ÀÚ·á°Ë»ö-Ç¥ÁØ

Ȩ > ÀڷḶ´ç > ÀÚ·á°Ë»ö > Ç¥ÁØ

ÀÚ·á °Ë»ö°á°ú

°Ë»öÆäÀÌÁö·Î
Ç¥ÁØÁ¾·ù Á¤º¸Åë½Å±â¼úº¸°í¼­(TTAR)
Ç¥ÁعøÈ£ [ÆóÁö] TTAR-12.0018 ±¸ Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2014-11-28 ÃÑ ÆäÀÌÁö 26
ÇÑ±Û Ç¥ÁØ¸í ¹ÙÀÌ¿ÀÀνÄÀ» ÀÌ¿ëÇÑ ICÄ«µå °³Àνĺ°°ËÁõ ½Ã½ºÅÛ (±â¼úº¸°í¼­)
¿µ¹® Ç¥Áظí PIV-System based on IC Card using Biometric Technology (Technical Report)
ÇÑ±Û ³»¿ë¿ä¾à º» ±â¼úº¸°í¼­´Â °ø°ø ½Ã¼³ ¹× ºñ¹Ð Àΰ¡ Áö¿ªÀÇ ¾ÈÀüÇÑ ÃâÀÔ ÅëÁ¦ ¼­ºñ½º¸¦ Á¦°øÇϱâ À§ÇÑ ¹ÙÀÌ¿ÀÀνÄÀ» ÀÌ¿ëÇÑ ICÄ«µå °³ÀÎ ½Äº° °ËÁõ ½Ã½ºÅÛ ÇÁ·¹ÀÓ¿öÅ©¸¦ Á¤ÀÇÇÑ´Ù. º» ±â¼úº¸°í¼­´Â ¹ÙÀÌ¿ÀÀνÄÀ» ÀÌ¿ëÇÏ´Â ICÄ«µå ±â¹Ý PIV ½Ã½ºÅÛÀÇ ÀÀ¿ë ¼­ºñ½º ¸ðµ¨À» Á¤ÀÇÇÑ´Ù. ¶ÇÇÑ °¢ ¸ðµ¨¿¡¼­ ÇÊ¿ä·Î ÇÏ´Â ¿ä¼Ò¸¦ ¼³¸íÇϰí, ÇØ´ç ¿ä¼Ò¸¦ »ç¿ëÇÏ¿© ¾ÈÀüÇÑ ÃâÀÔ ÅëÁ¦ ¼­ºñ½º¸¦ À§ÇØ ÅëÇÕ ÇÁ·¹ÀÓ¿öÅ©¿¡¼­ °í·ÁµÇ¾î¾ß ÇÒ ±â´É ¿ä±¸ »çÇ× ¹× ÀÎÁõ ÀýÂ÷¸¦ Á¤ÀÇÇÑ´Ù.
¿µ¹® ³»¿ë¿ä¾à This technical report specifies the IC card based PIV system framework for provide secure access control at the area such as public facility, restricted area. This technical report specifies application service model of IC card based PIV system. And Described requirement of each model, and specifies functional requirements and authentication procedure of the framework for secure access control.
°ü·Ã IPR È®¾à¼­ Á¢¼öµÈ IPR È®¾à¼­ ¾øÀ½
ÆóÁöÀÏ 2019-02-14
ÆóÁö»çÀ¯ Á¦48Â÷ Á¤º¸º¸È£ ±â¼úÀ§¿øÈ¸
(°ü·Ã ´ÜüǥÁØ Á¦Á¤(TTAK.KO-12.0322, ¹ÙÀÌ¿ÀÀÎ½Ä ÀÀ¿ëÄ«µå ±â¹ÝÀÇ °³ÀÎ ÀÎÁõ ½Ã½ºÅÛ)À¸·Î ÆóÁö)
°ü·ÃÆÄÀÏ  TTAR-12.0018.pdf
Ç¥ÁØÀÌ·Â
Ç¥Áظí Ç¥ÁعøÈ£ Á¦°³Á¤ÀÏ ±¸ºÐ À¯È¿
¿©ºÎ
IPR
È®¾à¼­
ÆÄÀÏ
¹ÙÀÌ¿ÀÀνÄÀ» ÀÌ¿ëÇÑ ICÄ«µå °³Àνĺ°°ËÁõ ½Ã½ºÅÛ (±â¼úº¸°í¼­) TTAR-12.0018 2014-11-28 Á¦Á¤ ÆóÁö ¾øÀ½
Ç¥ÁØÀ¯Áöº¸¼öÀÌ·Â
°ËÅäÀÏÀÚ °ËÅä°á°ú °ËÅä³»¿ë
2018-05-31 ÆóÁö °ü·Ã ±¹³»Ç¥ÁØ Á¦Á¤À¸·Î ÆóÁö ÃßÁø (TTAK.KO-12.0322, ¹ÙÀÌ¿ÀÀνÄÀÀ¿ëÄ«µå ±â¹ÝÀÇ °³ÀÎÀÎÁõ½Ã½ºÅÛ)