2.2 SOFTWARE SECURITY MANAGEMENT
The terminal is designed to execute only authentic software and to do this in a ranked context.
The terminal performs the following checks
a) When loading software, the terminal checks:
•
Its authenticity, which is verified by checking its signature using the RSA algorithm with a 1024-bit key.
b) Before running software, the terminal checks:
•
Its presence, which is verified by looking for the software's identity.
•
Its integrity, which is verified by checksums and CRCs.
NBS Payment Solutions
39/60
User Manual