Software Design; Product Activation; The Isolation Mechanism By Electronic Locking System; Isolation - Ingenico IWL220 Technical Manual

Hide thumbs Also See for IWL220:
Table of Contents

Advertisement

By voltage monitoring
By CPU clock monitoring
Tamper evidence
When tampering occurs, the terminal reacts:
The crypto-processor deletes sensitive data
A message is displayed to alert the user
The crypto-processor locks
The keypad locks with display of the message "unauthorized" or "irruption"
2.3.4.2.

Software design

Application software loading is made secure. Only authenticated, signed and certified
software can be loaded into the terminal .
The application software identification scheme is based on:
Asymmetric encryption algorithm with the public and private keys
Certified RSA cards
Software signature tool (SST)
Software intended to be loaded into the secure terminal must first be signed by software
signature tool. It can be downloaded or loaded using a LLT (local loading tool).
Once the software is loaded, the crypto-processor checks the loaded software's certificate
and signature. The operation constitutes the authentication. If the loaded software is
authentic, it is accepted.
If this condition is satisfied, the downloading of a software application into an iWL2xx using
a local or remote tool operates the same way as for other products in Ingenico's range.
2.3.4.3.

Product activation

The product has to be activated before any use. Once activated the terminal is operational.
Activation enables:
authorization of application software loading and product security.
2.3.5.

The isolation mechanism by electronic locking system

2.3.5.1.

Isolation

Read/write isolation is obtained by user confinement in the application software memory
space, inter-software isolation is controlled by an MMU (memory management unit) .
Technical manual _iWL220/250
ICO_MKP_009_GU_EN_V4
18/60
Copyright © 2010 Ingenico
All rights reserved

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Iwl250

Table of Contents