Mediatek Cryptocore Hw V1.0, Fw V1.0 Fips 140-2 N

Total Page:16

File Type:pdf, Size:1020Kb

Mediatek Cryptocore Hw V1.0, Fw V1.0 Fips 140-2 N MEDIATEK CRYPTOCORE HW V1.0, FW V1.0 FIPS 140-2 NON-PROPRIETARY SECURITY POLICY VERSION 2.2 MEDIATEK INC. JUNE 2018 MEDIATEK INC. No. 1, Dusing 1st Rd. Hsinchu Science Park Hsinchu City 30078 Taiwan MediaTek Cryptographic Module FIPS 140-2 Security Policy Table of Contents 1. Introduction .......................................................................................................................................... 1 1.1 Purpose of the Security Policy ...................................................................................................... 1 1.2 Target Audience ............................................................................................................................ 1 1.3 Document Organization / Copyright ............................................................................................. 1 2. Cryptographic Module Specification ..................................................................................................... 1 2.1 Module Overview .......................................................................................................................... 1 2.1.1 Module Embodiment ............................................................................................................ 2 2.1.2 Module Validation Level ....................................................................................................... 3 2.1.3 Module Hardware ................................................................................................................. 3 2.1.4 Module Software .................................................................................................................. 3 2.1.5 Tested Platform ..................................................................................................................... 3 2.2 Approved Security Functions and Mode of Operation ................................................................. 4 2.2.1 Approved Security Functions ................................................................................................ 4 2.2.2 Allowed Security Functions ................................................................................................... 6 2.2.3 Non-Approved Security Functions ........................................................................................ 6 2.2.4 Approved Security Mode ...................................................................................................... 7 2.3 Cryptographic Module Boundary and Components ..................................................................... 7 2.3.1 Cryptographic Module Boundary .......................................................................................... 7 2.3.2 Software Block Diagram ........................................................................................................ 8 2.3.3 Hardware Block Diagram ...................................................................................................... 8 2.3.4 Module Component ............................................................................................................ 10 2.3.4.1 Secure Core Hardware .................................................................................................... 10 2.3.4.2 Secure Core Firmware ..................................................................................................... 11 2.3.4.3 Public Core Hardware ..................................................................................................... 13 2.3.4.4 Public Core Firmware ...................................................................................................... 14 2.3.4.5 IV Generator .................................................................................................................... 14 2.3.4.6 Persistent State Interface................................................................................................ 15 2.3.4.7 Secure Key Mechanism ................................................................................................... 15 2.4 Life Cycle State and Operational State........................................................................................ 15 © 2017 MediaTek Inc. i MediaTek Cryptographic Module FIPS 140-2 Security Policy 3. Cryptographic Module Ports and Interfaces ....................................................................................... 16 3.1 Secure Core and Public Core Hardware Interfaces ..................................................................... 16 3.2 Secure Core Firmware Interface ................................................................................................. 17 3.3 Public Core Firmware Interface .................................................................................................. 17 4. Roles, Services and Authentication ..................................................................................................... 17 4.1 Roles ............................................................................................................................................ 17 4.2 Services ....................................................................................................................................... 18 4.3 Operator Authentication............................................................................................................. 25 4.4 Mechanism and Strength of Authentication............................................................................... 25 5. Physical Security .................................................................................................................................. 26 6. Operational Environment ................................................................................................................... 26 7. Cryptographic Key Management ........................................................................................................ 26 7.1 User Keys ..................................................................................................................................... 26 7.2 Platform Keys .............................................................................................................................. 26 7.3 Key Generation ........................................................................................................................... 28 7.4 Key Establishment ....................................................................................................................... 28 7.5 Key Entry and Output .................................................................................................................. 29 7.6 Key Storage ................................................................................................................................. 29 7.7 Key Zeroization............................................................................................................................ 29 8. Electromagnetic Interference / Compatibility (EMI/EMC) ................................................................. 29 9. Self Tests ............................................................................................................................................. 30 9.1 Power-up Tests ........................................................................................................................... 30 9.1.1 Cryptography Test ............................................................................................................... 30 9.1.1.1 Tests in Public Core ......................................................................................................... 30 9.1.1.2 Tests in Secure Core ........................................................................................................ 30 9.1.2 Firmware Integrity Test ....................................................................................................... 31 9.2 Conditional Tests ......................................................................................................................... 31 10. Design Assurance ............................................................................................................................ 32 10.1 Configuration Management ........................................................................................................ 32 10.1.1 Software .............................................................................................................................. 32 10.1.2 Hardware............................................................................................................................. 32 10.2 Delivery and Operation ............................................................................................................... 32 © 2017 MediaTek Inc. ii MediaTek Cryptographic Module FIPS 140-2 Security Policy 10.3 Guidance ..................................................................................................................................... 32 10.3.1 Operator Guidance ............................................................................................................. 32 10.4 Proprietary Document ................................................................................................................ 32 11. Mitigation of Other Attacks ............................................................................................................ 33 Bibliography ...............................................................................................................................................
Recommended publications
  • Bootstomp: on the Security of Bootloaders in Mobile Devices
    BootStomp: On the Security of Bootloaders in Mobile Devices Nilo Redini, Aravind Machiry, Dipanjan Das, Yanick Fratantonio, Antonio Bianchi, Eric Gustafson, Yan Shoshitaishvili, Christopher Kruegel, and Giovanni Vigna, UC Santa Barbara https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/redini This paper is included in the Proceedings of the 26th USENIX Security Symposium August 16–18, 2017 • Vancouver, BC, Canada ISBN 978-1-931971-40-9 Open access to the Proceedings of the 26th USENIX Security Symposium is sponsored by USENIX BootStomp: On the Security of Bootloaders in Mobile Devices Nilo Redini, Aravind Machiry, Dipanjan Das, Yanick Fratantonio, Antonio Bianchi, Eric Gustafson, Yan Shoshitaishvili, Christopher Kruegel, and Giovanni Vigna fnredini, machiry, dipanjan, yanick, antoniob, edg, yans, chris, [email protected] University of California, Santa Barbara Abstract by proposing simple mitigation steps that can be im- plemented by manufacturers to safeguard the bootloader Modern mobile bootloaders play an important role in and OS from all of the discovered attacks, using already- both the function and the security of the device. They deployed hardware features. help ensure the Chain of Trust (CoT), where each stage of the boot process verifies the integrity and origin of 1 Introduction the following stage before executing it. This process, in theory, should be immune even to attackers gaining With the critical importance of the integrity of today’s full control over the operating system, and should pre- mobile and embedded devices, vendors have imple- vent persistent compromise of a device’s CoT. However, mented a string of inter-dependent mechanisms aimed at not only do these bootloaders necessarily need to take removing the possibility of persistent compromise from untrusted input from an attacker in control of the OS in the device.
    [Show full text]
  • Mediatek Linkit™ Development Platform for RTOS Get Started Guide
    MediaTek LinkIt™ Development Platform for RTOS Get Started Guide Version: 3.0 Release date: 30 June 2016 © 2015 - 2016 MediaTek Inc. This document contains information that is proprietary to MediaTek Inc. (“MediaTek”) and/or its licensor(s). MediaTek cannot grant you permission for any material that is owned by third parties. You may only use or reproduce this document if you have agreed to and been bound by the applicable license agreement with MediaTek (“License Agreement”) and been granted explicit permission within the License Agreement (“Permitted User”). If you are not a Permitted User, please cease any access or use of this document immediately. Any unauthorized use, reproduction or disclosure of this document in whole or in part is strictly prohibited. THIS DOCUMENT IS PROVIDED ON AN “AS-IS” BASIS ONLY. MEDIATEK EXPRESSLY DISCLAIMS ANY AND ALL WARRANTIES OF ANY KIND AND SHALL IN NO EVENT BE LIABLE FOR ANY CLAIMS RELATING TO OR ARISING OUT OF THIS DOCUMENT OR ANY USE OR INABILITY TO USE THEREOF. Specifications contained herein are subject to change without notice. MediaTek LinkIt™ Development Platform for RTOS Get Started Guide Document Revision History Revision Date Description 1.0 24 March 2016 Initial version. 2.0 17 May 2016 Move the contents relative to flash, HDK, and build comments to corresponding documents. Add the support of Keil 3.0 30 June 2016 Add the support of IAR. Refine the architecture and provide more information on the SDK usage. © 2015 - 2016 MediaTek Inc. Page i of v This document contains information that is proprietary to MediaTek Inc.
    [Show full text]
  • AU OPTRONICS CORP Form SD Filed 2018-05-31
    SECURITIES AND EXCHANGE COMMISSION FORM SD Specialized Disclosure Report Filing Date: 2018-05-31 SEC Accession No. 0000950103-18-006801 (HTML Version on secdatabase.com) FILER AU OPTRONICS CORP Business Address 1 LI HSIN RD 2 CIK:1172494| IRS No.: 000000000 SCIENC BASED INUSTRIAL Type: SD | Act: 34 | File No.: 001-31335 | Film No.: 18869971 PARK SIC: 3674 Semiconductors & related devices HSIN CHU 300 TAIWAN F5 00000 852-2514-7600 Copyright © 2018 www.secdatabase.com. All Rights Reserved. Please Consider the Environment Before Printing This Document UNITED STATES SECURITIES AND EXCHANGE COMMISSION Washington, D.C. 20549 FORM SD Specialized Disclosure Report (Exact Name of Registrant as Specified in Its Charter) TAIWAN, REPUBLIC OF CHINA 001-31335 Not Applicable (State or other jurisdiction of incorporation or organization) (Commission File Number) (IRS Employer Identification No.) 1 LI-HSIN ROAD 2 HSINCHU SCIENCE PARK HSINCHU, TAIWAN REPUBLIC OF CHINA (Address of principal executive offices) Benjamin Tseng Chief Financial Officer 1 Li-Hsin Road 2 Hsinchu Science Park Hsinchu, Taiwan Republic of China Telephone No.: +886-3-500-8800 Facsimile No.: +886-3-564-3370 Email: [email protected] (Name and telephone, including area code, of the person to contact in connection with this report) Check the appropriate box to indicate the rule pursuant to which this form is being filed, and provide the period to which the information in this form applies: Rule 13p-1 under the Securities Exchange Act (17 CFR 240.13p-1) under the Exchange Act for the reporting period from ☒ January 1 to December 31, 2017. Copyright © 2018 www.secdatabase.com.
    [Show full text]
  • We Shape the Connected World Automotive Autonomy Generating Energy Effectively Wearable Technology ARM’S Technology Is Cars Are Becoming Mobile Computing Platforms
    ARM Holdings plc Annual Report 2015: Strategic Report We shape the connected world Automotive autonomy Generating energy effectively Wearable technology ARM’s technology is Cars are becoming mobile computing platforms. Wind turbines and solar panels can be made Smart watches, biometric-monitors and More sensors and cameras are being included more effective by including technology that augmented reality headsets are intelligent, to assist the driver with lane detection, reading controls and monitors the wind turbine, and connected devices that can give us extra shaping the way we roadside signage and identifying potential hazards aggregates data across the entire wind farm. information to improve our health and or people crossing the road. In time, driver wellness, or just to help us have more fun. all live our lives; in the assistance may lead to a fully automated vehicle. home, as we travel, at school or work, and as we have fun with our friends Mobile computing Smart city streets Intelligent networks Smarter homes ARM-based mobile computers, including City infrastructure from street lights to car Broadband and mobile phone network speeds Cost-efficiency in the home can be improved smartphones, tablets and some laptops are, parking meters can be made more effective by are increasing, and latency decreasing, enabling through learning thermostats that understand for many people, the primary device for their embedding intelligent chips. Street lights that new services for operators to provide to your daily routine, domestic appliances that use work, whether in an office or on the road; can dim when no one is nearby will save energy consumers and enterprises, from delivering advanced algorithms for calculating water and for researching and writing school assignments; and reduce carbon emissions, and prognostics in more movie and TV options to collating and detergent requirements, and smart meters that and for engaging with friends.
    [Show full text]
  • Taiwan: Semiconductor Cluster
    Taiwan: Semiconductor Cluster Yao Chew Ruijian Li Eric Otoo David Tiomkin Tina Tran Harvard Business School Microeconomics of Competitiveness Course Paper May 2, 2007 Table of Contents 1. Introduction............................................................................................................................. 2 2. Country Analysis ..................................................................................................................... 2 2.1. Position, Brief History and Political Tension with Mainland China..................................... 2 2.2. Taiwan’s Country Balance Sheet in 1950............................................................................ 3 2.3. Economy from 1950 to present ........................................................................................... 4 2.4. Current Economic Position ................................................................................................. 5 2.5. Productivity and Competitiveness ....................................................................................... 7 2.6. Business and Political Environment .................................................................................... 8 2.7. National Diamond............................................................................................................. 10 3. Cluster Analysis..................................................................................................................... 12 3.1 The ITRI and Institutes for Collaboration (IFCs) ..............................................................
    [Show full text]
  • Mediatek Inc
    01 May 2015 Asia Pacific/Taiwan Equity Research Semiconductor Devices MediaTek Inc. (2454.TW / 2454 TT) Rating NEUTRAL* Price (30 Apr 15, NT$) 395.00 RESULTS Target price (NT$) 405.00¹ Upside/downside (%) 2.5 Mkt cap (NT$ mn) 708,117 (US$ 23,121) 2Q lacks growth, but a high bar is set for 2H Enterprise value (NT$ mn) 544,619 ■ 1Q15 results in line with CS, but below street. 1Q15 sales were already Number of shares (mn) 1,792.70 Free float (%) 89.1 reported at NT$47.5 bn, -14.3% QoQ. Smartphone shipments were 85 mn 52-week price range 535.0 - 390.0 (30mn LTE), down from 95-100mn in 4Q14 due to seasonality and emerging ADTO - 6M (US$ mn) 101.0 market weakness. GMs met our 47.3% vs 46-48% guidance and OpM was also *Stock ratings are relative to the coverage universe in each analyst's or each team's respective sector. in line at 16.1% on cost controls. Lower non-op income kept EPS only in line ¹Target price is for 12 months. with our NT$4.62 and below street's NT$4.97. Research Analysts ■ 2Q15 guidance below, inventory elevated. Sales were guided -5% to +3% Randy Abrams, CFA QoQ, below CS/street's +9%/+18% QoQ on 3G price pressure and 4G mix 886 2 2715 6366 [email protected] skewed to the entry level. Margins are in line, with GMs at 45.5-47.5% and Nickie Yue OpM at 12.5-16.5%. Inventory is elevated, at 102 days and guided to stay 886 2 2715 6364 98-110 days in 2Q15, requiring 2H15 acceleration.
    [Show full text]
  • Abstract: the Preparatory Briefing on Taiwan Is the Result of the Collection of Relevant Cluster Information in the Country
    Project name Supporting international cluster and business network cooperation through the further development of the European Cluster Collaboration Platform Project acronym ECCP Deliverable title and number D 3.2. – Preparatory Briefing on Taiwan Related work package WP3 Deliverable lead, and partners SPI involved Reviewed by Inno, Commission Contractual delivery date M12 Actual delivery date M15 Start date of project September, 23rd 2015 Duration 4 years Document version V2 Abstract: The preparatory briefing on Taiwan is the result of the collection of relevant cluster information in the country, including business and sector trends, cluster policies and programmes, as well as a cluster mapping. This document is intended to provide an overview of the country’s opportunities for European cluster organisations and SMEs © — 2018 – European Union. All rights reserved The information and views set out in this report are those of the author(s) and do not necessarily reflect the official opinion of the Executive Agency for Small and Medium-sized Enterprises (EASME) or of the Commission. Neither EASME, nor the Commission can guarantee the accuracy of the data included in this study. Neither EASME, nor the Commission or any person acting on their behalf may be held responsible for the use which may be made of the information contained therein. D.3.2 - Preparatory Briefing on Taiwan Content 1 Objective of the report .................................................................................................................... 3 2 Taiwan
    [Show full text]
  • Statistical and Algebraic Cryptanalysis of Lightweight and Ultra-Lightweight Symmetric Primitives
    Statistical and Algebraic Cryptanalysis of Lightweight and Ultra-Lightweight Symmetric Primitives THÈSE NO 5415 (2012) PRÉSENTÉE LE 27 AOÛT 2012 À LA FACULTÉ INFORMATIQUE ET COMMUNICATIONS LABORATOIRE DE SÉCURITÉ ET DE CRYPTOGRAPHIE PROGRAMME DOCTORAL EN INFORMATIQUE, COMMUNICATIONS ET INFORMATION ÉCOLE POLYTECHNIQUE FÉDÉRALE DE LAUSANNE POUR L'OBTENTION DU GRADE DE DOCTEUR ÈS SCIENCES PAR Pouyan SEPEHRDAD acceptée sur proposition du jury: Prof. E. Telatar, président du jury Prof. S. Vaudenay, directeur de thèse Prof. A. Canteaut, rapporteur Prof. A. Lenstra, rapporteur Prof. W. Meier, rapporteur Suisse 2012 To my two angels of God, my mother and father whom without their help, devotion, affection, love and support not only this dissertation could not be accomplished, but I was not able to put my feet one step forward towards improvement. Abstract Symmetric cryptographic primitives such as block and stream ciphers are the building blocks in many cryptographic protocols. Having such blocks which provide provable security against various types of attacks is often hard. On the other hand, if possible, such designs are often too costly to be implemented and are usually ignored by practitioners. Moreover, in RFID protocols or sensor networks, we need lightweight and ultra-lightweight algorithms. Hence, cryptographers often search for a fair trade-off between security and usability depending on the application. Contrary to public key primitives, which are often based on some hard problems, security in symmetric key is often based on some heuristic assumptions. Often, the researchers in this area argue that the security is based on the confidence level the community has in their design. Consequently, everyday symmetric protocols appear in the literature and stay secure until someone breaks them.
    [Show full text]
  • IN the UNITED STATES DISTRICT COURT for the WESTERN DISTRICT of TEXAS WACO DIVISION AMERICAN PATENTS LLC, Plaintiff, V. ANALOG D
    Case 6:18-cv-00356 Document 1 Filed 12/06/18 Page 1 of 64 IN THE UNITED STATES DISTRICT COURT FOR THE WESTERN DISTRICT OF TEXAS WACO DIVISION AMERICAN PATENTS LLC, CIVIL ACTION NO. 6:18-CV-356 Plaintiff, ORIGINAL COMPLAINT FOR v. PATENT INFRINGEMENT ANALOG DEVICES, INC., CYPRESS JURY TRIAL DEMANDED SEMICONDUCTOR CORPORATION, MARVELL INTERNATIONAL, LTD., MEDIATEK INC., and MEDIATEK USA INC., Defendants. ORIGINAL COMPLAINT FOR PATENT INFRINGEMENT Plaintiff American Patents LLC (“American Patents” or “Plaintiff”) files this original complaint against Defendants Analog Devices, Inc., Cypress Semiconductor Corporation, Marvell International, Ltd., MediaTek Inc., and MediaTek USA Inc. (collectively “Defendants”), alleging, based on its own knowledge as to itself and its own actions and based on information and belief as to all other matters, as follows: PARTIES 1. American Patents is a limited liability company formed under the laws of the State of Texas, with its principal place of business at 2325 Oak Alley, Tyler, Texas, 75703. 2. Analog Devices, Inc. (“Analog”) is a corporation organized and existing under the laws of the state of Massachusetts. It can be served via its registered agent: CT Corp System, 1999 Bryan Street, Suite 900, Dallas, TX 75201. 3. Analog is one of the world’s largest manufacturers of integrated circuits. Case 6:18-cv-00356 Document 1 Filed 12/06/18 Page 2 of 64 4. Cypress Semiconductor Corporation (“Cypress”) is a corporation organized under the laws of the state of Delaware. Cypress can be served with process by serving its registered agent: Corporation Service Company d/b/a CSC-Lawyers Incorporating Service Company, 211 E.
    [Show full text]
  • A Systematic Survey of Firmware Extraction Techniques for Iot Devices
    Breaking all the Things | A Systematic Survey of Firmware Extraction Techniques for IoT Devices Sebastian Vasile, David Oswald, and Tom Chothia University of Birmingham [email protected], [email protected], [email protected] Abstract. In this paper, we systematically review and categorize differ- ent hardware-based firmware extraction techniques, using 24 examples of real, wide-spread products, e.g. smart voice assistants (in particular Amazon Echo devices), alarm and access control systems, as well as home automation devices. We show that in over 45% of the cases, an exposed UART interface is sufficient to obtain a firmware dump, while in other cases, more complicated, yet still low-cost methods (e.g. JTAG or eMMC readout) are needed. In this regard, we perform an in-depth investiga- tion of the security concept of the Amazon Echo Plus, which contains significant protection methods against hardware-level attacks. Based on the results of our study, we give recommendations for countermeasures to mitigate the respective methods. 1 Introduction Extracting the firmware from IoT devices is a crucial first step when analysing the security of such systems. From a designer's point of view, preventing the firmware from falling into the hands of an adversary is often desirable: for in- stance, to protect cryptographic keys that identify a device and to impede prod- uct counterfeit or IP theft. The large variety of IoT devices results in different approaches to firmware extraction, depending on the device in question. Past work has looked at the state of security of IoT devices, e.g.
    [Show full text]
  • ARM Roadmap Spring 2017
    ARM Roadmap Spring 2017 Robert Boys [email protected] Version 9.0 Agenda . Roadmap . Architectures ARM1™ die . Issues . What is NEW ! . big.LITTLE™ . 64 Bit . Cortex®-A15 . 64 BIT . DynamIQ 3 © ARM 2017 In the Beginning… . 1985 32 years ago in a barn.... 12 engineers . Cash from Apple and VLSI . IP from Acorn Computers . Proof of concept . No patents, no independent customers, product not ready for mass market. A barn, some energy, experience and belief: “We’re going to be the Global Standard” 4 © ARM 2017 The Cortex Processor Roadmap in 2008 Application Real-time Microcontroller Cortex-A9 Cortex-A8 ARM11 Cortex-R4F ARM9 Cortex-R4 ARM7TDMI ARM7 Cortex-M3 SC300 Cortex-M1 5 © ARM 2017 5 Cortex-A73 ARM 2017 Processor Roadmap Cortex-A35 Cortex-A32 Cortex-A72 Cortex-A57 ARM 7, 9, 11 Cortex-A17 Application Cortex-A53 Cortex-A15 Real-time Not to scale to Not Cortex-A9 (Dual) Microcontroller Cortex-A9 (MPCore) Cortex-A8 Cortex-A7 ARM11(MP) Cortex-A5 MMU ARM926EJ-S Cortex-R52 No MMU Cortex-R8 200+ MHz Cortex-R7 ARM9 Cortex-R5 Cortex-R4 Cortex-M7 200+ MHz Cortex-M33 ARM7TDM 72 – 150 + MHz Cortex-M4 Cortex-M3 ARM7I SC300 Cortex-M23 DesignStart™ Cortex-M1 SC000 Cortex-M0+ Cortex-M0 6 © ARM 2017 6 Versions, cores and architectures ? Family Architecture Cores ARM7TDMI ARMv4T ARM7TDMI(S) ARM9 ARM9E ARMv5TE ARM926EJ-S, ARM966E-S ARM11 ARMv6 (T2) ARM1136(F), 1156T2(F)-S, 1176JZ(F), ARM11 MPCore™ Cortex-A ARMv7-A Cortex-A5, A7, A8, A9, A12, A15, A17 Cortex-R ARMv7-R Cortex-R4(F), Cortex-R5, R7, R8 … Cortex-M ARMv7-M Cortex-M3, M4, M7 (M7 is ARMv7-ME) ARMv6-M Cortex-M1, M0, M0+ NEW ! ARMv8-A 64 Bit: Cortex-A35/A53/57/A72 Cortex-A73 Cortex-A32 NEW ! ARMv8-R 32 Bit: Cortex-R52 NEW ! ARMv8-M 32 Bit: Cortex-M23 & M33 TrustZone® 7 © ARM 2017 What is New ? DynamIQ ! .
    [Show full text]
  • Hsinchu Science Park 2006 04 May Hsia
    The Development and Outlook of Taiwan’s Science Parks October 2, 2006 Definition of “Science Park” .Near Universities and research centers .Encouraging knowledge-based industries .Helping start-ups 1 Linear Model of Innovation 1. Basic Science Universities 2. Applied Science Research Institutes 3. Technological Development Companies 4. Product Markets Development of Science Parks .1950: Stanford University Science Park .1959: Research Triangle Science Park .1965: Herriot-Watt Univ. Science Park .1970: 22 Science Parks .1970-1980: 39-> Hsinchu Science Park .1980-1990: 270 .1990-2000: 473 2 Taiwan’s Economic Development .1950s –Consumer Goods Industry (Export Zones) .1960s - Rapid Growth of Light Industry (Industrial Parks) .1970s - Capital & Technology Intensive Industries (Research Institutes) .1980s - High-Tech Industries (Sciences Parks) Hsinchu Science Park TaipeiTaipei CKSCKS Internation1 Internation1 Airport Airport HSINCHU SCIENCE PARK TaichungTaichung KaoshiungKaoshiung 3 Hsinchu Science Park HISTORY: Started in 1980 OPERATION: Managed by Park Administration, National Science Council Objectives .Attract Domestic and International High-tech Investors .Facilitate High-tech Development .Recruit High-tech Talents To Enhance HSP Economic Development STSP CTSP 4 Development Model of Hsinchu Science Park 1. Basic Science Universities 2. Applied Science Research Institutes 3. Technological Development Companies 4. Product Markets Incentives and Supports 5 What Science Parks Offer .Easy Access .Academic Environment .Sound Infrastructure
    [Show full text]