on Mobile Handset
Larry Shi
2005
Gaming on Mobile Handset Platform –
Emerging Market and Research
Data mining
Emerging Market
GSM 9.6 to 14.4 Kb/sec 115 Kb/sec 384 Kb/sec 384+ Kb/sec
3G (GPRS) (EDGE) (UMTS)
Mobile Graphics
2003 2004 2005 2006 2007 2008
Java JSR 184 (J2ME) JSR 239
OpenGL OpenGL ES 1.0 OpenGL ES 2.0
truly 3D vertex shaders
New Game Applications and Opportunities
WAP
Distributed
Dual simulation model Dual simulation model
Servers
Data Mining of Online
RPG Games For Automatic Task Generation
Online game is service oriented and must be
appealing enough to keep players hooked
Unstructured game play (free roaming) vs.
structured game play (always assign some tasks to
players)
Intelligent task assignment and story-telling for
MMORPG are challenging research topics.
Assign tasks based on player preference (mining
player preference) and virtual world context (mining
player generated data)
Task Database and Task Assignment
A database of task
templates
Avatar Avatar Avatar
Each task template has
completed pre-conditions
tasks roles (empty avatar slots)
completion evaluation
Task templates can be
? organized (one task is a
pre-condition of another
task template
repository task)
Intelligently pick task
template for avatars
Mining Player Generated Data
Enjoy
competition Assign tasks based on player
preference
N Y
#artifacts Violence Task categorization
owned factor
Player profiling
>3 <=3 >0.5 <=0.5 Connecting player profile with
Human Artifact Gun Horse
task characteristics
rescue collection fighting racing
Decision tree based data
mining and task assignment
DRM (Digital Right Management) In Silicon
DRM complexity
Trend of implementing DRM in silicon chips
Research and development
DRM in mobile platform
Complexity of DRM
Reverse engineering
Both software and hardware level
Connection
SVP DVD Content
Protection
SVP HDTV
DVR/Disk
Analog SVP
802.11x DVI SVP 1394
wireless
SVP
SVP SVP
CIM
PDA CableCARD Mobile
DRM in Silicon – Pros and Cons
Pros
Tamper-proof if designed properly
Better protection than software based DRM
Enabler of additional new techniques,
software and business
Cons
Long design cycle, higher cost
Less flexible (implement as firmware)
Not tamper-proof if not designed properly
Hardwired DRM Research – Technical
Perspective
Risk and vulnerability assessment
What are the assumptions
What is possible, what is not possible
Design issues
Identify DRM and security primitives that require tamper
proof protection
Integrate DRM primitives into chip design
DRM+audio chip, DRM+video chip, DRM+micro-processor
Performance issues
High throughput content decryption, descramble
Impact of DRM on chip performance, area, cost, power
DRM on Mobile Platform
Micro-processor DRM
Core (e.g., ARM) License/certificate
Management Protected
Private/public Content
Memory Access key
Firewall Symmetric key
Table
Crypto Engine
Cache
Memory
Controller
Integrate DRM and
South
cryptographic engine into Bridge
micro-processor
Tamper-proof protection of
content in un-trusted
memory modules
Protection of Integrated DRM
BIOS
BIOS is certified and encrypted
Decrypted and authenticated by the right enabled
processor during boot
Digital content (software, data)
authenticated by on-chip DRM module and decrypted by
on-chip crypto-engine on the fly only when they are
needed
Software running in the micro-processor core has no
access to the keys or information that can be used for
reverse-engineer, tamper-proof
Integrate DRM Into Mobile Chip
Sealed Onchip
Internal Crypto Memory LCD Peripheral
Persistent Memory
SRAM Engine Controller Interface Interfaces
(Private Key, device ID)