ú ÀÎÁõ 2) ¾ÏÈ£ÇÐÀû ±â¹ýÀ» ÀÌ¿ëÇÑ ¹ÙÀÌ¿ÀÀÎ½Ä Á¤º¸ÀÇ ºÐÇÒ°ú ÀÎÁõ |
||
¿µ¹®³»¿ë¿ä¾à | The standard describes a scheme for protecting a subject¡¯s biometric reference even if his/her biometric reference is illegally leaked from one place due to the sharing of biometric reference among multiple parties in implementing the biometric recognition system. The implementation method and application model of biometric reference protection by following information splitting techniques are given.
1) biometric reference splitting and authentication scheme using random techniques 2) biometric reference splitting and authentication scheme using cryptographic techniques |
||
±¹Á¦Ç¥ÁØ | |||
°ü·ÃÆÄÀÏ | TTAK.KO-12.0358.pdf |