Flexible interface for secure input of pin code
DCFirst Claim
1. A system for authenticating a PIN code of a user in an interactive information system in order to run an application, the system comprising:
- an input device for entering a PIN code of a user;
a security manager configured to;
receive a request for user authentication from the application;
compare a received PIN code of the user with a registered PIN code, in response to said request;
supply information to the application about PIN code entering key-pressing operations by the user, wherein the entered PIN code is not supplied to the application; and
give authorization to run said application if the PIN code of the user matches the registered PIN code;
wherein the application is configured to present a PIN entry field, wherein crypted information corresponding to said information about PIN code entering key-pressing operations received from the security manager is displayed in the PIN entry field.
1 Assignment
Litigations
0 Petitions
Accused Products
Abstract
The present invention concerns a system (10) and a process for authenticating a PIN code of a user in an interactive information system in order to run an application. It comprises input means (15) for PIN code entry, security manager means (13) for comparing the PIN code of the user upon a request for user authentication from the application, with a registered PIN code, and giving authorization to run said application if the PIN code of the user matches with the registered PIN code, and display means (17) for displaying any graphics including a PIN entry field. The request for user authentication is provided on the display means via the PIN entry field with the look and feel of said application. The system further comprises emitting means for entering crypted digits, the security manager means (13) being arranged to give authorisation to run the application after full entry of said crypted digits and if the PIN code of the user is identical to the registered PIN code.
-
Citations
11 Claims
-
1. A system for authenticating a PIN code of a user in an interactive information system in order to run an application, the system comprising:
-
an input device for entering a PIN code of a user; a security manager configured to; receive a request for user authentication from the application; compare a received PIN code of the user with a registered PIN code, in response to said request; supply information to the application about PIN code entering key-pressing operations by the user, wherein the entered PIN code is not supplied to the application; and give authorization to run said application if the PIN code of the user matches the registered PIN code; wherein the application is configured to present a PIN entry field, wherein crypted information corresponding to said information about PIN code entering key-pressing operations received from the security manager is displayed in the PIN entry field. - View Dependent Claims (2, 3)
-
-
4. A method for authenticating a PIN code of a user in an interactive information system, in order to run an application, the method comprising:
-
receiving a request from a user to run the application; the application presenting a PIN entry field in response to said request; a security manager comprising a processor; receiving a request for user authentication from the application; supplying information to the application about PIN code entering key-pressing operations by the user, wherein the entered PIN code is not supplied to the application; comparing an entered PIN code of the user with a registered PIN code; giving authorisation to run said application if the PIN code of the user matches the registered PIN code; wherein the application is configured to present in the PIN entry field crypted information corresponding to the information about PIN code entering key-pressing operations received from the security manager. - View Dependent Claims (5, 6, 7, 8)
-
-
9. A non-transitory computer readable storage medium comprising executable instructions for authenticating a PIN code of a user in order to run an application, wherein the program instructions are operable to:
-
receive a request for user authentication from the application; supply information to the application about PIN code entering key-pressing operations by the user, wherein the entered PIN code is not supplied to the application; and give authorization to run said application if the PIN code of the user matches the registered PIN code; wherein the application is configured to present a PIN entry field, wherein crypted information corresponding to said information about PIN code entering key-pressing operations received from the security manager is displayed in the PIN entry field. - View Dependent Claims (10, 11)
-
Specification