PREVENTING FRAUDULENT USE BY CLONING OF A TRUSTED APPLICATION

Number of patents in Portfolio can not be more than 2000

United States of America

APP PUB NO 20250036750A1
SERIAL NO

18843418

Stats

ATTORNEY / AGENT: (SPONSORED)

Importance

Loading Importance Indicators... loading....

Abstract

See full text

A method prevents fraudulent use by cloning of a trusted application (TA) executable in a secure execution environment (SEE) of a host device (HD). According to the method, the trusted application (TA) starts (310; 406) in a locked mode in which access to protected functionality and data of the trusted application (TA) is prohibited (312). The trusted application performs a handshake procedure (320; 400) with a computerized backend resource (BE) to verify that a current execution state of the trusted application (TA) has not already been occupied by another instance of the trusted application (TA). Only upon successful verification by the handshake procedure (320; 400) will the trusted application (TA) switch (330; 432) to an unlocked mode in which access to the protected functionality and data is permitted (332).

Loading the Abstract Image... loading....

First Claim

See full text

Family

Loading Family data... loading....

Patent Owner(s)

  • Assignment data not available. Check PTO

International Classification(s)

  • [Classification Symbol]
  • [Patents Count]

Inventor(s)

Inventor Name Address # of filed Patents Total Citations
CRONHOLM, Paul Malmo, SE 19 97

Cited Art Landscape

Load Citation

Patent Citation Ranking

Forward Cite Landscape

Load Citation