LICENSE TRANSFER MECHANISMS THROUGH SEAMLESS SIM AUTHENTICATION - Rights Management based on SIM Keys

Josef Noll, Ulf Carlsen, György Kálmán

Abstract

Critical issues in the acceptance of wireless services are the authentication and authorisation to these services. This paper presents the SIM as device for Mobile phone/SIM card based authentication. The mobile phone can be used for physical access (admittance) and service access using near field communication (NFC). It has the potential becoming the identity provider in the virtual/electronic world, enabling wireless network access, VPN and Mobile Commerce application access. The paper extends the seamless service access into the digital rights management, suggesting methods on how the rights keys can be managed on the SIM card, while content remains distributed on the customer devices. Final focus is on the requirements for future SIM cards in order to support the suggested methods.

References

  1. Carlsen, U., Hammerstad, H. & Gorancic, E., Process for Compiling and Executing Software Applications in a Multi-Processor Environment, patent app. NO20045687, May 2003, http://v3.espacenet.com/ textdoc?DB=EPODOC&IDX=WO2004003861&F=0
  2. Lopez Calvet, J.C., 2005. The role of RFID in the mobile phone, Telektronikk 3/4.2005, pp. 131-142
  3. NFC - The Near Field Communication Forum, 2006, Available at: http://www.nfc-forum.org/
  4. Messerges, T.S. & Dabbish, E.A., Digital Rights management in a 3G Mobile Phone and Beyond, DRM 2003, ACM Transactions.
  5. Noll, J., Lopez Calvet, J.C., Myksvoll, K., Admittance Service through Mobile Phone Short Messages, Proc. ICWMC 2006, Bucharest, 28.7-3.8.2006
  6. Noll, J., Ribeiro, V., & Thorsteinsson, S.E., 2005. Telecom perspective on Scenarios and Business in Home Services, Proc. Eurescom Summit 2005, Heidelberg, 27.-29.4.2005, pp. 249-257
  7. OATH - Initiative for open authentication, 2006, Available at: http://www.openauthentication.org/
  8. OBAN - Open Broadband Access Networks, EU FP6 project, 2006, Available at: http://www.telenor.no/fou/prosjekter/oban/
  9. OMA DRM Architecture, Version 2.0, March 2006. Available at: http://www.openmobilealliance.org/ release_program/drm_v2_0.html
  10. Reid, J.F. & Caelli, W.J., DRM, Trusted Computing and Operating System Architecture, Australasian Information Security Workshop, 2005
  11. Somogyi, E, 2006. Seamless access to structured home content. Masterthesis Budapest University of Technology,Jan 2006
  12. Windows Media DRM 10 for Devices, Sept. 2004, at: http://go.microsoft.com/fwlink/?linkid=40518
  13. XrML - eXtensible rights Markup Language, 2001, Available at: http://www.xrml.org/
Download


Paper Citation


in Harvard Style

Noll J., Carlsen U. and Kálmán G. (2006). LICENSE TRANSFER MECHANISMS THROUGH SEAMLESS SIM AUTHENTICATION - Rights Management based on SIM Keys . In Proceedings of the International Conference on Wireless Information Networks and Systems - Volume 1: WINSYS, (ICETE 2006) ISBN 978-972-8865-65-8, pages 333-338. DOI: 10.5220/0002093003330338


in Bibtex Style

@conference{winsys06,
author={Josef Noll and Ulf Carlsen and György Kálmán},
title={LICENSE TRANSFER MECHANISMS THROUGH SEAMLESS SIM AUTHENTICATION - Rights Management based on SIM Keys},
booktitle={Proceedings of the International Conference on Wireless Information Networks and Systems - Volume 1: WINSYS, (ICETE 2006)},
year={2006},
pages={333-338},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002093003330338},
isbn={978-972-8865-65-8},
}


in EndNote Style

TY - CONF
JO - Proceedings of the International Conference on Wireless Information Networks and Systems - Volume 1: WINSYS, (ICETE 2006)
TI - LICENSE TRANSFER MECHANISMS THROUGH SEAMLESS SIM AUTHENTICATION - Rights Management based on SIM Keys
SN - 978-972-8865-65-8
AU - Noll J.
AU - Carlsen U.
AU - Kálmán G.
PY - 2006
SP - 333
EP - 338
DO - 10.5220/0002093003330338