Data Sheet

Table Of Contents
Chips and readers- USER’S GUIDE
UG 16
Version 1.0
P1 : contacless configuration
P2 : key and page number
PROTECTING THE KEYS
Thus all the security depends on making sure that these keys are kept secret. To ensure
a good secury, key loading has to be done in a secure environment.
The key loading procedure ensures that :
1 - nobody decrypts the key loaded in the coupler by listenning to the HOST-COUPLER
communication
2 - nobody records and uses the communication between HOST and COUPLER to load
keys in another coupler
To protect the communication, all data exchange is ciphered thanks to an exchange key
known only by the coupler. Therefore, nobody will be able decipher serial communica-
tion and find the application key value
Protect key storage (coupler, security module) so that
nobody can use your keys.
Use our coupler security protection features or store coupler or SAM keys in a secured
place.
To ensure a very good security to your application, contact us so we help you to give to
your system the security it deserves.