梅兰亭Gemalto 李鋒
authentication n security
access right, protect the transmission,
ptotect data at rest or in motion, in cloud or local,
prevent from hacker s who always find a loophole
think like a hacker,
car ecu, 電子控制中心,
in car entertainment,
hacking the transmission.
hacking into the cloud
物联网挑戰_
功耗低.
成本低.
使用年限長.
易被实体接觸到、人可能不在身边
iot security
GSMA Iot security guideline
ENISA security and resilience of smart home
www,enisa.europe.eu
define the iot security model
secure the breach,
lifecycle security management, evolce
lightweight M2M test with oma
車机評估
risk analysis, system security spec,
test plan
evaluation, technical support,
solution for device
software based
software tee trusted execution environment
hardware tee 特殊公版硬体
dedicated security element 客製晶片
solution for cloud
雲端數據加密(被拿走後打不開)
雲上VM的保護及被拿走的偵測(被拿不走)
版權保護、權限管理.
HSM 加密机
绸路版、PC級、USB级
solution for lifecycle
lora trusred key manager,
tsm trusted security mgt, application or key sdownload control
沒有留言:
張貼留言