User's Manual

NBS Payment Solutions 20/60 User Manual
1.8.2.3 Tamper evidence
When tampering occurs, the terminal reacts:
The crypto processor deletes sensitive data
A message is displayed to alert the user
The crypto processor locks
The keypad locks with display of the message, "unauthorized" or "irruption"
The damaged security labels provide evidence that the product has been opened.
1.8.2.4 Software design
Software loading is made secure. Only authentic, signed and certified software can be loaded into the
terminal.
a) The software identification scheme is based on:
Asymmetric encryption algorithm with public and private keys
Certified RSA cards
Software Signature Tool (SST)
b) Software intended to be loaded into the secure terminal must first be signed by a Software Signature Tool
(SST).
They can then be downloaded using an LLT (Local Loading Tool).
c) Once the software is loaded, the crypto processor checks the loaded software's certificate and
signature. This operation constitutes the authentication. If the loaded software is authentic, it is accepted.
If this condition is satisfied, the downloading of software into an NBS5XXX using an LLT or a TMS operates
the same way as for other products in SAGEM Monetel's EFT range.
NOTE: "LLT" and "TMS" are described in the section "Loading software".
1.8.2.5 Use design
The product has to be activated before any use. Once activated, the terminal is
operational. Activation enables:
software loading,
product security.
1.8.2.6 Standards
Compliance with international specifications for:
PEDS (PIN Entry Device Security): on-line or off-line terminals accepting PIN cards (debit/credit).
EMV (Europay, Mastercard, Visa) standards: standard smart card processing (EMV standards) version
V4.0, EMV2000
ISO 13491, secure cryptographic devices (1999-07)
ISO 11568, Key Management Techniques (1994-12-01)
ISO 9564-1, PIN Management and Security (1997)
EPCI
Visa card accepting device requirements (March 1998)