表紙:デジタル認証および組込みセキュリティ
市場調査レポート
商品コード
1309284

デジタル認証および組込みセキュリティ

Digital Authentication and Embedded Security

出版日: | 発行: ABI Research | ページ情報: 英文 26 Pages | 納期: 即日から翌営業日

価格
価格表記: USDを日本円(税抜)に換算
本日の銀行送金レート: 1USD=156.76円
デジタル認証および組込みセキュリティ
出版日: 2023年05月30日
発行: ABI Research
ページ情報: 英文 26 Pages
納期: 即日から翌営業日
  • 全表示
  • 概要
  • 目次
概要

当レポートでは、デジタル認証および組込みセキュリティの市場を調査し、ハードウェアベース組込みセキュリティ技術の出荷数・収益の予測、ハードウェアタイプなど各種区分・地域別の詳細分析などをまとめています。

レポートのメリット:

  • 組込み認証技術に最適なIoTアプリケーションを特定できます
  • 利用可能なセキュリティ機能に基づいて、特定の組込みシステムに最適なフォームファクターを決定できます
  • IoT製品開発におけるハードウェアセキュリティ戦略を最適化できます

主な質問への回答:

  • ハードウェアベースセキュリティを活用する業界は?
  • OEMはどの認証フォームファクターを好むか?
  • 組込みシステムをリードするハードウェアセキュリティ技術はどれか?

調査ハイライト:

  • 市場予測:6タイプの主要ハードウェアベース組込みセキュリティ技術別
  • 詳細内訳:ハードウェアタイプ・アプリケーションユースケース別
  • 出荷数・収益の予測:世界5地域・各種フォームファクター別
目次
Product Code: MD-DAES-112

Actionable Benefits:

  • Identify the optimal Internet of Things (IoT) applications for your embedded authentication technologies.
  • Determine the best form factor for your specific embedded systems based on available security features.
  • Optimize hardware security strategies in your IoT product development.

Critical Questions Answered:

  • Which industries are going to be leveraging hardware-based security?
  • Which authentication form factors are Original Equipment Manufacturers (OEMs) going to be favoring?
  • Which hardware security technologies are likely to lead for embedded systems?

Research Highlights:

  • Market forecast for six primary hardware-based embedded security technologies.
  • A detailed breakdown by hardware type and application use case.
  • Shipment and revenue forecasts for each form factor across the five regions.

Who Should Read This?

  • Semiconductor and silicon IP companies.
  • Embedded systems OEMs.
  • IoT service providers.

Table of Contents

Tables

  • Table 1 Embedded Security Shipments by Technology
  • Table 2 Shipments of NFC Embedded Secure Element by Application
  • Table 3 Shipments of Trusted Platform Module by Application
  • Table 4 Shipments of Trusted Execution Environment by Application
  • Table 5 Shipments of Embedded SIM by Application
  • Table 6 Shipments of Authentication IC by Application
  • Table 7 Shipments of Secure MCUs by Application
  • Table 8 NFC Embedded Secure Element Shipments by Region
  • Table 9 Trusted Platform Module Shipments by Region
  • Table 10 Trusted Execution Environment Processor Shipments by Region
  • Table 11 Embedded SIM Shipments by Region
  • Table 12 Authentication IC Shipments by Region
  • Table 13 Secure MCU Shipments by Region
  • Table 14 "NFC Embedded Secure Element Shipments, ASPs, and Revenue"
  • Table 15 NFC Embedded Secure Element Revenue by Region
  • Table 16 "Trusted Platform Module Shipments, ASPs, and Revenue"
  • Table 17 Trusted Platform Module Revenue by Region
  • Table 18 "Shipments, ASPs, and Revenue of Processors Supporting Trusted Execution Environment"
  • Table 19 Revenue of Processors Supporting Trusted Execution Environment
  • Table 20 "Embedded SIM Shipments, ASPs, and Revenue"
  • Table 21 Embedded SIM (Consumer) Revenue by Region
  • Table 22 Embedded SIM (M2M) Revenue by Region
  • Table 23 "Authentication IC Shipments, ASPs, and Revenue"
  • Table 24 Authentication IC Revenue by Region
  • Table 25 "Secure MCU Shipments, ASPs, and Revenue"
  • Table 26 Secure MCU Revenue by Region

Charts

  • Chart 1 Embedded Security Shipments by Technology
  • Chart 2 Embedded Security Revenue by Technology
  • Chart 3 Shipments of NFC Embedded Secure Element
  • Chart 4 Shipments of Trusted Platform Module
  • Chart 5 Shipments of Trusted Execution Environment
  • Chart 6 Shipments of Embedded SIM
  • Chart 7 Shipments of Authentication IC
  • Chart 8 Shipments of Secure MCUs