Device and method for establishing trusted path between user interface and software application

Information

  • Patent Application
  • 20070150733
  • Publication Number
    20070150733
  • Date Filed
    August 21, 2006
    19 years ago
  • Date Published
    June 28, 2007
    18 years ago
Abstract
A device and a method for establishing a trusted path between a user interface and a software application to securely execute the software stored in a memory along the trusted path and offer the user's desired service are provided. Accordingly, the trusted path is established so that attackers can not invade a normal path between the user interface and software. Additionally, the device securely executes the original software which is not fabricated so that the user can receive desired services from the device.
Description

BRIEF DESCRIPTION OF THE DRAWING FIGURES

The above aspect and other features of the present invention will become more apparent by describing in detail exemplary embodiments thereof with reference to the attached drawing figures, wherein;



FIG. 1 is a schematic diagram to show the configuration of a device adopting a method for establishing a trusted path between a user interface and a software application according to an exemplary embodiment of the present invention; and



FIG. 2 is a flow chart to describe a method for establishing a trusted path between a user interface and a software application according to an exemplary embodiment of the present invention.


Claims
  • 1. A device for establishing a trusted path between a user interface and a software application, the device comprising: a user interface (UI) controller for making a request for execution of software based on key input;a UI controller configuration part for providing an address of the software corresponding to the key input;a request controller for receiving the software execution request from the UI controller and receiving the software address from the UI controller configuration part;a main memory for storing general software;a secure memory for storing secure software; anda controller for executing at least one of the general software and the secure software corresponding to the software address based on the software execution request received from the request controller.
  • 2. The device of claim 1, wherein the UI controller comprises: a main UI controller for receiving general key input from among the key input; anda dedicated UI controller for receiving dedicated key input of a trust button from among several key buttons.
  • 3. The device of claim 1, wherein the UI controller configuration part comprises: a first secure configuration part for transmitting a first software address corresponding to the general key input to the controller; anda second secure configuration part for transmitting a second software address corresponding to the dedicated key input to the controller.
  • 4. The device of claim 1, wherein the general software comprises a banking program and an update program.
  • 5. The device of claim 1, wherein the secure software comprises an integrity check program.
  • 6. A method for establishing a trusted path between a user interface and a software application in a device comprising a first secure configuration part for providing a first software address and a second secure configuration part for providing a second software address according to key input, the method comprising: acquiring a software address according to the key input;making a request for execution of the software corresponding to the software address; andexecuting at least one of general software and secure software according to the software execution request.
  • 7. The method of claim 6, wherein the making of the request comprises determining whether the key input comprises input for the general software execution or input for the secure software execution.
  • 8. The method of claim 7, wherein the making of the request comprises at least one of acquiring a first software address corresponding to the key input from the first secure configuration part, and acquiring a second software address corresponding to a dedicated key input from the second secure configuration part.
  • 9. The method of claim 6, wherein the general software comprises a banking program and an update program.
  • 10. The method of claim 6, wherein the secure software comprises an integrity check program.
Priority Claims (1)
Number Date Country Kind
10-2005-128934 Dec 2005 KR national