ÀÚ·á°Ë»ö-Ç¥ÁØ

Ȩ > ÀڷḶ´ç > ÀÚ·á°Ë»ö > Ç¥ÁØ

ÀÚ·á °Ë»ö°á°ú

°Ë»öÆäÀÌÁö·Î
Ç¥ÁØÁ¾·ù Á¤º¸Åë½Å´ÜüǥÁØ(TTAS)
Ç¥ÁعøÈ£ TTAE.OT-08.0003 ±¸ Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2025-12-05 ÃÑ ÆäÀÌÁö 89
ÇÑ±Û Ç¥ÁØ¸í ºÐ»ê ½Äº°ÀÚ ±â¹Ý Åë½Å ¸Þ½Ã¡ v2.0
¿µ¹® Ç¥Áظí DIDComm Messaging v2.0
ÇÑ±Û ³»¿ë¿ä¾à ÀÌ Ç¥ÁØÀº ºÐ»ê ½Äº°ÀÚ(DID)¸¦ ±â¹ÝÀ¸·Î º¸¾È¼º°ú ÇÁ¶óÀ̹ö½Ã¸¦ Áß½ÃÇÏ´Â Åë½Å ¹æ½ÄÀ» Á¤ÀÇÇÑ´Ù. ÀÌ´Â ´Ü¼øÈ÷ ¸Þ½ÃÁö¸¦ Àü´ÞÇÏ´Â °Í¿¡ ±×Ä¡Áö ¾Ê°í ½Å·ÚÇÒ ¼ö ÀÖ´Â ¾ÖÇø®ÄÉÀÌ¼Ç °£ ÀÚµ¿È­µÈ »óÈ£ÀÛ¿ë°ú ¿öÅ©Ç÷οì±îÁö °¡´ÉÇÏ°Ô ¼³°èµÇ¾ú´Ù.
ÀÌ ¹æ½ÄÀº ±âÁ¸ÀÇ Áß¾Ó ÁýÁßÇü ¹æ½Ä(¿¹: ÀÎÁõ ±â°üÀ̳ª ID Á¦°øÀÚ)¿¡ ÀÇÁ¸ÇÏÁö ¾Ê°í, »ç¿ëÀÚ, Á¶Á÷, ±â°è°¡ µ¿µîÇÑ Åë½Å ÁÖü·Î Âü¿©ÇÒ ¼ö ÀÖµµ·Ï Áö¿øÇÑ´Ù. °¢ ´Ü°è¿¡¼­¸Þ½ÃÁö´Â ¾Ïȣȭ¿Í ÀüÀÚ ¼­¸íÀ¸·Î º¸È£µÉ ¼ö ÀÖÀ¸¸ç, ¾î¶² ³×Æ®¿öÅ©³ª Àü¼Û ¼ö´ÜÀ» »ç¿ëÇÏ´õ¶óµµ º¸¾È¼º°ú ¹«°á¼ºÀÌ À¯ÁöµÉ ¼ö ÀÖµµ·Ï ÇÑ´Ù.
¶ÇÇÑ, ´Ù¾çÇÑ ³×Æ®¿öÅ© ȯ°æ¿¡¼­ Áß°£ ³ëµå¸¦ ÅëÇØ ¾ÈÀüÇÏ°Ô ¶ó¿ìÆÃµÉ ¼ö ÀÖÀ¸¸ç, ÇϳªÀÇ ¸Þ½ÃÁö¸¦ ¿©·¯ ¼ö½ÅÀÚ¿¡°Ô º¸³¾ ¼öµµ ÀÖ´Ù. ¸Þ½ÃÁö´Â ÇüÅ´ Æò¹®, ¼­¸í, ¾ÏȣȭµÈ ¸Þ½ÃÁö °¡ ³ª´©¾îÁ® ÀÖ´Ù.
ÀÌ Ç¥ÁØÀº ´Ù¾çÇÑ ÇÁ·ÎÅäÄÝ °£ÀÇ »óÈ£¿î¿ë¼º°ú È®À强À» °í·ÁÇÏ¿© ¼³°èµÇ¾úÀ¸¸ç, À̸¦ Áö¿øÇϱâ À§ÇÑ ¿©·¯ ÇÙ½É ±â´ÉÀ» Æ÷ÇÔÇϰí ÀÖ´Ù. ¿¹¸¦ µé¾î, ¸Þ½ÃÁö È帧À» À¯ÁöÇÏ°í ³í¸®Àû »óÈ£ÀÛ¿ë ´ÜÀ§¸¦ ±¸¼ºÇÒ ¼ö ÀÖµµ·Ï ½º·¹µù(Threading) ±â´ÉÀ» Á¦°øÇϸç, Åë½Å Áß ¹ß»ýÇÒ ¼ö ÀÖ´Â ¿À·ù³ª ¿¹¿Ü »óȲ¿¡ ´ëÇØ ¹®Á¦ º¸°í(Problem Reporting)¸¦ ¼öÇàÇÒ ¼ö ÀÖµµ·Ï Á¤ÀǵǾî ÀÖ´Ù. ¶ÇÇÑ, »ó´ë¹æÀÌ Áö¿øÇÏ´Â ¸Þ½ÃÁö À¯Çü°ú ±â´ÉÀ» ÀÚµ¿À¸·Î Ž»ö(Feature Discovery)ÇÒ ¼ö ÀÖ´Â ¸ÞÄ¿´ÏÁòÀ» Á¦°øÇÏ¿©, »óÈ£ ÀÌÇØ¸¦ ±â¹ÝÀ¸·Î ÇÑ µ¿Àû »óÈ£ÀÛ¿ëÀÌ °¡´ÉÇÏ´Ù.
»Ó¸¸ ¾Æ´Ï¶ó, DIDComm MessagingÀº ±âÁ¸ÀÇ Åë½Å ä³Î ¿Ü¿¡µµ À̸ÞÀÏ, QR ÄÚµå, NFC µî°ú °°Àº º°µµ (Out-of-Band) Àü¼Û °æ·Î¸¦ ÅëÇØ ¸Þ½ÃÁö¸¦ ±³È¯ÇÒ ¼ö ÀÖµµ·Ï ¼³°èµÇ¾î ´Ù¾çÇÑ ³×Æ®¿öÅ© ȯ°æ¿¡¼­µµ À¯¿¬ÇÑ Àû¿ëÀÌ °¡´ÉÇÏ´Ù.
¾Ïȣȭ ¹æ½ÄÀ¸·Î ECDH-ES, ECDH-1PU µî ´Ù¾çÇÑ ¾Ë°í¸®Áò°ú Ÿ¿ø °î¼±À» »ç¿ëÇϸç ÇâÈÄ ¾çÀÚ ³»¼º ¾ÏÈ£(Post-Quantum Cryptography)µµ Áö¿øÀ» °í·ÁÇϰí ÀÖ¾î, »ç¶÷ °£ ¶Ç´Â »ç¶÷°ú ±â°è °£ÀÇ ½Å·Ú ±â¹Ý »óÈ£ÀÛ¿ëÀ» Å»Áß¾ÓÈ­µÈ ¹æ½ÄÀ¸·Î ½ÇÇöÇÏ´Â ÇÙ½É ÀÎÇÁ¶óÀÇ ¿ªÇÒÀ» ¼öÇàÇÑ´Ù.
¿µ¹® ³»¿ë¿ä¾à This standard defines a communication mechanism based on Decentralized Identifiers (DIDs) that emphasizes security and privacy. It is designed not only for delivering messages but also to enable trustworthy interactions between applications and automate workflows. Unlike traditional centralized approaches (e.g., certificate authorities or identity providers), it allows users, organizations, and machines to participate as equal communication peers. At every stage, encryption and digital signatures are applied, ensuring that security and integrity are preserved regardless of the underlying network or transport medium.
Furthermore, messages can be securely routed through intermediary nodes in diverse network environments, and a single message may be delivered to multiple recipients. Messages may exist in plaintext, signed, or encrypted forms. The standard is designed with interoperability and extensibility across protocols, and includes several key features to support these objectives. For example, threading allows for the maintenance of conversational context and logical interaction units; problem reporting enables the structured handling of errors or exceptional conditions during communication; and feature discovery provides a mechanism to automatically detect the message types or capabilities supported by a counterparty, thereby facilitating dynamic, mutually understood interactions.
°ü·Ã IPR È®¾à¼­ Á¢¼öµÈ IPR È®¾à¼­ ¾øÀ½
°ü·ÃÆÄÀÏ    TTAE.OT-08.0003.pdf TTAE.OT-08.0003.pdf
Ç¥ÁØÀÌ·Â
Ç¥Áظí Ç¥ÁعøÈ£ Á¦°³Á¤ÀÏ ±¸ºÐ À¯È¿
¿©ºÎ
IPR
È®¾à¼­
ÆÄÀÏ
ºÐ»ê ½Äº°ÀÚ ±â¹Ý Åë½Å ¸Þ½Ã¡ v2.0 TTAE.OT-08.0003 2025-12-05 Á¦Á¤ À¯È¿ ¾øÀ½ TTAE.OT-08.0003.pdf