Authors:
            
                    György Kálmán
                    
                        
                    
                     and
                
                    Josef Noll
                    
                        
                    
                    
                
        
        
            Affiliation:
            
                    
                        
                    
                    UniK, University Graduate Center, Norway
                
        
        
        
        
        
             Keyword(s):
            Seamless, authentication, smartcard, cryptography, rights management, SIM, home networks, content management.
        
        
            
                Related
                    Ontology
                    Subjects/Areas/Topics:
                
                        Identification, Authentication and Non-Repudiation
                    ; 
                        Information and Systems Security
                    ; 
                        Insider Threats and Countermeasures
                    ; 
                        Models
                    ; 
                        Paradigm Trends
                    ; 
                        Software Engineering
                    
            
        
        
            
                Abstract: 
                With continous internet access, the user behavior is changing. Now, users are creating and sharing their content over the network. With content sharing, the need for protection arises. Currently, no fine grained security solution exists, which provides such functionality for users. Easy and transparent user authentication and access control is of key importance. In this paper, we suggest a solution, where devices on the home network and in PANs may use a common right management infrastructure. Key of our recommendation is the mobile phone, which can act as a trusted key management and distribution unit for the user. In this paper, a solution is shown for easy access right management, a tamper resistant central unit is recommended and a service example is shown.