ÀÚ·á°Ë»ö-Ç¥ÁØ

Ȩ > ÀڷḶ´ç > ÀÚ·á°Ë»ö > Ç¥ÁØ

ÀÚ·á °Ë»ö°á°ú

°Ë»öÆäÀÌÁö·Î
Ç¥ÁØÁ¾·ù Á¤º¸Åë½Å´ÜüǥÁØ(TTAS)
Ç¥ÁعøÈ£ TTAE.IT-X.1087 ±¸ Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2017-06-28 ÃÑ ÆäÀÌÁö 44
ÇÑ±Û Ç¥ÁØ¸í ¸ð¹ÙÀÏ µð¹ÙÀ̽º¿¡¼­ÀÇ ÅÚ·¹¹ÙÀÌ¿ÀÀÎ½Ä º¸¾ÈÁöħ
¿µ¹® Ç¥Áظí Telebiometric Security Guideline For Mobile Devices
ÇÑ±Û ³»¿ë¿ä¾à ÃÖ±Ù µé¾î, ¸ð¹ÙÀÏ Áö±Þ°áÁ¦, ¿ø°ÝÀÇ·á µî ¸ð¹ÙÀÏ ÀÀ¿ë¼­ºñ½º¿¡¼­ ½Å·Ú¼º ³ôÀº ºñ´ë¸é ÀÎÁõ¼ö´ÜÀ¸·Î ÅÚ·¹¹ÙÀÌ¿À ÀÎ½Ä ±â¼úÀÌ ³Î¸® »ç¿ëµÇ°í ÀÖ´Ù. ÀÌ¿¡ µû¶ó º» Ç¥ÁØÀº ¸ð¹ÙÀÏ ¹ÙÀÌ¿À ÀνÄÀÇ ¾ÈÀü½Å·Ú¼º È®º¸¸¦ À§ÇØ ÇÊ¿äÇÑ ±â¼úÀû¡¤°ü¸®Àû º¸¾È ´ëÃ¥°ú ¸ð¹ÙÀÏ ±â±â¿¡¼­ÀÇ ÅÚ·¹¹ÙÀÌ¿À ÀÎ½Ä ±â¼úÀ» Àû¿ëÇϱâ À§ÇÑ 12°¡ÁöÀÇ ÀÎÁõ ¸ðµ¨À» Á¦½ÃÇÏ°í ¸ðµ¨º° º¸¾È Ãë¾àÁ¡°ú ÀÌ¿¡ ´ëÀÀÇÏ´Â º¸¾È ´ëÃ¥À» Á¤ÀÇÇϰí ÀÖ´Ù.
¿µ¹® ³»¿ë¿ä¾à Biometric technology in mobile devices is frequently used in various areas which require a high level of reliability such as e-banking, and procurement services. It is necessary to make efforts to develop a security system that can preemptively cope with potential security threats for the purpose of ensuring mobile biometric data security. Since biometric technology handles sensitive personally identifiable information (PII), some of the privacy issues for biometric in mobile devices should be considered. Recommendation ITU-T X.tam specifies the implementation model and threats in the operating telebiometric systems in mobile devices and provides a general guideline for security countermeasures from both the technical and operational perspectives in order to establish a safe mobile environment for the use of telebiometric systems.
°ü·Ã IPR È®¾à¼­ Á¢¼öµÈ IPR È®¾à¼­ ¾øÀ½
°ü·ÃÆÄÀÏ    TTAE.IT-X.1087.pdf TTAE.IT-X.1087.pdf
Ç¥ÁØÀÌ·Â
Ç¥Áظí Ç¥ÁعøÈ£ Á¦°³Á¤ÀÏ ±¸ºÐ À¯È¿
¿©ºÎ
IPR
È®¾à¼­
ÆÄÀÏ
¸ð¹ÙÀÏ µð¹ÙÀ̽º¿¡¼­ÀÇ ÅÚ·¹¹ÙÀÌ¿ÀÀÎ½Ä º¸¾ÈÁöħ TTAE.IT-X.1087 2017-06-28 Á¦Á¤ À¯È¿ ¾øÀ½ TTAE.IT-X.1087.pdf
¸ð¹ÙÀÏ µð¹ÙÀ̽º¿¡¼­ ÅÚ·¹¹ÙÀÌ¿ÀÀÎ½Ä ÀÀ¿ëÀ» À§ÇÑ ±â¼ú ¹× °ü¸®Àû º¸¾È Áöħ TTAI.IT-X.tam 2013-12-18 Á¦Á¤ ÆóÁö ¾øÀ½