Skip to Main Content
In recent years, the rapid development of trusted computing with active defense ideas to solve security problem of computer and network system, and trusted computing is believed to be the most likely fundamentally solve the security of computer system. It is useful to apply trusted computing into content protect, so content owners can protect their content against non authorized use and copying. At now, the focal point of the industry is applying trusted computing into mobile terminal. This paper gives brief description of mobile terminal hardware architecture based on TCM, and then establishes a trusted computing environment, the emphasis is on how to build user authentication mode about content protection system. This paper proposes a new application for the trusted computing in the filed of mobile terminal.