PUBLIC
19
pm_ymn_security.fm
document release 2.1
last updated 8/11/13
YOMANI
PRODUCT MANUAL
3. Security
Security features are integrated at all levels of the YOMANI design, from the external
housing to the “system-on-chip” at the heart of the terminal.
Terminal design
The most tangible security feature is the integrated PIN privacy shield, which prevents
shoulder-surfing while a cardholder is entering a PIN.
To prevent fraudsters from placing overlays, the YOMANI terminal is designed with
illuminated card slots and a lot of curved surfaces on both the housing and the keypad.
Integrated security ASIC
The ASIC contributes to the high security level of the YOMANI by integrating:
•
intrusion detection: a number of tamper sources detect any attempted intrusion
•
62 Kbytes of integrated secure memory, instantaneously erased if any attempted
intrusion is detected
•
strict control of the secure boot process of the terminal, via key management: only
code that is certified and signed by a known certification authority will run on the
security processor (MP1)
Key management
The software supports the Derived Unique Key Per Transaction (DUKPT) key
management scheme, where the working key changes for each transaction. Other
schemes such as master/session can be developed on request.
Networking
YOMANI supports both the VPN (Virtual Private Network) method and the SSL (Secure
Socket Layer) protocol. SSL is used mainly to send and receive information securely
over unsecured networks like the Internet.
Summary of Contents for YOMANI
Page 1: ...PRODUCT MANUAL an atos company YOMANI colourful innovation product picture 4 014 x 3 596...
Page 6: ...YOMANI PRODUCT MANUAL iv empty for double sided printing pManual_ymnTOC fm...
Page 8: ...YOMANI PRODUCT MANUAL vi empty for double sided printing pManual_ymnLOF fm...
Page 38: ...YOMANI PRODUCT MANUAL 32 empty for double sided printing pm_ymn_accessories fm...