Method for protecting an electronic terminal, corresponding computer program and electronic terminal
First Claim
Patent Images
1. A method for protecting an electronic terminal comprising:
- activating a state of surveillance of said terminal when a current value of at least one piece of information characterizing a context of said terminal is situated in a predefined range of values of said information, and assigning a minimum value to a level of alert;
in said state of surveillance, detecting a first handling of said terminal and passing said terminal into a suspect state, representing a risk of an attempt at fraudulent use of said terminal; and
in said suspect state, triggering a reaction by said terminal, wherein said reaction of said terminal comprises updating the level of alert, which represents a probability of an attempt at fraudulent use of said terminal and implementing at least one reactive action according to said level of alert, wherein updating the level of alert comprises;
in response to detecting of the first handling, updating the level of alert to a first value and implementing a first reactive action according to said first value; and
in response to detecting a second, subsequent handling, updating the level of alert from the first value to a second value, and implementing a second, different reactive action according to said second value.
3 Assignments
0 Petitions
Accused Products
Abstract
A method is provided for protecting an electronic terminal. The method includes: activating a state of monitoring the terminal; in the state of monitoring, detecting a manipulation of the terminal, generating the passage of the terminal to a so-called suspect state, representative of a risk of attempted fraudulent use of the terminal; in the suspect state, triggering a reaction by the terminal, the reaction of the terminal including updating an alert level representative of a probability of attempted fraudulent use of the terminal, and a implementing at least one reactive action dependent on the alert level.
-
Citations
10 Claims
-
1. A method for protecting an electronic terminal comprising:
-
activating a state of surveillance of said terminal when a current value of at least one piece of information characterizing a context of said terminal is situated in a predefined range of values of said information, and assigning a minimum value to a level of alert; in said state of surveillance, detecting a first handling of said terminal and passing said terminal into a suspect state, representing a risk of an attempt at fraudulent use of said terminal; and in said suspect state, triggering a reaction by said terminal, wherein said reaction of said terminal comprises updating the level of alert, which represents a probability of an attempt at fraudulent use of said terminal and implementing at least one reactive action according to said level of alert, wherein updating the level of alert comprises; in response to detecting of the first handling, updating the level of alert to a first value and implementing a first reactive action according to said first value; and in response to detecting a second, subsequent handling, updating the level of alert from the first value to a second value, and implementing a second, different reactive action according to said second value. - View Dependent Claims (2, 3, 4, 5, 6, 9, 10)
-
-
7. A non-transitory computer-readable medium comprising a computer program product stored thereon and comprising program code instructions to implement a method for protecting an electronic terminal, when said program is executed on a computer, wherein the instructions comprise:
-
instructions that configure the terminal to activate a state of surveillance of said terminal when a current value of at least one piece of information characterizing a context of said terminal is situated in a predefined range of values of said information, and assigning a minimum value to a level of alert; instructions that configure the terminal to, in said state of surveillance, detect a first handling of said terminal and passing said terminal into a suspect state, representing a risk of an attempt at fraudulent use of said terminal; and instructions that configure the terminal to, in said suspect state, trigger a reaction by said terminal, wherein said reaction of said terminal comprises updating the level of alert, which represent a probability of an attempt at fraudulent use of said terminal and implementing at least one reactive action according to said level of alert, wherein updating the level of alert comprises; in response to detecting of the first handling, updating the level of alert to a first value and implementing a first reactive action according to said first value; and in response to detecting a second, subsequent handling, updating the level of alert from the first value to a second value, and implementing a second, different reactive action according to said second value.
-
-
8. An electronic terminal comprising:
-
means for activating a state of surveillance of said terminal when a current value of at least one piece of information characterizing a context of said terminal is situated in a predefined range of values of said information, and assigning a minimum value to a level of alert; in said state of surveillance, means for detecting a first handling of said terminal, generating the passage of said terminal into a suspect state, representing a risk of an attempt at fraudulent use of said terminal; and in said suspect state, means for triggering a reaction by said terminal, wherein said means for triggering a reaction by said terminal comprise means for updating the level of alert, which represent a probability of an attempt at fraudulent use of said terminal, and means for implementing at least one reactive action as a function of said level of alert, wherein updating the level of alert comprises; in response to detecting of the first handling, updating the level of alert to a first value and implementing a first reactive action according to said first value; and in response to detecting a second, subsequent handling, updating the level of alert from the first value to a second value, and implementing a second, different reactive action according to said second value.
-
Specification