会议专题

Trusted Computing Based Mobile DRM Authentication Scheme

Rapid development of mobile communications business leads to greater focus on effective mobile DRM (digital right management) for providing improved content protection. To be able to guarantee DRM policies enforcement, the trusted mobile working environment based on a tamperresistant hardware module is needed. In this paper, firstly, a construction of the trusted mobile computing based on TPM/TPCM is introduced. Thereafter, an example of DRM authentication scheme in user domain integrated with trusted mobile platform is discussed. Based on the new characters provided by trusted computing platform, the authentication scheme can be simplified, which is safe enough to increase the security of latest mobile DRM framework and promote its interoperability and compatibility.

trusted mobile computing mobile platform digital right management identity authentication

Zhen YANG Kefeng FAN Yingxu LAI

School of Computer Beijing University of Technology Beijing 100124,China Information Security Center State Key Laboratory of Networking and Switching Technology Beijing Univ

国际会议

The Fifth International Conference on Information Assurance and Security(第五届信息保障与安全国际会议)

西安

英文

7-10

2009-08-18(万方平台首次上网日期,不代表论文的发表时间)