Ezetap V3 Security policy

Size: px
Start display at page:

Download "Ezetap V3 Security policy"

Transcription

1 Ezetap V3 Security policy Page 1

2 Document changes Date Version Description 01 Feb 2015 Draft Initial document 08 Sep Added Key management 22 sep Specified security settings configuration Page 2

3 Contents Ezetap Mobile solutions Pvt, Ltd. 1. Scope of the document Glossary of words Introduction Product overview Product operational environment Product Specifications Product outline Product decommission (TB20.4) Privacy Shield (Appendix A.2 of DTR, DTR20.5) Key management (TB20.5) Cryptographic algorithms (TB20.6) Key Loading Display Prompts management (B4, DTR B16, TB20.7) Default values (TB20.8) Shim Inspection and detection (TB20.9) Software development guidance (TB20.10) Tamper response (TB20.11) Key Compromise detection (TB20.12) Commission and authentication of the device (TB 20.14) Self test (TB20.15) Roles and services of the device (TB 20.16) Version identification (TB20.17) Environmental failure detection (TB20.18) Local and remote patch update (TB20.19) Sources of vulnerability (TB3.11) Code review and security testing (TB3.12) Firmware release to production (TB3.13) Page 3

4 1. Scope of the document Ezetap Mobile solutions Pvt, Ltd. This security policy document from Ezetap addresses the proper use of the POI in a secure fashion, including information on key management responsibilities, administrative responsibilities, device functionality, identification, and environmental requirements. The security policy defines the roles supported by the POI and indicates the services available for each role in a deterministic format. The POI is capable of performing only its designed functions, i.e., there is no hidden functionality. Only approved functions are performed by the POI. The policy includes all configuration settings necessary to meet security requirements of PCI PTS POI DTRs v4.1. It includes procedures for the decommissioning of devices that are removed from service, including the removal of all keying material that could be used to decrypt any sensitive data processed by the device. Procedures differentiate between temporary and permanent removal. 2. Glossary of words CVV CVC CAV CSC DSS PAN PED POI DPRNG SHA TDES RSA SSL PIN RKI PKI BDK Card Verification Value (Visa and Discover payment cards) Card Validation Code (MasterCard payment cards) Card Authentication Value (JCB payment cards) Card Security Code (American Express) Data security Standard Primary Account Number Pin Entry Device Point Of Interaction Deterministic Pseudo Random Number Generator Secure Hash Algorithm Triple DES (Data Encryption Standard) Rivest Shamir Adelman asymmetric encryption algorithm Security Socket Layer Personal Identification Number Remote Key Injection Public Key Infrastructure Base Derived Key Page 4

5 3. Introduction The document address the requirement of vendor s response to Section B20 of the PCI PTS POI Evaluation Vendor Questionnaire and the response to Requirement B20 of the PCI PTS POI Security Requirements. 4. Product overview The Ezetap V3 is a handheld mpos device (POI + PED) to support PIN entry with credit and debit based transactions in an attended environment only. This device is able to accept MSR, ICC & NFC transactions and communicates externally using BT classic mode and micro USB. This mpos is able to perform both OTG & Device mode of USB communication. It has a secure capacitive touch keypad and a Monochrome graphic display of 128 x 64 resolution. 5. Product operational environment The Ezetap V3 is intended to be used as a handheld mpos device in an attended environment. Use of device in an unattended environment will violate the PCI PTS approval of the device. 6. Product Specifications Features V3 Device type PED Card Reader Magnetic Stripe Card Reader ( Track 1, Track 2 & 3) Contact EMV Chip Card Reader Authentication Signature, PIN PIN entry Secured key pad with capacitive touch technology Device Certification EMV L1 & L2 Pairing media USB (Device & OTG) Bluetooth (Class 2.1, EDR, Display Graphic OLED (128 x 64 ), GLCD (optional) Weight of the device (Gram) 92 Physical dimensions (mm) 12 X 64 X 118 (Volume : 91 CC) (H X W X L) Charge cycles 400 to 500 Battery - Li-Po (mah) 500 Charging Time (H) 2.5 Active time 5 Days or 250 continue transactions (?) Charger type 5V, 500mA standard Micro B type plug Platform ARM M4, 120 MHz, 1MB (flash) Dual USB to charge mobile Yes Haptic Feedback Vibrator Buzzer 4KHz beep Page 5

6 7. Product outline Top View Side View MSR slot Bottom View Label and version information at Back panel Page 6

7 8. Product decommission (TB20.4) The device can be decommissioned temporarily or permanently from the services. Server can decommission the device for temporary duration in case of any such need. In temporary decommission, device keys will be protected in secure RAM with dedicated primary battery power. If device needs to be permanently decommissioned, this can be achieved by triggering the device tamper mechanisms. In a tamper event, the device will lose all keys and sensitive information and it will not be in service any more. 9. Privacy Shield (Appendix A.2 of DTR, DTR20.5) Since the Ezetap V3 device is operated in an attended environment, it is not supplied with any add on parts, such as privacy shields, stands, additional card readers, etc. Ezetap instructs the user to protect their PIN by discouraging visual observations and being mindful of cameras pointed at the keypad and other such threats. 10. Key management (TB20.5) The Ezetap V3 device encrypts the PIN and other sensitive information using the Master Key/Session Key key management technique. Each PIN block is double encrypted using a session key that is unique per transaction. TDES (112 bit) is used as the encryption method for PINs & other Sensitive data. Whenever the compromise of the original key is known or suspected and whenever the time deemed feasible to determine the key by exhaustive attack elapses, the device must be shipped back to Ezetap or a certified customer care agency. Use of the POI with different key management systems will invalidate any PCI approval of this POI. 11. Cryptographic algorithms (TB20.6) Key Name Purpose Algorithm Size (Bits) Key Encrypting Key (KEK) Used to encrypt all secret keys stored in the device AES 128 MSR Encryption Key (MEK) Used to encrypt MSR data sent from the MSR PCB to the secure processor AES 128 CPU_ID Used to establish secure communication with AES 128 server Data Session Key (DSK) Used to establish secure communication with TDES 112 server Terminal Master Key Used to decrypt the AMK loaded into the device TDES 112 (TMK) Acquirer Master Key (AMK) Acquirer PIN Encryption Key (APK) Acquirer Account Data Encryption Key (AADK) Server Session Key (SSK) Used to encrypt/decrypt Acquirer session TDES 112 keys Used to encrypt PINs TDES 112 Used to encrypt PANs TDES 112 Used to encrypt encrypted PIN and PAN data sent to server TDES 112 Page 7

8 Key Name Purpose Algorithm Size (Bits) Server Public Key (SPK) Used to encrypt outbound data packages RSA 2048 from the device for secure communication Firmware Update Root Used to verify signature of Firmware Update RSA 2048 Public Key Public Key Firmware Update Public Used to verify firmware updates RSA 2048 Key Certificate Authority Public Keys Used for authentication during ICCR transactions RSA Varies ICC Keys Used during EMV transactions RSA Varies 12. Key Loading The key loading mechanism is authenticated and entered securely. This process is done in a controlled environment. The device doesn t accept manual cryptography key entry. The automated process will not reveal any sensitive information at any stage of the device life cycle (manufacturing to operation to maintenance). The key loading tool meets the key management requirements. 13. Display Prompts management (B4, DTR B16, TB20.7) The Ezetap V3 device does not support prompts for non PIN data or entry of non PIN data on the keypad. Vendor stored text prompts are stored in the cryptographic unit and NO external access is allowed. Audio and haptic feedback prompts are static and they have NO relation with the any sensitive information. The device allows updates of firmware. It cryptographically authenticates the firmware and if the authenticity is not confirmed, the firmware update will be rejected and deleted. 14. Default values (TB20.8) The device does not implement password based authentication methods, so there is no need for end users to set or update any kind of default passwords. 15. Shim Inspection and detection (TB20.9) The following inspections must be performed on the ICC reader (ICCR) daily and before using a chip card with the ICCR: Check the outside enclosure to verify that it is the right product. Check that there are no signs of modification, damage, cutting, or adhesive. Check that there is no evidence of unusual wires having been connected to the ICCR inside. Check that there is no shim device in the slot of the ICC acceptor. Check that there is no resistance when inserting the card. Inserted card direction is parallel with LCD direction. (Please refer to Section 7 above.) When the card is inserted into the ICC slot, the exposed portion of the ICC card is nearly 2/3 size of the ICC card and the front of the card (with name) should be facing up. These inspections should be performed in a well lit environment or using a light source. Page 8

9 16. Software development guidance (TB20.10) The Ezetap V3 firmware implements the required security measures and functions to meet the PCI security requirements for authenticated firmware. The core certified functionality of firmware includes the following; Key Management System, Key loading, Crypto functions Open Protocol Physical interface & communication protocol SRED as the secure method for data exchange 17. Tamper response (TB20.11) The Ezetap V3 device contains tamper mechanisms. In the event of tamper detection, the device will enter the halt state and will be locked with the SYSTEM HALT message being displayed on the screen. In this case please contact your technical Service partner or Ezetap. 18. Key Compromise detection (TB20.12) Whenever the compromise of the original key is known or suspected and whenever the time deemed feasible to determine the key by exhaustive attack elapses, as defined in NIST SP , the compromised device needs to be shipped back to Ezetap to load the valid new key. 19. Commission and authentication of the device (TB 20.14) Each Ezetap V3 will have unique identification number (as shown in the device label in Section 22 below) which is registered in the Ezetap server while dispatching from the factory. At initial commission and initialization, the device will receive a set of bank keys from the bank server after being authenticated by the Ezetap server. It is not possible to commission an unauthorized device. 20. Self test (TB20.15) The Ezetap V3 device will automatically perform the self test routines at power on time. Self tests include the below routines: Valid authentication by boot firmware Checking the hardware security mechanisms for signs of tamper Key integrity check Self Integrity Check Keypad and MSR integrity check Every 24 hours the device will reboot automatically. If a failure has been detected in the process of selftesting, the device will show the warning message and will become inoperable. The device will not allow any operation in this state of fault. Page 9

10 21. Roles and services of the device (TB 20.16) Roles The User should refer the user manual before installing this device. The device consist of following items: Device Power cable User manual OTG cable All software is installed before delivery to the end user. The User can start with the prepare device to fetch the latest keys into device Services The secure mpos services are listed below: Acceptance of MSR and ICC transaction Encryption of PIN and sensitive information Protection of sensitive information from unauthorized access Integrity of data and services User interface and remote server secure communication 22. Version identification (TB20.17) The serial number and hardware and firmware versions of the Ezetap mpos are independently identified on the sticker on the back of the product. 23. Environmental failure detection (TB20.18) The Ezetap mpos has been rated for the temperature range from 22 to C for storage, and operational temperature up to 50 C. Usage of the product beyond the specified range will cause the environmental failure protection mechanisms to trigger. Any warning indications shall be considered for the technical support from Ezetap. 24. Local and remote patch update (TB20.19) Device firmware upgrade can be accomplished by an authenticated local or remote process. The authenticity and integrity of the firmware are verified during patch or firmware upgrades. Unauthorized firmware upgrade is not possible. Page 10

11 25. Sources of vulnerability (TB3.11) No vulnerability was found for the Ezetap V3 device firmware in national public databases. 26. Code review and security testing (TB3.12) The Ezetap V3 device firmware is been reviewed by the technical experts who are not part of authorship of the POI code. 27. Firmware release to production (TB3.13) The Ezetap V3 device firmware is reviewed for every change and qualified before being releasing to production. Page 11

Clover Flex Security Policy

Clover Flex Security Policy Clover Flex Security Policy Clover Flex Security Policy 1 Table of Contents Introduction General description Installation Guidance Visual Shielding Device Security Decommissioning Key Management System

More information

DynaPro Go. Secure PIN Entry Device PCI PTS POI Security Policy. September Document Number: D REGISTERED TO ISO 9001:2008

DynaPro Go. Secure PIN Entry Device PCI PTS POI Security Policy. September Document Number: D REGISTERED TO ISO 9001:2008 DynaPro Go Secure PIN Entry Device PCI PTS POI Security Policy September 2017 Document Number: D998200217-11 REGISTERED TO ISO 9001:2008 MagTek I 1710 Apollo Court I Seal Beach, CA 90740 I Phone: (562)

More information

Advanced Mobile Payment Inc. AMP 6500

Advanced Mobile Payment Inc. AMP 6500 Advanced Mobile Payment Inc. AMP 6500 PCI PTS POI Security Policy 2018-04-02 V 1.0.5 Revision History Date Revision Level Description Modified by 2018-01-18 1.0.0 Original Version Brian.Yang 2018-03-02

More information

AMP 8200 Security Policy

AMP 8200 Security Policy AMP 8200 Security Policy V 3.0.0 Advanced Mobile Payments Inc www.amobilepayment.com Revision History Date Revision Level Description Modified by 2017-12-06 3.0.0 Original Version Evan, Stephen Table of

More information

Watchdata W9110 Security Policy

Watchdata W9110 Security Policy Watchdata W9110 Security Policy Production Name: W9110 Production Version: 0.9 2/18 Table of Contents TABLE OF CONTENTS... 2 1. DOCUMENT INFORMATION...3 1.1 EVOLUTION FOLLOW-UP...3 1.2 ACRONYMS & TERMS...

More information

AMP 8000 Security Policy V 1.0.0

AMP 8000 Security Policy V 1.0.0 AMP 8000 Security Policy V 1.0.0 Advanced Mobile Payments Inc www.amobilepayment.com Revision History Date Revision Level Description Modified by 2017-12-16 V1.0.0 Original Version Kevin Table of content

More information

Version 2.3 March 2, WisePad 2 Security Policy

Version 2.3 March 2, WisePad 2 Security Policy Version 2.3 March 2, 2016 WisePad 2 Security Policy Table of Content 1 Introduction...3 1.1 Purpose and Scope...3 1.2 Audience...3 1.3 Reference...3 1.4 Glossary of Terms and Abbreviations...4 2 General

More information

MX900 SERIES PCI PTS POI SECURITY POLICY

MX900 SERIES PCI PTS POI SECURITY POLICY Mx900 Series PCI PTS POI Security Policy...1 Introduction... 3 SCOPE... 3 Product Identification & Inspection... 3 ROLES... 4 DEPLOYERS OF MX 900 SERIES TERMINAL TO END-USERS SITES... 4 ADMINISTRATORS

More information

NEW9210 Security Policy

NEW9210 Security Policy NEW9210 Security Policy V 1.0.7 NEW POS TECHNOLOGY LIMITED www.newpostech.com Revision History Date Revision Level Description Modified by 2016-05-25 1.0.0 Original Issue Kevin, Paddy 2016-05-31 1.0.1

More information

Payment Card Industry (PCI) PIN Transaction Security (PTS) Hardware Security Module (HSM) Evaluation Vendor Questionnaire Version 2.

Payment Card Industry (PCI) PIN Transaction Security (PTS) Hardware Security Module (HSM) Evaluation Vendor Questionnaire Version 2. Payment Card Industry (PCI) PIN Transaction Security (PTS) Hardware Security Module (HSM) Evaluation Vendor Questionnaire Version 2.0 May 2012 Document Changes Date Version Author Description April 2009

More information

Power on/off Button. Secure PIN Pad. Mswipe Technologies Pvt. Ltd.

Power on/off Button. Secure PIN Pad. Mswipe Technologies Pvt. Ltd. WisePOS is an innovative Android Mobile MPOS device accepting different forms of payment including EMV Chip & Pin, MSR and NFC contactless. Integrated with BT, Wi, GPRS and optional barcode scanner, WisePOS

More information

Payment Card Industry (PCI) PIN Transaction Security (PTS) Point of Interaction (POI) Modular Evaluation Vendor Questionnaire Version 4.

Payment Card Industry (PCI) PIN Transaction Security (PTS) Point of Interaction (POI) Modular Evaluation Vendor Questionnaire Version 4. Payment Card Industry (PCI) PIN Transaction Security (PTS) Point of Interaction (POI) Modular Evaluation Vendor Questionnaire Version 4.0 June 2013 Document Changes Date Version Description April 2010

More information

Payment Card Industry (PCI) PIN Transaction Security (PTS) Point of Interaction (POI) Modular Evaluation Vendor Questionnaire Version 3.

Payment Card Industry (PCI) PIN Transaction Security (PTS) Point of Interaction (POI) Modular Evaluation Vendor Questionnaire Version 3. Payment Card Industry (PCI) PIN Transaction Security (PTS) Point of Interaction (POI) Modular Evaluation Vendor Questionnaire Version 3.1 September 2011 Document Changes Date Version Description April

More information

PIN Security Requirements

PIN Security Requirements Payment Card Industry (PCI) PIN Security Requirements PCI SSC Modifications Summary of Significant Changes from v2.0 to v3.0 August 2018 PCI SSC Modifications to PCI PIN Security Requirements In the table

More information

This Security Policy describes how this module complies with the eleven sections of the Standard:

This Security Policy describes how this module complies with the eleven sections of the Standard: Vormetric, Inc Vormetric Data Security Server Module Firmware Version 4.4.1 Hardware Version 1.0 FIPS 140-2 Non-Proprietary Security Policy Level 2 Validation May 24 th, 2012 2011 Vormetric Inc. All rights

More information

Sony Security Module. Security Policy

Sony Security Module. Security Policy Sony Security Module Security Policy Document Version 1.0.0 Sony Corporation FIPS 140-2 Non-Proprietary Copyright 2010 Sony Corporation TABLE OF CONTENTS 1. MODULE OVERVIEW... 3 2. SECURITY LEVEL... 5

More information

Payment Card Industry (PCI) PTS PIN Security Requirements. Technical FAQs for use with Version 2

Payment Card Industry (PCI) PTS PIN Security Requirements. Technical FAQs for use with Version 2 Payment Card Industry (PCI) PTS PIN Security Requirements Technical FQs for use with Version 2 December 2015 Table of Contents PIN Security Requirements: Frequently sked Questions... 1 General... 1 PIN

More information

Dolphin DCI 1.2. FIPS Level 3 Validation. Non-Proprietary Security Policy. Version 1.0. DOL.TD DRM Page 1 Version 1.0 Doremi Cinema LLC

Dolphin DCI 1.2. FIPS Level 3 Validation. Non-Proprietary Security Policy. Version 1.0. DOL.TD DRM Page 1 Version 1.0 Doremi Cinema LLC Dolphin DCI 1.2 FIPS 140-2 Level 3 Validation Non-Proprietary Security Policy Version 1.0 DOL.TD.000921.DRM Page 1 Version 1.0 Table of Contents 1 Introduction... 3 1.1 PURPOSE... 3 1.2 REFERENCES... 3

More information

User Manual. Spectrum Pro

User Manual. Spectrum Pro 80140502-001 User Manual Spectrum Pro PCI PTS 4.X Hybrid Insert Reader RS232 Interface 80140502-001 Rev 51 3/10/2015 International Technologies & Systems Corporation 10721 Walker Street, Cypress, CA 90630-4720;

More information

Payment Card Industry (PCI) PIN Security. Requirements and Testing Procedures. Version 2.0. December 2014

Payment Card Industry (PCI) PIN Security. Requirements and Testing Procedures. Version 2.0. December 2014 Payment Card Industry (PCI) PIN Security Requirements and Version 2.0 December 2014 Document Changes Date Version Description October 2011 1.0 Initial release of PCI December 2014 2.0 Initial release of

More information

With the edition of this document, all previous editions become void. Indications made in this document may be changed without previous notice.

With the edition of this document, all previous editions become void. Indications made in this document may be changed without previous notice. SECURITY POLICY Contactless Payment and Ticketing Module Copyright 2015 2016 by ELECTRONIC GmbH Lange Strasse 4 D-35781 Weilburg-Waldhausen Tel.: +49 6471 3109-0 http://www.feig.de With the edition of

More information

FIPS SECURITY POLICY FOR

FIPS SECURITY POLICY FOR FIPS 140-2 SECURITY POLICY FOR SPECTRAGUARD ENTERPRISE SENSOR August 26, 2011 FIPS 140-2 LEVEL-2 SECURITY POLICY FOR AIRTIGHT NETWORKS SPECTRAGUARD ENTERPRISE SENSOR 1. Introduction This document describes

More information

Prepared by the Fortress Technologies, Inc., Government Technology Group 4023 Tampa Rd. Suite Oldsmar, FL 34677

Prepared by the Fortress Technologies, Inc., Government Technology Group 4023 Tampa Rd. Suite Oldsmar, FL 34677 Non-Proprietary Security Policy for the FIPS 140-2 Level 2 Validated AirFortress Wireless Security Gateway Hardware Model AF7500 (Document Version 2.3) March 2007 Prepared by the Fortress Technologies,

More information

PCI DSS Compliance. Verba SOLUTION GUIDE. Introduction. Verba and the Payment Card Industry Data Security Standard

PCI DSS Compliance. Verba SOLUTION GUIDE. Introduction. Verba and the Payment Card Industry Data Security Standard Introduction Verba provides a complete compliance solution for merchants and service providers who accept and/or process payment card data over the telephone. Secure and compliant handling of a customer

More information

Payment Card Industry (PCI) PTS PIN Security Requirements. Technical FAQs for use with Version 2

Payment Card Industry (PCI) PTS PIN Security Requirements. Technical FAQs for use with Version 2 Payment Card Industry (PCI) PTS PIN Security Requirements Technical FQs for use with Version 2 June 2015 Table of Contents PIN Security Requirements: Frequently sked Questions... 1 General... 1 PIN Security

More information

KEY-UP Cryptographic Module Security Policy Document Version 0.5. Ian Donnelly Systems (IDS)

KEY-UP Cryptographic Module Security Policy Document Version 0.5. Ian Donnelly Systems (IDS) KEY-UP Cryptographic Module Security Policy Document Version 0.5 Ian Donnelly Systems (IDS) December 29, 2005 Copyright Ian Donnelly Systems 2005. May be reproduced only in its original entirety [without

More information

University of Sunderland Business Assurance PCI Security Policy

University of Sunderland Business Assurance PCI Security Policy University of Sunderland Business Assurance PCI Security Policy Document Classification: Public Policy Reference Central Register IG008 Policy Reference Faculty / Service IG 008 Policy Owner Interim Director

More information

Payment Card Industry Internal Security Assessor: Quick Reference V1.0

Payment Card Industry Internal Security Assessor: Quick Reference V1.0 PCI SSC by formed by: 1. AMEX 2. Discover 3. JCB 4. MasterCard 5. Visa Inc. PCI SSC consists of: 1. PCI DSS Standards 2. PA DSS Standards 3. P2PE - Standards 4. PTS (P01,HSM and PIN) Standards 5. PCI Card

More information

Technical Specification & Warranty mypos Europe Ltd. mypos Mini Ice EN

Technical Specification & Warranty mypos Europe Ltd. mypos Mini Ice EN Technical Specification & Warranty mypos Europe Ltd. mypos Mini Ice EN CONTENTS Supported connections... 2 Certifications & EMV... 2 D220 specification... 3 Safety instructions... 5 General safety information...

More information

Technical Specification & Warranty mypos Europe Ltd. mypos Mini EN

Technical Specification & Warranty mypos Europe Ltd. mypos Mini EN Technical Specification & Warranty mypos Europe Ltd. mypos Mini EN CONTENTS Supported connections... 2 Certifications & EMV... 3 mypos Mini specification... 4 Safety instructions... 5 General safety information...

More information

Card Reader User Guide

Card Reader User Guide Card Reader User Guide 1 MYOB PayDirect User Guide Getting started in a few easy steps MYOB PayDirect turns your smartphone into a mobile payments terminal, so you can get paid on the spot anywhere, anytime.

More information

PCI PA-DSS Implementation Guide

PCI PA-DSS Implementation Guide PCI PA-DSS Implementation Guide For Atos Worldline Banksys XENTA, XENTEO, XENTEO ECO, XENOA ECO YOMANI and YOMANI XR terminals using the Point BKX Payment Core Software Versions A05.01 and A05.02 Version

More information

Point ipos Implementation Guide. Hypercom P2100 using the Point ipos Payment Core Hypercom H2210/K1200 using the Point ipos Payment Core

Point ipos Implementation Guide. Hypercom P2100 using the Point ipos Payment Core Hypercom H2210/K1200 using the Point ipos Payment Core PCI PA - DSS Point ipos Implementation Guide Hypercom P2100 using the Point ipos Payment Core Hypercom H2210/K1200 using the Point ipos Payment Core Version 1.02 POINT TRANSACTION SYSTEMS AB Box 92031,

More information

Meru Networks. Security Gateway SG1000 Cryptographic Module Security Policy Document Version 1.2. Revision Date: June 24, 2009

Meru Networks. Security Gateway SG1000 Cryptographic Module Security Policy Document Version 1.2. Revision Date: June 24, 2009 Security Gateway SG1000 Cryptographic Module Security Policy Document Version 1.2 Meru Networks Revision Date: June 24, 2009 Copyright Meru Networks 2008. May be reproduced only in its original entirety

More information

Advanced Certifications PA-DSS and P2PE. Erik Winkler, VP, ControlCase

Advanced Certifications PA-DSS and P2PE. Erik Winkler, VP, ControlCase Advanced Certifications PA-DSS and P2PE Erik Winkler, VP, ControlCase ControlCase Annual Conference Miami, Florida USA 2017 PCI Family of Standards Ecosystem of payment devices, applications, infrastructure

More information

PCI PA - DSS. Point Vx Implementation Guide. Version For VeriFone Vx520, Vx680, Vx820 terminals using the Point Vx Payment Core (Point VxPC)

PCI PA - DSS. Point Vx Implementation Guide. Version For VeriFone Vx520, Vx680, Vx820 terminals using the Point Vx Payment Core (Point VxPC) PCI PA - DSS Point Vx Implementation Guide For VeriFone Vx520, Vx680, Vx820 terminals using the Point Vx Payment Core (Point VxPC) Version 2.02 POINT TRANSACTION SYSTEMS AB Box 92031, 120 06 Stockholm,

More information

mpos Merchant User Guide

mpos Merchant User Guide Version 1.0 Mint mpos User Guide: Version 1.0 SEP16 Contents CHAPTER 1: LOGGING INTO THE NETS MPOS MERCHANT PORTAL 6 First time Login 6 Next time Login 6 Forgot your password? 7 CHAPTER 2: MERCHANT PORTAL

More information

econet smart grid gateways: econet SL and econet MSA FIPS Security Policy

econet smart grid gateways: econet SL and econet MSA FIPS Security Policy econet smart grid gateways: econet SL and econet MSA FIPS 140 2 Security Policy Level 2 Validation Document Version 0.5 Hardware Versions: ENSL2, ENSL5 and ENMSA2 Firmware Version: 3.2.1 FIPS Nexgrid,

More information

M010 M010 DATASHEET PAYMENTS HERE, THERE, ANYWHERE. INDEPENDENTS AND MULTIPLE RETAIL STORES. CREATE A SEAMLESS RETAIL EXPERIENCE

M010 M010 DATASHEET PAYMENTS HERE, THERE, ANYWHERE. INDEPENDENTS AND MULTIPLE RETAIL STORES. CREATE A SEAMLESS RETAIL EXPERIENCE M010 INDEPENDENTS AND MULTIPLE RETAIL STORES. CREATE A SEAMLESS RETAIL EXPERIENCE Be mobile, be counter-top and be in-store. It s not as impossible as it sounds. Miura s M010 platform solution evolves

More information

CoSign Hardware version 7.0 Firmware version 5.2

CoSign Hardware version 7.0 Firmware version 5.2 CoSign Hardware version 7.0 Firmware version 5.2 FIPS 140-2 Non-Proprietary Security Policy Level 3 Validation July 2010 Copyright 2009 AR This document may be freely reproduced and distributed whole and

More information

Security Policy. 10 th March 2005

Security Policy. 10 th March 2005 DCAP Security Module FIPS 140-2 Level 3 Security Policy 10 th March 2005 Thales e-security Limited, Meadow View House, Long Crendon, Aylesbury, BUCKS HP18 9EQ United Kingdom Tel. +44 (0) 1844 201800 Fax.

More information

Integral Memory PLC. Crypto Dual (Underlying Steel Chassis) and Crypto Dual Plus (Underlying Steel Chassis) FIPS Security Policy

Integral Memory PLC. Crypto Dual (Underlying Steel Chassis) and Crypto Dual Plus (Underlying Steel Chassis) FIPS Security Policy Integral Memory PLC. Chassis) and Crypto Dual Plus (Underlying FIPS 140-2 Security Policy Table of Contents 1. INTRODUCTION... 1 1.1 Purpose....1 1.2 References... 1 1.3 Document History... 1 2. PRODUCT

More information

Payment Card Industry (PCI) PTS PIN Security Requirements. Technical FAQs for use with Version 2

Payment Card Industry (PCI) PTS PIN Security Requirements. Technical FAQs for use with Version 2 Payment Card Industry (PCI) PTS PIN Security Requirements Technical FQs for use with Version 2 pril 2016 Table of Contents PIN Security Requirements: Frequently sked Questions... 1 General... 1 PIN Security

More information

Donor Credit Card Security Policy

Donor Credit Card Security Policy Donor Credit Card Security Policy INTRODUCTION This document explains the Community Foundation of Northeast Alabama s credit card security requirements for donors as required by the Payment Card Industry

More information

Google Cloud Platform: Customer Responsibility Matrix. April 2017

Google Cloud Platform: Customer Responsibility Matrix. April 2017 Google Cloud Platform: Customer Responsibility Matrix April 2017 Introduction 3 Definitions 4 PCI DSS Responsibility Matrix 5 Requirement 1 : Install and Maintain a Firewall Configuration to Protect Cardholder

More information

DataTraveler 5000 (DT5000) and DataTraveler 6000 (DT6000) Ultimate Security in a USB Flash Drive. Submitted by SPYRUS, Inc.

DataTraveler 5000 (DT5000) and DataTraveler 6000 (DT6000) Ultimate Security in a USB Flash Drive. Submitted by SPYRUS, Inc. Submitted by SPYRUS, Inc. Contents DT5000 and DT6000 Technology Overview...2 Why DT5000 and DT6000 Encryption Is Different...3 Why DT5000 and DT6000 Encryption Is Different - Summary...4 XTS-AES Sector-Based

More information

Cisco VPN 3002 Hardware Client Security Policy

Cisco VPN 3002 Hardware Client Security Policy Introduction This non-proprietary Cryptographic Module Security Policy describes how the VPN 3002 and 3002 8E Hardware Client (Firmware version FIPS 3.6.7.F) meets the security requirements of FIPS 140-2,

More information

Trusted Platform Module explained

Trusted Platform Module explained Bosch Security Systems Video Systems Trusted Platform Module explained What it is, what it does and what its benefits are 3 August 2016 2 Bosch Security Systems Video Systems Table of contents Table of

More information

Point PA-DSS. Implementation Guide. Banksys Yomani VeriFone & PAX VPFIPA0201

Point PA-DSS. Implementation Guide. Banksys Yomani VeriFone & PAX VPFIPA0201 Point PA-DSS Implementation Guide Banksys Yomani 1.04 VeriFone & PAX VPFIPA0201 Implementation Guide Contents 1 Revision history 1 2 Introduction 2 3 Document use 2 3.1 Important notes 2 4 Summary of requirements

More information

Security in NFC Readers

Security in NFC Readers Security in Readers Public Content and security, a different kind of wireless Under the hood of based systems Enhancing the security of an architecture Secure data exchange Information security goals Cryptographic

More information

INFORMATION SUPPLEMENT. Use of SSL/Early TLS for POS POI Terminal Connections. Date: June 2018 Author: PCI Security Standards Council

INFORMATION SUPPLEMENT. Use of SSL/Early TLS for POS POI Terminal Connections. Date: June 2018 Author: PCI Security Standards Council Use of SSL/Early TLS for POS POI Terminal Connections Date: Author: PCI Security Standards Council Table of Contents Introduction...1 Executive Summary...1 What is the risk?...1 What is meant by Early

More information

PCI Compliance Whitepaper

PCI Compliance Whitepaper PCI Compliance Whitepaper Publication date: July 27 th, 2009 Copyright 2007-2009, LINOMA SOFTWARE LINOMA SOFTWARE is a division of LINOMA GROUP, Inc. Table of Contents Introduction... 3 Crypto Complete

More information

Table of Contents. PCI Information Security Policy

Table of Contents. PCI Information Security Policy PCI Information Security Policy Policy Number: ECOMM-P-002 Effective Date: December, 14, 2016 Version Number: 1.0 Date Last Reviewed: December, 14, 2016 Classification: Business, Finance, and Technology

More information

SafeNet LUNA EFT FIPS LEVEL 3 SECURITY POLICY

SafeNet LUNA EFT FIPS LEVEL 3 SECURITY POLICY SafeNet LUNA EFT FIPS 140-2 LEVEL 3 SECURITY POLICY DOCUMENT NUMBER: CR-2786 AUTHOR(S): Brian Franklin / Terry Fletcher / Chris Brych DEPARTMENT: Engineering LOCATION OF ISSUE: Ottawa DATE ORIGINATED:

More information

VX680 User Manual. Date: 07/11/17 Version Copyright Adyen B.V Simon Carmiggeltstraat DJ Amsterdam The Netherlands.

VX680 User Manual. Date: 07/11/17 Version Copyright Adyen B.V Simon Carmiggeltstraat DJ Amsterdam The Netherlands. VX680 User Manual Date: 07/11/17 Version 0.0 Copyright Adyen B.V. 2017 Simon Carmiggeltstraat 6-50 1011 DJ Amsterdam The Netherlands www.adyen.com Table of Contents 1 Legacy instructions for firmware version

More information

Barco ICMP FIPS Non-Proprietary Security Policy

Barco ICMP FIPS Non-Proprietary Security Policy Barco FIPS 140-2 Non-Proprietary Security Policy 1 Page 1 of 26 Table of Content Table of Content... 2 1 Introduction... 3 1.1 Security Level... 3 1.2 Cryptographic Boundary... 4 1.3 FIPS 140-2 Approved

More information

The Xirrus Wi Fi Array XS4, XS8 Security Policy Document Version 1.0. Xirrus, Inc.

The Xirrus Wi Fi Array XS4, XS8 Security Policy Document Version 1.0. Xirrus, Inc. The Xirrus Wi Fi Array XS4, XS8 Security Policy Document Version 1.0 Xirrus, Inc. March 8, 2011 Copyright Xirrus, Inc. 2011. May be reproduced only in its original entirety [without revision]. Page 1 TABLE

More information

Google Cloud Platform: Customer Responsibility Matrix. December 2018

Google Cloud Platform: Customer Responsibility Matrix. December 2018 Google Cloud Platform: Customer Responsibility Matrix December 2018 Introduction 3 Definitions 4 PCI DSS Responsibility Matrix 5 Requirement 1 : Install and Maintain a Firewall Configuration to Protect

More information

Payment Card Industry (PCI) Software-based PIN Entry on COTS. Security Requirements. Version 1.0. January 2018

Payment Card Industry (PCI) Software-based PIN Entry on COTS. Security Requirements. Version 1.0. January 2018 Payment Card Industry (PCI) Software-based PIN Entry on COTS Security Version 1.0 January 2018 Document Changes Date Version Description January 2018 1.0 Initial Release PCI Software-Based PIN Entry on

More information

Navigating the PCI DSS Challenge. 29 April 2011

Navigating the PCI DSS Challenge. 29 April 2011 Navigating the PCI DSS Challenge 29 April 2011 Agenda 1. Overview of Threat and Compliance Landscape 2. Introduction to the PCI Security Standards 3. Payment Brand Compliance Programs 4. PCI DSS Scope

More information

BCM58100B0 Series: BCM58101B0, BCM58102B0, BCM58103B0 Cryptographic Module VC0 Non-Proprietary Security Policy Document Version 0.

BCM58100B0 Series: BCM58101B0, BCM58102B0, BCM58103B0 Cryptographic Module VC0 Non-Proprietary Security Policy Document Version 0. BCM58100B0 Series: BCM58101B0, BCM58102B0, BCM58103B0 Cryptographic Module VC0 Non-Proprietary Security Policy Document Version 0.8 Broadcom Ltd. Revision Date: 2016-05-25 Copyright Broadcom 2016. May

More information

The question paper contains 40 multiple choice questions with four choices and students will have to pick the correct one (each carrying ½ marks.).

The question paper contains 40 multiple choice questions with four choices and students will have to pick the correct one (each carrying ½ marks.). Time: 3hrs BCA III Network security and Cryptography Examination-2016 Model Paper 2 M.M:50 The question paper contains 40 multiple choice questions with four choices and students will have to pick the

More information

Atmel Trusted Platform Module June, 2014

Atmel Trusted Platform Module June, 2014 Atmel Trusted Platform Module June, 2014 1 2014 Atmel Corporation What is a TPM? The TPM is a hardware-based secret key generation and storage device providing a secure vault for any embedded system Four

More information

Ready Theatre Systems RTS POS

Ready Theatre Systems RTS POS Ready Theatre Systems RTS POS PCI PA-DSS Implementation Guide Revision: 2.0 September, 2010 Ready Theatre Systems, LLC - www.rts-solutions.com Table of Contents: Introduction to PCI PA DSS Compliance 2

More information

ucube USER MANUAL VERSION 1.2

ucube USER MANUAL VERSION 1.2 ucube USER MANUAL VERSION 1.2 Contact ucube is designed and produced by YouTransactor, 32 rue Brancion 75015 Paris France. For any open questions, please contact your dedicated support. It may be, depending

More information

eh880 Secure Smart Card Terminal

eh880 Secure Smart Card Terminal eh880 Secure Smart Card Terminal Technical Specifications Subject to change without prior notice Table of Contents 1.0. Introduction... 3 2.0. Features... 4 3.0. Supported Card Types... 5 3.1. MCU Cards...

More information

Lexmark PrintCryption TM (Firmware Version 1.3.1)

Lexmark PrintCryption TM (Firmware Version 1.3.1) Lexmark PrintCryption TM (Firmware Version 1.3.1) FIPS 140-2 Non-Proprietary Security Policy Level 1 Validation Version 0.95 April 2007 Table of Contents INTRODUCTION... 3 PURPOSE... 3 REFERENCES... 3

More information

EPC SEPA CARDS STANDARDISATION (SCS) VOLUME

EPC SEPA CARDS STANDARDISATION (SCS) VOLUME EPC020-08 12.12.2013 (Vol Ref. 7.4.1.00) SEPA CARDS STANDARDISATION (SCS) VOLUME BOOK 4 SECURITY REQUIREMENTS PART OF THE APPROVED VERSION OF SCS VOLUME V7.0 Payments and Cash withdrawals with Cards in

More information

VX690 User Manual. Date: 07/11/17 Version Copyright Adyen B.V Simon Carmiggeltstraat DJ Amsterdam The Netherlands.

VX690 User Manual. Date: 07/11/17 Version Copyright Adyen B.V Simon Carmiggeltstraat DJ Amsterdam The Netherlands. VX690 User Manual Date: 07/11/17 Version 0.0 Copyright Adyen B.V. 2017 Simon Carmiggeltstraat 6-50 1011 DJ Amsterdam The Netherlands www.adyen.com Table of Contents 1 Legacy instructions for firmware version

More information

Verifone Finland PA-DSS

Verifone Finland PA-DSS Verifone Finland PA-DSS Implementation Guide Atos Worldline Yomani & Yomani ML 3.00.xxxx.xxxx Verifone Vx520, Vx520C, Vx680, Vx690, Vx820 & Ux300 VPFIPA0401.xx.xx Implementation Guide Contents 1 Revision

More information

Payment Card Industry (PCI) PTS POI Security Requirements. Technical FAQs for use with Version 3.0

Payment Card Industry (PCI) PTS POI Security Requirements. Technical FAQs for use with Version 3.0 Payment Card Industry (PCI) PTS POI Security Requirements Technical FQs for use with Version 3.0 March 2011 Table of Contents POI Device Evaluation: Frequently sked Questions... 3 General Questions...

More information

CN!Express CX-6000 Single User Version PCI Compliance Status Version June 2005

CN!Express CX-6000 Single User Version PCI Compliance Status Version June 2005 85 Grove Street - Peterboro ugh, N H 0345 8 voice 603-924-6 079 fax 60 3-924- 8668 CN!Express CX-6000 Single User Version 3.38.4.4 PCI Compliance Status Version 1.0 28 June 2005 Overview Auric Systems

More information

Point-to-Point Encryption (P2PE) Implementation Manual. Mobile / Mini / Flex. Version 1.0

Point-to-Point Encryption (P2PE) Implementation Manual. Mobile / Mini / Flex. Version 1.0 Point-to-Point Encryption (P2PE) Implementation Manual Mobile / Mini / Flex Version 1.0 1. P2PE Solution Information and Solution Provider Contact Details 1.1 P2PE Solution Information Solution name: Solution

More information

Seagate Secure TCG Enterprise SSC Pulsar.2 Self-Encrypting Drive FIPS 140 Module Security Policy

Seagate Secure TCG Enterprise SSC Pulsar.2 Self-Encrypting Drive FIPS 140 Module Security Policy Seagate Secure TCG Enterprise SSC Pulsar.2 Self-Encrypting Drive FIPS 140 Module Security Policy Security Level 2 Rev. 0.9 November 12, 2012 Seagate Technology, LLC Page 1 Table of Contents 1 Introduction...

More information

IOT SECURITY TOP 20 R E Q U I R E M E N T S

IOT SECURITY TOP 20 R E Q U I R E M E N T S IOT SECURITY TOP 20 R E Q U I R E M E N T S LIST OF IOT SECURITY TOP 20 REQUIREMENTS 1. Provide a manual override for any safety critical operations. 2. Ensure parameters for which a disclosure could lead

More information

Overview. SSL Cryptography Overview CHAPTER 1

Overview. SSL Cryptography Overview CHAPTER 1 CHAPTER 1 Secure Sockets Layer (SSL) is an application-level protocol that provides encryption technology for the Internet. SSL ensures the secure transmission of data between a client and a server through

More information

axept S900 User Guide

axept S900 User Guide axept S900 User Guide Contents 1 Initial Setup... 4 1.1 Terminal Overview... 5 1.2 Screen Overview... 6 1.2.1 Screen Icons Overview... 7 1.3 Terminal Technical Specifications... 8 1.4 Connecting to the

More information

The Devil is in the Details: The Secrets to Complying with PCI Requirements. Michelle Kaiser Bray Faegre Baker Daniels

The Devil is in the Details: The Secrets to Complying with PCI Requirements. Michelle Kaiser Bray Faegre Baker Daniels The Devil is in the Details: The Secrets to Complying with PCI Requirements Michelle Kaiser Bray Faegre Baker Daniels 1 PCI DSS: What? PCI DSS = Payment Card Industry Data Security Standard Payment card

More information

PCI DSS and the VNC SDK

PCI DSS and the VNC SDK RealVNC Limited 2016. 1 What is PCI DSS? PCI DSS (Payment Card Industry Data Security Standard) compliance is mandated by many major credit card companies, including Visa, MasterCard, American Express,

More information

PCI PA DSS. PBMUECR Implementation Guide

PCI PA DSS. PBMUECR Implementation Guide Point Transaction Systems SIA PCI PA DSS PBMUECR 02.21.002 Implementation Guide Author: Filename: D01_PBMUECR_Implementation_Guide_v1_3.docx Version: 1.3 Date: 2014-07-17 Circulation: Edited : 2014-07-17

More information

VX820 User Manual. Date: 07/11/17 Version Copyright Adyen B.V Simon Carmiggeltstraat DJ Amsterdam The Netherlands.

VX820 User Manual. Date: 07/11/17 Version Copyright Adyen B.V Simon Carmiggeltstraat DJ Amsterdam The Netherlands. VX820 User Manual Date: 07/11/17 Version 0.0 Copyright Adyen B.V. 2017 Simon Carmiggeltstraat 6-50 1011 DJ Amsterdam The Netherlands www.adyen.com Table of Contents 1 Legacy instructions for firmware version

More information

axept PAX S800 User Guide

axept PAX S800 User Guide axept PAX S800 User Guide Version 1.6 April 2017 Contents 1 Initial Setup... 4 1.1 Terminal Overview... 5 1.2 Screen Overview... 6 Screen Icons Overview... 6 1.3 Terminal Technical Specifications... 7

More information

Dolby IMS-SM FIPS Level 2 Validation. Nonproprietary Security Policy Version: 4

Dolby IMS-SM FIPS Level 2 Validation. Nonproprietary Security Policy Version: 4 Dolby IMS-SM FIPS 140-2 Level 2 Validation Nonproprietary Security Policy Version: 4 Corporate Headquarters Dolby Laboratories, Inc. 100 Potrero Avenue San Francisco, CA 94103-4813 USA Telephone 415-558-0200

More information

BCA III Network security and Cryptography Examination-2016 Model Paper 1

BCA III Network security and Cryptography Examination-2016 Model Paper 1 Time: 3hrs BCA III Network security and Cryptography Examination-2016 Model Paper 1 M.M:50 The question paper contains 40 multiple choice questions with four choices and student will have to pick the correct

More information

WHAT FUTURE FOR CONTACTLESS CARD SECURITY?

WHAT FUTURE FOR CONTACTLESS CARD SECURITY? WHAT FUTURE FOR CONTACTLESS CARD SECURITY? Alain Vazquez (alain.vazquez@louveciennes.sema.slb.com) 1/27 AV Contents Major contactless features : summary Contactless major constraints Major security issues

More information

Juniper Network Connect Cryptographic Module Version 2.0 Security Policy Document Version 1.0. Juniper Networks, Inc.

Juniper Network Connect Cryptographic Module Version 2.0 Security Policy Document Version 1.0. Juniper Networks, Inc. Juniper Network Connect Cryptographic Module Version 2.0 Security Policy Document Version 1.0 Juniper Networks, Inc. September 10, 2009 Copyright Juniper Networks, Inc. 2009. May be reproduced only in

More information

Rev. C 8/16/2017. VP3300/VP3300C/VP3300E User Manual

Rev. C 8/16/2017. VP3300/VP3300C/VP3300E User Manual 80149509-001 Rev. C 8/16/2017 VP3300/VP3300C/VP3300E User Manual Copyright 2017, ID TECH. All rights reserved. ID TECH 10721 Walker Street Cypress, CA 90630 USA This document, as well as the software and

More information

Cisco Desktop Collaboration Experience DX650 Security Overview

Cisco Desktop Collaboration Experience DX650 Security Overview White Paper Cisco Desktop Collaboration Experience DX650 Security Overview Cisco Desktop Collaboration Experience DX650 Security Overview The Cisco Desktop Collaboration Experience DX650 (Cisco DX650)

More information

PCI Compliance Whitepaper

PCI Compliance Whitepaper PCI Compliance Whitepaper Publication date: February 25 th, 2008 Copyright 2006-2008, LINOMA SOFTWARE LINOMA SOFTWARE is a division of LINOMA GROUP, Inc. Table of Contents Introduction...3 Crypto Complete

More information

Product Specification

Product Specification P10 Handheld POS Terminal Product Specification 1.00 Doc name: 07-PS-P10 P10 Handheld POS Terminal 1.00.docx Contents 1.0. Introduction... 3 2.0. Features... 4 3.0. Supported Card Types... 5 3.1. MCU Cards...

More information

Section 3.9 PCI DSS Information Security Policy Issued: November 2017 Replaces: June 2016

Section 3.9 PCI DSS Information Security Policy Issued: November 2017 Replaces: June 2016 Section 3.9 PCI DSS Information Security Policy Issued: vember 2017 Replaces: June 2016 I. PURPOSE The purpose of this policy is to establish guidelines for processing charges on Payment Cards to protect

More information

UniGuard-V34. Cryptographic Module Security Policy

UniGuard-V34. Cryptographic Module Security Policy UniGuard-V34 Cryptographic Module Security Policy Rev. 1.16 Communication Devices Inc. One Forstmann Ct. Clifton, NJ 07011 USA Phone: 973 772 6997 Fax: 973 772 0747 Internet: support@commdevices.com Table

More information

TransKrypt Security Server

TransKrypt Security Server TransKrypt Security Server Overview Security of transactions is critical as the volume of payments are growing at a faster pace from new generation mobile and broadband based IP payment terminals and devices.

More information

Q2. Why is there an Australian specific device approval process?

Q2. Why is there an Australian specific device approval process? IAC DEVICE EVALUATION FAQ Version 3 (Effective 21 November 2016) This FAQ provides answers to questions regarding APCA s physical and logical device security requirements and evaluation methodologies as

More information

PA-DSS Implementation Guide

PA-DSS Implementation Guide PA-DSS Implementation Guide PayEx Nordic Payment v1.1.x Version: 1.7 Copyright 2013-2018 Swedbank PayEx Holding AB (Release) Page 2 (16) Revision History Ver. Name Date Comments 1.0 JTK (CT) 2016-11-01

More information

Hitachi Virtual Storage Platform (VSP) Encryption Board. FIPS Non-Proprietary Cryptographic Module Security Policy

Hitachi Virtual Storage Platform (VSP) Encryption Board. FIPS Non-Proprietary Cryptographic Module Security Policy Hitachi Virtual Storage Platform (VSP) Encryption Board FIPS 140-2 Non-Proprietary Cryptographic Module Security Policy Version: 4.0 Date: July 27, 2016 Copyright Hitachi, 2016 Version 4.0 Page 1 of 19

More information

SEL-3021 Serial Encrypting Transceiver Security Policy Document Version 1.9

SEL-3021 Serial Encrypting Transceiver Security Policy Document Version 1.9 SEL-3021 Serial Encrypting Transceiver Security Policy Document Version 1.9 Schweitzer Engineering Laboratories, Inc. May 21, 2007 Copyright 2005-2007 Schweitzer Engineering Laboratories, Inc. May be reproduced

More information

Dolphin Board. FIPS Level 3 Validation. Security Policy. Version a - Dolphin_SecPolicy_000193_v1_3.doc Page 1 of 19 Version 1.

Dolphin Board. FIPS Level 3 Validation. Security Policy. Version a - Dolphin_SecPolicy_000193_v1_3.doc Page 1 of 19 Version 1. Dolphin Board FIPS 140-2 Level 3 Validation Security Policy Version 1.3 14a - Dolphin_SecPolicy_000193_v1_3.doc Page 1 of 19 Version 1.3 Table of Contents 1 INTRODUCTION...3 1.1 PURPOSE...3 1.2 REFERENCES...3

More information

axept PAX S900 Version 1.7 April 2017

axept PAX S900 Version 1.7 April 2017 axept PAX S900 Version 1.7 April 2017 Contents 1 Initial Setup... 4 1.1 Terminal Overview... 5 1.2 Screen Overview... 6 Screen Icons Overview... 7 1.3 Terminal Technical Specifications... 8 1.4 Inserting

More information

br301 DATA SHEET V1.1 Feitian technologies Co., Ltd. Website:

br301 DATA SHEET V1.1 Feitian technologies Co., Ltd. Website: br301 DATA SHEET V1.1 Feitian technologies Co., Ltd. Website:www.ftsafe.com.cn Contents... 1 1.1 Title... 1 1.2 Introduction... 1 1.3 Feature... 2 1.4 Specification... 2 ii 1.1 Title br301 V2.0 Bluetooth

More information