Technical Manual ICT220 • 9/36
Copyright © 2009 Ingenico All rights reserved
NOTE: "LLT" and "TMS" solutions are described in the section "Software downloading".
1.2.2.3. User design
The product has to be activated before any use. Once activated, the terminal is operational.
Activation enables:
− software downloading,
− product security.
1.2.2.4. Standards
Compliance with international specifications for:
• PCI PED 2.0 (Payment Card Industry Pin Entry Device)
On-line / off-line PIN
DUKPT, MK/SK, Fixed Key
• EMV Level 1
Version 4.0 - December 2000
• EMV Level 2
Version 4.2 - June 2008
1.2.3. The isolation mechanism by electronic locking system
Isolation
Read/write isolation is obtained by USER confinement in the application memory space.
Inter-software isolation is controlled by an MMU (Memory Management Unit).
MMU features
• Hardware protection;
• Complete inter-software protection (read/write);
• Code protection.
Inviolable memory protection
The controller checks each access to the memory.
The OS is inviolable and protected
The Processor distinguishes two execution worlds:
• USER world: software domain.
• SUPERVISOR world: OS domain.
No software running in the USER world can access the SUPERVISOR world.
This exclusion mechanism is ensured by the processor itself.
Therefore the OS is inviolable, even in the case of an application bug. This system inviolability
ensures that the isolation mechanism supervised by the OS always remains operational.