Ȩ > ÀڷḶ´ç > ÀÚ·á°Ë»ö > Ç¥ÁØ
ÀÚ·á °Ë»ö°á°ú
Ç¥ÁØÁ¾·ù | Á¤º¸Åë½Å´ÜüǥÁØ(TTAS) | ||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Ç¥ÁعøÈ£ | [ÆóÁö] TTAE.OT-12.0008 | ±¸ Ç¥ÁعøÈ£ | |||||||||||||||
Á¦°³Á¤ÀÏ | 2008-12-19 | ÃÑ ÆäÀÌÁö | 42 | ||||||||||||||
ÇÑ±Û Ç¥Áظí | ¸ð¹ÙÀÏ ½Å·Ú ¼ºñ½º¸¦ À§ÇÑ ½Å·Úº¸¾È¸ðµâ(MTM) »ç¿ë ½Ã³ª¸®¿À | ||||||||||||||||
¿µ¹® Ç¥Áظí | MTM Usage Scenarios for Trusted Mobile Services | ||||||||||||||||
ÇÑ±Û ³»¿ë¿ä¾à | ÁÖ¿ä ³»¿ëÀ¸·Î´Â TPM(Trusted Platform Module)À» ¸ð¹ÙÀÏ È¯°æÀÇ º¸¾È¼º Çâ»óÀ» À§ÇØ Àû¿ëÇÒ ¼ö ÀÖ´Â ¾²ÀÓ»õ ¸ðµ¨(Use Case Model)µéÀ» Á¦°øÇÑ´Ù. ÀÌµé ¸ðµ¨·Î´Â 1) Ç÷§Æû ¹«°á¼º(platform integrity), 2) µð¹ÙÀ̽º ÀÎÁõ(device authentication), 3) °ß°íÇÑ µðÁöÅÐ ÀúÀÛ±Ç °ü¸®(DRM) ±¸Çö(robust DRM implementation), 4) °¡ÀÔÀÚ ½Äº° ¸ðµâ Àá±Ý(SIMLock), 5) | ||||||||||||||||
¿µ¹® ³»¿ë¿ä¾à | This specification provides 10 use case scenarios to make TCG¡¯s specifications applicable to mobile devices. It includes 1) Platform Integrity, 2) Device Authentication, 3) Robust DRM Implementation, 4) SIMLock/Device Personalization, 5) Secure Software Download, 6) Secure Channel between Device and UICC, 7) Mobile Ticketing, 8) Mobile Payment, 9) Software Use and 10) Prove Platform and/or Application Integrity to End User. It describes characteristic information, life cycle, variations and threats for each use case. | ||||||||||||||||
°ü·Ã IPR È®¾à¼ | Á¢¼öµÈ IPR È®¾à¼ ¾øÀ½ | ||||||||||||||||
ÆóÁöÀÏ | 2017-12-13 | ||||||||||||||||
ÆóÁö»çÀ¯ |
Á¦92Â÷ Ç¥ÁØÃÑȸ
(À¯»ç ±¹³»Ç¥ÁØ È°¿ë ±ÇÀå (TTAK.KO-12.0148) * ¸ð¹ÙÀÏ ½Å·Ú ¼ºñ½º¸¦ À§ÇÑ ½Å·Ú º¸¾È ¸ðµâ(MTM) »ç¿ë ½Ã³ª¸®¿À ) |
||||||||||||||||
°ü·ÃÆÄÀÏ | TTAE.OT-12.0008.pdf | ||||||||||||||||
Ç¥ÁØÀÌ·Â |
|
||||||||||||||||
Ç¥ÁØÀ¯Áöº¸¼öÀÌ·Â |
|