- Research Article
- Open access
- Published:
Mobile Broadcast DRM Based on User Identity Card
EURASIP Journal on Wireless Communications and Networking volume 2007, Article number: 056050 (2007)
Abstract
The current mobile broadcast systems do not provide efficient solution for consumption of service and content based on the user identity card such as a smartcard. This prevents users from consuming broadcast service and contents independent of a specific terminal (e.g., the one used for registration or purchase). To provide usage of broadcast services based on the user identity card, mutual authentication needs to be established among the service provider, the terminal, and the user identity card whenever the terminal is changed. The crucial element for this is assuring the service provider, the terminal, and the user identity card by authenticating each entity to the other entities. In this paper, we propose the new authentication scheme, which provides efficient scheme for three kinds of mutual authentications among the service provider, the terminal, and the user identity card. We also construct mobile broadcast DRM system based on the proposed authentication scheme for consumption of broadcast services with multiple terminals.
References
IP Datacast over DVB-H: Service Purchase and Protection (SPP), DVB, 2006.
OMA BCAST v1.0 enabler Open Mobile Alliance, http://www.openmobilealliance.org/.
Service and Content Protection Specification Open Mobile Alliance, http://www.openmobilealliance.org/.
OMA-DRM-V2_0 enabler :Open Mobile. http://www.openmobilealliance.org/.
3GPP TS 26.346 : Multimedia broadcast/multicast service (MBMS); protocols and codecs. 3rd Generation Partnership Project, Technical Specification 3GPP TS 26.346, http://www.3gpp.org/.
3GPP TS 33.246 : Security of multimedia broadcast/multicast service. 3rd Generation Partnership Project, Technical Specification 3GPP TS 33.246, http://www.3gpp.org/.
3GPP2 X.S0022 : Broadcast and multicast service in cdma2000 wireless IP network. 3rd Generation Partnership Project 2, Technical Specification 3GPP2 X.S0022, http://www.3gpp2.org/.
3GPP2 S.S0083 : BCMSC security framework. 3rd Generation Partnership Project 2, Technical Specification 3GPP2 S.S0083, http://www.3gpp2.org/.
3GPP TS 33.220 : Generic authentication architecture, generic bootstrapping architecture. 3rd Generation Partnership Project, Technical Specification 3GPP TS 33.220, http://www.3gpp.org/.
3GPP TS 31.102 : Characteristics of the universal subscriber identity module (USIM) application. 3rd Generation Partnership Project, Technical Specification 3GPP TS 31.102, http://www.3gpp.org/.
3GPP2 C.S0023 : Removable user identity module for spread spectrum systems. 3rd Generation Partnership Project 2, Technical Specification 3GPP2 C.S0023, http://www.3gpp2.org/.
Diffie W, Hellman M: New directions in cryptography. IEEE Transactions on Information Theory 1976,22(6):644-654. 10.1109/TIT.1976.1055638
Elgamal T: A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory 1985,31(4):469-472. 10.1109/TIT.1985.1057074
Miller SP, Neuman BC, Schiller JI, Saltzer JH: Section E.2.1: Kerberos authentication and authorization system. M.I.T. Project Athena, Cambridge, Mass, USA; 1987.
Conrado C, Kamperman F, Schrijen GJ, Jonker W: Privacy in an identity-based DRM system. Proceedings of the 14th International Workshop on Database and Expert Systems Applications (DEXA '03), September 2003, Prague, Czech Republic 389-395.
Kalker T, Spasojevic M, Said A, Petruszka A, Shah P, Mclean P: A case for person-centric digital rights management. Proceedings of the IEEE Consumer Communications & Networking Conference, (Workshop on Digital Rights Management Impact on Consumer Communications) (CCNC '05), January 2005, Las Vegas, Nev, USA
Rescorla E: HTTP over TLS. RFC 2818, http://www.ietf.org/rfc/rfc2818.txt.
3GPP TS 33.110 : Key establishment between a UICC and a terminal. 3rd Generation Partnership Project, Technical Specification 3GPP TS 33.110, http://www.3gpp.org/.
Rivest RL, Shamir A, Adleman L: A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM 1978,21(2):120-126. 10.1145/359340.359342
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Open Access This article is distributed under the terms of the Creative Commons Attribution 2.0 International License (https://creativecommons.org/licenses/by/2.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
About this article
Cite this article
Lee, BR. Mobile Broadcast DRM Based on User Identity Card. J Wireless Com Network 2007, 056050 (2007). https://doi.org/10.1155/2007/56050
Received:
Revised:
Accepted:
Published:
DOI: https://doi.org/10.1155/2007/56050