Skip to main content
  • Research Article
  • Open access
  • Published:

Mobile Broadcast DRM Based on User Identity Card

Abstract

The current mobile broadcast systems do not provide efficient solution for consumption of service and content based on the user identity card such as a smartcard. This prevents users from consuming broadcast service and contents independent of a specific terminal (e.g., the one used for registration or purchase). To provide usage of broadcast services based on the user identity card, mutual authentication needs to be established among the service provider, the terminal, and the user identity card whenever the terminal is changed. The crucial element for this is assuring the service provider, the terminal, and the user identity card by authenticating each entity to the other entities. In this paper, we propose the new authentication scheme, which provides efficient scheme for three kinds of mutual authentications among the service provider, the terminal, and the user identity card. We also construct mobile broadcast DRM system based on the proposed authentication scheme for consumption of broadcast services with multiple terminals.

[12345678910111213141516171819]

References

  1. IP Datacast over DVB-H: Service Purchase and Protection (SPP), DVB, 2006.

  2. OMA BCAST v1.0 enabler Open Mobile Alliance, http://www.openmobilealliance.org/.

  3. Service and Content Protection Specification Open Mobile Alliance, http://www.openmobilealliance.org/.

  4. OMA-DRM-V2_0 enabler :Open Mobile. http://www.openmobilealliance.org/.

  5. 3GPP TS 26.346 : Multimedia broadcast/multicast service (MBMS); protocols and codecs. 3rd Generation Partnership Project, Technical Specification 3GPP TS 26.346, http://www.3gpp.org/.

  6. 3GPP TS 33.246 : Security of multimedia broadcast/multicast service. 3rd Generation Partnership Project, Technical Specification 3GPP TS 33.246, http://www.3gpp.org/.

  7. 3GPP2 X.S0022 : Broadcast and multicast service in cdma2000 wireless IP network. 3rd Generation Partnership Project 2, Technical Specification 3GPP2 X.S0022, http://www.3gpp2.org/.

  8. 3GPP2 S.S0083 : BCMSC security framework. 3rd Generation Partnership Project 2, Technical Specification 3GPP2 S.S0083, http://www.3gpp2.org/.

  9. 3GPP TS 33.220 : Generic authentication architecture, generic bootstrapping architecture. 3rd Generation Partnership Project, Technical Specification 3GPP TS 33.220, http://www.3gpp.org/.

  10. 3GPP TS 31.102 : Characteristics of the universal subscriber identity module (USIM) application. 3rd Generation Partnership Project, Technical Specification 3GPP TS 31.102, http://www.3gpp.org/.

  11. 3GPP2 C.S0023 : Removable user identity module for spread spectrum systems. 3rd Generation Partnership Project 2, Technical Specification 3GPP2 C.S0023, http://www.3gpp2.org/.

  12. Diffie W, Hellman M: New directions in cryptography. IEEE Transactions on Information Theory 1976,22(6):644-654. 10.1109/TIT.1976.1055638

    Article  MathSciNet  MATH  Google Scholar 

  13. Elgamal T: A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory 1985,31(4):469-472. 10.1109/TIT.1985.1057074

    Article  MathSciNet  MATH  Google Scholar 

  14. Miller SP, Neuman BC, Schiller JI, Saltzer JH: Section E.2.1: Kerberos authentication and authorization system. M.I.T. Project Athena, Cambridge, Mass, USA; 1987.

    Google Scholar 

  15. Conrado C, Kamperman F, Schrijen GJ, Jonker W: Privacy in an identity-based DRM system. Proceedings of the 14th International Workshop on Database and Expert Systems Applications (DEXA '03), September 2003, Prague, Czech Republic 389-395.

    Google Scholar 

  16. Kalker T, Spasojevic M, Said A, Petruszka A, Shah P, Mclean P: A case for person-centric digital rights management. Proceedings of the IEEE Consumer Communications & Networking Conference, (Workshop on Digital Rights Management Impact on Consumer Communications) (CCNC '05), January 2005, Las Vegas, Nev, USA

    Google Scholar 

  17. Rescorla E: HTTP over TLS. RFC 2818, http://www.ietf.org/rfc/rfc2818.txt.

  18. 3GPP TS 33.110 : Key establishment between a UICC and a terminal. 3rd Generation Partnership Project, Technical Specification 3GPP TS 33.110, http://www.3gpp.org/.

  19. Rivest RL, Shamir A, Adleman L: A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM 1978,21(2):120-126. 10.1145/359340.359342

    Article  MathSciNet  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Byung-Rae Lee.

Rights and permissions

Open Access This article is distributed under the terms of the Creative Commons Attribution 2.0 International License (https://creativecommons.org/licenses/by/2.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Reprints and permissions

About this article

Cite this article

Lee, BR. Mobile Broadcast DRM Based on User Identity Card. J Wireless Com Network 2007, 056050 (2007). https://doi.org/10.1155/2007/56050

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1155/2007/56050

Keywords