Ȩ > ÀڷḶ´ç > ÀÚ·á°Ë»ö > Ç¥ÁØ
ÀÚ·á °Ë»ö°á°ú
Ç¥ÁØÁ¾·ù | Á¤º¸Åë½Å´ÜüǥÁØ(TTAS) | ||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Ç¥ÁعøÈ£ | TTAE.IT-Y.2720-Sup.12 | ±¸ Ç¥ÁعøÈ£ | |||||||||||||||
Á¦°³Á¤ÀÏ | 2013-12-18 | ÃÑ ÆäÀÌÁö | 49 | ||||||||||||||
ÇÑ±Û Ç¥Áظí | NGN ¾ÆÀ̵§Æ¼Æ¼ °ü¸® ¸ÞÄ¿´ÏÁò ºÎ¼Ó¼ | ||||||||||||||||
¿µ¹® Ç¥Áظí | Supplement on NGN Identity Management Mechanisms | ||||||||||||||||
ÇÑ±Û ³»¿ë¿ä¾à | º» Ç¥ÁØÀº ¶óÀÌÇÁ »çÀÌŬ °ü¸®, ÀÎÁõ ¹× ÀÎÁõº¸Àå, ¾ÆÀ̵§Æ¼Æ¼ °ü¸® Åë½Å°ú Á¤º¸±³È¯, ¾ÆÀ̵§Æ¼Æ¼ Á¤º¸ Á¢¼ÓÁ¦¾î ±×¸®°í ÅëÇÕÀÎÁõ µîÀÇ ¾ÆÀ̵§Æ¼Æ¼ °ü¸® ¸ÞÄ¿´ÏÁòÀ» ±â¼úÇÑ´Ù. | ||||||||||||||||
¿µ¹® ³»¿ë¿ä¾à | This supplement provides a description of some example mechanisms that can be used to meet certain identity management(IdM) requirements and deployment needs of NGN. This supplement describes mechanisms and procedures that support IdM functions. | ||||||||||||||||
°ü·Ã IPR È®¾à¼ | Á¢¼öµÈ IPR È®¾à¼ ¾øÀ½ | ||||||||||||||||
°ü·ÃÆÄÀÏ |
![]() |
||||||||||||||||
Ç¥ÁØÀÌ·Â |
|
||||||||||||||||
Ç¥ÁØÀ¯Áöº¸¼öÀÌ·Â |
|