Title
Trusted Computing Based Mobile DRM Authentication Scheme
Abstract
Rapid development of mobile communications business leads to greater focus on effective mobile DRM (digital right management) for providing improved content protection. To be able to guarantee DRM policies enforcement, the trusted mobile working environment based on a tamper-resistant hardware module is needed. In this paper, firstly, a construction of the trusted mobile computing based on TPM/TPCM is introduced. Thereafter, an example of DRM authentication scheme in user domain integrated with trusted mobile platform is discussed. Based on the new characters provided by trusted computing platform, the authentication scheme can be simplified, which is safe enough to increase the security of latest mobile DRM framework and promote its interoperability and compatibility.
Year
DOI
Venue
2009
10.1109/IAS.2009.303
IAS
Keywords
Field
DocType
mobile drm authentication scheme,mobile platform,open systems,trusted mobile working environment,interoperability,mobile communications business,tamper-resistant hardware module,trusted computing,drm policies enforcement,digital right management,mobile working environment,tpm/tpcm,effective mobile drm,drm authentication scheme,digital rights management,identity authentication,message authentication,mobile computing,latest mobile drm framework,authentication scheme,trusted mobile computing,authentication,mobile computer,computer architecture,tamper resistance,cryptography,trusted computing base,mobile communication
Mobile computing,Trusted Network Connect,Trusted Computing,Authentication,Message authentication code,Computer security,Computer science,Computer network,Direct Anonymous Attestation,Mobile telephony,Digital rights management
Conference
Volume
ISBN
Citations 
1
978-0-7695-3744-3
2
PageRank 
References 
Authors
0.42
6
3
Name
Order
Citations
PageRank
Zhen Yang1136.68
Kefeng Fan22810.52
Ying-xu. Lai33713.05