Abstract:
Disclosed herein is a network separation apparatus and method. The network separation apparatus according to the present invention includes a main processing unit for allocating resources according to a network to be accessed. An in-house processing unit accesses an in-house network using the resources allocated by the main processing unit. An external processing unit accesses an external network using resources, physically separated from resources used by the in-house processing unit, among the resources by the main processing unit.
Abstract:
Disclosed herein is an apparatus, method, and storage medium for integrated management of virtualization of computer resources. The apparatus receives a user request from a user; classifies the received user request depending on virtualization models for the one or more nodes, provides the classified user request to at least one interface of the virtualization models and performs an integration manager of the virtualization models.
Abstract:
Disclosed herein are a method for countering an asynchronous attack on a supply chain security protocol and an apparatus for the same. The method includes, in a supply chain security protocol performed by a terminal device into which a dielet is inserted and an authentication server, performing a self-generation mode in which a counter value within the dielet is registered in the authentication server, performing a read-out mode in which whether an asynchronous attack occurs is detected by comparing the counter values respectively stored in the dielet and the authentication server when a message for communication is sent, and replacing a message for the communication with a random value when an asynchronous attack is detected.
Abstract:
Disclosed herein are an apparatus and method for verifying the integrity of a hardware board. The apparatus includes one or more processors and execution memory for storing at least one program that is executed by the processors, wherein the program is configured to compare images of components arranged on a verification target board and a source board in a first image, obtained by photographing the verification target board, and in a second image prestored for the source board, as to whether images of the components are identical to each other, and compare first firmware extracted from the verification target board with second firmware of the source board, as to whether first firmware is identical to second firmware and verify integrity of the verification target board based on whether the images are identical to each other and on whether the pieces of firmware are identical to each other.
Abstract:
Disclosed herein are an apparatus and method for managing in-memory container storage. The apparatus includes one or more processors, executable memory for storing at least one program executed by the one or more processors, and a container file system for storing a container, which provides application virtualization. Here, the container file system includes a merged access layer, a container layer, and an image layer, and the at least one program provides an application with link information of files in the container layer and the image layer, thereby allowing the application to access the files.
Abstract:
Disclosed herein are an apparatus and method for managing memory-based integrated storage. The apparatus includes one or more processors and executable memory for storing at least one program executed by the one or more processors. The at least one program converts data operation tasks in response to a request for access to memory-based integrated storage from a user, a single virtual disk of a virtual storage pool of the memory-based integrated storage converts a disk access command into a command for connecting to a storage backend depending on the data operation tasks, and conversion of the data operation tasks into the command includes target identification indicating which local storage of the memory-based integrated storage is to be used.
Abstract:
Disclosed herein are a method for managing an access control list based on an automotive Ethernet and an apparatus for the same. The method includes analyzing a new access control rule that is input to a vehicle in which the automotive Ethernet is applied, searching for any one target unit to manage the new access control rule in consideration of at least one of a destination and an application target corresponding to the new access control rule, and storing the new access control rule by transmitting a storage request message corresponding to the new access control rule to the target unit.
Abstract:
Disclosed herein are an apparatus and method for virtual desktop service. The apparatus for virtual desktop service includes a connection broker for performing a task for coordinating a delivery protocol that is used between at least one user terminal that uses virtual desktop service and multiple servers that provides the virtual desktop service, a resource pool for providing software resources including an Operating System (OS) for the virtual desktop service, and virtual machine infrastructure for supporting hardware resources.
Abstract:
A profile management method and apparatus for the running of a virtual desktop in a heterogeneous server are disclosed herein. The profile management method for the running of a virtual desktop in a heterogeneous server, includes: assigning any optimum one of a plurality of operating servers that will run a virtual desktop; comparing a plurality of hardware profiles corresponding to the plurality of operating servers with a target hardware profile corresponding to the optimum operating server; if the target hardware profile is not present among the plurality of hardware profiles, generating a virtual desktop running profile for the running of the virtual desktop based on the target hardware profile; and sharing the virtual desktop running profile, as well as at least one profile required for the running of the virtual desktop, with the optimum operating server so that the optimum operating server runs the virtual desktop.
Abstract:
Disclosed herein are an Artificial Intelligence (AI)-based automated method for restoring a mask Read-Only Memory (ROM) firmware binary and an apparatus for the same. The AI-based automated method is performed by an AI-based automated apparatus for restoring a mask ROM firmware binary, and includes generating a bit-order list by inputting bit information and a parameter that are input for restoration to a pre-trained generation model, and restoring a firmware binary based on the bit-order list.