Related application “Secure User Authentication using a Master Secure Element”, Ser. No. 13/632,870 filed on the same day and assigned to the same assignee is incorporated by reference herein in its entirety. Related application “Validating a Transaction with a Secure Input and a Non-Secure Input”, Ser. No. 13/632,907 filed on the same day and assigned to the same assignee is incorporated by reference herein in its entirety.
Mobile platforms or connected devices such as smart phones, personal computers, tablet PCs are integrating a secure element to authenticate the platform, to protect user credentials or to secure transactions. The secure element is typically a highly tamper resistant device that provides a secure execution environment isolated from the host processor. The secure element may be integrated into various form factors such as, for example, SIM cards, SD cards, or small outline packages attached directly on the printed circuit board (embedded secure element) and is especially useful for payment applications such as bank cards, mobile wallets and the like.
A payment transaction often requires the authentication of the user to either activate the application or to validate the transaction. A payment transaction is usually performed on a secure terminal with trusted user interfaces (i.e. secure display and keypad) for added security. In the typical mobile handset type architecture, a user enters their PIN code or activates the confirmation button located directly on the handset keypad. The entry of the PIN code or the activation of the confirmation button is typically handled by the host processor which operates in a non-secure and open environment. Because mobile handsets are typically connected to a network, the handsets can be infected by malware that can operate to intercept the entered PIN code or cause an invalid transaction to be confirmed.
Typical transaction validation involves two factors: 1) the application needs to be assured that only the user can validate the transaction; 2) the user needs to be assured that only the transaction the user accepts is completed. However, requiring entry of a PIN code to validate each transaction may be seen as user unfriendly and not very secure as the more times a PIN code is entered the greater the chance of it being observed and stolen.
Smart phones and tablets equipped with relatively large touch screens are becoming ever more common. Users are becoming increasingly familiar with the tactile and intuitive nature of touch screen interfaces. Gestures such as the “spread”, “pinch”, “rotate”, “flick” and others are standardized motions for interacting with multi-touch devices and are typically improving the user experience in many ways.
In an embodiment in accordance with the invention, transactions on a mobile handset, PC, tablet or similar device having a touch screen may be secured if the touch screen is controlled by a master secure element embedding gesture recognition capability.
Related application “Secure User Authentication using a Master Secure Element”, referenced above, describes an exemplary embodiment where master secure element 120 is used as a secure processor and controls user input into the handset keypad (or touch screen) 110 to secure the user authentication based on, for example, the entry of a PIN code (see
The user validates a transaction by tracing on secure touch screen 110 the transaction amount digit by digit with their finger or a suitable stylus, for example. The traced digits are then verified individually by SP 120 (before the user validates the transaction by inputting “>”).
If malware running on host processor 115 is able to manipulate the transaction amount sent to SP 120, it will be detected in step 250. If the transaction amount displayed on non-secure display 130 is not correct, the transaction is cancelled by the user in step 240. The transaction is validated because only the user is able to enter the amount that the user agrees to.
Note that for embodiments in accordance with the invention, it is not necessary for the transaction amount data to originate from host processor 115. It may also come from another device directly connected to SP 120 such as a near field communications (NFC) controller 299 as shown in
In an embodiment in accordance with the invention, the user only needs to trace with their finger or a suitable stylus the digits drawn on non-secure display 330 on overlying touch screen 310 corresponding to the transaction amount. Each digit employs a single-stroke gesture inspired by the UNISTROKES shorthand technology developed by XEROX and developed by Palm as GRAFFITI in the 1990's. Unlike UNISTROKES, only 12 symbols (representing numbers 0-9, cancel “<” and ok “>”) are used which the user does not need to learn because host 115 presents them to the user via display 330 for tracing on overlying touch screen 310. Symbol recognition by SP 120 is computationally simplified because only the small set of symbols used (12 in one embodiment in accordance with the invention) and because SP 120 “knows” the symbol to be entered by the user.
Whether the symbol is displayed by host processor 115 on display 330 or not, the shape the user needs to enter on touch screen 310 is always known by SP 120. Hence, symbol recognition does not necessarily require an initialization training phase by the user. However, a recognition system that is part of SP 120 can record physical data such as, for example, shape, size or speed related to the way an individual user draws the symbols of symbol set 400. This recording of physical data allows a biometric recognition of the user based on statistics. The confidence level increases with each transaction as the recognition system gathers more data. In the event that SP 120 does not recognize the user, SP 120 can request the entry of the users PIN code on a keypad as described in related application “Validating a Transaction with a Secure input and a Non-Secure Output” incorporated by reference above.
While the invention has been described in conjunction with specific embodiments, it is evident to those skilled in the art that many alternatives, modifications, and variations will be apparent in light of the foregoing description. Accordingly, the invention is intended to embrace all other such alternatives, modifications, and variations that fall within the spirit and scope of the appended claims.
| Number | Name | Date | Kind |
|---|---|---|---|
| 5280592 | Ryba et al. | Jan 1994 | A |
| 5339417 | Connell et al. | Aug 1994 | A |
| 5724424 | Gifford | Mar 1998 | A |
| 6092202 | Veil et al. | Jul 2000 | A |
| 6976090 | Ben-Shaul et al. | Dec 2005 | B2 |
| 8052049 | Doland et al. | Nov 2011 | B1 |
| 8707056 | Felton | Apr 2014 | B2 |
| 20020029342 | Keech | Mar 2002 | A1 |
| 20030079127 | Bidan et al. | Apr 2003 | A1 |
| 20030114152 | Gibbs et al. | Jun 2003 | A1 |
| 20040192434 | Walker et al. | Sep 2004 | A1 |
| 20050182952 | Shinozaki | Aug 2005 | A1 |
| 20050278544 | Baxter | Dec 2005 | A1 |
| 20060136717 | Buer et al. | Jun 2006 | A1 |
| 20060195907 | Delfs et al. | Aug 2006 | A1 |
| 20060287963 | Steeves et al. | Dec 2006 | A1 |
| 20070069008 | Klein | Mar 2007 | A1 |
| 20080209212 | Ditzman et al. | Aug 2008 | A1 |
| 20090144558 | Wang | Jun 2009 | A1 |
| 20090307139 | Mardikar et al. | Dec 2009 | A1 |
| 20100107238 | Stedman et al. | Apr 2010 | A1 |
| 20110119141 | Hoyos | May 2011 | A1 |
| 20110240728 | Arnouse | Oct 2011 | A9 |
| 20110251954 | Chin | Oct 2011 | A1 |
| 20120178366 | Levy et al. | Jul 2012 | A1 |
| 20140040147 | Varadarajan | Feb 2014 | A1 |
| 20140095387 | Colnot | Apr 2014 | A1 |
| 20140096222 | Colnot | Apr 2014 | A1 |
| 20150056957 | Mardikar et al. | Feb 2015 | A1 |
| Number | Date | Country |
|---|---|---|
| 1561508 | Jan 2005 | CN |
| 101840548 | Sep 2010 | CN |
| 102143482 | Aug 2011 | CN |
| 2 365 469 | Sep 2011 | EP |
| 2814880 | Apr 2005 | FR |
| 0117310 | Mar 2001 | WO |
| 20070129345 | Nov 2007 | WO |
| 2010002541 | Jan 2010 | WO |
| 2011051757 | May 2011 | WO |
| Entry |
|---|
| Chinese Office Action mailed Jun. 2, 2016 for 201310454721.5. |
| Chinese Office Action mailed May 4, 2016 for 201310454740.8. |
| Office Action mailed Mar. 9, 2016, in U.S. Appl. No. 13/632,907. |
| European Communication for EP 13186761.6 dated Jan. 7, 2014 with European Search Report Dec. 9, 2013. |
| “The Trusted Execution Environment: Delivering Enhanced Security at a Lower Cost to the Mobile Market”, GlobalPlatform, 26 pgs., retrieved from the Internet at: http://www.globalplatform.org/mediawhitepapers.asp (Feb. 2011). |
| Yang, B. et al. “Secure Scan: A Design-for-Test Architecture for Crypto Chips”, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, vol. 25, No. 10, pp. 2287-2293 (Oct. 2006). |
| Gorbet, M. G. et al. “Triangles: Design of a Physical/Digital Construction Kit”, Mit Media Lab, 4 pgs, retrieved from the internet at: tmg-trackr.media.mit.edu/publishedmedia/...Triangles%20Design%20of%20a/.../PDF (Aug. 18, 1997). |
| Extended European Search Report for Patent Appln. No. 13186761.6 (dated Jan. 7, 2014). |
| Extended European Search Report for Patent Appln. No. 13186672.5 (dated Dec. 16, 2013). |
| Extended European Search Report for Patent Appln. No. 13186715.2 (dated Jan. 30, 2014). |
| Office Action from related EP patent appln. No. 13186672.5 (dated Sep. 17, 2018). |
| Number | Date | Country | |
|---|---|---|---|
| 20140095388 A1 | Apr 2014 | US |