Ȩ > Ç¥ÁØÈ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ
Ç¥ÁعøÈ£ | TTAK.KO-12.0397 | ±¸Ç¥ÁعøÈ£ | |
---|---|---|---|
Á¦°³Á¤ÀÏ | 2023-12-06 | ÃÑÆäÀÌÁö | 21 |
ÇѱÛÇ¥Áظí | µ¥ÀÌÅÍ ÁÖ±Ç °È¸¦ À§ÇÑ °³ÀÎ °£ ½Å¿øÈ®ÀνýºÅÛ | ||
¿µ¹®Ç¥Áظí | Peer-to-peer Identification System for Data Sovereignty Enhancing | ||
Çѱ۳»¿ë¿ä¾à | ÀÌ Ç¥ÁØÀº ¹«¼±Åë½Å ¸ðµâ(¿¹: Bluetooth, Wi-Fi Direct), ½Å¿ø Áõ¸í¼ °ü¸® ¸ðµâ, °³ÀÎÁ¤º¸ °ü¸® ¸ðµâ, ¾ÏȣŰ °ü¸® ¸ðµâ, ¿ÀÇÁüÀÎ(off-chain), ¿ÂüÀÎ(on-chain) µîÀ¸·Î ±¸¼ºµÇ´Â ±Ù°Å¸® ¹«¼±Åë½ÅÀ» ÀÌ¿ëÇÑ °³ÀÎ °£ ½Å¿øÈ®ÀνýºÅÛÀ» ±â¼úÇÑ´Ù. ¶ÇÇÑ ÇØ´ç ½Ã½ºÅÛ¿¡ ´ëÇÑ º¸¾È À§ÇùÀ» ½Äº°ÇÏ°í ±×¿¡ ´ëÀÀÇÏ´Â º¸¾È ¿ä±¸»çÇ×À» ±â¼úÇÑ´Ù. | ||
¿µ¹®³»¿ë¿ä¾à | The standard should specify a peer-to-peer identification system using short-range wireless communication including wireless communication module (e.g., Bluetooth, Wi-Fi Direct), certificate management module, PII management module, cryptographic key management module, off-chain, on-chain. It also identifies security threats to the system and specify security requirements against the identified security threats. | ||
±¹Á¦Ç¥ÁØ | |||
°ü·ÃÆÄÀÏ | TTAK.KO-12.0397.pdf |