User's Manual
NBS Payment Solutions 13/55 User Manual
1.2.2 Data security
1.2.2.1 Equipment design
The terminal was designed with the goal of resisting tampering, in order to keep the confidential character of
sensitive data (keys or confidential code), and to delete this data as soon as a tamper attempt is detected.
Tamper resistance
• All the data are inside the crypto processor and are thus physically protected by the chip. This prevents
the reading of secret bank keys and confidential codes.
• The display, keypad and smart card readers are controlled by the crypto processor.
Tamper detection
Protection against tampering
• By micro switches
• By temperature surveillance
• By voltage surveillance
Tamper evidence
When tampering occurs, the terminal reacts:
• The crypto processor deletes sensitive data
• A message is displayed to alert the user
• The crypto processor locks
• The keypad locks with display of the message, "unauthorized" or "irruption"
• The damaged security labels provide evidence that the product has been opened.
1.2.2.2 Software design
Software loading is made secure. Only authentic, signed and certified software can be loaded into the
terminal.
a) The software identification scheme is based on:
− Asymmetric encryption algorithm with public and private keys
− Certified RSA cards
− Software Signature Tool (SST)
b) Software intended to be loaded into the secure terminal must first be signed by a Software Signature Tool
(SST).
They can then be downloaded using an LLT (Local Loading Tool).