Abstract:
An electronic device includes a peripheral device, a processor, an interrupt controller configured to manage interrupts generated by the peripheral device and the processor on the basis of a register, and a virtualizer, wherein the virtualizer may be configured to virtualize a portion of the processor and a portion of the at least one peripheral device to generate a first partition, generate first interrupt information corresponding to an interrupt usable in the first partition, generate first processor information corresponding to a portion of the processor usable in the first partition, check whether a configuration of the register is related to at least one of the first interrupt information and the first processor information when the register is configured by the first partition, and allow the configuration of the register when the configuration of the register is related to the at least one information.
Abstract:
A method and an apparatus for device security verification utilizing a virtual trusted computing base are provided. The validity of a key for decryption is verified by a secure memory loader running on a processor of a device after booting of the device which is a computing device, and if the key is valid, encrypted firmware stored in a memory of the device is decrypted using the key to verify the confidentiality of the firmware. Then, the security memory loader verifies the authentication and integrity of the firmware by comparing a signature value generated for the decrypted firmware with an existing signature value.
Abstract:
An apparatus manages universal subscriber identity module (USIM) data in a terminal using a mobile trusted module (MTM). The apparatus includes a mobile information storage unit configured to store at least one key and the USIM data in a protection region, an information security unit configured to protect information stored in a USIM and the terminal using at least one of the USIM data and the key stored in the mobile information storage unit, and a USIM data manager configured to restore at least one of the USIM data and the key stored in the mobile information storage unit to the USIM, and store at least one of USIM data and the key provided from the USIM in the mobile information storage unit.
Abstract:
A system for performing an integrity verification based on a distributed delegator and verifying an integrity of a plurality of individual devices based on a network includes: a first individual device which is an integrity verification target of the plurality of individual devices; a second individual device configured to vicariously verify the verification target device of the plurality of individual devices; and a remote device management server configured to select the second individual device of the plurality of individual devices as a verification delegator, and to receive a result of integrity verification of the first individual device by the second individual device.
Abstract:
Provided is a virtual desktop service, and disclosed is a system for providing a server virtual machine, including: a client configured to receive allocation of a virtual machine for using a virtual desktop service; a connection broker configured to control a type of virtual machine to be allocated to be classified according to user terminal registration information of the client, any one operation server to be selected among a plurality of operation servers, and the virtual machine to be allocated; the plurality of operation servers configured to provide the client with a virtual machine under a control of the connection broker; and a shared storage configured to store data related to the client for providing the virtual machine, and provide the stored data to the operation servers, a method of providing a server virtual machine, and a server device supporting the same.
Abstract:
Disclosed is a system for performing key management of an in-vehicle network. The key management system of the in-vehicle network includes a reception unit configured to receive a shared secret key of a central gateway and a domain gateway, a memory configured to store a program for performing key management of the in-vehicle network using the shared secret key, and a processor configured to execute the program. The processor generates a secret key to be stored in a node of the in-vehicle network using the shared secret key and a unique ID of the node.
Abstract:
Disclosed is a virtual desktop service method. The virtual desktop service method includes configuring and measuring users and resources according to predetermined criteria, copying operating system files and data files to be provided to the users before use request, receiving request to use a virtual machine from any one of the users and performing user authentication and work approval, and providing an operating system file and a data file of the any one of the users, among the copied operating system files and data files, to the any one of the users according to the use request to transmit a virtual desktop environment. Consequently, the virtual desktop service method performs a service to provide a virtual machine to a user in real time.
Abstract:
An attack blocking control method uses an access control list (ACL). The method includes investigating the ACL if a packet is input, and checking whether or not the packet is registered in the ACL, comparing a current time count value with a blocking time of the packet if the packet is determined to be registered in the ACL. Further, the method includes increasing the number of blocking times of the packet by 1 if the current time count value is smaller than or equal to the blocking time. Further, the method includes automatically renewing the blocking time, and removing registration information for the packet from the ACL if the current time count value is greater than the blocking time.
Abstract:
A workflow engine framework for creating a single-domain adaptive and a cross-domain adaptive workflow performing platform is disclosed. The workflow engine framework includes: a resource management unit configured to manage resources including engine components and workflow property specification components; a system configuration unit configured to create an engine by assembling the property specification components; and a system control unit configured to drive and execute one or more engines. Further the workflow engine framework is allocated to each of two or more different signal domains and forms a cross-domain adaptive workflow engine framework.
Abstract:
Disclosed herein are a method and architecture capable of efficiently providing virtual desktop service. A service architecture for virtual desktop service according to the present invention includes a connection broker configured to perform authentication, manage virtual machines, and perform a server monitoring and protocol coordination function, a resource pool configured to manage software resources that are delivered to a specific virtual machine in a streaming form on a specific time in order to provide on-demand virtual desktop service and are executed on the specific virtual machine and to provide provision information about the managed software resources in response to a request from the connection broker, and a virtual machine infrastructure configured to support hardware resources, generate virtual machines in which the software of a user terminal is executed, and provide the generated virtual machine as virtual desktops.