Ç¥ÁØÈ­ Âü¿©¾È³»

TTAÀÇ Ç¥ÁØÇöȲ

Ȩ > Ç¥ÁØÈ­ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ

Ç¥ÁعøÈ£ [ÆóÁö] TTAE.OT-12.0008 ±¸Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2008-12-19 ÃÑÆäÀÌÁö 42
ÇѱÛÇ¥ÁØ¸í ¸ð¹ÙÀÏ ½Å·Ú ¼­ºñ½º¸¦ À§ÇÑ ½Å·Úº¸¾È¸ðµâ(MTM) »ç¿ë ½Ã³ª¸®¿À
¿µ¹®Ç¥Áظí MTM Usage Scenarios for Trusted Mobile Services
Çѱ۳»¿ë¿ä¾à ÁÖ¿ä ³»¿ëÀ¸·Î´Â TPM(Trusted Platform Module)À» ¸ð¹ÙÀÏ È¯°æÀÇ º¸¾È¼º Çâ»óÀ» À§ÇØ Àû¿ëÇÒ ¼ö ÀÖ´Â ¾²ÀÓ»õ ¸ðµ¨(Use Case Model)µéÀ» Á¦°øÇÑ´Ù. ÀÌµé ¸ðµ¨·Î´Â 1) Ç÷§Æû ¹«°á¼º(platform integrity), 2) µð¹ÙÀ̽º ÀÎÁõ(device authentication), 3) °ß°íÇÑ µðÁöÅÐ ÀúÀÛ±Ç °ü¸®(DRM) ±¸Çö(robust DRM implementation), 4) °¡ÀÔÀÚ ½Äº° ¸ðµâ Àá±Ý(SIMLock), 5)
¿µ¹®³»¿ë¿ä¾à This specification provides 10 use case scenarios to make TCG¡¯s specifications applicable to mobile devices. It includes 1) Platform Integrity, 2) Device Authentication, 3) Robust DRM Implementation, 4) SIMLock/Device Personalization, 5) Secure Software Download, 6) Secure Channel between Device and UICC, 7) Mobile Ticketing, 8) Mobile Payment, 9) Software Use and 10) Prove Platform and/or Application Integrity to End User. It describes characteristic information, life cycle, variations and threats for each use case.
±¹Á¦Ç¥ÁØ
°ü·ÃÆÄÀÏ TTAE.OT-12.0008.pdf

ÀÌÀü
½º¸¶Æ® ³ëµå Ç÷§Æû: °³¹æÇü ½Ã½ºÅÛ ÀÀ¿ë ÇÁ·Î±×·¥ ÀÎÅÍÆäÀ̽º
´ÙÀ½
Àú¼Ó, ¹«¼±, ½º¸¶Æ® ¹ÌÅ͸µ À¯Æ¿¸®Æ¼ ³×Æ®¿öÅ©¸¦ À§ÇÑ ¹°¸®°èÃþ µ¥ÀÌÅÍ Àü¼Û·ü È®Àå ±Ô°Ý