Method and a device for making a computer application secure
First Claim
1. A security method for making a computer application being executed on a terminal secure, the method being implemented by the terminal on which said computer application is being executed and comprising:
- obtaining information indicating that said application being made secure is about to invite a user of the terminal on which said application is being executed to input data;
obtaining a secret image known to the user of the terminal by accessing a binary file representative of the secret image, the binary file being stored in a secure element of the terminal on which said application being made secure is being executed;
constituting a complex image in said secure element of the terminal on which said application being made secure is being executed, the complex image being constituted from said secret image obtained by accessing said binary file stored in the secure element of the terminal on which said application being made secure is being executed and from dynamic data that is inaccessible to said terminal on which said application being made secure is being executed; and
displaying said complex image on a screen of the terminal on which said application being made secure is being executed.
1 Assignment
0 Petitions
Accused Products
Abstract
In one embodiment, a security method for making secure a computer application being executed on a terminal is disclosed. In one embodiment the security method comprises obtaining information to the effect that the application is about to invite a user of the terminal to input data, accessing a binary file representative of a secret image known to the user of the terminal, the binary file being stored in a secure element of the terminal, constituting a complex image in the secure element, the complex image being obtained from the secret image and from dynamic data that is inaccessible to said terminal, and displaying the complex image on a screen of the terminal.
-
Citations
15 Claims
-
1. A security method for making a computer application being executed on a terminal secure, the method being implemented by the terminal on which said computer application is being executed and comprising:
-
obtaining information indicating that said application being made secure is about to invite a user of the terminal on which said application is being executed to input data; obtaining a secret image known to the user of the terminal by accessing a binary file representative of the secret image, the binary file being stored in a secure element of the terminal on which said application being made secure is being executed; constituting a complex image in said secure element of the terminal on which said application being made secure is being executed, the complex image being constituted from said secret image obtained by accessing said binary file stored in the secure element of the terminal on which said application being made secure is being executed and from dynamic data that is inaccessible to said terminal on which said application being made secure is being executed; and displaying said complex image on a screen of the terminal on which said application being made secure is being executed. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A security device for making a computer application being executed on a terminal secure, the security device being adapted for inclusion in the terminal and comprising:
-
a component configured to obtain information indicating that said application being made secure is about to invite a user of the terminal on which said application is being executed to input data; a component configured to obtain a secret image known to the user of the terminal by accessing a binary file representative of the secret image, the binary file being stored in a secure element of the terminal on which the application being made secure is being executed; a component configured to constitute a complex image in said secure element of the terminal on which said application being made secure is being executed, the complex image being constituted from said secret image obtained by accessing said binary file stored in the secure element of the terminal on which said application being made secure is being executed and from dynamic data that is inaccessible to said terminal on which said application being made secure is being executed; and a component configured to display said complex image on a screen of the terminal on which said application being made secure is being executed. - View Dependent Claims (12, 13, 14, 15)
-
Specification