POS Key Generation as a Service

POS Key Generation as a Service

Utimaco's PCI-PIN certified key custodian service providing trusted POS crypto key operations.

Download the TaaS Datasheet
  • Overview
  • Key Features
  • Description
  • Specifications
The PCI-PIN certified key custodian service providing trusted POS crypto key operations

The PCI-PIN certified key custodian service providing trusted POS crypto key operations

POS Key Generation as a Service provides PCI-PIN certified secure key generation, distribution, and storage for POS payment use cases.

With 24/7 access to expert key custodial staff and automated or on-demand cryptographic key operations, it ensures maximum availability and resilience from geo-redundant data centers for a wide range of POS applications.

  • Key Features

  • Description

  • Specifications

POS Key Generation as a Service is a PCI-PIN certified service providing access to trained experts acting as key custodians for its customers. Executed in highly secure and geo-redundant data centers, the Utimaco staff is available 24/7 to reliably and securely execute on-demand generation, distribution and storage of cryptographic keys.

This makes it the better choice to optimize on-premises costs and workloads while benefiting from reliable security and compliance for POS use cases.

image
Cryptographic Interfaces (APIs)
  • Certifications and Compliance

  • Service benefits and capabilities PCI compliant key management service:

  • Supported Cryptographic Interfaces

  • Supported Cryptographic Algorithms

Certifications and Compliance

  • PCI PTS HSM compliant
  • PCI PIN compliant
  • PCI P2PE compliant
  • ISO 27001
  • ISO9001, 4001
  • SOC2
background image
image

Service benefits and capabilities PCI compliant key management service:

  • PCI compliant remote key generation & distribution to PoS devices or 3rd payment HSMs
  • Key lifecycle management
  • Component management
  • Custodial services
background-image
image

Supported Cryptographic Interfaces

  • RESTful API secured via TLS 1.2 communications security
background-image
image

Supported Cryptographic Algorithms

Asymmetric algorithms/lengths:

  • RSA: 1024, 2048, 3072, 4096 Bits
  • ECC: NIST, SEC 2 and Brainpool elliptic curves, 160 – 571 Bits

Symmetric algorithms/lengths:

  • DES, TripleDES, AES 128, 192, 256 Bits

Hash Functions:

  • SHA1, SHA224, SHA256, SHA384, SHA512 Bits
  • Message Authentication:
  • CMAC, HMAC
background-image
image
image

Certifications and Compliance

All POS Key Generation as a Service models are certified to:

image

Ready to Secure Your Digital Future?

Contact Sales

Related Products

How can we help you?

Talk to one of our specialists and find out how Utimaco can support you today.
You have selected two different types of downloads, so you need to submit different forms which you can select via the two tabs.

Your download request(s):

    By submitting below form you will receive links for your selected downloads.

    Your download request(s):

      For this type of documents, your e-mail address needs to be verified. You will receive the links for your selected downloads via e-mail after submitting below form.

      About Utimaco's Downloads

      Visit our Downloads section and select from resources such as brochures, data sheets, white papers and much more. You can view and save almost all of them directly (by clicking the download button).

      For some documents, your e-mail address needs to be verified. The button contains an e-mail icon.

      Download via e-mail

       

      A click on such a button opens an online form which we kindly ask you to fill and submit. You can collect several downloads of this type and receive the links via e-mail by simply submitting one form for all of them. Your current collection is empty.