Ȩ > Ç¥ÁØÈ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ
Ç¥ÁعøÈ£ | TTAK.KO-12.0085 | ±¸Ç¥ÁعøÈ£ | |
---|---|---|---|
Á¦°³Á¤ÀÏ | 2008-12-19 | ÃÑÆäÀÌÁö | 23 |
ÇѱÛÇ¥Áظí | SBC(Session Border Controller) º¸¾È±â´É ¿ä±¸»çÇ× | ||
¿µ¹®Ç¥Áظí | Security Requirements of Session Border Controller | ||
Çѱ۳»¿ë¿ä¾à | º» Ç¥ÁØ¿¡¼´Â SBC°¡ Á¦°øÇÒ ¼ö ÀÖ´Â º¸¾È±â´É ¿ä±¸»çÇ×À» ±â¼úÇÑ´Ù. ¸ÕÀú, SBCÀÇ ÀÌÇظ¦ À§ÇØ SIP±â¹Ý VoIP ¼ºñ½º¿¡¼ SBC°¡ Àû¿ëµÈ ÈÄÀÇ VoIP ¼ºñ½º ±¸Á¶¿Í Àû¿ëȯ°æ¿¡ µû¸¥ SBCÀÇ ºÐ·ù¸¦ ¼³¸íÇÏ°í ±¹Á¦Ç¥ÁØÀ» ÂüÁ¶ÇÏ¿© SBC°¡ Á¦°øÇÏ´Â ÁÖ¿ä ±â´ÉÀ» ±â¼úÇÑ´Ù. ¸¶Áö¸·À¸·Î SBCÀÇ VoIP ¼ºñ½º¿¡¼ÀÇ º¸¾È±â´É ¿ä±¸»çÇ×À» ¼³¸íÇÑ´Ù. | ||
¿µ¹®³»¿ë¿ä¾à | In this document, Requirements of security functions of SBC are included. Also, the signalling flow of SIP based VoIP service in SBC added networks and SBC common functions are contained to explain the SBC in the VoIP service. Finally, Requirement of security functions are explained in this document | ||
±¹Á¦Ç¥ÁØ | |||
°ü·ÃÆÄÀÏ | TTAK.KO-12.0085.pdf |