Ingenico group Move/3500 Installation Manual

Ingenico group Move/3500 Installation Manual

Hide thumbs Also See for Move/3500:

Advertisement

Quick Links

Move/3500
PCI PTS Security Policy
ICO-OPE-04848-EN-V11
www.ingenico.com
28/32, boulevard de Grenelle, 75015 Paris - France / (T) +33 (0)1 58 01 80 00 / (F) +33 (0)1 58 01 91 35
Ingenico – S.A. au capital de 53 086 309 € / 317 218 758 RCS PARIS

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the Move/3500 and is the answer not in the manual?

Questions and answers

Chrinovic M
February 14, 2025

What the OS of move 3500

1 comments:
Mr. Anderson
May 14, 2025

The operating system of the Ingenico Move/3500 is TELIUM Tetra OS.

This answer is automatically generated

Subscribe to Our Youtube Channel

Summary of Contents for Ingenico group Move/3500

  • Page 1 Move/3500 PCI PTS Security Policy ICO-OPE-04848-EN-V11 www.ingenico.com 28/32, boulevard de Grenelle, 75015 Paris - France / (T) +33 (0)1 58 01 80 00 / (F) +33 (0)1 58 01 91 35 Ingenico – S.A. au capital de 53 086 309 € / 317 218 758 RCS PARIS...
  • Page 2: Table Of Contents

    ICO-OPE-04848-EN-V11 Public Move/3500 PCI PTS Security Policy Contents 1_ Document Information ..............4 1_1 Evolution follow-up ..................4 1_2 Acronyms ....................... 4 1_3 References ..................... 5 2_ Introduction ..................5 3_ General Description................6 3_1 Product Overview ................... 6 3_1_1 Product type ........................6 3_1_2 Product functionalities ....................
  • Page 3 ICO-OPE-04848-EN-V11 Public Move/3500 PCI PTS Security Policy 6_5 Self-Tests ...................... 13 7_ System Administration ..............14 7_1 Configuration Settings ................... 14 7_2 Default Value Update ..................14 8_ Key Management ................14 8_1 Key Management Techniques ............... 14 8_2 Cryptographic Algorithms ................14 8_3 Key Table ......................
  • Page 4: 1_Document Information

    ICO-OPE-04848-EN-V11 Public Move/3500 PCI PTS Security Policy 1_Document Information 1_1 Evolution follow-up Revision Type of modification Date Document creation 2017/11/06 Document Update 2018/03/08 Document Update 2019/05/02 Document Update 2020/05/26 Document Update 2020/06/11 Document Update 2020/06/22 Document Update 2020/06/24 Document update...
  • Page 5: 1_3 References

    ICO-OPE-04848-EN-V11 Public Move/3500 PCI PTS Security Policy 1_3 References ANS X9.24 Part 2: 2016, Retail Financial Services Symmetric Key Management Part 2: Using Asymmetric Techniques for the Distribution of Symmetric Keys ANS X9.24 - 1: 2017, Retail Financial Services Symmetric Key Management Part 1: Using Symmetric Techniques ANS X9.24 - 3: 2017, Retail Financial Services Symmetric Key Management Part 1: Unique...
  • Page 6: 3_General Description

    3_1 Product Overview 3_1_1 Product type The Move/3500 PED is a Point of Sale (POS) payment handheld device, to process credit and PIN- based debit card transactions in an attended environment. The device can also be used as a desk mounted device, when following the guidance as stated in the installation guide.
  • Page 7: 3_2 Product Identification

    The label at the back of the device shall not be teared off, covered or altered. Hardware version number Figure 2: Move/3500 product hardware identification The full list of approved Hardware Version Number is available on the PCI PTS website.
  • Page 8: 3_2_3 Product Software Versions

    ICO-OPE-04848-EN-V11 Public Move/3500 PCI PTS Security Policy 3_2_3 Product software versions The software versions can be retrieved using the software menu. To get this information on the device, select the following menu: “Control Panel”, then “Terminal information”. • Select “Firmware PCI PTS” from the following configuration menu: •...
  • Page 9: 4_Guidance

    ICO-OPE-04848-EN-V11 Public Move/3500 PCI PTS Security Policy 4_Guidance 4_1 Initial Security Inspection The merchant or acquirer must visually inspect the terminal for sign of tampering when received via shipping, as it is described in the Installation Guide [8]. It is strongly advised that these checks are also performed on a regular basis after receipt and installation.
  • Page 10: 4_4 Periodic Inspection And Maintenance

    ICO-OPE-04848-EN-V11 Public Move/3500 PCI PTS Security Policy 4_4 Periodic Inspection and Maintenance Information about periodic inspection is specified in the installation guide [8]. The merchant or acquirer should daily check that the keypad is firmly in place. Such checks would provide warning of any unauthorized modification to the terminal, or suspicious behavior of the terminal.
  • Page 11: 5_Product Hardware Security

    ICO-OPE-04848-EN-V11 Public Move/3500 PCI PTS Security Policy 5_Product Hardware Security 5_1 Tamper Response Event The device contains tamper mechanisms that will trigger when a physical penetration attempt of the device is detected. A merchant or acquirer can easily detect a tampered terminal: −...
  • Page 12: 6_Product Software Security

    ICO-OPE-04848-EN-V11 Public Move/3500 PCI PTS Security Policy 6_Product Software Security 6_1 Software Development Guidance When developing IP enabled applications, the developer must abide by the coding rules and best practices described in the document [9], [10]. The following protocols and services are available on the device: TLS /SSL , IP, DNS, SMTP, POP3, DHCP, HTTP, HTTPS, SNTP, SOCKS, FTP, SFTP, WS/WSS, TCP/UDP, PPP.
  • Page 13: 6_5 Self-Tests

    ICO-OPE-04848-EN-V11 Public Move/3500 PCI PTS Security Policy 6_5 Self-Tests Self-tests are performed upon start up/reset and also periodically (i.e. at least once a day during the normal use of the device). These tests are not initiated by an operator. Self-tests include: Check of integrity and authenticity of the software •...
  • Page 14: 7_System Administration

    ICO-OPE-04848-EN-V11 Public Move/3500 PCI PTS Security Policy 7_System Administration 7_1 Configuration Settings The device is functional when received by the merchant or acquirer. No security sensitive configuration settings are necessary to be tuned by the end user to meet security requirements.
  • Page 15: 8_3 Key Table

    ICO-OPE-04848-EN-V11 Public Move/3500 PCI PTS Security Policy 8_3 Key Table Form Number Size factor Key Name Purpose / Usage Algorithm Storage (Bits) loaded to available device In Key Slots CA public keys for Secure K_Root_CA ECDSA certificate verification unit CA public keys for...
  • Page 16 ICO-OPE-04848-EN-V11 Public Move/3500 PCI PTS Security Policy Form Number Size factor Key Name Purpose / Usage Algorithm Storage (Bits) loaded to available device In Key Slots Derived MAC calculation / Secure DUKPT2009 – MAC Key TDES originally verification unit from IPEK...
  • Page 17: 8_4 Key Replacement

    ICO-OPE-04848-EN-V11 Public Move/3500 PCI PTS Security Policy Form Number Size factor Key Name Purpose / Usage Algorithm Storage (Bits) loaded to available device In Key Slots MAC Generation and Randoml verification of Secure MC_MAC Key TDES MC_ECC_Payment_Sy unit generate stem PK...
  • Page 18: 8_5 Key Loading Policy

    ICO-OPE-04848-EN-V11 Public Move/3500 PCI PTS Security Policy 8_5 Key Loading Policy The device has no functionality that gives access to security sensitive services, based on roles. Such services are managed through dedicated tools, using cryptographic authentication. 9_Roles and Services The device has no functionality that gives access to security sensitive services, based on roles. Such services are managed through dedicated tools, using cryptographic authentication.

Table of Contents