How the unique device ID can be obtained from the device.
3
How the unique device ID is assigned.
4
Whether it is possible to change the device’s unique device ID.
Yes No
If yes, provide a description.
5
How exactly the device is uniquely identified using cryptographic methods.
6
What acceptable algorithms are used for uniquely identifying the device through cryptographic means.
Comments:
Section B20
#
If the answer to B20 in the PCI HSM Modular Security Requirements was “YES,” describe:
1
Describe the differences between PCI and non-PCI mode, including (but not limited to) services/functions available, algorithms, PIN translations, and key input or output:
2
Describe the process/commands for switching between PCI and non-PCI mode.
If remote (over a network such as Ethernet or WiFi), what authentication and replay prevention mechanisms are used?
If direct (e.g., through serial or keypad on the device), what authentication mechanism is used?
3
How the device prevents keys from being shared between PCI and non-PCI mode (zeroization or isolation).
4
How the device indicates that it is in PCI or non-PCI mode.