Trusted Mobile Platforms
نویسندگان
چکیده
This article addresses two main topics. Firstly, we review the operation of trusted computing technology, which now appears likely to be implemented in future mobile devices (including mobile phones, PDAs, etc.). Secondly, we consider the possible applications of this technology in mobile devices, and how these applications can be supported using trusted computing technology. We focus in particular on three mobile applications, namely OMA DRM, SIMLock, and software download.
منابع مشابه
Trusted Computing in Mobile Platforms Players, Usage Scenarios, and Interests
Trusted Computing for mobile platforms is considered important, and the approach of the TCG Mobile Phone Work Group is often seen as the most prominent one. However there are more initiatives, approaches, and players, especially in the mobile communications industry. We give an overview on the players and their interests as well as on the options trusted computing can offer and match both with ...
متن کاملTrusted Mobile Devices: Requirements for a Mobile Trusted Platform Module
544 INTRODUCTION In recent years, mobile devices have replaced desktop PCs as the primary computing platform for many users. This trend is encouraged by convenient access to bank accounts, personal networks, and a wide range of networked resources through our tablets and mobile phones (see Fig. 1). Many organizations would like to use mobile devices in the work environment as a cost-savings and...
متن کاملImproving trust in cloud, enterprise, and mobile computing platforms
Trust plays a fundamental role in the adoption of technology by society. Potential consumers tend to avoid a particular technology whenever they feel suspicious about its ability to cope with their security demands. Such a loss of trust could occur in important computing platforms, namely cloud, enterprise, and mobile platforms. In this thesis, we aim to improve trust in these platforms by (i) ...
متن کاملAnalyzing Trusted Elements in Mobile Devices
Since last two decades, we have witnessed a significant trend from PC to mobile devices. The primary focus of this shift on mobile devices is making a device personal to the user, but, unfortunately, neglecting the trustworthiness of mobile devices. Mobile devices consist of many elements in hardware, software (firmware) and a combination of both. Some of these elements on mobile devices are tr...
متن کاملImplementation Aspects of Anonymous Credential Systems for Mobile Trusted Platforms
Anonymity and privacy protection are very important issues for Trusted Computing enabled platforms. Protection mechanisms are required in order to hide activities of the trusted platforms when performing cryptography based transactions over the Internet, which would otherwise compromise the platform’s privacy and with it the users’s anonymity. In order to address this problem, the Trusted Compu...
متن کامل