¡Ø º» »óǰÀº ¿µ¹® ÀÚ·á·Î Çѱ۰ú ¿µ¹® ¸ñÂ÷¿¡ ºÒÀÏÄ¡ÇÏ´Â ³»¿ëÀÌ ÀÖÀ» °æ¿ì ¿µ¹®À» ¿ì¼±ÇÕ´Ï´Ù. Á¤È®ÇÑ °ËÅ並 À§ÇØ ¿µ¹® ¸ñÂ÷¸¦ Âü°íÇØÁֽñ⠹ٶø´Ï´Ù.
ÀÌ º¸°í¼¿¡¼´Â µðÁöÅÐ ÀÎÁõ°ú ÀÓº£µðµå º¸¾È µ¿ÇâÀ» Á¶»çÇϰí, ÁÖ¿ä Çϵå¿þ¾î ±â¹Ý ÀÓº£µðµå º¸¾È ±â¼ú ½ÃÀå Àü¸Á, Çϵå¿þ¾î À¯Çü, µµÀÔ »ç·Ê, ÆûÆÑÅÍ µî °¢Á¾ ºÐ·ùº° »ó¼¼ ºÐ¼® µîÀ» Á¤¸®Çß½À´Ï´Ù.
½Ç¿ëÀûÀÎ ÀåÁ¡:
- ÀÓº£µðµå ÀÎÁõ ±â¼ú¿¡ °¡Àå ÀûÇÕÇÑ IoT ¿ëµµ¸¦ ½Äº°ÇÒ ¼ö ÀÖ½À´Ï´Ù.
- »ç¿ë °¡´ÉÇÑ º¸¾È ±â´É¿¡ µû¶ó ÀÓº£µðµå ½Ã½ºÅÛ¿¡ °¡Àå ÀûÇÕÇÑ ÆûÆÑÅ͸¦ °áÁ¤ÇÒ ¼ö ÀÖ½À´Ï´Ù.
- IoT Á¦Ç° °³¹ß½Ã Çϵå¿þ¾î º¸¾È Àü·«À» ÃÖÀûÈÇÒ ¼ö ÀÖ½À´Ï´Ù.
Áß¿äÇÑ Áú¹®¿¡ ´ëÇÑ ´äº¯:
- Çϵå¿þ¾î ±â¹Ý º¸¾ÈÀ» Ȱ¿ëÇÏ´Â »ê¾÷Àº?
- OEMÀº ¾î¶² ÀÎÁõ ÆûÆÑÅ͸¦ ¼±È£Çϴ°¡?
- ÀÓº£µðµå ½Ã½ºÅÛÀ» ¼±µµÇÏ´Â Çϵå¿þ¾î º¸¾È ±â¼úÀº?
Á¶»ç ÇÏÀ̶óÀÌÆ®:
- ÁÖ¿ä Çϵå¿þ¾î ±â¹Ý ÀÓº£µðµå º¸¾È ±â¼ú 3°¡Áö À¯Çü ½ÃÀå Àü¸Á: TPM(Trusted Platform Module), TEE(Trusted Execution Environment), secure Microcontroller Unit(MCU), SE(Secure Element)
- Çϵå¿þ¾î À¯Çü ¹× µµÀÔ »ç·Êº° »ó¼¼ ³»¿ª
- °¢ ÆûÆÑÅÍ ¹× ÃÖÁ¾ ½ÃÀ庰 ÃâÇÏ·® ¹× ¸ÅÃâ ¿¹Ãø(5°³ Áö¿ª)
¸ñÂ÷
Å×À̺í
Â÷Æ®
- Â÷Æ® 1 : ±â¼úº° ÀÓº£µðµå º¸¾È ÃâÇÏ·®
- Â÷Æ® 2 : ±â¼úº° ÀÓº£µðµå º¸¾È ¸ÅÃâ
- Â÷Æ® 3 : NFC ÀÓº£µðµå SE(Secure Elements) ÃâÇÏ·®
- Â÷Æ® 4 : TPM(Trusted Platform Module) ÃâÇÏ·®
- Â÷Æ® 5 : TEE(Trusted Execution Environment) ÃâÇÏ·®
- Â÷Æ® 6 : ÀÓº£µðµå SIM(eSIM) ÃâÇÏ·®
- Â÷Æ® 7 : ÀÎÁõ IC ÃâÇÏ·®
- Â÷Æ® 8 : ½ÃÅ¥¾î MCU ÃâÇÏ·®
- Â÷Æ® 9 : ½ÃÅ¥¾î ¿¤¸®¸ÕÆ® ÃâÇÏ·®
KSA
Actionable Benefits:
- Identify the optimal Internet of Things (IoT) applications for your embedded authentication technologies.
- Determine the best form factor for your specific embedded systems based on available security features.
- Optimize hardware security strategies in your IoT product development.
Critical Questions Answered:
- Which industries are going to be leveraging hardware-based security?
- Which authentication form factors are Original Equipment Manufacturers (OEMs) going to be favoring?
- Which hardware security technologies are likely to lead for embedded systems?
Research Highlights:
- Market forecast for three primary hardware-based embedded security technologies: Trusted Platform Module (TPM), Trusted Execution Environment (TEE), secure Microcontroller Unit (MCU), and Secure Element (SE).
- A detailed breakdown by hardware type and application use case.
- Shipment and revenue forecasts for each form factor and end market across five regions.
Who Should Read This?
- Semiconductor and silicon Intellectual Property (IP) companies.
- Embedded systems OEMs.
- IoT service providers.
TABLE OF CONTENTS
Tables
- Table 1 Embedded Security Shipments by Technology
- Table 2 Shipments of NFC Embedded Secure Element by Application
- Table 3 Shipments of Trusted Platform Module by Application
- Table 4 Shipments of Trusted Execution Environment by Application
- Table 5 Shipments of Embedded SIM by Application
- Table 6 Shipments of Authentication IC by Application
- Table 7 Shipments of Secure MCUs by Application
- Table 8 Shipments of Secure Elements by Application
- Table 9 NFC Embedded Secure Element Shipments by Region
- Table 10 Trusted Platform Module Shipments by Region
- Table 11 Trusted Execution Environment Processor Shipments by Region
- Table 12 Embedded SIM Shipments by Region
- Table 13 Authentication IC Shipments by Region
- Table 14 Secure MCU Shipments by Region
- Table 15 Secure Elements Shipments by Region
- Table 16 NFC Embedded Secure Element Shipments ASPs and Revenue
- Table 17 NFC Embedded Secure Element Revenue by Region
- Table 18 Trusted Platform Module Shipments ASPs and Revenue
- Table 19 Trusted Platform Module Revenue by Region
- Table 20 Shipments ASPs and Revenue of Processors Supporting Trusted Execution Environment
- Table 21 Revenue of Processors Supporting Trusted Execution Environment
- Table 22 Embedded SIM Shipments ASPs and Revenue
- Table 23 Embedded SIM Consumer Revenue by Region
- Table 24 Embedded SIM M2M Revenue by Region
- Table 25 Authentication IC Shipments ASPs and Revenue
- Table 26 Authentication IC Revenue by Region
- Table 27 Secure MCU Shipments ASPs and Revenue
- Table 28 Secure MCU Revenue by Region
- Table 29 Secure Elements Shipments ASPs and Revenue
- Table 30 Secure Elements Revenue by Region
Charts
- Chart 1 Embedded Security Shipments by Technology
- Chart 2 Embedded Security Revenue by Technology
- Chart 3 Shipments of NFC Embedded Secure Element
- Chart 4 Shipments of Trusted Platform Module
- Chart 5 Shipments of Trusted Execution Environment
- Chart 6 Shipments of Embedded SIM
- Chart 7 Shipments of Authentication IC
- Chart 8 Shipments of Secure MCUs
- Chart 9 Shipments of Secure Elements