METHOD AND A DEVICE FOR MAKING A COMPUTER APPLICATION SECURE
First Claim
1. A security method for making secure a computer application being executed on a terminal, the method comprising:
- obtaining information to the effect that said application is about to invite a user of the terminal to input data;
accessing a binary file representative of a secret image known to the user of the terminal, the binary file being stored in a secure element of the terminal;
constituting a complex image in said secure element, the complex image being obtained from said secret image and from dynamic data that is inaccessible to said terminal; and
displaying said complex image on a screen of the terminal.
1 Assignment
0 Petitions
Accused Products
Abstract
In one embodiment, a security method for making secure a computer application being executed on a terminal is disclosed. In one embodiment the security method comprises obtaining information to the effect that the application is about to invite a user of the terminal to input data, accessing a binary file representative of a secret image known to the user of the terminal, the binary file being stored in a secure element of the terminal, constituting a complex image in the secure element, the complex image being obtained from the secret image and from dynamic data that is inaccessible to said terminal, and displaying the complex image on a screen of the terminal.
-
Citations
16 Claims
-
1. A security method for making secure a computer application being executed on a terminal, the method comprising:
-
obtaining information to the effect that said application is about to invite a user of the terminal to input data; accessing a binary file representative of a secret image known to the user of the terminal, the binary file being stored in a secure element of the terminal; constituting a complex image in said secure element, the complex image being obtained from said secret image and from dynamic data that is inaccessible to said terminal; and displaying said complex image on a screen of the terminal. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A security device for making secure a computer application being executed on a terminal, the method comprising:
-
a component configured to obtain information to the effect that said application is about to invite a user of the terminal to input data; a component configured to access a binary file representative of a secret image known to the user of the terminal, the binary file being stored in a secure element of the terminal; a component configured to constitute a complex image in said secure element, the complex image being obtained from said secret image and from dynamic data that is inaccessible to said terminal; and a component configured to display said complex image on a screen of the terminal. - View Dependent Claims (13, 14, 15, 16)
-
Specification