DOI QR코드

DOI QR Code

Method for network divided subscriber's facilities

망 분리 가입자 부가 서비스 제공 방법

  • Yoon, Tae-Ho (Dept. of Electrical & Electronic Engineering. GwangJu University)
  • 윤태호 (광주대학교 전기전자공학과)
  • Received : 2015.11.06
  • Accepted : 2016.01.24
  • Published : 2016.01.30

Abstract

In this paper, to provide a method for providing a network separation subscriber's facilities. How to provide this subscriber's facilities include phase generating authorization key in server, saving activation file in portable data medium included server's authorization key, executing saved activation file in client's portable storage and providing virtual machine by result client's execute file. In case of moving work, the virtual subscriver's facility can provide for a business traveler.

이 논문에서는 망 분리 가입자의 부가 서비스 제공을 위한 방법을 제공한다. 본 서비스 제공방법은, 서버가 인증키를 생성하는 단계, 서버의 인증키를 포함한 실행파일을 이동식 저장매체에 저장하는 단계, 클라이언트의 이동식 저장매체에 저장된 실행파일을 실행시키는 단계 및 클라이언트의 실행파일 실행결과로 가상 머시인을 제공하는 단계를 포함한다. 이동하여 업무를 수행하는 경우, 가상 가입자 부가 서비스가 출장자에게 제공 될 수 있다.

Keywords

References

  1. W. Seo and M. Jeon, "A Direction of Convergence and Security of Smart Grid and Information Communication Network," J. of the Korea Institute of Electronic Communication Sciences, vol. 5, no. 5, Oct. 2010, pp. 477-486.
  2. S. Lim, G. Kim, and T. Kang, "Application Program Virtualization based on Desktop Virtualization," J. of the Korea Institute of Electronic Communication Sciences, vol. 5, no. 6, Dec. 2010, pp. 595-601.
  3. W. Seo and M. Jeon, "A Study on the Realization of Diskless and Stateless Security Policy Based High-speed Synchronous Network Infrastructure," J. of the Korea Institute of Electronic Communication Sciences, vol. 6, no. 5, Oct. 2011, pp. 673-681.
  4. W. Seo, M. Jeon, and D. Park, "A Study on a 4-Stage Phased Defense Method to Defend Cloud Computing Service Intrusion," J. of the Korea Institute of Electronic Communication Sciences, vol. 7, no. 5, Oct. 2012, pp. 1041-1051. https://doi.org/10.13067/JKIECS.2012.7.5.1041
  5. S. Lee and H. Yoon, "The Study on Development of Technology for Electronic Government of S. Korea with Cloud Computing analysed by the Application of Scenario Planning," J. of the Korea Institute of Electronic Communication Sciences, vol. 7, no. 6, Dec. 2012, pp. 1245-1258. https://doi.org/10.13067/JKIECS.2012.7.6.1245
  6. C. Jeong and T. Kang, "Performance Comparison of Vitualization Domain in User Level Virtualization," J. of the Korea Institute of Electronic Communication Sciences, vol. 8, no. 11, Nov. 2013, pp. 1741-1747. https://doi.org/10.13067/JKIECS.2013.8.11.1741
  7. D. Kang, M. Jeon, and C. Kim, "Zero-day Attack, Virtual Honeynet, High-Interaction Hoenypot, Client Honeypot, Attack Visualization," J. of the Korea Institute of Electronic Communication Sciences, vol. 8, no. 6, June 2013, pp. 863-872. https://doi.org/10.13067/JKIECS.2013.8.6.863
  8. G. Jeong and K Choi, "Study on the Implementation of a Virtual Switch using Intel DPDK," J. of the Korea Institute of Electronic Communication Sciences, vol. 10, no. 2, Feb. 2015, pp. 211-218. https://doi.org/10.13067/JKIECS.2015.10.2.211
  9. T. Yoon, "Method and system for providing virtual computer environment for the network division," J. of the Korea Institute of Electronic Communication Sciences, vol. 10, no. 10, Oct. 2015, pp. 963-974.