Ȩ > ÀڷḶ´ç > ÀÚ·á°Ë»ö > Ç¥ÁØ
ÀÚ·á °Ë»ö°á°ú
Ç¥ÁØÁ¾·ù | Á¤º¸Åë½Å´ÜüǥÁØ(TTAS) | ||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Ç¥ÁعøÈ£ | TTAK.KO-12.0244 | ±¸ Ç¥ÁعøÈ£ | |||||||||||||||
Á¦°³Á¤ÀÏ | 2014-12-17 | ÃÑ ÆäÀÌÁö | 16 | ||||||||||||||
ÇÑ±Û Ç¥Áظí | ÀüÀÚ°Å·¡ ´Ü°èº° À§Çè¼öÁØ¿¡ ´ëÇÑ ÀÎÁõ¼ºñ½º Áöħ | ||||||||||||||||
¿µ¹® Ç¥Áظí | Authentication service guideline for the layered risk level in online transaction | ||||||||||||||||
ÇÑ±Û ³»¿ë¿ä¾à | ÀüÀÚ°Å·¡ÀÇ º¸¾È À§ÇùÀ» »ç¿ëÀÚ Ãø¸é, »ç¿ëÀÚ ±â±â Ãø¸é, Åë½Å °úÁ¤, ÀüÀÚ°Å·¡ ¼ºñ½º Ãø¸éÀ¸·Î ºÐ·ùÇÏ¿© Á¤ÀÇÇÑ´Ù. ¶ÇÇÑ ÀüÀÚ°Å·¡¸¦ °Å·¡ Áغñ ´Ü°è, °Å·¡ Áö½Ã ´Ü°è, °Å·¡ ¼º¸³ ´Ü°è, °Å·¡ ¸ð´ÏÅ͸µ ´Ü°è·Î ºÐ·ùÇÏ°í °¢ °Å·¡ ´Ü°èº° º¸¾È À§ÇùÀ» Á¤ÀÇÇÏ¿©, ÀÌ¿¡ ´ëÀÀ °¡´ÉÇÑ ÀÎÁõ ¼ºñ½ºÀÇ ÁöħÀ» Á¤ÀÇÇÑ´Ù. | ||||||||||||||||
¿µ¹® ³»¿ë¿ä¾à |
The security threat of online transactions is defined by classifying the user side, the user equipment side, the communication process, the online-transactions service side.
Furthermore, this standard defines each online-transaction step which is divided into step of transaction preparation, step of transaction request, step of dealmaking, step of transaction monitoring andprovides the guidelines of the authentication service as respond. |
||||||||||||||||
°ü·Ã IPR È®¾à¼ | Á¢¼öµÈ IPR È®¾à¼ ¾øÀ½ | ||||||||||||||||
°ü·ÃÆÄÀÏ | TTAK.KO-12.0244.pdf | ||||||||||||||||
Ç¥ÁØÀÌ·Â |
|
||||||||||||||||
Ç¥ÁØÀ¯Áöº¸¼öÀÌ·Â |
|