Open Access

Mobile Broadcast DRM Based on User Identity Card

EURASIP Journal on Wireless Communications and Networking20072007:056050

DOI: 10.1155/2007/56050

Received: 10 December 2006

Accepted: 12 August 2007

Published: 11 November 2007

Abstract

The current mobile broadcast systems do not provide efficient solution for consumption of service and content based on the user identity card such as a smartcard. This prevents users from consuming broadcast service and contents independent of a specific terminal (e.g., the one used for registration or purchase). To provide usage of broadcast services based on the user identity card, mutual authentication needs to be established among the service provider, the terminal, and the user identity card whenever the terminal is changed. The crucial element for this is assuring the service provider, the terminal, and the user identity card by authenticating each entity to the other entities. In this paper, we propose the new authentication scheme, which provides efficient scheme for three kinds of mutual authentications among the service provider, the terminal, and the user identity card. We also construct mobile broadcast DRM system based on the proposed authentication scheme for consumption of broadcast services with multiple terminals.

[12345678910111213141516171819]

Authors’ Affiliations

(1)
Telecommunication R&D Center, Samsung Electronics

References

  1. IP Datacast over DVB-H: Service Purchase and Protection (SPP), DVB, 2006.Google Scholar
  2. OMA BCAST v1.0 enabler Open Mobile Alliance, http://www.openmobilealliance.org/.
  3. Service and Content Protection Specification Open Mobile Alliance, http://www.openmobilealliance.org/.
  4. OMA-DRM-V2_0 enabler :Open Mobile . http://www.openmobilealliance.org/.
  5. 3GPP TS 26.346 : Multimedia broadcast/multicast service (MBMS); protocols and codecs. 3rd Generation Partnership Project, Technical Specification 3GPP TS 26.346, http://www.3gpp.org/.
  6. 3GPP TS 33.246 : Security of multimedia broadcast/multicast service. 3rd Generation Partnership Project, Technical Specification 3GPP TS 33.246, http://www.3gpp.org/.
  7. 3GPP2 X.S0022 : Broadcast and multicast service in cdma2000 wireless IP network. 3rd Generation Partnership Project 2, Technical Specification 3GPP2 X.S0022, http://www.3gpp2.org/.
  8. 3GPP2 S.S0083 : BCMSC security framework. 3rd Generation Partnership Project 2, Technical Specification 3GPP2 S.S0083, http://www.3gpp2.org/.
  9. 3GPP TS 33.220 : Generic authentication architecture, generic bootstrapping architecture. 3rd Generation Partnership Project, Technical Specification 3GPP TS 33.220, http://www.3gpp.org/.
  10. 3GPP TS 31.102 : Characteristics of the universal subscriber identity module (USIM) application. 3rd Generation Partnership Project, Technical Specification 3GPP TS 31.102, http://www.3gpp.org/.
  11. 3GPP2 C.S0023 : Removable user identity module for spread spectrum systems. 3rd Generation Partnership Project 2, Technical Specification 3GPP2 C.S0023, http://www.3gpp2.org/.
  12. Diffie W, Hellman M: New directions in cryptography. IEEE Transactions on Information Theory 1976,22(6):644-654. 10.1109/TIT.1976.1055638MathSciNetView ArticleMATHGoogle Scholar
  13. Elgamal T: A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory 1985,31(4):469-472. 10.1109/TIT.1985.1057074MathSciNetView ArticleMATHGoogle Scholar
  14. Miller SP, Neuman BC, Schiller JI, Saltzer JH: Section E.2.1: Kerberos authentication and authorization system. M.I.T. Project Athena, Cambridge, Mass, USA; 1987.Google Scholar
  15. Conrado C, Kamperman F, Schrijen GJ, Jonker W: Privacy in an identity-based DRM system. Proceedings of the 14th International Workshop on Database and Expert Systems Applications (DEXA '03), September 2003, Prague, Czech Republic 389-395.Google Scholar
  16. Kalker T, Spasojevic M, Said A, Petruszka A, Shah P, Mclean P: A case for person-centric digital rights management. Proceedings of the IEEE Consumer Communications & Networking Conference, (Workshop on Digital Rights Management Impact on Consumer Communications) (CCNC '05), January 2005, Las Vegas, Nev, USAGoogle Scholar
  17. Rescorla E: HTTP over TLS. RFC 2818, http://www.ietf.org/rfc/rfc2818.txt.
  18. 3GPP TS 33.110 : Key establishment between a UICC and a terminal. 3rd Generation Partnership Project, Technical Specification 3GPP TS 33.110, http://www.3gpp.org/.
  19. Rivest RL, Shamir A, Adleman L: A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM 1978,21(2):120-126. 10.1145/359340.359342MathSciNetView ArticleMATHGoogle Scholar

Copyright

© Byung-Rae Lee. 2007

This article is published under license to BioMed Central Ltd. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.