Ȩ > ÀڷḶ´ç > ÀÚ·á°Ë»ö > Ç¥ÁØ
ÀÚ·á °Ë»ö°á°ú
| Ç¥ÁØÁ¾·ù | Á¤º¸Åë½Å±â¼úº¸°í¼(TTAR) | ||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Ç¥ÁعøÈ£ | TTAR-12.0063 | ±¸ Ç¥ÁعøÈ£ | |||||||||||||||
| Á¦°³Á¤ÀÏ | 2025-10-24 | ÃÑ ÆäÀÌÁö | 51 | ||||||||||||||
| ÇÑ±Û Ç¥Áظí | µðÁöÅÐ Áö°©ÀÇ ÇöȲ ºÐ¼® ¹× º¸¾È Ư¼º (±â¼úº¸°í¼) | ||||||||||||||||
| ¿µ¹® Ç¥Áظí | A Landscape Analysis and Security Features for a Digital Wallet (Technical Report) | ||||||||||||||||
| ÇÑ±Û ³»¿ë¿ä¾à | ÀÌ ±â¼úº¸°í¼´Â µðÁöÅÐ Áö°©À» ºí·ÏüÀÎ Áö°©, ½Å¿ø(ID) Áö°©, ÁöºÒ(Payment) Áö°©, Áß¾ÓÀºÇàµðÁöÅÐÈÆó(CBDC) Áö°© µîÀ¸·Î ºÐ·ùÇÏ°í °¢ Áö°© À¯Çü¿¡ ´ëÇØ ÁÖ¿ä ±â´É, °ü¸®µÇ´Â µ¥ÀÌÅÍ À¯Çü, Ȱ¿ë »ç·Ê, ±â¼ú ±¸Á¶ µîÀ» ºÐ¼®Çϰí ÀÖÀ¸¸ç, ƯÈ÷ »ç¿ëÀÚÀÇ ±ÇÇÑ Á¦¾î ¹æ½Ä, ±¸Çö ÇüÅÂ(¼ÒÇÁÆ®¿þ¾î/Çϵå¿þ¾î, ¸ð¹ÙÀÏ/Ŭ¶ó¿ìµå µî), º¸¾È ¿ä±¸»çÇ׿¡ µû¶ó ´Ù¾çÇÑ ºÐ·ù ü°è¸¦ Á¦½ÃÇÑ´Ù. ¶ÇÇÑ, °øÅë ¿ä±¸»çÇ× Àå¿¡¼´Â µðÁöÅÐ Áö°©ÀÌ °®Ãß¾î¾ß ÇÒ À̵¿¼º, ´Ù¸ñÀû¼º, »ç¿ëÀÚ ÀÎÁõ, ÇÁ¶óÀ̹ö½Ã º¸È£, Ű °ü¸® µîÀÇ ÇÙ½É ¿ä°ÇÀ» Á¤¸®Çϰí ÀÖÀ¸¸ç, º¸¾È À§Çù ¸ðµ¨°ú ÀÌ¿¡ ´ëÇÑ ´ëÀÀ ±â´ÉÀ» ±â¼úÇÑ´Ù. | ||||||||||||||||
| ¿µ¹® ³»¿ë¿ä¾à | This technical report classifies digital wallets into categories such as blockchain wallets, identity (ID) wallets, payment wallets, and central bank digital currency (CBDC) wallets. For each type, it analyzes key functionalities, the types of data managed, use cases, and technical architectures. In particular, the report presents a taxonomy based on various factors, including user control mechanisms, implementation types (e.g., software/hardware, mobile/cloud), and security requirements. Additionally, the section on common requirements outlines the essential attributes that digital wallets should support, including mobility, versatility, user authentication, privacy protection, and key management. It also describes potential security threat models and corresponding countermeasures. | ||||||||||||||||
| °ü·Ã IPR È®¾à¼ | Á¢¼öµÈ IPR È®¾à¼ ¾øÀ½ | ||||||||||||||||
| °ü·ÃÆÄÀÏ |
|
||||||||||||||||
| Ç¥ÁØÀÌ·Â |
|
||||||||||||||||

