Ensure integrity of payment transactions and protection against skimming.
Today’s embedded technology are becoming increasingly more complex, interconnected and reliable on software technology. Examples of security sensitive technology are access control systems “HSMs”, Telematics Control Units, Engine Control Units, Infotainment systems, On board units and “black box” registration modules.
The SIM locking mechanism and firmware upload mechanism have high security requirements. Further, third party applications may have additional security requirements. Examples are NFC payment applications, online banking applications, authentication methods and DRM technology.
Set top boxes (decoders)
An STB interacts with a Conditional Access smart card and performs decryption of the Pay-TV signal. Amongst other attacks, the STB in combination with the smart card should protect the content against a card sharing attack.
The protection of the key structure on a game console device is critical to the management of the digital rights and fair play.
VoIP account details as deployed by the telecommunication operator should not be accessible to the end user.
Ensure the integrity and anonymity of votes entered into a voting machine.
Pascal van Gimst
Vice President Global Services Sales and Business Development