Watchdata W9110 Security Policy

Size: px
Start display at page:

Download "Watchdata W9110 Security Policy"

Transcription

1 Watchdata W9110 Security Policy Production Name: W9110 Production Version: 0.9

2 2/18 Table of Contents TABLE OF CONTENTS DOCUMENT INFORMATION EVOLUTION FOLLOW-UP ACRONYMS & TERMS REFERENCE INTRODUCTION GENERAL DESCRIPTION PRODUCTION OVERVIEW PRODUCTION IDENTIFICATION COMMUNICATION METHODS AND PROTOCOLS GUIDANCE INSTALLATION AND ENVIRONMENT EQUIPMENT USB Cable Power Equipment debugging and operation Environment Conditions and Environmental Failure Protection Self-Tests DECOMMISSIONING/REMOVAL PIN CONFIDENTIALITY PERIODIC INSPECTION PRODUCT HARDWARE SECURITY TAMPER RESPONSE EVENT ENVIRONMENT CONDITIONS AND ENVIRONMENTAL FAILURE PROTECTION PRODUCT SOFTWARE SECURITY SOFTWARE DEVELOPMENT GUIDANCE FIRMWARE, SOFTWARE AND CONFIGURATION PARAMETERS UPDATE SOFTWARE AUTHENTICATION UPDATE AND PATCH MANAGEMENT SELF-TESTS SYSTEM ADMINISTRATION CONFIGURATION SETTINGS DEFAULT VALUE UPDATE KEY MANAGEMENT KEY MANAGEMENT TECHNIQUES TRANSFER KEY/MASTER KEY/SESSION KEY DUKPT KEY CRYPTOGRAPHIC ALGORITHMS KEY TABLE KEY REPLACEMENT KEY LOADING POLICY KEY LIFETIME ROLES AND SERVICES... 18

3 3/18 1. Document Information 1.1 Evolution follow-up Revision Type of modification Date 0.1 Document creation Update Key Table Remove fixed key description Update reference Update section 6.1, 6.2, 7.2 & Update section Update section Update section Update section 3.2 Update section Update section 3.3 Update section Update section Acronyms & Terms Abbreviation DUKPT N/A PED PIN RSA SHA TDES IC Card RF Card SK Description Derived Unique Key Per Transaction Not Applicable PIN Entry Device Personal Identification Number Rivest Shamir Adelman Algorithm Secure Hash Algorithm Triple Data Encryption Standard Integrate Circuit Card Radio Frequency Card Session Key 1.3 Reference [1] ANS X9.24 1:2009, Retail Financial Services Symmetric Key Management Part 1: Using Symmetric Techniques [2] ANS X9.24 Part 2: 2006, Retail Financial Services Symmetric Key Management Part 2: Using Asymmetric Techniques for the Distribution of Symmetric Keys [3] X9 TR , Interoperable Secure Key Exchange Key Block Specification for Symmetric Algorithms [4] ISO , Financial services-personal Identification Number (PIN) management and security Part 1: Basic principles and requirements for PINs in card based systems

4 4/18 [5] ISO , Banking-Personal Identification Number management and security Part 2: Approved algorithms for PIN encipherment [6] Device Default Settings Overview [7] Firmware Update User Manual

5 5/18 2. Introduction This document addresses the proper use of the POI in a secure manner including information about keymanagement responsibilities, administrative responsibilities, device functionality, identification and environmental requirements. The use of the device in an unapproved method, as describe on the security policy, will violate the PCI PTS approval of the device.

6 6/18 3. General description 3.1 Production Overview W9110 is a new generation of intelligent wireless POS with touch screen and high-speed communications. This product is mainly for indoor usage, its target merchant are the restaurants, entertainment, chain stores, supermarkets, E-commerce and so on. W9110 is configured with ARM Cortex-A53 quad-core processor to provide powerful processing capabilities. This product integrates MSR Card Reader, IC Card Reader, Contactless Card Reader, SAM Card Reader and high performance thermal printer. And it can deal with diversified financial transactions. W9110 supports various wireless communication such as GSM, CDMA, CDMA2000, TDSCDMA, WCDMA, LTE, WIFI, Bluetooth and GPS. Figure 1 W9110 Appearance W9110 Configuration Configuration Barcode Function 1D barcode 2D barcode Camera 2M Pixels 2G/3G/4G Wireless communication GPS WIFI + BT

7 7/ Production Identification The product name and hardware version are printed on a label on the device. Figure 2 Device Label The merchant or acquirer must visually inspect the terminal when received via shipping, as it is described in the user manual. For example, the merchant or acquirer should inspect the terminal to ensure that: There is no evidence of unusual wires that have been connected to any ports of the terminal, There is no shim device in the of the ICC acceptor To examine the firmware version, after POS boot up, enter into Settings - About terminal - Firmware version. 3.3 Communication methods and protocols Communication methods: USB, 2G/3G/4G, WIFI, GPS, BLUETOOTH Communication protocols: TCP/IP stack, SSL/TLS, PPP

8 8/18 4. Guidance 4.1 Installation and Environment Please ensure the terminal installation in favor of merchants and cardholders have very convenient level, as close as possible to the power socket. Terminal should stay away from all sources of heat, to prevent vibration, dust, moisture and electromagnetic radiation (such as a computer screen, motor, security facilities etc.). The wireless terminal please pays attention away from electromagnetic radiation complex place when in use. Be sure that terminal is used in an attended way. 4.2 Equipment USB Cable The USB of W9110 for the Micro USB interface, with the need to use USB cable suitable. The cable specifications and methods of use, can consult the WATCHDATA customer service, in order to get professional help Power Take out the power supply in a packaging box, the DC plug into the power socket, as shown in figure 2: Figure 3 Power Socket Specification of power supply: Input: 100 to 240V AC, 50 Hz /60Hz Output: 10V 1A Equipment debugging and operation (1) Power supply socket terminal is connected; check the line of communication, SAM card, SIM card is connected. (2) Press the power button, to observe whether the terminal starts. (3) Do test run after the equipment installed to ensure the device installed successfully.

9 9/ Environment Conditions and Environmental Failure Protection The environmental conditions to operate the device are specified in the user manual. The security of the device is not compromised by altering the environmental conditions (e.g. subjecting the device to temperature or operating voltages outside the stated operating ranges does not alter the security) Self-Tests Self tests are performed upon start up/reset. In order to reinitialize memory, the device will reboot in 24 hours after it starts up. Self-tests are not initiated by an operator. 4.3 Decommissioning/Removal When the device is no longer used for permanent decommissioning reason, the administrator of the device needs to gather the device and then erase all the key materials on it. It can be done by directly dis-assemble the device to make it tampered. For the temporary removal, there is no need to change the state of the device, as all the keys are still protected safely by the main board hardware tamper mechanism. 4.4 PIN Confidentiality W9110 is a hand-held device; it is required to provide cardholders with the necessary privacy during PIN entry. For example, the device will demonstrate a safe PIN-entry process how to entry PIN. This message reminds cardholder that he can use his own body or their free hand to block the view of keypad. Figure 4 Safe PIN Entry Logo Example

10 10/ Periodic Inspection The merchant or acquirer should daily check that the keypad is firmly in place. Such checks would provide warning of any unauthorized modification to the terminal, and other suspicious behavior of the terminal. The merchant or acquirer should also check that the installation/maintenance operations are performed by a trusted person. Especially check if the ICC reader slot is damaged, such as abrasion, painting and other machining marks, and if there is any suspicious object like lead wire over ICC reader slot, or any unknown object inside IC card. If you find these suspicious circumstances, please stop using the device immediately and contact the customer service to confirm if the device has been tampered with.

11 11/18 5. Product Hardware Security 5.1 Tamper Response Event The device contains tamper mechanisms that will trigger when a physical penetration attempt of the device is detected. A merchant or acquirer can easily detect a tampered terminal: Device shows a dialog to notify that PED TAMPERD!, after close it,then turn to Non-activated mode. Any physical penetration will result in a tamper event. This event causes the activation of tamper mechanisms that make the device out of service. There are two separate modes in which the device can be: Activated mode: the device is fully operational. Non-activated mode: the device is tampered, not operating and needs reactivation after maintenance and security checks. 5.2 Environment Conditions and Environmental Failure Protection The environmental conditions to operate the device are specified in the user manual. The security of the device is not compromised by altering the environmental conditions (e.g. subjecting the device to temperature or operating voltages outside the stated operating ranges does not alter the security).

12 12/18 6. Product Software Security 6.1 Software Development Guidance During the software development, the following steps must be implemented: 1. Code Review. 2. Security review and audit 3. Module test 4. Source code management and version control 5. Software test 6. Signature For SSL application, the developer must respect the SSL security guidance, it is important to note SSL is inherently weak and should be removed, but considering the SSL server still exist in the world, in order to compatible, we temporarily keep SSL as non-financial applications use. In addition, Our SSL only as the client, so we strongly recommend a server disables SSL protocol, select TLS1.2 or higher. For more secure, mutual authentication is recommended. The SSL/TLS version supported in this device shown as following table: SSL/TLS Capability Version SSL v3 TLS v1.0, v1.1, v1,2 Refer to the document Software Development Guidance. 6.2 Firmware, Software and Configuration Parameters Update Updates and patches can be loaded in the device. They are cryptographically authenticated by the device. If the authenticity is not confirmed, the update or patch is rejected. Prompts updates are security related and any security related firmware changes will cause firmware version update. The update package transfer over-the-air (OTA) via the HTTPS protocol. Refer to the document Firmware Update User Manual. 6.3 Software Authentication Application code is authenticated before being allowed to run. The certificate and signature of the application code is verified. The certificate and signature are based on couples of RSA keys. The authenticity is guaranteed by a certificate emitted by WATCHDATA. SHA256 is used to compute the digest of software. RSA 2048 bit key is used for signature verification. The application managers must implement a full source code review to make sure that the application does not have one of following behaviors: PIN entry prompt while the keypad digit is displayed in plain-text. Not using the correct security mechanism and APIs recommended in the user guidance for PIN entry. Storing or outputting any card holder s account data without his/her authorization.

13 13/18 It is recommended that the application source code review and signing process is executed by at least two persons and that an audit log is recorded for future trace back. 6.4 Update and patch management The device supports both local and remote methods for updating or patching the software, the firmware, and the configuration parameters. 1. The patch must be Security reviewed and audited before releasing. 2. The patch must be tested before releasing. 3. The patch must be digital signed before releasing. 4. The downloaded patch is stored in the temporary directory of the device, then the device uses digital signature to authenticate the patch. If the patch is illegal, the device will delete it. 6.5 Self-Tests Self tests are performed upon start up/reset. In order to reinitialize memory, the device will reboot in 24 hours after it starts up. Self-tests are not initiated by an operator.

14 14/18 7. System Administration 7.1 Configuration Settings The device need to configure when received by key-loading facility. About the configuration settings of admin and key-loading operator password, please refer to the Device_Default_Settings_Overview. The device is functional when received by the merchant or acquirer. No security sensitive configuration settings are necessary to be tuned by the end user to meet security requirements. 7.2 Default Value Update The device default value (e.g. admin password, key loading operator passwords) should be updated before load keys or activate device. About the default value update flow, please refer to the document Device_Default_Settings_Overview. The device is functional when received by the merchant or acquirer and there is no security sensitive default value (e.g. admin password) that needs to be changed before operating the device.

15 15/18 8. Key Management Device support multi acquirers, each acquirer is assigned a separate key store area (KAP) by the owner of device. Each KAP supports key management techniques described below. 8.1 Key Management Techniques The device implements different types of key management techniques: TLK/Master Key/Session Key: a method using a hierarchy of keys. The session keys are unique per transaction as specified in [2]. DUKPT: a key management technique based on a unique key for each transaction as specified in [2]. Use of the terminal with a key-management system other than these two above will invalidate any PCI approval of the terminal. 8.2 Transfer Key/Master Key/Session Key A acquirer s TLK/MK/SK hierarchy can be used in a KAP. MK also named TMK in this device. SK is session key, including TPK/TAK/TEK/TDK/TTK commonly. SEK is used to encrypt/decrypt MK and SK stored in FLASH. MK is used to encrypt session keys transferred. TLK is used to encrypt MK transferred. The session keys can be divided into three types: TPK (Terminal Pin Encryption Key), TAK (Terminal MAC Calculating Key) and TDK(Terminal Data encryption Key). 8.3 Dukpt Key Acquirer downloads initial key in the secure room. Then it will generate 21 future keys under the ANSI X9.24 future key generate algorithm. Every future key can be divided into two parts: One part is used as TPK (Pin Encryption Key); the other part is used as TAK (MAC Calculating Key). 8.4 Cryptographic Algorithms The device includes the following algorithms: 1. RSA(Signature verification, 2048 bits) 2. SHA Triple DES 8.5 Key Table Key Name Purpose/Usage Algorithm Size (bits) Storage TLK Terminal load Key. TDES 128/192 Flash

16 16/18 TMK Terminal Master Key. TDES 128/192 Flash TPK in MK/SK System Terminal PIN Key TDES 128/192 Flash TAK in MK/SK System Terminal MAC Key TDES 128/192 Flash TEK in MK/SK System Terminal Encrypt Data Key TDES 128/192 Flash TDK in MK/SK System Terminal Decrypt Data Key TDES 128/192 Flash TTK in MK/SK System Terminal Track Encrypt Key TDES 128/192 Flash TIK in DUKPT DUKPT Initial Key TDES 128/192 Flash DUKPT Future Key DUKPT Future Key TDES 128/192 Flash Table 1 Triple DES keys 8.6 Key Replacement Any key should be replaced with a new key whenever the compromise of the original key is known or suspected, and whenever the time deemed feasible to determine the key by exhaustive attack elapses. 8.7 Key Loading Policy The device does not propose manual cryptographic key entry. Specific tools, compliant with key management requirements, shall be used for key loading. The plain-text key (including TLK, TMK and DUKPT Initial Key) loading process must be implemented in a secure room of acquirer and strictly protected under the following dual control and split knowledge techniques. Dual control: The key loading process is strictly authorized and controlled by at least two persons. An identification and authentication is performed first to make sure they are the right operator for the key loading. Eight bytes of password is used in the key loader to authenticate the operator. Split knowledge: The initial plain-text key can never be mastered by only one person. It is divided into two full-length key components and controlled by two different persons. Each person is required to input his key component into the key loader separately.

17 17/18 The encrypted key loading is controlled by the acquirer through remote network. For DUKPT method, transaction keys are automatically generated, so no encrypted keys are needed to load. Refer to Device_Default_Settings_Overview, the Default TLK example should not be load. 8.8 key lifetime The key lifetime is controlled by Acquirer. Suggestions from the Manufacturer are: The maximum lifetime of TLK is suggested to be 2 years. The maximum lifetime of TMK is suggested to be 2 years. The maximum lifetime of SK (TPK/TAK/TEK/TDK/TTK) is suggested to be 1 day. The maximum lifetime of DUKPT cannot exceed 1million transactions.

18 18/18 9. Roles and services The device has no functionality that gives access to security sensitive services, based on roles. Such services are managed through dedicated tools, using cryptographic authentication.

Advanced Mobile Payment Inc. AMP 6500

Advanced Mobile Payment Inc. AMP 6500 Advanced Mobile Payment Inc. AMP 6500 PCI PTS POI Security Policy 2018-04-02 V 1.0.5 Revision History Date Revision Level Description Modified by 2018-01-18 1.0.0 Original Version Brian.Yang 2018-03-02

More information

AMP 8200 Security Policy

AMP 8200 Security Policy AMP 8200 Security Policy V 3.0.0 Advanced Mobile Payments Inc www.amobilepayment.com Revision History Date Revision Level Description Modified by 2017-12-06 3.0.0 Original Version Evan, Stephen Table of

More information

AMP 8000 Security Policy V 1.0.0

AMP 8000 Security Policy V 1.0.0 AMP 8000 Security Policy V 1.0.0 Advanced Mobile Payments Inc www.amobilepayment.com Revision History Date Revision Level Description Modified by 2017-12-16 V1.0.0 Original Version Kevin Table of content

More information

NEW9210 Security Policy

NEW9210 Security Policy NEW9210 Security Policy V 1.0.7 NEW POS TECHNOLOGY LIMITED www.newpostech.com Revision History Date Revision Level Description Modified by 2016-05-25 1.0.0 Original Issue Kevin, Paddy 2016-05-31 1.0.1

More information

DynaPro Go. Secure PIN Entry Device PCI PTS POI Security Policy. September Document Number: D REGISTERED TO ISO 9001:2008

DynaPro Go. Secure PIN Entry Device PCI PTS POI Security Policy. September Document Number: D REGISTERED TO ISO 9001:2008 DynaPro Go Secure PIN Entry Device PCI PTS POI Security Policy September 2017 Document Number: D998200217-11 REGISTERED TO ISO 9001:2008 MagTek I 1710 Apollo Court I Seal Beach, CA 90740 I Phone: (562)

More information

Ezetap V3 Security policy

Ezetap V3 Security policy Ezetap V3 Security policy Page 1 Document changes Date Version Description 01 Feb 2015 Draft Initial document 08 Sep 2015 0.1 Added Key management 22 sep 2015 0.2 Specified security settings configuration

More information

Clover Flex Security Policy

Clover Flex Security Policy Clover Flex Security Policy Clover Flex Security Policy 1 Table of Contents Introduction General description Installation Guidance Visual Shielding Device Security Decommissioning Key Management System

More information

Version 2.3 March 2, WisePad 2 Security Policy

Version 2.3 March 2, WisePad 2 Security Policy Version 2.3 March 2, 2016 WisePad 2 Security Policy Table of Content 1 Introduction...3 1.1 Purpose and Scope...3 1.2 Audience...3 1.3 Reference...3 1.4 Glossary of Terms and Abbreviations...4 2 General

More information

MX900 SERIES PCI PTS POI SECURITY POLICY

MX900 SERIES PCI PTS POI SECURITY POLICY Mx900 Series PCI PTS POI Security Policy...1 Introduction... 3 SCOPE... 3 Product Identification & Inspection... 3 ROLES... 4 DEPLOYERS OF MX 900 SERIES TERMINAL TO END-USERS SITES... 4 ADMINISTRATORS

More information

Payment Card Industry (PCI) PIN Transaction Security (PTS) Hardware Security Module (HSM) Evaluation Vendor Questionnaire Version 2.

Payment Card Industry (PCI) PIN Transaction Security (PTS) Hardware Security Module (HSM) Evaluation Vendor Questionnaire Version 2. Payment Card Industry (PCI) PIN Transaction Security (PTS) Hardware Security Module (HSM) Evaluation Vendor Questionnaire Version 2.0 May 2012 Document Changes Date Version Author Description April 2009

More information

Payment Card Industry (PCI) PIN Transaction Security (PTS) Point of Interaction (POI) Modular Evaluation Vendor Questionnaire Version 3.

Payment Card Industry (PCI) PIN Transaction Security (PTS) Point of Interaction (POI) Modular Evaluation Vendor Questionnaire Version 3. Payment Card Industry (PCI) PIN Transaction Security (PTS) Point of Interaction (POI) Modular Evaluation Vendor Questionnaire Version 3.1 September 2011 Document Changes Date Version Description April

More information

PIN Security Requirements

PIN Security Requirements Payment Card Industry (PCI) PIN Security Requirements PCI SSC Modifications Summary of Significant Changes from v2.0 to v3.0 August 2018 PCI SSC Modifications to PCI PIN Security Requirements In the table

More information

Payment Card Industry (PCI) PIN Transaction Security (PTS) Point of Interaction (POI) Modular Evaluation Vendor Questionnaire Version 4.

Payment Card Industry (PCI) PIN Transaction Security (PTS) Point of Interaction (POI) Modular Evaluation Vendor Questionnaire Version 4. Payment Card Industry (PCI) PIN Transaction Security (PTS) Point of Interaction (POI) Modular Evaluation Vendor Questionnaire Version 4.0 June 2013 Document Changes Date Version Description April 2010

More information

Payment Card Industry (PCI) PTS PIN Security Requirements. Technical FAQs for use with Version 2

Payment Card Industry (PCI) PTS PIN Security Requirements. Technical FAQs for use with Version 2 Payment Card Industry (PCI) PTS PIN Security Requirements Technical FQs for use with Version 2 December 2015 Table of Contents PIN Security Requirements: Frequently sked Questions... 1 General... 1 PIN

More information

Power on/off Button. Secure PIN Pad. Mswipe Technologies Pvt. Ltd.

Power on/off Button. Secure PIN Pad. Mswipe Technologies Pvt. Ltd. WisePOS is an innovative Android Mobile MPOS device accepting different forms of payment including EMV Chip & Pin, MSR and NFC contactless. Integrated with BT, Wi, GPRS and optional barcode scanner, WisePOS

More information

Q2. Why is there an Australian specific device approval process?

Q2. Why is there an Australian specific device approval process? IAC DEVICE EVALUATION FAQ Version 3 (Effective 21 November 2016) This FAQ provides answers to questions regarding APCA s physical and logical device security requirements and evaluation methodologies as

More information

Overview. SSL Cryptography Overview CHAPTER 1

Overview. SSL Cryptography Overview CHAPTER 1 CHAPTER 1 Secure Sockets Layer (SSL) is an application-level protocol that provides encryption technology for the Internet. SSL ensures the secure transmission of data between a client and a server through

More information

With the edition of this document, all previous editions become void. Indications made in this document may be changed without previous notice.

With the edition of this document, all previous editions become void. Indications made in this document may be changed without previous notice. SECURITY POLICY Contactless Payment and Ticketing Module Copyright 2015 2016 by ELECTRONIC GmbH Lange Strasse 4 D-35781 Weilburg-Waldhausen Tel.: +49 6471 3109-0 http://www.feig.de With the edition of

More information

CoSign Hardware version 7.0 Firmware version 5.2

CoSign Hardware version 7.0 Firmware version 5.2 CoSign Hardware version 7.0 Firmware version 5.2 FIPS 140-2 Non-Proprietary Security Policy Level 3 Validation July 2010 Copyright 2009 AR This document may be freely reproduced and distributed whole and

More information

The Xirrus Wi Fi Array XS4, XS8 Security Policy Document Version 1.0. Xirrus, Inc.

The Xirrus Wi Fi Array XS4, XS8 Security Policy Document Version 1.0. Xirrus, Inc. The Xirrus Wi Fi Array XS4, XS8 Security Policy Document Version 1.0 Xirrus, Inc. March 8, 2011 Copyright Xirrus, Inc. 2011. May be reproduced only in its original entirety [without revision]. Page 1 TABLE

More information

Point ipos Implementation Guide. Hypercom P2100 using the Point ipos Payment Core Hypercom H2210/K1200 using the Point ipos Payment Core

Point ipos Implementation Guide. Hypercom P2100 using the Point ipos Payment Core Hypercom H2210/K1200 using the Point ipos Payment Core PCI PA - DSS Point ipos Implementation Guide Hypercom P2100 using the Point ipos Payment Core Hypercom H2210/K1200 using the Point ipos Payment Core Version 1.02 POINT TRANSACTION SYSTEMS AB Box 92031,

More information

This Security Policy describes how this module complies with the eleven sections of the Standard:

This Security Policy describes how this module complies with the eleven sections of the Standard: Vormetric, Inc Vormetric Data Security Server Module Firmware Version 4.4.1 Hardware Version 1.0 FIPS 140-2 Non-Proprietary Security Policy Level 2 Validation May 24 th, 2012 2011 Vormetric Inc. All rights

More information

Mobile Payment Application Security. Security steps to take while developing Mobile Application s. SISA Webinar.

Mobile Payment Application Security. Security steps to take while developing Mobile Application s. SISA Webinar. Mobile Payment Application Security Security steps to take while developing Mobile Application s About SISA Payment Security Specialists PCI Certification Body (PCI Qualified Security Assessor) Payment

More information

ucube USER MANUAL VERSION 1.2

ucube USER MANUAL VERSION 1.2 ucube USER MANUAL VERSION 1.2 Contact ucube is designed and produced by YouTransactor, 32 rue Brancion 75015 Paris France. For any open questions, please contact your dedicated support. It may be, depending

More information

PCI PA-DSS Implementation Guide Onslip PAYAPP V2.1.x for Onslip S80, Onslip S90

PCI PA-DSS Implementation Guide Onslip PAYAPP V2.1.x for Onslip S80, Onslip S90 PCI PA-DSS Implementation Guide Onslip PAYAPP V2.1.x for Onslip S80, Onslip S90 Revision history Revision Date Author Comments 0.1 2013-10-04 Robert Hansson Created 1.0 2014-01-14 Robert Hansson Review

More information

WHAT FUTURE FOR CONTACTLESS CARD SECURITY?

WHAT FUTURE FOR CONTACTLESS CARD SECURITY? WHAT FUTURE FOR CONTACTLESS CARD SECURITY? Alain Vazquez (alain.vazquez@louveciennes.sema.slb.com) 1/27 AV Contents Major contactless features : summary Contactless major constraints Major security issues

More information

GlobeSurfer III. Quick Start Guide

GlobeSurfer III. Quick Start Guide GlobeSurfer III Quick Start Guide GlobeSurfer III User guide 2 Welcome to GlobeSurfer III Welcome to the GlobeSurfer III, your 3G wireless gateway router that connects you to the internet, allows you to

More information

Payment Card Industry (PCI) PTS PIN Security Requirements. Technical FAQs for use with Version 2

Payment Card Industry (PCI) PTS PIN Security Requirements. Technical FAQs for use with Version 2 Payment Card Industry (PCI) PTS PIN Security Requirements Technical FQs for use with Version 2 pril 2016 Table of Contents PIN Security Requirements: Frequently sked Questions... 1 General... 1 PIN Security

More information

Technical Specification & Warranty mypos Europe Ltd. mypos Mini Ice EN

Technical Specification & Warranty mypos Europe Ltd. mypos Mini Ice EN Technical Specification & Warranty mypos Europe Ltd. mypos Mini Ice EN CONTENTS Supported connections... 2 Certifications & EMV... 2 D220 specification... 3 Safety instructions... 5 General safety information...

More information

Lexmark PrintCryption TM (Firmware Version 1.3.1)

Lexmark PrintCryption TM (Firmware Version 1.3.1) Lexmark PrintCryption TM (Firmware Version 1.3.1) FIPS 140-2 Non-Proprietary Security Policy Level 1 Validation Version 0.95 April 2007 Table of Contents INTRODUCTION... 3 PURPOSE... 3 REFERENCES... 3

More information

BCM58100B0 Series: BCM58101B0, BCM58102B0, BCM58103B0 Cryptographic Module VC0 Non-Proprietary Security Policy Document Version 0.

BCM58100B0 Series: BCM58101B0, BCM58102B0, BCM58103B0 Cryptographic Module VC0 Non-Proprietary Security Policy Document Version 0. BCM58100B0 Series: BCM58101B0, BCM58102B0, BCM58103B0 Cryptographic Module VC0 Non-Proprietary Security Policy Document Version 0.8 Broadcom Ltd. Revision Date: 2016-05-25 Copyright Broadcom 2016. May

More information

Seagate Secure TCG Enterprise SSC Pulsar.2 Self-Encrypting Drive FIPS 140 Module Security Policy

Seagate Secure TCG Enterprise SSC Pulsar.2 Self-Encrypting Drive FIPS 140 Module Security Policy Seagate Secure TCG Enterprise SSC Pulsar.2 Self-Encrypting Drive FIPS 140 Module Security Policy Security Level 2 Rev. 0.9 November 12, 2012 Seagate Technology, LLC Page 1 Table of Contents 1 Introduction...

More information

ACR880 GPRS Portable Smart Card Terminal

ACR880 GPRS Portable Smart Card Terminal ACR880 GPRS Portable Smart Card Terminal Technical Specifications Subject to change without prior notice Table of Contents 1.0. Introduction... 3 2.0. Features... 4 3.0. Supported Card Types... 5 3.1.

More information

Payment Card Industry (PCI) PIN Security. Requirements and Testing Procedures. Version 2.0. December 2014

Payment Card Industry (PCI) PIN Security. Requirements and Testing Procedures. Version 2.0. December 2014 Payment Card Industry (PCI) PIN Security Requirements and Version 2.0 December 2014 Document Changes Date Version Description October 2011 1.0 Initial release of PCI December 2014 2.0 Initial release of

More information

INFORMATION SUPPLEMENT. Use of SSL/Early TLS for POS POI Terminal Connections. Date: June 2018 Author: PCI Security Standards Council

INFORMATION SUPPLEMENT. Use of SSL/Early TLS for POS POI Terminal Connections. Date: June 2018 Author: PCI Security Standards Council Use of SSL/Early TLS for POS POI Terminal Connections Date: Author: PCI Security Standards Council Table of Contents Introduction...1 Executive Summary...1 What is the risk?...1 What is meant by Early

More information

Security in NFC Readers

Security in NFC Readers Security in Readers Public Content and security, a different kind of wireless Under the hood of based systems Enhancing the security of an architecture Secure data exchange Information security goals Cryptographic

More information

Chapter 8 Web Security

Chapter 8 Web Security Chapter 8 Web Security Web security includes three parts: security of server, security of client, and network traffic security between a browser and a server. Security of server and security of client

More information

PCI PA-DSS Implementation Guide

PCI PA-DSS Implementation Guide PCI PA-DSS Implementation Guide For Atos Worldline Banksys XENTA, XENTEO, XENTEO ECO, XENOA ECO YOMANI and YOMANI XR terminals using the Point BKX Payment Core Software Versions A05.01 and A05.02 Version

More information

AMP Product Review. Smart Mobility POS 2015

AMP Product Review. Smart Mobility POS 2015 AMP Product Review Company Overview Smart Mobility POS is a specialist Payment Solu=on Provider of payments hardware and services for all sectors in Europe, Middle East & Africa. With offices in the UK

More information

Sony Security Module. Security Policy

Sony Security Module. Security Policy Sony Security Module Security Policy Document Version 1.0.0 Sony Corporation FIPS 140-2 Non-Proprietary Copyright 2010 Sony Corporation TABLE OF CONTENTS 1. MODULE OVERVIEW... 3 2. SECURITY LEVEL... 5

More information

econet smart grid gateways: econet SL and econet MSA FIPS Security Policy

econet smart grid gateways: econet SL and econet MSA FIPS Security Policy econet smart grid gateways: econet SL and econet MSA FIPS 140 2 Security Policy Level 2 Validation Document Version 0.5 Hardware Versions: ENSL2, ENSL5 and ENMSA2 Firmware Version: 3.2.1 FIPS Nexgrid,

More information

Security Policy for Schlumberger Cyberflex Access 32K Smart Card with ActivCard Applets

Security Policy for Schlumberger Cyberflex Access 32K Smart Card with ActivCard Applets Security Policy for Schlumberger Cyberflex Access 32K Smart Card with ActivCard Applets TABLE OF CONTENTS 1 SCOPE OF DOCUMENT... 1 2 INTRODUCTION... 1 3 SECURITY LEVELS... 1 3.1 CRYPTOGRAPHIC MODULE SPECIFICATION...

More information

PCI PA - DSS. Point Vx Implementation Guide. Version For VeriFone Vx520, Vx680, Vx820 terminals using the Point Vx Payment Core (Point VxPC)

PCI PA - DSS. Point Vx Implementation Guide. Version For VeriFone Vx520, Vx680, Vx820 terminals using the Point Vx Payment Core (Point VxPC) PCI PA - DSS Point Vx Implementation Guide For VeriFone Vx520, Vx680, Vx820 terminals using the Point Vx Payment Core (Point VxPC) Version 2.02 POINT TRANSACTION SYSTEMS AB Box 92031, 120 06 Stockholm,

More information

ARX (Algorithmic Research) PrivateServer Hardware version 4.7 Firmware version 4.8.1

ARX (Algorithmic Research) PrivateServer Hardware version 4.7 Firmware version 4.8.1 ARX (Algorithmic Research) PrivateServer Hardware version 4.7 Firmware version 4.8.1 FIPS 140-2 Non-Proprietary Security Policy Level 3 Validation April 2012 Copyright 2012 Algorithmic Research This document

More information

Point PA-DSS. Implementation Guide. Banksys Yomani VeriFone & PAX VPFIPA0201

Point PA-DSS. Implementation Guide. Banksys Yomani VeriFone & PAX VPFIPA0201 Point PA-DSS Implementation Guide Banksys Yomani 1.04 VeriFone & PAX VPFIPA0201 Implementation Guide Contents 1 Revision history 1 2 Introduction 2 3 Document use 2 3.1 Important notes 2 4 Summary of requirements

More information

Payment Card Industry (PCI) PTS PIN Security Requirements. Technical FAQs for use with Version 2

Payment Card Industry (PCI) PTS PIN Security Requirements. Technical FAQs for use with Version 2 Payment Card Industry (PCI) PTS PIN Security Requirements Technical FQs for use with Version 2 June 2015 Table of Contents PIN Security Requirements: Frequently sked Questions... 1 General... 1 PIN Security

More information

FIPS Non-Proprietary Security Policy

FIPS Non-Proprietary Security Policy Pitney Bowes ibutton Postal Security Device (PSD) Hardware Version: MAXQ1959B-F50# Firmware Version: 9.01.00 Indicia Type: 0, 1, 2, 5, 7 and 8 FIPS 140-2 Non-Proprietary Security Policy Level 3 Validation

More information

One Touch W800 Quick Guide

One Touch W800 Quick Guide One Touch W800 Quick Guide 0 Contents Safety and use... 2 1. Overview... 4 1.1 Contents inside this package... 4 1.2 Getting to Know Your Modem... 4 1.3 How to start your modem... 5 1.4 LED Indicates...

More information

SafeNet LUNA EFT FIPS LEVEL 3 SECURITY POLICY

SafeNet LUNA EFT FIPS LEVEL 3 SECURITY POLICY SafeNet LUNA EFT FIPS 140-2 LEVEL 3 SECURITY POLICY DOCUMENT NUMBER: CR-2786 AUTHOR(S): Brian Franklin / Terry Fletcher / Chris Brych DEPARTMENT: Engineering LOCATION OF ISSUE: Ottawa DATE ORIGINATED:

More information

Configuring SSL. SSL Overview CHAPTER

Configuring SSL. SSL Overview CHAPTER CHAPTER 8 Date: 4/23/09 This topic describes the steps required to configure your ACE (both the ACE module and the ACE appliance) as a virtual Secure Sockets Layer (SSL) server for SSL initiation or termination.

More information

DFARS Requirements for Defense Contractors Must Be Satisfied by DECEMBER 31, 2017

DFARS Requirements for Defense Contractors Must Be Satisfied by DECEMBER 31, 2017 DFARS 252.204-7012 Requirements for Defense Contractors Must Be Satisfied by DECEMBER 31, 2017 As with most government documents, one often leads to another. And that s the case with DFARS 252.204-7012.

More information

key distribution requirements for public key algorithms asymmetric (or public) key algorithms

key distribution requirements for public key algorithms asymmetric (or public) key algorithms topics: cis3.2 electronic commerce 24 april 2006 lecture # 22 internet security (part 2) finish from last time: symmetric (single key) and asymmetric (public key) methods different cryptographic systems

More information

User Manual. Spectrum Pro

User Manual. Spectrum Pro 80140502-001 User Manual Spectrum Pro PCI PTS 4.X Hybrid Insert Reader RS232 Interface 80140502-001 Rev 51 3/10/2015 International Technologies & Systems Corporation 10721 Walker Street, Cypress, CA 90630-4720;

More information

Remote Key Loading. Decoding RKL

Remote Key Loading. Decoding RKL Remote Key Loading Decoding RKL What is Remote Key Loading (RKL)? Discover the power of our industry-leading Remote Key Loading (RKL) solution, and find out how your financial institution (FI) will benefit

More information

Dolphin DCI 1.2. FIPS Level 3 Validation. Non-Proprietary Security Policy. Version 1.0. DOL.TD DRM Page 1 Version 1.0 Doremi Cinema LLC

Dolphin DCI 1.2. FIPS Level 3 Validation. Non-Proprietary Security Policy. Version 1.0. DOL.TD DRM Page 1 Version 1.0 Doremi Cinema LLC Dolphin DCI 1.2 FIPS 140-2 Level 3 Validation Non-Proprietary Security Policy Version 1.0 DOL.TD.000921.DRM Page 1 Version 1.0 Table of Contents 1 Introduction... 3 1.1 PURPOSE... 3 1.2 REFERENCES... 3

More information

WHITE PAPER. Authentication and Encryption Design

WHITE PAPER. Authentication and Encryption Design WHITE PAPER Authentication and Encryption Design Table of Contents Introduction Applications and Services Account Creation Two-step Verification Authentication Passphrase Management Email Message Encryption

More information

Datenblatt / Specifications. ACR880 GPRS Portable Smart Card Terminal. idvation GmbH

Datenblatt / Specifications. ACR880 GPRS Portable Smart Card Terminal. idvation GmbH Datenblatt / Specifications ACR880 GPRS Portable Smart Card Terminal Otto-Hesse-Straße 19 / T5 D-64293 Darmstadt Phone +49 6151 9926567 Fax +49 6151 3689296 Table of Contents 1.0. Introduction... 3 2.0

More information

KEY-UP Cryptographic Module Security Policy Document Version 0.5. Ian Donnelly Systems (IDS)

KEY-UP Cryptographic Module Security Policy Document Version 0.5. Ian Donnelly Systems (IDS) KEY-UP Cryptographic Module Security Policy Document Version 0.5 Ian Donnelly Systems (IDS) December 29, 2005 Copyright Ian Donnelly Systems 2005. May be reproduced only in its original entirety [without

More information

Configuring SSL CHAPTER

Configuring SSL CHAPTER 7 CHAPTER This chapter describes the steps required to configure your ACE appliance as a virtual Secure Sockets Layer (SSL) server for SSL initiation or termination. The topics included in this section

More information

Cennox. The Global Brand in ATM Services THE CENNOX EPOS TERMINAL RANGE TAKING PAYMENTS AS EASY AS 1,2,3

Cennox. The Global Brand in ATM Services THE CENNOX EPOS TERMINAL RANGE TAKING PAYMENTS AS EASY AS 1,2,3 Cennox The Global Brand in ATM Services THE CENNOX EPOS TERMINAL RANGE TAKING PAYMENTS AS EASY AS 1,2,3 Cennox PLC 11 & 12, Admiralty Way Camberley Surrey, GU15 3DT t: +44 (0) 1276 607200 f: +44 (0) 1276

More information

Security Policy for FIPS KVL 3000 Plus

Security Policy for FIPS KVL 3000 Plus Security Policy for FIPS 140-2 KVL 3000 Plus Version 01.01.19 Motorola General Business Information 1 of 21 Motorola General Business Information 2 of 21 1 INTRODUCTION... 4 1.1 SCOPE... 4 1.2 OVERVIEW...

More information

eh880 Secure Smart Card Terminal

eh880 Secure Smart Card Terminal eh880 Secure Smart Card Terminal Technical Specifications Subject to change without prior notice Table of Contents 1.0. Introduction... 3 2.0. Features... 4 3.0. Supported Card Types... 5 3.1. MCU Cards...

More information

Integral Memory PLC. Crypto Dual (Underlying Steel Chassis) and Crypto Dual Plus (Underlying Steel Chassis) FIPS Security Policy

Integral Memory PLC. Crypto Dual (Underlying Steel Chassis) and Crypto Dual Plus (Underlying Steel Chassis) FIPS Security Policy Integral Memory PLC. Chassis) and Crypto Dual Plus (Underlying FIPS 140-2 Security Policy Table of Contents 1. INTRODUCTION... 1 1.1 Purpose....1 1.2 References... 1 1.3 Document History... 1 2. PRODUCT

More information

SoftPay Quick Reference Card RETAIL (v 4.0 or later) Refund

SoftPay Quick Reference Card RETAIL (v 4.0 or later) Refund SoftPay Quick Reference Card RETAIL (v 4.0 or later) Phone Order Force Phone Order Force Or Swipe Card Confirm Amount Card Type [if Debit enabled] Card Present? Imprint Card Credit Debit Confirm Amount

More information

Cisco VPN 3002 Hardware Client Security Policy

Cisco VPN 3002 Hardware Client Security Policy Introduction This non-proprietary Cryptographic Module Security Policy describes how the VPN 3002 and 3002 8E Hardware Client (Firmware version FIPS 3.6.7.F) meets the security requirements of FIPS 140-2,

More information

BlackVault Hardware Security Platform SECURE TRUSTED INTUITIVE. Cryptographic Appliances with Integrated Level 3+ Hardware Security Module

BlackVault Hardware Security Platform SECURE TRUSTED INTUITIVE. Cryptographic Appliances with Integrated Level 3+ Hardware Security Module BlackVault Hardware Security Platform SECURE TRUSTED INTUITIVE Cryptographic Appliances with Integrated Level 3+ Hardware Security Module The BlackVault hardware security platform keeps cryptographic material

More information

SEL-3021 Serial Encrypting Transceiver Security Policy Document Version 1.9

SEL-3021 Serial Encrypting Transceiver Security Policy Document Version 1.9 SEL-3021 Serial Encrypting Transceiver Security Policy Document Version 1.9 Schweitzer Engineering Laboratories, Inc. May 21, 2007 Copyright 2005-2007 Schweitzer Engineering Laboratories, Inc. May be reproduced

More information

VX820 User Manual. Date: 07/11/17 Version Copyright Adyen B.V Simon Carmiggeltstraat DJ Amsterdam The Netherlands.

VX820 User Manual. Date: 07/11/17 Version Copyright Adyen B.V Simon Carmiggeltstraat DJ Amsterdam The Netherlands. VX820 User Manual Date: 07/11/17 Version 0.0 Copyright Adyen B.V. 2017 Simon Carmiggeltstraat 6-50 1011 DJ Amsterdam The Netherlands www.adyen.com Table of Contents 1 Legacy instructions for firmware version

More information

FIPS SECURITY POLICY FOR

FIPS SECURITY POLICY FOR FIPS 140-2 SECURITY POLICY FOR SPECTRAGUARD ENTERPRISE SENSOR August 26, 2011 FIPS 140-2 LEVEL-2 SECURITY POLICY FOR AIRTIGHT NETWORKS SPECTRAGUARD ENTERPRISE SENSOR 1. Introduction This document describes

More information

Secure Card Reading and PIN Solutions

Secure Card Reading and PIN Solutions Secure Card Reading and PIN Solutions When it comes to Card Reader security and reliability MagneSafe Secure Card Readers & PIN Pads Merchants and retailers both online and in-store rely on MagTek. MagTek

More information

UniGuard-V34. Cryptographic Module Security Policy

UniGuard-V34. Cryptographic Module Security Policy UniGuard-V34 Cryptographic Module Security Policy Rev. 1.16 Communication Devices Inc. One Forstmann Ct. Clifton, NJ 07011 USA Phone: 973 772 6997 Fax: 973 772 0747 Internet: support@commdevices.com Table

More information

PIN Entry & Management

PIN Entry & Management PIN Entry & Management From PIN selection to PIN verification Card issuers and merchants know they can put their trust in MagTek. Whether meeting the growing need for instant, in-branch card and PIN issuance

More information

Point-to-Point Encryption (P2PE) Implementation Manual. Mobile / Mini / Flex. Version 1.0

Point-to-Point Encryption (P2PE) Implementation Manual. Mobile / Mini / Flex. Version 1.0 Point-to-Point Encryption (P2PE) Implementation Manual Mobile / Mini / Flex Version 1.0 1. P2PE Solution Information and Solution Provider Contact Details 1.1 P2PE Solution Information Solution name: Solution

More information

Most Common Security Threats (cont.)

Most Common Security Threats (cont.) Most Common Security Threats (cont.) Denial of service (DoS) attack Distributed denial of service (DDoS) attack Insider attacks. Any examples? Poorly designed software What is a zero-day vulnerability?

More information

Configuring SSL. SSL Overview CHAPTER

Configuring SSL. SSL Overview CHAPTER 7 CHAPTER This topic describes the steps required to configure your ACE appliance as a virtual Secure Sockets Layer (SSL) server for SSL initiation or termination. The topics included in this section are:

More information

e-pg Pathshala Subject: Computer Science Paper: Embedded System Module: Embedded System Design Case Study-Part I Module No: CS/ES/39 Quadrant 1 e-text

e-pg Pathshala Subject: Computer Science Paper: Embedded System Module: Embedded System Design Case Study-Part I Module No: CS/ES/39 Quadrant 1 e-text e-pg Pathshala Subject: Computer Science Paper: Embedded System Module: Embedded System Design Case Study-Part I Module No: CS/ES/39 Quadrant 1 e-text In this lecture, the design and the basic concepts

More information

WatchKey USB Token Cryptographic Module Model Number: K6 Smart Card Chip: Z32L256D32U PCB: K003010A Firmware Version: 360C6702

WatchKey USB Token Cryptographic Module Model Number: K6 Smart Card Chip: Z32L256D32U PCB: K003010A Firmware Version: 360C6702 WatchKey USB Token Cryptographic Module Model Number: K6 Smart Card Chip: Z32L256D32U PCB: K003010A Firmware Version: 360C6702 FIPS 140-2 Non-Proprietary Security Policy Policy Version 1.0.3 Last Updated:

More information

Technical Specification & Warranty mypos Europe Ltd. mypos Mini EN

Technical Specification & Warranty mypos Europe Ltd. mypos Mini EN Technical Specification & Warranty mypos Europe Ltd. mypos Mini EN CONTENTS Supported connections... 2 Certifications & EMV... 3 mypos Mini specification... 4 Safety instructions... 5 General safety information...

More information

AirMagnet SmartEdge Sensor A5200, A5205, A5220, and A5225 Security Policy

AirMagnet SmartEdge Sensor A5200, A5205, A5220, and A5225 Security Policy AirMagnet SmartEdge Sensor A5200, A5205, A5220, and A5225 Security Policy FIPS 140-2 Level 2 Validation June 15, 2010 Version 1.4 2004, 2005, 2006, 2007, 2008, 2009, 2010 AirMagnet Inc. All rights reserved.

More information

Configuring the Client Adapter through the Windows XP Operating System

Configuring the Client Adapter through the Windows XP Operating System APPENDIX E through the Windows XP Operating System This appendix explains how to configure and use the client adapter with Windows XP. The following topics are covered in this appendix: Overview, page

More information

Lecture 9a: Secure Sockets Layer (SSL) March, 2004

Lecture 9a: Secure Sockets Layer (SSL) March, 2004 Internet and Intranet Protocols and Applications Lecture 9a: Secure Sockets Layer (SSL) March, 2004 Arthur Goldberg Computer Science Department New York University artg@cs.nyu.edu Security Achieved by

More information

Meru Networks. Security Gateway SG1000 Cryptographic Module Security Policy Document Version 1.2. Revision Date: June 24, 2009

Meru Networks. Security Gateway SG1000 Cryptographic Module Security Policy Document Version 1.2. Revision Date: June 24, 2009 Security Gateway SG1000 Cryptographic Module Security Policy Document Version 1.2 Meru Networks Revision Date: June 24, 2009 Copyright Meru Networks 2008. May be reproduced only in its original entirety

More information

Connecting Securely to the Cloud

Connecting Securely to the Cloud Connecting Securely to the Cloud Security Primer Presented by Enrico Gregoratto Andrew Marsh Agenda 2 Presentation Speaker Trusting The Connection Transport Layer Security Connecting to the Cloud Enrico

More information

REMOTE KEY LOADING DECODING RKL

REMOTE KEY LOADING DECODING RKL REMOTE KEY LOADING DECODING RKL PAGE 2 REMOTE KEY LOADING REMOTE KEY LOADING PAGE 3 WHAT IS REMOTE KEY LOADING (RKL)? RKL HOST INTEGRATION Discover the power of our industry-leading Remote Key Loading

More information

mpos Merchant User Guide

mpos Merchant User Guide Version 1.0 Mint mpos User Guide: Version 1.0 SEP16 Contents CHAPTER 1: LOGGING INTO THE NETS MPOS MERCHANT PORTAL 6 First time Login 6 Next time Login 6 Forgot your password? 7 CHAPTER 2: MERCHANT PORTAL

More information

E-commerce security: SSL/TLS, SET and others. 4.1

E-commerce security: SSL/TLS, SET and others. 4.1 E-commerce security: SSL/TLS, SET and others. 4.1 1 Electronic payment systems Purpose: facilitate the safe and secure transfer of monetary value electronically between multiple parties Participating parties:

More information

ACOS5-64. Functional Specifications V1.04. Subject to change without prior notice.

ACOS5-64. Functional Specifications V1.04. Subject to change without prior notice. ACOS5-64 Functional Specifications V1.04 Subject to change without prior notice Table of Contents 1.0. Introduction... 4 1.1. Card Features... 4 1.2. History of Modifications... 5 2.0. Technical Specifications...

More information

Security Setup CHAPTER

Security Setup CHAPTER CHAPTER 8 This chapter describes how to set up your bridge s security features. This chapter contains the following sections: Security Overview, page 8-2 Setting Up WEP, page 8-7 Enabling Additional WEP

More information

Ready Theatre Systems RTS POS

Ready Theatre Systems RTS POS Ready Theatre Systems RTS POS PCI PA-DSS Implementation Guide Revision: 2.0 September, 2010 Ready Theatre Systems, LLC - www.rts-solutions.com Table of Contents: Introduction to PCI PA DSS Compliance 2

More information

Hewlett-Packard Development Company, L.P. NonStop Volume Level Encryption (NSVLE) Product No: T0867 SW Version: 2.0

Hewlett-Packard Development Company, L.P. NonStop Volume Level Encryption (NSVLE) Product No: T0867 SW Version: 2.0 Hewlett-Packard Development Company, L.P. NonStop Volume Level Encryption (NSVLE) Product No: T0867 SW Version: 2.0 FIPS 140 2 Non Proprietary Security Policy FIPS Security Level: 1 Document Version: 1.3

More information

CTIA Cybersecurity Certification Test Plan for IoT Devices

CTIA Cybersecurity Certification Test Plan for IoT Devices CTIA Cybersecurity Certification Test Plan for IoT Devices Version 1.0 August 2018 CTIA - The Wireless Association 2018. All rights reserved. CTIA-The Wireless Association ( CTIA ) hereby grants CTIA Authorized

More information

PA-DSS Implementation Guide For

PA-DSS Implementation Guide For PA-DSS Implementation Guide For, CAGE (Card Authorization Gateway Engine), Version 4.0 PCI PADSS Certification 2.0 December 10, 2013. Table of Contents 1. Purpose... 4 2. Delete sensitive authentication

More information

Dolby IMS-SM FIPS Level 2 Validation. Nonproprietary Security Policy Version: 4

Dolby IMS-SM FIPS Level 2 Validation. Nonproprietary Security Policy Version: 4 Dolby IMS-SM FIPS 140-2 Level 2 Validation Nonproprietary Security Policy Version: 4 Corporate Headquarters Dolby Laboratories, Inc. 100 Potrero Avenue San Francisco, CA 94103-4813 USA Telephone 415-558-0200

More information

Cisco Desktop Collaboration Experience DX650 Security Overview

Cisco Desktop Collaboration Experience DX650 Security Overview White Paper Cisco Desktop Collaboration Experience DX650 Security Overview Cisco Desktop Collaboration Experience DX650 Security Overview The Cisco Desktop Collaboration Experience DX650 (Cisco DX650)

More information

ACOS 3 Contact Card. Functional Specification. Subject to change without prior notice

ACOS 3 Contact Card. Functional Specification.   Subject to change without prior notice ACOS 3 Contact Card Functional Specification Subject to change without prior notice Table of Contents 1.0. Introduction... 3 1.1. Features...3 1.2. Technical Specifications...3 1.2.1. Electrical...3 1.2.2.

More information

CAT862 Dolby JPEG 2000/MPEG-2 Media Block IDC Security Policy. Version 3 June 30, 2010

CAT862 Dolby JPEG 2000/MPEG-2 Media Block IDC Security Policy. Version 3 June 30, 2010 CAT862 Dolby JPEG 2000/MPEG-2 Media Block IDC Security Policy Version 3 June 30, 2010 Dolby Laboratories Licensing Corporation Corporate Headquarters Dolby Laboratories, Inc. Dolby Laboratories Licensing

More information

Stripe Terminal Implementation Guide

Stripe Terminal Implementation Guide Stripe Terminal Implementation Guide 12/27/2018 This document details how to install the Stripe Terminal application in compliance with PCI 1 PA-DSS Version 3.2. This guide applies to the Stripe Terminal

More information

Verteilte Systeme (Distributed Systems)

Verteilte Systeme (Distributed Systems) Verteilte Systeme (Distributed Systems) Lorenz Froihofer l.froihofer@infosys.tuwien.ac.at http://www.infosys.tuwien.ac.at/teaching/courses/ VerteilteSysteme/ Security Threats, mechanisms, design issues

More information

HP Instant Support Enterprise Edition (ISEE) Security overview

HP Instant Support Enterprise Edition (ISEE) Security overview HP Instant Support Enterprise Edition (ISEE) Security overview Advanced Configuration A.03.50 Mike Brandon Interex 03 / 30, 2004 2003 Hewlett-Packard Development Company, L.P. The information contained

More information

FIPS Non-Proprietary Security Policy

FIPS Non-Proprietary Security Policy Quantum Corporation Scalar Key Manager Software Version 2.0.1 FIPS 140-2 Non-Proprietary Security Policy Document Version 1.4 Last Update: 2010-11-03 8:43:00 AM 2010 Quantum Corporation. May be freely

More information