期刊文献+

OMA DRM标准在嵌入式研发实验中的性能分析

Capability analysis of embedded actualization of OMA DRM Ⅱ
下载PDF
导出
摘要 由于数据内容服务在移动业务中起着非常重要的作用,数字版权管理即将成为手持终端一项关键性的部件。对开放移动联盟所定义的数字版权管理开放标准最新版本在手持终端上进行了研发与应用实验,引入了专用硬件模块来处理特定密码学操作,详细分析了其对整体系统性能所起到的重要作用,并对性能指标提升做出了详尽的统计分析。通过对该发布标准的深入分析与探讨,解析了具体实施过程中当受保护数字内容被访问时,相关密码学操作如何被触发及执行过程等细节。通过综合分析分别以软硬件执行特定加解密算法实验后所得到的包括消耗时长在内的统计数据,就能指导架构师在建立系统模型时引入专用硬件处理,从而大大提升系统处理性能及其电池巡航能力。 As digital conteni services gain importance in the mobile world,Digital Rights Management(DRM) applications will become a key component of mobile terminals.This paper examines the effect dedicated hardware macros for specific cryptographic functions have on the performance of a mobile terminal that supports version 2 of the open standard for Digital Rights Management defined by the Open Mobile Alliance (OMA).Following a general description of the standard,the paper contains a detailed analysis of the cryptographic operations that have to be carried out before protected content can be accessed.The combination of this analysis with data on execution times for specific algorithms realized in hardware and software has made it possible to build a model which has allowed us to assert that hardware acceleration for specific cryptographic algorithms can significantly reduce the impact DRM has on a mobile terminal's processing performance and battery life.
出处 《计算机工程与应用》 CSCD 北大核心 2007年第19期19-22,25,共5页 Computer Engineering and Applications
基金 湖北省自然科学基金(the Natural Science Foundation of Hubei Province of China under Grant No.2002ABA055) 武汉市青年科技晨光计划(No.20015005078)
关键词 专用硬件模块 权利对象 终端代理 密码学操作 dedicated hardware rights object terminal agent cryptographic algorithm
  • 相关文献

参考文献11

  • 1Sakurai K,J Ryou C.A DRM framework for secure distribution of mobile contents[C]//van Leeuwen J.Lecture Notes in Computer Science:Networking Technologias for Broadband and Mobile Networks International Conference,February 18-20,2004,Korea.Heidelberg:Springer Berlin Press,2004:905-914.
  • 2Nützel1 J,Beyer A.How to increase the security of digital rights management systems without affecting consumer's security[C]//Gerhard Goos.Lecture Notes in Computer Science:Emerging Trends in Information and Communication Security International Conference,June 6-9,2006.Germany,Heidelberg:Springer Berlin Press,2006:368-380.
  • 3Fischer B,Fontaine C,Giraud C.Enhanced security architecture for music distribution on mobile[C]//Gerhard Goos.Lecture Notes in Computer Science:11th European Symposium on Research in Computer Security Proceedings,September 18-20,2006.Germany,Heidelberg:Springer Berlin Press,2006:97-109.
  • 4Hartel P H,Kleinhuis G,van Buuren R.Security attributes based digital rights management[C]//van Leeuwen J.Lecture Notes in Computer Science:Protocols and Systems for Interactive Distributed Multimedia:Joint International Workshops on Interactive Distributed Multimedia Systems and Protocols for Multimedia Systems,November 26-29,2002,Portugal.Heidelberg:Springer Berlin Press,2002:339-352.
  • 5Nützel J,Beyer A.Towards trust in digital rights management systems[C]//Gerhard Goos.Lecture Notes in Computer Science:Third Trust and Privacy in Digital Business International Conference,September 4-8,2006,Poland.Heidelberg:Springer Berlin Press,2006:162-171.
  • 6Lee Keun-wang,Kim Hong-jin,Park Jae-pyo.A PKI based digital rights management system for safe playback[C]//Hartmanis J.Lecture Notes in Computer Science:International Conference on Intelligent Computing,August 23-26,2005,China.Heidelberg:Springer Berlin Press,2005:801-810.
  • 7Reihaneh S-N,Sheppard N P.License transfer system for supporting content portability in digital rights management[C]//van Leeuwen J.Lecture Notes in Computer Science:Security and Privacy in the Age of Ubiquitous Computing IFIP TC11 20th International Information Security Conference,June 1,2005,Japan.Heidelberg:Springer Berlin Press,2005:189-204.
  • 8Zhang Chang N,Li Zheng.An efficient group key management scheme for secure multicast with multimedia applications[C]//Gerhard Goos.Lecture Notes in Computer Science:First European PKI Workshop:Research and Applications,June 25-26,2004,Greece.Heidelberg:Springer Berlin Press,2004:364-378.
  • 9Wyant J.Applicability of public key cryptosystems to digital rights management applications[C]//Gerhard Goos.Lecture Notes in Computer Science:Financial Cryptography:5th International Conference,February 19-22,2001,British West Indies.Heidelberg:Springer Berlin Press,2002:66-72.
  • 10Rodrfguez E,Delgado J,Llorente S.Workflow description of digital rights management systems[C]//van Leeuwen J.Lecture Notes in Computer Science:On the Move to Meaningful Internet Systems 2004 Workshops OTM Confederated International Workshops and Posters,October 25-29,2004,Cyprus.Heidelberg:Springer Berlin Press,2004:581-592.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部