Abstract | ||
---|---|---|
Rapid development of mobile communications business leads to greater focus on effective mobile DRM (digital right management) for providing improved content protection. To be able to guarantee DRM policies enforcement, the trusted mobile working environment based on a tamper-resistant hardware module is needed. In this paper, firstly, a construction of the trusted mobile computing based on TPM/TPCM is introduced. Thereafter, an example of DRM authentication scheme in user domain integrated with trusted mobile platform is discussed. Based on the new characters provided by trusted computing platform, the authentication scheme can be simplified, which is safe enough to increase the security of latest mobile DRM framework and promote its interoperability and compatibility. |
Year | DOI | Venue |
---|---|---|
2009 | 10.1109/IAS.2009.303 | IAS |
Keywords | Field | DocType |
mobile drm authentication scheme,mobile platform,open systems,trusted mobile working environment,interoperability,mobile communications business,tamper-resistant hardware module,trusted computing,drm policies enforcement,digital right management,mobile working environment,tpm/tpcm,effective mobile drm,drm authentication scheme,digital rights management,identity authentication,message authentication,mobile computing,latest mobile drm framework,authentication scheme,trusted mobile computing,authentication,mobile computer,computer architecture,tamper resistance,cryptography,trusted computing base,mobile communication | Mobile computing,Trusted Network Connect,Trusted Computing,Authentication,Message authentication code,Computer security,Computer science,Computer network,Direct Anonymous Attestation,Mobile telephony,Digital rights management | Conference |
Volume | ISBN | Citations |
1 | 978-0-7695-3744-3 | 2 |
PageRank | References | Authors |
0.42 | 6 | 3 |
Name | Order | Citations | PageRank |
---|---|---|---|
Zhen Yang | 1 | 13 | 6.68 |
Kefeng Fan | 2 | 28 | 10.52 |
Ying-xu. Lai | 3 | 37 | 13.05 |