Font Size: a A A

Research On Digital Rights Management Based On Trusted Mobile Platform

Posted on:2010-07-17Degree:MasterType:Thesis
Country:ChinaCandidate:J NieFull Text:PDF
GTID:2178360308479549Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
The Digital Rights Management is new technology that develops by the digital multimedia with the World Wide Web. The Digital Rights Management attempts to protect copyright and the related business rights of the digital multimedia. The Digital Rights Management has managed and controlled the copying, issuing and consuming of digital media by dealing it with PKI and XML technologies, to solve the problem of the copyrights management in the days of digital media.This paper firstly proposed the background of DRM system and the significance of implementation of DRM systems, and presented the current status and trends of DRM system. At the same time the thesis described the architecture and workflow of DRM, as well as the related technology principles of cryptography, PKI, digital watermarking technology and the digital copyright description language. Then the basic concepts, the software and hardware architecture and the key technologies of the Trusted Mobile Platform are introduced. The security flaws and shortcomings of the DRM v2 standard established by OMA for mobile network were analyzed. The idea of Trusted Computing is introduced into the system of OMA DRM v2, the DRM system combining TMP and OMA DRM v2 are designed.Four basic roles are defined, CI, RI, DRM Agent and user. The scheme of user authentication is designed by making use of the combination of USIM cards and TPM, to prevent attacker to obtain sensitive information form mobile equipment illegally. And the specific case bases the download model of Pull model, focusing on four major procedures:the user identity authentication of CI, the formation of RO and the download of DCF, the obtaining of RO and the analysis of DCF in the DRM terminal. The protocol can prevent possible acts of plagiarism in the OMA DRM v2 effectively, as well as Denial of Service attacks and replay attacks.
Keywords/Search Tags:DRM, Trusted Computing, Mobile equipment, Identity authentication
PDF Full Text Request
Related items