摘要 |
The method involves analyzing interface control components of a view to be rendered on a touch-sensitive screen (102) so as to detect one of the interface control components poses a security problem by inciting a user to provide sensitive information and is called as a suspicious component. Functions of an input control component of an electronic device are restricted or invalidated if the suspicious component is detected so as to allow the information to be provided by the user to a non-certified application. The rendering of the view is generated, and the view is reproduced. The interface control components are selected from a group consisting of buttons, windows, texts, images, tabs, entry zones, virtual keyboards, menus, frames, tables, touch-sensitive capture zones, progress bars, sliding cursors, drop-down tree structures, elevators, datepickers and/or timepickers, loud speakers, hard keyboards, mice, cameras, bar code wands, and biometric information scanners. Independent claims are also included for the following: (1) a computer program product comprising program code instructions to implement an interface securing method between a user and a non-certified application running on an electronic device (2) a payment terminal for implementing an interface securing method. |