VERIFICATION APPLICATION, METHOD, ELECTRONIC DEVICE AND COMPUTER PROGRAM
First Claim
1. A verification application arranged to interact with other applications on an electronic device, the electronic device having a processor, a memory and an operating system controlling operation of the verification application and the other applications on the processor using arbitrary memory locations, where the other applications are enabled to call the verification application to securely determine authenticity of a user of the electronic device, wherein the verification application is further arranged toreceive verification data for secure determination of authenticity of the user;
- andprovide, upon a call from any of the other applications and a match between the verification data and a verification reference, a trust token to the calling application.
1 Assignment
0 Petitions
Accused Products
Abstract
There is a verification application arranged to interact with other applications on an electronic device, the electronic device having a processor, a memory and an operating system controlling operation of the verification application and the other applications on the processor using arbitrary memory locations, where the other applications are enabled to call the verification application to securely determine authenticity of a user of the electronic device. The verification application is arranged to receive verification data for secure determination of authenticity of the user; and provide, upon a call from any of the other applications and a match between the verification data and a verification reference, a trust token to the calling application. A method, electronic device and computer program are also disclosed.
-
Citations
23 Claims
-
1. A verification application arranged to interact with other applications on an electronic device, the electronic device having a processor, a memory and an operating system controlling operation of the verification application and the other applications on the processor using arbitrary memory locations, where the other applications are enabled to call the verification application to securely determine authenticity of a user of the electronic device, wherein the verification application is further arranged to
receive verification data for secure determination of authenticity of the user; - and
provide, upon a call from any of the other applications and a match between the verification data and a verification reference, a trust token to the calling application. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 22, 23)
- and
-
11. A method of a verification application arranged to interact with other applications on an electronic device, the electronic device having a processor, a memory and an operating system controlling operation of the verification application and the other applications on the processor using arbitrary memory locations, the method comprising
receiving a call, to the verification application from one of the other applications, to securely determine authenticity of a user of the electronic device; -
receiving verification data; authenticating the verification data by matching to a verification reference stored by the verification application; and providing, upon a match between the verification data and the verification reference, a trust token to the calling application. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20, 21)
-
Specification