EasyManuals Logo

Castles Technology VEGA3000 User Manual

Castles Technology VEGA3000
70 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #37 background imageLoading...
Page #37 background image
Castles Technology Co., Ltd.
Confidential • All Right Reserved.
Pg. 38
4.1.2. ULD User Key
ULD User Key are used to encrypt and sign the user/shared applications.
In addition, they are as goalkeepers to prevent the system updating
without user permission. This is done by the kernel CAPs which are
encrypted and signed by the manufacturer having to perform the “signed’
action via ULD User Keys.
Notes: Applications are encrypted by a random-generated 3DES key,
which is retrieved from the Key Encryption Block of the CAP by ULD User
Key Encryption Key, not directly encrypted by ULD RSA Key.
4.1.3. Key Change
The ULD RSA Keys are able to be changed. The system uses a special
CAP file, KEY CAP, for the manufacturer and user to change their own
keys. The KEY CAP contains a new set of ULD keys (Key Encryption Key
and Signature Key). These new keys are encrypted and signed via the
original keys. In other words, if the user would like to change the ULD
User Keys, they have to use their original ULD User Keys with the new
ULD User Keys to generate a KEY CAP.
CAP Generator
ULD User Keys
Application
Application CAPs
Key CAP Generator
Original ULD
Manufacturer/User
Keys
New ULD
Manufacturer/User
Keys
User KEY CAP

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Castles Technology VEGA3000 and is the answer not in the manual?

Castles Technology VEGA3000 Specifications

General IconGeneral
BrandCastles Technology
ModelVEGA3000
CategoryTouch terminals
LanguageEnglish

Related product manuals