4-90001 LANDI APOS A7 Security Policy
4-90001 LANDI APOS A7 Security Policy
2. Introduction ........................................................................................................................... 5
4. Guidance ................................................................................................................................ 9
Page 2 / 19
8. Key Management ................................................................................................................ 15
Page 3 / 19
1. Document Information
1.2. Acronyms
Abbreviation Description
AES Advanced Encryption Standard
DUKPT Derived Unique Key Per Transaction
N/A Not Applicable
PED PIN Entry Device
PIN Personal Identification Number
RSA Rivest Shamir Adelman Algorithm
SHA Secure Hash Algorithm
TDES Triple Data Encryption Standard
IC Card Integrate Circuit Card
RF Card Radio Frequency Card
AKMS Acquirer Key Management System
1.3. Reference
[1] ANS X9.241:2009, Retail Financial Services Symmetric Key Management Part 1: Using
Symmetric Techniques
[2] ANS X9.24 Part 2: 2006, Retail Financial Services Symmetric Key Management Part 2:
Using Asymmetric Techniques for the Distribution of Symmetric Keys
[3] X9 TR-31 2010, Interoperable Secure Key Exchange Key Block Specification for Symmetric
Algorithms
[4] ISO 9564-1, Financial ServicesPersonal Identification Number (PIN) management and
securityPart 1: Basic principles and requirements for PINs in card-based systems
[5] ISO 9564-2, BankingPersonal Identification Number management and securityPart 2:
Approved algorithms for PIN encipherment
[6] PCI PTS POI Derived Test Requirements V5.0
[7] LANDI_APOS user manual.doc
[8] EPT-AND application development guide.chm
[9] LANDI_APOS_ digital signature system.doc
Page 4 / 19
2. Introduction
This document addresses the proper use of the POI in a secure manner including information
about key-management responsibilities, administrative responsibilities, device functionality,
identification and environmental requirements.
The use of the device in an unapproved method, as describe on the security policy, will violate
the PCI PTS approval of the device.
Page 5 / 19
3. General Description
As an intelligent terminal, APOS A7 has both functions of smartphone and traditional POS. It is
configured with ARM Cortex-A7 quad-core processor to provide powerful processing capabili-
ties. It has passed a variety of industry certifications to ensure transaction security, including
PCI PTS, EMV, CE, CB, CCC, Paypass, Paywave, ROHS etc. This product integrates MSR
Card Reader, IC Card Reader, Contactless Card Reader, SAM Card Reader and high perfor-
mance thermal printer. And it can deal with diversified financial transactions.
APOS A7 is also an Android smart terminal. It supports the wireless communication, such as
GSM, CDMA, CDMA2000, TD-SCDMA, WCDMA, TD-LTE, FDD-LTE, WIFI, Bluetooth and
GPS.
Page 6 / 19
Table 1: APOS A7 Configuration
Configuration Description
1D barcode
Barcode
2D barcode
Camera 5M Pixels
2G/3G/4G
Wireless Communication GPS
WIFI + BT
The merchant or acquirer must visually inspect the terminal when received via shipping, as it is
described in the user manual.
For example, the merchant or acquirer should inspect the terminal to ensure that:
There is no evidence of unusual wires that have been connected to any ports of the
terminal
There is no shim device in the of the ICC acceptor
To examine the version of firmware of the device, we can launch Settings, then Epay Set-
tings, the version info will be shown in the column Security Firmware Version.
To examine the version of an application, we can launch Settings, then Apps, then click the
item of target app, we will see information of the app including version.
Page 7 / 19
Table 2. APOS A7 Communication Methods and Protocols
Interface Protocols
Wireless Modem SSL/TLS, TCP, UDP, DHCP, DNS, ICMP, HTTP, PPP, IP
(Support Stack
GSM,CDMA,TD-SCDMA,
Communication WCDMA, EVDO,
TD-LTE, FDD-LTE)
Wi-Fi SSL/TLS, TCP, UDP, DHCP, DNS, ICMP, HTTP, IP
Stack
Bluetooth Classic Bluetooth
Page 8 / 19
4. Guidance
Terminal should stay away from all sources of heat, to prevent from vibration, dust, moisture
and electromagnetic radiation (including computer screen, motor, security facilities etc.).
Please be noted that the wireless terminal should also be away from complex condition like
electromagnetic radiation when in use.
4.3. Decommissioning/Removal
When the device is no longer used for permanent decommissioning reason, the administrator
of the device needs to gather the device and disassemble the device to makes it unavailable.
Even though someone reassembles the device, it still cannot work as its all keys have been
erased automatically and it will warn exception because of the tamper triggered by disassem-
bling.
For the temporary removal, there is no need to change the state of the device, as all the keys
are still protected safely by the main board hardware tamper mechanism.
Page 9 / 19
Figure 3: Safe PIN Entry Demonstration
The merchant or acquirer should also check that the installation/maintenance operations are
performed by a trusted person, especially check if the ICC reader slot is damaged, such as
abrasion, painting and other machining marks, and if there is any suspicious object like lead
wire over ICC reader slot, or any unknown object inside IC card. If
these suspicious circumstances are found, please stop using the device immediately and con-
tact the customer service to confirm if the device has been tampered.
Page 10 / 19
5. Product Hardware Security
The user needs to send the device to the manufacturer for safety inspection and repair.
Any physical penetration will result in a tamper event. This event causes the activation of
tamper mechanisms that make the device out of service.
There are two separate modes in which the device can be:
Protection
The environmental conditions to operate the device are specified in the user manual.
The security of the device is not compromised by altering the environmental conditions (e.g.
subjecting the device to temperature or operating voltages outside the stated operating ranges
does not alter the security).
Page 11 / 19
6. Product Software Security
1. Code review
2. Security review and audit
3. Module test
4. Source code management and version control
5. Software test
6. Signature
For use of open protocol, the developer must respect the SSL security guidance, Bluetooth
Security Guide and Wi-Fi Security Guide. It is important to note that SSL3.0,TLS1.0,TLS1.1
are inherently weak and should be removed, but considering these version still exist in the
world, in order to be compatible, we temporarily keep them for non-financial applications use.
In addition, we strongly recommend a server should disable SSL protocol, and select TLS 1.2
or higher instead. To make it more secure, mutual authentication is recommended. The device
dont support Bluetooth Low Energy and dont support Just Works pairing option. The device
support security mode 4. Any insecure communication options is not allowed.
For SRED, device doesnt support pass-through of clear-text account data. All applications
running on device are considered to be in Account Data Encrypting Mode.
date
Updates and patches can be loaded in the device. They are cryptographically authenticated by
the device. If the authenticity is not confirmed, the update or patch is rejected.
Prompts updates are security related and any security related firmware changes will cause
firmware version update.
The certificate and signature are based on couples of RSA keys. The authenticity is guaran-
teed by a certificate issued by Landi.
Page 12 / 19
-SHA256 is used to compute the digest of software.
-RSA 2048 bit key is used for signature verification.
Please refer to <LANDI_APOS digital signature system.doc >.
The application managers must implement a full source code review to make sure that the
application does not have any of following behaviors:
It is recommended that the application source code review and signing process is executed by
at least two persons and that an audit log is recorded for future trace back.
6.5. Self-Tests
Selftests are performed upon start up/reset. In order to reinitialize memory, the device will
reboot in 24 hours after it starts up. Self-tests are not initiated by an operator.
Page 13 / 19
7. System Administration
Page 14 / 19
8. Key Management
Device support multi acquirers, each acquirer is assigned with a separate key store area (KAP)
by the owner of device. Each KAP supports key management techniques described below.
Fixed Key: a key management technique based on a unique key for each terminal as
specified in [2].
Master Key/Session Key: a method using a hierarchy of keys. The session keys are
unique per transaction as specified in [2].
DUKPT: a key management technique based on a unique key for each transaction as
specified in [2].
Use of the terminal with a key-management system other than these three ones above will
invalidate any PCI approval of the terminal.
BPK is used to protect session keys transferred. MK is used to encrypt session keys trans-
ferred. The session keys can be divided into three types: PEK (Pin Encryption Key), MAK
(MAC Calculating Key) and TDK(Track data encryption Key).
Page 15 / 19
4. AES (128, 192 and 256 bits)
PEK in MK/SK System Encrypt PIN blocks TDES 128 /192 Flash
MAK in MK/SK System Generate or verify MAC of data TDES 128 /192 Flash
blocks
TDK in MK/SK System Encrypt input data using TDES TDES 128 /192 Flash
MAK in Fixed Transac- Generate or verify MAC of data TDES 128 Flash
tion Key System blocks
Future Used Key of Every selected future used key TDES 128 Flash
DUKPT will be divided into two parts: the
two parts have different numeric
data, one part encrypt PIN blocks,
the other generates MAC of data
blocks
Page 16 / 19
8.7. Key Replacement
Any key should be replaced with a new key whenever the compromise of the original key is
known or suspected, and whenever the time deemed feasible to determine the key by
exhaustive attack elapses.
Method 1:
The plain-text key (including MK, Fixed Key and DUKPT Initial Key) loading process must be
implemented in a secure room of acquirer and strictly protected under following dual control
and split knowledge techniques.
Dual control: The key loading process is strictly authorized and controlled by at least two
persons. An identification and authentication is performed first to make sure they are the
right operators for the key loading. Eight bytes of password is used in the key loader to
authenticate the operator.
Split knowledge: The initial plain-text key can never be mastered by only one person. It is
divided into two full-length key components and controlled by two different persons. Each
person is required to input his/her key component into the key loader separately.
The encrypted key loading is controlled by the acquirer through remote network. For Fixed key
method, no encrypted keys are used. And for DUKPT method, transaction keys are automati-
cally generated, hence no encrypted keys are needed to be loaded.
Method 2:
Furthermore, the POI device supports local key injection (LKI) method with an authentication
mechanism, to inject keys encrypted under Transport Key (TK) with a Key Loading Device
(KLD).
This method applies to the loading of MK, BPK, Fixed Key and DUKPT Initial Key.
The encrypted key loading could be controlled by the acquirer through a network host.
Page 17 / 19
MK is used to encrypt PEK/MAK/TDK in MK/SK System.
Furthermore, the POI device supports remote key-loading technique using symmetric and
asymmetric method. This method applies to the loading of MK, BPK, Fixed Key and DUKPT
Initial Key.
Page 18 / 19
9. Roles and Services
The device has no functionality that gives access to security sensitive services, based on roles.
Such services are managed through dedicated tools, using cryptographic authentication.
Page 19 / 19