General description 1. Product overview a. Clover Mini (see image 1) is designed as a pin entry device (PED) to facilitate credit and debit based transaction. The device is only approved for use in an attended environment. This device has a color LCD with touch screen as the customer interface for PIN entry.
Page 4
This device uses cryptologic authentication on all code before execution. 3. Device Identification a. Identifying information is presented on the label inside the printer as seen in Image 2 and 3. Clover Mobile Security Policy...
Page 5
4. Version Information a. Software and firmware are displayed on the settings section on the device. The user should regularly check the software and firmware version of the device. b. From the main screen, click on “Settings” Clover Mobile Security Policy...
Page 6
Click on “About tablet” d. View version numbers Clover Mobile Security Policy...
WPA or WPA2. c. Once connected, the end user must enter a one-time security code provided by Clover. This code is communicated via a different communication channel than the device itself. d. Once the code is verified against the requesting device, the device shall perform security updates including injection of security keys.
Page 8
Clover Mobile software implements PCI security requirements for authenticated applications. b. No external developers are permitted to touch unencrypted payment data. Clover makes certain that this data is already encrypted immediately, that no clear-text data is outputted, and that all applications are signed.
1. The device comes with a PIN Shield and supplied instructions on the proper installation and use. Use of the device for PIN Entry without the supplied PIN shield will invalidate the PCI PTS approval. The custom PIN Shield lays over the screen as follows: Clover Mobile Security Policy...
PIN entry. C. Surveillance cameras sited around the POS PED device must be positioned such that they cannot record the PIN number as it is entered. Device Security 1. Roles Clover Mobile Security Policy...
No changes to the resistance when inserting or removing a card from the ICC slot. Decommissioning 1. To decommission your device, a factory reset will remove the payment keys in the device. A device may then be provisioned to a new user. Clover Mobile Security Policy...
Page 12
From the main screen select “Settings”: b. Select the “Backup & reset” option: Clover Mobile Security Policy...
Page 13
Select “Factory data reset”: d. Select “Reset device”: Clover Mobile Security Policy...
Page 14
Enter your assigned employee pin: f. Select “Erase everything”: Clover Mobile Security Policy...
2. If a device’s tamper mechanism has been tripped, the device’s keys have been erased and the device needs to be returned to Clover. 3. If a device is damaged in any way that prevents the user from checking the commissioning status of the device, the device needs to be returned to Clover.
Page 16
MB SBK. ii. Secure Board (SB) - the secure board uses 256 bit ECDSA to validate code. The secure board is protected by the Clover Root Key (CRK). The CRK is validated by the Maxim Root Key (MRK).
Page 17
Intermediate Validate authenticity of SRED RSA Cert Keypair key (in case of RSA Transamor) 2048 SB ROM TransArmor Keypair Encrypt SRED data 2048 SB RAM PIN IPEK Initialize DUKPT key table 3DES 112 Maxim 32550 NVS Clover Mobile Security Policy...
Page 18
Integrity protection of MB kernel 2048 MB Bootloader Allows loading of signed debug Debug block blob 2048 MB ROM Clover Developer Validates authenticity of Clover- Keypair developed non-system apps 2048 MB ROM Clover Platform App Validation Authenticity of Android platform...
Validation Authenticity of non-platform Keypair Android apps 2048 MB ROM Clover APK Validation Keypair Authenticity of Clover Store Apps 2048 MB ROM Clover Server Identifies Clover's servers to Keypair device 2048 MB ROM Clover Offline Signs CAPKs, Revoked CAPKs and...
Need help?
Do you have a question about the Mini and is the answer not in the manual?
Questions and answers