User Manual
V1.3 - 202301
Page 32 of 43
Passwords and Certificates
All applications have to be signed by Payter following a review of the application, optionally an
Acquirer can be issued its own application signing certificate but it is the
acquirer’s
responsibility
to ensure a secure environment to generate the required RSA key pair and associated certificate
signing request. Signing must then be performed as per [1] and [2].
Tamper Response
The device contains mechanisms to detect physical tampering. Any penetration of the device will
trigger a tamper detection alarm and the device will delete all its operational key material. The
device will immediately restart into an inactive mode and will display a security violation.
Privacy Shield
The Apollo is designed to be used in an unattended environment, integrated into a larger solution.
To avoid disclosing the PIN code from intended or unintended observation the card holder needs
to be made aware that they must prevent others from viewing the PIN during PIN entry. The
payment application must display a message to notify the card holder to protect his PIN during
entry. Such as: "Keep your PIN safe; block the keypad with a free hand or block the view using
your body.”
Care must be taken with respect to any video recording equipment that may have a view of the
device, such as CCTV or similar equipment that may be installed at the deployment location. The
terminal should be placed such that the entered PIN is not visible from any such equipment.
Refer to Apollo / ApolloMax Mechanical Integration Guide for details about installation
requirements.
Patching and Updating
The terminal makes use of the Payter central software repository and can as such retrieve any
updates it may require. Payter will take the initiative in informing customers if any updates are
required.
Decommissioning
In order to permanently decommission a device all key material should be removed from the
device. This can be accomplished by removing the 4 case screws on the back of the device and
opening the case. Once assembled the device will boot into a tampered state.
13.
Security measures
Software Development Guidance
The following outlines the functions certified under PCI PTS 6.0
•
Key management system (Crypto API)
•
SRED (EMV L1 API)
•
PIN Entry (PIN API)
•
Open Protocols (Apollo Proxy)
Only signed firmware can be loaded onto the terminal and it is not possible to run unauthorized
functions.