Method for securely performing a sensitive operation using a non-secure terminal
A sensitive and non-secure technology, applied in the direction of secure communication devices, platform integrity maintenance, user identity/authority verification, etc., can solve the problems of not providing security level and expensive banking organizations
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0040] In the drawings, the same reference numerals may refer to the same parts in different drawings unless otherwise stated.
[0041] Hereinafter, the term "secure" is used according to its ordinary meaning to those of ordinary skill in the art, and in various embodiments includes techniques such as encryption, or other types of software or hardware controls or The security used to protect this information from unauthorized access or manipulation. The expressions "secure communication" and "secure communication link" refer to communication encrypted using a public / private key pair, or symmetric key encryption with a key shared between communication points. "Secure communications" may also refer to virtual private networks, and other methods and technologies for establishing authenticated and encrypted communications between communication points.
[0042] figure 1 Shown is a user terminal UT that can perform transactions with a remote service provider server or application ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


