TRUSTED TERMINAL PLATFORM
First Claim
1. A User-terminal for entering secure user information, comprising:
- a processor configured for running an operating system with applications;
a touch screen configured for displaying information and receiving user inputs and to receive the secure user information from the user;
a Security-Box being connected between the touch screen and the processor and configured to control the user input on the touch screen to the processor, the Security-Box being configured to run in a “
Secure Mode” and
a “
Clear Text Mode”
, wherein when running in “
Secure Mode”
the user input is not forwarded as touch coordinates to the processor and when running in “
Clear Text Mode”
the touch coordinates are transmitted to the processors;
wherein the user-terminal is configured to run at least first and second applications displaying information on the touch screen and allowing an interaction with the user, the first application interacting with the Security-Box to perform security relevant financial transactions;
and the second application interacting in “
Clear Text Mode”
with the touch screen, andwherein the first application interacting with the Security-Box is configured for switching the Security-Box into “
Secure Mode” and
needs to be authenticated with the Security Box using a cryptographic method with one or more security keys.
9 Assignments
0 Petitions
Accused Products
Abstract
A point-of-sale (POS) terminal is provided for entering a PIN to enable a financial transaction. The point-of-sale terminal has a card reader for reading information from a credit card, a processor for running an operating system, with applications, a touch screen for displaying information and receiving user inputs, and a Security-Box connected between the touch screen and the processor to control the user input on the touch screen to the processor. The Security Box is configured to run in a “PIN Entry Mode” and a “Clear Text Mode.” When running in “PIN Entry Mode” the user input is not forwarded as touch coordinates to the processor and when running in “Clear Text Mode” the touch coordinates are transmitted to the processors.
34 Citations
43 Claims
-
1. A User-terminal for entering secure user information, comprising:
-
a processor configured for running an operating system with applications; a touch screen configured for displaying information and receiving user inputs and to receive the secure user information from the user; a Security-Box being connected between the touch screen and the processor and configured to control the user input on the touch screen to the processor, the Security-Box being configured to run in a “
Secure Mode” and
a “
Clear Text Mode”
, wherein when running in “
Secure Mode”
the user input is not forwarded as touch coordinates to the processor and when running in “
Clear Text Mode”
the touch coordinates are transmitted to the processors;wherein the user-terminal is configured to run at least first and second applications displaying information on the touch screen and allowing an interaction with the user, the first application interacting with the Security-Box to perform security relevant financial transactions; and the second application interacting in “
Clear Text Mode”
with the touch screen, andwherein the first application interacting with the Security-Box is configured for switching the Security-Box into “
Secure Mode” and
needs to be authenticated with the Security Box using a cryptographic method with one or more security keys. - View Dependent Claims (2, 3, 4, 5, 8, 9, 10, 12, 13, 14, 15, 16, 19)
-
-
6-7. -7. (canceled)
-
11. (canceled)
-
17-18. -18. (canceled)
-
20-21. -21. (canceled)
-
22. A User-Terminal for entering secure user information, comprising:
-
a processor configured for running an operating system with applications; a touch screen configured for displaying information and receiving user inputs and also to receive the secure information from the user; a Security-Box being connected between the touch screen and the processor, and configured to control the user input on the touch screen to the processor, wherein the Security-Box and the processor are connected via a serial interface configured to provide a first and a second logical connection, wherein the Security-Box is being configured to run in a “
Secure Mode”
using the first logical connection and a “
Clear Text Mode”
using the second logical connection, wherein when running in “
Secure Mode”
the user input is not forwarded as touch coordinates to the processor via the second logical connection and when running in “
Clear Text Mode”
the touch coordinates are transmitted to the processor via the second logical connection. - View Dependent Claims (23, 24, 25, 26, 27, 28, 29, 30, 34, 36, 37, 40, 41, 42)
-
-
31-33. -33. (canceled)
-
35. (canceled)
-
38-39. -39. (canceled)
-
43-44. -44. (canceled)
Specification