Title :
Content Protection Based on Trusted Computing in Mobile Terminal
Author :
Ren, Liu ; Niu Dongxiao
Author_Institution :
Sch. of Bus. Adm., North China Electr. Power Univ., Beijing, China
Abstract :
In recent years, the rapid development of trusted computing with active defense ideas to solve security problem of computer and network system, and trusted computing is believed to be the most likely fundamentally solve the security of computer system. It is useful to apply trusted computing into content protect, so content owners can protect their content against non authorized use and copying. At now, the focal point of the industry is applying trusted computing into mobile terminal. This paper gives brief description of mobile terminal hardware architecture based on TCM, and then establishes a trusted computing environment, the emphasis is on how to build user authentication mode about content protection system. This paper proposes a new application for the trusted computing in the filed of mobile terminal.
Keywords :
authorisation; cryptography; mobile computing; mobile radio; content protection system; mobile phone; mobile terminal hardware architecture; trusted computing; trusted cryptography module; user authentication mode; Authentication; Computer architecture; Computer networks; Computer security; Cryptography; Embedded computing; Hardware; Mobile computing; Mobile handsets; Protection; Authentication; Content Protection; TCM; Trusted Computing;
Conference_Titel :
Information Management, Innovation Management and Industrial Engineering, 2009 International Conference on
Conference_Location :
Xi´an
Print_ISBN :
978-0-7695-3876-1
DOI :
10.1109/ICIII.2009.204