Content Protection based on Trusted computing in Mobile Terminal

被引:0
|
作者
Liu Ren [1 ]
Niu Dongxiao [1 ]
机构
[1] N China Elect Power Univ, Sch Business Adm, Beijing, Peoples R China
关键词
TCM; Trusted Computing; Content Protection; Authentication;
D O I
10.1109/ICIII.2009.204
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
In recent years, the rapid development of trusted computing with active defense ideas to solve security problem of computer and network system, and trusted computing is believed to be the most likely fundamentally solve the security of computer system. It is useful to apply trusted computing into content protect, so content owners can protect their content against non authorized use and copying. At now, the focal point of the industry is applying trusted computing into mobile terminal. This paper gives brief description of mobile terminal hardware architecture based on TCM, and then establishes a trusted computing environment, the emphasis is on how to build user authentication mode about content protection system. This paper proposes a new application for the trusted computing in the filed of mobile terminal.
引用
收藏
页码:192 / 195
页数:4
相关论文
共 50 条
  • [1] Based on Trusted Computing Solutions for Mobile Payment Terminal Security
    Yu, Haiyong
    Li, Peng
    [J]. NINTH WUHAN INTERNATIONAL CONFERENCE ON E-BUSINESS, VOLS I-III, 2010, : 570 - 574
  • [2] A document protection solution in mobile platform based on trusted computing
    Yu, Xiaojun
    Wen, Qiaoyan
    Yan, Tao
    [J]. 2ND INTERNATIONAL SYMPOSIUM ON COMPUTER NETWORK AND MULTIMEDIA TECHNOLOGY (CNMT 2010), VOLS 1 AND 2, 2010, : 251 - 255
  • [3] Research on Smart Mobile Terminal Security Technology Based on Trusted Computing
    Li, Ming
    Fang, Yuan
    Liu, Jun
    [J]. AGRO FOOD INDUSTRY HI-TECH, 2017, 28 (01): : 3278 - 3281
  • [4] DESIGN AND IMPLEMENTATION OF TRUSTED COMPUTING-BASED MUTUAL AUTHENTICATION MODEL FOR MOBILE TERMINAL
    Ma, Zhuo
    Lin, Wei-min
    Zhang, Tao
    Deng, Song
    [J]. 2011 INTERNATIONAL CONFERENCE ON INSTRUMENTATION, MEASUREMENT, CIRCUITS AND SYSTEMS (ICIMCS 2011), VOL 3: COMPUTER-AIDED DESIGN, MANUFACTURING AND MANAGEMENT, 2011, : 309 - 313
  • [5] A scheme based on trusted computing for terminal security
    Zhang, Jun
    Liu, Wei-peng
    Zhou, Zheng
    Li, Jian
    [J]. PROCEEDINGS OF THE FIRST INTERNATIONAL SYMPOSIUM ON DATA, PRIVACY, AND E-COMMERCE, 2007, : 218 - +
  • [6] Mobile Trusted Computing
    Asokan, N.
    Ekberg, Jan-Erik
    Kostiainen, Kari
    Rajan, Anand
    Rozas, Carlos
    Sadeghi, Ahmad-Reza
    Schulz, Steffen
    Wachsmann, Christian
    [J]. PROCEEDINGS OF THE IEEE, 2014, 102 (08) : 1189 - 1206
  • [7] A Trusted Mobile Payment Environment Based on Trusted Computing and Virtualization Technology
    WANG Juan
    LIN Wutao
    LI Haoyu
    DU Bianxia
    MENG Ke
    WANG Jiang
    [J]. Wuhan University Journal of Natural Sciences, 2014, 19 (05) : 379 - 384
  • [8] Design and Implementation of Mobile Trusted Module for Trusted Mobile Computing
    Kim, Mooseop
    Ju, Hongil
    Kim, Youngsae
    Park, Jiman
    Park, Youngsoo
    [J]. IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2010, 56 (01) : 134 - 140
  • [9] Design and Implementation of Mobile Trusted Module for Trusted Mobile Computing
    Kim, Mooseop
    Kim, Youngsae
    Ju, Hongil
    Park, Youngsoo
    [J]. 2010 DIGEST OF TECHNICAL PAPERS INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS ICCE, 2010,
  • [10] An anonymous watermarking scheme for content distribution protection using trusted computing
    Leung, Adrian
    Sen Poh, Geong
    [J]. SECRYPT 2007: PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2007, : 319 - 326