User's Manual

NBS Payment Solutions 33/55 User Manual
2.2 SOFTWARE SECURITY MANAGEMENT
The terminal is designed to execute only authentic software and to do this in a ranked context.
The terminal performs the following checks
a) When loading software, the terminal checks:
Its authenticity, which is verified by checking its signature using the RSA algorithm with a 1024-bit key.
b) Before running software, the terminal checks:
Its presence, which is verified by looking for the software's identity.
Its integrity, which is verified by checksums and CRCs.