ÀÚ·á°Ë»ö-Ç¥ÁØ

Ȩ > ÀڷḶ´ç > ÀÚ·á°Ë»ö > Ç¥ÁØ

ÀÚ·á °Ë»ö°á°ú

°Ë»öÆäÀÌÁö·Î
Ç¥ÁØÁ¾·ù Á¤º¸Åë½Å´ÜüǥÁØ(TTAS)
Ç¥ÁعøÈ£ TTAK.KO-12.0085 ±¸ Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2008-12-19 ÃÑ ÆäÀÌÁö 23
ÇÑ±Û Ç¥Áظí SBC(Session Border Controller) º¸¾È±â´É ¿ä±¸»çÇ×
¿µ¹® Ç¥Áظí Security Requirements of Session Border Controller
ÇÑ±Û ³»¿ë¿ä¾à º» Ç¥ÁØ¿¡¼­´Â SBC°¡ Á¦°øÇÒ ¼ö ÀÖ´Â º¸¾È±â´É ¿ä±¸»çÇ×À» ±â¼úÇÑ´Ù. ¸ÕÀú, SBCÀÇ ÀÌÇظ¦ À§ÇØ SIP±â¹Ý VoIP ¼­ºñ½º¿¡¼­ SBC°¡ Àû¿ëµÈ ÈÄÀÇ VoIP ¼­ºñ½º ±¸Á¶¿Í Àû¿ëȯ°æ¿¡ µû¸¥ SBCÀÇ ºÐ·ù¸¦ ¼³¸íÇÏ°í ±¹Á¦Ç¥ÁØÀ» ÂüÁ¶ÇÏ¿© SBC°¡ Á¦°øÇÏ´Â ÁÖ¿ä ±â´ÉÀ» ±â¼úÇÑ´Ù. ¸¶Áö¸·À¸·Î SBCÀÇ VoIP ¼­ºñ½º¿¡¼­ÀÇ º¸¾È±â´É ¿ä±¸»çÇ×À» ¼³¸íÇÑ´Ù.
¿µ¹® ³»¿ë¿ä¾à In this document, Requirements of security functions of SBC are included. Also, the signalling flow of SIP based VoIP service in SBC added networks and SBC common functions are contained to explain the SBC in the VoIP service. Finally, Requirement of security functions are explained in this document
°ü·Ã IPR È®¾à¼­ Á¢¼öµÈ IPR È®¾à¼­ ¾øÀ½
°ü·ÃÆÄÀÏ    TTAK.KO-12.0085.pdf TTAK.KO-12.0085.pdf
Ç¥ÁØÀÌ·Â
Ç¥Áظí Ç¥ÁعøÈ£ Á¦°³Á¤ÀÏ ±¸ºÐ À¯È¿
¿©ºÎ
IPR
È®¾à¼­
ÆÄÀÏ
SBC(Session Border Controller) º¸¾È±â´É ¿ä±¸»çÇ× TTAK.KO-12.0085 2008-12-19 Á¦Á¤ À¯È¿ ¾øÀ½ TTAK.KO-12.0085.pdf
Ç¥ÁØÀ¯Áöº¸¼öÀÌ·Â
°ËÅäÀÏÀÚ °ËÅä°á°ú °ËÅä³»¿ë
2017-06-09 À¯Áö ¥ï Âü°íÇÑ Ç¥ÁØ(ITU-T Y.2012)ÀÌ 2010³â¿¡ °³Á¤µÇ¸é¼­ IPTV°ü·Ã ³»¿ëÀÌ Ãß°¡µÇ¾úÀ¸³ª, º» Ç¥ÁØÀº IPTV¿ÍÀÇ °ü·ÃÀÌ Àû¾î °³Á¤ÇÏÁö ¾Ê¾Æµµ µÉ °ÍÀ¸·Î ÆǴܵÊ