XENTISSIMO
P
RODUCT
M
ANUAL
•
Multiple mechanisms for detection of intrusion attempts, triggering erasure of
the secure memory.
Security software
The software supports the
following key management schemes:
•
DUKPT, Derived Unique Key Per Transaction, uses a working key that is
changed with each transaction;
•
Master / session, requires that the PIN encryption key or working key remains
the same for an entire transaction session. The session could be a day, a
week, a month or any other period of time set by the host computer.
Other schemes can be added.
XENTISSIMO supports the SSL (Secure Socket Layer) protocol, which is mainly
used to securely send and receive information over unsecured networks like the
Internet, using different communication media such as wireless LAN and GPRS.
Standards
The security-related functions comply with the
following standards:
•
ISO 13491 (secure cryptographic device concepts);
•
ISO 9564 (PIN management and security);
•
ISO 15668 (secure file transfer – retail).
34 -
SECURITY SOFTWARE
Summary of Contents for Xentissimo
Page 1: ......
Page 2: ......
Page 4: ......
Page 10: ...XENTISSIMO PRODUCT MANUAL...
Page 32: ...XENTISSIMO PRODUCT MANUAL...
Page 38: ...XENTISSIMO PRODUCT MANUAL...
Page 48: ...XENTISSIMO PRODUCT MANUAL...
Page 50: ...XENTISSIMO PRODUCT MANUAL...
Page 52: ......