Ç¥ÁØÈ­ Âü¿©¾È³»

TTAÀÇ Ç¥ÁØÇöȲ

Ȩ > Ç¥ÁØÈ­ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ

Ç¥ÁعøÈ£ TTAE.IT-X1124 ±¸Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2009-12-22 ÃÑÆäÀÌÁö 63
ÇѱÛÇ¥ÁØ¸í ¸ð¹ÙÀÏ Á¾´Ü°£ Åë½ÅÀ» À§ÇÑ ÀÎÁõ±¸Á¶
¿µ¹®Ç¥Áظí Authentication architecture for mobile end-to-end communication
Çѱ۳»¿ë¿ä¾à ÁÖ¿ä ³»¿ëÀ¸·Î´Â ¸ð¹ÙÀÏ ³×Æ®¿öÅ©¸¦ ±¸¼ºÇÏ´Â °¢ °³Ã¼µéÀÌ ¼­·Î ´Ù¸¥ ÀÎÁõ±¸Á¶³ª ÀÎÁõ ´É·ÂÀÌ ´Ù¸£¹Ç·Î, À̸¦ Á¶À²ÇÒ ¼ö ÀÖ´Â ÀÎÁõ±¸Á¶, °¢ °³Ã¼µé °£ÀÇ ÀÎÁõÀýÂ÷, Àü¹ÝÀûÀÎ ÀÎÁõÀýÂ÷µéÀ» Á¤ÀÇÇÏ°í ÀÖÀ¸¸ç, ºÎ·ÏÀ¸·Î À̵é ÀýÂ÷¸¦ ±â¹ÝÀ¸·Î ¿£Æ¼Æ¼ ÀÎÁõÀýÂ÷¿¡ ´ëÇÑ ¿¹¸¦ ¼³¸íÇÏ°í ÀÖ´Ù.
¿µ¹®³»¿ë¿ä¾à This standard describes authentication architecture and authentication procedures to harmonize for each entities in mobile network that have differentiated miscellaneous authentication capabilities and architecture. The appendix in this standard addresses some examples of entity authentication procedures.
±¹Á¦Ç¥ÁØ
°ü·ÃÆÄÀÏ TTAE.IT-X1124.pdf TTAE.IT-X1124.pdf            

ÀÌÀü
¾ÈÀüÇÑ ¸ð¹ÙÀÏ Á¾´Ü°£ µ¥ÀÌÅÍ Åë½ÅÀ» À§ÇÑ Â÷º°È­µÈ º¸¾È¼­ºñ½º
´ÙÀ½
¸ð¹ÙÀÏ µ¥ÀÌÅÍ Åë½Å¿¡¼­ÀÇ º¸¾È»ó°ü ´ëÀÀ ½Ã½ºÅÛ