The current mobile broadcast systems do not provide efficient solution for consumption of service and content based on the user identity card such as a smartcard. This prevents users from consuming broadcast service and contents independent of a specific terminal (e.g., the one used for registration or purchase). To provide usage of broadcast services based on the user identity card, mutual authentication needs to be established among the service provider, the terminal, and the user identity card whenever the terminal is changed. The crucial element for this is assuring the service provider, the terminal, and the user identity card by authenticating each entity to the other entities. In this paper, we propose the new authentication scheme, which provides efficient scheme for three kinds of mutual authentications among the service provider, the terminal, and the user identity card. We also construct mobile broadcast DRM system based on the proposed authentication scheme for consumption of broadcast services with multiple terminals.
References
-
IP Datacast over DVB-H: Service Purchase and Protection (SPP), DV, 2006
-
OMA BCAST v1.0 enabler, (Open Mobile Alliance, http://www), . openmobilealliance.org/ webcite
-
Service and Content Protection Specification, (Open Mobile Alliance, http://www), . openmobilealliance.org/ webcite
-
OMA-DRM-V2_0 enabler, Open Mobile (http://www), . openmobilealliance.org/ webcite
-
3GPP TS 26.346, Multimedia broadcast/multicast service (MBMS); protocols and codecs (3rd Generation Partnership Project, Technical Specification 3GPP TS 26), . 346, http:// www.3gpp.org/ webcite
-
3GPP TS 33.246, Security of multimedia broadcast/multicast service (3rd Generation Partnership Project, Technical Specification 3GPP TS 33), . 246, http://www.3gpp.org/ webcite
-
3GPP2 X.S0022, Broadcast and multicast service in cdma2000 wireless IP network (3rd Generation Partnership Project 2, Technical Specification 3GPP2 X), . S0022, http://www.3gpp2.org/ webcite
-
3GPP2 S.S0083, BCMSC security framework (3rd Generation Partnership Project 2, Technical Specification 3GPP2 S), . S0083, http://www.3gpp2.org/ webcite
-
3GPP TS 33.220, Generic authentication architecture, generic bootstrapping architecture (3rd Generation Partnership Project, Technical Specification 3GPP TS 33), . 220, http:// www.3gpp.org/ webcite
-
3GPP TS 31.102, Characteristics of the universal subscriber identity module (USIM) application (3rd Generation Partnership Project, Technical Specification 3GPP TS 31), . 102, http:// www.3gpp.org/ webcite
-
3GPP2 C.S0023, Removable user identity module for spread spectrum systems (3rd Generation Partnership Project 2, Technical Specification 3GPP2 C), . S0023, http://www.3gpp2.org/ webcite
-
W Diffie, M Hellman, New directions in cryptography. IEEE Transactions on Information Theory 22(6), 644–654 (1976). Publisher Full Text
-
T Elgamal, A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory 31(4), 469–472 (1985). Publisher Full Text
-
SP Miller, BC Neuman, JI Schiller, JH Saltzer, Section E.2.1: Kerberos authentication and authorization system (M.I.T. Project Athena, Cambridge, Mass, USA, 1987)
-
C Conrado, F Kamperman, GJ Schrijen, W Jonker, Privacy in an identity-based DRM system. Proceedings of the 14th International Workshop on Database and Expert Systems Applications (DEXA '03), September 2003, Prague, Czech Republic, 389–395
-
T Kalker, M Spasojevic, A Said, A Petruszka, P Shah, P Mclean, A case for person-centric digital rights management. Proceedings of the IEEE Consumer Communications & Networking Conference, (Workshop on Digital Rights Management Impact on Consumer Communications) (CCNC '05), January 2005, Las Vegas, Nev, USA
-
E Rescorla, HTTP over TLS (RFC 2818, http://www), . ietf.org/rfc/rfc2818.txt webcite
-
3GPP TS 33.110, Key establishment between a UICC and a terminal (3rd Generation Partnership Project, Technical Specification 3GPP TS 33), . 110, http://www.3gpp.org/ webcite
-
RL Rivest, A Shamir, L Adleman, A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM 21(2), 120–126 (1978). Publisher Full Text