ÀÚ·á°Ë»ö-Ç¥ÁØ

Ȩ > ÀڷḶ´ç > ÀÚ·á°Ë»ö > Ç¥ÁØ

ÀÚ·á °Ë»ö°á°ú

°Ë»öÆäÀÌÁö·Î
Ç¥ÁØÁ¾·ù Á¤º¸Åë½Å´ÜüǥÁØ(TTAS)
Ç¥ÁعøÈ£ TTAK.KO-12.0397 ±¸ Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2023-12-06 ÃÑ ÆäÀÌÁö 21
ÇÑ±Û Ç¥ÁØ¸í µ¥ÀÌÅÍ ÁÖ±Ç °­È­¸¦ À§ÇÑ °³ÀÎ °£ ½Å¿øÈ®ÀνýºÅÛ
¿µ¹® Ç¥Áظí Peer-to-peer Identification System for Data Sovereignty Enhancing
ÇÑ±Û ³»¿ë¿ä¾à ÀÌ Ç¥ÁØÀº ¹«¼±Åë½Å ¸ðµâ(¿¹: Bluetooth, Wi-Fi Direct), ½Å¿ø Áõ¸í¼­ °ü¸® ¸ðµâ, °³ÀÎÁ¤º¸ °ü¸® ¸ðµâ, ¾ÏȣŰ °ü¸® ¸ðµâ, ¿ÀÇÁüÀÎ(off-chain), ¿ÂüÀÎ(on-chain) µîÀ¸·Î ±¸¼ºµÇ´Â ±Ù°Å¸® ¹«¼±Åë½ÅÀ» ÀÌ¿ëÇÑ °³ÀÎ °£ ½Å¿øÈ®ÀνýºÅÛÀ» ±â¼úÇÑ´Ù. ¶ÇÇÑ ÇØ´ç ½Ã½ºÅÛ¿¡ ´ëÇÑ º¸¾È À§ÇùÀ» ½Äº°ÇÏ°í ±×¿¡ ´ëÀÀÇÏ´Â º¸¾È ¿ä±¸»çÇ×À» ±â¼úÇÑ´Ù.
¿µ¹® ³»¿ë¿ä¾à The standard should specify a peer-to-peer identification system using short-range wireless communication including wireless communication module (e.g., Bluetooth, Wi-Fi Direct), certificate management module, PII management module, cryptographic key management module, off-chain, on-chain. It also identifies security threats to the system and specify security requirements against the identified security threats.
°ü·Ã IPR È®¾à¼­    [È®¾à¼­ º¸±â]
°ü·ÃÆÄÀÏ    TTAK.KO-12.0397.pdf TTAK.KO-12.0397.pdf
Ç¥ÁØÀÌ·Â
Ç¥Áظí Ç¥ÁعøÈ£ Á¦°³Á¤ÀÏ ±¸ºÐ À¯È¿
¿©ºÎ
IPR
È®¾à¼­
ÆÄÀÏ
µ¥ÀÌÅÍ ÁÖ±Ç °­È­¸¦ À§ÇÑ °³ÀÎ °£ ½Å¿øÈ®ÀνýºÅÛ TTAK.KO-12.0397 2023-12-06 Á¦Á¤ À¯È¿ 2023-026
TTAK.KO-12.0397.pdf