User's Manual
XENTISSIMO
PRODUCT MANUAL
• Multiple mechanisms for detection of intrusion attempts, triggering erasure of
the secure memory.
Security software
The software supports the following key management schemes:
• DUKPT, Derived Unique Key Per Transaction, uses a working key that is
changed with each transaction;
• Master / session, requires that the PIN encryption key or working key remains
the same for an entire transaction session. The session could be a day, a
week, a month or any other period of time set by the host computer.
Other schemes can be added.
XENTISSIMO supports the SSL (Secure Socket Layer) protocol, which is mainly
used to securely send and receive information over unsecured networks like the
Internet, using different communication media such as wireless LAN and GPRS.
Standards
The security-related functions comply with the following standards:
• ISO 13491 (secure cryptographic device concepts);
• ISO 9564 (PIN management and security);
• ISO 15668 (secure file transfer – retail).
34 - SECURITY SOFTWARE