VLSI Wiki
Contents:
  1. Hardware Security Modules (HSM)
    1. 1. Definition: What is Hardware Security Modules (HSM)?
    2. 2. Components and Operating Principles
      1. 2.1 (Optional) Subsections
    3. 3. Related Technologies and Comparison
    4. 4. References
    5. 5. One-line Summary

Hardware Security Modules (HSM)

1. Definition: What is Hardware Security Modules (HSM)?

Hardware Security Modules (HSM)๋Š” ์•”ํ˜ธํ™” ํ‚ค์™€ ๋””์ง€ํ„ธ ์ธ์ฆ์„œ๋ฅผ ์•ˆ์ „ํ•˜๊ฒŒ ์ƒ์„ฑ, ์ €์žฅ ๋ฐ ๊ด€๋ฆฌํ•˜๋Š” ๋ฌผ๋ฆฌ์  ์žฅ์น˜์ž…๋‹ˆ๋‹ค. HSM์€ ์ „์ž ์„œ๋ช…, ๋ฐ์ดํ„ฐ ์•”ํ˜ธํ™”, ๋ณตํ˜ธํ™”, ๊ทธ๋ฆฌ๊ณ  ํ‚ค ๊ด€๋ฆฌ์™€ ๊ฐ™์€ ๋‹ค์–‘ํ•œ ๋ณด์•ˆ ๊ธฐ๋Šฅ์„ ์ œ๊ณตํ•ฉ๋‹ˆ๋‹ค. HSM์˜ ์ฃผ๋œ ๋ชฉ์ ์€ ๋ฐ์ดํ„ฐ์˜ ๊ธฐ๋ฐ€์„ฑ๊ณผ ๋ฌด๊ฒฐ์„ฑ์„ ๋ณด์žฅํ•˜๊ณ , ์™ธ๋ถ€ ๊ณต๊ฒฉ์œผ๋กœ๋ถ€ํ„ฐ ์ค‘์š”ํ•œ ์ •๋ณด๋ฅผ ๋ณดํ˜ธํ•˜๋Š” ๊ฒƒ์ž…๋‹ˆ๋‹ค. HSM์€ ์ผ๋ฐ˜์ ์œผ๋กœ ๊ณ ์„ฑ๋Šฅ์˜ ์ „์ž ํšŒ๋กœ ์„ค๊ณ„ ๋ฐ VLSI ์‹œ์Šคํ…œ์— ํ†ตํ•ฉ๋˜์–ด ์žˆ์œผ๋ฉฐ, ์ด๋Ÿฌํ•œ ์žฅ์น˜๋Š” ๋Œ€๋Ÿ‰์˜ ๋ฐ์ดํ„ฐ๋ฅผ ์•ˆ์ „ํ•˜๊ฒŒ ์ฒ˜๋ฆฌํ•˜๊ณ  ์ €์žฅํ•  ์ˆ˜ ์žˆ๋„๋ก ์„ค๊ณ„๋˜์—ˆ์Šต๋‹ˆ๋‹ค.

HSM์˜ ์ค‘์š”์„ฑ์€ ๋ฐ์ดํ„ฐ ๋ณด์•ˆ์ด ์ ์  ๋” ์ค‘์š”ํ•ด์ง€๋Š” ํ˜„๋Œ€ ์‚ฌํšŒ์—์„œ ๋”์šฑ ๋ถ€๊ฐ๋˜๊ณ  ์žˆ์Šต๋‹ˆ๋‹ค. ๊ธฐ์—…๊ณผ ๊ธฐ๊ด€๋“ค์€ ๊ณ ๊ฐ์˜ ๊ฐœ์ธ ์ •๋ณด๋ฅผ ๋ณดํ˜ธํ•˜๊ธฐ ์œ„ํ•ด HSM์„ ๋„์ž…ํ•˜๊ณ  ์žˆ์œผ๋ฉฐ, ์ด๋Š” ๋ฒ•์  ์š”๊ตฌ์‚ฌํ•ญ ๋ฐ ๊ทœ์ œ ์ค€์ˆ˜๋ฅผ ์œ„ํ•œ ํ•„์ˆ˜ ์š”์†Œ๋กœ ์ž๋ฆฌ์žก๊ณ  ์žˆ์Šต๋‹ˆ๋‹ค. HSM์€ ํŠนํžˆ ๊ธˆ์œต ์„œ๋น„์Šค, ์ •๋ถ€ ๊ธฐ๊ด€, ํด๋ผ์šฐ๋“œ ์„œ๋น„์Šค ์ œ๊ณต์—…์ฒด ๋“ฑ์—์„œ ๋„๋ฆฌ ์‚ฌ์šฉ๋ฉ๋‹ˆ๋‹ค. HSM์˜ ๊ธฐ์ˆ ์  ํŠน์ง•์œผ๋กœ๋Š” ๋†’์€ ์„ฑ๋Šฅ, ๋ณด์•ˆ์„ฑ, ๊ทธ๋ฆฌ๊ณ  ์‚ฌ์šฉ์˜ ํŽธ๋ฆฌํ•จ์ด ์žˆ์Šต๋‹ˆ๋‹ค. HSM์€ ์ผ๋ฐ˜์ ์œผ๋กœ ์ „์šฉ ํ•˜๋“œ์›จ์–ด๋กœ ๊ตฌ์„ฑ๋˜์–ด ์žˆ์œผ๋ฉฐ, ์ด๋Š” ์†Œํ”„ํŠธ์›จ์–ด ๊ธฐ๋ฐ˜์˜ ๋ณด์•ˆ ์†”๋ฃจ์…˜๋ณด๋‹ค ํ›จ์”ฌ ๋” ๊ฐ•๋ ฅํ•œ ๋ณดํ˜ธ๋ฅผ ์ œ๊ณตํ•ฉ๋‹ˆ๋‹ค.

HSM์„ ์‚ฌ์šฉํ•  ๋•Œ๋Š” ํŠน์ • ์š”๊ตฌ ์‚ฌํ•ญ์— ๋งž๋Š” HSM์„ ์„ ํƒํ•˜๋Š” ๊ฒƒ์ด ์ค‘์š”ํ•ฉ๋‹ˆ๋‹ค. ์˜ˆ๋ฅผ ๋“ค์–ด, ํŠน์ • ์•Œ๊ณ ๋ฆฌ์ฆ˜ ์ง€์›, ์ฒ˜๋ฆฌ ์†๋„, ๋ฌผ๋ฆฌ์  ๋ณด์•ˆ ์ˆ˜์ค€, ๊ทธ๋ฆฌ๊ณ  ์ธ์ฆ ๊ธฐ์ค€ ๋“ฑ์„ ๊ณ ๋ คํ•ด์•ผ ํ•ฉ๋‹ˆ๋‹ค. HSM์€ ๋‹ค์–‘ํ•œ ์‚ฐ์—… ๋ถ„์•ผ์—์„œ ์ค‘์š”ํ•œ ์—ญํ• ์„ ํ•˜๋ฉฐ, ๋ณด์•ˆ์ด ์ค‘์š”ํ•œ ๋ชจ๋“  ์‹œ์Šคํ…œ์—์„œ ํ•„์ˆ˜์ ์ธ ๊ตฌ์„ฑ ์š”์†Œ๋กœ ๊ฐ„์ฃผ๋ฉ๋‹ˆ๋‹ค.

2. Components and Operating Principles

Hardware Security Modules (HSM)์˜ ๊ตฌ์„ฑ ์š”์†Œ์™€ ์ž‘๋™ ์›๋ฆฌ๋Š” ๋ณต์žกํ•˜์ง€๋งŒ, ํšจ๊ณผ์ ์ธ ๋ณด์•ˆ์„ ์ œ๊ณตํ•˜๊ธฐ ์œ„ํ•ด ํ•„์ˆ˜์ ์ธ ์š”์†Œ๋“ค๋กœ ๊ตฌ์„ฑ๋˜์–ด ์žˆ์Šต๋‹ˆ๋‹ค. HSM์˜ ์ฃผ์š” ๊ตฌ์„ฑ ์š”์†Œ๋Š” ๋‹ค์Œ๊ณผ ๊ฐ™์Šต๋‹ˆ๋‹ค:

  1. Cryptographic Processor: HSM์˜ ํ•ต์‹ฌ ๋ถ€๋ถ„์œผ๋กœ, ์•”ํ˜ธํ™” ๋ฐ ๋ณตํ˜ธํ™” ์ž‘์—…์„ ์ˆ˜ํ–‰ํ•ฉ๋‹ˆ๋‹ค. ์ด ํ”„๋กœ์„ธ์„œ๋Š” ๊ณ ์„ฑ๋Šฅ์˜ ์ „์ž ํšŒ๋กœ ์„ค๊ณ„๋กœ ์ œ์ž‘๋˜์–ด ์žˆ์œผ๋ฉฐ, ๋‹ค์–‘ํ•œ ์•”ํ˜ธํ™” ์•Œ๊ณ ๋ฆฌ์ฆ˜์„ ์ง€์›ํ•ฉ๋‹ˆ๋‹ค.

  2. Key Storage: HSM์€ ์•ˆ์ „ํ•œ ํ‚ค ์ €์žฅ์†Œ๋ฅผ ์ œ๊ณตํ•˜๋ฉฐ, ์—ฌ๊ธฐ์—๋Š” ๋Œ€์นญ ํ‚ค, ๋น„๋Œ€์นญ ํ‚ค, ๊ทธ๋ฆฌ๊ณ  ํ•ด์‹œ ํ‚ค๊ฐ€ ํฌํ•จ๋ฉ๋‹ˆ๋‹ค. ์ด ์ €์žฅ์†Œ๋Š” ๋ฌผ๋ฆฌ์  ๋ฐ ๋…ผ๋ฆฌ์  ๋ณด์•ˆ์ด ๊ฐ•ํ™”๋˜์–ด ์žˆ์–ด ์™ธ๋ถ€ ๊ณต๊ฒฉ์œผ๋กœ๋ถ€ํ„ฐ ๋ณดํ˜ธ๋ฉ๋‹ˆ๋‹ค.

  3. Secure Operating System: HSM์€ ์ „์šฉ ์šด์˜ ์ฒด์ œ๋ฅผ ์‚ฌ์šฉํ•˜์—ฌ ๋ณด์•ˆ์„ฑ์„ ๋†’์ž…๋‹ˆ๋‹ค. ์ด ์šด์˜ ์ฒด์ œ๋Š” HSM์˜ ๋ชจ๋“  ๊ธฐ๋Šฅ์„ ๊ด€๋ฆฌํ•˜๋ฉฐ, ์™ธ๋ถ€ ๊ณต๊ฒฉ์œผ๋กœ๋ถ€ํ„ฐ ์•ˆ์ „ํ•˜๋„๋ก ์„ค๊ณ„๋˜์—ˆ์Šต๋‹ˆ๋‹ค.

  4. User Interface: HSM์€ ์‚ฌ์šฉ์ž์™€ ์ƒํ˜ธ์ž‘์šฉํ•  ์ˆ˜ ์žˆ๋Š” ์ธํ„ฐํŽ˜์ด์Šค๋ฅผ ์ œ๊ณตํ•ฉ๋‹ˆ๋‹ค. ์ด ์ธํ„ฐํŽ˜์ด์Šค๋Š” ๋ณด์•ˆ ํ”„๋กœํ† ์ฝœ์„ ํ†ตํ•ด ์•ˆ์ „ํ•˜๊ฒŒ ๋ฐ์ดํ„ฐ๋ฅผ ์ „์†กํ•˜๊ณ , ์‚ฌ์šฉ์ž ์ธ์ฆ์„ ์ˆ˜ํ–‰ํ•ฉ๋‹ˆ๋‹ค.

HSM์˜ ์ž‘๋™ ์›๋ฆฌ๋Š” ๋‹ค์Œ๊ณผ ๊ฐ™์€ ์ฃผ์š” ๋‹จ๊ณ„๋กœ ๋‚˜๋ˆŒ ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค:

  • Key Generation: HSM์€ ์•ˆ์ „ํ•œ ํ™˜๊ฒฝ์—์„œ ์•”ํ˜ธํ™” ํ‚ค๋ฅผ ์ƒ์„ฑํ•ฉ๋‹ˆ๋‹ค. ์ด ๊ณผ์ •์€ ๊ณ ์œ ํ•œ ๋‚œ์ˆ˜ ์ƒ์„ฑ๊ธฐ๋ฅผ ์‚ฌ์šฉํ•˜์—ฌ ํ‚ค์˜ ์˜ˆ์ธก ๊ฐ€๋Šฅ์„ฑ์„ ์ตœ์†Œํ™”ํ•ฉ๋‹ˆ๋‹ค.

  • Key Storage and Management: ์ƒ์„ฑ๋œ ํ‚ค๋Š” HSM์˜ ์•ˆ์ „ํ•œ ์ €์žฅ์†Œ์— ์ €์žฅ๋˜๋ฉฐ, ํ‚ค์˜ ์‚ฌ์šฉ ๋ฐ ์ˆ˜๋ช… ์ฃผ๊ธฐ๋ฅผ ๊ด€๋ฆฌํ•˜๋Š” ๊ธฐ๋Šฅ์ด ํฌํ•จ๋ฉ๋‹ˆ๋‹ค.

  • Cryptographic Operations: HSM์€ ์•”ํ˜ธํ™”, ๋ณตํ˜ธํ™”, ๋””์ง€ํ„ธ ์„œ๋ช… ์ƒ์„ฑ ๋ฐ ๊ฒ€์ฆ ๋“ฑ์˜ ์ž‘์—…์„ ์ˆ˜ํ–‰ํ•ฉ๋‹ˆ๋‹ค. ์ด๋Ÿฌํ•œ ์ž‘์—…์€ HSM ๋‚ด๋ถ€์—์„œ ์ด๋ฃจ์–ด์ง€๋ฉฐ, ์™ธ๋ถ€์— ๋…ธ์ถœ๋˜์ง€ ์•Š์Šต๋‹ˆ๋‹ค.

  • Auditing and Logging: HSM์€ ๋ชจ๋“  ์ž‘์—…์„ ๊ธฐ๋กํ•˜์—ฌ ๋ณด์•ˆ ๊ฐ์‚ฌ ๋ฐ ์ถ”์ ์ด ๊ฐ€๋Šฅํ•˜๋„๋ก ํ•ฉ๋‹ˆ๋‹ค. ์ด ๊ธฐ๋Šฅ์€ ๋ณด์•ˆ ์‚ฌ๊ณ  ๋ฐœ์ƒ ์‹œ ์ค‘์š”ํ•œ ์ •๋ณด๋ฅผ ์ œ๊ณตํ•ฉ๋‹ˆ๋‹ค.

์ด๋Ÿฌํ•œ ๊ตฌ์„ฑ ์š”์†Œ์™€ ์ž‘๋™ ์›๋ฆฌ๋Š” HSM์ด ์ œ๊ณตํ•˜๋Š” ๋ณด์•ˆ ๊ธฐ๋Šฅ์˜ ๊ทผ๋ณธ์ ์ธ ๊ธฐ์ดˆ๋ฅผ ํ˜•์„ฑํ•˜๋ฉฐ, HSM์„ ์‚ฌ์šฉํ•˜๋Š” ๋ชจ๋“  ์‹œ์Šคํ…œ์˜ ์•ˆ์ „์„ฑ์„ ๋†’์ž…๋‹ˆ๋‹ค.

2.1 (Optional) Subsections

2.1.1 Cryptographic Algorithms

HSM์€ ๋‹ค์–‘ํ•œ ์•”ํ˜ธํ™” ์•Œ๊ณ ๋ฆฌ์ฆ˜์„ ์ง€์›ํ•ฉ๋‹ˆ๋‹ค. ์ผ๋ฐ˜์ ์œผ๋กœ ๋Œ€์นญ ๋ฐ ๋น„๋Œ€์นญ ์•”ํ˜ธํ™” ์•Œ๊ณ ๋ฆฌ์ฆ˜์ด ํฌํ•จ๋˜๋ฉฐ, AES, RSA, ECC ๋“ฑ์ด ์ž์ฃผ ์‚ฌ์šฉ๋ฉ๋‹ˆ๋‹ค. ์ด๋Ÿฌํ•œ ์•Œ๊ณ ๋ฆฌ์ฆ˜์€ HSM์˜ ์„ฑ๋Šฅ๊ณผ ๋ณด์•ˆ์„ฑ์„ ๊ฒฐ์ •์ง“๋Š” ์ค‘์š”ํ•œ ์š”์†Œ์ž…๋‹ˆ๋‹ค.

2.1.2 Physical Security Features

HSM์€ ๋ฌผ๋ฆฌ์  ๋ณด์•ˆ ๊ธฐ๋Šฅ์„ ๊ฐ–์ถ”๊ณ  ์žˆ์Šต๋‹ˆ๋‹ค. ์˜ˆ๋ฅผ ๋“ค์–ด, tamper-resistant ์„ค๊ณ„, ๋ฌผ๋ฆฌ์  ์ ‘๊ทผ ์ œ์–ด, ๊ทธ๋ฆฌ๊ณ  ํ™˜๊ฒฝ ๋ชจ๋‹ˆํ„ฐ๋ง ๊ธฐ๋Šฅ์ด ํฌํ•จ๋ฉ๋‹ˆ๋‹ค. ์ด๋Ÿฌํ•œ ๊ธฐ๋Šฅ์€ HSM์„ ๋ฌผ๋ฆฌ์  ๊ณต๊ฒฉ์œผ๋กœ๋ถ€ํ„ฐ ๋ณดํ˜ธํ•˜๋Š” ๋ฐ ์ค‘์š”ํ•œ ์—ญํ• ์„ ํ•ฉ๋‹ˆ๋‹ค.

HSM์€ ๋‹ค์–‘ํ•œ ๋ณด์•ˆ ๊ธฐ์ˆ ๊ณผ ๋น„๊ต๋  ์ˆ˜ ์žˆ์œผ๋ฉฐ, ๊ฐ ๊ธฐ์ˆ ๋งˆ๋‹ค ์žฅ๋‹จ์ ์ด ์กด์žฌํ•ฉ๋‹ˆ๋‹ค. HSM๊ณผ ์ผ๋ฐ˜ ์†Œํ”„ํŠธ์›จ์–ด ๊ธฐ๋ฐ˜ ์•”ํ˜ธํ™” ์†”๋ฃจ์…˜์„ ๋น„๊ตํ•  ๋•Œ, HSM์€ ๋‹ค์Œ๊ณผ ๊ฐ™์€ ์žฅ์ ์„ ๊ฐ€์ง€๊ณ  ์žˆ์Šต๋‹ˆ๋‹ค:

  • Enhanced Security: HSM์€ ์ „์šฉ ํ•˜๋“œ์›จ์–ด๋กœ ๊ตฌ์„ฑ๋˜์–ด ์žˆ์–ด ์†Œํ”„ํŠธ์›จ์–ด ๊ธฐ๋ฐ˜ ์†”๋ฃจ์…˜๋ณด๋‹ค ๋†’์€ ๋ณด์•ˆ์„ฑ์„ ์ œ๊ณตํ•ฉ๋‹ˆ๋‹ค. HSM ๋‚ด๋ถ€์—์„œ ๋ชจ๋“  ์•”ํ˜ธํ™” ์ž‘์—…์ด ์ˆ˜ํ–‰๋˜๋ฏ€๋กœ, ํ‚ค๊ฐ€ ์™ธ๋ถ€์— ๋…ธ์ถœ๋  ์œ„ํ—˜์ด ์ค„์–ด๋“ญ๋‹ˆ๋‹ค.

  • Performance: HSM์€ ๊ณ ์„ฑ๋Šฅ ํ”„๋กœ์„ธ์„œ๋ฅผ ์‚ฌ์šฉํ•˜์—ฌ ๋Œ€๋Ÿ‰์˜ ๋ฐ์ดํ„ฐ๋ฅผ ๋น ๋ฅด๊ฒŒ ์ฒ˜๋ฆฌํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค. ์ด๋Š” ํŠนํžˆ ๊ธˆ์œต ๊ฑฐ๋ž˜์™€ ๊ฐ™์€ ์‹ค์‹œ๊ฐ„ ์‘์šฉ ํ”„๋กœ๊ทธ๋žจ์—์„œ ์ค‘์š”ํ•œ ์š”์†Œ์ž…๋‹ˆ๋‹ค.

๋ฐ˜๋ฉด, HSM์€ ๋‹ค์Œ๊ณผ ๊ฐ™์€ ๋‹จ์ ๋„ ์กด์žฌํ•ฉ๋‹ˆ๋‹ค:

  • Cost: HSM์€ ์ผ๋ฐ˜์ ์œผ๋กœ ๋น„์‹ผ ์žฅ๋น„๋กœ, ์ดˆ๊ธฐ ํˆฌ์ž ๋น„์šฉ์ด ๋†’์Šต๋‹ˆ๋‹ค. ์ค‘์†Œ๊ธฐ์—…์—์„œ๋Š” ์˜ˆ์‚ฐ ๋ฌธ์ œ๋กœ HSM ๋„์ž…์ด ์–ด๋ ค์šธ ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.

  • Complexity: HSM์˜ ์„ค์ •๊ณผ ๊ด€๋ฆฌ๊ฐ€ ๋ณต์žกํ•  ์ˆ˜ ์žˆ์œผ๋ฉฐ, ์ „๋ฌธ ์ง€์‹์ด ํ•„์š”ํ•ฉ๋‹ˆ๋‹ค. ์ด๋Š” ์ธ๋ ฅ ๊ต์œก ๋ฐ ์œ ์ง€ ๊ด€๋ฆฌ ๋น„์šฉ์„ ์ฆ๊ฐ€์‹œํ‚ฌ ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.

HSM ์™ธ์—๋„ TPM (Trusted Platform Module), KMS (Key Management Service)์™€ ๊ฐ™์€ ์œ ์‚ฌํ•œ ๊ธฐ์ˆ ์ด ์กด์žฌํ•ฉ๋‹ˆ๋‹ค. TPM์€ ์ฃผ๋กœ ๊ฐœ์ธ ์ปดํ“จํ„ฐ์™€ ์„œ๋ฒ„์—์„œ ์‚ฌ์šฉ๋˜๋Š” ๋ณด์•ˆ ๋ชจ๋“ˆ๋กœ, HSM๋ณด๋‹ค ๊ธฐ๋Šฅ์ด ์ œํ•œ์ ์ž…๋‹ˆ๋‹ค. KMS๋Š” ํด๋ผ์šฐ๋“œ ํ™˜๊ฒฝ์—์„œ ํ‚ค ๊ด€๋ฆฌ๋ฅผ ์ œ๊ณตํ•˜๋Š” ์„œ๋น„์Šค๋กœ, HSM์˜ ๊ธฐ๋Šฅ์„ ์†Œํ”„ํŠธ์›จ์–ด ๊ธฐ๋ฐ˜์œผ๋กœ ์ œ๊ณตํ•ฉ๋‹ˆ๋‹ค. HSM์€ ์ด๋Ÿฌํ•œ ๊ธฐ์ˆ ๋“ค๋ณด๋‹ค ๋” ๋†’์€ ๋ณด์•ˆ์„ฑ๊ณผ ์„ฑ๋Šฅ์„ ์ œ๊ณตํ•˜์ง€๋งŒ, ๋น„์šฉ๊ณผ ๋ณต์žก์„ฑ ์ธก๋ฉด์—์„œ ๋‹จ์ ์ด ์žˆ์„ ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.

4. References

  • Thales Group: HSM ๊ด€๋ จ ์†”๋ฃจ์…˜์„ ์ œ๊ณตํ•˜๋Š” ๊ธ€๋กœ๋ฒŒ ๊ธฐ์—….
  • Gemalto: HSM ๋ฐ ๋ณด์•ˆ ์†”๋ฃจ์…˜์„ ์ „๋ฌธ์œผ๋กœ ํ•˜๋Š” ๊ธฐ์—….
  • NIST (National Institute of Standards and Technology): HSM์˜ ํ‘œ์ค€๊ณผ ๊ฐ€์ด๋“œ๋ผ์ธ์„ ์ œ์ •ํ•˜๋Š” ๊ธฐ๊ด€.
  • IEEE: ์ „์ž ๋ฐ ์ „๊ธฐ ๊ณตํ•™ ๊ด€๋ จ ์—ฐ๊ตฌ ๋ฐ ํ‘œ์ค€์„ ์ œ์ •ํ•˜๋Š” ํ•™ํšŒ.

5. One-line Summary

Hardware Security Modules (HSM)์€ ์•”ํ˜ธํ™” ํ‚ค์™€ ๋ฐ์ดํ„ฐ๋ฅผ ์•ˆ์ „ํ•˜๊ฒŒ ๊ด€๋ฆฌํ•˜๊ณ  ๋ณดํ˜ธํ•˜๊ธฐ ์œ„ํ•œ ์ „์šฉ ํ•˜๋“œ์›จ์–ด ์žฅ์น˜๋กœ, ํ˜„๋Œ€์˜ ๋ณด์•ˆ ์š”๊ตฌ ์‚ฌํ•ญ์„ ์ถฉ์กฑํ•˜๋Š” ํ•„์ˆ˜์ ์ธ ๊ตฌ์„ฑ ์š”์†Œ์ž…๋‹ˆ๋‹ค.