User's Manual

NBS Payment Solutions 13/55 User Manual
1.2.2 Data security
1.2.2.1 Equipment design
The terminal was designed with the goal of resisting tampering, in order to keep the confidential character of
sensitive data (keys or confidential code), and to delete this data as soon as a tamper attempt is detected.
Tamper resistance
All the data are inside the crypto processor and are thus physically protected by the chip. This prevents
the reading of secret bank keys and confidential codes.
The display, keypad and smart card readers are controlled by the crypto processor.
Tamper detection
Protection against tampering
By micro switches
By temperature surveillance
By voltage surveillance
Tamper evidence
When tampering occurs, the terminal reacts:
The crypto processor deletes sensitive data
A message is displayed to alert the user
The crypto processor locks
The keypad locks with display of the message, "unauthorized" or "irruption"
The damaged security labels provide evidence that the product has been opened.
1.2.2.2 Software design
Software loading is made secure. Only authentic, signed and certified software can be loaded into the
terminal.
a) The software identification scheme is based on:
Asymmetric encryption algorithm with public and private keys
Certified RSA cards
Software Signature Tool (SST)
b) Software intended to be loaded into the secure terminal must first be signed by a Software Signature Tool
(SST).
They can then be downloaded using an LLT (Local Loading Tool).