Ȩ > Ç¥ÁØÈ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ
Ç¥ÁعøÈ£ | TTAK.KO-12.0160 | ±¸Ç¥ÁعøÈ£ | |
---|---|---|---|
Á¦°³Á¤ÀÏ | 2010-12-23 | ÃÑÆäÀÌÁö | 24 |
ÇѱÛÇ¥Áظí | ¹ÙÀÌ¿À ÀÎ½Ä Á¤º¸ ¹× °³ÀÎ ½Äº° Á¤º¸ µ¥ÀÌÅͺ£À̽ºÀÇ ºÐ¸® ¿î¿µ ¹æ¹ý | ||
¿µ¹®Ç¥Áظí | Separative Operation Method for Biometric Reference and Identity Reference Databases | ||
Çѱ۳»¿ë¿ä¾à | °³ÀÎ ½Äº° Á¤º¸¿Í ¹ÙÀÌ¿À ÀÎ½Ä Á¤º¸ DB¸¦ ³í¸®ÀûÀ̳ª ¹°¸®ÀûÀ¸·Î ºÐ¸®ÇÏ¿© ¿î¿µÇÏ´Â °ÍÀº ¹Ù¶÷Á÷Çϳª, ÇÊ¿ä¿¡ µû¶ó¼´Â µÎ °³ÀÇ ½Äº° Á¤º¸¸¦ °øÅëÀ¸·Î ÁöĪÇÒ ¼ö ÀÖ´Â °øÅë ½Äº°ÀÚ(Common Identifier)°¡ ÇÊ¿äÇÏ´Ù. ÀÌ·¯ÇÑ »óȲ¿¡¼µµ ´ÙÀ½°ú °°Àº º¸¾È ¿ä±¸ »çÇ×À» ¸¸Á·ÇÏ´Â ¿î¿µ ¹æ¾ÈÀ» Á¦½ÃÇÑ´Ù. | ||
¿µ¹®³»¿ë¿ä¾à | Secure binding of a pair of IR and BR assuming separated databases for IR and BR with separated control and their usages is described. The database for identity reference is called DBIR and that for biometric reference is called DBBR. It is assumed that DBIR uses a secret key Ki, and DBBR uses a secret key Kb to protect their database contents. In addition, it is assumed that the databases share a secret key Ke for securing communication messages. | ||
±¹Á¦Ç¥ÁØ | |||
°ü·ÃÆÄÀÏ | TTAK.KO-12.0160.pdf |