. . "\uC2E0\uB8B0 \uC2E4\uD589 \uD658\uACBD"@ko . . . . . . . "\u53EF\u4FE1\u57F7\u884C\u74B0\u5883\uFF08trusted execution environment\uFF09\u7C21\u7A31TEE\uFF0C\u662F\u4E2D\u592E\u5904\u7406\u5668\u4E2D\u5B89\u5168\u7684\u5340\u57DF\uFF0C\u53EF\u4EE5\u4FDD\u8B49\u5176\u4E2D\u7684\u7A0B\u5F0F\u548C\u8CC7\u6599\u5728\u6A5F\u5BC6\u6027\u548C\u5B8C\u6574\u6027\u4E0A\u5F97\u5230\u4FDD\u8B77.\u3002TEE\u662F\u9694\u96E2\u7684\u57F7\u884C\u74B0\u5883\uFF0C\u53EF\u4EE5\u6709\u5B89\u5168\u7684\u6A5F\u80FD\uFF0C\u4F8B\u5982\u9694\u96E2\u57F7\u884C\u3001\u548CTEE\u4E00\u8D77\u57F7\u884C\u7684\u61C9\u7528\u7A0B\u5F0F\u5B8C\u6574\u6027\uFF0C\u4E5F\u5305\u62EC\u5176\u8CC7\u7522\u7684\u6A5F\u5BC6\u6027\u3002\u7528\u4E00\u822C\u7684\u8853\u8A9E\u4F86\u8AAA\uFF0CTEE\u63D0\u4F9B\u5B89\u5168\u6027\u66F4\u9AD8\u7684\u57F7\u884C\u7A7A\u9593\uFF0C\u7D66\u53EF\u4FE1\u8EDF\u9AD4\u57F7\u884C\uFF0C\u5176\u5B89\u5168\u6027\u6BD4\u4F5C\u696D\u7CFB\u7D71\uFF08OS )\u66F4\u5F37\uFF0C\u6A5F\u80FD\u6027\u6BD4\u5B89\u5168\u5143\u4EF6\uFF08secure element\uFF09\u66F4\u591A\u3002"@zh . . "Eine Trusted Execution Environment (TEE) stellt eine sichere bzw. vertrauensw\u00FCrdige Laufzeitumgebung f\u00FCr Applikationen zur Verf\u00FCgung. Dabei kann ein TEE isoliert auf einem separaten Prozessor, direkt auf dem Hauptprozessor(en) eines Computersystems oder aber in einem Die eines Multiprozessor-Systems bzw. eines Ein-Chip-Systems (SoC) existieren. Auf dem TEE k\u00F6nnen nur speziell daf\u00FCr freigeschaltete Applikationen ausgef\u00FChrt werden. Das TEE-Konzept verfeinert das Konzept des Trusted Computing. Ein oder mehrere vertrauensw\u00FCrdige Laufzeitumgebungen k\u00F6nnen parallel existieren, daneben k\u00F6nnen noch weitere unsichere oder ungesch\u00FCtzte Umgebungen existieren."@de . . . "Eine Trusted Execution Environment (TEE) stellt eine sichere bzw. vertrauensw\u00FCrdige Laufzeitumgebung f\u00FCr Applikationen zur Verf\u00FCgung. Dabei kann ein TEE isoliert auf einem separaten Prozessor, direkt auf dem Hauptprozessor(en) eines Computersystems oder aber in einem Die eines Multiprozessor-Systems bzw. eines Ein-Chip-Systems (SoC) existieren. Auf dem TEE k\u00F6nnen nur speziell daf\u00FCr freigeschaltete Applikationen ausgef\u00FChrt werden."@de . . . . . . "34954"^^ . . . "A trusted execution environment (TEE) is a secure area of a main processor. It guarantees code and data loaded inside to be protected with respect to confidentiality and integrity, Data integrity \u2014 prevents unauthorized entities from altering data when any entity outside the TEE processes data, Code integrity \u2014 the code in the TEE cannot be replaced or modified by unauthorized entities, which may also be the computer owner itself as in certain DRM schemes described in SGX. This is done by implementing unique, immutable, and confidential architectural security such as Intel Software Guard Extensions (Intel SGX) which offers hardware-based memory encryption that isolates specific application code and data in memory. Intel SGX allows user-level code to allocate private regions of memory, called enclaves, which are designed to be protected from processes running at higher privilege levels. A TEE as an isolated execution environment provides security features such as isolated execution, integrity of applications executing with the TEE, along with confidentiality of their assets. In general terms, the TEE offers an execution space that provides a higher level of security for trusted applications running on the device than a rich operating system (OS) and more functionality than a 'secure element' (SE)."@en . "1123030167"^^ . . . . . . . . . . . . "39802440"^^ . . . . "\u53EF\u4FE1\u57F7\u884C\u74B0\u5883"@zh . "\uC2E0\uB8B0 \uC2E4\uD589 \uD658\uACBD(Trusted execution environment, TEE)\uC740 \uBA54\uC778 \uD504\uB85C\uC138\uC11C\uC758 \uBCF4\uC548 \uC601\uC5ED\uC774\uB2E4. \uAE30\uBC00\uC131\uACFC \uBB34\uACB0\uC131 \uCE21\uBA74\uC5D0\uC11C \uB0B4\uBD80\uC5D0 \uB85C\uB4DC\uB418\uB294 \uCF54\uB4DC\uC640 \uB370\uC774\uD130\uAC00 \uBCF4\uD638\uB420 \uC218 \uC788\uB3C4\uB85D \uBCF4\uC7A5\uD55C\uB2E4. \uACA9\uB9AC\uB41C \uC2E4\uD589 \uD658\uACBD\uC73C\uB85C\uC11C TEE\uB294 \uACA9\uB9AC\uB41C \uC2E4\uD589, TEE\uB97C \uC0AC\uC6A9\uD558\uC5EC \uC2E4\uD589\uB418\uB294 \uC751\uC6A9 \uD504\uB85C\uADF8\uB7A8\uC758 \uBB34\uACB0\uC131, \uC790\uC0B0\uC758 \uAE30\uBC00\uC131 \uB4F1\uC758 \uBCF4\uC548 \uAE30\uB2A5\uC744 \uC81C\uACF5\uD55C\uB2E4. \uD06C\uAC8C \uBCF4\uBA74 TEE\uB294 \uB9AC\uCE58 \uC6B4\uC601 \uCCB4\uC81C(OS)\uBCF4\uB2E4\uB294 \uB354 \uB192\uC740 \uC218\uC900\uC758 \uBCF4\uC548\uC744, \uBCF4\uC548 \uC694\uC18C(secure element, SE)\uBCF4\uB2E4\uB294 \uB354 \uB9CE\uC740 \uAE30\uB2A5\uC744 \uC81C\uACF5\uD55C\uB2E4."@ko . . . . . . . . . . . . "Trusted Execution Environment"@de . . . . "Trusted execution environment"@en . "\uC2E0\uB8B0 \uC2E4\uD589 \uD658\uACBD(Trusted execution environment, TEE)\uC740 \uBA54\uC778 \uD504\uB85C\uC138\uC11C\uC758 \uBCF4\uC548 \uC601\uC5ED\uC774\uB2E4. \uAE30\uBC00\uC131\uACFC \uBB34\uACB0\uC131 \uCE21\uBA74\uC5D0\uC11C \uB0B4\uBD80\uC5D0 \uB85C\uB4DC\uB418\uB294 \uCF54\uB4DC\uC640 \uB370\uC774\uD130\uAC00 \uBCF4\uD638\uB420 \uC218 \uC788\uB3C4\uB85D \uBCF4\uC7A5\uD55C\uB2E4. \uACA9\uB9AC\uB41C \uC2E4\uD589 \uD658\uACBD\uC73C\uB85C\uC11C TEE\uB294 \uACA9\uB9AC\uB41C \uC2E4\uD589, TEE\uB97C \uC0AC\uC6A9\uD558\uC5EC \uC2E4\uD589\uB418\uB294 \uC751\uC6A9 \uD504\uB85C\uADF8\uB7A8\uC758 \uBB34\uACB0\uC131, \uC790\uC0B0\uC758 \uAE30\uBC00\uC131 \uB4F1\uC758 \uBCF4\uC548 \uAE30\uB2A5\uC744 \uC81C\uACF5\uD55C\uB2E4. \uD06C\uAC8C \uBCF4\uBA74 TEE\uB294 \uB9AC\uCE58 \uC6B4\uC601 \uCCB4\uC81C(OS)\uBCF4\uB2E4\uB294 \uB354 \uB192\uC740 \uC218\uC900\uC758 \uBCF4\uC548\uC744, \uBCF4\uC548 \uC694\uC18C(secure element, SE)\uBCF4\uB2E4\uB294 \uB354 \uB9CE\uC740 \uAE30\uB2A5\uC744 \uC81C\uACF5\uD55C\uB2E4."@ko . . . . . "A trusted execution environment (TEE) is a secure area of a main processor. It guarantees code and data loaded inside to be protected with respect to confidentiality and integrity, Data integrity \u2014 prevents unauthorized entities from altering data when any entity outside the TEE processes data, Code integrity \u2014 the code in the TEE cannot be replaced or modified by unauthorized entities, which may also be the computer owner itself as in certain DRM schemes described in SGX. This is done by implementing unique, immutable, and confidential architectural security such as Intel Software Guard Extensions (Intel SGX) which offers hardware-based memory encryption that isolates specific application code and data in memory. Intel SGX allows user-level code to allocate private regions of memory, call"@en . . . . . . . . . . . . . . . . . . . "\u53EF\u4FE1\u57F7\u884C\u74B0\u5883\uFF08trusted execution environment\uFF09\u7C21\u7A31TEE\uFF0C\u662F\u4E2D\u592E\u5904\u7406\u5668\u4E2D\u5B89\u5168\u7684\u5340\u57DF\uFF0C\u53EF\u4EE5\u4FDD\u8B49\u5176\u4E2D\u7684\u7A0B\u5F0F\u548C\u8CC7\u6599\u5728\u6A5F\u5BC6\u6027\u548C\u5B8C\u6574\u6027\u4E0A\u5F97\u5230\u4FDD\u8B77.\u3002TEE\u662F\u9694\u96E2\u7684\u57F7\u884C\u74B0\u5883\uFF0C\u53EF\u4EE5\u6709\u5B89\u5168\u7684\u6A5F\u80FD\uFF0C\u4F8B\u5982\u9694\u96E2\u57F7\u884C\u3001\u548CTEE\u4E00\u8D77\u57F7\u884C\u7684\u61C9\u7528\u7A0B\u5F0F\u5B8C\u6574\u6027\uFF0C\u4E5F\u5305\u62EC\u5176\u8CC7\u7522\u7684\u6A5F\u5BC6\u6027\u3002\u7528\u4E00\u822C\u7684\u8853\u8A9E\u4F86\u8AAA\uFF0CTEE\u63D0\u4F9B\u5B89\u5168\u6027\u66F4\u9AD8\u7684\u57F7\u884C\u7A7A\u9593\uFF0C\u7D66\u53EF\u4FE1\u8EDF\u9AD4\u57F7\u884C\uFF0C\u5176\u5B89\u5168\u6027\u6BD4\u4F5C\u696D\u7CFB\u7D71\uFF08OS )\u66F4\u5F37\uFF0C\u6A5F\u80FD\u6027\u6BD4\u5B89\u5168\u5143\u4EF6\uFF08secure element\uFF09\u66F4\u591A\u3002"@zh . . . . . . . .