Unlock instant, AI-driven research and patent intelligence for your innovation.

Method for securely performing a sensitive operation using a non-secure terminal

A sensitive and non-secure technology, applied in the direction of secure communication devices, platform integrity maintenance, user identity/authority verification, etc., can solve the problems of not providing security level and expensive banking organizations

Inactive Publication Date: 2019-06-14
SKEYECODE
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

A solution that requires additional hardware equipment is expensive for banking organizations
Also, a solution using a password sent via SMS does not provide a sufficiently high level of security since it has already been successfully attacked

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for securely performing a sensitive operation using a non-secure terminal
  • Method for securely performing a sensitive operation using a non-secure terminal
  • Method for securely performing a sensitive operation using a non-secure terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] In the drawings, the same reference numerals may refer to the same parts in different drawings unless otherwise stated.

[0041] Hereinafter, the term "secure" is used according to its ordinary meaning to those of ordinary skill in the art, and in various embodiments includes techniques such as encryption, or other types of software or hardware controls or The security used to protect this information from unauthorized access or manipulation. The expressions "secure communication" and "secure communication link" refer to communication encrypted using a public / private key pair, or symmetric key encryption with a key shared between communication points. "Secure communications" may also refer to virtual private networks, and other methods and technologies for establishing authenticated and encrypted communications between communication points.

[0042] figure 1 Shown is a user terminal UT that can perform transactions with a remote service provider server or application ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a method for securely performing a sensitive operation using a non-secure user terminal (UT), the method comprising: receiving and storing, by the user terminal, software component data (GCD) defining a set of a plurality of software components (GC) performing the sensitive operation, the software component data comprising for each software component, structure data and content data; receiving by the user terminal, from a secure processor (ASRV, SE), an execution request (RGC) to perform the sensitive operation; selecting a valid software component among the set of software components; executing the selected software component; and setting the selected software component to invalid.

Description

technical field [0001] The present invention relates to a method and a device for securely authenticating a user from a non-secure terminal, and for performing a secure transaction involving such a non-secure terminal and a remote server based on such user authentication. Background technique [0002] Expect to perform transactions initiated from mobile terminals such as smartphones, personal computers, digital tablets, etc. or any other connected device including devices belonging to the Internet of Things (IoT), such as e-commerce transactions or money transfers (not sure if this is relevant, because the claimed method requires a human). However, this raises security concerns, not least because the terminals processor (CPU) may execute "malware". Malware may be able to access all or part of the memory accessible to the processor, and thus may be maliciously configured to monitor any transactions performed by the terminal and recover any secret data manipulated during thos...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32G06F21/50G06F21/30
CPCH04L9/3271H04L2209/16G06F21/57G06F21/14G06F21/72H04L9/32H04L2209/12G06F21/30
Inventor G·皮特尔
Owner SKEYECODE