Ç¥ÁØÈ­ Âü¿©¾È³»

TTAÀÇ Ç¥ÁØÇöȲ

Ȩ > Ç¥ÁØÈ­ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ

Ç¥ÁعøÈ£ TTAE.IT-X.1087 ±¸Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2017-06-28 ÃÑÆäÀÌÁö 44
ÇѱÛÇ¥ÁØ¸í ¸ð¹ÙÀÏ µð¹ÙÀ̽º¿¡¼­ÀÇ ÅÚ·¹¹ÙÀÌ¿ÀÀÎ½Ä º¸¾ÈÁöħ
¿µ¹®Ç¥Áظí Telebiometric Security Guideline For Mobile Devices
Çѱ۳»¿ë¿ä¾à ÃÖ±Ù µé¾î, ¸ð¹ÙÀÏ Áö±Þ°áÁ¦, ¿ø°ÝÀÇ·á µî ¸ð¹ÙÀÏ ÀÀ¿ë¼­ºñ½º¿¡¼­ ½Å·Ú¼º ³ôÀº ºñ´ë¸é ÀÎÁõ¼ö´ÜÀ¸·Î ÅÚ·¹¹ÙÀÌ¿À ÀÎ½Ä ±â¼úÀÌ ³Î¸® »ç¿ëµÇ°í ÀÖ´Ù. ÀÌ¿¡ µû¶ó º» Ç¥ÁØÀº ¸ð¹ÙÀÏ ¹ÙÀÌ¿À ÀνÄÀÇ ¾ÈÀü½Å·Ú¼º È®º¸¸¦ À§ÇØ ÇÊ¿äÇÑ ±â¼úÀû¡¤°ü¸®Àû º¸¾È ´ëÃ¥°ú ¸ð¹ÙÀÏ ±â±â¿¡¼­ÀÇ ÅÚ·¹¹ÙÀÌ¿À ÀÎ½Ä ±â¼úÀ» Àû¿ëÇϱâ À§ÇÑ 12°¡ÁöÀÇ ÀÎÁõ ¸ðµ¨À» Á¦½ÃÇÏ°í ¸ðµ¨º° º¸¾È Ãë¾àÁ¡°ú ÀÌ¿¡ ´ëÀÀÇÏ´Â º¸¾È ´ëÃ¥À» Á¤ÀÇÇÏ°í ÀÖ´Ù.
¿µ¹®³»¿ë¿ä¾à Biometric technology in mobile devices is frequently used in various areas which require a high level of reliability such as e-banking, and procurement services. It is necessary to make efforts to develop a security system that can preemptively cope with potential security threats for the purpose of ensuring mobile biometric data security. Since biometric technology handles sensitive personally identifiable information (PII), some of the privacy issues for biometric in mobile devices should be considered. Recommendation ITU-T X.tam specifies the implementation model and threats in the operating telebiometric systems in mobile devices and provides a general guideline for security countermeasures from both the technical and operational perspectives in order to establish a safe mobile environment for the use of telebiometric systems.
±¹Á¦Ç¥ÁØ
°ü·ÃÆÄÀÏ TTAE.IT-X.1087.pdf TTAE.IT-X.1087.pdf            

ÀÌÀü
SoD(System on-Demand) ¼­ºñ½º ±â¹ÝÀÇ ½É¸®½º °³ÀÎ ÄÄÇ»Æà ȯ°æ ±¸¼ºÀ» À§ÇÑ ÂüÁ¶¸ðµ¨
´ÙÀ½
RFID ¼¾¼­ ÅÂ±×¿ë º£Å¸ÀüÁö ±Ô°Ý