By Topic

Content Protection Based on Trusted Computing in Mobile Terminal

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Liu Ren ; Sch. of Bus. Adm., North China Electr. Power Univ., Beijing, China ; Niu Dongxiao

In recent years, the rapid development of trusted computing with active defense ideas to solve security problem of computer and network system, and trusted computing is believed to be the most likely fundamentally solve the security of computer system. It is useful to apply trusted computing into content protect, so content owners can protect their content against non authorized use and copying. At now, the focal point of the industry is applying trusted computing into mobile terminal. This paper gives brief description of mobile terminal hardware architecture based on TCM, and then establishes a trusted computing environment, the emphasis is on how to build user authentication mode about content protection system. This paper proposes a new application for the trusted computing in the filed of mobile terminal.

Published in:

2009 International Conference on Information Management, Innovation Management and Industrial Engineering  (Volume:2 )

Date of Conference:

26-27 Dec. 2009