Open Access Research Article

Mobile Broadcast DRM Based on User Identity Card

Byung-Rae Lee

Author Affiliations

Telecommunication R&D Center, Samsung Electronics, Suwon-si, Gyenggi-do 443-742, South Korea

EURASIP Journal on Wireless Communications and Networking 2007, 2007:056050  doi:10.1155/2007/56050


The electronic version of this article is the complete one and can be found online at: http://jwcn.eurasipjournals.com/content/2007/1/056050


Received: 10 December 2006
Revisions received: 22 July 2007
Accepted: 12 August 2007
Published: 11 November 2007

© 2007 Lee

This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

The current mobile broadcast systems do not provide efficient solution for consumption of service and content based on the user identity card such as a smartcard. This prevents users from consuming broadcast service and contents independent of a specific terminal (e.g., the one used for registration or purchase). To provide usage of broadcast services based on the user identity card, mutual authentication needs to be established among the service provider, the terminal, and the user identity card whenever the terminal is changed. The crucial element for this is assuring the service provider, the terminal, and the user identity card by authenticating each entity to the other entities. In this paper, we propose the new authentication scheme, which provides efficient scheme for three kinds of mutual authentications among the service provider, the terminal, and the user identity card. We also construct mobile broadcast DRM system based on the proposed authentication scheme for consumption of broadcast services with multiple terminals.

References

  1. IP Datacast over DVB-H: Service Purchase and Protection (SPP), DV, 2006

  2. OMA BCAST v1.0 enabler, (Open Mobile Alliance, http://www), . openmobilealliance.org/ webcite

  3. Service and Content Protection Specification, (Open Mobile Alliance, http://www), . openmobilealliance.org/ webcite

  4. OMA-DRM-V2_0 enabler, Open Mobile (http://www), . openmobilealliance.org/ webcite

  5. 3GPP TS 26.346, Multimedia broadcast/multicast service (MBMS); protocols and codecs (3rd Generation Partnership Project, Technical Specification 3GPP TS 26), . 346, http:// www.3gpp.org/ webcite

  6. 3GPP TS 33.246, Security of multimedia broadcast/multicast service (3rd Generation Partnership Project, Technical Specification 3GPP TS 33), . 246, http://www.3gpp.org/ webcite

  7. 3GPP2 X.S0022, Broadcast and multicast service in cdma2000 wireless IP network (3rd Generation Partnership Project 2, Technical Specification 3GPP2 X), . S0022, http://www.3gpp2.org/ webcite

  8. 3GPP2 S.S0083, BCMSC security framework (3rd Generation Partnership Project 2, Technical Specification 3GPP2 S), . S0083, http://www.3gpp2.org/ webcite

  9. 3GPP TS 33.220, Generic authentication architecture, generic bootstrapping architecture (3rd Generation Partnership Project, Technical Specification 3GPP TS 33), . 220, http:// www.3gpp.org/ webcite

  10. 3GPP TS 31.102, Characteristics of the universal subscriber identity module (USIM) application (3rd Generation Partnership Project, Technical Specification 3GPP TS 31), . 102, http:// www.3gpp.org/ webcite

  11. 3GPP2 C.S0023, Removable user identity module for spread spectrum systems (3rd Generation Partnership Project 2, Technical Specification 3GPP2 C), . S0023, http://www.3gpp2.org/ webcite

  12. W Diffie, M Hellman, New directions in cryptography. IEEE Transactions on Information Theory 22(6), 644–654 (1976). Publisher Full Text OpenURL

  13. T Elgamal, A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory 31(4), 469–472 (1985). Publisher Full Text OpenURL

  14. SP Miller, BC Neuman, JI Schiller, JH Saltzer, Section E.2.1: Kerberos authentication and authorization system (M.I.T. Project Athena, Cambridge, Mass, USA, 1987)

  15. C Conrado, F Kamperman, GJ Schrijen, W Jonker, Privacy in an identity-based DRM system. Proceedings of the 14th International Workshop on Database and Expert Systems Applications (DEXA '03), September 2003, Prague, Czech Republic, 389–395

  16. T Kalker, M Spasojevic, A Said, A Petruszka, P Shah, P Mclean, A case for person-centric digital rights management. Proceedings of the IEEE Consumer Communications & Networking Conference, (Workshop on Digital Rights Management Impact on Consumer Communications) (CCNC '05), January 2005, Las Vegas, Nev, USA

  17. E Rescorla, HTTP over TLS (RFC 2818, http://www), . ietf.org/rfc/rfc2818.txt webcite

  18. 3GPP TS 33.110, Key establishment between a UICC and a terminal (3rd Generation Partnership Project, Technical Specification 3GPP TS 33), . 110, http://www.3gpp.org/ webcite

  19. RL Rivest, A Shamir, L Adleman, A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM 21(2), 120–126 (1978). Publisher Full Text OpenURL