Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Refer to TS-1938 & TS-9219

image006.jpg



Can you show me how to decrypt the encrypted data or provide the decryption Dll used by your Demo? search the Knowledge Base for severral articles on how to perform decryption. Note: Encryption/Decription with production keys happens with an HSM (hardware security module). You can perform decryption with a reader that was injected with a demo key instead of a production


Do you provide the key generating service?

...

  • 9600 Baud
  • 8 data bits
  • N parity
     
    Firmware version of your HSM will need to support IDTECH NGA protocol.  And a LCL KEK must be created for the 3rd party key injection party to be able to inject our Augusta

What is

...

LCL-KEK, KTK and how a

...

LCL-KEK can be securely transferred to a 3rd party KIF(Key Injection Facility)?

Refer to TS-7936 The LCL-KEK or Local key injection key is present in all current emv readers. It is designed to prevent unauthorized key injection/modification. When performaing injection the HSM must validate the lcl-kek. ie the reader's stored LCL-KEK will need to also exist on the injecting HSM system. A KTK or a key transport key is used to protect a key while in transport. The KTK must get transferred to your HSM in multiple compnents first. However, once that's done, then we can send keys encrypted with the KTK. This is far simpler than spiting the key, sending to 2 diffent recipients via 2 different carriers.

For K100,  Is there a way to check whether a unit has the Production LCLKEK or the Demo LCLKEK loaded? If yes, how to do so?

...