DocumentCode :
1801269
Title :
Trusted Computing Based Mobile DRM Authentication Scheme
Author :
Yang, Zhen ; Fan, Kefeng ; Lai, Yingxu
Author_Institution :
Sch. of Comput., Beijing Univ. of Technol., Beijing, China
Volume :
1
fYear :
2009
fDate :
18-20 Aug. 2009
Firstpage :
7
Lastpage :
10
Abstract :
Rapid development of mobile communications business leads to greater focus on effective mobile DRM (digital right management) for providing improved content protection. To be able to guarantee DRM policies enforcement, the trusted mobile working environment based on a tamper-resistant hardware module is needed. In this paper, firstly, a construction of the trusted mobile computing based on TPM/TPCM is introduced. Thereafter, an example of DRM authentication scheme in user domain integrated with trusted mobile platform is discussed. Based on the new characters provided by trusted computing platform, the authentication scheme can be simplified, which is safe enough to increase the security of latest mobile DRM framework and promote its interoperability and compatibility.
Keywords :
digital rights management; message authentication; mobile computing; open systems; TPM/TPCM; digital right management; interoperability; mobile DRM authentication scheme; tamper-resistant hardware module; trusted mobile computing; trusted mobile working environment; Authentication; Business communication; Computer networks; Cryptography; Electronic mail; Hardware; Information security; Mobile communication; Mobile computing; Telecommunication computing; digital right management; identity authentication; mobile platform; trusted mobile computing;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Information Assurance and Security, 2009. IAS '09. Fifth International Conference on
Conference_Location :
Xian
Print_ISBN :
978-0-7695-3744-3
Type :
conf
DOI :
10.1109/IAS.2009.303
Filename :
5283183
Link To Document :
بازگشت