ÀÚ·á°Ë»ö-Ç¥ÁØ

Ȩ > ÀڷḶ´ç > ÀÚ·á°Ë»ö > Ç¥ÁØ

ÀÚ·á °Ë»ö°á°ú

°Ë»öÆäÀÌÁö·Î
Ç¥ÁØÁ¾·ù Á¤º¸Åë½Å´ÜüǥÁØ(TTAS)
Ç¥ÁعøÈ£ TTAE.OT-08.0002 ±¸ Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2025-12-05 ÃÑ ÆäÀÌÁö 19
ÇÑ±Û Ç¥ÁØ¸í ¿¬°áµÈ °ËÁõ °¡´ÉÇÑ ÇÁ·¹Á¨Å×À̼Ç
¿µ¹® Ç¥Áظí Linked Verifiable Presentation
ÇÑ±Û ³»¿ë¿ä¾à ÀÌ Ç¥ÁØÀº ºÐ»ê ½Äº°ÀÚ(DID) ±â¹Ý ½Å¿ø Á¤º¸ÀÇ °ø°³Àû ¿¬°á°ú °ËÁõ °¡´ÉÇÑ °øÀ¯¸¦ À§ÇÑ ÇÙ½É ¸ÞÄ¿´ÏÁòÀ¸·Î »óÈ£¿î¿ë¼º°ú ½Å·Ú ±â¹Ý ±¸Á¶¸¦ È®ÀåÇÑ´Ù. À̸¦ À§ÇØ DID ¹®¼­(DID Document)¿¡´Â LinkedVerifiablePresentationÀ̶ó´Â »õ·Î¿î À¯Çü(type)ÀÇ ¼­ºñ½º Á¾´ÜÁ¡À» Á¤ÀÇÇϰí, ÀÌ Á¾´ÜÁ¡¿¡ VC/VPÀÇ À§Ä¡¸¦ URL(Uniform Resource Locator) ¶Ç´Â IPFS(InterPlanetary File System) ÁÖ¼Ò µîÀ¸·Î ÁöÁ¤ÇÒ ¼ö ÀÖ´Ù. VP¿Í VC´Â JSON-LD(JavaScript Object Notation for Linked Data) ¶Ç´Â JWT(JSON Web Token) Çü½ÄÀ¸·Î Ç¥ÇöÇÒ ¼ö ÀÖ´Ù. À̵éÀº Á¤Àû ÀÚ¿øÀÇ ÇüÅ·Π¿ÜºÎ¿¡ °ø°³µÇ¸ç, °ËÁõÀÚ°¡ ÇØ´ç URLÀ» ÅëÇØ Á÷Á¢ Á¢±ÙÇÏ°í °ËÁõÇÒ ¼ö ÀÖ´Ù.
ÀÌ Ç¥ÁØÀº ±â¾÷ÀÇ ÀÎÁõ ÀÚµ¿È­, À¥»çÀÌÆ® ½Å·Ú¼º °­È­, °³ÀÎ °æ·Â °øÀ¯ µî ´Ù¾çÇÑ ¿µ¿ª¿¡¼­ Ȱ¿ëµÉ ¼ö ÀÖ´Ù. ±×·¯³ª, °ø°³µÈ VP¿Í VC´Â ´©±¸³ª Á¢±ÙÇÒ ¼ö ÀÖ¾î °³ÀÎÁ¤º¸ º¸È£¿Í º¸¾ÈÀÌ Áß¿äÇÏ´Ù. À̸¦ À§ÇØ ¼±ÅÃÀû °ø°³(Selective Disclosure), ¸¸·á ½Ã°£(expirationDate, expires) ¶Ç´Â »ç¿ë Á¶°Ç(termsOfUse) µîÀÇ ¸ÞŸµ¥ÀÌÅÍ È°¿ëÀÌ ÇÊ¿äÇÏ¸ç ¼­¸í°ú ÇØ½Ã ¸µÅ©¸¦ ÅëÇØ ¹«°á¼º°ú ÁøÀ§¼ºÀ» È®º¸ÇØ¾ß ÇÑ´Ù.
¿µ¹® ³»¿ë¿ä¾à This standard promotes the interoperability and scalability of trust-based structures as a crucial mechanism for public connection and the verifiable sharing of distributed identifier-based identity information. To this end, the DID document can define a new type of service endpoint called LinkedVerifiablePresentation, through which the location of VC/VP can be designated as a URL or IPFS address. VP and VC can be expressed in JSON-LD or JWT format and posted externally as static resources, allowing verifiers to access and verify them directly through that URL.

The Linked Verifiable Presentation structure enables various uses, including automating corporate authentication, enhancing website reliability, and sharing personal experiences. However, since anyone can access open VP and VC, safeguarding personal information and security is crucial. To this end, it is recommended to use metadata such as Selective Disclosure, Expiration Date, or terms of use, and integrity and authenticity should be secured through signatures and hash links.
°ü·Ã IPR È®¾à¼­ Á¢¼öµÈ IPR È®¾à¼­ ¾øÀ½
°ü·ÃÆÄÀÏ    TTAE.OT-08.0002.pdf TTAE.OT-08.0002.pdf
Ç¥ÁØÀÌ·Â
Ç¥Áظí Ç¥ÁعøÈ£ Á¦°³Á¤ÀÏ ±¸ºÐ À¯È¿
¿©ºÎ
IPR
È®¾à¼­
ÆÄÀÏ
¿¬°áµÈ °ËÁõ °¡´ÉÇÑ ÇÁ·¹Á¨Å×ÀÌ¼Ç TTAE.OT-08.0002 2025-12-05 Á¦Á¤ À¯È¿ ¾øÀ½ TTAE.OT-08.0002.pdf