½ÃÀ庸°í¼­
»óǰÄÚµå
1802427

º¸¾È ¸¶ÀÌÅ©·ÎÄÁÆ®·Ñ·¯ ÃßÀû Á¶»ç

Secure Microcontroller Tracker

¹ßÇàÀÏ: | ¸®¼­Ä¡»ç: ABI Research | ÆäÀÌÁö Á¤º¸: ¿µ¹® 3 Pages | ¹è¼Û¾È³» : 1-2ÀÏ (¿µ¾÷ÀÏ ±âÁØ)

    
    



¡Ø º» »óǰÀº ¿µ¹® ÀÚ·á·Î Çѱ۰ú ¿µ¹® ¸ñÂ÷¿¡ ºÒÀÏÄ¡ÇÏ´Â ³»¿ëÀÌ ÀÖÀ» °æ¿ì ¿µ¹®À» ¿ì¼±ÇÕ´Ï´Ù. Á¤È®ÇÑ °ËÅ並 À§ÇØ ¿µ¹® ¸ñÂ÷¸¦ Âü°íÇØÁֽñ⠹ٶø´Ï´Ù.

º¸¾È ¸¶ÀÌÅ©·ÎÄÁÆ®·Ñ·¯(MCU) ½ÃÀåÀ» Á¶»çÇßÀ¸¸ç, º¸¾È MCUÀÇ ÁÖ¿ä ±â´É ¹× Ư¡, ÁÖ¿ä º¥´õ¿Í ¿¡ÄڽýºÅÛ, ±âÁ¸ º¸¾È MCU Á¦Ç°±º, º¸¾È ±â´É ºÐ¼® µîÀÇ Á¤º¸¸¦ Á¤¸®ÇÏ¿© ÀüÇØµå¸³´Ï´Ù.

½Ç¿ëÀûÀÎ ÀåÁ¡:

  • º¸¾È MCU(¸¶ÀÌÅ©·ÎÄÁÆ®·Ñ·¯À¯´Ö) º¥´õ »ýŰ踦 ÀÌÇØÇÒ ¼ö ÀÖ½À´Ï´Ù.
  • º¸¾È MCUÀÇ º¸¾È ±â´ÉÀ» È®ÀÎÇÒ ¼ö ÀÖ½À´Ï´Ù.
  • º¸¾È MCUÀÇ ÁÖ¿ä ¿ëµµ¸¦ ÆÄ¾ÇÇÒ ¼ö ÀÖ½À´Ï´Ù.

Áß¿äÇÑ Áú¹®¿¡ ´ëÇÑ ´äº¯:

  • º¸¾È MCUÀÇ ÁÖ¿ä ±â´É°ú Ư¡Àº ¹«¾ùÀΰ¡?
  • ´Ù¾çÇÑ º¸¾È MCUÀÇ ´ë»ó ¾ÖÇø®ÄÉÀ̼ÇÀº ¹«¾ùÀΰ¡?
  • ÁÖ¿ä ±â¾÷Àº ¾îµðÀ̸ç, ÁÖ¿ä Á¦Ç° ¶óÀÎÀº ¹«¾ùÀΰ¡?

Á¶»ç ÇÏÀ̶óÀÌÆ®:

  • º¸¾È MCU ºÐ¾ßÀÇ ±âÁ¸ Á¦Ç°±º
  • »ó¼¼ÇÑ º¸¾È ±â´ÉÀÇ ³»¿ª:
    • º¸¾È ÄÚÇÁ·Î¼¼¼­
    • º¸¾È ºÎÆ®
    • ·çÆ® ¿Àºê Æ®·¯½ºÆ®
    • Áö¿øµÇ´Â ¾Ïȣȭ ¹× ÇØ½Ì ¾Ë°í¸®Áò
    • RNG/TRNG
    • °íÀ¯ ID
    • ºñÈֹ߼º ¸Þ¸ð¸®(NVM)¿¡ Ű ÀúÀå
    • ¸Þ¸ð¸® º¸È£
    • ÀÏȸ¿ë ºñ¹Ð¹øÈ£(OTP)
    • º¯Á¶ ¹æÁö
    • Ű »ý¼º ¹× °ü¸®
    • µðÁöÅÐ ÀÎÁõ¼­ ±â´É
    • º¸¾È Åë½Å
    • Ç¥ÁØ/±ÔÁ¤ Áؼö
    • ¼ÒÇÁÆ®¿þ¾î °³¹ß Ç÷§Æû
    • ¶óÀÌÇÁ»çÀÌŬ¿¡ µû¸¥ µð¹ÙÀ̽º °ü¸®
    • Ŭ¶ó¿ìµå µî·Ï
KSM 25.09.09

Actionable Benefits:

  • Understand the vendor ecosystem for secure Microcontroller Units (MCUs).
  • Identify the security features of secure MCUs.
  • Understand the key applications for secure MCUs.

Critical Questions Answered:

  • What are the primary capabilities and features of secure MCUs?
  • What are the target applications for the various secure MCUs?
  • Which are the key companies and what are their flagship product lines?

Research Highlights:

  • Existing product lines in the secure MCU space.
  • Detailed breakdown of security features, including security co-processor, secure boot, root of trust, supported encryption and hash algorithms, RNG/TRNG, unique ID, Non-Volatile Memory (NVM) key storage, memory protection, One-Time Password (OTP), tamper resistance, key generation and management, digital certificate capabilities, secure communications, standards/regulation compliance, software development platforms, lifecycle device management, and cloud enrollment.

Who Should Read This?

  • Semiconductor and silicon Intellectual Property (IP) companies.
  • Embedded system Original Equipment Manufacturers (OEMs).
  • Cloud Service Providers (CSPs), and cloud and back-end security service providers.

TABLE OF CONTENTS

Tables

  • Table 1 Secure Microcontroller Unit Platforms
»ùÇà ¿äû ¸ñ·Ï
0 °ÇÀÇ »óǰÀ» ¼±Åà Áß
¸ñ·Ï º¸±â
Àüü»èÁ¦