Abstract:
Disclosed herein are an apparatus and method for in-memory-based virtual desktop service. The apparatus for in-memory-based virtual desktop service includes a connection broker for performing a task for coordinating a delivery protocol that is used between at least one user terminal that uses virtual desktop service and multiple servers that provide the virtual desktop service, a resource pool for providing software resources including an Operating System (OS) for the virtual desktop service; and virtual machine infrastructure for supporting hardware resources, and dynamically allocating software stored in the software resources to the hardware resources.
Abstract:
Disclosed herein are authentication and management of an application using a mobile trusted module (MTM).According to an exemplary embodiment of the present invention, there is provided an apparatus for authenticating and managing an application, including: a mobile trusted module configured to store a hash value of an authentication data for at least one application and a secret key value of an authentication data which are installed in a mobile device, authenticate the application using the stored hash value and secret key value of the authentication data, and generate a storage root key (SRK) for the application; and a trusted software stack (TSS) middleware configured to generate a message requesting authentication for the application and generation of the storage root key (SRK) and transmit the generated message to the mobile trusted module and manage result information received from the mobile trusted module in response to the transmitted message.
Abstract:
Disclosed herein are a distributed cloud system, a data processing method of a distributed cloud system, and a storage medium. The data processing method of a distributed cloud system includes receiving a request of a user for an edge cloud and controlling a distributed cloud system, wherein the distributed cloud system comprises a core cloud including a large-scale resource, the edge cloud, and a local cloud including a middle-scale resource between the core cloud and the edge cloud, processing tasks corresponding to the user request through a scheduler of the core cloud, distributing the tasks based on a queue, and aggregating results of processed tasks, and providing processed data in response to a request of the user, wherein the distributed cloud system provides a management function in case of failure in the distributed cloud system.
Abstract:
Disclosed herein are an apparatus and method for detecting violation of control flow integrity. The apparatus includes memory for storing a program and a processor for executing the program, wherein the processor multiple branch identifier registers to which identifiers of branch targets are written, a set branch identifier instruction configured to command an identifier of a branch target to be written to a branch identifier register at a predetermined sequence number, among the multiple branch identifier registers, and a check branch identifier instruction configured to command a signal indicating detection of a control flow hijacking attack to be issued based on whether a value written to the branch identifier register at the predetermined sequence number is identical to a value of an identifier of a branch target at the predetermined sequence number, wherein the program detects whether a control flow is hijacked based on the multiple branch identifier registers.
Abstract:
Disclosed herein are an apparatus and method for processing vehicle data security based on a cloud. The method may include requesting, by a vehicle, a cloud center device to register a cloud-based vehicle data security service; generating, by the cloud center device, cloud-based vehicle data security policies and a pseudonym for the vehicle; requesting, by the cloud center device, an authentication center to generate a pseudonym certificate for the pseudonym and receiving the pseudonym certificate; transmitting, by the cloud center device, the cloud-based vehicle data security policies, the pseudonym, and the pseudonym certificate to the vehicle; generating, by the vehicle, vehicle state information, including accident record information and driving entity information, based on the cloud-based vehicle data security policies and transmitting the same to the cloud center device; and storing, by the cloud center device, the accident record information and the driving entity information in a database for each vehicle.
Abstract:
Disclosed herein are a method for managing an access control list based on an automotive Ethernet and an apparatus for the same. The method includes analyzing a new access control rule that is input to a vehicle in which the automotive Ethernet is applied, searching for any one target unit to manage the new access control rule in consideration of at least one of a destination and an application target corresponding to the new access control rule, and storing the new access control rule by transmitting a storage request message corresponding to the new access control rule to the target unit.
Abstract:
Disclosed herein are an apparatus and method for in-memory-based virtual desktop service. The apparatus for in-memory-based virtual desktop service includes a connection broker for performing a task for coordinating a delivery protocol that is used between at least one user terminal that uses virtual desktop service and multiple servers that provide the virtual desktop service, a resource pool for providing software resources including an Operating System (OS) for the virtual desktop service; and virtual machine infrastructure for supporting hardware resources, and dynamically allocating software stored in the software resources to the hardware resources.
Abstract:
There is provided a method of fault management of a smart device including comparing a value of a fault detection indicator (hereinafter referred to as ‘FDI’) in a normal state, which detects faults generated in the smart device, with respect to at least one performance indicator, with an FDI value observed in real time and detecting the faults by calculating a relative variation level of the observed values, and creating a diagnosis object (hereinafter referred to as ‘DO’) including a cause and a countermeasure of the detected fault and analyzing the fault.