Abstract:
PURPOSE: An internet host system security evaluation method and system is provided to identify a protocol from packet data generated for offering a function of a packet security at an internet host system, to collect the packet data, and to extract risk elements from the packet data. CONSTITUTION: The system comprises a system configuration block, a database control block, and a rule interpreter block. The system configuration block performs a user authentication by a manager having a management right, and registers data on an agent performed at a remote host and data on a module performed by an evaluation rule. The database control block generates a table on the data transmitted by the agent, adds data, defines an assessment evaluation rule at rule data, modifies the assessment evaluation rule or erases the evaluation rule from the rule data. The rule interpreter block reads the evaluation rule, defined at the database management block, from the rule data, analyzes instructions according to an execution procedure, and executes the evaluation rule. The system includes a GUI(Graphic User Interface) diagram and a socket handler. The GUI diagram enables a manager to set overall elements needed for an assessment via a JAVA interface. The socket handler enables the agent and the execution module to transmit data over a network.
Abstract:
PURPOSE: An Internet key exchanging server apparatus for providing a security service and a method are respectively provided to allow systems of two communication ends to automatically set a security based on a negotiation result. CONSTITUTION: The Internet key exchanging server apparatus for providing a security service includes security processing modules(101,122) which are respectively installed to two communication ends. The security processing modules(101,122) transfers key exchanging signals having an Internet protocol number and a port number. Encryption modules(101,121) process passwords according to requests of the security processing modules(101,122). Security policy databases manage modules(104,124) are manage security policy data. Key exchanging apparatus(105,125) generate lists of supportable encryption functions and information and provide the lists to the other system(120).
Abstract:
PURPOSE: A method for transmitting and receiving an information protection IP(Internet Protocol) packet is provided to generate and transmit a security packet in an IP layer without having an influence on an application layer service program. CONSTITUTION: A transmission host terminal receives a packet from an application layer(601), and generates an information protection packet in which encryption and authentication information is added in the received packet(602). A data link header is added in the generated information protection packet, and the added information protection packet is transmitted to a gateway through the Internet by a frame unit(603). The gateway receives the transmitted information protection packet, removes the data link header from the received information protection packet, and forwards the removed information protection packet(604,605). In case that a security service is selected, the information protection packet is encoded and decoded according to an AH(Authentication Header) protocol header and an ESP(Encapsulating Security Payload) protocol header, and an information protection packet in which a data link header is added again is transmitted to the Internet(606). A reception host terminal receives the information protection packet forwarded from the gateway, and deletes the data link header from the received information protection packet(607). The reception host terminal checks authentication data according to the selection of the security service, and confirms decoding and authentication information according to the AH protocol header and the ESP protocol header(608). The reception host terminal transmits the received data to the upper application layer(609).
Abstract:
PURPOSE: An Internet key exchanging server apparatus for providing a security service and a method are respectively provided to allow systems of two communication ends to automatically set a security based on a negotiation result. CONSTITUTION: The Internet key exchanging server apparatus for providing a security service includes security processing modules(101,122) which are respectively installed to two communication ends. The security processing modules(101,122) transfers key exchanging signals having an Internet protocol number and a port number. Encryption modules(101,121) process passwords according to requests of the security processing modules(101,122). Security policy databases manage modules(104,124) are manage security policy data. Key exchanging apparatus(105,125) generate lists of supportable encryption functions and information and provide the lists to the other system(120).
Abstract:
1. 청구 범위에 기재된 발명이 속한 기술분야 비동기전달모드 교환 시스템에서 모든 범위의 연결식별자에 대하여 해제가 가능하도록 한 연결식별자 해제 방법 2. 발명이 해결하려고 하는 기술적 과제 ATM 교환 시스템에서는 사용 가능한 범위가 방대하여 이들 값에 대한 사용 여부를 가입자 링크마다 표시하여 관리하기가 거의 불가능한 문제점이 있었음. 3. 발명의 해결방법의 요지 가상경로 연결의 해제시에는 가상경로식별자(VPI) 테이블의 인덱스 값을 계산하여 직접 접근하는 방법으로 가상경로식별자(VPI) 상태를 변경하고, 가상채널 연결의 해제시에는 가상채널식별자(VCI) 테이블을 접근하여 가상채널식별자(VCI)를 삭제한 후에 상기 가상채널식별자(VCI)가 속했던 가상경로식별자(VPI)내의 연결 상태를 분석하여 가상경로식별자(VPI) 해제 여부를 판단하는 연결식별자 해제 방법을 제공하고자 함. 4. 발명의 중요한 용도 국제전기통신연합(ITU-T)에서 권고한 연결식별자의 범위를 모두 사용한 경우에 호 및 연결 해제시 연결식별자의 해제에 이용됨.
Abstract:
본 발명은 비동기 전달 방식(Asynchronous Transfer Mode : ATM)을 이용한 광대역 종합정보 통신망(B-ISDN)에서 가상 경로(Virtual Path : VP)를 이용한 셀복제 내부 경로 설정 방법에 관한 것으로서, 완전 분산형 에이티엠(ATM) 교환 시스템에 적용되는 가상 경로를 이용한 셀복제 내부 경로 설정 방법에 있어서, 입력단측에서 출력단 셀 복제를 위한 제 1단계(100 내지 105); 출력단측에서 출력단 셀 복제를 위한 제 2단계(110 내지 116); 입력단에서 출력단 셀 복제 해제를 위한 제 3단계(120 내지 127); 및 출력단에서 출력단 셀복제 해제를 위한 제 4단계(130 내지 135)를 포함하여 완전 분산된 ATM 교환 시스템에서 분산 제어 개념을 최대로 수용하여 셀복제 내부 경로를 설정할 수 있는 효과가 있다.
Abstract:
본 발명은 높은 광학적 온과 오프의 비율을 갖는 양자우물 구조를 조합한 초고속 광 스위칭 소자 구조에 관한 것으로, 종래의 GaAs 계열의 양자 우물구조는 비교적 높은 비율을 가지나, 광전자와 격자등에 의한 소멸시간에 의해 수 나노초 내지 수십 나노초의 광 스위칭 시간을 가지므로, 일반적인 초고속 전자소자의 속도보다 느린 스위칭 시간을 갖는 문제가 있는데에 따라서, 본 발명은 이 두개의 양자 우물구조를 이용하여 하나는 표백현상에 의한 은의 역의 역할을 하는 기능을 갖고, 다른 하나는 흡수기능을 주어 수 피코초 이내의 짧은 스위칭 시간을 갖는다. 상기 두개의 우물구조는 기판위에 Al X Ga 1-X As층과 GaAs층이 교대로 되는 구조로서 스위칭의 효과는 조절광, 입사광, 투과광에 의해 동작되어 미래의 광통신과 광 컴퓨터인 정보통신 분야에 사용될 수 있다.
Abstract:
PURPOSE: A method for transmitting and receiving an information protection IP(Internet Protocol) packet is provided to generate and transmit a security packet in an IP layer without having an influence on an application layer service program. CONSTITUTION: A transmission host terminal receives a packet from an application layer(601), and generates an information protection packet in which encryption and authentication information is added in the received packet(602). A data link header is added in the generated information protection packet, and the added information protection packet is transmitted to a gateway through the Internet by a frame unit(603). The gateway receives the transmitted information protection packet, removes the data link header from the received information protection packet, and forwards the removed information protection packet(604,605). In case that a security service is selected, the information protection packet is encoded and decoded according to an AH(Authentication Header) protocol header and an ESP(Encapsulating Security Payload) protocol header, and an information protection packet in which a data link header is added again is transmitted to the Internet(606). A reception host terminal receives the information protection packet forwarded from the gateway, and deletes the data link header from the received information protection packet(607). The reception host terminal checks authentication data according to the selection of the security service, and confirms decoding and authentication information according to the AH protocol header and the ESP protocol header(608). The reception host terminal transmits the received data to the upper application layer(609).
Abstract:
Disclosed is a ultra-high speed optic switching device including a first quantum well structure(1) and a second quantum well structure(2). The first and second quantum well structures(1, 2) have different energy gap each other. The first quantum well structure(1) absorbs a bleaching phenomenon of a long time band. The first quantum well structure(1) has the same long time constant as the second quantum well structure(2). The long time bleaching phenomenon of the first quantum well structure(1) is as same as the long time absorption phenomenon of the second quantum well structure(2). Thus, the switching can be used for the future optic communication.