KR20140118199A - System and method for operating drm contents, and apparatus applied to the same - Google Patents
System and method for operating drm contents, and apparatus applied to the same Download PDFInfo
- Publication number
- KR20140118199A KR20140118199A KR1020130033690A KR20130033690A KR20140118199A KR 20140118199 A KR20140118199 A KR 20140118199A KR 1020130033690 A KR1020130033690 A KR 1020130033690A KR 20130033690 A KR20130033690 A KR 20130033690A KR 20140118199 A KR20140118199 A KR 20140118199A
- Authority
- KR
- South Korea
- Prior art keywords
- drm
- content
- contents
- drm content
- execution
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 20
- 238000012790 confirmation Methods 0.000 claims description 10
- 238000012795 verification Methods 0.000 claims description 10
- 238000005516 engineering process Methods 0.000 abstract description 18
- 239000000284 extract Substances 0.000 description 9
- 230000006870 function Effects 0.000 description 9
- 238000010586 diagram Methods 0.000 description 5
- 238000004891 communication Methods 0.000 description 4
- 238000012546 transfer Methods 0.000 description 2
- 238000013475 authorization Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000007257 malfunction Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000008520 organization Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/121—Restricting unauthorised execution of programs
- G06F21/125—Restricting unauthorised execution of programs by manipulating the program code, e.g. source code, compiled code, interpreted code, machine code
- G06F21/126—Interacting with the operating system
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/74—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information operating in dual or compartmented mode, i.e. at least one secure mode
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2149—Restricted operating environment
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Mathematical Physics (AREA)
- Multimedia (AREA)
- Technology Law (AREA)
- Storage Device Security (AREA)
Abstract
Description
The present invention relates to a method for managing rights information required for execution of DRM contents based on TrustZone technology in an isolated operating domain separate from an operating domain in which DRM contents are executed.
In recent years, smartphones have been expanding explosively due to the development of hardware such as application processors and displays, the emergence of mobile operating systems, and the revitalization of the open market.
However, in the case of mobile terminals such as smart phones, the openness of the operating system, the risk of leakage of personal information (eg address book, text messages, financial information, certificates, etc.) due to the open market ecosystem that anyone can develop and participate in, In addition to being able to reproduce security threats on existing PCs, such as terminal malfunctions, excessive charging, and possible attacks on mobile networks, new types of security threats exist in wireless communication environments.
Accordingly, there is a need for a security platform technology capable of providing reliability in a mobile environment in order to protect users and network assets from security threats caused by the loss of a smartphone.
SUMMARY OF THE INVENTION The present invention has been made in view of the above circumstances, and an object of the present invention is to provide a user equipment based on TrustZone technology in which rights information is required in connection with execution of DRM contents in a first operation area The DRM content management unit checks the rights information stored in the second operating area to correspond to the DRM content and executes the DRM content in the first operating area only by checking the rights information stored in the second operating area, To effectively prevent illegal use of DRM contents through a combination of isolated execution environment and hardware security technology.
According to a first aspect of the present invention, there is provided a user device comprising: an execution unit for verifying that rights information is requested in association with execution of DRM contents in a first operating area; And a control unit for checking the rights information stored in the second operation region to correspond to the DRM contents and notifying the rights information stored in the second operation region only by checking the rights information stored in the second operation region, And a confirmation unit for allowing the DRM content to be executed.
More specifically, the user device further includes a storage unit for storing the right information corresponding to the DRM content in the second operation area, and the storage unit receives the previously designated user authentication information and determines that the user is an authorized user Only the DRM content corresponding to the DRM content is stored in the second operating area.
More specifically, the user authentication information is designated to correspond to each of the two or more DRM contents, or to correspond to both of the two or more DRM contents when the DRM contents are two or more.
More specifically, the user apparatus may further include a first operating system mounted on the first operating area and a second operating system mounted on the second operating area, wherein the first operating system further comprises: The DRM content management apparatus of claim 1, wherein the second operating system is a general-purpose operating system that provides an Open Application Program Interface (API) for supporting execution of DRM contents, And an API (Application Programmer Interface) for supporting identification of the application.
According to a second aspect of the present invention, there is provided a method of operating a user device, the method comprising: request verification step of verifying that rights information is requested in association with execution of DRM contents in a first operation area; And a rights information checking step of checking the rights information stored in the second operating area to correspond to the DRM content and executing the DRM content in the first operating area only based on a result of checking the right information stored in the second operating area .
More specifically, the method may further include storing the rights information corresponding to the DRM content in the second operating area before the request checking step, and the storing step may include storing the designated user authentication information And stores the rights information corresponding to the DRM content in the second operation area only when the received user information is authenticated.
More specifically, the user authentication information is designated to correspond to each of the two or more DRM contents, or to correspond to both of the two or more DRM contents, when the DRM contents are two or more.
According to an embodiment of the present invention, there is provided a DRM content execution system, a DRM content execution system, and a DRM content execution method. The DRM content execution system includes: Is managed in a separate isolated operating area, thereby effectively preventing the illegal use of the DRM contents.
1 is a schematic configuration diagram of a DRM content execution system according to an embodiment of the present invention;
2 is a configuration diagram of a user apparatus according to an embodiment of the present invention;
FIG. 3 is a block diagram of a user apparatus employing a TrustZone technology according to an embodiment of the present invention. FIG.
FIG. 4 is a schematic flowchart illustrating an operation flow in a DRM content execution system according to an embodiment of the present invention; FIG.
5 is a schematic flow diagram illustrating operation of a user device according to an embodiment of the present invention;
Hereinafter, an embodiment of the present invention will be described with reference to the accompanying drawings.
1 is a diagram illustrating a DRM content execution system according to an embodiment of the present invention.
1, a DRM content execution system according to an embodiment of the present invention includes a
The
Here, the DRM content refers to multimedia contents for which DRM (Digital Rights Management) has been set. The DRM contents include music, video, electronic documents, and images transmitted through online or offline (Copyright, use rights, etc.) of digital information creators, distributors, publishers, service providers, governments and end users by protecting various types of digital contents such as digital contents.
The
According to an embodiment of the present invention, a hardware security solution is adopted as a security platform technology for preventing unauthorized use (e.g., illegal copy) of DRM contents executed in the
In this regard, there are UICC (Universal Integrated Circuit Card), Mobile TPM (Trusted Platform Module), and the like as a hardware security solution that provides high security in a mobile terminal such as the
Here, the UICC is a smart card for storing personal information such as messages, e-mail and address book as well as subscriber, network and authentication information in 3G mobile network, and is generally called a 'Universal Subscriber Identity Module (USIM) card'.
The Mobile TPM is a Mobile TPM that enables the TPM (Trusted Platform Module) defined by TCG (Trusted Computing Group), a standardization organization developing business standards for hardware-based trusted computing and security technologies, to be used in mobile terminals as well. Algorithm, and provides user, terminal authentication and terminal integrity verification, and user data protection.
UICC, however, can not satisfy the Trusted Execution Environment (TEE), which defines security hardware and software functions that provide a secure execution environment for security-related applications on mobile terminals due to limited performance processors and low transfer rates.
In addition, in the case of Mobile TPM, it has a disadvantage that cost increase due to the use of a separate chip and application code protection are difficult.
Therefore, in an embodiment of the present invention, a TrustZone technology that provides a hardware isolated environment from security threats, rather than using a separate hardware security chip such as the UICC and the Mobile TPM, I want to apply.
3, the trust zone is divided into a 'Normal World' (hereinafter, referred to as a 'first operating region') and a 'Secure World' (hereinafter referred to as a 'second operating region' The general application provides an execution environment that operates in the first operating area and the application that requires security is operated in the second operating area.
That is, the first operating region and the second operating region are isolated from each other in hardware and operate only by respective operating systems (first operating system and second operating system), and the first operating region is attacked from malicious code The applet and the stored data in the second operating area are ensured to be securely managed and executed from malicious code.
In other words, in the case of the first operating area, security can not be assured against various security threats by operating on a general-purpose operating system (first operating system) disclosed to others, but in the case of the second operating area, (Second operating system), which is not disclosed to a third party differently from the first operating region, in a hardware-isolated environment, and thus various security You will be assured of security from threats.
As described above, the
The
More specifically, when it is confirmed that a predetermined fee for use of the DRM contents is paid by the
At this time, the
Here, the DRM content itself includes an execution key (KEY) for executing the DRM content, and the rights information (KEY) corresponding to the execution key is loaded in the rights information.
The
More specifically, the
At this time, the
For this purpose, the
By applying the method of dividing and storing the rights information required for the execution of the DRM contents into the second operating area which is an execution environment isolated in hardware from the DRM contents stored in the first operating area, The rights information stored in the second operating area can not be moved / copied so that execution of the DRM contents moved / copied in the protection of intellectual property rights can not be performed.
Referring to FIG. 3, by executing an associated application (APP) installed in the first operating area in connection with wired / wireless communication, the
In addition, when the reception of the right information in the first operating area is confirmed, an applet mounted in the second operating area is executed in association with information storage, thereby displaying an information input window to receive the user authentication information from the user, The received rights information is stored in the memory area of the second operating area only when it is confirmed that the user is an authenticated user.
In addition, the
More specifically, the
At this time, the
Referring to FIG. 3, an application installed in the first operating area is executed in association with the execution of the content, thereby extracting an execution key mounted on the DRM content stored in the first operating area, To the applet mounted in the second operating area.
The applet receiving the execution key extracts the authority key from the authority information stored in the second operation region, compares the same with the execution key, and transmits the comparison result to the first operation region, So that DRM contents can be normally executed without checking the directly mapped rights information.
Hereinafter, the configuration of the
That is, it has a basic configuration including an
In addition to the above-described configuration, the
Here, the
Here, the first operating system includes an
On the other hand, in the case of the
Here, the second operating system refers to a dedicated operating system that provides the above-described
The receiving
More specifically, the receiving
That is, the receiving
The
More specifically, when the rights information is received from the receiving
That is, the
Here, the user authentication information is cryptographic information set for confirming that the user is accessible to the second operation area, and is set as individual cryptographic information corresponding to each of the DRM contents, or one representative It can be set in advance as password information.
The
More specifically, when the
That is, the
The
More specifically, when the execution key of the DRM content is received from the executing
That is, the
As described above, according to the DRM content execution system according to an embodiment of the present invention, when the DRM content is executed in the first operation area on the basis of the TrustZone technology in the
Hereinafter, an advertisement service method according to an embodiment of the present invention will be described with reference to FIGS. 4 and 5. FIG. Here, for convenience of description, the components shown in FIGS. 1 to 3 will be described with reference to corresponding reference numerals.
First, the operation flow in the DRM contents execution system according to an embodiment of the present invention will be described with reference to FIG.
First, when it is confirmed that a predetermined fee for use of DRM contents has been paid by the
At this time, the
In this regard, the
At this time, the
Then, when the DRM content stored in the first operating area is executed, the
At this time, the
Hereinafter, the operation of the
First, the receiving
At this time, the
Then, when the right information is received from the receiving
At this time, the
In addition, when the
At this time, the
When the execution key of the DRM content is received from the executing
At this time, the
As described above, according to the DRM content reproduction Q method according to the embodiment of the present invention, the
Meanwhile, the steps of a method or algorithm described in connection with the embodiments disclosed herein may be embodied directly in hardware, or may be embodied in a computer readable medium, in the form of a program instruction, which may be carried out through various computer means. The computer-readable medium may include program instructions, data files, data structures, and the like, alone or in combination. The program instructions recorded on the medium may be those specially designed and constructed for the present invention or may be available to those skilled in the art of computer software. Examples of computer-readable media include magnetic media such as hard disks, floppy disks and magnetic tape; optical media such as CD-ROMs and DVDs; magnetic media such as floppy disks; Magneto-optical media, and hardware devices specifically configured to store and execute program instructions such as ROM, RAM, flash memory, and the like. Examples of program instructions include machine language code such as those produced by a compiler, as well as high-level language code that can be executed by a computer using an interpreter or the like. The hardware devices described above may be configured to operate as one or more software modules to perform the operations of the present invention, and vice versa.
While the present invention has been particularly shown and described with reference to exemplary embodiments thereof, it is to be understood that the invention is not limited to the disclosed exemplary embodiments, but, on the contrary, It will be understood by those skilled in the art that various changes in form and details may be made therein without departing from the spirit and scope of the invention as defined by the appended claims.
According to the DRM contents execution system and method, and the device applied thereto, the DRM contents execution system of the present invention restricts the execution of some important functions among the functions loaded in the user apparatus that has received the lost notification based on the TrustZone technology Is an invention that is industrially applicable because it is beyond the limit of the existing technology and is not only the use of the related technology but also the possibility of commercialization or operation of the applied device as well as being practically and practically possible.
100: Content providing device
200: User device
210: execution unit 220: confirmation unit
230: Receiving unit 240:
Claims (7)
The DRM content management apparatus according to claim 1, further comprising: a verification unit configured to verify the rights information stored in the second operation region to correspond to the DRM content, And a confirmation unit for allowing the content to be executed.
The user device comprising:
And a storage unit for storing the rights information corresponding to the DRM contents in the second operation area,
Wherein,
And stores the rights information corresponding to the DRM contents in the second operating area only when it is determined that the user is authenticated by receiving the predetermined user authentication information.
Wherein the user authentication information includes:
Wherein the DRM content is designated to correspond to each of the two or more DRM contents when the DRM contents are two or more, or to correspond to all of the two or more DRM contents.
The user device comprising:
Further comprising a first operating system mounted on the first operating area and a second operating system mounted on the second operating area,
Wherein the first operating system comprises:
A general operating system providing an Open Application Program Interface (API) for supporting execution of the DRM contents in the first operating area,
Wherein the second operating system comprises:
And an API (Application Programmer Interface) for supporting identification of the stored rights information corresponding to the DRM contents in the second operation area.
Checking the rights information stored in the second operating area to correspond to the DRM content and executing the DRM content in the first operating area only based on the result of the checking of the right information stored in the second operating area Wherein the user device is a mobile terminal.
The method comprises:
Storing the rights information corresponding to the DRM content in the second operation area before the request confirmation step,
Wherein,
And storing the rights information corresponding to the DRM content in the second operating area only when it is determined that the user is authenticated by receiving the predetermined user authentication information.
Wherein the user authentication information includes:
Wherein the DRM contents are designated to correspond to the two or more DRM contents when the DRM contents are two or more, or to correspond to all of the two or more DRM contents.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020130033690A KR20140118199A (en) | 2013-03-28 | 2013-03-28 | System and method for operating drm contents, and apparatus applied to the same |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020130033690A KR20140118199A (en) | 2013-03-28 | 2013-03-28 | System and method for operating drm contents, and apparatus applied to the same |
Publications (1)
Publication Number | Publication Date |
---|---|
KR20140118199A true KR20140118199A (en) | 2014-10-08 |
Family
ID=51991085
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
KR1020130033690A KR20140118199A (en) | 2013-03-28 | 2013-03-28 | System and method for operating drm contents, and apparatus applied to the same |
Country Status (1)
Country | Link |
---|---|
KR (1) | KR20140118199A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104581214A (en) * | 2015-01-28 | 2015-04-29 | 三星电子(中国)研发中心 | Multimedia content protecting method and device based on ARM TrustZone system |
-
2013
- 2013-03-28 KR KR1020130033690A patent/KR20140118199A/en not_active Application Discontinuation
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104581214A (en) * | 2015-01-28 | 2015-04-29 | 三星电子(中国)研发中心 | Multimedia content protecting method and device based on ARM TrustZone system |
CN104581214B (en) * | 2015-01-28 | 2018-09-11 | 三星电子(中国)研发中心 | Multimedia content guard method based on ARM TrustZone systems and device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
KR102217501B1 (en) | Mobile device with trusted execution environment | |
Vignesh et al. | Modifying security policies towards BYOD | |
CN109412812B (en) | Data security processing system, method, device and storage medium | |
CN109923548A (en) | Method, system and the computer program product that encryption data realizes data protection are accessed by supervisory process | |
CN103827881A (en) | Method and system for dynamic platform security in a device operating system | |
US20120137372A1 (en) | Apparatus and method for protecting confidential information of mobile terminal | |
KR101403626B1 (en) | Method of integrated smart terminal security management in cloud computing environment | |
CN103403669A (en) | Securing and managing APPs on a device | |
US8862892B2 (en) | System and method for detecting a security compromise on a device | |
US9619653B2 (en) | System and method for detecting a security compromise on a device | |
CN105975867B (en) | A kind of data processing method | |
CN104199657A (en) | Call method and device for open platform | |
CN107403109A (en) | Encryption method and encryption system | |
US20110154436A1 (en) | Provider Management Methods and Systems for a Portable Device Running Android Platform | |
WO2013168255A1 (en) | Application program execution device | |
CN101069154A (en) | Non-intrusive trusted user interface | |
KR20140112785A (en) | Financial service system and method thereof, and apparatus applied to the same | |
CN104955043B (en) | A kind of intelligent terminal security protection system | |
US12002040B2 (en) | Device driver for contactless payments | |
KR20130005950A (en) | System and method for strengthening security of mobile terminal | |
CN102542698B (en) | Safety protective method of electric power mobile payment terminal | |
KR20140118199A (en) | System and method for operating drm contents, and apparatus applied to the same | |
CN104866761B (en) | A kind of high security Android intelligent terminal | |
KR20150030047A (en) | Method and system for application authentication | |
CN111209561B (en) | Application calling method and device of terminal equipment and terminal equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
A201 | Request for examination | ||
E902 | Notification of reason for refusal | ||
E601 | Decision to refuse application |