Ȩ > Ç¥ÁØÈ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ
Ç¥ÁعøÈ£ | TTAK.KO-12.0359-Part3 | ±¸Ç¥ÁعøÈ£ | |
---|---|---|---|
Á¦°³Á¤ÀÏ | 2020-12-10 | ÃÑÆäÀÌÁö | 35 |
ÇѱÛÇ¥Áظí | ºÐ»êID¸¦ È°¿ëÇÑ ½Å¿ø°ü¸® ÇÁ·¹ÀÓ¿öÅ© Á¦3ºÎ: Á¤º¸º¸È£ ¿ä±¸»çÇ× | ||
¿µ¹®Ç¥Áظí | Framework for Identity Managementusing Decentralized Identity Part 3: Security and Privacy Requirement | ||
Çѱ۳»¿ë¿ä¾à | ÀÌ Ç¥ÁØÀº ºÐ»êID¸¦ È°¿ëÇÑ ½Å¿ø°ü¸® ÇÁ·¹ÀÓ¿öÅ©¸¦ Á¦½ÃÇϸç, ´ÙÀ½ÀÇ ³»¿ëÀ» Æ÷ÇÔÇÑ´Ù.
• Á¦1ºÎ: ÇÁ·¹ÀÓ¿öÅ© ±¸¼º ¹× ¸ðµ¨¿¡¼´Â ½Å¿ø°ü¸® ÇÁ·¹ÀÓ¿öÅ©ÀÇ ±¸¼º ¹× ¸ðµ¨, ±×¸®°í ºÐ»êIDÀÇ À¯ÇüÀ» ±â¼úÇÑ´Ù. • Á¦2ºÎ: ½Å¿øÁõ¸í ¹× »óÈ£¿¬µ¿ ¹æ¹ý¿¡¼´Â ºÐ»êID ±â¹Ý ½Å¿øÁõ¸íÀÇ Æ¯¼º ¹× ¹æ¹ý, ±×¸®°í ½Å¿ø°ü¸® »óÈ£¿¬µ¿ ¹æ¹ý ¹× ¿ä±¸»çÇ×À» ±â¼úÇÑ´Ù. • Á¦3ºÎ: Á¤º¸º¸È£ ¿ä±¸»çÇ׿¡¼´Â º¸¾È ¹× °³ÀÎÁ¤º¸ º¸È£ ¿ä±¸»çÇ×À» ±â¼úÇÑ´Ù. ÀÌ Ç¥ÁØÀº ´Ù¾çÇÑ ºÐ»êID ¼ºñ½º¿¡ Àû¿ëµÉ ¼ö ÀÖµµ·Ï, ¿©·¯ ºÐ»êID ¼ºñ½ºµéÀ» ºÐ¼® ÈÄ µµÃâµÈ °øÅë»çÇ× ¶Ç´Â ¿©·¯ À¯ÇüÀ» Æ÷ÇÔÇÏ¸ç ±¹³» °ü·Ã ¹ý±Ô¸¦ ÁؼöÇÑ´Ù. ¶ÇÇÑ, ±¹¿Ü Ç¥ÁØ¿¡¼ µ¥ÀÌÅÍ Æ÷¸Ë ¹× ¼¼ºÎ ±â¼úÀ» ´Ù·ç¾î ±¸Çö Á¾¼Ó¼ºÀÌ ¹ß»ýÇÏ´Â °Í°ú ´Þ¸®, ÀÌ Ç¥ÁØÀº ƯÁ¤ ±â¼ú¿¡ Á¾¼ÓµÇÁö ¾Êµµ·Ï ±â¼ú Á߸³¼ºÀ» ÁöÇâÇÑ´Ù. µ¥ÀÌÅÍ ±Ô°Ý ¹× ¼¼ºÎ ±â¼úÀº ÀÌ Ç¥ÁØÀǹüÀ§ ¿Ü·Î Âü°í ¹®ÇåÀ» Âü°íÇÑ´Ù. ´Ü, ¿ë¾î Á¤ÀÇ´Â ¿ë¾î Àû¿ëÀÇ È¥µ¿À» ¹æÁöÇϱâ À§ÇØ ±¹³»∙¿Ü¿¡¼ Åë¿ëµÇ´Â ¿ë¾î·Î Á¤ÀÇÇÑ´Ù. |
||
¿µ¹®³»¿ë¿ä¾à | This standard proposes an identity management framework using decentralized identity and includes:
• Part 1: Framework Architecture and Model describes the framework architecture and implementation model for identity management and the types of decentralized identifiers and credentials. • Part 2: Identity Proofing and Interoperability Method describes the characteristics and methods of decentralized identity-based identity authentication, and interoperability methods and requirements for a domestic identity management environment. • Part 3: Security and Privacy Requirements describe the requirements for decentralized identity environment in terms of security and privacy. This standard includes common things and various implementation types from various decentralized identity services. This standard complies with domestic law. This standard pursues technology neutrality, unlike global standards define data formats and technology details which occur implementation dependencies. Data formats and technology details are out of scope of this standard. This standard uses terminologies commonly used in the decentralized identity space to prevent confusion. |
||
±¹Á¦Ç¥ÁØ | - | ||
°ü·ÃÆÄÀÏ | TTAK.KO-12.0359-Part3.pdf |