Ç¥ÁØÈ­ Âü¿©¾È³»

TTAÀÇ Ç¥ÁØÇöȲ

Ȩ > Ç¥ÁØÈ­ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ

Ç¥ÁعøÈ£ TTAK.KO-12.0160 ±¸Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2010-12-23 ÃÑÆäÀÌÁö 24
ÇѱÛÇ¥ÁØ¸í ¹ÙÀÌ¿À ÀÎ½Ä Á¤º¸ ¹× °³ÀÎ ½Äº° Á¤º¸ µ¥ÀÌÅͺ£À̽ºÀÇ ºÐ¸® ¿î¿µ ¹æ¹ý
¿µ¹®Ç¥Áظí Separative Operation Method for Biometric Reference and Identity Reference Databases
Çѱ۳»¿ë¿ä¾à °³ÀÎ ½Äº° Á¤º¸¿Í ¹ÙÀÌ¿À ÀÎ½Ä Á¤º¸ DB¸¦ ³í¸®ÀûÀ̳ª ¹°¸®ÀûÀ¸·Î ºÐ¸®ÇÏ¿© ¿î¿µÇÏ´Â °ÍÀº ¹Ù¶÷Á÷Çϳª, ÇÊ¿ä¿¡ µû¶ó¼­´Â µÎ °³ÀÇ ½Äº° Á¤º¸¸¦ °øÅëÀ¸·Î ÁöĪÇÒ ¼ö ÀÖ´Â °øÅë ½Äº°ÀÚ(Common Identifier)°¡ ÇÊ¿äÇÏ´Ù. ÀÌ·¯ÇÑ »óȲ¿¡¼­µµ ´ÙÀ½°ú °°Àº º¸¾È ¿ä±¸ »çÇ×À» ¸¸Á·ÇÏ´Â ¿î¿µ ¹æ¾ÈÀ» Á¦½ÃÇÑ´Ù.
¿µ¹®³»¿ë¿ä¾à Secure binding of a pair of IR and BR assuming separated databases for IR and BR with separated control and their usages is described. The database for identity reference is called DBIR and that for biometric reference is called DBBR. It is assumed that DBIR uses a secret key Ki, and DBBR uses a secret key Kb to protect their database contents. In addition, it is assumed that the databases share a secret key Ke for securing communication messages.
±¹Á¦Ç¥ÁØ
°ü·ÃÆÄÀÏ TTAK.KO-12.0160.pdf TTAK.KO-12.0160.pdf            

ÀÌÀü
IMT-2000 3GPP - 3GPP WLAN ¿¬µ¿°ú 3GPP ½Ã½ºÅÛ°£ À̵¿¼º; GPRS alc 3GPP I-WLAN Ãø¸é; 3´Ü°è (R9)
´ÙÀ½
IMT-2000 3GPP - IM ÇٽɸÁ ¼­ºê½Ã½ºÅÛÀ» »ç¿ëÇÏ´Â CDIV; ÇÁ·ÎÅäÄÝ ±Ô°Ý (R9)