Security Strategy of DRM Based on Trusted Computing

Provided by: Binary Information Press
Topic: Security
Format: PDF
Trusted computing provides a good technical support for the safe use of digital rights management, which keeps control effectually by monitoring the consumer's behavior. Digital rights management system based on trusted computing is designed, in which identity authentication employs direct anonymous authentication and validation of controller uses property certificate based attestation. Asymmetric session key is generated and calculated by server and client together through Diffie-Hellman key exchange protocol, integrate it into the integrity reporting protocol, and then the session key encrypts digital information.

Find By Topic