Trusted security zone watermark
First Claim
1. A method for creating a trusted security zone watermark during the start-up procedure of a mobile device comprising:
- operating a mobile device comprising a trusted security zone;
opening a start-up application executed in the trusted security zone;
capturing an image using the mobile device while executing the start-up application;
storing the image in the trusted security zone, wherein access to the trusted security zone is restricted to the start-up application and to one or more secure applications;
designating the image as a watermark for the mobile device;
in response to a user accessing ay secure application of the one or more secure applications configured to execute in the trusted security zone, presenting, by the mobile device, the watermark, wherein the presentation of the watermark verifies to the user that the secure application is being executed in the trusted security zone of the mobile device, and wherein the same watermark is presented regardless of which secure application of the one or more secure applications is accessed by the user; and
prompting the user for confirmation that the watermark is present and correct before allowing the secure application to access trusted information in the trusted security zone.
6 Assignments
0 Petitions
Accused Products
Abstract
Embodiments relate generally to methods and systems for creating and using a watermark for verification of operation in a trusted security zone of a mobile device. The watermark may be created or chosen by a user and may be unique to the user. The watermark may be stored in a trusted security zone of the mobile device and may not be accessible from any other area of the mobile device. The watermark may comprise one or more of an image, an audio file, a video, a shape, a signature, a word, a phrase, or a number. The watermark may be verified by a user before operation of a secure application executed in the trusted security zone of the mobile device, and the watermark may also be present throughout the use of a secure application.
-
Citations
20 Claims
-
1. A method for creating a trusted security zone watermark during the start-up procedure of a mobile device comprising:
-
operating a mobile device comprising a trusted security zone; opening a start-up application executed in the trusted security zone; capturing an image using the mobile device while executing the start-up application; storing the image in the trusted security zone, wherein access to the trusted security zone is restricted to the start-up application and to one or more secure applications; designating the image as a watermark for the mobile device; in response to a user accessing ay secure application of the one or more secure applications configured to execute in the trusted security zone, presenting, by the mobile device, the watermark, wherein the presentation of the watermark verifies to the user that the secure application is being executed in the trusted security zone of the mobile device, and wherein the same watermark is presented regardless of which secure application of the one or more secure applications is accessed by the user; and prompting the user for confirmation that the watermark is present and correct before allowing the secure application to access trusted information in the trusted security zone. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method for creating a trusted security zone watermark during the start-up procedure of a mobile device comprising:
-
operating a mobile device comprising a trusted security zone; opening a start-up application executed in the trusted security zone; inputting a media file using the mobile device while operating the start-up application; storing the media file in the trusted security zone, wherein access to the trusted security zone is restricted to the start-up application and to one or more secure applications; designating the media file as a watermark for the mobile device; in response to a user accessing any secure application of the one or more secure applications configured to execute in the trusted security zone, presenting, by the mobile device, the watermark, wherein the presentation of the watermark verifies to the user that the secure application is being executed in the trusted security zone of the mobile device, and wherein the same watermark is presented regardless of which secure application of the one or more secure applications is accessed by the user; and prompting the user for confirmation that the watermark is present and correct before allowing the secure application to access trusted information in the trusted security zone. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A method of verifying that a user is operating a mobile device in a trusted security zone comprising:
-
executing a secure application of a plurality of secure applications, wherein the secure application is executed in a trusted security zone of a mobile device; presenting, by the mobile device, a watermark for the mobile device to a user regardless of which secure application of the plurality of secure applications is accessed by the user, wherein the presence of the watermark provides verification to the user that the secure application is executing in the trusted security zone, and wherein the watermark comprises one or more of an image, an audio file, a video, a word, a phrase, a number, or set of numbers; prompting, by the mobile device, the user for confirmation that the watermark is present and correct before the secure application is allowed to access trusted information in the trusted security zone; and in response to the prompting and before the secure application is allowed to access the trusted information in the trusted security zone, receiving, by the mobile device, indication from the user that the watermark is present and correct wherein the watermark remains present in some form for the duration of the execution of the secure application. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification