ÀÚ·á°Ë»ö-Ç¥ÁØ

Ȩ > ÀڷḶ´ç > ÀÚ·á°Ë»ö > Ç¥ÁØ

ÀÚ·á °Ë»ö°á°ú

°Ë»öÆäÀÌÁö·Î
Ç¥ÁØÁ¾·ù Á¤º¸Åë½Å´ÜüǥÁØ(TTAS)
Ç¥ÁعøÈ£ [ÆóÁö] TTAE.OT-12.0008 ±¸ Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2008-12-19 ÃÑ ÆäÀÌÁö 42
ÇÑ±Û Ç¥ÁØ¸í ¸ð¹ÙÀÏ ½Å·Ú ¼­ºñ½º¸¦ À§ÇÑ ½Å·Úº¸¾È¸ðµâ(MTM) »ç¿ë ½Ã³ª¸®¿À
¿µ¹® Ç¥Áظí MTM Usage Scenarios for Trusted Mobile Services
ÇÑ±Û ³»¿ë¿ä¾à ÁÖ¿ä ³»¿ëÀ¸·Î´Â TPM(Trusted Platform Module)À» ¸ð¹ÙÀÏ È¯°æÀÇ º¸¾È¼º Çâ»óÀ» À§ÇØ Àû¿ëÇÒ ¼ö ÀÖ´Â ¾²ÀÓ»õ ¸ðµ¨(Use Case Model)µéÀ» Á¦°øÇÑ´Ù. ÀÌµé ¸ðµ¨·Î´Â 1) Ç÷§Æû ¹«°á¼º(platform integrity), 2) µð¹ÙÀ̽º ÀÎÁõ(device authentication), 3) °ß°íÇÑ µðÁöÅÐ ÀúÀÛ±Ç °ü¸®(DRM) ±¸Çö(robust DRM implementation), 4) °¡ÀÔÀÚ ½Äº° ¸ðµâ Àá±Ý(SIMLock), 5)
¿µ¹® ³»¿ë¿ä¾à This specification provides 10 use case scenarios to make TCG¡¯s specifications applicable to mobile devices. It includes 1) Platform Integrity, 2) Device Authentication, 3) Robust DRM Implementation, 4) SIMLock/Device Personalization, 5) Secure Software Download, 6) Secure Channel between Device and UICC, 7) Mobile Ticketing, 8) Mobile Payment, 9) Software Use and 10) Prove Platform and/or Application Integrity to End User. It describes characteristic information, life cycle, variations and threats for each use case.
°ü·Ã IPR È®¾à¼­ Á¢¼öµÈ IPR È®¾à¼­ ¾øÀ½
ÆóÁöÀÏ 2017-12-13
ÆóÁö»çÀ¯ Á¦92Â÷ Ç¥ÁØÃÑȸ
(À¯»ç ±¹³»Ç¥ÁØ È°¿ë ±ÇÀå
(TTAK.KO-12.0148)
* ¸ð¹ÙÀÏ ½Å·Ú ¼­ºñ½º¸¦ À§ÇÑ ½Å·Ú º¸¾È ¸ðµâ(MTM) »ç¿ë ½Ã³ª¸®¿À )
°ü·ÃÆÄÀÏ  TTAE.OT-12.0008.pdf
Ç¥ÁØÀÌ·Â
Ç¥Áظí Ç¥ÁعøÈ£ Á¦°³Á¤ÀÏ ±¸ºÐ À¯È¿
¿©ºÎ
IPR
È®¾à¼­
ÆÄÀÏ
¸ð¹ÙÀÏ ½Å·Ú ¼­ºñ½º¸¦ À§ÇÑ ½Å·Úº¸¾È¸ðµâ(MTM) »ç¿ë ½Ã³ª¸®¿À TTAE.OT-12.0008 2008-12-19 Á¦Á¤ ÆóÁö ¾øÀ½
Ç¥ÁØÀ¯Áöº¸¼öÀÌ·Â
°ËÅäÀÏÀÚ °ËÅä°á°ú °ËÅä³»¿ë
2017-06-09 ÆóÁö º» Ç¥ÁØÀº 10³â ÀÌ»óµµ ³ÑÀº ¿À·¡µÈ ±¹¿Ü ´Üü Ç¥ÁØÀÇ ¿µ¹®Ç¥ÁØÀ̸ç, ÀÌ¿Í À¯»çÇÑ ±¹³»Ç¥ÁØ(TTAK.KO-12.0148)ÀÌ ÇöÀç À¯ÁöµÇ°í ÀÖÀ¸¹Ç·Î, º» Ç¥ÁØÀº ÆóÁöµÇ¾îµµ ±¦Âú´Ù°í ÆǴܵÊ.