{"id":7651,"date":"2025-08-28T06:06:08","date_gmt":"2025-08-28T06:06:08","guid":{"rendered":"https:\/\/www.pufsecurity.com\/?p=7651"},"modified":"2025-09-09T05:19:51","modified_gmt":"2025-09-09T05:19:51","slug":"%e7%86%b5%e7%a2%bc%e7%a7%91%e6%8a%80%e5%8a%9b%e6%97%ba%e9%9b%bb%e5%ad%90%e5%ad%90%e5%85%ac%e5%8f%b8%e8%88%87%e7%a7%91%e7%b5%a1%e9%81%94%e7%a7%91%e6%8a%80%e7%ad%96%e7%95%a5%e8%81%af%e7%9b%9f","status":"publish","type":"post","link":"https:\/\/www.pufsecurity.com\/zh-hant\/%e7%86%b5%e7%a2%bc%e7%a7%91%e6%8a%80%e5%8a%9b%e6%97%ba%e9%9b%bb%e5%ad%90%e5%ad%90%e5%85%ac%e5%8f%b8%e8%88%87%e7%a7%91%e7%b5%a1%e9%81%94%e7%a7%91%e6%8a%80%e7%ad%96%e7%95%a5%e8%81%af%e7%9b%9f\/","title":{"rendered":"eMemory\u2019s subsidiary, PUFsecurity, and Carota Form Strategic Alliance to Secure OTA Updates for the Software-Defined Era"},"content":{"rendered":"\n
Hsinchu, August 28th<\/sup>, 2025<\/strong> \u2013 PUFsecurity, a subsidiary of eMemory Technology Inc., today announced a strategic alliance with Carota Corporation, a global leader in over-the-air (OTA) solutions for connected devices. By integrating PUFsecurity\u2019s Physically Unclonable Function (PUF)-based hardware root of trustwith Carota\u2019s proven OTA platform, the companies will deliver end-to-end, hardware-anchored cybersecurity for the next generation of connected vehicles and AIoT, and the broader Software-Defined Anything (SDx) ecosystem.<\/p>\n\n\n\n Mitigating OTA Risks with PUF-Based HSM Edge Servers<\/strong><\/p>\n\n\n\n As connected vehicles and AIoT devices increasingly rely on OTA software updates, they also face growing risks of data leakage, remote tampering, and supply-chain compromise. Conventional key deployment methods introduce vulnerabilities from mishandling or cloning.<\/p>\n\n\n\n Through this alliance, Carota will integrate the PUF-based Hardware Security Module (HSM) Edge Server into its OTA architecture. This enables secure identity recognition, key lifecycle management, software signing, firmware integrity verification, device\u2013server binding, version auditing, sandbox testing, and privacy protection\u2014all within a trusted execution environment. The result is a multi-layered defense from device to cloud, strengthening trust in OTA updates across software-defined ecosystems.<\/p>\n\n\n\n Launching New PUF-Based OTA Service for Smart Devices<\/strong><\/p>\n\n\n\n Built on eMemory\u2019s NeoPUF technology, the HSM generates a unique, unclonable chip fingerprint<\/em> to serve as the basis for secure key generation. Its modular cartridge design allows flexible computational resource expansion to meet different device requirements, significantly enhancing resilience and stability in key management. By also integrating a PUF-based FIDO authentication mechanism, customers retain full control over key access rights, eliminating the risks of supplier leakage or internal mishandling common in traditional key deployment.<\/p>\n\n\n\n This \u201cPUF-based OTA\u201d service represents the first practical application of PUF technology in OTA scenarios. It not only strengthens current automotive and AIoT security, but also lays the groundwork for next-generation smart mobility and automation \u2014 including AI robots, drones, AGVs\/AMRs, and even flying cars.<\/p>\n\n\n\n Shared Vision of Creating a Future-Proof OTA Security Paradigm Together<\/strong><\/p>\n\n\n\n Dr. Tsung-Lin Lin, Special Assistant to the Chairman of PUFsecurity, stated:<\/p>\n\n\n\n \u201cThis collaboration is an important milestone in our vision of PUF-based Security-as-a-Service (SECaaS). By embedding hardware root of trust into Carota\u2019s OTA platform, we are creating a sustainable cybersecurity ecosystem\u2014spanning chip, module, and system levels\u2014that addresses both current threats and the evolving needs of the software-defined era.\u201d<\/em><\/p>\n\n\n\n Wo Po-Yi, CEO and Founder of Carota, commented:<\/p>\n\n\n\n \u201cCarota\u2019s mission is to deliver secure, efficient, and future-proof OTA solutions. Partnering with PUFsecurity allows us to embed security at the deepest hardware level, from identity authentication to update verification, ensuring our customers can trust every stage of the OTA lifecycle. This strengthens both automotive and AIoT ecosystems as they scale into the SDx era.\u201d<\/em> The alliance between PUFsecurity and Carota establishes a new PUF-based OTA security paradigm\u2014combining hardware-anchored trust, cryptographic depth, and efficient OTA workflows. Together, the companies are setting the foundation for forward-looking, sustainable cybersecurity services across smart mobility, automation, and the expanding SDx ecosystem.<\/p>\n\n\n\n About PUFsecurity<\/strong><\/p>\n\n\n\n PUFsecurity is a leading provider of hardware root-of-trust technologies, specializing in security IP solutions based on Physically Unclonable Function (PUF) technology. Leveraging eMemory\u2019s NeoPUF and OTP technologies, PUFsecurity focuses on developing and deploying native key generation and full-stack security architectures to address the challenges of the quantum era: core IP solutions include PUFpqc (Post-Quantum Cryptography), PUFcc (Crypto Coprocessor), PUFrt (Root of Trust), and PUFhsm (Hardware Security Module). PUFsecurity is currently constructing a PUF-based Security-as-a-Service ecosystem to provide protection and authentication for the next generation of connected devices.<\/p>\n\n\n\n About Carota<\/strong><\/p>\n\n\n\n Carota is a global one-stop provider of OTA upgrade and remote diagnostics solutions. Services include OTA subscription services, smart cockpit software development, remote diagnostics, OTA testing tools, and AI-powered fleet management solutions, mainly targeting connected vehicle and IoT industries, Carota\u2019s customers span Greater China, Europe, North America, Japan, Korea, and Southeast Asia.<\/p>\n\n\n\n \u3010\u65b0\u7af9\uff0c2025\u5e748\u670828\u65e5\u3011\u529b\u65fa\u96fb\u5b50\uff08eMemory Technology Inc\uff09\u65d7\u4e0b\u71b5\u78bc\u79d1\u6280\uff08PUFsecurity Corporation\uff09\u4eca\u65e5\u5ba3\u5e03\uff0c\u8207\u5168\u7403\u8eca\u806f\u7db2\u8207\u7269\u806f\u7db2OTA\uff08Over-The-Air\uff09\u89e3\u6c7a\u65b9\u6848\u9818\u5c0e\u5ee0\u5546\u79d1\u7d61\u9054\uff08Carota Corporation\uff09\u5efa\u7acb\u7b56\u7565\u806f\u76df\u5925\u4f34\u95dc\u4fc2\u3002\u79d1\u7d61\u9054\u9577\u671f\u70ba\u5168\u7403\u6c7d\u8eca\u54c1\u724c\u8207 AIoT \u9818\u57df\u63d0\u4f9b\u7a69\u5b9a\u3001\u9ad8\u6548\u4e14\u7b26\u5408\u8eca\u7528\u7b49\u7d1a\u7684 OTA \u670d\u52d9\uff0c\u7d2f\u8a08\u5347\u7d1a\u8d85\u904e 3.2\u5104\u53f0\u667a\u6167\u8a2d\u5099\uff0c\u96d9\u65b9\u5c07\u651c\u624b\u5728\u79d1\u7d61\u9054OTA\u5e73\u53f0\u67b6\u69cb\u4e2d\u5c0e\u5165\u71b5\u78bc\u79d1\u6280PUF\uff08Physically Unclonable Function\uff09\u6280\u8853\uff0c\u85c9\u7531\u6574\u5408\u7cfb\u7d71\u5c64\u7d1a\u7684 PUF-based HSM Edge Server \u89e3\u6c7a\u65b9\u6848\uff0c\u6d88\u9664\u5167\u63a7\u98a8\u96aa\u53ca\u88fd\u9020\u5546\u6d29\u5bc6\u98a8\u96aa\uff0c\u5168\u9762\u63d0\u5347\u9060\u7aef\u97cc\u9ad4\u66f4\u65b0\u8207\u8cc7\u6599\u50b3\u8f38\u7684\u8cc7\u5b89\u4fdd\u8b77\u5c64\u7d1a\uff0c\u70ba\u8eca\u7528\u53ca\u65b0\u8208\u667a\u6167\u8f09\u5177\u63d0\u4f9b\u5f9e\u88dd\u7f6e\u7aef\u5230\u96f2\u7aef\u7684\u591a\u5c64\u6b21\u8cc7\u5b89\u4fdd\u969c\u3002<\/p>\n\n\n\n \u6574\u5408PUF-based\u786c\u9ad4\u4fe1\u4efb\u6839\u3000\u5f37\u5316OTA\u8edf\u9ad4\u66f4\u65b0\u5b89\u5168\u6a5f\u5236<\/strong><\/p>\n\n\n\n \u79d1\u7d61\u9054\u65bcOTA \u8edf\u9ad4\u66f4\u65b0\u9818\u57df\uff0c\u81ea\u4e3b\u7814\u767c\u5c08\u5229\u5dee\u5206\u6f14\u7b97\u6cd5\u5927\u5e45\u964d\u4f4e\u8cc7\u6599\u50b3\u8f38\u91cf\uff0c\u4e26\u78ba\u4fdd\u8de8\u8eca\u5ee0\u8207\u8de8\u5e73\u53f0\u7684\u9ad8\u76f8\u5bb9\u6027\u3002\u71b5\u78bc\u79d1\u6280\u6b64\u6b21\u5c07PUF-based HSM Edge Server\u5f15\u5165\u5408\u4f5c\uff0c\u900f\u904e\u5c0e\u5165PUF\u6280\u8853\uff0c\u8b93\u5ba2\u6236\u80fd\u5b89\u5fc3\u8a17\u7ba1\u5bc6\u9470\uff0c\u4e0d\u50c5\u5f37\u5316\u4e86\u79d1\u7d61\u9054OTA\u670d\u52d9\u6d41\u7a0b\u4e2d\u7684\u8cc7\u6599\u4fdd\u8b77\u3001\u8eab\u4efd\u9a57\u8b49\u8207\u97cc\u9ad4\u5b8c\u6574\u6027\u9a57\u8b49\u6a5f\u5236\uff0c\u5354\u52a9\u6c7d\u8eca\u88fd\u9020\u5546\u66f4\u5b89\u5168\u5730\u63a8\u9001\u97cc\u9ad4\u66f4\u65b0\uff0c\u540c\u6642\u5b89\u5168\u64f7\u53d6\u4e26\u5132\u5b58\u8eca\u8f1b\u904b\u884c\u6578\u64da\u8207\u99d5\u99db\u96b1\u79c1\u8cc7\u6599\uff0c\u5be6\u73fe\u4e0a\u4e0b\u884c\u7684\u5168\u9762\u8cc7\u5b89\u9632\u8b77\u3002<\/p>\n\n\n\n PUF-based HSM Edge Server\u89e3\u6c7a\u65b9\u6848\u5960\u57fa\u65bc\u6bcd\u516c\u53f8\u529b\u65fa\u96fb\u5b50\u7684NeoPUF\u6280\u8853\uff0c\u80fd\u5728\u6676\u7247\u5728\u88fd\u9020\u904e\u7a0b\u4e2d\u7522\u751f\u7368\u4e00\u7121\u4e8c\u4e14\u7121\u6cd5\u8907\u88fd\u7684\u300c\u6676\u7247\u6307\u7d0b\u300d\uff0c\u4f5c\u70ba\u5b89\u5168\u6839\u5bc6\u9470\u7684\u751f\u6210\u4f9d\u64da\u3002\u5176\u6a21\u7d44\u5316\u5361\u5323\u8a2d\u8a08\u53ef\u652f\u63f4\u4e0d\u540c\u8a2d\u5099\u9700\u6c42\u4e0b\u7684\u904b\u7b97\u8cc7\u6e90\u64f4\u5145\uff0c\u4e26\u4e14\u986f\u8457\u63d0\u5347\u5bc6\u9470\u7ba1\u7406\u97cc\u6027\u8207\u7a69\u5b9a\u6027\u3002\u540c\u6642\u6574\u5408PUF-based FIDO\u9a57\u8b49\u6a5f\u5236\uff0c\u8b93\u5ba2\u6236\u53ef\u5b8c\u5168\u638c\u63e1\u91d1\u9470\u5b58\u53d6\u6b0a\u9650\uff0c\u5f9e\u5ba2\u7aef\u5230\u5c40\u7aef(End to End)\u675c\u7d55\u50b3\u7d71\u91d1\u9470\u4f48\u7f72\u6d41\u7a0b\u4e2d\u56e0\u88fd\u9020\u5546\u6d29\u5bc6\u6216\u5167\u63a7\u4e0d\u7576\u98a8\u96aa\u9020\u6210\u7684\u8cc7\u5b89\u4e8b\u4ef6\u3002<\/p>\n\n\n\n \u5efa\u7acbPUF-based OTA\u65b0\u5178\u7bc4\uff0c\u5ef6\u4f38\u81f3\u591a\u5143\u667a\u6167\u8a2d\u5099<\/strong><\/p>\n\n\n\n \u300cPUF-based OTA\u300d\u9019\u9805\u670d\u52d9\u6a19\u8a8c\u8457 PUF \u6280\u8853\u9996\u6b21\u61c9\u7528\u65bc OTA \u5be6\u52d9\u5834\u666f\uff0c\u4e26\u5c07\u6301\u7e8c\u64f4\u5c55\u81f3 AI Robot\u3001AI Drone\u3001AI AGV\/AMR\u3001AI Flying Car \u7b49\u65b0\u4e16\u4ee3\u667a\u6167\u8f09\u5177\u8207\u81ea\u52d5\u5316\u8a2d\u5099\uff0c\u70ba\u8eca\u806f\u7db2\u8207 AIoT\uff08Artificial Intelligence of Things\uff09\u8a2d\u5099\u69cb\u7bc9\u66f4\u56b4\u5bc6\u7684\u8cc7\u5b89\u9632\u7dda\uff0c\u4e26\u70ba\u8edf\u9ad4\u5b9a\u7fa9\u8a2d\u5099\uff08Software-Defined Anything, SDX\uff09\u6642\u4ee3\u5960\u5b9a\u5b89\u5168\u6839\u57fa\u3002<\/p>\n\n\n\n \u91dd\u5c0d\u9019\u985e\u8edf\u9ad4\u5b9a\u7fa9\u8a2d\u5099\u7684\u806f\u7db2AI\u7d42\u7aef\u88dd\u7f6e\uff0c\u8207\u9060\u7aefOTA\u4f3a\u670d\u5668\u9032\u884c\u8edf\u9ad4\u3001\u8cc7\u6599\u8207\u8a2d\u5b9a\u66f4\u65b0\u6642\uff0cPUF \u6280\u8853\u53ef\u78ba\u4fdd\u5168\u7a0b\u5728\u53ef\u4fe1\u4efb\u7684\u74b0\u5883\u4e0b\u5b8c\u6210\u3002\u539f\u56e0\u5728\u65bc\uff0cPUF\u6280\u8853\u80fd\u5efa\u7acb\u552f\u4e00\u8eab\u5206\u8b58\u5225\u53ca\u5bc6\u9470\u751f\u6210\u7684\u8cc7\u5b89\u67b6\u69cb\uff0c\u652f\u63f4\u96f6\u4fe1\u4efb\u9a57\u8b49\u3001\u8edf\u9ad4\u7c3d\u7f72\u3001\u96b1\u79c1\u8cc7\u6599\u4fdd\u8b77\u3001\u8a2d\u5099\u8207\u4f3a\u670d\u5668\u7d81\u5b9a\u3001\u8edf\u9ad4\u7248\u672c\u7a3d\u6838\u3001Sandbox\u6e2c\u8a66\u7b49\u95dc\u9375\u6d41\u7a0b\uff0c\u89e3\u6c7aSDX\u5728\u751f\u547d\u5468\u671f\u4e2d\u53ef\u80fd\u9762\u81e8\u7684\u4fe1\u4efb\u8207\u9a57\u8b49\u6311\u6230\u3002<\/p>\n\n\n\n \u9081\u5411SECaaS\u5e73\u53f0\u9858\u666f\u3000\u6253\u9020PUF\u8cc7\u5b89\u751f\u614b\u93c8<\/strong><\/p>\n\n\n\n \u71b5\u78bc\u79d1\u6280\u8463\u4e8b\u9577\u7279\u5225\u52a9\u7406\u6797\u5b97\u9716\u535a\u58eb\u8868\u793a\uff1a\u300c\u6b64\u6b21\u8207\u79d1\u7d61\u9054\u7684\u5408\u4f5c\u662f\u5be6\u8e10\u300ePUF-based Security-as-a-Service\uff08SECaaS\uff09\u5e73\u53f0\u300f\u9858\u666f\u7684\u91cd\u8981\u91cc\u7a0b\u7891\u3002\u6211\u5011\u7684\u76ee\u6a19\u662f\u5efa\u7acb\u4e00\u5957\u4ee5PUF\u6280\u8853\u70ba\u57fa\u790e\u3001\u6db5\u84cb\u5f9e\u6676\u7247\u3001\u6a21\u7d44\u3001\u7cfb\u7d71\u5230\u5e73\u53f0\u7684\u5b8c\u6574\u8cc7\u5b89\u751f\u614b\u9ad4\u7cfb\uff0c\u6eff\u8db3\u672a\u4f86SDX\u6642\u4ee3\u4e0b\u6301\u7e8c\u6f14\u9032\u7684\u591a\u5143\u61c9\u7528\u8207\u8cc7\u5b89\u9700\u6c42\u3002 \u79d1\u7d61\u9054\u57f7\u884c\u9577\u517c\u5275\u8fa6\u4eba\u5433\u67cf\u5100\u8868\u793a\uff1a\u300cCarota \u81f4\u529b\u65bc\u63d0\u4f9b\u7a69\u5b9a\u3001\u9ad8\u6548\u4e14\u7b26\u5408\u8eca\u7528\u7b49\u7d1a\u8981\u6c42\u7684OTA\u89e3\u6c7a\u65b9\u6848\uff0c\u5b89\u5168\u6027\u59cb\u7d42\u662f\u6211\u5011\u4e0d\u65b7\u7cbe\u9032\u7684\u91cd\u9ede\u4e4b\u4e00\u3002\u6b64\u6b21\u8207PUFsecurity\u5408\u4f5c\u5c0e\u5165PUF-based HSM Edge Server\uff0c\u4e0d\u50c5\u5f37\u5316\u4e86\u6211\u5011\u5728\u5ba2\u6236\u5bc6\u9470\u4fdd\u7ba1\u8207\u8a17\u7ba1\u7684\u4fe1\u4efb\u57fa\u790e\uff0c\u70ba\u5ba2\u6236\u5728\u8eca\u806f\u7db2\u8207\u667a\u6167\u8f09\u5177\u7684\u61c9\u7528\u5834\u666f\u4e2d\u63d0\u4f9b\u66f4\u5b8c\u6574\u7684\u8cc7\u5b89\u652f\u63f4\u3002\u9762\u5c0dSDX\u7684\u5feb\u901f\u666e\u53ca\uff0c\u6211\u5011\u4e5f\u5c07\u6301\u7e8c\u6df1\u5316\u8207PUF-based\u8cc7\u5b89\u751f\u614b\u7cfb\u5925\u4f34\u7684\u5408\u4f5c\uff0c\u4e26\u5ef6\u4f38\u61c9\u7528\u81f3 AI Robot\u3001\u667a\u6167\u7269\u806f\u7db2\u8a2d\u5099\u3001\u667a\u6167\u7269\u6d41\u8207\u65b0\u80fd\u6e90\u8eca\u7b49\u9818\u57df\uff0c\u78ba\u4fdd\u5168\u7403\u5ba2\u6236\u5728 SDX \u6642\u4ee3\u80fd\u64c1\u6709\u53ef\u6301\u7e8c\u3001\u66f4\u5177\u524d\u77bb\u6027\u7684OTA\u5b89\u5168\u670d\u52d9\u3002\u300d<\/p>\n\n\n\n <\/p>\n\n\n\n \u95dc\u65bc\u71b5\u78bc\u79d1\u6280\uff08PUFsecurity\uff09<\/strong><\/p>\n\n\n\n \u71b5\u78bc\u79d1\u6280\u70ba\u5168\u7403\u9818\u5148\u7684\u786c\u9ad4\u4fe1\u4efb\u57fa\u790e\u6280\u8853\u63d0\u4f9b\u8005\uff0c\u5c08\u6ce8\u65bc\u4ee5PUF\u6280\u8853\u70ba\u6838\u5fc3\u7684\u5b89\u5168IP\u89e3\u6c7a\u65b9\u6848\u3002\u6191\u85c9\u6bcd\u516c\u53f8\u529b\u65fa\u96fb\u5b50\u7684NeoPUF\u8207OTP\u6280\u8853\uff0c\u71b5\u78bc\u805a\u7126\u65bc NeoPUF \u539f\u751f\u5bc6\u9470\u6280\u8853\u8207\u5168\u68e7\u5b89\u5168\u67b6\u69cb\u7684\u958b\u767c\u8207\u90e8\u7f72\uff0c\u81f4\u529b\u65bc\u5354\u52a9\u5168\u7403\u6676\u7247\u8207\u7cfb\u7d71\u8a2d\u8a08\u8005\u8fce\u63a5\u91cf\u5b50\u6642\u4ee3\u6311\u6230\uff0c\u6253\u9020\u771f\u6b63\u53ef\u6301\u7e8c\u7684\u8cc7\u5b89\u9632\u7dda\uff0c\u6838\u5fc3\u7522\u54c1\u5305\u62ecPUFPQC(Post-Quantum Cryptography)\u3001PUFcc(Crypto Coprocessor)\u3001PUFrt(Root of Trust)\u3001PUFhsm(Hardware Security Module)\u7b49IP\u89e3\u6c7a\u65b9\u6848\uff0c\u5e03\u5c40\u6253\u9020PUF-based Security-as-a-Service\u751f\u614b\u7cfb\uff0c\u70ba\u65b0\u4e00\u4ee3\u9023\u7db2\u8a2d\u5099\u63d0\u4f9b\u4fdd\u8b77\u8207\u8a8d\u8b49\u6a5f\u5236\u3002<\/p>\n\n\n\n \u95dc\u65bc\u79d1\u7d61\u9054\uff08Carota\uff09<\/strong><\/p>\n\n\n\n \u79d1\u7d61\u9054\uff08Carota\uff09\u70ba\u5168\u7403\u4e00\u7ad9\u5f0f OTA\uff08Over-The-Air\uff09\u5347\u7d1a\u8207\u9060\u7a0b\u8a3a\u65b7\u89e3\u6c7a\u65b9\u6848\u4f9b\u61c9\u5546\uff0c\u63d0\u4f9b OTA \u8a02\u95b1\u670d\u52d9\u3001\u667a\u6167\u5ea7\u8259\u8edf\u9ad4\u958b\u767c\u3001\u9060\u7a0b\u8a3a\u65b7\u3001OTA \u6e2c\u8a66\u5de5\u5177\u8207AI\u5f71\u50cf\u8eca\u968a\u7ba1\u7406\u7b49\u591a\u5143\u7522\u54c1\u3002\u670d\u52d9\u6a6b\u8de8\u8eca\u806f\u7db2\u8207\u7269\u806f\u7db2\u9818\u57df\uff0c\u5ba2\u6236\u904d\u53ca\u5927\u4e2d\u83ef\u5340\u3001\u6b50\u7f8e\u3001\u65e5\u97d3\u8207\u6771\u5357\u4e9e\u7b49\u5730\u3002<\/p>\n","protected":false},"excerpt":{"rendered":" PUFsecurity, a subsidiary of eMemory Technology Inc., today announced a strategic alliance with Carota Corporation, a global leader in over-the-air (OTA) solutions for connected devices. By integrating PUFsecurity\u2019s Physically Unclonable Function (PUF)-based hardware root of trustwith Carota\u2019s proven OTA platform, the companies will deliver end-to-end, hardware-anchored cybersecurity for the next generation of connected vehicles and AIoT, and the broader Software-Defined Anything (SDx) ecosystem.<\/p>\n","protected":false},"author":20,"featured_media":7653,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[11],"tags":[22,295,27],"class_list":["post-7651","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-company-news","tag-ememory","tag-pqc","tag-pufsecurity"],"acf":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.pufsecurity.com\/zh-hant\/wp-json\/wp\/v2\/posts\/7651"}],"collection":[{"href":"https:\/\/www.pufsecurity.com\/zh-hant\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pufsecurity.com\/zh-hant\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pufsecurity.com\/zh-hant\/wp-json\/wp\/v2\/users\/20"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pufsecurity.com\/zh-hant\/wp-json\/wp\/v2\/comments?post=7651"}],"version-history":[{"count":5,"href":"https:\/\/www.pufsecurity.com\/zh-hant\/wp-json\/wp\/v2\/posts\/7651\/revisions"}],"predecessor-version":[{"id":7664,"href":"https:\/\/www.pufsecurity.com\/zh-hant\/wp-json\/wp\/v2\/posts\/7651\/revisions\/7664"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pufsecurity.com\/zh-hant\/wp-json\/wp\/v2\/media\/7653"}],"wp:attachment":[{"href":"https:\/\/www.pufsecurity.com\/zh-hant\/wp-json\/wp\/v2\/media?parent=7651"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pufsecurity.com\/zh-hant\/wp-json\/wp\/v2\/categories?post=7651"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pufsecurity.com\/zh-hant\/wp-json\/wp\/v2\/tags?post=7651"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}
\n\n\n\n\u71b5\u78bc\u79d1\u6280(\u529b\u65fa\u96fb\u5b50\u5b50\u516c\u53f8)\u8207\u79d1\u7d61\u9054\u79d1\u6280\u7b56\u7565\u806f\u76df: \u4ee5PUF\u6280\u8853\u5f37\u5316OTA\u8cc7\u5b89\u9632\u8b77\uff0c\u5e03\u5c40\u8edf\u9ad4\u5b9a\u7fa9\u8a2d\u5099\u6642\u4ee3<\/strong><\/h2>\n\n\n\n