User's Manual

XENTISSIMO
PRODUCT MANUAL
Security
The “System-on-Chip”
The high security level of the ASIC is achieved via:
Tamper circuits with multiple tamper sources,
32 Kbytes of integrated secure memory, instantaneously erased in case of a
tamper attack;
Additional 256-bit security registers, used, for example, for master key
storage. The registers are also erased instantaneously in case of tamper attack;
Severe control of the secured boot process of the terminal (via key
management). No code can run on the security processor unless it is certified
and signed by a certification authority.
Terminal design
The most tangible security feature is the integrated PIN privacy shield, which
protects a cardholder against shoulder surfing while entering a PIN.
Figure 19 – Integrated revolving PIN privacy shield
72
But in the terminal design, security measures are taken at different levels:
The very architecture of the ASIC and the security-related components;
Blocked access to the chip-card Interface in case of fraudulent intentions;
SECURITY - 33