ÀÚ·á°Ë»ö-Ç¥ÁØ

Ȩ > ÀڷḶ´ç > ÀÚ·á°Ë»ö > Ç¥ÁØ

ÀÚ·á °Ë»ö°á°ú

°Ë»öÆäÀÌÁö·Î
Ç¥ÁØÁ¾·ù Á¤º¸Åë½Å´ÜüǥÁØ(TTAS)
Ç¥ÁعøÈ£ TTAK.KO-12.0244 ±¸ Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2014-12-17 ÃÑ ÆäÀÌÁö 16
ÇÑ±Û Ç¥Áظí ÀüÀÚ°Å·¡ ´Ü°èº° À§Çè¼öÁØ¿¡ ´ëÇÑ ÀÎÁõ¼­ºñ½º Áöħ
¿µ¹® Ç¥Áظí Authentication service guideline for the layered risk level in online transaction
ÇÑ±Û ³»¿ë¿ä¾à ÀüÀÚ°Å·¡ÀÇ º¸¾È À§ÇùÀ» »ç¿ëÀÚ Ãø¸é, »ç¿ëÀÚ ±â±â Ãø¸é, Åë½Å °úÁ¤, ÀüÀÚ°Å·¡ ¼­ºñ½º Ãø¸éÀ¸·Î ºÐ·ùÇÏ¿© Á¤ÀÇÇÑ´Ù. ¶ÇÇÑ ÀüÀÚ°Å·¡¸¦ °Å·¡ Áغñ ´Ü°è, °Å·¡ Áö½Ã ´Ü°è, °Å·¡ ¼º¸³ ´Ü°è, °Å·¡ ¸ð´ÏÅ͸µ ´Ü°è·Î ºÐ·ùÇÏ°í °¢ °Å·¡ ´Ü°èº° º¸¾È À§ÇùÀ» Á¤ÀÇÇÏ¿©, ÀÌ¿¡ ´ëÀÀ °¡´ÉÇÑ ÀÎÁõ ¼­ºñ½ºÀÇ ÁöħÀ» Á¤ÀÇÇÑ´Ù.
¿µ¹® ³»¿ë¿ä¾à The security threat of online transactions is defined by classifying the user side, the user equipment side, the communication process, the online-transactions service side.
Furthermore, this standard defines each online-transaction step which is divided into step of transaction preparation, step of transaction request, step of dealmaking, step of transaction monitoring andprovides the guidelines of the authentication service as respond.
°ü·Ã IPR È®¾à¼­ Á¢¼öµÈ IPR È®¾à¼­ ¾øÀ½
°ü·ÃÆÄÀÏ    TTAK.KO-12.0244.pdf TTAK.KO-12.0244.pdf
Ç¥ÁØÀÌ·Â
Ç¥Áظí Ç¥ÁعøÈ£ Á¦°³Á¤ÀÏ ±¸ºÐ À¯È¿
¿©ºÎ
IPR
È®¾à¼­
ÆÄÀÏ
ÀüÀÚ°Å·¡ ´Ü°èº° À§Çè¼öÁØ¿¡ ´ëÇÑ ÀÎÁõ¼­ºñ½º Áöħ TTAK.KO-12.0244 2014-12-17 Á¦Á¤ À¯È¿ ¾øÀ½ TTAK.KO-12.0244.pdf
Ç¥ÁØÀ¯Áöº¸¼öÀÌ·Â
°ËÅäÀÏÀÚ °ËÅä°á°ú °ËÅä³»¿ë
2018-05-31 À¯Áö