![]() METHOD FOR ENTERING CONFIDENTIAL DATA ON A TERMINAL
专利摘要:
The invention relates to a method for entering confidential data on a terminal comprising input means, means for executing a confidence program and a display screen, the method comprising the following steps implemented before the input (107) : - exclusive control (101) of the input means by the confidence program, - display (105) on the screen of a trusted image known to the user of the terminal and indicative of the takeover (101 ), the method being characterized in that it comprises, after the takeover (101) and before the display (105), a step of selecting (104) the trusted image as a part of an image predetermined reference by the user, the selection (104) being variable from one input to another. The invention also relates to a terminal for implementing said method. 公开号:FR3016456A1 申请号:FR1450235 申请日:2014-01-13 公开日:2015-07-17 发明作者:Romain Picon 申请人:Morpho SA; IPC主号:
专利说明:
[0001] FIELD GEN ERAL The invention relates to the field of entering and viewing confidential information on a personal terminal. The invention more particularly relates to a method for securing such an entry of confidential information. STATE OF THE ART Procedures have long been known allowing a user to securely enter information which is confidential to him (notably authentication information) on a terminal equipped with input means and a display screen. . For example, it is well known to protect the entry of a multi-digit code, such as a PIN code, by displaying on the screen not each digit entered but a masking symbol replacing this digit 15 (for example, a star). ), to prevent the interception of the code entered by a malicious third party looking at the terminal screen. To respond to the increase in the number of confidential data transactions online from a user terminal, it has been proposed secure programs called "trusted environments" 20 (in English, "trusted execution environment"). terminal in a "secure" state before the user input of the terminal of its confidential data (in English "Trusted User Interface"). A trusted environment is generally a secure program which is independent of an operating system dedicated to common uses, and which has access to the terminal input means as well as to its display. In the secure state, data entered by the user via the terminal input means is selectively processed by the secure program. Such an interface guarantees the user that he visualizes and validates authentic information (amount of a transaction, actors of the transaction), and that he confidently enters his personal or confidential information (for example a PIN code). ). It is therefore important to warn the user that the trusted interface has configured the terminal in the secure state before it enters its confidential data. To warn the user of such an event, it has been proposed in document US Pat. No. 7,302,585 to define a trusted image known to the user indicative of the secure state of the terminal by the trusted interface. Before the user enters confidential information, the trusted image is displayed on the screen in one copy or several times in a mosaic, in order to inform the user that this secure state is active. However, this solution does not give the user absolute protection against phishing attacks. Indeed, a malicious third party present in the user's environment or having placed cleverly placed cameras in this environment could intercept the trust image displayed on the screen and understand that it indicates that the user is on the point of entering confidential information. This third party could then reproduce the image of confidence in a malicious program which would mimic the behavior of the trusted program by displaying the image of trust on the terminal, with the aim of misleading the user and thus recovering his information. confidential. SUMMARY OF THE INVENTION The invention therefore aims to further improve the confidentiality of the entry of confidential data on a terminal implementing a trusted interface, without increasing the manufacturing cost of the terminal. It is therefore proposed a method of entering confidential data on a terminal comprising input means, means (10) for executing a confidence program and a display screen, the method comprising the following steps implemented before the seizure: exclusive control of the input means by the trusted program, display on the screen of a trusted image known to the user of the terminal and indicative of the takeover and, after the takeover and before the display, a step of selecting the trusted image as part of a reference image predetermined by the user, the selection being variable from one input to another. Since only a portion of the predetermined confidence image is displayed on the screen during the input process, and that portion varies for each new confidential data entry, a malicious third party would not be able to reproduce the entire the trusted image in a phishing program intended to induce the user of the terminal in error. Of course, the reference image may represent any type of information: a drawing, a character, a sequence of characters, such as all or part of a sentence or text, etc. The trusted image may be selected from selection data selected by the user and acquired by the input means after the takeover. Alternatively, the trusted image is randomly selected. The trusted program can receive the trusted image of a remote server. The receipt of the trusted image may further be controlled by sending a request to the remote server, the request being generated by the trusted program from the acquired selection data, the selection of the image of confidence being implemented by the remote server. The proposed method may further include displaying on the screen an N-region partition pattern prior to displaying the confidence image, each region being associated with a respective portion of the reference image, the selection data acquired by the input means being representative of a number less than N of regions of the partitioning pattern, selected by the user. The input means may comprise a touch-sensitive element, the selection data then being representative of at least one area touched by the user. If the touch sensitive element is included in the display screen, the affected area may be representative of a set of contiguous points of the screen touched since the contact of an outer body with the slab up to subsequent disengaging said outer body with the screen. The process steps can be repeated for several a first entry and a second entry after the first entry, the method further comprising the steps of storing a first displayed confidence image for the first entry, and comparing a second entry. a confidence image to be displayed for the second entry with the first trusted trust image, the second trusted image being displayed only if it differs from the first image. According to a second aspect, there is provided a trusted computer program product comprising program code instructions for performing the following steps, when executed by a terminal comprising input means and a display screen. prior to entering confidential data: taking exclusive control of the input means, controlling the display on the screen of a trustworthy indicative image of the takeover, the computer program product being characterized in that it is further configured to control the selection of the trusted image as part of a reference image predetermined by the user, the selection being variable from one input to another. [0002] It is also proposed, in a third aspect, a terminal comprising input means, a display screen, and means for executing the confidence program according to the second aspect. [0003] DESCRIPTION OF THE FIGURES Other characteristics, objects and advantages of the invention will emerge from the description which follows, which is purely illustrative and nonlimiting, and which should be read with reference to the accompanying drawings in which: FIGS. 1 and 2 show schematically a system according to one embodiment of the invention. Fig. 3 is a flowchart of steps of a method of entering confidential data, according to an embodiment of the invention. Figure 4 details sub-steps of a step of the flowchart of Figure 3, according to one embodiment of the invention. FIG. 5 shows different states of the screen of a terminal during the implementation of an input method according to a first embodiment. FIG. 6 shows different states of the screen of a terminal during the implementation of an input method according to a second embodiment. In all the figures, similar elements bear identical references. [0004] DETAILED DESCRIPTION OF THE INVENTION FIG. 1 and FIG. 2 illustrate a system S comprising at least one terminal 1 and one remote server 2. The terminal 1 comprises communication means 16, data processing means such as a processor 10, a memory 18, a display screen 12, and input means 14. [0005] The input means 14 may comprise a keyboard and / or a touch sensitive element (more generally any human / machine interface). The touch sensitive element can be included in the display screen 12, so as to form with it a touch screen. [0006] The processor 10 is designed to run an operating system OS, as well as a confidence program P independent of the operating system OS. The confidence program P includes program code instructions for performing different tasks. [0007] The confidence program P is firstly configured to open exclusive read access to the input means 14, that is to say that any data acquired by the input means after this access opening can not be processed. that by the trusted program, excluding the operating system or any other program installed in the terminal 1. In the remainder of this text, it will qualify such an access opening as "exclusive takeover". The confidence program P also configured to control the display of images on the screen 12, and to communicate with the remote server 2 via the communication means 16. [0008] The confidence program P is further configured to process confidential data acquired by the input means 12. This processing may consist, for example, in the authentication of the user with the terminal itself or with a remote site to which the terminal has access via the communication means 16; this treatment can also be part of a bank transaction. The communication means 16 may be of the wireless type (Wifi, cellular, etc.) or of the wired type. The memory 18 may be hard disk type, flash, EEPROM or a removable USB key. [0009] Moreover, the server 2 comprises communication means 24 adapted to communicate with the communication means 16 of the terminal 1. The server 2 also comprises processing means 5 and 20 and a memory 28 storing a database B intended to to contain one or more trusted images, each trusted image being associated with a respective user. The steps of the method illustrated in FIG. 3 will now be detailed. In a preliminary enrollment step 100, a user determines an IR reference image known only to himself, via the terminal 1 or not. The enrollment step 100 may, for example, comprise the sending by the trusted program P of the reference image previously chosen by the user to the remote server 2, which stores this reference image in its database. B. Since the trusted image is not stored by the terminal 1, it is not recoverable during a theft of the terminal 1 by a malicious third party. As a variant, this reference image is stored in an area of the memory 18 of the terminal, this zone preferably being accessible only by the program P so as to avoid reading this reference image by a malicious program installed on the terminal. 1 and typically launched by OS operating system. In a step referenced 101, the confidence program P takes control of the input means 14 exclusively. Following this exclusive takeover, any data acquired by the input means 14 will be processed exclusively by the trusted program P (and not by the operating system OS). In a step 104, a trusted image IC is produced from the IR reference image after the takeover. The IC trusted image is a part of the IR reference image selected therein; in other words, the IR reference image being represented by a set of pixels, the confidence image IC is represented by a subset of this set of pixels. In the embodiment presented below, the production 104 of the trusted image IC is implemented by the server 2, but may alternatively be implemented by the trusted program P itself. The confidence image IC can be selected in the reference image as a function of selection data acquired by the input means during a preliminary step 103 implemented after the takeover 101; the user then participates in the determination of this image of confidence in the reference image. Alternatively, the confidence image IC is randomly selected in the IR reference image. The confidence image IC is then displayed on the screen 12 in a step referenced 105. The user of the terminal 1 can then check whether the confidence image IC displayed on the screen 12 corresponds to a part of the IR reference image it has previously chosen during the enrollment step 100. The user is thus well assured that the trusted program has obtained exclusive access to the input means 14. [0010] The user can then, in a step referenced 107, enter on the terminal 1, and this via the input means 12, confidential data which are then processed exclusively by the confidence program P. In a step 106, the image IC confidence is stored (for example in the memory 18 of the terminal 1 or on the remote server 2). This storage step can be implemented before the display of the confidence image or after. After the confidential data has been entered and processed, the trusted program releases access to the input means 14. The input means 14 can be used by the operating system OS after the release 108. [0011] Steps 101 to 108 may be repeated for each confidential data entry that the trusted program P is made to process. The enrollment step 100 may also be repeated between several sequences of steps 101 to 108 so as to change the IR reference image. With reference to FIG. 4, the step 104 for producing the trusted image may comprise the following substeps in an embodiment in which the remote server 2 is requested. The confidence program P generates in a substep 400 a selection request M1, and commands the sending 401 of this request M1 to the remote server 2 via the communication means 16. The selection request M1 can typically comprise an identifier to identify the issuing trusted program P (such as a program number), the terminal (by a model or serial number), or the user himself if the terminal is multi-user. The communications means 24 of the server receive the request M1 and then transmit it to the processing means 20 of the remote server 2. In a step 402, the processing means 20 access the database B and look for a reference image therein. IR associated with the identifier contained in the request Ml. Once the reference image IR has been found, the processing means 20 selects the confidence image IC as part of the reference image IR. The processing means 20 then generate a response M2 comprising the selected IC confidence image, which is returned 403 to the terminal 1 having sent the request M1. Following the receipt of the response M2, the terminal 1 implements a comparison 404 of the IC confidence image received with a confidence image stored in the context of a previous confidential data entry (step 106). [0012] If the compared images are identical then an error message is displayed 405 on the screen 12, prompting the user to enter new selection data (in a new implementation of step 103). This prevents the user from selecting the same trusted image 5 in the reference image, for several successive entries. A user who has made the habit of always selecting the same image of trust in the reference image could be the victim of phishing attacks implemented by a malicious program which would simply display only this same image of confidence; this prohibition thus avoids such a situation. If the compared images are different, the display 105 of the confidence image IC on the screen 12 is realized. The trusted image preferably does not cover too much of the reference image, preferably less than 50% of it at the surface, which makes it more difficult to recover the image. reference. The method can thus implement a limitation of the surface of the reference image in which the confidence image can be selected (which amounts to prohibiting the selection of part of the reference image); thus, the reference image can in no case be reconstructed by the reference image. The method may also include displaying on the screen a message inviting the user to change the reference image after a specified time or number of entries. It can indeed be considered that after the reference image has been completely unveiled and it is appropriate to enlist a new reference image. Grid embodiment FIG. 5 shows different states of the screen of the terminal 1 during the execution of the input method, according to a first embodiment called "gate". In this grid embodiment, the input means 14 consist of a touch-sensitive element included in the display screen 12. In addition, in a step 102 carried out before the acquisition 103 of the selection data, the confidence program P controls the display 102 of a predetermined partitioning pattern G. The partitioning pattern G comprises several regions R, each region delimiting a respective region of the reference image. A message inviting the user to select a number N of regions R smaller than the total number of regions of the partitioning pattern G may also be displayed in step 102. Each time the user touches one of the regions R on the screen 12, the touch sensitive element acquires selection data representative of the affected region and transmits the selection data to the confidence program; then, the region corresponding to these selection data is selected in the reference image (step 104). Step 103 repeated N times then produces N selection data representative of N regions affected by the user. The confidence image IC produced at the end of step 104 is then the union of N regions (related or not) in the reference image IR, corresponding to the regions R of the partitioning pattern affected by the user on the touch screen. Note that, in this grid embodiment, the selection data may be a simple index of region R in the grid G. The request M1 sent to the server 2 may thus comprise N indices of regions in the displayed grid, holding on a reduced number of bits, which makes it possible to reduce the size of the request M1 transferred between the terminal 1 and the server 2 with respect to requests containing more complex selection data, such as a set of pixel coordinates. In the example illustrated in FIG. 5, the partitioning pattern G is a grid of 3 × 4 square cells of the same dimensions and colored according to the same predetermined color, the grid being of dimensions superimposable on the reference image; at the top of the screen is a message inviting the user to touch 3 boxes among the 12 boxes that make up the grid. Each time the user touches one of the boxes, the trusted program can then color each box touched in according to different color of the unaffected boxes in the partitioning pattern displayed on the screen (image at the top right of the box). Figure 5), to allow the user to understand the number of boxes he has already selected and the number of boxes he has left to select. [0013] In the image at the top right, three regions of the grid have been touched by the user. If the user touches a box that has already been touched, the trusted program can also "deselect" the retouched box. The step 107 of entering the confidential data may be preceded by the display of a semitransparent window displayed "above" the grid G as shown in the image at the bottom right of FIG. inviting the user to check whether the IC image displayed is a part of the reference image, and to enter their confidential data (a PIN code in the example shown) if this is the case. Free Drawing Embodiment FIG. 6 shows different states of the screen of the terminal during the execution of the input method according to a second so-called "free-run" embodiment. [0014] As in the grid variant, the selection data corresponds to an area of the touch screen touched by the user. However, in the freeform variant, this zone is not a set of predetermined size regions, but a free zone T drawn by the user. More specifically, the area touched on the touch screen by the user consists of a set of contiguous points of the screen touched since the contacting of an outer body with the touch screen to a setting off subsequent contact of the outer body with the touch screen (the outer body being typically one or more fingers of the user, a stylus, etc.). The method according to this free-running embodiment may thus comprise a step in which is displayed a predefined color image superimposable on the reference image, and an invitation message to the user to draw a freely chosen area by the image. 'user. The free-running embodiment allows a very fast execution of the step 103 of acquisition of the selection data, by a simple layout of the user on the touch screen; Moreover, the chances that a user selects the same pixels during two successive entries are statistically very low, which contributes to complicating the reconstruction of the IR reference image by a nearby third party. The method according to the free-running embodiment may include displaying the semi-transparent window described for the grid embodiment. Other Embodiments Other non-illustrated embodiments are also conceivable. [0015] The reference image IR being stored in the memory 18 of the terminal 1, the steps described above can be implemented locally by the trusted program P, without the assistance of the remote server 2. During the step 104, the confidence program P then accesses the reference image IR stored in the memory 18 of the terminal 1 to produce the image of confidence to be displayed next. The storage step 106 of the trusted image can also be performed not in the memory 18 of the terminal but in the memory 28 of the server 2, before the step 403. [0016] Other types of input means 14 may be used in the terminal, for example a keyboard. In the grid variant, directional keys of the keyboard can be used to navigate the partitioning pattern and select regions R. The method according to the invention is not limited to the context of entering a PIN code but can be implemented to secure the entry of other types of authentication codes (for example a code of access to a website or a particular service provided by the trusted program, or, more generally, other types of confidential data.20
权利要求:
Claims (14) [0001] REVENDICATIONS1. A method of entering confidential data on a terminal (1) comprising input means (14), means (10) for executing a confidence program (P) and a display screen (12), the method comprising following steps implemented before the entry (107): exclusive control (101) of the input means (14) by the confidence program (P), display (105) on the screen (12) of an image trusted (IC) 10 known to the user of the terminal (1) and indicative of the takeover (101), the method being characterized in that it comprises, after the takeover (101) and before the display (105), a step of selecting (104) the trusted image (IC) as part of a user-predetermined reference image (IR), the selection (104) being variable by one seized at the other. [0002] The method according to claim 1, wherein the trusted image is selected from selection data selected by the user and acquired (103) by the input means (14) after the takeover (101) . [0003] 3. Method according to one of claims 1 and 2, wherein the confidence program (P) receives (403) the trusted image of a remote server (2). [0004] 4. Method according to claims 2 and 3 taken in combination, wherein the reception (403) of the trusted image (IC) is controlled by sending (401) a request to the remote server, the request being generated (400) by the trusted program (P) from the acquired selection data (103), the selection (402) of the trusted image being implemented by the remote server (2). [0005] 5. The method according to one of claims 2 to 4, further comprising displaying on the screen a partitioning pattern (G) with N regions (R) before the display (105) of the image of confidence (IC), each region (R) being associated with a respective part of the reference image (IR), the selection data acquired (103) by the input means (14) being representative of a number less than N of regions (R) of the partitioning pattern (G), selected by the user. [0006] The method according to one of claims 2 to 5, wherein, the input means (14) comprising a touch sensitive element, the selection data are representative of at least one area touched by the user. [0007] The method of claim 6, wherein, the touch sensitive element being included in the display screen (12), the affected area is representative of a set of contiguous points of the screen (12) affected. 20 from the contacting of an outer body with the slab to a subsequent disengagement of said outer body with the screen (12). [0008] Method according to one of claims 1 to 7, the steps of which are repeated for a number of first and second entries following the first entry, the method further comprising the steps of storing (106) a first image displayed confidence for the first entry, comparison (404) between a second confidence image to be displayed for the second entry with the first stored confidence image, the second trusted image being displayed (105) only if it differs from the first picture. [0009] 9. Trusted computer program product (P) comprising program code instructions for performing the following steps, when executed by a terminal (1) comprising input means (14) and a display screen. display (12), prior to a seizure (107) of confidential data: take exclusive control (101) of the input means, control the display (105) on the screen (12) of a trusted image (IC ) indicative of the takeover, and the computer program product (P) being characterized in that it is further configured to control the selection (104) of the trusted image (IC) as a part of a reference image (IR) 15 predetermined by the user, the selection (104) being variable from one seizure to another. [0010] Terminal (1) comprising input means (14), a display screen (12), and means (10) for executing a confidence program (P) according to claim 9. [0011] 11. Terminal (1) according to claim 10, wherein the input means (14) comprise a touch sensitive slab. 25 [0012] 12. Terminal (1) according to one of claims 10 and 11, further comprising means for communicating with a remote server (2), and wherein the computer program product (P) is configured to: transmit to the server remote (2) a selection request (M1) comprising selection data selected by the user and acquired (103) by the input means (14) after the takeover (101), and- receive (403) from the remote server the trusted image (IC) selected in response to the request. [0013] 13. Server (2) comprising data processing means (20), communication means (24) with at least one terminal (1) according to claim 12, the data processing means being configured to select an image as a part of the predetermined reference image (IR), from the selection request (M1) received by the communication means (24), and transmit to the terminal (1) the image of confidence (IC) selected. [0014] 14. System (S) comprising a terminal (1) according to claim 12 and a server according to claim 13.
类似技术:
公开号 | 公开日 | 专利标题 EP2894585B1|2016-07-06|Method for inputting confidential data in a terminal US10073963B2|2018-09-11|Claiming data from a virtual whiteboard US10909234B2|2021-02-02|Method and apparatus for unlocking user interface EP1761835B1|2011-10-26|Security module and method of customising one such module EP2913741B1|2020-06-10|Method for access control using haptic feedback CN103593106A|2014-02-19|Handheld device and method for unlocking same FR3030073A1|2016-06-17|DATA TRANSFER ASSIST ON A TOUCH INTERFACE FR3032292B1|2019-10-25|SECURE ELEMENT AND METHOD IMPLEMENTED IN SAFE SUCH ELEMENT FR3014223A1|2015-06-05|PROCESSING METHOD FOR SECURING ELECTRONIC DOCUMENTS FR3045876A1|2017-06-23|METHOD FOR PRODUCING A CHALLENGE WORD, ELECTRONIC DEVICE, PERIPHERAL DEVICE AND SYSTEM IMPLEMENTING SAID METHOD EP3239845B1|2019-02-13|Method for allocating memory space WO2014135519A1|2014-09-12|System and method for managing at least one online application, portable user object communicating via a radio protocol and remote device of the system KR20200056293A|2020-05-22|Wearable apparatus for displaying content and method thereof EP2804125B1|2017-04-26|Device for entering an authentication code FR3007166A1|2014-12-19|METHOD, DEVICE, AND SYSTEM FOR PROTECTING AN IMAGE SIGNAL AGAINST COPY EP3765984A1|2021-01-20|Secure data processing CA2998780A1|2017-03-23|Management of a display of a view of an application on a screen of an electronic data input device, corresponding method, device and computer program product FR3092681A1|2020-08-14|Computer equipment control method WO2015044590A1|2015-04-02|Method for authenticating a user provided with a first device by a second device EP1921558A1|2008-05-14|Authentication procedure WO2014135526A1|2014-09-12|System and method for managing at least one online application, portable usb user object and remote device of the system FR2971351A1|2012-08-10|Method for processing display data of graphic interface to assist input of graphic object displayed on screen of e.g. electronic equipment, involves emitting command of objects according to two display modes, after indication of one object
同族专利:
公开号 | 公开日 EP2894585B1|2016-07-06| FR3016456B1|2017-06-23| US9652619B2|2017-05-16| JP2015133116A|2015-07-23| KR20150084678A|2015-07-22| CA2877001A1|2015-07-13| US20150199527A1|2015-07-16| JP6444175B2|2018-12-26| EP2894585A1|2015-07-15| KR102273093B1|2021-07-05|
引用文献:
公开号 | 申请日 | 公开日 | 申请人 | 专利标题 US5664099A|1995-12-28|1997-09-02|Lotus Development Corporation|Method and apparatus for establishing a protected channel between a user and a computer system| US6950949B1|1999-10-08|2005-09-27|Entrust Limited|Method and apparatus for password entry using dynamic interface legitimacy information| EP1056014A1|1999-05-28|2000-11-29|Hewlett-Packard Company|System for providing a trustworthy user interface| JP2001092785A|1999-09-20|2001-04-06|Sanyo Electric Co Ltd|Password authentication device and password authenticating method| DE102004062203B4|2004-12-23|2007-03-08|Infineon Technologies Ag|Data processing device, telecommunication terminal and method for data processing by means of a data processing device| JP4721767B2|2005-05-12|2011-07-13|株式会社野村総合研究所|Authorized site notification program and method| JP2007249344A|2006-03-14|2007-09-27|Dainippon Printing Co Ltd|User authentication system and method| GB2448151B|2007-04-03|2011-05-04|Advanced Risc Mach Ltd|Memory domain based security control within data processing systems| JP5197681B2|2010-06-15|2013-05-15|ヤフー株式会社|Login seal management system and management server|US10373149B1|2012-11-12|2019-08-06|Square, Inc.|Secure data entry using a card reader with minimal display and input capabilities having a display| US9613353B1|2013-12-26|2017-04-04|Square, Inc.|Passcode entry through motion sensing| US9436818B1|2014-06-30|2016-09-06|II Macio P. Tooley|System and method for credential management and identity verification| US10178087B2|2015-02-27|2019-01-08|Samsung Electronics Co., Ltd.|Trusted pin management| US10929526B2|2016-03-01|2021-02-23|Qualcomm Incorporated|User interface for tee execution of a device| CN108833410B|2018-06-19|2020-11-06|网宿科技股份有限公司|Protection method and system for HTTP Flood attack|
法律状态:
2015-12-22| PLFP| Fee payment|Year of fee payment: 3 | 2016-12-21| PLFP| Fee payment|Year of fee payment: 4 | 2017-12-21| PLFP| Fee payment|Year of fee payment: 5 | 2019-09-27| ST| Notification of lapse|Effective date: 20190906 |
优先权:
[返回顶部]
申请号 | 申请日 | 专利标题 FR1450235A|FR3016456B1|2014-01-13|2014-01-13|METHOD FOR ENTERING CONFIDENTIAL DATA ON A TERMINAL|FR1450235A| FR3016456B1|2014-01-13|2014-01-13|METHOD FOR ENTERING CONFIDENTIAL DATA ON A TERMINAL| EP14198575.4A| EP2894585B1|2014-01-13|2014-12-17|Method for inputting confidential data in a terminal| CA2877001A| CA2877001A1|2014-01-13|2015-01-08|Method for confidential data input on a terminal| JP2015003100A| JP6444175B2|2014-01-13|2015-01-09|How to enter sensitive data on your device| US14/595,051| US9652619B2|2014-01-13|2015-01-12|Method of inputting confidential data on a terminal| KR1020150006287A| KR102273093B1|2014-01-13|2015-01-13|Method of inputting confidential data on a terminal| 相关专利
Sulfonates, polymers, resist compositions and patterning process
Washing machine
Washing machine
Device for fixture finishing and tension adjusting of membrane
Structure for Equipping Band in a Plane Cathode Ray Tube
Process for preparation of 7 alpha-carboxyl 9, 11-epoxy steroids and intermediates useful therein an
国家/地区
|