ÀÚ·á°Ë»ö-Ç¥ÁØ

Ȩ > ÀڷḶ´ç > ÀÚ·á°Ë»ö > Ç¥ÁØ

ÀÚ·á °Ë»ö°á°ú

°Ë»öÆäÀÌÁö·Î
Ç¥ÁØÁ¾·ù Á¤º¸Åë½Å´ÜüǥÁØ(TTAS)
Ç¥ÁعøÈ£ TTAK.KO-12.0369 ±¸ Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2021-06-30 ÃÑ ÆäÀÌÁö 19
ÇÑ±Û Ç¥ÁØ¸í ºñÄÁ ±â¹Ý µ¿Àû ÀÎÁõÁ¤º¸¸¦ ÀÌ¿ëÇÑ ÀüÀÚÃâÀÔ¸íºÎ ±â·Ï ÀýÂ÷
¿µ¹® Ç¥Áظí Digital Entry Logging Procedures Using Beacon-Based Dynamic Authentication Information
ÇÑ±Û ³»¿ë¿ä¾à º» Ç¥ÁØÀº ½Ã¼³À» ¹æ¹®ÇÏ´Â ÀÌ¿ëÀÚ°¡ ÀÚ½ÅÀÇ ½º¸¶Æ®Æù¿¡¼­ ºñÄÁ ±â¹Ý µ¿Àû ÀÎÁõÁ¤º¸¸¦ ¼ö½ÅÇÏ¿© ¹æ¹® ½Ã¼³ Á¤º¸¸¦ È®ÀÎÇÑ ÈÄ ¹æ¹® ±â·ÏÀ» »ý¼ºÇÏ´Â ºñÄÁ ±â¹Ý ÀüÀÚÃâÀÔ¸íºÎ ½Ã½ºÅÛÀÇ ±â·Ï ÀýÂ÷¸¦ Á¤ÀÇÇÑ´Ù. ¶ÇÇÑ ÀÌ¿Í °ü·ÃÇÏ¿© ¹ß»ýÇÒ ¼ö ÀÖ´Â ÀáÀçÀûÀÎ º¸¾È À§Çù°ú ÀÌ¿¡ ´ëÀÀµÇ´Â º¸¾È ¿ä±¸»çÇ×À» ±â¼úÇÏ°í, º¸¾È ¿ä±¸»çÇ׿¡ ºÎÇÕÇÏ´Â Á¤º¸º¸È£ ¹× °³ÀÎÁ¤º¸º¸È£ °ü¸®Ã¼°è(ISMS-P) ÀÎÁõ±âÁØ Ç׸ñ°úÀÇ ´ëÀÀ °ü°è¸¦ ±â¼úÇÑ´Ù.
¿µ¹® ³»¿ë¿ä¾à This standard defines logging procedures of beacon-based digital entry log system which users visiting facilities create entry logs after confirming the facility information on their smart phones by receiving beacon-based dynamic authentication information. In addition, it describes potential security threats that may occur regarding the system and security requirements against those threats. It also describes the relation between the security requirements and the conforming items in the Personal Information & Information Security Management System(ISMS-P) requirements.
°ü·Ã IPR È®¾à¼­    [È®¾à¼­ º¸±â]    [È®¾à¼­ º¸±â]
°ü·ÃÆÄÀÏ    TTAK.KO-12.0369.pdf TTAK.KO-12.0369.pdf
Ç¥ÁØÀÌ·Â
Ç¥Áظí Ç¥ÁعøÈ£ Á¦°³Á¤ÀÏ ±¸ºÐ À¯È¿
¿©ºÎ
IPR
È®¾à¼­
ÆÄÀÏ
ºñÄÁ ±â¹Ý µ¿Àû ÀÎÁõÁ¤º¸¸¦ ÀÌ¿ëÇÑ ÀüÀÚÃâÀÔ¸íºÎ ±â·Ï ÀýÂ÷ TTAK.KO-12.0369 2021-06-30 Á¦Á¤ À¯È¿ 2021-007
2021-054
TTAK.KO-12.0369.pdf