ÀÚ·á°Ë»ö-Ç¥ÁØ

Ȩ > ÀڷḶ´ç > ÀÚ·á°Ë»ö > Ç¥ÁØ

ÀÚ·á °Ë»ö°á°ú

°Ë»öÆäÀÌÁö·Î
Ç¥ÁØÁ¾·ù Á¤º¸Åë½Å´ÜüǥÁØ(TTAS)
Ç¥ÁعøÈ£ TTAK.KO-12.0358 ±¸ Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2019-12-11 ÃÑ ÆäÀÌÁö 14
ÇÑ±Û Ç¥Áظí Á¤º¸ºÐÇÒ¿¡ ÀÇÇÑ ¹ÙÀÌ¿ÀÀÎ½Ä Á¤º¸ º¸È£
¿µ¹® Ç¥Áظí Biometric reference protection using information splitting
ÇÑ±Û ³»¿ë¿ä¾à ÀÌ Ç¥ÁØÀº ¹ÙÀÌ¿ÀÀÎ½Ä ½Ã½ºÅÛÀ» ±¸ÇöÇÔ¿¡ À־, ´ÙÁß ±â°ü°£ÀÇ ¹ÙÀÌ¿ÀÀÎ½Ä Á¤º¸ °øÀ¯¿¡ ÀÇÇØ¼­ ¾î´À ÇѰ÷¿¡¼­ ºÒ¹ýÀ¸·Î ¹ÙÀÌ¿ÀÀÎ½Ä Á¤º¸°¡ À¯ÃâµÇ´õ¶óµµ ´ë»óÀÚÀÇ ¹ÙÀÌ¿ÀÀÎ½Ä Á¤º¸°¡ Ä§ÇØ ´çÇÒ ¼ö ÀÖ´Â °æ¿ì¸¦ ¹èÁ¦Çϱâ À§ÇÑ ±â¹ýÀ» ±â¼úÇÑ´Ù. ´ÙÀ½°ú °°Àº Á¤º¸ºÐÇÒ ±â¹ý¿¡ ÀÇÇÑ ¹ÙÀÌ¿ÀÀÎ½Ä Á¤º¸ º¸È£ ±¸Çö ¹æ¹ý°ú ÀÀ¿ë¸ðµ¨À» ±â¼úÇÑ´Ù.

1) ·£´ý ºÐÇÒ¿¡ ÀÇÇÑ ¹ÙÀÌ¿ÀÀÎ½Ä Á¤º¸ÀÇ ºÐÇÒ°ú ÀÎÁõ
2) ¾ÏÈ£ÇÐÀû ±â¹ýÀ» ÀÌ¿ëÇÑ ¹ÙÀÌ¿ÀÀÎ½Ä Á¤º¸ÀÇ ºÐÇÒ°ú ÀÎÁõ
¿µ¹® ³»¿ë¿ä¾à The standard describes a scheme for protecting a subject¡¯s biometric reference even if his/her biometric reference is illegally leaked from one place due to the sharing of biometric reference among multiple parties in implementing the biometric recognition system. The implementation method and application model of biometric reference protection by following information splitting techniques are given.

1) biometric reference splitting and authentication scheme using random techniques
2) biometric reference splitting and authentication scheme using cryptographic techniques
°ü·Ã IPR È®¾à¼­ Á¢¼öµÈ IPR È®¾à¼­ ¾øÀ½
°ü·ÃÆÄÀÏ    TTAK.KO-12.0358.pdf TTAK.KO-12.0358.pdf
Ç¥ÁØÀÌ·Â
Ç¥Áظí Ç¥ÁعøÈ£ Á¦°³Á¤ÀÏ ±¸ºÐ À¯È¿
¿©ºÎ
IPR
È®¾à¼­
ÆÄÀÏ
Á¤º¸ºÐÇÒ¿¡ ÀÇÇÑ ¹ÙÀÌ¿ÀÀÎ½Ä Á¤º¸ º¸È£ TTAK.KO-12.0358 2019-12-11 Á¦Á¤ À¯È¿ ¾øÀ½ TTAK.KO-12.0358.pdf
Ç¥ÁØÇؼ³¼­ ÆÄÀÏ ´Ù¿î·Îµå Á¤º¸ºÐÇÒ¿¡ ÀÇÇÑ ¹ÙÀÌ¿ÀÀÎ½Ä Á¤º¸ º¸È£_Ç¥ÁØÇؼ³¼­.pdf