Ç¥ÁØÈ­ Âü¿©¾È³»

TTAÀÇ Ç¥ÁØÇöȲ

Ȩ > Ç¥ÁØÈ­ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ

Ç¥ÁعøÈ£ TTAK.KO-12.0160 ±¸Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2010-12-23 ÃÑÆäÀÌÁö 24
ÇѱÛÇ¥ÁØ¸í ¹ÙÀÌ¿À ÀÎ½Ä Á¤º¸ ¹× °³ÀÎ ½Äº° Á¤º¸ µ¥ÀÌÅͺ£À̽ºÀÇ ºÐ¸® ¿î¿µ ¹æ¹ý
¿µ¹®Ç¥Áظí Separative Operation Method for Biometric Reference and Identity Reference Databases
Çѱ۳»¿ë¿ä¾à °³ÀÎ ½Äº° Á¤º¸¿Í ¹ÙÀÌ¿À ÀÎ½Ä Á¤º¸ DB¸¦ ³í¸®ÀûÀ̳ª ¹°¸®ÀûÀ¸·Î ºÐ¸®ÇÏ¿© ¿î¿µÇÏ´Â °ÍÀº ¹Ù¶÷Á÷Çϳª, ÇÊ¿ä¿¡ µû¶ó¼­´Â µÎ °³ÀÇ ½Äº° Á¤º¸¸¦ °øÅëÀ¸·Î ÁöĪÇÒ ¼ö ÀÖ´Â °øÅë ½Äº°ÀÚ(Common Identifier)°¡ ÇÊ¿äÇÏ´Ù. ÀÌ·¯ÇÑ »óȲ¿¡¼­µµ ´ÙÀ½°ú °°Àº º¸¾È ¿ä±¸ »çÇ×À» ¸¸Á·ÇÏ´Â ¿î¿µ ¹æ¾ÈÀ» Á¦½ÃÇÑ´Ù.
¿µ¹®³»¿ë¿ä¾à Secure binding of a pair of IR and BR assuming separated databases for IR and BR with separated control and their usages is described. The database for identity reference is called DBIR and that for biometric reference is called DBBR. It is assumed that DBIR uses a secret key Ki, and DBBR uses a secret key Kb to protect their database contents. In addition, it is assumed that the databases share a secret key Ke for securing communication messages.
±¹Á¦Ç¥ÁØ
°ü·ÃÆÄÀÏ TTAK.KO-12.0160.pdf TTAK.KO-12.0160.pdf            

ÀÌÀü
±â¾÷ ½º¸¶Æ®¿öÅ©¸¦ À§ÇÑ ¼­ºñ½º °øÅ뱸Á¶ ¿ä±¸»çÇ×
´ÙÀ½
À¥ ±â¹Ý ¿µ»óÇù¾÷ ¼­ºñ½º ¿ä±¸»çÇ×