달력

52024  이전 다음

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31

#3_Info. AR & VR & MR

"IT news" 2018. 5. 19. 17:34

1. 증강현실 (AR_Augmented Reality)

      실세계에 3차원의 가상물체를 겹쳐서 보여주는 복합형 가상 현실.

 

2. 가상현실 (VR_Virtual Reality)

      컴퓨터를 통해서 가상현실을 체험하게 해주는 최첨단 기술.

 

3. 혼합현실 (MR_Mixed Reality)

      AR+VR = 현실 세계와 가상을 넘다들다.

 

# 공통점.

   · 실제로 존재하지 않는 현실을 구현해 사람이 이를 인지할 수 있도록 하는 기술.

 

# 차이점.

   · AR은 실제 현실에 가상의 정보를 더해 보여주는 방식

   · VR은 모두 허구의 상황을 보여주는 방식

   · MR은 AR과 VR을 혼합해 현실배경에 현실과 가상의 정보를 혼합시키는 방식

Posted by Banker
|

탈중앙화 신원 확인시스템

[decentralized IDs]

 

약어 : DIDs

 

신원을 확인할 때 중앙시스템에 의해 통제 받지 않고 개인 스스로가 자신의 신원을 통제하고 확인하는 방식.

 

2018년 2월13일(현지시간) MS는 퍼블릭 블록체인을 이용한 탈중앙화 신원확인 시스템(DID)을 '마이크로소프트 인증 앱(응용프로그램)'에 적용할 계획이라고 발표했다.

 

MS는 기존 사용자 인증 시스템과 관련해 "사용자들이 자신의 인증 데이터 제어권을 가지지 못하고 데이터 유출 및 도용 위험에 노출돼 있는게 문제"라고 지적하며 "암호화된 디지털 허브에 자신의 신분증을 저장하고, 관리하고, 접근하는 방법이 대안이 될 수 있다"고 제안했다. MS는 이를 위해 2015년부터 블록체인 기술을 활용해 탈중화된 인증 시스템을 개발하는 연구를 해왔다.

 

#출처 : 한경닷컴 사전.

 

 

Decentralized Digital Identities and Blockchain – The Future as We See It.

 

Greetings everyone, I’m Ankur Patel from Microsoft’s Identity Division. It is an awesome privilege to have this opportunity to share some of our learnings and future directions based on our efforts to incubate Blockchain/distributed ledger based Decentralized Identities.

 

What we see

 

As many of you experience every day, the world is undergoing a global digital transformation where digital and physical reality are blurring into a single integrated modern way of living. This new world needs a new model for digital identity, one that enhances individual privacy and security across the physical and digital world.

 

Microsoft’s cloud identity systems already empower thousands of developers, organizations and billions of people to work, play, and achieve more. And yet there is so much more we can do to empower everyone. We aspire to a world where the billions of people living today with no reliable ID can finally realize the dreams we all share like educating our children, improving our quality of life, or starting a business.

 

To achieve this vision, we believe it is essential for individuals to own and control all elements of their digital identity. Rather than grant broad consent to countless apps and services, and have their identity data spread across numerous providers, individuals need a secure encrypted digital hub where they can store their identity data and easily control access to it.

Each of us needs a digital identity we own, one which securely and privately stores all elements of our digital identity.  This self-owned identity must be easy to use and give us complete control over how our identity data is accessed and used.

We know that enabling this kind of self-sovereign digital identity is bigger than any one company or organization. We’re committed to working closely with our customers, partners and the community to unlock the next generation of digital identity-based experiences and we’re excited to partner with so many people in the industry who are making incredible contributions to this space.

 

What we’ve learned

 

To that end today we are sharing our best thinking based on what we’ve learned from our decentralized identity incubation, an effort which is aimed at enabling richer experiences, enhancing trust, and reducing friction, while empowering every person to own and control their Digital Identity.

 

1. Own and control your Identity.

Today, users grant broad consent to countless apps and services for collection, use and retention beyond their control. With data breaches and identity theft becoming more sophisticated and frequent, users need a way to take ownership of their identity. After examining decentralized storage systems, consensus protocols, blockchains, and a variety of emerging standards we believe blockchain technology and protocols are well suited for enabling Decentralized IDs (DID).

 

2. Privacy by design, built in from the ground up.

Today, apps, services, and organizations deliver convenient, predictable, tailored experiences that depend on control of identity-bound data. We need a secure encrypted digital hub (ID Hubs) that can interact with user’s data while honoring user privacy and control.

 

3. Trust is earned by individuals, built by the community.

Traditional identity systems are mostly geared toward authentication and access management. A self-owned identity system adds a focus on authenticity and how community can establish trust. In a decentralized system trust is based on attestations: claims that other entities endorse – which helps prove facets of one’s identity.

 

4. Apps and services built with the user at the center.

Some of the most engaging apps and services today are ones that offer experiences personalized for their users by gaining access to their user’s Personally Identifiable Information (PII). DIDs and ID Hubs can enable developers to gain access to a more precise set of attestations while reducing legal and compliance risks by processing such information, instead of controlling it on behalf of the user.

 

5. Open, interoperable foundation.

To create a robust decentralized identity ecosystem that is accessible to all, it must be built on standard, open source technologies, protocols, and reference implementations. For the past year we have been participating in the Decentralized Identity Foundation (DIF) with individuals and organizations who are similarly motivated to take on this challenge. We are collaboratively developing the following key components:

  • Decentralized Identifiers (DIDs) – a W3C spec that defines a common document format for describing the state of a Decentralized Identifier
  • Identity Hubsan encrypted identity datastore that features message/intent relay, attestation handling, and identity-specific compute endpoints. 
  • Universal DID Resolvera server that resolves DIDs across blockchains 
  • Verifiable Credentialsa W3C spec that defines a document format for encoding DID-based attestations.   

6. Ready for world scale:

To support a vast world of users, organizations, and devices, the underlying technology must be capable of scale and performance on par with traditional systems. Some public blockchains (Bitcoin [BTC], Ethereum, Litecoin, to name a select few) provide a solid foundation for rooting DIDs, recording DPKI operations, and anchoring attestations. While some blockchain communities have increased on-chain transaction capacity (e.g. blocksize increases), this approach generally degrades the decentralized state of the network and cannot reach the millions of transactions per second the system would generate at world-scale. To overcome these technical barriers, we are collaborating on decentralized Layer 2 protocols that run atop these public blockchains to achieve global scale, while preserving the attributes of a world class DID system.

 

7. Accessible to everyone:

The blockchain ecosystem today is still mostly early adopters who are willing to spend time, effort, and energy managing keys and securing devices. This is not something we can expect mainstream people to deal with. We need to make key management challenges, such as recovery, rotation, and secure access, intuitive and fool-proof.

 

Our next steps

 

New systems and big ideas, often make sense on a whiteboard. All the lines connect, and assumptions seem solid. However, product and engineering teams learn the most by shipping.

 

Today, the Microsoft Authenticator app is already used by millions of people to prove their identity every day. As a next step we will experiment with Decentralized Identities by adding support for them into to Microsoft Authenticator. With consent, Microsoft Authenticator will be able to act as your User Agent to manage identity data and cryptographic keys. In this design, only the ID is rooted on chain. Identity data is stored in an off-chain ID Hub (that Microsoft can’t see) encrypted using these cryptographic keys.

 

Once we have added this capability, apps and services will be able to interact with user’s data using a common messaging conduit by requesting granular consent. Initially we will support a select group of DID implementations across blockchains and we will likely add more in the future.

 

 

출처 : Alex Simons

Director of Program Management, Microsoft Identity Division

'"IT news"' 카테고리의 다른 글

#3_Info. AR & VR & MR  (0) 2018.05.19
#1_Info. PSD2 (Payment Services Directive2 / 지불 시비스 지침)  (0) 2018.05.13
Posted by Banker
|

What is "PSD2"?

(지불 서비스 지침_Payment Services Directive)

 

· 유럽은행감독청(EBA)이 규정한 결제 서비스 지침 개정안 (2018년 1월13일 시행)

 

· 유럽 경제의 지불에 대해 동일한 규칠을 적용하여 통합된 시장을 만들기 위한 공통 규칙 

 

 

About "PDS2"

 

 

PSD2는 인터넷과 모바일결제 서비스를 고려하여 개정되었으며, 주요내용은 아래와 같음.

 

· 카드 요금 지불의 과징금 개선

 

  - 오프라인과 온라인에서 신용카드 / 직불카드를 사용하여 대금을 직브하는 경우 '추가 요금' 부과 금지.

 

  - 지급받지 못한 거래의 경우 지불해야 하는 최대 금액을 150유로에서 50유로로 감소.

    (사기 또는 중과실을 한 경우 제외)

 

· 제3자 제공자(Third Party Providers. 이하 TPPs) 도입 및 규제

 

  - 고객이 동의한 경우 은행권은 TPPs에 오픈API형태로 금융정보를 제공하여야 함.

 

  - PISP(Payment Initiation Service Providr. 지급 개시 대행 서비스 제공업자) :

    고객이 동의할 경우 고객의 은행에서 타인계좌로 직접 자금을 이체해 주는 서비스.

 

  - AISP(account Information Serivices Provider. 계정 정보 서비스 제공업자) :

    고객 계좌 정보에 대한 접근을 허용, 고객의 은행별 계좌 정보를 제공하는 서비스.

 

 

※ TPPs를 이용한 금융업무의 변화

 

    온라인제시 강력한 고객인증(Strong Customer Authentication)의 적용 의무화. (`19년 9월 시행)

 

     - 강력한 고객 인증(SCA)이란 2가지 이상의 인증 수단(멀티펙터 인증)을 사용하는 것을 말함.

 

     - 신뢰할 수 있는 목록에 대상을 추가하거나 낮은 가격의 거래(30유로 이하)인 경우 SCA 예외 가능

'"IT news"' 카테고리의 다른 글

#3_Info. AR & VR & MR  (0) 2018.05.19
#2_Info. 탈중앙화 신원 확인시스템 (DIDs)  (0) 2018.05.13
Posted by Banker
|