¼¼°èÀÇ Çϵå¿þ¾î º¸¾È ¸ðµâ ½ÃÀå
Hardware Security Modules
»óǰÄÚµå : 1650900
¸®¼­Ä¡»ç : Global Industry Analysts, Inc.
¹ßÇàÀÏ : 2025³â 02¿ù
ÆäÀÌÁö Á¤º¸ : ¿µ¹® 194 Pages
 ¶óÀ̼±½º & °¡°Ý (ºÎ°¡¼¼ º°µµ)
US $ 5,850 £Ü 8,487,000
PDF (Single User License) help
PDF º¸°í¼­¸¦ 1¸í¸¸ ÀÌ¿ëÇÒ ¼ö ÀÖ´Â ¶óÀ̼±½ºÀÔ´Ï´Ù. Àμâ´Â °¡´ÉÇϸç Àμ⹰ÀÇ ÀÌ¿ë ¹üÀ§´Â PDF ÀÌ¿ë ¹üÀ§¿Í µ¿ÀÏÇÕ´Ï´Ù.
US $ 17,550 £Ü 25,463,000
PDF (Global License to Company and its Fully-owned Subsidiaries) help
PDF º¸°í¼­¸¦ µ¿ÀÏ ±â¾÷ÀÇ ¸ðµç ºÐÀÌ ÀÌ¿ëÇÒ ¼ö ÀÖ´Â ¶óÀ̼±½ºÀÔ´Ï´Ù. Àμâ´Â °¡´ÉÇϸç Àμ⹰ÀÇ ÀÌ¿ë ¹üÀ§´Â PDF ÀÌ¿ë ¹üÀ§¿Í µ¿ÀÏÇÕ´Ï´Ù.


Çѱ۸ñÂ÷

Çϵå¿þ¾î º¸¾È ¸ðµâ ¼¼°è ½ÃÀå, 2030³â±îÁö 36¾ï ´Þ·¯¿¡ ´ÞÇÒ Àü¸Á

2024³â¿¡ 20¾ï ´Þ·¯·Î ÃßÁ¤µÇ´Â Çϵå¿þ¾î º¸¾È ¸ðµâ ¼¼°è ½ÃÀåÀº 2024³âºÎÅÍ 2030³â±îÁö ¿¬Æò±Õ 10.3%·Î ¼ºÀåÇÏ¿© 2030³â¿¡´Â 36¾ï ´Þ·¯¿¡ ´ÞÇÒ °ÍÀ¸·Î ¿¹»óµË´Ï´Ù. º» º¸°í¼­¿¡¼­ ºÐ¼®ÇÏ´Â ºÎ¹® Áß ÇϳªÀÎ LAN ±â¹Ý/³×Æ®¿öÅ© ¿¬°á Çϵå¿þ¾î º¸¾È ¸ðµâÀº CAGR 10.1%¸¦ ±â·ÏÇÏ¿© ºÐ¼® ±â°£ Á¾·á ½ÃÁ¡¿¡ 15¾ï ´Þ·¯¿¡ µµ´ÞÇÒ °ÍÀ¸·Î ¿¹»óµË´Ï´Ù. USB ±â¹Ý Çϵå¿þ¾î º¸¾È ¸ðµâ ÀÌ ºÎ¹®Àº ºÐ¼® ±â°£ µ¿¾È CAGR 11.4%ÀÇ ¼ºÀå·üÀ» º¸ÀÏ °ÍÀ¸·Î ¿¹»óµË´Ï´Ù.

¹Ì±¹ ½ÃÀå 5¾ï 6,580¸¸ ´Þ·¯, Áß±¹Àº CAGR 9.5%·Î ¼ºÀå Àü¸Á

¹Ì±¹ÀÇ Çϵå¿þ¾î º¸¾È ¸ðµâ ½ÃÀåÀº 2024³â 5¾ï 6,580¸¸ ´Þ·¯·Î ÃßÁ¤µË´Ï´Ù. ¼¼°è 2À§ÀÇ °æÁ¦ ´ë±¹ÀÎ Áß±¹Àº 2030³â±îÁö 5¾ï 4,340¸¸ ´Þ·¯ÀÇ ½ÃÀå ±Ô¸ð¿¡ µµ´ÞÇÒ °ÍÀ¸·Î ¿¹»óµÇ¸ç, ºÐ¼® ±â°£ÀÎ 2024-2030³â µ¿¾È CAGRÀº 9.5%¿¡ ´ÞÇÒ °ÍÀ¸·Î ¿¹»óµË´Ï´Ù. ´Ù¸¥ ÁÖ¸ñÇÒ ¸¸ÇÑ Áö¿ª ½ÃÀåÀ¸·Î´Â ÀϺ»°ú ij³ª´Ù°¡ ÀÖÀ¸¸ç, ºÐ¼® ±â°£ µ¿¾È °¢°¢ 9.3%¿Í 8.5%ÀÇ CAGRÀ» ±â·ÏÇÒ °ÍÀ¸·Î ¿¹»óµË´Ï´Ù. À¯·´¿¡¼­´Â µ¶ÀÏÀÌ CAGR ¾à 8.2%·Î ¼ºÀåÇÒ °ÍÀ¸·Î ¿¹»óµË´Ï´Ù.

¼¼°è Çϵå¿þ¾î º¸¾È ¸ðµâ ½ÃÀå - ÁÖ¿ä µ¿Çâ ¹× ÃËÁø¿äÀÎ Á¤¸®

Çϵå¿þ¾î º¸¾È ¸ðµâ(HSM)ÀÌ ±â¹Ð µ¥ÀÌÅÍ º¸È£¿Í ¾ÈÀüÇÑ °Å·¡¿¡ ÇʼöÀûÀÎ ÀÌÀ¯´Â ¹«¾ùÀϱî?

Çϵå¿þ¾î º¸¾È ¸ðµâ(HSM)Àº ¹Î°¨ÇÑ µ¥ÀÌÅ͸¦ º¸È£ÇÏ°í »ê¾÷ Àü¹Ý¿¡ °ÉÃÄ ¾ÈÀüÇÑ °Å·¡¸¦ º¸ÀåÇÏ´Â µ¥ ÇʼöÀûÀÎ ¿ªÇÒÀ» Çϰí ÀÖ½À´Ï´Ù. ±×·¸´Ù¸é ¿À´Ã³¯ HSMÀÌ ¿Ö ÀÌÅä·Ï Áß¿äÇÑ °ÍÀϱî? µ¥ÀÌÅÍ À¯Ãâ, »çÀ̹ö °ø°Ý, µðÁöÅÐ »ç±â°¡ ³î¶ó¿î ¼Óµµ·Î Áõ°¡Çϰí ÀÖ´Â ¿À´Ã³¯, Á¶Á÷Àº °¡Àå ¼ÒÁßÇÑ ÀÚ»êÀÎ ¾Ïȣȭ Ű, µðÁöÅÐ ÀÎÁõ¼­, ±â¹Ð ¾ÏÈ£ 󸮸¦ º¸È£ÇÏ´Â °­·ÂÇÑ º¸¾È ¼Ö·ç¼ÇÀÌ ÇÊ¿äÇÕ´Ï´Ù. °ü¸®Çϰí, ¹«´Ü Á¢±Ù, º¯Á¶, ¿À¿ëÀ¸·ÎºÎÅÍ ¾ÈÀüÇÏ°Ô º¸È£Çϵµ·Ï ¼³°èµÈ Àü¿ë Çϵå¿þ¾î ÀåÄ¡ÀÔ´Ï´Ù.

HSMÀº ±ÝÀ¶, ÇコÄɾî, Á¤ºÎ±â°ü, E-Commerce µî µðÁöÅÐ °Å·¡, Åë½Å, ±â¹Ð Á¤º¸¸¦ º¸È£ÇÏ´Â °ÍÀÌ °¡Àå Áß¿äÇÑ »ê¾÷¿¡¼­ ³Î¸® »ç¿ëµÇ°í ÀÖ½À´Ï´Ù. ±ÝÀ¶ °Å·¡ÀÇ ¾ÈÀü¼º, °í°´ µ¥ÀÌÅÍ º¸È£, ½Å¿ø È®ÀÎ ½Ã½ºÅÛÀÇ ¹«°á¼º º¸Àå µî HSMÀº ¹°¸®Àû º¸È£¿Í ³í¸®Àû º¸È£¸¦ ¸ðµÎ Á¦°øÇÏ¿© ºñ±³ÇÒ ¼ö ¾ø´Â ¼öÁØÀÇ º¸¾ÈÀ» Á¦°øÇÕ´Ï´Ù. ¾ÈÀüÇÑ È¯°æ¿¡¼­ ¾Ïȣȭ 󸮸¦ ¼öÇàÇÒ ¼ö ÀÖ´Â HSMÀº ¾ö°ÝÇÑ µ¥ÀÌÅÍ º¸È£ ±ÔÁ¤À» ÁؼöÇÏ°í µðÁöÅÐ ¾÷¹«ÀÇ ½Å·Ú¼ºÀ» À¯ÁöÇϰíÀÚ ÇÏ´Â Á¶Á÷¿¡ ÇʼöÀûÀÎ ¿ä¼ÒÀÔ´Ï´Ù.

±â¼úÀÇ ¹ßÀüÀº Çϵå¿þ¾î º¸¾È ¸ðµâÀÇ º¸¾È°ú È¿À²¼ºÀ» ¾î¶»°Ô Çâ»ó½Ã۰í Àִ°¡?

±â¼úÀÇ ¹ßÀüÀº Çϵå¿þ¾î º¸¾È ¸ðµâ(HSM)ÀÇ º¸¾È¼º, È¿À²¼º, ¹ü¿ë¼ºÀ» Å©°Ô Çâ»ó½ÃÄÑ ±â¹Ð µ¥ÀÌÅÍ º¸È£ ¹× ¾Ïȣȭ ÀÛ¾÷À» º¸´Ù È¿°úÀûÀ¸·Î ¼öÇàÇÒ ¼ö ÀÖµµ·Ï Çϰí ÀÖ½À´Ï´Ù. ÃֽŠHSMÀÇ Áß¿äÇÑ ¹ßÀü Áß Çϳª´Â Ÿ¿ø°î¼±¾ÏÈ£(ECC)¿Í °°Àº °í±Þ ¾Ïȣȭ ¾Ë°í¸®ÁòÀÇ ÅëÇÕÀÔ´Ï´Ù. ÀÌ·¯ÇÑ °³¼±À¸·Î HSMÀº ¾Ïȣȭ ¹× º¹È£È­ ÀÛ¾÷À» º¸´Ù È¿À²ÀûÀ¸·Î ¼öÇàÇÏ¿© º¸È£¿¡ ´ëÇÑ Å¸Çù ¾øÀÌ ºü¸£°í ¾ÈÀüÇÑ Æ®·£Àè¼ÇÀ» º¸ÀåÇÒ ¼ö ÀÖ°Ô µÇ¾ú½À´Ï´Ù. ¶ÇÇÑ, HSM¿¡¼­ ¾çÀÚ ³»¼º ¾ÏÈ£ÀÇ »ç¿ëÀÌ È®´ëµÊ¿¡ µû¶ó Á¶Á÷Àº ±âÁ¸ ¾Ïȣȭ ¹æ½ÄÀ» ±ú¶ß¸± ¼ö ÀÖ´Â ¾çÀÚ ÄÄÇ»ÆÃÀÇ ±Ã±ØÀûÀÎ ºÎ»ó¿¡ ´ëºñÇÒ ¼ö ÀÖ°Ô µÇ¾ú½À´Ï´Ù.

HSMÀº ¶ÇÇÑ È®À强°ú ¼º´É Çâ»óÀ¸·Î ÀÎÇÑ ÀÌÁ¡µµ ÀÖ½À´Ï´Ù. ¿À´Ã³¯ HSMÀº ÃÊ´ç ¼ö¹é¸¸ °ÇÀÇ ¾Ïȣȭ Æ®·£Àè¼ÇÀ» ó¸®ÇÒ ¼ö ÀÖ¾î ÀºÇà ³×Æ®¿öÅ©, °áÁ¦ °ÔÀÌÆ®¿þÀÌ, Ŭ¶ó¿ìµå ÀÎÇÁ¶ó µî ´ë·® ó¸® ȯ°æ¿¡ ÀûÇÕÇÕ´Ï´Ù. ÀÌ·¯ÇÑ È®À强À» ÅëÇØ HSMÀº µ¥ÀÌÅÍÀÇ »ó½Ã ¾ÈÀüÇÑ ¾Ïȣȭ ¹× º¹È£È­¸¦ ½Ç½Ã°£À¸·Î ÇÊ¿ä·Î ÇÏ´Â ´ë±â¾÷ÀÇ ¿ä±¸»çÇ×À» ÃæÁ·½Ãų ¼ö ÀÖ½À´Ï´Ù. ¶ÇÇÑ, Ŭ¶ó¿ìµå ±â¹Ý HSM ¼Ö·ç¼Ç(HSM as a Service)ÀÇ µîÀåÀ¸·Î ±â¾÷µéÀº ¹°¸®Àû Çϵå¿þ¾î¸¦ ÇöÀå¿¡¼­ °ü¸®ÇÏÁö ¾Ê°íµµ HSMÀÇ º¸¾È ÀÌÁ¡À» Ȱ¿ëÇÒ ¼ö ÀÖ°Ô µÇ¾î, ¸ðµç ±Ô¸ðÀÇ ±â¾÷¿¡¼­ HSMÀ» º¸´Ù Ä£¼÷Çϰí À¯¿¬ÇÏ°Ô »ç¿ëÇÒ ¼ö ÀÖ°Ô µÇ¾ú½À´Ï´Ù. µÇ¾ú½À´Ï´Ù.

¶Ç ´Ù¸¥ Å« ¹ßÀüÀº ÄÄÇöóÀ̾𽺠¹× ±ÔÁ¦¿¡ ´ëÇÑ °ü½ÉÀÌ ³ô¾ÆÁö°í ÀÖ´Ù´Â Á¡ÀÔ´Ï´Ù. HSMÀº ±ÝÀ¶, ±¹¹æ, Á¤ºÎ µîÀÇ »ê¾÷¿¡¼­ ¿ä±¸ÇÏ´Â FIPS 140-2 ¹× °øÅë ±âÁذú °°Àº ¾ö°ÝÇÑ º¸¾È Ç¥ÁØÀ» ÃæÁ·Çϵµ·Ï ¼³°èµÇ¾î ÀÖ½À´Ï´Ù. ´ëºÎºÐÀÇ ÃֽŠHSM¿¡´Â ¾Ïȣȭ ÀÛ¾÷À» ÃßÀûÇÏ°í ¸ð´ÏÅ͸µÇÒ ¼ö ÀÖ´Â °¨»ç ±â´ÉÀÌ ³»ÀåµÇ¾î ÀÖ¾î ¾÷°è ±ÔÁ¤À» ÁؼöÇÒ ¼ö ÀÖµµ·Ï º¸ÀåÇÕ´Ï´Ù. ÀÌ·¯ÇÑ Åõ¸í¼º°ú Ã¥ÀÓ¿¡ ´ëÇÑ °­Á¶´Â ±â¹Ð µ¥ÀÌÅÍÀÇ ¹«°á¼ºÀ» À¯ÁöÇÏ´Â °ÍÀÌ Áß¿äÇÑ ¾ö°ÝÇÑ ±ÔÁ¦ ºÐ¾ß¿¡¼­ HSMÀÇ °¡Ä¡¸¦ ´õ¿í ³ô¿©ÁÝ´Ï´Ù.

¾Ïȣȭ ¾Ë°í¸®Áò ¹× ÄÄÇöóÀ̾𽺠±â´É °­È­¿Í ´õºÒ¾î HSMÀÇ ¹°¸®Àû º¸¾Èµµ °­È­µÇ°í ÀÖ½À´Ï´Ù. ÃֽŠHSMÀº ¹°¸®Àû °ø°ÝÀ¸·ÎºÎÅÍ ÀåÄ¡¸¦ º¸È£ÇÏ´Â º¯Á¶ ¹æÁö ¹× º¯Á¶ ¹æÁö ¸ÞÄ¿´ÏÁòÀ» °®Ãß°í ÀÖÀ¸¸ç, HSMÀ» ¿­°Å³ª º¯Á¶ÇÏ·Á°í ½ÃµµÇϸé ÀÚµ¿À¸·Î ÀÚ±â ÆÄ±« ¸ÞÄ¿´ÏÁòÀÌ ÀÛµ¿ÇÏ¿© ÀúÀåµÈ ¸ðµç ۰¡ Áö¿öÁö°í ÀåÄ¡¸¦ »ç¿ëÇÒ ¼ö ¾ø°Ô µË´Ï´Ù. ÀÌ·¯ÇÑ ¹°¸®Àû º¸È£ ±â´ÉÀ» ÅëÇØ µµ³­À̳ª ¹«´Ü ¾×¼¼½º°¡ ¹ß»ýÇÏ´õ¶óµµ HSM ³»ÀÇ ¹Î°¨ÇÑ µ¥ÀÌÅÍ´Â ¾ÈÀüÇÏ°Ô º¸È£µË´Ï´Ù.

Çϵå¿þ¾î º¸¾È ¸ðµâÀÌ µ¥ÀÌÅÍ ¾Ïȣȭ, µðÁöÅÐ ¼­¸í, ±ÔÁ¦ Áؼö¿¡ ÇʼöÀûÀÎ ÀÌÀ¯´Â ¹«¾ùÀΰ¡?

Çϵå¿þ¾î º¸¾È ¸ðµâ(HSM)Àº ¾Ïȣȭ Ű °ü¸® ¹× ¿î¿µ¿¡ ÃÖ°í ¼öÁØÀÇ º¸¾ÈÀ» Á¦°øÇϱ⠶§¹®¿¡ µ¥ÀÌÅÍ ¾Ïȣȭ, µðÁöÅÐ ¼­¸í ¹× ±ÔÁ¦ Áؼö¿¡ ÇʼöÀûÀ̸ç, HSMÀÇ °¡Ä¡°¡ ³ôÀº ÁÖ¿ä ÀÌÀ¯ Áß Çϳª´Â µ¥ÀÌÅÍ ¾Ïȣȭ¿¡ »ç¿ëµÇ´Â ¾Ïȣȭ ۸¦ ¾ÈÀüÇÏ°Ô »ý¼º, ÀúÀå ¹× º¸È£ÇÒ ¼ö Àֱ⠶§¹®ÀÔ´Ï´Ù. º¸È£ÇÒ ¼ö ÀÖ´Ù´Â Á¡ÀÔ´Ï´Ù. ¾Ïȣȭ´Â ±ÝÀ¶ ±â·Ï, ÀÇ·á µ¥ÀÌÅÍ, °í°´ Á¤º¸ µî ¹Î°¨ÇÑ Á¤º¸¸¦ º¸È£ÇÏ´Â °¡Àå È¿°úÀûÀÎ ¹æ¹ý Áß ÇϳªÀÌÁö¸¸, µ¥ÀÌÅÍ ¾Ïȣȭ ¹× º¹È£È­¿¡ »ç¿ëµÇ´Â ŰÀÇ º¸¾È¿¡ µû¶ó ´Þ¶óÁý´Ï´Ù. ÀÌ·¯ÇÑ Å°¸¦ HSM¿¡ º¸°üÇÔÀ¸·Î½á Á¶Á÷Àº ±ÇÇÑÀÌ ºÎ¿©µÈ ´ã´çÀÚ³ª ½Ã½ºÅÛ¸¸ Ű¿¡ Á¢±ÙÇÏ¿© »ç¿ëÇÒ ¼ö ÀÖµµ·Ï ÇÏ¿© ŰÀÇ µµ³­À̳ª ¾Ç¿ëÀ» ¹æÁöÇÒ ¼ö ÀÖ½À´Ï´Ù.

HSMÀº ¿Â¶óÀÎ °Å·¡, ¼ÒÇÁÆ®¿þ¾î °³¹ß, ½Å¿ø È®ÀÎ µî¿¡ ³Î¸® »ç¿ëµÇ´Â µðÁöÅÐ ¼­¸íÀÇ ¹«°á¼º°ú ÁøÀ§¼ºÀ» º¸ÀåÇÏ´Â µ¥¿¡µµ ÇʼöÀûÀÔ´Ï´Ù. µðÁöÅÐ ¼­¸íÀº ¹ß½ÅÀÚÀÇ ½Å¿øÀ» È®ÀÎÇÏ°í ¸Þ½ÃÁö³ª ¹®¼­°¡ º¯Á¶µÇÁö ¾Ê¾ÒÀ½À» º¸ÀåÇϱâ À§ÇØ ¾Ïȣȭ Ű¿¡ ÀÇÁ¸ÇÕ´Ï´Ù. Á¶Á÷Àº ¼­¸í ۸¦ HSM¿¡ ÀúÀåÇÔÀ¸·Î½á ¼­¸í ÇÁ·Î¼¼½ºÀÇ º¸¾ÈÀ» º¸ÀåÇÏ°í ºÎÁ¤À̳ª º¯Á¶¸¦ ¹æÁöÇÒ ¼ö ÀÖ½À´Ï´Ù. ¿¹¸¦ µé¾î, ±ÝÀ¶ ¼­ºñ½º¿¡¼­ µðÁöÅÐ ¼­¸íÀº °Å·¡ ÀÎÁõ ¹× ½ÂÀο¡ »ç¿ëµÇ¸ç, HSMÀÌ Á¦°øÇÏ´Â º¸¾ÈÀ¸·Î ÀÎÇØ ÀÌ·¯ÇÑ °Å·¡°¡ À§Çè¿¡ ³ëÃâµÇÁö ¾Ê½À´Ï´Ù.

±ÔÁ¦ ÄÄÇöóÀ̾𽺠¿ª½Ã HSMÀÌ Áß½ÉÀûÀÎ ¿ªÇÒÀ» ÇÏ´Â Áß¿äÇÑ ºÐ¾ßÀÔ´Ï´Ù. ¸¹Àº »ê¾÷, ƯÈ÷ ±ÝÀ¶, ÀÇ·á, Á¤ºÎ ±â°ü¿¡¼­´Â GDPR, PCI DSS, HIPAA¿Í °°Àº ¾ö°ÝÇÑ µ¥ÀÌÅÍ º¸È£ ±ÔÁ¦°¡ Àû¿ëµÇ¾î °­·ÂÇÑ ¾Ïȣȭ ¹× Ű °ü¸® °üÇàÀ» ¿ä±¸Çϰí ÀÖÀ¸¸ç, HSMÀº ¾Ïȣȭ ÀÛ¾÷ÀÇ ½ÇÇà°ú ¾Ïȣȭ Ű °ü¸®¿¡ ¾ÈÀüÇÑ È¯°æÀ» Á¦°øÇÔÀ¸·Î½á ÀÌ·¯ÇÑ ±ÔÁ¦ ¿ä°ÇÀ» ÃæÁ·ÇÕ´Ï´Ù. ¶ÇÇÑ, ¸¹Àº HSMÀº ¸¹Àº ±¹Á¦ µ¥ÀÌÅÍ º¸È£ ±ÔÁ¤ Áؼö¿¡ ÇÊ¿äÇÑ FIPS 140-2 Level 3 ¶Ç´Â 4¿Í °°ÀÌ ¼¼°èÀûÀ¸·Î ÀÎÁ¤¹Þ´Â º¸¾È Ç¥ÁØÀ» ÃæÁ·ÇÏ´Â °ÍÀ¸·Î ÀÎÁõµÇ¾ú½À´Ï´Ù. µû¶ó¼­ HSMÀº ¹ý·ü ¹× »ê¾÷º° º¸¾È Àǹ«¸¦ ÁؼöÇϰí ÀÖÀ½À» Áõ¸íÇØ¾ß ÇÏ´Â Á¶Á÷¿¡ ÇʼöÀûÀÎ ¿ä¼Ò·Î ÀÚ¸® Àâ°í ÀÖ½À´Ï´Ù.

¶ÇÇÑ HSMÀº ³»ºÎ À§Çù ¹× ±â¹Ð µ¥ÀÌÅÍ¿¡ ´ëÇÑ ¹«´Ü ¾×¼¼½ºÀÇ À§ÇèÀ» ÁÙÀÔ´Ï´Ù. ±âÁ¸ÀÇ ¼ÒÇÁÆ®¿þ¾î ±â¹Ý ¾Ïȣȭ ¼Ö·ç¼ÇÀº ¾Ïȣȭ ۰¡ ¼ÒÇÁÆ®¿þ¾î¿¡ ÀúÀåµÇ±â ¶§¹®¿¡ µµ³­À̳ª º¯Á¶ÀÇ ¿µÇâÀ» ¹Þ±â ½±½À´Ï´Ù. ±×·¯³ª HSMÀº ŰÀÇ º¸°ü ¹× °ü¸®¸¦ À§ÇØ ¹°¸®ÀûÀ¸·Î ¾ÈÀüÇÑ Àü¿ë ȯ°æÀ» Á¦°øÇÏ¿© ½Å·ÚÇÒ ¼ö ÀÖ´Â ½Ã½ºÅÛ°ú °³Àθ¸ÀÌ ¾Ïȣȭ ÀÛ¾÷¿¡ Á¢±ÙÇÒ ¼ö ÀÖµµ·Ï ÇÕ´Ï´Ù. ÀÌ·¸°Ô ´Ù¸¥ ½Ã½ºÅÛÀ¸·ÎºÎÅÍ °Ý¸®µÊÀ¸·Î½á ¿ÜºÎ ÇØÄ¿¿Í ³»ºÎ À§Çù¿¡ ´ëÇÑ º¸È£°¡ ´õ¿í °­È­µÇ¸ç, HSMÀº ½Å·Ú°¡ °¡Àå Áß¿äÇÑ È¯°æ¿¡¼­ µ¥ÀÌÅ͸¦ º¸È£ÇÏ´Â Áß¿äÇÑ µµ±¸°¡ µË´Ï´Ù.

Çϵå¿þ¾î º¸¾È ¸ðµâ(HSM) ½ÃÀåÀÇ ¼ºÀåÀ» ÃËÁøÇÏ´Â ¿äÀÎÀº ¹«¾ùÀΰ¡?

»çÀ̹ö °ø°Ý ºóµµ Áõ°¡, µðÁöÅÐ °Å·¡ Áõ°¡, µ¥ÀÌÅÍ º¸È£ ±ÔÁ¦ °­È­, Ŭ¶ó¿ìµå ¼­ºñ½º äÅà Ȯ´ë µî ¸î °¡Áö Áß¿äÇÑ ¿äÀÎÀÌ Çϵå¿þ¾î º¸¾È ¸ðµâ(HSM) ½ÃÀåÀÇ ±Þ°ÝÇÑ ¼ºÀåÀ» ÁÖµµÇϰí ÀÖ½À´Ï´Ù. ¿ì¼±, µ¥ÀÌÅÍ À¯Ãâ, ·£¼¶¿þ¾î, ÇÇ½Ì °ø°Ý°ú °°Àº »çÀ̹ö °ø°ÝÀÌ Áõ°¡ÇÔ¿¡ µû¶ó ±â¾÷µéÀº °­·ÂÇÑ ¾Ïȣȭ º¸¾È ´ëÃ¥ÀÇ Çʿ伺À» ´õ¿í °­ÇÏ°Ô ÀνÄÇÏ°Ô µÇ¾ú½À´Ï´Ù. °ø°ÝÀÚÀÇ ¼ö¹ýÀÌ ±³¹¦ÇØÁü¿¡ µû¶ó ±â¾÷µéÀº HSMÀ» ÀÌ¿ëÇÏ¿© ¾Ïȣȭ Ű¿Í ¾Ïȣȭ 󸮸¦ ¹«´Ü ¾×¼¼½º·ÎºÎÅÍ º¸È£Çϰí, ³×Æ®¿öÅ©°¡ Ä§ÇØµÇ´õ¶óµµ µ¥ÀÌÅÍÀÇ ¾ÈÀüÀ» º¸ÀåÇϱâ À§ÇØ HSMÀ» Ȱ¿ëÇϰí ÀÖ½À´Ï´Ù.

ƯÈ÷ ±ÝÀ¶ ¹× E-CommerceÀÇ µðÁöÅÐ °Å·¡·® Áõ°¡µµ HSM ½ÃÀå ¼ºÀå¿¡ ±â¿©ÇÏ´Â ÁÖ¿ä ¿äÀÎÀÔ´Ï´Ù. ±ÝÀ¶ °Å·¡¿Í °áÁ¦ÀÇ ¿Â¶óÀÎÈ­°¡ ÁøÇàµÇ¸é¼­ ¾ÈÀüÇÑ ½Ç½Ã°£ ¾Ïȣȭ¿Í ÀÎÁõÀÇ Çʿ伺ÀÌ ±× ¾î´À ¶§º¸´Ù ³ô¾ÆÁö°í ÀÖÀ¸¸ç, HSMÀº ½Å¿ëÄ«µå Á¤º¸, ÀºÇà °èÁ Á¤º¸ µî ¹Î°¨ÇÑ µ¥ÀÌÅͰ¡ Àü¼Û Áß¿¡ ¾ÏȣȭµÇ¾î º¸È£µÇµµ·Ï º¸ÀåÇÔÀ¸·Î½á ÀÌ·¯ÇÑ °Å·¡ÀÇ ¾ÈÀüÀ» º¸ÀåÇÏ´Â µ¥ ÇʼöÀûÀÔ´Ï´Ù. Æ®·£Àè¼ÇÀÇ º¸¾ÈÀ» º¸ÀåÇϱâ À§ÇØ ÇʼöÀûÀÔ´Ï´Ù. ¼ÒºñÀÚµéÀÌ µðÁöÅÐ ¹ðÅ·, E-Commerce, ¸ð¹ÙÀÏ °áÁ¦¸¦ °è¼Ó äÅÃÇÔ¿¡ µû¶ó HSM¿¡ ´ëÇÑ ¼ö¿äµµ ÇÔ²² Áõ°¡ÇÒ °ÍÀ¸·Î ¿¹»óµË´Ï´Ù.

À¯·´ÀÇ GDPR, °áÁ¦ ¾÷°èÀÇ PCI DSS, ÀÇ·á°èÀÇ HIPAA µî ¾ö°ÝÇÑ µ¥ÀÌÅÍ º¸È£ ±ÔÁ¤µµ HSMÀÇ µµÀÔÀ» ÃËÁøÇϰí ÀÖ½À´Ï´Ù. HSMÀº ±â¹Ð µ¥ÀÌÅ͸¦ º¸È£Çϰí ÄÄÇöóÀ̾𽺸¦ ÁؼöÇϱâ À§ÇØ °­·ÂÇÑ ¾Ïȣȭ ¹× Ű °ü¸®¸¦ ±¸ÇöÇϵµ·Ï ¿ä±¸Çϰí ÀÖÀ¸¸ç, HSMÀº ÀÌ·¯ÇÑ ±ÔÁ¦ ¿ä°ÇÀ» ÃæÁ·ÇÏ´Â µ¥ ÇÊ¿äÇÑ º¸¾È ÀÎÇÁ¶ó¸¦ Á¦°øÇϰí, ¾Ïȣȭ ¹× °¨»ç ±â´ÉÀ» Á¦°øÇÏ¿© Á¶Á÷ÀÌ µ¥ÀÌÅÍ º¸È£¹ýÀ» ÁؼöÇϰí ÀÖÀ½À» ÀÔÁõÇÒ ¼ö ÀÖµµ·Ï µ½½À´Ï´Ù. µ¥ÀÌÅÍ º¸È£¹ý Áؼö¸¦ ÀÔÁõÇÒ ¼ö ÀÖµµ·Ï µ½½À´Ï´Ù. Àü ¼¼°èÀûÀ¸·Î ÀÌ·¯ÇÑ ±ÔÁ¦°¡ °­È­µÊ¿¡ µû¶ó ±â¾÷µéÀº ¹ýÀû ó¹úÀ» ÇÇÇÏ°í ÆòÆÇÀ» º¸È£Çϱâ À§ÇØ HSM ±â¼ú¿¡ ÅõÀÚÇϰí ÀÖ½À´Ï´Ù.

Ŭ¶ó¿ìµå ¼­ºñ½º µµÀÔ È®´ëµµ HSM ½ÃÀå ¼ºÀåÀÇ ÁÖ¿ä ÃËÁø¿äÀÎ Áß ÇϳªÀÔ´Ï´Ù. Ŭ¶ó¿ìµå·Î ¾÷¹«¸¦ ÀüȯÇÏ´Â ±â¾÷ÀÌ ´Ã¾î³²¿¡ µû¶ó Ŭ¶ó¿ìµå¿¡ ÀúÀåµÇ°Å³ª 󸮵Ǵ ¹Î°¨ÇÑ µ¥ÀÌÅ͸¦ ÀûÀýÈ÷ º¸È£ÇØ¾ß ÇÒ Çʿ伺ÀÌ Ä¿Áö°í ÀÖ½À´Ï´Ù. Ŭ¶ó¿ìµå ±â¹Ý HSM(HSM as a Service)À» ÅëÇØ ±â¾÷Àº ¹°¸®Àû Çϵå¿þ¾î¸¦ Á÷Á¢ À¯Áö °ü¸®ÇÏÁö ¾Ê°íµµ HSMÀÇ ÀÌÁ¡À» Ȱ¿ëÇÒ ¼ö ÀÖ½À´Ï´Ù. ÀÌ·¯ÇÑ ¼­ºñ½º´Â ±âÁ¸ ¿ÂÇÁ·¹¹Ì½º HSM°ú µ¿ÀÏÇÑ ¼öÁØÀÇ ¾Ïȣȭ º¸¾ÈÀ» Á¦°øÇϸ鼭 À¯¿¬¼º, È®À强, »ç¿ë ÆíÀǼºÀ» Á¦°øÇÕ´Ï´Ù. Ŭ¶ó¿ìµå¿Í ¿ÂÇÁ·¹¹Ì½º ½Ã½ºÅÛ¿¡¼­ µ¥ÀÌÅ͸¦ °ü¸®ÇÏ´Â ÇÏÀ̺긮µå Ŭ¶ó¿ìµå ȯ°æÀÇ ºÎ»óÀ¸·Î ÀÎÇØ ´Ù¾çÇÑ ÀÎÇÁ¶ó¿Í ¿øÈ°ÇÏ°Ô ÅëÇÕÇÒ ¼ö ÀÖ´Â HSM¿¡ ´ëÇÑ ¼ö¿ä°¡ ´õ¿í Áõ°¡Çϰí ÀÖ½À´Ï´Ù.

¶ÇÇÑ, µðÁöÅÐ ID °ü¸®, ½º¸¶Æ® ½ÃƼ, IoT µð¹ÙÀ̽ºÀÇ È®´ë°¡ HSM ½ÃÀåÀÇ ¼ºÀå¿¡ ±â¿©Çϰí ÀÖ½À´Ï´Ù. ´õ ¸¹Àº ÀåÄ¡¿Í ½Ã½ºÅÛÀÌ ¿¬°áµÊ¿¡ µû¶ó Åë½Å ä³Î, µðÁöÅÐ ID ¹× µ¥ÀÌÅÍ º¸¾ÈÀ» º¸ÀåÇÏ´Â °ÍÀÌ Á¡Á¡ ´õ Áß¿äÇØÁö°í ÀÖÀ¸¸ç, HSMÀº ¾Ïȣȭ Ű °ü¸® ¹× ÀåÄ¡ ÀÎÁõÀ» ÅëÇØ ÀÌ·¯ÇÑ »óÈ£ ÀÛ¿ëÀ» º¸È£Çϰí Çã°¡µÈ »ç¿ëÀÚ ¹× ½Ã½ºÅÛ¸¸ Áß¿äÇÑ ÀÎÇÁ¶ó ¹× µ¥ÀÌÅÍ¿¡ ¾×¼¼½º ÇÒ ¼ö ÀÖµµ·Ï ÇÏ´Â µ¥ »ç¿ëµË´Ï´Ù. IoT¿Í µðÁöÅÐ ID ¼Ö·ç¼ÇÀÌ °è¼Ó ¹ßÀüÇÔ¿¡ µû¶ó ¾ÈÀüÇÑ Å° °ü¸®ÀÇ Çʿ伺ÀÌ HSM¿¡ ´ëÇÑ ¼ö¿ä¸¦ ´õ¿í Áõ°¡½Ãų °ÍÀ¸·Î º¸ÀÔ´Ï´Ù.

°á·ÐÀûÀ¸·Î, Çϵå¿þ¾î º¸¾È ¸ðµâ(HSM) ½ÃÀåÀÇ ¼ºÀåÀº »çÀ̹ö °ø°ÝÀÇ À§Çù Áõ°¡, µðÁöÅÐ °Å·¡ÀÇ Áõ°¡, ±ÔÁ¦ ¿ä°Ç, Ŭ¶ó¿ìµå ¼­ºñ½º äÅÃÀ¸·Î ÀÎÇØ ¹ß»ýÇÒ ¼ö ÀÖ½À´Ï´Ù. Á¶Á÷ÀÌ ¾Ïȣȭ ÀÛ¾÷°ú ±â¹Ð µ¥ÀÌÅÍÀÇ º¸¾ÈÀ» ¿ì¼±½ÃÇÏ´Â °¡¿îµ¥, HSMÀº ÄÄÇöóÀ̾𽺸¦ º¸ÀåÇϰí, ¹«´Ü ¾×¼¼½º¸¦ ¹æÁöÇϸç, ¿¬°á¼ºÀÌ ³ô¾ÆÁö´Â ¼¼»ó¿¡¼­ µðÁöÅÐ Åë½ÅÀ» º¸È£ÇÏ´Â Áß¿äÇÑ µµ±¸°¡ µÇ°í ÀÖ½À´Ï´Ù.

ºÎ¹®

À¯Çü(LAN ±â¹Ý/³×Æ®¿öÅ© ¿¬°á, USB ±â¹Ý, PCIe ±â¹Ý), ¹èÆ÷(¿ÂÇÁ·¹¹Ì½º, Ŭ¶ó¿ìµå ±â¹Ý), ¿ëµµ(°áÁ¦ ó¸®, ÄÚµå ¹× ¹®¼­ ¼­¸í, ÀÎÁõ, ¾ÖÇø®ÄÉÀÌ¼Ç ·¹º§ ¾Ïȣȭ, µ¥ÀÌÅͺ£À̽º ¾Ïȣȭ, ±âŸ ¿ëµµ), ÃÖÁ¾ ¿ëµµ(BFSI, ¼ÒºñÀç ¹× ¼Ò¸Å, Ç×°ø¿ìÁÖ ¹× ±¹¹æ, ÀÇ·á ¹× »ý¸í°úÇÐ, °ø°øºÎ¹®/Á¤ºÎ±â°ü, ¿¡³ÊÁö ¹× Àü·Â, ±âŸ ÃÖÁ¾ ¿ëµµ)

Á¶»ç ´ë»ó ±â¾÷ »ç·Ê(ÁÖ¸ñ 42°³»ç)

¸ñÂ÷

Á¦1Àå Á¶»ç ¹æ¹ý

Á¦2Àå ÁÖ¿ä ¿ä¾à

Á¦3Àå ½ÃÀå ºÐ¼®

Á¦4Àå °æÀï

ksm
¿µ¹® ¸ñÂ÷

¿µ¹®¸ñÂ÷

Global Hardware Security Modules Market to Reach US$3.6 Billion by 2030

The global market for Hardware Security Modules estimated at US$2.0 Billion in the year 2024, is expected to reach US$3.6 Billion by 2030, growing at a CAGR of 10.3% over the analysis period 2024-2030. LAN-Based / Network-attached Hardware Security Modules, one of the segments analyzed in the report, is expected to record a 10.1% CAGR and reach US$1.5 Billion by the end of the analysis period. Growth in the USB-based Hardware Security Modules segment is estimated at 11.4% CAGR over the analysis period.

The U.S. Market is Estimated at US$565.8 Million While China is Forecast to Grow at 9.5% CAGR

The Hardware Security Modules market in the U.S. is estimated at US$565.8 Million in the year 2024. China, the world's second largest economy, is forecast to reach a projected market size of US$543.4 Million by the year 2030 trailing a CAGR of 9.5% over the analysis period 2024-2030. Among the other noteworthy geographic markets are Japan and Canada, each forecast to grow at a CAGR of 9.3% and 8.5% respectively over the analysis period. Within Europe, Germany is forecast to grow at approximately 8.2% CAGR.

Global Hardware Security Modules Market - Key Trends and Drivers Summarized

Why Are Hardware Security Modules (HSM) Becoming Essential for Protecting Sensitive Data and Ensuring Secure Transactions?

Hardware Security Modules (HSMs) have become essential in safeguarding sensitive data and ensuring secure transactions across industries. But why are HSMs so critical today? In an era where data breaches, cyberattacks, and digital fraud are increasing at an alarming rate, organizations require robust security solutions that protect their most valuable assets—encryption keys, digital certificates, and sensitive cryptographic operations. HSMs are dedicated hardware devices designed to generate, store, and manage these critical cryptographic keys, ensuring that they are protected from unauthorized access, tampering, or misuse.

HSMs are widely used in industries such as finance, healthcare, government, and e-commerce, where securing digital transactions, communications, and sensitive information is paramount. Whether it's securing financial transactions, protecting customer data, or ensuring the integrity of identity verification systems, HSMs provide an unparalleled level of security, offering both physical and logical protection. Their ability to perform cryptographic operations within a secure environment makes them indispensable for organizations aiming to comply with strict data protection regulations and maintain trust in their digital operations.

How Are Technological Advancements Improving the Security and Efficiency of Hardware Security Modules?

Technological advancements are significantly improving the security, efficiency, and versatility of Hardware Security Modules (HSMs), making them even more effective at safeguarding sensitive data and cryptographic operations. One of the key advancements in modern HSMs is the integration of more advanced encryption algorithms, such as elliptic curve cryptography (ECC), which provides stronger security with lower computational power. This improvement enables HSMs to perform encryption and decryption tasks more efficiently, ensuring fast and secure transactions without compromising on protection. Additionally, the growing use of quantum-resistant cryptography in HSMs prepares organizations for the eventual rise of quantum computing, which could potentially break traditional encryption methods.

HSMs are also benefiting from improvements in scalability and performance. Today’s HSMs can process millions of cryptographic transactions per second, making them suitable for high-volume environments such as banking networks, payment gateways, and cloud infrastructure. This scalability ensures that HSMs can meet the demands of large organizations that require constant, secure encryption and decryption of data in real time. Furthermore, the advent of cloud-based HSM solutions (HSM as a Service) allows organizations to access the security benefits of HSMs without needing to manage physical hardware on-site, making HSMs more accessible and flexible for businesses of all sizes.

Another major advancement is the increased focus on compliance and regulation. HSMs are designed to meet strict security standards, such as FIPS 140-2 and Common Criteria, which are required in industries like finance, defense, and government. Many modern HSMs come equipped with built-in audit capabilities that allow organizations to track and monitor cryptographic operations, ensuring compliance with industry regulations. This focus on transparency and accountability has made HSMs even more valuable in highly regulated sectors, where maintaining the integrity of sensitive data is critical.

In addition to stronger cryptographic algorithms and compliance features, the physical security of HSMs has also been enhanced. Modern HSMs are equipped with tamper-evident and tamper-resistant mechanisms that protect the device from physical attacks. If an attempt is made to open or alter the HSM, it automatically triggers a self-destruct mechanism, wiping all stored keys and rendering the device unusable. These physical protections ensure that even in the event of theft or unauthorized access, the sensitive data within the HSM remains secure.

Why Are Hardware Security Modules Critical for Data Encryption, Digital Signatures, and Regulatory Compliance?

Hardware Security Modules (HSMs) are critical for data encryption, digital signatures, and regulatory compliance because they provide the highest level of security for cryptographic key management and operations. One of the key reasons HSMs are so valuable is their ability to securely generate, store, and protect cryptographic keys used for data encryption. Encryption is one of the most effective ways to protect sensitive information—whether it's financial records, healthcare data, or customer details—but it relies on the security of the keys used to encrypt and decrypt the data. By storing these keys in an HSM, organizations can ensure that only authorized personnel or systems can access and use them, preventing key theft or misuse.

HSMs are also essential for ensuring the integrity and authenticity of digital signatures, which are widely used in online transactions, software development, and identity verification. Digital signatures rely on cryptographic keys to verify the sender's identity and ensure that the message or document has not been altered. By storing the signing keys within an HSM, organizations can ensure that the signature process is secure, preventing fraud and tampering. For instance, in financial services, digital signatures are used to authenticate and approve transactions, and the security provided by HSMs ensures that these transactions cannot be compromised.

Regulatory compliance is another critical area where HSMs play a central role. Many industries, particularly finance, healthcare, and government, are subject to strict data protection regulations, such as GDPR, PCI DSS, and HIPAA, which require robust encryption and key management practices. HSMs meet these regulatory requirements by providing a secure environment for performing cryptographic operations and managing encryption keys. Additionally, many HSMs are certified to meet globally recognized security standards, such as FIPS 140-2 Level 3 or 4, which is required for compliance with many international data protection regulations. This makes HSMs indispensable for organizations that need to demonstrate compliance with legal and industry-specific security mandates.

Furthermore, HSMs reduce the risk of insider threats and unauthorized access to sensitive data. In traditional software-based encryption solutions, the cryptographic keys are stored in software, which makes them vulnerable to theft or tampering. HSMs, however, provide a dedicated, physically secure environment for key storage and management, ensuring that only trusted systems and individuals can access the cryptographic operations. This isolation from other systems adds an extra layer of protection against both external hackers and internal threats, making HSMs a vital tool for securing data in environments where trust is paramount.

What Factors Are Driving the Growth of the Hardware Security Module (HSM) Market?

Several key factors are driving the rapid growth of the Hardware Security Module (HSM) market, including the increasing frequency of cyberattacks, the rise of digital transactions, stringent data protection regulations, and the growing adoption of cloud services. First and foremost, the rising prevalence of cyberattacks, such as data breaches, ransomware, and phishing attacks, has made organizations more aware of the need for strong cryptographic security measures. As attackers become more sophisticated in their methods, businesses are turning to HSMs to protect their encryption keys and cryptographic operations from unauthorized access, ensuring that even if a network is breached, the data remains secure.

The increasing volume of digital transactions, particularly in finance and e-commerce, is another major factor contributing to the growth of the HSM market. With more financial transactions and payments moving online, the need for secure, real-time encryption and authentication has never been greater. HSMs are essential for securing these transactions by ensuring that sensitive data, such as credit card details or banking credentials, is encrypted and protected during transmission. As consumers continue to embrace digital banking, e-commerce, and mobile payments, the demand for HSMs is expected to grow in parallel.

Stringent data protection regulations, such as GDPR in Europe, PCI DSS in the payment industry, and HIPAA in healthcare, are also driving the adoption of HSMs. These regulations require organizations to implement strong encryption and key management practices to protect sensitive data and ensure compliance. HSMs provide the necessary security infrastructure to meet these regulatory requirements, offering both encryption and audit capabilities that help organizations demonstrate compliance with data protection laws. The rise of these regulations worldwide is encouraging businesses to invest in HSM technology to avoid legal penalties and protect their reputation.

The growing adoption of cloud services is another key driver of HSM market growth. As more organizations move their operations to the cloud, there is a growing need to ensure that sensitive data stored or processed in the cloud is adequately protected. Cloud-based HSMs (HSM as a Service) allow businesses to access the benefits of HSMs without needing to maintain the physical hardware themselves. These services provide flexibility, scalability, and ease of use while offering the same level of cryptographic security as traditional, on-premises HSMs. The rise of hybrid cloud environments, where data is managed across both cloud and on-premises systems, is further driving demand for HSMs that can integrate seamlessly with different infrastructures.

Additionally, the expansion of digital identity management, smart cities, and IoT devices is contributing to the growth of the HSM market. As more devices and systems become connected, securing communication channels, digital identities, and data becomes increasingly important. HSMs are used to secure these interactions by managing encryption keys and authenticating devices, ensuring that only authorized users or systems can access critical infrastructure or data. As IoT and digital identity solutions continue to evolve, the need for secure key management will further boost the demand for HSMs.

In conclusion, the growth of the Hardware Security Module (HSM) market is driven by the increasing threat of cyberattacks, the rise of digital transactions, regulatory requirements, and the adoption of cloud services. As organizations prioritize the security of their cryptographic operations and sensitive data, HSMs are becoming a critical tool for ensuring compliance, preventing unauthorized access, and safeguarding digital communications in an increasingly connected world.

SCOPE OF STUDY:

The report analyzes the Hardware Security Modules market in terms of units by the following Segments, and Geographic Regions/Countries:

Segments:

Type (LAN-Based / Network-attached, USB-Based, PCIe-Based); Deployment (On-Premises, Cloud-Based); Application (Payment Processing, Code & Document Signing, Authentication, Application-Level Encryption, Database Encryption, Other Applications); End-Use (BFSI, Consumer Goods & Retail, Aerospace & Defense, Medical & Life Sciences, Public Sector / Government, Energy & Power, Other End-Uses)

Geographic Regions/Countries:

World; United States; Canada; Japan; China; Europe (France; Germany; Italy; United Kingdom; and Rest of Europe); Asia-Pacific; Rest of World.

Select Competitors (Total 42 Featured) -

TABLE OF CONTENTS

I. METHODOLOGY

II. EXECUTIVE SUMMARY

III. MARKET ANALYSIS

IV. COMPETITION

(ÁÖ)±Û·Î¹úÀÎÆ÷¸ÞÀÌ¼Ç 02-2025-2992 kr-info@giikorea.co.kr
¨Ï Copyright Global Information, Inc. All rights reserved.
PC¹öÀü º¸±â