With the edition of this document, all previous editions become void. Indications made in this document may be changed without previous notice.

Size: px
Start display at page:

Download "With the edition of this document, all previous editions become void. Indications made in this document may be changed without previous notice."

Transcription

1 SECURITY POLICY Contactless Payment and Ticketing Module Copyright by ELECTRONIC GmbH Lange Strasse 4 D Weilburg-Waldhausen Tel.: With the edition of this document, all previous editions become void. Indications made in this document may be changed without previous notice. Copying of this document and giving it to others and the use or communication of the contents thereof are forbidden without express authority. Offenders are liable to the payment of damages. All rights are reserved in the event of the grant of a patent or the registration of a utility model or design. Final Security Policy.docx

2 Contents 1. History 4 2. Introduction 5 3. General Product Type Product Identification Product Name Hardware Version Number Software Version Number Guidance Initial Security Inspection Periodic Inspection Installation Guide End of Life Hardware Security Software Security Development Operation Identifying PCI Compliant Devices Identifying the installed Firmware Version Format of the Firmware Version Identifier Security Guideline Signing s 15 ELECTRONIC GmbH Page 2 of 26 Security Policy

3 10. Cryptographic Services Supported Encryption Algorithms Supported Digital Signature Algorithms Minimum Key Lengths for Account Data Encryption Loading of Symmetric Secret Keys Replacement of Potentially Compromised Keys Overview of Keys and Certificates Additional Information Use of PSAMs in conjunction with Roles and Services Glossary Related Documents 26 ELECTRONIC GmbH Page 3 of 26 Security Policy

4 1. History Version Status Author Date Notes 0.1 Preliminary Rafael Keller Initial draft version 0.2 Preliminary Rafael Keller Chapter Preliminary Rafael Keller Chapter 7 update 1.1 Final Rafael Keller Final Michael Jung Updated End-Of-Live Procedure Added section on Signing Added section on Cryptographic Services 1.3 Final Rafael Keller Firmware cs01.03.xx-xx.xx-x-x Added support for TDEA 112 bits 1.4 Final Michael Jung Removed references to SHA-1: SHA-1 is considered insecure and not PCI-DSS compliant. Table 1, CUSTOM_TDES bit length is 112 or 168 (not 128). Added Chapter 11 Additional Information 1.5 Final Rafael Keller Firmware cs01.05.xx-xx.xx-x-x 1.6 Final Michael Jung Added ISO MAC mechanisms (method 1 and 2, algorithm 3) Added DUKPT and ep2 application specific keys to key table Added note on ep2 protocol version 6.2 and earlier ELECTRONIC GmbH Page 4 of 26 Security Policy

5 2. Introduction This document relates to the Unattended Contactless Payment Terminal product. It specifies the security policies that are to be implemented to comply with the PCI PTS approval of the. ELECTRONIC GmbH Page 5 of 26 Security Policy

6 cvend Customer Documentation Security Policy 3. General 3.1. Product Type is a secure card reader to handle contactless payment transactions without PIN entry Product Identification Figure 1 shows in front view, figure 2 in rear view. For the installation of follow chapter 4. Figure 1: front view - not installed Figure 2: rear view - not installed 3.3. Product Name ELECTRONIC GmbH Page 6 of 26 Security Policy

7 product name is printed on the label located around the Ethernet jack (see figure 3). The label at the back of the shall not be teared off, covered or altered Hardware Version Number hardware version number is printed on the label located around the Ethernet jack Software Version Number software version number is printed on the label located around the Ethernet jack.. Figure 3: label Stock Keeping Unit Hardware Version Number Software Version Number ELECTRONIC GmbH Page 7 of 26 Security Policy

8 4. Guidance 4.1. Initial Security Inspection The system integrator of must visually inspect every received after shipping from ELECTRONIC before integrating the into his installation. Furthermore the system integrator is advised to check every on a regular basis after receipt and installation Periodic Inspection The system integrator, merchant or acquirer has to check: The label is undamaged. The serial number on the label corresponds to the inventory. There is no flashing red tamper led after power on (see figure 1 for the position of the led). There is no tamper buzzer after power on. There are no cables or wires connected to any port of or associated equipment, other than needed for intended use. If a tamper event is observed, the merchant or acquirer must contact the system integrator immediately and remove from service and keep available for potential forensics investigation Installation Guide Installation of must be carried out according to the installation manual [1]. The installation manual and the security guidance [2] have references for the system integrator: How to check the completeness of the delivered equipment. The storage location of the referenced documents. The information about power and cable connections. The technical specifications of the (i.e. temperature, humidity, voltage) The safety recommendations. The security recommendations. For flush integration into non conducting housings one round opening with a diameter of 28,5 mm is necessary to show the back-lit contactless symbol. To comply with EMVCo regulations: The contactless logo must be visible. The upper edge of the plastic dome and the target terminal front plate must be on the same level. Avoid any kind of conducting material surrounding the. Do not use conducting materials for fastening. ELECTRONIC GmbH Page 8 of 26 Security Policy

9 4.4. End of Life Before decommissioning the all sensitive data and keys must be erased. This is done by short-circuiting the battery supply as shown in the picture below with any conducting tool (e.g. a power resistor < 10 Ohm). Figure 4: End-of-Life: Short circuit the battery supply ELECTRONIC GmbH Page 9 of 26 Security Policy

10 5. Hardware Security The security of the terminal is not compromised by altering environmental conditions. Temperature Range: Operating -25 C to +70 C ambient temperature Storage -25 C to +80 C The contains tamper mechanisms that will trigger when a physical penetration attempt of the is detected. A tamper event can easily be detected if: There is a flashing red tamper led (see figure 1). The tamper buzzer is on. There is a tamper message send out on the serial port. If a tamper event is observed, the merchant or acquirer must contact the system integrator immediately and remove from service and keep available for potential forensics investigation. ELECTRONIC GmbH Page 10 of 26 Security Policy

11 6. Software Security 6.1. Development The firmware implements the required security measures and functions to be compliant with PCI security requirements for authenticated applications. When developing applications, the developers must refer to the coding specifications and the best practices described in [1]. This security guidance describes how protocols and services must be used and configured for each interface that is available on. The document provides security guidance for account data management and remote connection authentication using cryptographic mechanisms. When developing IP enabled applications and SRED applications the developer must abide by the coding rules and best practices described in the document. 6.2.Operation The system implements a self-test mechanism to verify the integrity of the software including firmware and user applications running on the secure s. The self-test also covers cryptographic operations, random number generation and a presence check for required cryptographic key. The self-test is scheduled to run each 24 hours and at each start up. Each time a software update is performed on the a restart is required to make the new software version operative. If the self-test fails, the system goes into an out of service status and a DRS is triggered. The selftest procedure is integrated into the system firmware and runs transparent for the end user and for payment applications responsible for payment transactions. Details are described in [1]. ELECTRONIC GmbH Page 11 of 26 Security Policy

12 7. Identifying PCI Compliant Devices does ship s that are meant to be used for development, test and quality assurance as well as s meant to be used with in real installations in the field. Those two classes of s can be distinguished by means of their respective Firmware Version Identifier. It is the responsibility of the system integrator to ensure that only PCI compliant s are deployed in the field Identifying the installed Firmware Version s that are running on the can identify the installed firmware version by reading the contents of the file /boot/version. The firmware version will also be reported via the Manufacturer USB descriptor string. E.g. if port X2 (see [1]) of a is connected to an USB host port on a Linux PC a string similar to the following will appear in the system log: Manufacturer: Electronic GmbH - cvend - cs The installed firmware version in this example is cs For Microsoft Windows there are freeware tools available that allow extracting USB string descriptors (E.g. USB Descriptor Dumper from Thesycon) Format of the Firmware Version Identifier Figure 5 below describes the format of the Firmware Version Identifier. S = Secure, R = Release, D = Debug Major Version Number Full PCI Certification Minor Version Number Delta PCI Certification Revision Number Changes not PCI relevant Customer Configuration Version of Customer Configuration Supported HW Revision of Core Module Supported HW Revision of Antenna Module cvmm.nn.rr-cc.vv-o-a Figure 5: Format of the Firmware Version Identifier ELECTRONIC GmbH Page 12 of 26 Security Policy

13 A given firmware version is PCI compliant only if the respective Firmware Version Identifier matches the following pattern (where the * symbols might be any digit 0-9): cs01.01.**-**.**-*-* or cs01.03.**-**.**-*-* or cs01.05.**-**.**-*-* The first character is the small letter c (Identifying product ). The second character is a capital letter S (Identifying a secure ). If the second character is a capital letter D or R then the is meant for development, test and quality assurance and should not be deployed in field installations. The third and fourth characters are digits identifying the major version number, and the sixth and seventh characters are digits representing the minor version number. Only the combination (Major.Minor) and (Major.Minor) and (Major.Minor) have been PCI approved. The ninth and the tenth characters are digits representing the firmware revision. Changes in firmware revisions are not relevant for whether a given firmware version is PCI compliant. The twelfth and the thirteenth and the fifteenth and the sixteenth characters are digits identifying the firmware customization and the version of said customization, respectively. Those characters are not relevant for whether a given firmware version is PCI compliant. The eighteenth and the twentieth characters are digits which identify the minimum hardware revision numbers for the core and the antenna printed circuit board, which are supported by the respective firmware version. Those characters are not relevant for whether a given firmware version is PCI compliant. Any change to firmware that impacts platform security will result in a change of either the major or the minor version number. The security guidelines described in this document apply to major version 01 and minor version 01 or minor version 03 or minor version 05 only. Support for TDEA 112 bits is only certified with Version cs01.03.**-**.**-*-* or cs01.05.**-**.**-*-* (see Chapter 10). ELECTRONIC GmbH Page 13 of 26 Security Policy

14 8. Security Guideline The Security Guideline [1] gives in depth information to the following topics: Vulnerability Disclosure Firmware Updates Updates Access to Sensitive Services Configuration Management Cryptographic Services Account Data Protection Open Protocols It is the responsibility of the organization that uses to follow the Security Guideline. ELECTRONIC GmbH Page 14 of 26 Security Policy

15 9. Signing s will grant access to sensitive services (such as the keystore) only to applications that have been digitally signed. does provide PIN protected USB SmartCard HSMs to system integrators for signing applications. Please see [1] for details. ELECTRONIC GmbH Page 15 of 26 Security Policy

16 10. Cryptographic Services Supported Encryption Algorithms All encryption and decryption operations with private or secret keys that involve account data must be done via specific APIs as described in [1]. The following encryption algorithms are supported: Firmware Version cs01.01.**-**.**-*-* AES-128 ECB AES-128 CBC with ISO-Padding AES-128 CBC with PKCS#7-Padding TDEA-168 ECB TDEA-168 CBC with ISO-Padding TDEA-168 CBC with PKCS#7-Padding RSAEP RSAES-PKCS1-v1_5 RSAES-OAEP with MGF SHA-256/ Supported Digital Signature Algorithms Firmware Version cs01.03.**-**.**-*-* Firmware Version cs01.05.**-**.**-*-* AES-128 ECB AES-128 CBC with ISO-Padding AES-128 CBC with PKCS#7-Padding TDEA-168 ECB TDEA-168 CBC with ISO-Padding TDEA-168 CBC with PKCS#7-Padding TDEA-112 ECB TDEA-112 CBC with ISO-Padding TDEA-112 CBC with PKCS#7-Padding RSAEP RSAES-PKCS1-v1_5 RSAES-OAEP with MGF SHA-256/-512 All signature creation and verification operations that involve account data must be done via specific APIs as described in [1]. The following signature algorithms are supported: CMAC with AES or TDEA cipher HMAC-SHA256 HMAC-SHA512 ISO MAC with TDEA, Method 1, Algorithm 3 ISO MAC with TDEA, Method 2, Algorithm 3 RSASSA-PKCS1-v1.5 with SHA-256 RSASSA-PKCS1-v1.5 with SHA-384 RSASSA-PKCS1-v1.5 with SHA-512 RSASSA-PSS with SHA-256, SHA-384 or SHA-512 RSASSA-PSS with SHA-256 RSASSA-PSS with SHA-384 RSASSA-PSS with SHA Minimum Key Lengths for Account Data Encryption The following minimum key lengths must be applied when encrypting account data: Key Type Minimum Key Length [bit] Firmware Version cs01.01.**-**.**-*-* Minimum Key Length [bit] Firmware Version cs01.03.**-**.**-*-* RSA AES TDEA Firmware Version cs01.05.**-**.**-*-* ELECTRONIC GmbH Page 16 of 26 Security Policy

17 10.4. Loading of Symmetric Secret Keys does provide means to im- and export symmetric secret keys into and from its keystore via specific APIs. Symmetric secret keys can be imported into a s keystore from another trusted system. Or they can be exported from a s keystore into another trusted system. Said other trusted systems (which might or might not be other keystores) are identified by a pair of X.509 certificates (namely the Key Signing Key s and the Key Encryption Key s X.509 certificates), whose public keys are used to verify the signature of a key block (if importing into a keystore from another trusted system), or to encrypt a key block (if exporting from a keystore into another trusted system), respectively. Please see [1] for further details Replacement of Potentially Compromised Keys It is the responsibility of the system integrator to replace keys whenever the original key is known or suspected to have been compromised. A key has to be assumed to have been compromised if a time span has expired that would allow determining the key via a brute-force attack Overview of Keys and Certificates Table 1 specifies all keys and certificates which are used during the lifetime of s. Table 1: keys Key Name Symbolic Key Name Purpose / Usage Algorithm Size (Bits) Generated By: Form Factor / Loaded to Device In Key Slots (Registers) / acquirer / vendor specific / other (describe) Key 0 7 Private Key APP[n]_PRIV n in { } Signing application binaries and application update package RSA 2048 USB Token Generated and stored at in cryptographic USB token, which is transfered to application developer. Not stored in. N/A customer configuration. Key 0 7 Public Key APP[n]_PUB n in { } Verifying application binaries and application update packages RSA 2048 USB Token Exported from USB token. Stored in integrity protected in Linux kernel image. 8 customer configuration. Terminal Authentication Key TERM_AUTH_PRI V Device authentication. RSA 2048 during initial key loading. Stored in 1 ELECTRONIC GmbH Page 17 of 26 Security Policy

18 Key Name Symbolic Key Name Purpose / Usage Algorithm Size (Bits) Generated By: Form Factor / Loaded to Device In Key Slots (Registers) / acquirer / vendor specific / other (describe) Private Key DRNG keystore. Terminal Authentication Key Public Key TERM_AUTH_PUB Device authentication RSA 2048 DRNG during initial key loading. Stored in keystore 1 Terminal Authentication Key X.509 certificate TERM_AUTH_X50 9 Device authentication X DRNG Generated by and signed by Terminal CA during initial key loading. Stored in keystore. 1 Terminal Key Encryption Key Private Key Terminal Key Encryption Key Public Key Terminal Key Encryption Key X.509 certificate Terminal Key Signing Key Private Key Terminal Key Signing Key Public Key Terminal Key Signing Key X.509 certificate Terminal Data Encryption Key Private Key Terminal Data Encryption Key Public Key TERM_KEK_PRIV Key loading RSA 3072 DRNG TERM_KEK_PUB Key loading RSA 3072 DRNG TERM_KEK_X509 Key loading RSA 3072 DRNG TERM_KSK_PRIV Key loading RSA 2048 DRNG TERM_KSK_PUB Key loading RSA 2048 DRNG TERM_KSK_X509 Key loading RSA 2048 DRNG TERM_DEK_PRIV Data encryption RSA 2048 DRNG TERM_DEK_PUB Data encryption RSA 2048 DRNG during initial key loading. Stored in keystore during initial key loading. Stored in keystore Generated by and signed by Terminal CA during initial key loading. Stored in keystore. during initial key loading. Stored in keystore during initial key loading. Stored in keystore Generated by and signed by Terminal CA during initial key loading. Stored in keystore during initial key loading. Stored in keystore during initial key loading. Stored in keystore ELECTRONIC GmbH Page 18 of 26 Security Policy

19 Key Name Symbolic Key Name Purpose / Usage Algorithm Size (Bits) Generated By: Form Factor / Loaded to Device In Key Slots (Registers) / acquirer / vendor specific / other (describe) Terminal Data Encryption Key X.509 certificate TERM_DEK_X509 Data encryption X DRNG Generated by and signed by Terminal CA during initial key loading. Stored in keystore. 1 Terminal CA X.509 certificate TERM_CA_X509 Verifying TERM_[AUTH KE K DEK]_X509 X Root CA Signed with the Root CA private key. Loaded into the keystore during initial key loading. 1 Common for all s Root CA X.509 certificate ROOT_CA_X509 Verifying TERM_CA_X509 X Root CA (self signed) Stored integrity protected in root filesystem. 1 Common for all s. Key Block Protection Key for ANSI X.9 TR31 using Key Derivation (see [5]) KEY_BLOCK_PRO TECT_MASTER Key loading AES or TDES 128 or 168 DRNG in the field. Stored in keystore. Exported from keystore and imported into TMS 1 Key Block Encryption Key for ANSI X.9 TR31 using Key Derivation (see [5]) KEY_BLOCK_KEK Key loading AES or TDES 128 or 168 Derived from KEY_BLOCK_PROTE CT_MASTER. Transient key existent for the duration of a single C_WrapKey / C_UnwrapKey call only. N/A Key Block MAC Key for ANSI X.9 TR31 using Key Derivation (see [5]) KEY_BLOCK_MAC Key loading AES or TDES 128 or 168 Derived from KEY_BLOCK_PROTE CT_MASTER. Transient key existent for the duration of a single C_WrapKey / C_UnwrapKey call only. N/A specific AES key CUSTOM_AES specific AES 128 C_Generate Key or TMS via C_UnwrapK ey in the field or imported from TMS in the field. N (gros s 64 KiB per App) Specific specific TDES key CUSTOM_TDES specific TDES 168 or 112 (*) C_Generate Key or TMS in the field or imported from TMS in the field. N (gros s 64 KiB per Specific ELECTRONIC GmbH Page 19 of 26 Security Policy

20 Key Name Symbolic Key Name Purpose / Usage Algorithm Size (Bits) Generated By: Form Factor / Loaded to Device In Key Slots (Registers) / acquirer / vendor specific / other (describe) C_UnwrapK ey App) specific HMAC key CUSTOM_HMAC specific HMA C C_Generate Key or TMS C_UnwrapK ey in the field or imported from TMS in the field. N (gros s 64 KiB per App) Specific specific RSA private key CUSTOM_PRIV specific RSA C_Generate KeyPair in the field. N (gros s 64 KiB per App) Specific specific RSA public key CUSTOM_PUB specific RSA cvend plug C_Generate KeyPair in the field. N (gros s 64 KiB per App) Specific specific DUKPT Master Key Object (**) CUSTOM_DUKPT _MK Specific TDES 112 C_Generate Key or TMS C_UnwrapK ey in the field or imported from TMS in the field. N (gros s 64 KiB per App) Specific / specific DUKPT Transaction Key Object (**) CUSTOM_DUKPT _TK Specific TDES 112 C_DeriveKe y. Derived from CUSTOM_DUKPT_M K. Transient key existent for the duration of a given transaction. N/A Specific / Transaction specific DUKPT Key used for Message Authentication, request or both ways (**) CUSTOM_DUKPT _VK_MSG_AUTHE NTICATION_REQ UEST Specific / Message Authentication, request or both ways TDES 112 C_DeriveKe y Derived from CUSTOM_DUKPT_T K. Transient key existent for the duration of a given transaction. N/A Specific / Transaction specific DUKPT Key used for Message Authentication, response (**) CUSTOM_DUKPT _VK_MSG_AUTHE NTICATION_RESP ONSE Specific / Message Authentication, response TDES 112 C_DeriveKe y Derived from CUSTOM_DUKPT_T K. Transient key existent for the duration of a given transaction. N/A Specific / Transaction ELECTRONIC GmbH Page 20 of 26 Security Policy

21 Key Name Symbolic Key Name Purpose / Usage Algorithm Size (Bits) Generated By: Form Factor / Loaded to Device In Key Slots (Registers) / acquirer / vendor specific / other (describe) specific DUKPT Key used for Data Encryption, request or both ways (**) CUSTOM_DUKPT _VK_DATA_ENCR YPTION_REQUES T Specific / Data Encryption, request or both ways TDES 112 C_DeriveKe y Derived from CUSTOM_DUKPT_T K. Transient key existent for the duration of a given transaction. N/A Specific / Transaction specific DUKPT Key used for Data Encryption, response (**) CUSTOM_DUKPT _VK_DATA_ENCR YPTION_RESPON SE Specific / Data Encryption, response TDES 112 C_DeriveKe y Derived from CUSTOM_DUKPT_T K. Transient key existent for the duration of a given transaction. N/A Specific / Transaction specific ep2 Component Secret (***) CUSTOM_EP2_C OMPONENT_SEC RET Specific / ep2 Component Authentication N/A 64 TMS via C_UnwrapK ey Loaded into via protected ANSI X.9 TR-31 key block N (gros s 64 KiB per App) Specific / specific ep2 Public Key (***) CUSTOM_EP2_PU BLIC_KEY Specific / ep2 Master Session Key Wrapping RSA TMS via C_UnwrapK ey Loaded into via protected ANSI X.9 TR-31 key block N (gros s 64 KiB per App) Specific / Acquirer specific ep2 Master Session Key (***) CUSTOM_EP2_SK _MASTER Specific / ep2 Session Key Variant Derivation TDES 112 C_Generate Key in the field. Transient key existent for the duration of a given transaction. N/A Specific / Transaction Specific ep2 Session Key Variant for Transaction Certificate Generation (***) CUSTOM_EP2_SK _VARIANT_TC Specific / ep2 Transaction Certificate Generation TDES 112 C_DeriveKe y Derived from ep2 Master Session Key. Transient key existent for the duration of a given transaction. N/A Specific / Transaction Specific ep2 Session Key Variant for Message Authentication, Request (***) CUSTOM_EP2_SK _VARIANT_MAC_ SEND Specific / ep2 Message Authentication, Request TDES 112 C_DeriveKe y Derived from ep2 Master Session Key. Transient key existent for the duration of a given transaction. N/A Specific / Transaction Specific ep2 Session Key Variant for CUSTOM_EP2_SK _VARIANT_MAC_ RECV Specific / ep2 Message Authentication, Response TDES 112 C_DeriveKe Derived from ep2 Master Session Key. Transient key existent for the duration of N/A Specific / Transaction ELECTRONIC GmbH Page 21 of 26 Security Policy

22 Key Name Symbolic Key Name Purpose / Usage Algorithm Size (Bits) Generated By: Form Factor / Loaded to Device In Key Slots (Registers) / acquirer / vendor specific / other (describe) Message Authentication, Response (***) y a given transaction. Specific ep2 Session Key Variant for Data Encryption (***) CUSTOM_EP2_SK _VARIANT_ENCR YPTION Specific / ep2 Data Encryption TDES 112 C_DeriveKe y Derived from ep2 Master Session Key. Transient key existent for the duration of a given transaction. N/A Specific / Transaction (*) Support for TDEA 112 bits is only certified with version cs01.03.**-**.**-*-* or later (**) Support for DUKPT is only certified with version cs01.05.**-**.**-*-* or later. (***) Support for ep2 is only certified with version cs01.05.**-**.**-*-* or later. Details about techniques and management of the above mentioned keys and references to describing documents can be found in [1]. The Security Guidance also describes Key Replacement and Removal, Key Injection and Authentication processes. ELECTRONIC GmbH Page 22 of 26 Security Policy

23 11. Additional Information Use of PSAMs in conjunction with PSAMs used in conjunction with s have not been evaluated against the physical or logical security requirements of the PTS POI program. If the PSAM implements capabilities (e.g., cryptographic key management, PIN encryption, etc.) that impacts functions and features governed by the PTS POI security requirements, it may invalidate the PCI approval status of the Use of ep2 protocol version 6.2 or earlier in conjunction with Use of ep2 protocol version 6.2 or earlier may invalidate the PCI approval status of the. ELECTRONIC GmbH Page 23 of 26 Security Policy

24 12. Roles and Services All roles supported by the and the services and permissions available for each role: Feig Electronic sells only to system integrators. Feig Electronic as maintainer provides guidelines how to integrate and maintenance to support for the system integrator. Feig Electronic generates and maintains customer keys, repairs the and handles s with tamper events. The system integrator is the administrator of the. He organizes third party developed applications for, access to sensitive data on cvend plug and the terminal management system. The end user is an operator who performs payment transactions. ELECTRONIC GmbH Page 24 of 26 Security Policy

25 13. Glossary [POS] [PSAM] [TRNG] [DRS] Point of Sale Payment Secure Module True Random Number Generator Destructive Reset Source ELECTRONIC GmbH Page 25 of 26 Security Policy

26 14. Related Documents [1] ELECTRONIC GmbH, cvend Security Guidance, pay-doc:/customer Documentation/Security Guidance/cVEND Security Guidance.docx, [2] American National Standards Institute, X9 TR-31: Interoperable Secure Key Exchange Key Block Specification for Symmetric Algorithms, pay-doc:/references/ansi/x9 TR-31.pdf, ELECTRONIC GmbH Page 26 of 26 Security Policy

DynaPro Go. Secure PIN Entry Device PCI PTS POI Security Policy. September Document Number: D REGISTERED TO ISO 9001:2008

DynaPro Go. Secure PIN Entry Device PCI PTS POI Security Policy. September Document Number: D REGISTERED TO ISO 9001:2008 DynaPro Go Secure PIN Entry Device PCI PTS POI Security Policy September 2017 Document Number: D998200217-11 REGISTERED TO ISO 9001:2008 MagTek I 1710 Apollo Court I Seal Beach, CA 90740 I Phone: (562)

More information

Clover Flex Security Policy

Clover Flex Security Policy Clover Flex Security Policy Clover Flex Security Policy 1 Table of Contents Introduction General description Installation Guidance Visual Shielding Device Security Decommissioning Key Management System

More information

Advanced Mobile Payment Inc. AMP 6500

Advanced Mobile Payment Inc. AMP 6500 Advanced Mobile Payment Inc. AMP 6500 PCI PTS POI Security Policy 2018-04-02 V 1.0.5 Revision History Date Revision Level Description Modified by 2018-01-18 1.0.0 Original Version Brian.Yang 2018-03-02

More information

AMP 8000 Security Policy V 1.0.0

AMP 8000 Security Policy V 1.0.0 AMP 8000 Security Policy V 1.0.0 Advanced Mobile Payments Inc www.amobilepayment.com Revision History Date Revision Level Description Modified by 2017-12-16 V1.0.0 Original Version Kevin Table of content

More information

AMP 8200 Security Policy

AMP 8200 Security Policy AMP 8200 Security Policy V 3.0.0 Advanced Mobile Payments Inc www.amobilepayment.com Revision History Date Revision Level Description Modified by 2017-12-06 3.0.0 Original Version Evan, Stephen Table of

More information

MX900 SERIES PCI PTS POI SECURITY POLICY

MX900 SERIES PCI PTS POI SECURITY POLICY Mx900 Series PCI PTS POI Security Policy...1 Introduction... 3 SCOPE... 3 Product Identification & Inspection... 3 ROLES... 4 DEPLOYERS OF MX 900 SERIES TERMINAL TO END-USERS SITES... 4 ADMINISTRATORS

More information

Version 2.3 March 2, WisePad 2 Security Policy

Version 2.3 March 2, WisePad 2 Security Policy Version 2.3 March 2, 2016 WisePad 2 Security Policy Table of Content 1 Introduction...3 1.1 Purpose and Scope...3 1.2 Audience...3 1.3 Reference...3 1.4 Glossary of Terms and Abbreviations...4 2 General

More information

PIN Security Requirements

PIN Security Requirements Payment Card Industry (PCI) PIN Security Requirements PCI SSC Modifications Summary of Significant Changes from v2.0 to v3.0 August 2018 PCI SSC Modifications to PCI PIN Security Requirements In the table

More information

NEW9210 Security Policy

NEW9210 Security Policy NEW9210 Security Policy V 1.0.7 NEW POS TECHNOLOGY LIMITED www.newpostech.com Revision History Date Revision Level Description Modified by 2016-05-25 1.0.0 Original Issue Kevin, Paddy 2016-05-31 1.0.1

More information

Payment Card Industry (PCI) PIN Transaction Security (PTS) Hardware Security Module (HSM) Evaluation Vendor Questionnaire Version 2.

Payment Card Industry (PCI) PIN Transaction Security (PTS) Hardware Security Module (HSM) Evaluation Vendor Questionnaire Version 2. Payment Card Industry (PCI) PIN Transaction Security (PTS) Hardware Security Module (HSM) Evaluation Vendor Questionnaire Version 2.0 May 2012 Document Changes Date Version Author Description April 2009

More information

Ezetap V3 Security policy

Ezetap V3 Security policy Ezetap V3 Security policy Page 1 Document changes Date Version Description 01 Feb 2015 Draft Initial document 08 Sep 2015 0.1 Added Key management 22 sep 2015 0.2 Specified security settings configuration

More information

Watchdata W9110 Security Policy

Watchdata W9110 Security Policy Watchdata W9110 Security Policy Production Name: W9110 Production Version: 0.9 2/18 Table of Contents TABLE OF CONTENTS... 2 1. DOCUMENT INFORMATION...3 1.1 EVOLUTION FOLLOW-UP...3 1.2 ACRONYMS & TERMS...

More information

Dolphin DCI 1.2. FIPS Level 3 Validation. Non-Proprietary Security Policy. Version 1.0. DOL.TD DRM Page 1 Version 1.0 Doremi Cinema LLC

Dolphin DCI 1.2. FIPS Level 3 Validation. Non-Proprietary Security Policy. Version 1.0. DOL.TD DRM Page 1 Version 1.0 Doremi Cinema LLC Dolphin DCI 1.2 FIPS 140-2 Level 3 Validation Non-Proprietary Security Policy Version 1.0 DOL.TD.000921.DRM Page 1 Version 1.0 Table of Contents 1 Introduction... 3 1.1 PURPOSE... 3 1.2 REFERENCES... 3

More information

ARX (Algorithmic Research) PrivateServer Hardware version 4.7 Firmware version 4.8.1

ARX (Algorithmic Research) PrivateServer Hardware version 4.7 Firmware version 4.8.1 ARX (Algorithmic Research) PrivateServer Hardware version 4.7 Firmware version 4.8.1 FIPS 140-2 Non-Proprietary Security Policy Level 3 Validation April 2012 Copyright 2012 Algorithmic Research This document

More information

Integral Memory PLC. Crypto Dual (Underlying Steel Chassis) and Crypto Dual Plus (Underlying Steel Chassis) FIPS Security Policy

Integral Memory PLC. Crypto Dual (Underlying Steel Chassis) and Crypto Dual Plus (Underlying Steel Chassis) FIPS Security Policy Integral Memory PLC. Chassis) and Crypto Dual Plus (Underlying FIPS 140-2 Security Policy Table of Contents 1. INTRODUCTION... 1 1.1 Purpose....1 1.2 References... 1 1.3 Document History... 1 2. PRODUCT

More information

FIPS Security Policy for Cisco Aironet Lightweight AP1131, AP1142, AP1242, AP1252, AP1262, CAP3502e, and CAP3502i Wireless LAN Access Points

FIPS Security Policy for Cisco Aironet Lightweight AP1131, AP1142, AP1242, AP1252, AP1262, CAP3502e, and CAP3502i Wireless LAN Access Points FIPS 140-2 Security Policy for Cisco Aironet Lightweight AP1131, AP1142, AP1242, AP1252, AP1262, CAP3502e, and CAP3502i Wireless LAN Access Points November 4, 2010 Version 2.2 Contents This security policy

More information

This Security Policy describes how this module complies with the eleven sections of the Standard:

This Security Policy describes how this module complies with the eleven sections of the Standard: Vormetric, Inc Vormetric Data Security Server Module Firmware Version 4.4.1 Hardware Version 1.0 FIPS 140-2 Non-Proprietary Security Policy Level 2 Validation May 24 th, 2012 2011 Vormetric Inc. All rights

More information

z/os: ICSF Version and FMID Cross Reference

z/os: ICSF Version and FMID Cross Reference : ICSF Version and FMID Cross Reference Abstract: This document describes the relationship between ICSF Web Deliverables, Releases, and IBM Z cryptographic hardware support, highlights the new functions

More information

Payment Card Industry (PCI) PIN Transaction Security (PTS) Point of Interaction (POI) Modular Evaluation Vendor Questionnaire Version 3.

Payment Card Industry (PCI) PIN Transaction Security (PTS) Point of Interaction (POI) Modular Evaluation Vendor Questionnaire Version 3. Payment Card Industry (PCI) PIN Transaction Security (PTS) Point of Interaction (POI) Modular Evaluation Vendor Questionnaire Version 3.1 September 2011 Document Changes Date Version Description April

More information

SecureDoc Disk Encryption Cryptographic Engine

SecureDoc Disk Encryption Cryptographic Engine SecureDoc Disk Encryption Cryptographic Engine Security Policy Abstract: This document specifies Security Policy enforced by the SecureDoc Cryptographic Engine compliant with the requirements of FIPS 140-2

More information

Meru Networks. Security Gateway SG1000 Cryptographic Module Security Policy Document Version 1.2. Revision Date: June 24, 2009

Meru Networks. Security Gateway SG1000 Cryptographic Module Security Policy Document Version 1.2. Revision Date: June 24, 2009 Security Gateway SG1000 Cryptographic Module Security Policy Document Version 1.2 Meru Networks Revision Date: June 24, 2009 Copyright Meru Networks 2008. May be reproduced only in its original entirety

More information

Sony Security Module. Security Policy

Sony Security Module. Security Policy Sony Security Module Security Policy Document Version 1.0.0 Sony Corporation FIPS 140-2 Non-Proprietary Copyright 2010 Sony Corporation TABLE OF CONTENTS 1. MODULE OVERVIEW... 3 2. SECURITY LEVEL... 5

More information

Dolphin Board. FIPS Level 3 Validation. Security Policy. Version a - Dolphin_SecPolicy_000193_v1_3.doc Page 1 of 19 Version 1.

Dolphin Board. FIPS Level 3 Validation. Security Policy. Version a - Dolphin_SecPolicy_000193_v1_3.doc Page 1 of 19 Version 1. Dolphin Board FIPS 140-2 Level 3 Validation Security Policy Version 1.3 14a - Dolphin_SecPolicy_000193_v1_3.doc Page 1 of 19 Version 1.3 Table of Contents 1 INTRODUCTION...3 1.1 PURPOSE...3 1.2 REFERENCES...3

More information

Lexmark PrintCryption TM (Firmware Version 1.3.1)

Lexmark PrintCryption TM (Firmware Version 1.3.1) Lexmark PrintCryption TM (Firmware Version 1.3.1) FIPS 140-2 Non-Proprietary Security Policy Level 1 Validation Version 0.95 April 2007 Table of Contents INTRODUCTION... 3 PURPOSE... 3 REFERENCES... 3

More information

SEL-3021 Serial Encrypting Transceiver Security Policy Document Version 1.9

SEL-3021 Serial Encrypting Transceiver Security Policy Document Version 1.9 SEL-3021 Serial Encrypting Transceiver Security Policy Document Version 1.9 Schweitzer Engineering Laboratories, Inc. May 21, 2007 Copyright 2005-2007 Schweitzer Engineering Laboratories, Inc. May be reproduced

More information

IBM 4768 PCIe Cryptographic Coprocessor with Common Cryptographic Architecture (CCA) PCI-HSM Security Policy

IBM 4768 PCIe Cryptographic Coprocessor with Common Cryptographic Architecture (CCA) PCI-HSM Security Policy IBM 4768 PCIe Cryptographic Coprocessor with Common Cryptographic Architecture (CCA) PCI-HSM Security Policy Version 1.11 July 19, 2018 This document may be reproduced only in its original entirety without

More information

Payment Card Industry (PCI) Point-to-Point Encryption

Payment Card Industry (PCI) Point-to-Point Encryption Payment Card Industry (PCI) Point-to-Point Encryption Solution Requirements and Version 2.0 (Revision 1.1) July 2015 Document Changes Date Version Revision Description 14 September 2011 1.0 Initial release

More information

WatchKey USB Token Cryptographic Module Model Number: K6 Smart Card Chip: Z32L256D32U PCB: K003010A Firmware Version: 360C6702

WatchKey USB Token Cryptographic Module Model Number: K6 Smart Card Chip: Z32L256D32U PCB: K003010A Firmware Version: 360C6702 WatchKey USB Token Cryptographic Module Model Number: K6 Smart Card Chip: Z32L256D32U PCB: K003010A Firmware Version: 360C6702 FIPS 140-2 Non-Proprietary Security Policy Policy Version 1.0.3 Last Updated:

More information

CoSign Hardware version 7.0 Firmware version 5.2

CoSign Hardware version 7.0 Firmware version 5.2 CoSign Hardware version 7.0 Firmware version 5.2 FIPS 140-2 Non-Proprietary Security Policy Level 3 Validation July 2010 Copyright 2009 AR This document may be freely reproduced and distributed whole and

More information

z/os: ICSF Version and FMID Cross Reference

z/os: ICSF Version and FMID Cross Reference : ICSF Version and FMID Cross Reference Abstract: This document describes the relationship between ICSF Web Deliverables, Releases, and IBM Z cryptographic hardware support, highlights the new functions

More information

User Manual. Spectrum Pro

User Manual. Spectrum Pro 80140502-001 User Manual Spectrum Pro PCI PTS 4.X Hybrid Insert Reader RS232 Interface 80140502-001 Rev 51 3/10/2015 International Technologies & Systems Corporation 10721 Walker Street, Cypress, CA 90630-4720;

More information

Payment Card Industry (PCI) Point-to-Point Encryption. Template for Report on Validation for use with P2PE v2.0 (Revision 1.1) for P2PE Solution

Payment Card Industry (PCI) Point-to-Point Encryption. Template for Report on Validation for use with P2PE v2.0 (Revision 1.1) for P2PE Solution Payment Card Industry (PCI) Point-to-Point Encryption Template for Report on Validation for use with P2PE v2.0 (Revision 1.1) for P2PE Solution Revision 1.1 June 2017 Document Changes Date Use with Version

More information

Payment Card Industry (PCI) PTS PIN Security Requirements. Technical FAQs for use with Version 2

Payment Card Industry (PCI) PTS PIN Security Requirements. Technical FAQs for use with Version 2 Payment Card Industry (PCI) PTS PIN Security Requirements Technical FQs for use with Version 2 December 2015 Table of Contents PIN Security Requirements: Frequently sked Questions... 1 General... 1 PIN

More information

Dolby IMS-SM FIPS Level 2 Validation. Nonproprietary Security Policy Version: 4

Dolby IMS-SM FIPS Level 2 Validation. Nonproprietary Security Policy Version: 4 Dolby IMS-SM FIPS 140-2 Level 2 Validation Nonproprietary Security Policy Version: 4 Corporate Headquarters Dolby Laboratories, Inc. 100 Potrero Avenue San Francisco, CA 94103-4813 USA Telephone 415-558-0200

More information

Stripe Terminal Implementation Guide

Stripe Terminal Implementation Guide Stripe Terminal Implementation Guide 12/27/2018 This document details how to install the Stripe Terminal application in compliance with PCI 1 PA-DSS Version 3.2. This guide applies to the Stripe Terminal

More information

Barco ICMP FIPS Non-Proprietary Security Policy

Barco ICMP FIPS Non-Proprietary Security Policy Barco FIPS 140-2 Non-Proprietary Security Policy 1 Page 1 of 26 Table of Content Table of Content... 2 1 Introduction... 3 1.1 Security Level... 3 1.2 Cryptographic Boundary... 4 1.3 FIPS 140-2 Approved

More information

TransKrypt Security Server

TransKrypt Security Server TransKrypt Security Server Overview Security of transactions is critical as the volume of payments are growing at a faster pace from new generation mobile and broadband based IP payment terminals and devices.

More information

Bluefly Processor. Security Policy. Bluefly Processor MSW4000. Darren Krahn. Security Policy. Secure Storage Products. 4.0 (Part # R)

Bluefly Processor. Security Policy. Bluefly Processor MSW4000. Darren Krahn. Security Policy. Secure Storage Products. 4.0 (Part # R) Bluefly Processor Security Policy PRODUCT NAME: PROJECT NUMBER: AUTHOR: Bluefly Processor MSW4000 Darren Krahn REVISION : 1.16 DOCUMENT REFERENCE : SP-MSW4000-01 DOCUMENT TYPE: DEPARTMENT: Security Policy

More information

ID-One PIV (Type A) FIPS Security Policy. (PIV Applet Suite on ID-One Cosmo V7-n) Public Version

ID-One PIV (Type A) FIPS Security Policy. (PIV Applet Suite on ID-One Cosmo V7-n) Public Version ID-One PIV (Type A) (PIV Applet Suite on ID-One Cosmo V7-n) FIPS 140-2 Security Policy Public Version Oberthur Technologies of America 4250 Pleasant Valley Road Chantilly, VA 20151-1221 - USA Document

More information

CAT862 Dolby JPEG 2000/MPEG-2 Media Block IDC Security Policy. Version 3 June 30, 2010

CAT862 Dolby JPEG 2000/MPEG-2 Media Block IDC Security Policy. Version 3 June 30, 2010 CAT862 Dolby JPEG 2000/MPEG-2 Media Block IDC Security Policy Version 3 June 30, 2010 Dolby Laboratories Licensing Corporation Corporate Headquarters Dolby Laboratories, Inc. Dolby Laboratories Licensing

More information

Payment Card Industry (PCI) PIN Security. Requirements and Testing Procedures. Version 2.0. December 2014

Payment Card Industry (PCI) PIN Security. Requirements and Testing Procedures. Version 2.0. December 2014 Payment Card Industry (PCI) PIN Security Requirements and Version 2.0 December 2014 Document Changes Date Version Description October 2011 1.0 Initial release of PCI December 2014 2.0 Initial release of

More information

econet smart grid gateways: econet SL and econet MSA FIPS Security Policy

econet smart grid gateways: econet SL and econet MSA FIPS Security Policy econet smart grid gateways: econet SL and econet MSA FIPS 140 2 Security Policy Level 2 Validation Document Version 0.5 Hardware Versions: ENSL2, ENSL5 and ENMSA2 Firmware Version: 3.2.1 FIPS Nexgrid,

More information

ACOS5-64. Functional Specifications V1.04. Subject to change without prior notice.

ACOS5-64. Functional Specifications V1.04. Subject to change without prior notice. ACOS5-64 Functional Specifications V1.04 Subject to change without prior notice Table of Contents 1.0. Introduction... 4 1.1. Card Features... 4 1.2. History of Modifications... 5 2.0. Technical Specifications...

More information

The SafeNet Security System Version 3 Overview

The SafeNet Security System Version 3 Overview The SafeNet Security System Version 3 Overview Version 3 Overview Abstract This document provides a description of Information Resource Engineering s SafeNet version 3 products. SafeNet version 3 products

More information

Overview of SSL/TLS. Luke Anderson. 12 th May University Of Sydney.

Overview of SSL/TLS. Luke Anderson. 12 th May University Of Sydney. Overview of SSL/TLS Luke Anderson luke@lukeanderson.com.au 12 th May 2017 University Of Sydney Overview 1. Introduction 1.1 Raw HTTP 1.2 Introducing SSL/TLS 2. Certificates 3. Attacks Introduction Raw

More information

FIPS Non-Proprietary Security Policy. Level 1 Validation Version 1.2

FIPS Non-Proprietary Security Policy. Level 1 Validation Version 1.2 Oracle Solaris Kernel Cryptographic Framework with SPARC T4 and T5 Software Version: 1.0 and 1.1; Hardware Version: SPARC T4 (527-1437-01) and T5 (7043165) FIPS 140-2 Non-Proprietary Security Policy Level

More information

Symantec Corporation

Symantec Corporation Symantec Corporation Symantec PGP Cryptographic Engine FIPS 140-2 Non-proprietary Security Policy Document Version 1.0.4 Revision Date 05/01/2015 Symantec Corporation, 2015 May be reproduced only in its

More information

Security in NVMe Enterprise SSDs

Security in NVMe Enterprise SSDs Security in NVMe Enterprise SSDs Radjendirane Codandaramane, Sr. Manager, Applications, Microsemi August 2017 1 Agenda SSD Lifecycle Security threats in SSD Security measures for SSD August 2017 2 SSD

More information

Payment Card Industry (PCI) PIN Transaction Security (PTS) Point of Interaction (POI) Modular Evaluation Vendor Questionnaire Version 4.

Payment Card Industry (PCI) PIN Transaction Security (PTS) Point of Interaction (POI) Modular Evaluation Vendor Questionnaire Version 4. Payment Card Industry (PCI) PIN Transaction Security (PTS) Point of Interaction (POI) Modular Evaluation Vendor Questionnaire Version 4.0 June 2013 Document Changes Date Version Description April 2010

More information

DataTraveler 5000 (DT5000) and DataTraveler 6000 (DT6000) Ultimate Security in a USB Flash Drive. Submitted by SPYRUS, Inc.

DataTraveler 5000 (DT5000) and DataTraveler 6000 (DT6000) Ultimate Security in a USB Flash Drive. Submitted by SPYRUS, Inc. Submitted by SPYRUS, Inc. Contents DT5000 and DT6000 Technology Overview...2 Why DT5000 and DT6000 Encryption Is Different...3 Why DT5000 and DT6000 Encryption Is Different - Summary...4 XTS-AES Sector-Based

More information

KEY-UP Cryptographic Module Security Policy Document Version 0.5. Ian Donnelly Systems (IDS)

KEY-UP Cryptographic Module Security Policy Document Version 0.5. Ian Donnelly Systems (IDS) KEY-UP Cryptographic Module Security Policy Document Version 0.5 Ian Donnelly Systems (IDS) December 29, 2005 Copyright Ian Donnelly Systems 2005. May be reproduced only in its original entirety [without

More information

SecureD v Security Policy

SecureD v Security Policy SecureD v.1.6.1 Security Policy Document Number: SecureD Security Policy 100502DS 02.00 Information Grade: Non-Proprietary Effective Date: 2005-01-10 Updated: 2006-11-01 High Density Devices AS Ballastgata

More information

Payment Card Industry (PCI) PTS PIN Security Requirements. Technical FAQs for use with Version 2

Payment Card Industry (PCI) PTS PIN Security Requirements. Technical FAQs for use with Version 2 Payment Card Industry (PCI) PTS PIN Security Requirements Technical FQs for use with Version 2 pril 2016 Table of Contents PIN Security Requirements: Frequently sked Questions... 1 General... 1 PIN Security

More information

Q2. Why is there an Australian specific device approval process?

Q2. Why is there an Australian specific device approval process? IAC DEVICE EVALUATION FAQ Version 3 (Effective 21 November 2016) This FAQ provides answers to questions regarding APCA s physical and logical device security requirements and evaluation methodologies as

More information

ID ISC.LR200-A/B First Steps to get the Serial Number from a Transponder

ID ISC.LR200-A/B First Steps to get the Serial Number from a Transponder 1 Preparation ID ISC.LR200-A/B First Steps to get the Serial Number from a Transponder (Using ISOStart Version 6.0 or higher) 1 Connect the ID ISC.LR200 via RS232 or RS485 to the PC 2 Install the Demo

More information

Entrust IdentityGuard PIV Credential FIPS Cryptographic Module Security Policy Version: 1.0 Date: January 24, 2013

Entrust IdentityGuard PIV Credential FIPS Cryptographic Module Security Policy Version: 1.0 Date: January 24, 2013 FIPS 140-2 Cryptographic Module Security Policy Version: 1.0 Date: January 24, 2013 Copyright 2013 Entrust 1000 Innovation Drive, Ottawa, ON, Canada K2K 3E7 Table of Contents 1 Introduction...4 1.1 Hardware

More information

SafeNet LUNA EFT FIPS LEVEL 3 SECURITY POLICY

SafeNet LUNA EFT FIPS LEVEL 3 SECURITY POLICY SafeNet LUNA EFT FIPS 140-2 LEVEL 3 SECURITY POLICY DOCUMENT NUMBER: CR-2786 AUTHOR(S): Brian Franklin / Terry Fletcher / Chris Brych DEPARTMENT: Engineering LOCATION OF ISSUE: Ottawa DATE ORIGINATED:

More information

eidas compliant Trust Services with Utimaco HSMs

eidas compliant Trust Services with Utimaco HSMs eidas compliant Trust Services with Utimaco HSMs March 15, 2018 Dieter Bong Product Manager Utimaco HSM Business Unit Aachen, Germany 2018 eidas-compliant Trust Services with Utimaco HSMs Page 1 eidas

More information

Google Cloud Platform: Customer Responsibility Matrix. December 2018

Google Cloud Platform: Customer Responsibility Matrix. December 2018 Google Cloud Platform: Customer Responsibility Matrix December 2018 Introduction 3 Definitions 4 PCI DSS Responsibility Matrix 5 Requirement 1 : Install and Maintain a Firewall Configuration to Protect

More information

American Express Online PIN & PIN Security Requirements

American Express Online PIN & PIN Security Requirements Frequently Asked Questions American Express Online PIN & PIN Security Requirements Contents Participants not yet Online PIN Enabled... 2 Participants planning to meet new PCI PIN Security Standards...

More information

Payment Card Industry (PCI) PTS PIN Security Requirements. Technical FAQs for use with Version 2

Payment Card Industry (PCI) PTS PIN Security Requirements. Technical FAQs for use with Version 2 Payment Card Industry (PCI) PTS PIN Security Requirements Technical FQs for use with Version 2 June 2015 Table of Contents PIN Security Requirements: Frequently sked Questions... 1 General... 1 PIN Security

More information

HSM 8000 payshield Thales Key Blocks Application Note. PWPR November

HSM 8000 payshield Thales Key Blocks Application Note. PWPR November HSM 8000 payshield 9000 Thales Key Blocks Application Note PWPR0513-003 November 2010 www.thalesgroup.com/iss Multiple LMKs >> Table of Contents >> Table of Contents... 2 >> Introduction... 3 >> Existing

More information

Rev. C 8/16/2017. VP3300/VP3300C/VP3300E User Manual

Rev. C 8/16/2017. VP3300/VP3300C/VP3300E User Manual 80149509-001 Rev. C 8/16/2017 VP3300/VP3300C/VP3300E User Manual Copyright 2017, ID TECH. All rights reserved. ID TECH 10721 Walker Street Cypress, CA 90630 USA This document, as well as the software and

More information

Cisco VPN 3002 Hardware Client Security Policy

Cisco VPN 3002 Hardware Client Security Policy Introduction This non-proprietary Cryptographic Module Security Policy describes how the VPN 3002 and 3002 8E Hardware Client (Firmware version FIPS 3.6.7.F) meets the security requirements of FIPS 140-2,

More information

FIPS Security Policy for Cisco Aironet Lightweight AP1131, AP1142, AP1242, AP1252, and AP1522 Wireless LAN Access Points

FIPS Security Policy for Cisco Aironet Lightweight AP1131, AP1142, AP1242, AP1252, and AP1522 Wireless LAN Access Points FIPS 140-2 Security Policy for Cisco Aironet Lightweight AP1131, AP1142, AP1242, AP1252, and AP1522 Wireless LAN Access Points August 25, 2009 Version 1.7 Contents This security policy contains these sections:

More information

DERIVED UNIQUE TOKEN PER TRANSACTION

DERIVED UNIQUE TOKEN PER TRANSACTION SESSION ID: ASEC-W04 DERIVED UNIQUE TOKEN PER TRANSACTION Jeff Stapleton VP Security Architect Wells Fargo X9F4 workgroup chair Application Security Solution: tokenization technology Substitute sensitive

More information

FIPS Security Policy. for Marvell Semiconductor, Inc. Solaris 2 Cryptographic Module

FIPS Security Policy. for Marvell Semiconductor, Inc. Solaris 2 Cryptographic Module FIPS 140-2 Security Policy for Marvell Semiconductor, Inc. Solaris 2 Cryptographic Module Hardware Version: 88i8925, 88i8922, 88i8945, and 88i8946 Firmware Version: Solaris2-FIPS-FW-V1.0 Document Version:

More information

Advanced Certifications PA-DSS and P2PE. Erik Winkler, VP, ControlCase

Advanced Certifications PA-DSS and P2PE. Erik Winkler, VP, ControlCase Advanced Certifications PA-DSS and P2PE Erik Winkler, VP, ControlCase ControlCase Annual Conference Miami, Florida USA 2017 PCI Family of Standards Ecosystem of payment devices, applications, infrastructure

More information

Security Policy for Schlumberger Cyberflex Access 32K Smart Card with ActivCard Applets

Security Policy for Schlumberger Cyberflex Access 32K Smart Card with ActivCard Applets Security Policy for Schlumberger Cyberflex Access 32K Smart Card with ActivCard Applets TABLE OF CONTENTS 1 SCOPE OF DOCUMENT... 1 2 INTRODUCTION... 1 3 SECURITY LEVELS... 1 3.1 CRYPTOGRAPHIC MODULE SPECIFICATION...

More information

Satisfying CC Cryptography Requirements through CAVP/CMVP Certifications. International Crypto Module Conference May 19, 2017

Satisfying CC Cryptography Requirements through CAVP/CMVP Certifications. International Crypto Module Conference May 19, 2017 Satisfying CC Cryptography Requirements through CAVP/CMVP Certifications International Crypto Module Conference May 19, 2017 Synopsis Background NIAP policy relating to cryptographic requirements NIAP

More information

Telkonet G3 Series ibridge/extender Security Policy

Telkonet G3 Series ibridge/extender Security Policy Telkonet G3 Series ibridge/extender March 7, 2006 Telkonet Communications, Inc. 20374 Seneca Meadows Pkwy Germantown, MD 20876 Telephone: 240-912-1800 FAX: 240-912-1839 www.telkonet.com Copyright 2004

More information

Oracle Solaris Userland Cryptographic Framework Software Version 1.0 and 1.1

Oracle Solaris Userland Cryptographic Framework Software Version 1.0 and 1.1 Oracle Solaris Userland Cryptographic Framework Software Version 1.0 and 1.1 FIPS 140-2 Non-Proprietary Security Policy Level 1 Validation Version 1.3 2014-01-08 Copyright 2014 Oracle Corporation Table

More information

Payment Card Industry (PCI) Software-based PIN Entry on COTS. Security Requirements. Version 1.0. January 2018

Payment Card Industry (PCI) Software-based PIN Entry on COTS. Security Requirements. Version 1.0. January 2018 Payment Card Industry (PCI) Software-based PIN Entry on COTS Security Version 1.0 January 2018 Document Changes Date Version Description January 2018 1.0 Initial Release PCI Software-Based PIN Entry on

More information

The Xirrus Wi Fi Array XS4, XS8 Security Policy Document Version 1.0. Xirrus, Inc.

The Xirrus Wi Fi Array XS4, XS8 Security Policy Document Version 1.0. Xirrus, Inc. The Xirrus Wi Fi Array XS4, XS8 Security Policy Document Version 1.0 Xirrus, Inc. March 8, 2011 Copyright Xirrus, Inc. 2011. May be reproduced only in its original entirety [without revision]. Page 1 TABLE

More information

Interface. Circuit. CryptoMate

Interface. Circuit. CryptoMate A C O S 5 - C T M C r y p t o M a t e U S B T o k e n Version 1.5 03-2007, Email: info@acs.com.hk Website: www.acs.com.hk CryptoMate USB Token 1.0 Introduction Frustrated by network breaches like Trojan

More information

UnionPay QuickPass Terminal Product Certification Rules

UnionPay QuickPass Terminal Product Certification Rules Document No.: UPCA--02V.0 PU UnionPay QuickPass Terminal Product Certification Rules Issued on July, 205 Implemented from July, 205 Issued by China UnionPay Co., Ltd. UnionPay QuickPass Terminal Product

More information

FIPS Security Policy

FIPS Security Policy Version 1.8 Last Update: 09/4/2014 1 WideBand Corporation 401 West Grand Street, Gallatin, MO 64640, USA 1 The actual module is a single chip within the depicted package WideBand Corporation, 2014 and

More information

Security Requirements for Crypto Devices

Security Requirements for Crypto Devices Security Requirements for Crypto Devices Version 1.0 02 May 2018 Controller of Certifying Authorities Ministry of Electronics and Information Technology 1 Document Control Document Name Security Requirements

More information

FIPS SECURITY POLICY FOR

FIPS SECURITY POLICY FOR FIPS 140-2 SECURITY POLICY FOR SPECTRAGUARD ENTERPRISE SENSOR August 26, 2011 FIPS 140-2 LEVEL-2 SECURITY POLICY FOR AIRTIGHT NETWORKS SPECTRAGUARD ENTERPRISE SENSOR 1. Introduction This document describes

More information

BCM58100B0 Series: BCM58101B0, BCM58102B0, BCM58103B0 Cryptographic Module VC0 Non-Proprietary Security Policy Document Version 0.

BCM58100B0 Series: BCM58101B0, BCM58102B0, BCM58103B0 Cryptographic Module VC0 Non-Proprietary Security Policy Document Version 0. BCM58100B0 Series: BCM58101B0, BCM58102B0, BCM58103B0 Cryptographic Module VC0 Non-Proprietary Security Policy Document Version 0.8 Broadcom Ltd. Revision Date: 2016-05-25 Copyright Broadcom 2016. May

More information

FIRMWARE RELEASE-NOTE. OBID classic-pro ID CPR50.10-E. RF-Controller (RFC) preliminary public (B) SWRN ID CPR50_10-E.

FIRMWARE RELEASE-NOTE. OBID classic-pro ID CPR50.10-E. RF-Controller (RFC) preliminary public (B) SWRN ID CPR50_10-E. OBID classic-pro FIRMWARE RELEASE-NOTE ID CPR50.10-E RF-Controller (RFC) preliminary public (B) 2011-04-04 SWRN ID CPR50_10-E.doc Note Copyright 2010-11 by FEIG ELECTRONIC GmbH Lange Strasse 4 D-35781

More information

Google Cloud Platform: Customer Responsibility Matrix. April 2017

Google Cloud Platform: Customer Responsibility Matrix. April 2017 Google Cloud Platform: Customer Responsibility Matrix April 2017 Introduction 3 Definitions 4 PCI DSS Responsibility Matrix 5 Requirement 1 : Install and Maintain a Firewall Configuration to Protect Cardholder

More information

WatchKey ProX USB Token Cryptographic Module Hardware Version: K023314A Firmware Version:

WatchKey ProX USB Token Cryptographic Module Hardware Version: K023314A Firmware Version: Watchdata Technologies Pte Ltd. 7F Qiming International Mansion, No.101, Wangjing Lize Middle Park, Chaoyang District, Beijing, P.R.China, 100102 Phone : (8610)6472 2288 (8610)8047 8166 Email : marketing@watchdata.com

More information

ID ISC.MR200-E TCP/IP

ID ISC.MR200-E TCP/IP OBID i-scan APPLICATION-NOTE ID ISC.MR200-E TCP/IP Controller Firmware Update preliminary public (B) 2005-06-08 N50600-0e-ID-B.doc Note Copyright 2005 by FEIG ELECTRONIC GmbH Lange Strasse 4 D-35781 Weilburg-Waldhausen

More information

WHAT FUTURE FOR CONTACTLESS CARD SECURITY?

WHAT FUTURE FOR CONTACTLESS CARD SECURITY? WHAT FUTURE FOR CONTACTLESS CARD SECURITY? Alain Vazquez (alain.vazquez@louveciennes.sema.slb.com) 1/27 AV Contents Major contactless features : summary Contactless major constraints Major security issues

More information

Distributed Systems. 25. Authentication Paul Krzyzanowski. Rutgers University. Fall 2018

Distributed Systems. 25. Authentication Paul Krzyzanowski. Rutgers University. Fall 2018 Distributed Systems 25. Authentication Paul Krzyzanowski Rutgers University Fall 2018 2018 Paul Krzyzanowski 1 Authentication For a user (or process): Establish & verify identity Then decide whether to

More information

Chapter 8 Web Security

Chapter 8 Web Security Chapter 8 Web Security Web security includes three parts: security of server, security of client, and network traffic security between a browser and a server. Security of server and security of client

More information

COMMON CRITERIA CERTIFICATION REPORT

COMMON CRITERIA CERTIFICATION REPORT COMMON CRITERIA CERTIFICATION REPORT Ixia NTO 7303 and Vision ONE v4.5.0.29 30 October 2017 383-4-409 1.0 Government of Canada. This document is the property of the Government of Canada. It shall not be

More information

Security Policy: Astro Subscriber Encryption Module Astro Spectra, Astro Saber, Astro Consolette, and Astro XTS3000. Version

Security Policy: Astro Subscriber Encryption Module Astro Spectra, Astro Saber, Astro Consolette, and Astro XTS3000. Version Security Policy: Astro Subscriber Encryption Module Astro Spectra, Astro Saber, Astro Consolette, and Astro XTS3000 Version 02.00.07 3/22/2004 1.0 Introduction 3 1.1 Scope 3 1.2 Overview 3 1.3 Astro Subscriber

More information

Smart TV Security Solution V2.0 for Samsung Knox. Certification Report

Smart TV Security Solution V2.0 for Samsung Knox. Certification Report KECS-CR-17-82 Smart TV Security Solution V2.0 for Samsung Knox Certification Report Certification No.: KECS-CISS-0846-2017 2017. 12. 27 IT Security Certification Center History of Creation and Revision

More information

Computer Security. 08r. Pre-exam 2 Last-minute Review Cryptography. Paul Krzyzanowski. Rutgers University. Spring 2018

Computer Security. 08r. Pre-exam 2 Last-minute Review Cryptography. Paul Krzyzanowski. Rutgers University. Spring 2018 Computer Security 08r. Pre-exam 2 Last-minute Review Cryptography Paul Krzyzanowski Rutgers University Spring 2018 March 26, 2018 CS 419 2018 Paul Krzyzanowski 1 Cryptographic Systems March 26, 2018 CS

More information

Mobile Payment Application Security. Security steps to take while developing Mobile Application s. SISA Webinar.

Mobile Payment Application Security. Security steps to take while developing Mobile Application s. SISA Webinar. Mobile Payment Application Security Security steps to take while developing Mobile Application s About SISA Payment Security Specialists PCI Certification Body (PCI Qualified Security Assessor) Payment

More information

IBM System Storage TS1120 Tape Drive - Machine Type 3592, Model E05. Security Policy

IBM System Storage TS1120 Tape Drive - Machine Type 3592, Model E05. Security Policy - i - IBM System Storage TS1120 Tape Drive - Machine Type 3592, Model E05 Security Policy ii 1 Document History...1 2 Introduction...1 2.1 References...2 2.2 Document Organization...2 3 TS1120 Encrypting

More information

IBM i Version 7.2. Security Digital Certificate Manager IBM

IBM i Version 7.2. Security Digital Certificate Manager IBM IBM i Version 7.2 Security Digital Certificate Manager IBM IBM i Version 7.2 Security Digital Certificate Manager IBM Note Before using this information and the product it supports, read the information

More information

Getting Started with ID ISC.LR(M)U1000/2000 UHF-Reader

Getting Started with ID ISC.LR(M)U1000/2000 UHF-Reader Getting Started with ID ISC.LR(M)U1000/2000 UHF-Reader FEIG ELECTRONIC GmbH, Lange Strasse 4, D-35781 Weilburg (tel) +49 (0) 6471 3109 0, (fax) +49 (0) 6471 3109 99 (web) http://www.feig.de (email) OBID@feig.de

More information

Security Policy for FIPS KVL 3000 Plus

Security Policy for FIPS KVL 3000 Plus Security Policy for FIPS 140-2 KVL 3000 Plus Version 01.01.19 Motorola General Business Information 1 of 21 Motorola General Business Information 2 of 21 1 INTRODUCTION... 4 1.1 SCOPE... 4 1.2 OVERVIEW...

More information

August, Actividentity CTO Office

August, Actividentity CTO Office The Open Protocol for Access Control Identification and Ticketing with PrivacY For the Secure Enablement of converged Access and Contactless Transactions August, 2010 Actividentity CTO Office 2 What is

More information

MultiApp ID V2.1 Platform FIPS Cryptographic Module Security Policy

MultiApp ID V2.1 Platform FIPS Cryptographic Module Security Policy Table of Contents References...4 Acronyms and definitions...5 1 Introduction...6 1.2 Firmware and Logical Cryptographic Boundary... 8 1.3 Versions and mode of operation... 9 2 Cryptographic functionality...

More information

Oberthur ID-One Cosmo 64 v5.4 D. FIPS Level 3. Security Policy. Public Version. Version 1.0. May 22, 2007

Oberthur ID-One Cosmo 64 v5.4 D. FIPS Level 3. Security Policy. Public Version. Version 1.0. May 22, 2007 Oberthur ID-One Cosmo 64 v5.4 D FIPS 140-2 Level 3 Public Version Version 1.0 May 22, 2007 Oberthur Card Systems 4250 Pleasant Valley Road Chantilly, VA 20151-1221 USA +1 (703) 263-0100 Version Control

More information

Hughes Network Systems, LLC Hughes Crypto Kernel Firmware Version: FIPS Non-Proprietary Security Policy

Hughes Network Systems, LLC Hughes Crypto Kernel Firmware Version: FIPS Non-Proprietary Security Policy Hughes Network Systems, LLC Hughes Crypto Kernel Firmware Version: 3.1.0.4 FIPS 140-2 Non-Proprietary Security Policy FIPS Security Level: 1 Document Version: 0.5 Prepared for: Prepared by: Hughes Network

More information