SlideShare una empresa de Scribd logo
1 de 16
Descargar para leer sin conexión
Secure Card Reader Authenticators
MagTek® Inc., 1710 Apollo Court, Seal Beach, CA 90740 | p 562-546-6400 | f 562-546-6301 | 800-788-6835 | www.magtek.com
Registered to ISO 9001:2008 © Copyright 2012 MagTek, Inc. PN 99875460 Rev 5.02 12/12
About MagTek
Since 1972, MagTek has been a leading manufacturer of
electronic devices and systems for the reliable issuance,
reading, transmission and security of cards, checks, PINs
and other identification documents. Leading with innovation
and engineering excellence, MagTek is known for quality
and dependability. Its products include secure card reader
authenticators, small document scanners, PIN pads and card
personalization and issuance systems. These products are
used worldwide by financial institutions, retailers, hotels, law
enforcement agencies and other organizations to provide secure
and efficient electronic payment and identification transactions.
Today, MagTek continues to innovate with the development of a
new generation of Protection Services secured by the MagneSafe™
Security Architecture. By leveraging strong encryption, secure
tokenization, real-time authentication and dynamic transaction
data, MagneSafe products enable users to assess and validate
the trustworthiness of credentials used for online identification,
payment processing and other high-value electronic transactions.
MagTek is based in Seal Beach, California and has sales offices
throughout the United States, Europe, and Asia, with independent
distributors in over 40 countries. For more information, please
visit www.magtek.com.
2
Merchants, retailers and financial institutions rely on
MagTek. Secure card reader authenticators (SCRAs)
capture data with a single swipe and they offer the flexible
options needed for PCI DSS compliance and ease-of-
use. MagneSafe™ SCRAs deliver data encryption,
card authentication, and device/host authentication to
protect cardholders from identity theft and card fraud.
They proactively identify counterfeit cards and for the
ultimate in application flexibility and interface options,
MagTek SCRAs deliver the configuration choice you need
with the reliability you know you can trust.
When it comes to card reading
security and reliability…
…MagTek means quality.
Evolution of Card Reading Technology
MagneSafe SCRAs are characterized by their ability to:
•	 Read and encrypt cardholder data
•	 Generate a unique encryption key per swipe
•	 Mutually authenticate the reader and a legitimate host
•	 Manage time bound sessions
•	 Capture and transmit the dynamic digital identifiers
•	 Generate a unique token of the transaction
•	 Features Ideal for PCI 2.0 applications
•	 Triple DES Encryption
•	 DUKPT Key Management
•	 MagnePrint Card Authentication
•	 Secure Tokenization
•	 Device & Host Authentication
•	 MagnePrint® technology
•	 Masked Data
•	 Unique, non-changeable device serial numbering
SCRA
secure card reader authenticator
SCR
secure (encryption) card reader
MSR
magnetic stripe reader
Read card data
Tokenization
Encryption
Read MagnePrint®
Dynamic data generation
Masked data
Transmit stochastic
encrypted data
Transmit card data
Time-bound sessions
Mutual hardware/
host authentication
Authenticate the card
ManagedbyMerchantManagedbytheReaderAvailableonlythroughMSA
Read card data
Tokenization
Encryption within the
reader
Read MagnePrint
Dynamic data generation
Masked data
Transmit stochastic
encrypted data
Transmit card data
Time-bound sessions
Mutual hardware/
host authentication
Authenticate the card
ManagedbyMerchantManagedbytheReaderAvailableonlythroughMSA
Read card data
Tokenization
Encryption in the
read head
Read MagnePrint
Dynamic data generation
Masked data
Transmit stochastic
encrypted data
Transmit card data
Time-bound sessions
Mutual hardware/
host authentication
ManagedbyMagneSafe®SecurityArchitecture(MSA)
Authenticate the card
Real-time counterfeit
card detection
Real-time counterfeit
detection
Real-time counterfeit
detection
PA-DSS Statement for Payment Applications
The use of MagTek SCRAs and the Magensa Payment Protection
Gateway (MPPG), when properly implemented, will dramatically
reduce the scope of Requirements 1, 2 and 11 and provide additional
scope reduction for requirements 3, 5, 6, 7, 9, 10, and 12.
In order to take advantage of the reduced or eliminated PA-DSS
scope that may be achieved by the combination of MagneSafe
equipped SCRAs and the Magensa Payment Protection Gateway,
the following conditions must also exist.
1.	 All card reading must be accomplished by the use of
MagneSafe-enabled SCRAs.
2.	 No manually, keyed entered transactions are permitted
through any application interfaces. Key entered PANs for
card not present transactions must be entered on a MagTek
(PCI PED 2.x compliant) IPAD or IPAD SC.
3.	 All transactions must be routed through the MPPG.
4.	 Neither the merchant nor the application provider possess
or have access to the decryption keys used by the SCRAs to
encrypt the cardholder data.
5.	 The SCRAs are set to Security level 3 or above.
As with all Payment Applications, the final determination of applicability of PA-DSS should be
performed by a qualified PA-QSA.
15
MagneSafe™SecurityArchitectureMagneSafe Security Architecture is a foundation you can build on. The MagneSafe Security Architecture
(MSA) has evolved exponentially from its inception in 2006 when it delivered the industry’s first Secure
Card Reader Authenticators (SCRAs) for secure electronic transactions. The MSA is a digital identification
and authentication architecture that safeguards consumers and their personal data. Designed to exceed
PCI regulations, MSA leverages strong encryption, secure tokenization, counterfeit detection, tamper
recognition, data relevance and integrity, and dynamic digital transaction signatures, which together validate
and protect the entire transaction and each of its components.
A key feature of the MSA is MagnePrint® card authentication, a patented, proven technology which reliably
identifies counterfeit credit cards, debit cards, gift cards, ATM cards and ID cards at the point of swipe,
before fraud occurs. MSA’s multi-layer security provides unmatched protection and flexibility for safer online
transactions.
Layers of Security
Industry experts agree that a layered approach is the best
approach for security and MagneSafe provides the layers
necessary in one easy to implement, scalable solution.
SCRAs provide true end-to-end encryption with the
encryption occurring within the reader, along with
tokenization formatting capabilities.
Encryption and tokenization are preventive measures that
help to protect cardholder data, at rest and in transit, and
at various points through the payment infrastructure.
Encryption and Tokenization however, do not protect
cardholder data that exists outside of the network. Here
data is widely available form other data capture venues such
as pocket skimmers, unattended gas pumps, phishing and
pharming sites, and telephone scammers.
The multi-layer security of MagneSafe adds the unmatched
protection both cardholders and relying parties require
through sophisticated card, device and data authentication
methods that assure a valid transaction.
SCRAs deliver dynamic payment card data (digital
identifiers of ID), and magnetic card stripe fingerprinting
(MagnePrint) which provides counterfeit detection, counters
skimming attempts and stops fraudulent transactions in
real-time. No other security device in the market today is
able to do everything that MagneSafe does in one easy to
implement, scalable, cost-effective solution.
MagneSafe SCRAs transform the existing magnetic stripe
card into a highly secured payment and identification token
with proven ability to identify counterfeit cards and prevent
card fraud.
Fraud Prevention
It’s now possible for card issuers to uniquely identify each
physical card they send out by analyzing its magnetic
signature. By recording this signature, and making it
available to be ‘reference checked’ by merchants at the same
time they swipe for authorization, the cards and processes all
stay the same, and only the counterfeit cards are declined.
When a card-present transaction is submitted, the
MagnePrint® of the card read at the transaction point is
transmitted along with the card and other transaction
data. The MagnePrint risk management tool compares the
‘transaction MagnePrint value’ to a ‘reference MagnePrint
value’ already present in the authorization database,
calculates the degree of correspondence (the match value)
between the two values, and makes a judgment about
the card’s authenticity based on all available transaction
information, including the match value.
During one test, a run of a million transactions with an
acceptance threshold set at 0.5 resulted in a “false accept”
rate of zero, that is all attempts to process fraudulent cards
were thwarted, and the resulting “false reject” rate was only
0.027 percent.
In comparing a given ‘transaction MagnePrint value’ to its
‘reference MagnePrint value’, the scoring algorithm assigns a
match value between zero (no match) and one (perfect match).
The authorization methodology allows each relying party
to select an acceptance threshold between zero and one for
its transactions, or even to specify a threshold that varies
according to the characteristics of the transaction (e.g., more
stringent for higher-dollar transactions originating from a
fraud prone merchant).
14
Secure Card Reader Authenticators (SCRAs)
3
Dynamag
Ergonomically designed, compact
and is able to mount conveniently
to most flat surfaces where space
is a premium.
iDynamo
Mobile merchants can now
leverage the power of their
Apple iOS products without the
worries of handling or storing
sensitive card data at any time.
uDynamo
Connect a secure card reader
authenticator to your mobile
device through the headphone
jack or USB connection for secure
transactions.
BulleT
Bluetooth interface and sleek
ergonomic design, enables secure
wireless communications with a
PC or mobile phone.
Flash
Offer secure storage for fast, mobile
transactions where cables or wireless
connections are not accessible all
in a handy ergonomic design.
DynamagFor retailers and financial institutions that want security, ergonomic design and ease-of-use, the Dynamag
secure card reader authenticator (SCRA) is MagneSafe™ secured and offers a reliable and convenient swipe
path with complete security features for the peace of mind you can trust. Specifically designed to meet PCI DSS
requirements to secure card data, the Dynamag employs the industry standard, Triple DES encryption and is USB
powered. This bidirectional SCRA conveniently makes any existing electronic transaction more secure.
Benefits
The Dynamag enables retailers and financial institutions
to “future proof” their POS and PC-based electronic
transactions that support today’s traditional applications
and tomorrow’s advanced security requirements. The
Dynamag is 100% interface compatible with all traditional
MagTek readers. It gives you the flexibility to activate
advanced security features including card authentication,
data encryption, and device/host authentication remotely
when higher security is necessary.
Features
• Ergonomic design
• Industry standard footprint
• Protects card data per PCI DSS requirements
• MagnePrint® card authentication
•	MagneSafe technology
• Device/host authentication
• Unique, non-changeable device serial number
• Triple DES encryption
• DUKPT key management
• Tokenization
• Masked data
• Reads up to 3 tracks
• Bidirectional read
• Reads ANSI/ISO/AAMVA cards plus custom formats
• USB HID or USB keyboard emulation; no third party
device driver is required
• USB powered
• Multicolor LED to indicate reader status
4
Memory SCRA.
Long Life Battery.
Portable.
13
FlashSecure transactions, anywhere, anytime. The Flash secure card reader authenticator (SCRA) offers faster
mobile transactions. The Flash leverages the card swipe to securely capture and encrypt card data in
advance at the point of service (pizza delivery, home cosmetic sales, etc.) and make that data available
for secure, routine card processing.
Benefits
The Flash offers enhanced MagneSafe™ security features.
The card data is not only captured in a single swipe, but
is also encrypted at the moment of swipe. This enables
dozens of transactions to be stored with a single reader. The
encrypted information is later transferred to a PC, where an
application can retrieve the transactions to reconcile orders,
verify amounts, and process transactions. With security
features that exceed current PCI DSS requirements for card
data protection and transaction security, the Flash offers the
convenience demanded by today’s on-the-go users.
Features
•	Handheld and wireless
•	Stores dozens of transactions
•	Protects card data per PCI DSS requirements
•	MagnePrint® card authentication
•	MagneSafe technology
•	Device/host authentication
•	Unique, non-changeable device serial number
•	Triple DES encryption
•	DUKPT key management
•	Tokenization
•	Masked data
•	Reads up to 3 tracks
•	Bidirectional read
•	Reads ANSI/ISO/AAMVA cards plus custom formats
•	USB HID no third party device driver is required
•	Rechargeable battery with 5-year life; standard USB cables
to recharge; hundreds of swipes per battery charge
•	Multicolor LED to indicate reader status
12
Small-footprint.
USB Powered.
Bidirectional.
5
iDynamo
Adapter kit available. Made for iPad 3, iPad 2, iPad, iPhone 4S, iPhone 4,
iPhone 3GS, and iPod touch 2nd, 3rd and 4th generation.
iDynamoFrom the company that leads with “Security from the Inside” MagTek has done it again with the iDynamo,
a secure card reader authenticator (SCRA) designed to work with Apple iOS products. The iDynamo offers
MagneSafe
TM
security and delivers open standards encryption with simple, yet proven DUKPT key management,
immediate tokenization of card data and MagnePrint® card authentication to maximize data protection and
prevent the use of counterfeit cards. Mobile merchants can now leverage the power of the iPad 3, iPad 2, iPad,
iPhone 4S, iPhone 4, iPhone 3GS, and iPod touch without the worries of handling or storing sensitive card data at
any time.
Benefits
Ideal for merchants and mobile users, the iDynamo offers
MagneSafe security features combined with the power of iPhone
and iPod Touch products. This powerful combination assures
convenience and cost savings while maximizing card data
protection and transaction security from the moment the card is
swiped all the way to authorization. No other card reader beats
the protection offered by a MagneSafe product.
Other devices claim to encrypt data in the reader. The iDynamo
encrypts the data inside the read head, closest to the magnetic
stripe and offers additional security layers with immediate
tokenization of card data and MagnePrint card authentication.
This layered approach to security far exceeds the protection of
encryption by itself, decreases the scope of PCI compliance, and
reduces fraud.
The iDynamo is rugged and affordable, so it not only withstands
real world use, it performs to the high standards set by MagTek as
the leader in magnetic card reading products for nearly 40 years.
Features
•	 Ergonomic and rugged design
•	 Protects card data per PCI DSS requirements
•	 MagnePrint card authentication
•	 MagneSafe security architecture
•	 Generates dynamic payment card data with each swipe
•	 Device/host authentication
•	 Unique, non-changeable serial number
•	 Time bound session IDs
•	 Triple DES encryption
•	 DUKPT key management
•	 Tokenization
•	 Masked data
•	 Reads up to 3 tracks
•	 Bidirectional read
•	 Reads ANSI/ISO/AAMVA cards plus custom formats
•	 Made for iPhone 4S, iPhone 4, iPhone 3GS, iPad 3,
iPad 2, iPad and iPod touch
6
“Made for iPod” and “Made for iPhone” and “Made for iPad” mean that an electronic accessory has
been designed to connect specifically to iPod or iPhone or iPad respectively, and has been certified by the
developer to meet Apple performance standards. Apple is not responsible for the operation of this device
or its compliance with safety and regulatory standards.
iPhone, iPod touch and iPad are trademarks of Apple Inc., registered in the U.S. and other countries.
Bluetooth.
Portable.
Secure.
11
BulleTSecurity anywhere. With the BulleT secure card reader authenticator (SCRA) security comes with the
flexibility and portability of a Bluetooth wireless interface. Small enough to fit into the palm of your hand,
the BulleT enables secure wireless communications with a PC or mobile phone using the popular Bluetooth
interface. Not only does the BulleT encrypt card data from the moment the card is swiped, but it also
enables card authentication to immediately detect counterfeit or altered cards.
Benefits
Ideal for merchants and financial institutions’ mobile users,
the BulleT offers MagneSafe™ security features with
the convenience of a Bluetooth interface. This powerful
combination assures card data protection, transaction
security and convenience needed to secure mobile
applications with strong encryption and the capability
to implement two-factor authentication. The BulleT is
specifically designed to leverage the existing magnetic stripe
card as a secure token empowering cardholders with the
freedom and confidence of knowing that their transactions
are secure and protected anytime, anywhere.
Features
•	Bluetooth interface
•	Handheld and wireless
•	Protects card data per PCI DSS requirements
•	MagnePrint® card authentication
•	MagneSafe technology
•	Device/host authentication
•	Unique, non-changeable device serial number
•	Triple DES encryption
•	DUKPT key management
•	Tokenization
•	Masked data
•	Reads up to 3 tracks
•	Bidirectional read
•	Reads ANSI/ISO/AAMVA cards plus custom formats
•	Rechargeable battery with 5-year life; standard USB cables
to recharge; hundreds of card swipes between charges
•	Range of up to 30 feet (10 meters)
•	Multicolor LED to indicate reader status
10
Mobile.
Rugged.
Adaptable.
7
uDynamoMagTek’s uDynamo provides universal connection options for its users. The uDynamo secure card reader
authenticator connects to a wide variety of devices through its retractable headphone jack. It also provides a
USB interface for connection with various devices including Windows or Mac PCs, and is perfect for virtual
terminals. The uDynamo combines the latest technologies for reliable and secure mobile payments and
identification.
Benefits
The uDynamo SCRA allows merchants to make secure
transactions while on-the-go using mobile devices and
connecting through their mobile headphone jack or
USB connections. The secure card reader authenticator
uses the MagneSafe™ Security Architecture to protect
cardholder data through instant dynamic encryption,
tokenization and authentication.
Features
•	 Adjustable stabilizer for a variety of devices
•	 Swipe path design yields highest read reliability on
first pass
•	 Triple DES encryption sealed inside the head
•	 Derived Unique Key per Device and Transaction
•	 Remote configuration and key loading
•	 Headphone jack interface - digital output
•	 Retractable headphone jack
•	 USB interface (power and comm i/o)
•	 Track 1, 2 and 3 data
•	 Mutual device/host authentication
•	 Anti-skimming features
•	 Counterfeit detection - cards and devices
•	 Tamper resistant, evident and responsive enclosures
•	 Token generation (the card, the PAN and the
transaction)
•	 Reads ANSI/ISO/AAMVA cards
8
Compact.
Portable.
Universal.
9
uDynamoMagTek’s uDynamo provides universal connection options for its users. The uDynamo secure card reader
authenticator connects to a wide variety of devices through its retractable headphone jack. It also provides a
USB interface for connection with various devices including Windows or Mac PCs, and is perfect for virtual
terminals. The uDynamo combines the latest technologies for reliable and secure mobile payments and
identification.
Benefits
The uDynamo SCRA allows merchants to make secure
transactions while on-the-go using mobile devices and
connecting through their mobile headphone jack or
USB connections. The secure card reader authenticator
uses the MagneSafe™ Security Architecture to protect
cardholder data through instant dynamic encryption,
tokenization and authentication.
Features
•	 Adjustable stabilizer for a variety of devices
•	 Swipe path design yields highest read reliability on
first pass
•	 Triple DES encryption sealed inside the head
•	 Derived Unique Key per Device and Transaction
•	 Remote configuration and key loading
•	 Headphone jack interface - digital output
•	 Retractable headphone jack
•	 USB interface (power and comm i/o)
•	 Track 1, 2 and 3 data
•	 Mutual device/host authentication
•	 Anti-skimming features
•	 Counterfeit detection - cards and devices
•	 Tamper resistant, evident and responsive enclosures
•	 Token generation (the card, the PAN and the
transaction)
•	 Reads ANSI/ISO/AAMVA cards
8
Compact.
Portable.
Universal.
9
BulleTSecurity anywhere. With the BulleT secure card reader authenticator (SCRA) security comes with the
flexibility and portability of a Bluetooth wireless interface. Small enough to fit into the palm of your hand,
the BulleT enables secure wireless communications with a PC or mobile phone using the popular Bluetooth
interface. Not only does the BulleT encrypt card data from the moment the card is swiped, but it also
enables card authentication to immediately detect counterfeit or altered cards.
Benefits
Ideal for merchants and financial institutions’ mobile users,
the BulleT offers MagneSafe™ security features with
the convenience of a Bluetooth interface. This powerful
combination assures card data protection, transaction
security and convenience needed to secure mobile
applications with strong encryption and the capability
to implement two-factor authentication. The BulleT is
specifically designed to leverage the existing magnetic stripe
card as a secure token empowering cardholders with the
freedom and confidence of knowing that their transactions
are secure and protected anytime, anywhere.
Features
•	Bluetooth interface
•	Handheld and wireless
•	Protects card data per PCI DSS requirements
•	MagnePrint® card authentication
•	MagneSafe technology
•	Device/host authentication
•	Unique, non-changeable device serial number
•	Triple DES encryption
•	DUKPT key management
•	Tokenization
•	Masked data
•	Reads up to 3 tracks
•	Bidirectional read
•	Reads ANSI/ISO/AAMVA cards plus custom formats
•	Rechargeable battery with 5-year life; standard USB cables
to recharge; hundreds of card swipes between charges
•	Range of up to 30 feet (10 meters)
•	Multicolor LED to indicate reader status
10
Mobile.
Rugged.
Adaptable.
7
iDynamo
Adapter kit available. Made for iPad 3, iPad 2, iPad, iPhone 4S, iPhone 4,
iPhone 3GS, and iPod touch 2nd, 3rd and 4th generation.
iDynamoFrom the company that leads with “Security from the Inside” MagTek has done it again with the iDynamo,
a secure card reader authenticator (SCRA) designed to work with Apple iOS products. The iDynamo offers
MagneSafe
TM
security and delivers open standards encryption with simple, yet proven DUKPT key management,
immediate tokenization of card data and MagnePrint® card authentication to maximize data protection and
prevent the use of counterfeit cards. Mobile merchants can now leverage the power of the iPad 3, iPad 2, iPad,
iPhone 4S, iPhone 4, iPhone 3GS, and iPod touch without the worries of handling or storing sensitive card data at
any time.
Benefits
Ideal for merchants and mobile users, the iDynamo offers
MagneSafe security features combined with the power of iPhone
and iPod Touch products. This powerful combination assures
convenience and cost savings while maximizing card data
protection and transaction security from the moment the card is
swiped all the way to authorization. No other card reader beats
the protection offered by a MagneSafe product.
Other devices claim to encrypt data in the reader. The iDynamo
encrypts the data inside the read head, closest to the magnetic
stripe and offers additional security layers with immediate
tokenization of card data and MagnePrint card authentication.
This layered approach to security far exceeds the protection of
encryption by itself, decreases the scope of PCI compliance, and
reduces fraud.
The iDynamo is rugged and affordable, so it not only withstands
real world use, it performs to the high standards set by MagTek as
the leader in magnetic card reading products for nearly 40 years.
Features
•	 Ergonomic and rugged design
•	 Protects card data per PCI DSS requirements
•	 MagnePrint card authentication
•	 MagneSafe security architecture
•	 Generates dynamic payment card data with each swipe
•	 Device/host authentication
•	 Unique, non-changeable serial number
•	 Time bound session IDs
•	 Triple DES encryption
•	 DUKPT key management
•	 Tokenization
•	 Masked data
•	 Reads up to 3 tracks
•	 Bidirectional read
•	 Reads ANSI/ISO/AAMVA cards plus custom formats
•	 Made for iPhone 4S, iPhone 4, iPhone 3GS, iPad 3,
iPad 2, iPad and iPod touch
6
“Made for iPod” and “Made for iPhone” and “Made for iPad” mean that an electronic accessory has
been designed to connect specifically to iPod or iPhone or iPad respectively, and has been certified by the
developer to meet Apple performance standards. Apple is not responsible for the operation of this device
or its compliance with safety and regulatory standards.
iPhone, iPod touch and iPad are trademarks of Apple Inc., registered in the U.S. and other countries.
Bluetooth.
Portable.
Secure.
11
FlashSecure transactions, anywhere, anytime. The Flash secure card reader authenticator (SCRA) offers faster
mobile transactions. The Flash leverages the card swipe to securely capture and encrypt card data in
advance at the point of service (pizza delivery, home cosmetic sales, etc.) and make that data available
for secure, routine card processing.
Benefits
The Flash offers enhanced MagneSafe™ security features.
The card data is not only captured in a single swipe, but
is also encrypted at the moment of swipe. This enables
dozens of transactions to be stored with a single reader. The
encrypted information is later transferred to a PC, where an
application can retrieve the transactions to reconcile orders,
verify amounts, and process transactions. With security
features that exceed current PCI DSS requirements for card
data protection and transaction security, the Flash offers the
convenience demanded by today’s on-the-go users.
Features
•	Handheld and wireless
•	Stores dozens of transactions
•	Protects card data per PCI DSS requirements
•	MagnePrint® card authentication
•	MagneSafe technology
•	Device/host authentication
•	Unique, non-changeable device serial number
•	Triple DES encryption
•	DUKPT key management
•	Tokenization
•	Masked data
•	Reads up to 3 tracks
•	Bidirectional read
•	Reads ANSI/ISO/AAMVA cards plus custom formats
•	USB HID no third party device driver is required
•	Rechargeable battery with 5-year life; standard USB cables
to recharge; hundreds of swipes per battery charge
•	Multicolor LED to indicate reader status
12
Small-footprint.
USB Powered.
Bidirectional.
5
DynamagFor retailers and financial institutions that want security, ergonomic design and ease-of-use, the Dynamag
secure card reader authenticator (SCRA) is MagneSafe™ secured and offers a reliable and convenient swipe
path with complete security features for the peace of mind you can trust. Specifically designed to meet PCI DSS
requirements to secure card data, the Dynamag employs the industry standard, Triple DES encryption and is USB
powered. This bidirectional SCRA conveniently makes any existing electronic transaction more secure.
Benefits
The Dynamag enables retailers and financial institutions
to “future proof” their POS and PC-based electronic
transactions that support today’s traditional applications
and tomorrow’s advanced security requirements. The
Dynamag is 100% interface compatible with all traditional
MagTek readers. It gives you the flexibility to activate
advanced security features including card authentication,
data encryption, and device/host authentication remotely
when higher security is necessary.
Features
• Ergonomic design
• Industry standard footprint
• Protects card data per PCI DSS requirements
• MagnePrint® card authentication
•	MagneSafe technology
• Device/host authentication
• Unique, non-changeable device serial number
• Triple DES encryption
• DUKPT key management
• Tokenization
• Masked data
• Reads up to 3 tracks
• Bidirectional read
• Reads ANSI/ISO/AAMVA cards plus custom formats
• USB HID or USB keyboard emulation; no third party
device driver is required
• USB powered
• Multicolor LED to indicate reader status
4
Memory SCRA.
Long Life Battery.
Portable.
13
MagneSafe™SecurityArchitectureMagneSafe Security Architecture is a foundation you can build on. The MagneSafe Security Architecture
(MSA) has evolved exponentially from its inception in 2006 when it delivered the industry’s first Secure
Card Reader Authenticators (SCRAs) for secure electronic transactions. The MSA is a digital identification
and authentication architecture that safeguards consumers and their personal data. Designed to exceed
PCI regulations, MSA leverages strong encryption, secure tokenization, counterfeit detection, tamper
recognition, data relevance and integrity, and dynamic digital transaction signatures, which together validate
and protect the entire transaction and each of its components.
A key feature of the MSA is MagnePrint® card authentication, a patented, proven technology which reliably
identifies counterfeit credit cards, debit cards, gift cards, ATM cards and ID cards at the point of swipe,
before fraud occurs. MSA’s multi-layer security provides unmatched protection and flexibility for safer online
transactions.
Layers of Security
Industry experts agree that a layered approach is the best
approach for security and MagneSafe provides the layers
necessary in one easy to implement, scalable solution.
SCRAs provide true end-to-end encryption with the
encryption occurring within the reader, along with
tokenization formatting capabilities.
Encryption and tokenization are preventive measures that
help to protect cardholder data, at rest and in transit, and
at various points through the payment infrastructure.
Encryption and Tokenization however, do not protect
cardholder data that exists outside of the network. Here
data is widely available form other data capture venues such
as pocket skimmers, unattended gas pumps, phishing and
pharming sites, and telephone scammers.
The multi-layer security of MagneSafe adds the unmatched
protection both cardholders and relying parties require
through sophisticated card, device and data authentication
methods that assure a valid transaction.
SCRAs deliver dynamic payment card data (digital
identifiers of ID), and magnetic card stripe fingerprinting
(MagnePrint) which provides counterfeit detection, counters
skimming attempts and stops fraudulent transactions in
real-time. No other security device in the market today is
able to do everything that MagneSafe does in one easy to
implement, scalable, cost-effective solution.
MagneSafe SCRAs transform the existing magnetic stripe
card into a highly secured payment and identification token
with proven ability to identify counterfeit cards and prevent
card fraud.
Fraud Prevention
It’s now possible for card issuers to uniquely identify each
physical card they send out by analyzing its magnetic
signature. By recording this signature, and making it
available to be ‘reference checked’ by merchants at the same
time they swipe for authorization, the cards and processes all
stay the same, and only the counterfeit cards are declined.
When a card-present transaction is submitted, the
MagnePrint® of the card read at the transaction point is
transmitted along with the card and other transaction
data. The MagnePrint risk management tool compares the
‘transaction MagnePrint value’ to a ‘reference MagnePrint
value’ already present in the authorization database,
calculates the degree of correspondence (the match value)
between the two values, and makes a judgment about
the card’s authenticity based on all available transaction
information, including the match value.
During one test, a run of a million transactions with an
acceptance threshold set at 0.5 resulted in a “false accept”
rate of zero, that is all attempts to process fraudulent cards
were thwarted, and the resulting “false reject” rate was only
0.027 percent.
In comparing a given ‘transaction MagnePrint value’ to its
‘reference MagnePrint value’, the scoring algorithm assigns a
match value between zero (no match) and one (perfect match).
The authorization methodology allows each relying party
to select an acceptance threshold between zero and one for
its transactions, or even to specify a threshold that varies
according to the characteristics of the transaction (e.g., more
stringent for higher-dollar transactions originating from a
fraud prone merchant).
14
Secure Card Reader Authenticators (SCRAs)
3
Dynamag
Ergonomically designed, compact
and is able to mount conveniently
to most flat surfaces where space
is a premium.
iDynamo
Mobile merchants can now
leverage the power of their
Apple iOS products without the
worries of handling or storing
sensitive card data at any time.
uDynamo
Connect a secure card reader
authenticator to your mobile
device through the headphone
jack or USB connection for secure
transactions.
BulleT
Bluetooth interface and sleek
ergonomic design, enables secure
wireless communications with a
PC or mobile phone.
Flash
Offer secure storage for fast, mobile
transactions where cables or wireless
connections are not accessible all
in a handy ergonomic design.
2
Merchants, retailers and financial institutions rely on
MagTek. Secure card reader authenticators (SCRAs)
capture data with a single swipe and they offer the flexible
options needed for PCI DSS compliance and ease-of-
use. MagneSafe™ SCRAs deliver data encryption,
card authentication, and device/host authentication to
protect cardholders from identity theft and card fraud.
They proactively identify counterfeit cards and for the
ultimate in application flexibility and interface options,
MagTek SCRAs deliver the configuration choice you need
with the reliability you know you can trust.
When it comes to card reading
security and reliability…
…MagTek means quality.
Evolution of Card Reading Technology
MagneSafe SCRAs are characterized by their ability to:
•	 Read and encrypt cardholder data
•	 Generate a unique encryption key per swipe
•	 Mutually authenticate the reader and a legitimate host
•	 Manage time bound sessions
•	 Capture and transmit the dynamic digital identifiers
•	 Generate a unique token of the transaction
•	 Features Ideal for PCI 2.0 applications
•	 Triple DES Encryption
•	 DUKPT Key Management
•	 MagnePrint Card Authentication
•	 Secure Tokenization
•	 Device & Host Authentication
•	 MagnePrint® technology
•	 Masked Data
•	 Unique, non-changeable device serial numbering
SCRA
secure card reader authenticator
SCR
secure (encryption) card reader
MSR
magnetic stripe reader
Read card data
Tokenization
Encryption
Read MagnePrint®
Dynamic data generation
Masked data
Transmit stochastic
encrypted data
Transmit card data
Time-bound sessions
Mutual hardware/
host authentication
Authenticate the card
ManagedbyMerchantManagedbytheReaderAvailableonlythroughMSA
Read card data
Tokenization
Encryption within the
reader
Read MagnePrint
Dynamic data generation
Masked data
Transmit stochastic
encrypted data
Transmit card data
Time-bound sessions
Mutual hardware/
host authentication
Authenticate the card
ManagedbyMerchantManagedbytheReaderAvailableonlythroughMSA
Read card data
Tokenization
Encryption in the
read head
Read MagnePrint
Dynamic data generation
Masked data
Transmit stochastic
encrypted data
Transmit card data
Time-bound sessions
Mutual hardware/
host authentication
ManagedbyMagneSafe®SecurityArchitecture(MSA)
Authenticate the card
Real-time counterfeit
card detection
Real-time counterfeit
detection
Real-time counterfeit
detection
PA-DSS Statement for Payment Applications
The use of MagTek SCRAs and the Magensa Payment Protection
Gateway (MPPG), when properly implemented, will dramatically
reduce the scope of Requirements 1, 2 and 11 and provide additional
scope reduction for requirements 3, 5, 6, 7, 9, 10, and 12.
In order to take advantage of the reduced or eliminated PA-DSS
scope that may be achieved by the combination of MagneSafe
equipped SCRAs and the Magensa Payment Protection Gateway,
the following conditions must also exist.
1.	 All card reading must be accomplished by the use of
MagneSafe-enabled SCRAs.
2.	 No manually, keyed entered transactions are permitted
through any application interfaces. Key entered PANs for
card not present transactions must be entered on a MagTek
(PCI PED 2.x compliant) IPAD or IPAD SC.
3.	 All transactions must be routed through the MPPG.
4.	 Neither the merchant nor the application provider possess
or have access to the decryption keys used by the SCRAs to
encrypt the cardholder data.
5.	 The SCRAs are set to Security level 3 or above.
As with all Payment Applications, the final determination of applicability of PA-DSS should be
performed by a qualified PA-QSA.
15
Secure Card Reader Authenticators
MagTek® Inc., 1710 Apollo Court, Seal Beach, CA 90740 | p 562-546-6400 | f 562-546-6301 | 800-788-6835 | www.magtek.com
Registered to ISO 9001:2008 © Copyright 2012 MagTek, Inc. PN 99875460 Rev 5.02 12/12
About MagTek
Since 1972, MagTek has been a leading manufacturer of
electronic devices and systems for the reliable issuance,
reading, transmission and security of cards, checks, PINs
and other identification documents. Leading with innovation
and engineering excellence, MagTek is known for quality
and dependability. Its products include secure card reader
authenticators, small document scanners, PIN pads and card
personalization and issuance systems. These products are
used worldwide by financial institutions, retailers, hotels, law
enforcement agencies and other organizations to provide secure
and efficient electronic payment and identification transactions.
Today, MagTek continues to innovate with the development of a
new generation of Protection Services secured by the MagneSafe™
Security Architecture. By leveraging strong encryption, secure
tokenization, real-time authentication and dynamic transaction
data, MagneSafe products enable users to assess and validate
the trustworthiness of credentials used for online identification,
payment processing and other high-value electronic transactions.
MagTek is based in Seal Beach, California and has sales offices
throughout the United States, Europe, and Asia, with independent
distributors in over 40 countries. For more information, please
visit www.magtek.com.

Más contenido relacionado

La actualidad más candente

Microsoft Accelerator event- Blockchain technology from disruptive concept to...
Microsoft Accelerator event- Blockchain technology from disruptive concept to...Microsoft Accelerator event- Blockchain technology from disruptive concept to...
Microsoft Accelerator event- Blockchain technology from disruptive concept to...Hila Bar
 
PCI DSS Conference in London UK 2011
PCI DSS Conference in London UK 2011PCI DSS Conference in London UK 2011
PCI DSS Conference in London UK 2011Ulf Mattsson
 
The Smart Approach To Pci DSS Compliance – Braintree White Paper
The Smart Approach To Pci DSS Compliance – Braintree White PaperThe Smart Approach To Pci DSS Compliance – Braintree White Paper
The Smart Approach To Pci DSS Compliance – Braintree White PaperBen Rothke
 
Dsdt meetup july2018
Dsdt meetup july2018Dsdt meetup july2018
Dsdt meetup july2018JDA Labs MTL
 
SmartQuora - Learn to build a Smart Contract application on Hyperledger Block...
SmartQuora - Learn to build a Smart Contract application on Hyperledger Block...SmartQuora - Learn to build a Smart Contract application on Hyperledger Block...
SmartQuora - Learn to build a Smart Contract application on Hyperledger Block...Srini Karlekar
 
Digital certificate management v1 (Draft)
Digital certificate management v1 (Draft)Digital certificate management v1 (Draft)
Digital certificate management v1 (Draft)Avirot Mitamura
 
Microsoft Accelerator event- Maria's Legal presentation
Microsoft Accelerator event- Maria's Legal presentation Microsoft Accelerator event- Maria's Legal presentation
Microsoft Accelerator event- Maria's Legal presentation Hila Bar
 
The Microsoft vision for Blockchain
The Microsoft vision for BlockchainThe Microsoft vision for Blockchain
The Microsoft vision for BlockchainASPEX_BE
 
Secure electronic transaction
Secure electronic transactionSecure electronic transaction
Secure electronic transactionNishant Pahad
 
Encryption and Tokenization: Friend or Foe?
Encryption and Tokenization: Friend or Foe?Encryption and Tokenization: Friend or Foe?
Encryption and Tokenization: Friend or Foe?Zach Gardner
 
Distributed Intelligence
Distributed IntelligenceDistributed Intelligence
Distributed IntelligenceNuri Cankaya
 
Blockchain use cases in health and education
Blockchain use cases in health and educationBlockchain use cases in health and education
Blockchain use cases in health and educationNetcetera
 
Blockchain based Security Architectures - A Review
Blockchain based Security Architectures - A ReviewBlockchain based Security Architectures - A Review
Blockchain based Security Architectures - A ReviewGokul Alex
 
What is tokenization in blockchain?
What is tokenization in blockchain?What is tokenization in blockchain?
What is tokenization in blockchain?Ulf Mattsson
 
IRJET- Keep It – A System to Store Certificates and Develop a Profile
IRJET- Keep It – A System to Store Certificates and Develop a ProfileIRJET- Keep It – A System to Store Certificates and Develop a Profile
IRJET- Keep It – A System to Store Certificates and Develop a ProfileIRJET Journal
 
Blockchain in enterprise - Challenges, Considerations and Designs
Blockchain in enterprise - Challenges, Considerations and DesignsBlockchain in enterprise - Challenges, Considerations and Designs
Blockchain in enterprise - Challenges, Considerations and DesignsMichael Chi
 
Hw09 Large Scale Transaction Analysis
Hw09   Large Scale Transaction AnalysisHw09   Large Scale Transaction Analysis
Hw09 Large Scale Transaction AnalysisCloudera, Inc.
 
THE BITCOINHEIST: CLASSIFICATIONS OF RANSOMWARE CRIME FAMILIES
THE BITCOINHEIST: CLASSIFICATIONS OF RANSOMWARE CRIME FAMILIESTHE BITCOINHEIST: CLASSIFICATIONS OF RANSOMWARE CRIME FAMILIES
THE BITCOINHEIST: CLASSIFICATIONS OF RANSOMWARE CRIME FAMILIESijcsit
 

La actualidad más candente (19)

Microsoft Accelerator event- Blockchain technology from disruptive concept to...
Microsoft Accelerator event- Blockchain technology from disruptive concept to...Microsoft Accelerator event- Blockchain technology from disruptive concept to...
Microsoft Accelerator event- Blockchain technology from disruptive concept to...
 
PCI DSS Conference in London UK 2011
PCI DSS Conference in London UK 2011PCI DSS Conference in London UK 2011
PCI DSS Conference in London UK 2011
 
The Smart Approach To Pci DSS Compliance – Braintree White Paper
The Smart Approach To Pci DSS Compliance – Braintree White PaperThe Smart Approach To Pci DSS Compliance – Braintree White Paper
The Smart Approach To Pci DSS Compliance – Braintree White Paper
 
Dsdt meetup july2018
Dsdt meetup july2018Dsdt meetup july2018
Dsdt meetup july2018
 
SmartQuora - Learn to build a Smart Contract application on Hyperledger Block...
SmartQuora - Learn to build a Smart Contract application on Hyperledger Block...SmartQuora - Learn to build a Smart Contract application on Hyperledger Block...
SmartQuora - Learn to build a Smart Contract application on Hyperledger Block...
 
AI, Blockchain, IoT for Finance AT A Glance
AI, Blockchain, IoT for Finance AT A GlanceAI, Blockchain, IoT for Finance AT A Glance
AI, Blockchain, IoT for Finance AT A Glance
 
Digital certificate management v1 (Draft)
Digital certificate management v1 (Draft)Digital certificate management v1 (Draft)
Digital certificate management v1 (Draft)
 
Microsoft Accelerator event- Maria's Legal presentation
Microsoft Accelerator event- Maria's Legal presentation Microsoft Accelerator event- Maria's Legal presentation
Microsoft Accelerator event- Maria's Legal presentation
 
The Microsoft vision for Blockchain
The Microsoft vision for BlockchainThe Microsoft vision for Blockchain
The Microsoft vision for Blockchain
 
Secure electronic transaction
Secure electronic transactionSecure electronic transaction
Secure electronic transaction
 
Encryption and Tokenization: Friend or Foe?
Encryption and Tokenization: Friend or Foe?Encryption and Tokenization: Friend or Foe?
Encryption and Tokenization: Friend or Foe?
 
Distributed Intelligence
Distributed IntelligenceDistributed Intelligence
Distributed Intelligence
 
Blockchain use cases in health and education
Blockchain use cases in health and educationBlockchain use cases in health and education
Blockchain use cases in health and education
 
Blockchain based Security Architectures - A Review
Blockchain based Security Architectures - A ReviewBlockchain based Security Architectures - A Review
Blockchain based Security Architectures - A Review
 
What is tokenization in blockchain?
What is tokenization in blockchain?What is tokenization in blockchain?
What is tokenization in blockchain?
 
IRJET- Keep It – A System to Store Certificates and Develop a Profile
IRJET- Keep It – A System to Store Certificates and Develop a ProfileIRJET- Keep It – A System to Store Certificates and Develop a Profile
IRJET- Keep It – A System to Store Certificates and Develop a Profile
 
Blockchain in enterprise - Challenges, Considerations and Designs
Blockchain in enterprise - Challenges, Considerations and DesignsBlockchain in enterprise - Challenges, Considerations and Designs
Blockchain in enterprise - Challenges, Considerations and Designs
 
Hw09 Large Scale Transaction Analysis
Hw09   Large Scale Transaction AnalysisHw09   Large Scale Transaction Analysis
Hw09 Large Scale Transaction Analysis
 
THE BITCOINHEIST: CLASSIFICATIONS OF RANSOMWARE CRIME FAMILIES
THE BITCOINHEIST: CLASSIFICATIONS OF RANSOMWARE CRIME FAMILIESTHE BITCOINHEIST: CLASSIFICATIONS OF RANSOMWARE CRIME FAMILIES
THE BITCOINHEIST: CLASSIFICATIONS OF RANSOMWARE CRIME FAMILIES
 

Similar a Dynamag by MagTek

End-to-End Encryption for Credit Card Processing
End-to-End Encryption for Credit Card ProcessingEnd-to-End Encryption for Credit Card Processing
End-to-End Encryption for Credit Card ProcessingLennon808
 
White paper-safe-secure-payments-master card-approach-usa
White paper-safe-secure-payments-master card-approach-usaWhite paper-safe-secure-payments-master card-approach-usa
White paper-safe-secure-payments-master card-approach-usaCMR WORLD TECH
 
Embedded System Security: Learning from Banking and Payment Industry
Embedded System Security: Learning from Banking and Payment IndustryEmbedded System Security: Learning from Banking and Payment Industry
Embedded System Security: Learning from Banking and Payment IndustryNarudom Roongsiriwong, CISSP
 
Application to Quickly and Safely Store and Recover Credit Card’s Information...
Application to Quickly and Safely Store and Recover Credit Card’s Information...Application to Quickly and Safely Store and Recover Credit Card’s Information...
Application to Quickly and Safely Store and Recover Credit Card’s Information...IRJET Journal
 
First Data Trans Armor
First Data Trans ArmorFirst Data Trans Armor
First Data Trans ArmorJoshua Willis
 
E-commerce security using asymmetric key algorithm
E-commerce security using asymmetric key algorithmE-commerce security using asymmetric key algorithm
E-commerce security using asymmetric key algorithmgauravv7536
 
All You Wanted To Know About Top Online Payment Security Methods.pptx
All You Wanted To Know About Top Online Payment Security Methods.pptxAll You Wanted To Know About Top Online Payment Security Methods.pptx
All You Wanted To Know About Top Online Payment Security Methods.pptxITIO Innovex
 
PCI,Smart Card,ATM and E-commerce
PCI,Smart Card,ATM and E-commercePCI,Smart Card,ATM and E-commerce
PCI,Smart Card,ATM and E-commerceAmira Serag
 
Understanding the Role of Hardware Data Encryption in EMV and P2PE
Understanding the Role of Hardware Data Encryption in EMV and P2PEUnderstanding the Role of Hardware Data Encryption in EMV and P2PE
Understanding the Role of Hardware Data Encryption in EMV and P2PEGreg Stone
 
QRedit Presentation_2016
QRedit Presentation_2016QRedit Presentation_2016
QRedit Presentation_2016Eddie Cohen
 
Key Security Measures Behind Digital Payment Systems
Key Security Measures Behind Digital Payment SystemsKey Security Measures Behind Digital Payment Systems
Key Security Measures Behind Digital Payment SystemsITIO Innovex
 
Tokenization Payment Data Out Securing Payment Data Storage
Tokenization Payment Data Out Securing Payment Data StorageTokenization Payment Data Out Securing Payment Data Storage
Tokenization Payment Data Out Securing Payment Data Storage- Mark - Fullbright
 
Case study on smart card tech. _Anuj Pawar
Case study on smart card  tech. _Anuj PawarCase study on smart card  tech. _Anuj Pawar
Case study on smart card tech. _Anuj PawarAnuj Pawar
 
Cryptographysecurity 1222867498937700-9
Cryptographysecurity 1222867498937700-9Cryptographysecurity 1222867498937700-9
Cryptographysecurity 1222867498937700-9muthulx
 
DSS - ITSEC conf - Arcot - Security for eCommerce - Riga Nov2011
DSS - ITSEC conf - Arcot - Security for eCommerce - Riga Nov2011DSS - ITSEC conf - Arcot - Security for eCommerce - Riga Nov2011
DSS - ITSEC conf - Arcot - Security for eCommerce - Riga Nov2011Andris Soroka
 
Smart Card Security; Technology and Adoption
Smart Card Security; Technology and AdoptionSmart Card Security; Technology and Adoption
Smart Card Security; Technology and AdoptionCSCJournals
 
E Authentication System with QR Code and OTP
E Authentication System with QR Code and OTPE Authentication System with QR Code and OTP
E Authentication System with QR Code and OTPijtsrd
 

Similar a Dynamag by MagTek (20)

End-to-End Encryption for Credit Card Processing
End-to-End Encryption for Credit Card ProcessingEnd-to-End Encryption for Credit Card Processing
End-to-End Encryption for Credit Card Processing
 
White paper-safe-secure-payments-master card-approach-usa
White paper-safe-secure-payments-master card-approach-usaWhite paper-safe-secure-payments-master card-approach-usa
White paper-safe-secure-payments-master card-approach-usa
 
Embedded System Security: Learning from Banking and Payment Industry
Embedded System Security: Learning from Banking and Payment IndustryEmbedded System Security: Learning from Banking and Payment Industry
Embedded System Security: Learning from Banking and Payment Industry
 
Application to Quickly and Safely Store and Recover Credit Card’s Information...
Application to Quickly and Safely Store and Recover Credit Card’s Information...Application to Quickly and Safely Store and Recover Credit Card’s Information...
Application to Quickly and Safely Store and Recover Credit Card’s Information...
 
First Data Trans Armor
First Data Trans ArmorFirst Data Trans Armor
First Data Trans Armor
 
E-commerce security using asymmetric key algorithm
E-commerce security using asymmetric key algorithmE-commerce security using asymmetric key algorithm
E-commerce security using asymmetric key algorithm
 
M Commerce
M CommerceM Commerce
M Commerce
 
All You Wanted To Know About Top Online Payment Security Methods.pptx
All You Wanted To Know About Top Online Payment Security Methods.pptxAll You Wanted To Know About Top Online Payment Security Methods.pptx
All You Wanted To Know About Top Online Payment Security Methods.pptx
 
PCI,Smart Card,ATM and E-commerce
PCI,Smart Card,ATM and E-commercePCI,Smart Card,ATM and E-commerce
PCI,Smart Card,ATM and E-commerce
 
Understanding the Role of Hardware Data Encryption in EMV and P2PE
Understanding the Role of Hardware Data Encryption in EMV and P2PEUnderstanding the Role of Hardware Data Encryption in EMV and P2PE
Understanding the Role of Hardware Data Encryption in EMV and P2PE
 
Emv and fraud
Emv and fraudEmv and fraud
Emv and fraud
 
QRedit Presentation_2016
QRedit Presentation_2016QRedit Presentation_2016
QRedit Presentation_2016
 
Key Security Measures Behind Digital Payment Systems
Key Security Measures Behind Digital Payment SystemsKey Security Measures Behind Digital Payment Systems
Key Security Measures Behind Digital Payment Systems
 
Tokenization Payment Data Out Securing Payment Data Storage
Tokenization Payment Data Out Securing Payment Data StorageTokenization Payment Data Out Securing Payment Data Storage
Tokenization Payment Data Out Securing Payment Data Storage
 
Case study on smart card tech. _Anuj Pawar
Case study on smart card  tech. _Anuj PawarCase study on smart card  tech. _Anuj Pawar
Case study on smart card tech. _Anuj Pawar
 
Cryptographysecurity 1222867498937700-9
Cryptographysecurity 1222867498937700-9Cryptographysecurity 1222867498937700-9
Cryptographysecurity 1222867498937700-9
 
DSS - ITSEC conf - Arcot - Security for eCommerce - Riga Nov2011
DSS - ITSEC conf - Arcot - Security for eCommerce - Riga Nov2011DSS - ITSEC conf - Arcot - Security for eCommerce - Riga Nov2011
DSS - ITSEC conf - Arcot - Security for eCommerce - Riga Nov2011
 
Smart Card Security; Technology and Adoption
Smart Card Security; Technology and AdoptionSmart Card Security; Technology and Adoption
Smart Card Security; Technology and Adoption
 
E Authentication System with QR Code and OTP
E Authentication System with QR Code and OTPE Authentication System with QR Code and OTP
E Authentication System with QR Code and OTP
 
Blockchains.My - Decentralised Mobile Wallet App
Blockchains.My - Decentralised Mobile Wallet AppBlockchains.My - Decentralised Mobile Wallet App
Blockchains.My - Decentralised Mobile Wallet App
 

Más de 2FA, Inc.

Eikon Biometric Fingerprint Reader with 2FA ONE
Eikon Biometric Fingerprint Reader with 2FA ONEEikon Biometric Fingerprint Reader with 2FA ONE
Eikon Biometric Fingerprint Reader with 2FA ONE2FA, Inc.
 
2FA OTP Hard Token
2FA OTP Hard Token2FA OTP Hard Token
2FA OTP Hard Token2FA, Inc.
 
Omnikey 5021 for 13.56 MHz Security
Omnikey 5021 for 13.56 MHz SecurityOmnikey 5021 for 13.56 MHz Security
Omnikey 5021 for 13.56 MHz Security2FA, Inc.
 
RFIDeas pcProx Plus 82 Series
RFIDeas pcProx Plus 82 SeriesRFIDeas pcProx Plus 82 Series
RFIDeas pcProx Plus 82 Series2FA, Inc.
 
2FA OTP Token
2FA OTP Token2FA OTP Token
2FA OTP Token2FA, Inc.
 
2FA Advanced Authentication for Public Safety
2FA  Advanced Authentication for Public Safety2FA  Advanced Authentication for Public Safety
2FA Advanced Authentication for Public Safety2FA, Inc.
 

Más de 2FA, Inc. (6)

Eikon Biometric Fingerprint Reader with 2FA ONE
Eikon Biometric Fingerprint Reader with 2FA ONEEikon Biometric Fingerprint Reader with 2FA ONE
Eikon Biometric Fingerprint Reader with 2FA ONE
 
2FA OTP Hard Token
2FA OTP Hard Token2FA OTP Hard Token
2FA OTP Hard Token
 
Omnikey 5021 for 13.56 MHz Security
Omnikey 5021 for 13.56 MHz SecurityOmnikey 5021 for 13.56 MHz Security
Omnikey 5021 for 13.56 MHz Security
 
RFIDeas pcProx Plus 82 Series
RFIDeas pcProx Plus 82 SeriesRFIDeas pcProx Plus 82 Series
RFIDeas pcProx Plus 82 Series
 
2FA OTP Token
2FA OTP Token2FA OTP Token
2FA OTP Token
 
2FA Advanced Authentication for Public Safety
2FA  Advanced Authentication for Public Safety2FA  Advanced Authentication for Public Safety
2FA Advanced Authentication for Public Safety
 

Último

Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 

Último (20)

Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 

Dynamag by MagTek

  • 1. Secure Card Reader Authenticators MagTek® Inc., 1710 Apollo Court, Seal Beach, CA 90740 | p 562-546-6400 | f 562-546-6301 | 800-788-6835 | www.magtek.com Registered to ISO 9001:2008 © Copyright 2012 MagTek, Inc. PN 99875460 Rev 5.02 12/12 About MagTek Since 1972, MagTek has been a leading manufacturer of electronic devices and systems for the reliable issuance, reading, transmission and security of cards, checks, PINs and other identification documents. Leading with innovation and engineering excellence, MagTek is known for quality and dependability. Its products include secure card reader authenticators, small document scanners, PIN pads and card personalization and issuance systems. These products are used worldwide by financial institutions, retailers, hotels, law enforcement agencies and other organizations to provide secure and efficient electronic payment and identification transactions. Today, MagTek continues to innovate with the development of a new generation of Protection Services secured by the MagneSafe™ Security Architecture. By leveraging strong encryption, secure tokenization, real-time authentication and dynamic transaction data, MagneSafe products enable users to assess and validate the trustworthiness of credentials used for online identification, payment processing and other high-value electronic transactions. MagTek is based in Seal Beach, California and has sales offices throughout the United States, Europe, and Asia, with independent distributors in over 40 countries. For more information, please visit www.magtek.com.
  • 2. 2 Merchants, retailers and financial institutions rely on MagTek. Secure card reader authenticators (SCRAs) capture data with a single swipe and they offer the flexible options needed for PCI DSS compliance and ease-of- use. MagneSafe™ SCRAs deliver data encryption, card authentication, and device/host authentication to protect cardholders from identity theft and card fraud. They proactively identify counterfeit cards and for the ultimate in application flexibility and interface options, MagTek SCRAs deliver the configuration choice you need with the reliability you know you can trust. When it comes to card reading security and reliability… …MagTek means quality. Evolution of Card Reading Technology MagneSafe SCRAs are characterized by their ability to: • Read and encrypt cardholder data • Generate a unique encryption key per swipe • Mutually authenticate the reader and a legitimate host • Manage time bound sessions • Capture and transmit the dynamic digital identifiers • Generate a unique token of the transaction • Features Ideal for PCI 2.0 applications • Triple DES Encryption • DUKPT Key Management • MagnePrint Card Authentication • Secure Tokenization • Device & Host Authentication • MagnePrint® technology • Masked Data • Unique, non-changeable device serial numbering SCRA secure card reader authenticator SCR secure (encryption) card reader MSR magnetic stripe reader Read card data Tokenization Encryption Read MagnePrint® Dynamic data generation Masked data Transmit stochastic encrypted data Transmit card data Time-bound sessions Mutual hardware/ host authentication Authenticate the card ManagedbyMerchantManagedbytheReaderAvailableonlythroughMSA Read card data Tokenization Encryption within the reader Read MagnePrint Dynamic data generation Masked data Transmit stochastic encrypted data Transmit card data Time-bound sessions Mutual hardware/ host authentication Authenticate the card ManagedbyMerchantManagedbytheReaderAvailableonlythroughMSA Read card data Tokenization Encryption in the read head Read MagnePrint Dynamic data generation Masked data Transmit stochastic encrypted data Transmit card data Time-bound sessions Mutual hardware/ host authentication ManagedbyMagneSafe®SecurityArchitecture(MSA) Authenticate the card Real-time counterfeit card detection Real-time counterfeit detection Real-time counterfeit detection PA-DSS Statement for Payment Applications The use of MagTek SCRAs and the Magensa Payment Protection Gateway (MPPG), when properly implemented, will dramatically reduce the scope of Requirements 1, 2 and 11 and provide additional scope reduction for requirements 3, 5, 6, 7, 9, 10, and 12. In order to take advantage of the reduced or eliminated PA-DSS scope that may be achieved by the combination of MagneSafe equipped SCRAs and the Magensa Payment Protection Gateway, the following conditions must also exist. 1. All card reading must be accomplished by the use of MagneSafe-enabled SCRAs. 2. No manually, keyed entered transactions are permitted through any application interfaces. Key entered PANs for card not present transactions must be entered on a MagTek (PCI PED 2.x compliant) IPAD or IPAD SC. 3. All transactions must be routed through the MPPG. 4. Neither the merchant nor the application provider possess or have access to the decryption keys used by the SCRAs to encrypt the cardholder data. 5. The SCRAs are set to Security level 3 or above. As with all Payment Applications, the final determination of applicability of PA-DSS should be performed by a qualified PA-QSA. 15
  • 3. MagneSafe™SecurityArchitectureMagneSafe Security Architecture is a foundation you can build on. The MagneSafe Security Architecture (MSA) has evolved exponentially from its inception in 2006 when it delivered the industry’s first Secure Card Reader Authenticators (SCRAs) for secure electronic transactions. The MSA is a digital identification and authentication architecture that safeguards consumers and their personal data. Designed to exceed PCI regulations, MSA leverages strong encryption, secure tokenization, counterfeit detection, tamper recognition, data relevance and integrity, and dynamic digital transaction signatures, which together validate and protect the entire transaction and each of its components. A key feature of the MSA is MagnePrint® card authentication, a patented, proven technology which reliably identifies counterfeit credit cards, debit cards, gift cards, ATM cards and ID cards at the point of swipe, before fraud occurs. MSA’s multi-layer security provides unmatched protection and flexibility for safer online transactions. Layers of Security Industry experts agree that a layered approach is the best approach for security and MagneSafe provides the layers necessary in one easy to implement, scalable solution. SCRAs provide true end-to-end encryption with the encryption occurring within the reader, along with tokenization formatting capabilities. Encryption and tokenization are preventive measures that help to protect cardholder data, at rest and in transit, and at various points through the payment infrastructure. Encryption and Tokenization however, do not protect cardholder data that exists outside of the network. Here data is widely available form other data capture venues such as pocket skimmers, unattended gas pumps, phishing and pharming sites, and telephone scammers. The multi-layer security of MagneSafe adds the unmatched protection both cardholders and relying parties require through sophisticated card, device and data authentication methods that assure a valid transaction. SCRAs deliver dynamic payment card data (digital identifiers of ID), and magnetic card stripe fingerprinting (MagnePrint) which provides counterfeit detection, counters skimming attempts and stops fraudulent transactions in real-time. No other security device in the market today is able to do everything that MagneSafe does in one easy to implement, scalable, cost-effective solution. MagneSafe SCRAs transform the existing magnetic stripe card into a highly secured payment and identification token with proven ability to identify counterfeit cards and prevent card fraud. Fraud Prevention It’s now possible for card issuers to uniquely identify each physical card they send out by analyzing its magnetic signature. By recording this signature, and making it available to be ‘reference checked’ by merchants at the same time they swipe for authorization, the cards and processes all stay the same, and only the counterfeit cards are declined. When a card-present transaction is submitted, the MagnePrint® of the card read at the transaction point is transmitted along with the card and other transaction data. The MagnePrint risk management tool compares the ‘transaction MagnePrint value’ to a ‘reference MagnePrint value’ already present in the authorization database, calculates the degree of correspondence (the match value) between the two values, and makes a judgment about the card’s authenticity based on all available transaction information, including the match value. During one test, a run of a million transactions with an acceptance threshold set at 0.5 resulted in a “false accept” rate of zero, that is all attempts to process fraudulent cards were thwarted, and the resulting “false reject” rate was only 0.027 percent. In comparing a given ‘transaction MagnePrint value’ to its ‘reference MagnePrint value’, the scoring algorithm assigns a match value between zero (no match) and one (perfect match). The authorization methodology allows each relying party to select an acceptance threshold between zero and one for its transactions, or even to specify a threshold that varies according to the characteristics of the transaction (e.g., more stringent for higher-dollar transactions originating from a fraud prone merchant). 14 Secure Card Reader Authenticators (SCRAs) 3 Dynamag Ergonomically designed, compact and is able to mount conveniently to most flat surfaces where space is a premium. iDynamo Mobile merchants can now leverage the power of their Apple iOS products without the worries of handling or storing sensitive card data at any time. uDynamo Connect a secure card reader authenticator to your mobile device through the headphone jack or USB connection for secure transactions. BulleT Bluetooth interface and sleek ergonomic design, enables secure wireless communications with a PC or mobile phone. Flash Offer secure storage for fast, mobile transactions where cables or wireless connections are not accessible all in a handy ergonomic design.
  • 4. DynamagFor retailers and financial institutions that want security, ergonomic design and ease-of-use, the Dynamag secure card reader authenticator (SCRA) is MagneSafe™ secured and offers a reliable and convenient swipe path with complete security features for the peace of mind you can trust. Specifically designed to meet PCI DSS requirements to secure card data, the Dynamag employs the industry standard, Triple DES encryption and is USB powered. This bidirectional SCRA conveniently makes any existing electronic transaction more secure. Benefits The Dynamag enables retailers and financial institutions to “future proof” their POS and PC-based electronic transactions that support today’s traditional applications and tomorrow’s advanced security requirements. The Dynamag is 100% interface compatible with all traditional MagTek readers. It gives you the flexibility to activate advanced security features including card authentication, data encryption, and device/host authentication remotely when higher security is necessary. Features • Ergonomic design • Industry standard footprint • Protects card data per PCI DSS requirements • MagnePrint® card authentication • MagneSafe technology • Device/host authentication • Unique, non-changeable device serial number • Triple DES encryption • DUKPT key management • Tokenization • Masked data • Reads up to 3 tracks • Bidirectional read • Reads ANSI/ISO/AAMVA cards plus custom formats • USB HID or USB keyboard emulation; no third party device driver is required • USB powered • Multicolor LED to indicate reader status 4 Memory SCRA. Long Life Battery. Portable. 13
  • 5. FlashSecure transactions, anywhere, anytime. The Flash secure card reader authenticator (SCRA) offers faster mobile transactions. The Flash leverages the card swipe to securely capture and encrypt card data in advance at the point of service (pizza delivery, home cosmetic sales, etc.) and make that data available for secure, routine card processing. Benefits The Flash offers enhanced MagneSafe™ security features. The card data is not only captured in a single swipe, but is also encrypted at the moment of swipe. This enables dozens of transactions to be stored with a single reader. The encrypted information is later transferred to a PC, where an application can retrieve the transactions to reconcile orders, verify amounts, and process transactions. With security features that exceed current PCI DSS requirements for card data protection and transaction security, the Flash offers the convenience demanded by today’s on-the-go users. Features • Handheld and wireless • Stores dozens of transactions • Protects card data per PCI DSS requirements • MagnePrint® card authentication • MagneSafe technology • Device/host authentication • Unique, non-changeable device serial number • Triple DES encryption • DUKPT key management • Tokenization • Masked data • Reads up to 3 tracks • Bidirectional read • Reads ANSI/ISO/AAMVA cards plus custom formats • USB HID no third party device driver is required • Rechargeable battery with 5-year life; standard USB cables to recharge; hundreds of swipes per battery charge • Multicolor LED to indicate reader status 12 Small-footprint. USB Powered. Bidirectional. 5
  • 6. iDynamo Adapter kit available. Made for iPad 3, iPad 2, iPad, iPhone 4S, iPhone 4, iPhone 3GS, and iPod touch 2nd, 3rd and 4th generation. iDynamoFrom the company that leads with “Security from the Inside” MagTek has done it again with the iDynamo, a secure card reader authenticator (SCRA) designed to work with Apple iOS products. The iDynamo offers MagneSafe TM security and delivers open standards encryption with simple, yet proven DUKPT key management, immediate tokenization of card data and MagnePrint® card authentication to maximize data protection and prevent the use of counterfeit cards. Mobile merchants can now leverage the power of the iPad 3, iPad 2, iPad, iPhone 4S, iPhone 4, iPhone 3GS, and iPod touch without the worries of handling or storing sensitive card data at any time. Benefits Ideal for merchants and mobile users, the iDynamo offers MagneSafe security features combined with the power of iPhone and iPod Touch products. This powerful combination assures convenience and cost savings while maximizing card data protection and transaction security from the moment the card is swiped all the way to authorization. No other card reader beats the protection offered by a MagneSafe product. Other devices claim to encrypt data in the reader. The iDynamo encrypts the data inside the read head, closest to the magnetic stripe and offers additional security layers with immediate tokenization of card data and MagnePrint card authentication. This layered approach to security far exceeds the protection of encryption by itself, decreases the scope of PCI compliance, and reduces fraud. The iDynamo is rugged and affordable, so it not only withstands real world use, it performs to the high standards set by MagTek as the leader in magnetic card reading products for nearly 40 years. Features • Ergonomic and rugged design • Protects card data per PCI DSS requirements • MagnePrint card authentication • MagneSafe security architecture • Generates dynamic payment card data with each swipe • Device/host authentication • Unique, non-changeable serial number • Time bound session IDs • Triple DES encryption • DUKPT key management • Tokenization • Masked data • Reads up to 3 tracks • Bidirectional read • Reads ANSI/ISO/AAMVA cards plus custom formats • Made for iPhone 4S, iPhone 4, iPhone 3GS, iPad 3, iPad 2, iPad and iPod touch 6 “Made for iPod” and “Made for iPhone” and “Made for iPad” mean that an electronic accessory has been designed to connect specifically to iPod or iPhone or iPad respectively, and has been certified by the developer to meet Apple performance standards. Apple is not responsible for the operation of this device or its compliance with safety and regulatory standards. iPhone, iPod touch and iPad are trademarks of Apple Inc., registered in the U.S. and other countries. Bluetooth. Portable. Secure. 11
  • 7. BulleTSecurity anywhere. With the BulleT secure card reader authenticator (SCRA) security comes with the flexibility and portability of a Bluetooth wireless interface. Small enough to fit into the palm of your hand, the BulleT enables secure wireless communications with a PC or mobile phone using the popular Bluetooth interface. Not only does the BulleT encrypt card data from the moment the card is swiped, but it also enables card authentication to immediately detect counterfeit or altered cards. Benefits Ideal for merchants and financial institutions’ mobile users, the BulleT offers MagneSafe™ security features with the convenience of a Bluetooth interface. This powerful combination assures card data protection, transaction security and convenience needed to secure mobile applications with strong encryption and the capability to implement two-factor authentication. The BulleT is specifically designed to leverage the existing magnetic stripe card as a secure token empowering cardholders with the freedom and confidence of knowing that their transactions are secure and protected anytime, anywhere. Features • Bluetooth interface • Handheld and wireless • Protects card data per PCI DSS requirements • MagnePrint® card authentication • MagneSafe technology • Device/host authentication • Unique, non-changeable device serial number • Triple DES encryption • DUKPT key management • Tokenization • Masked data • Reads up to 3 tracks • Bidirectional read • Reads ANSI/ISO/AAMVA cards plus custom formats • Rechargeable battery with 5-year life; standard USB cables to recharge; hundreds of card swipes between charges • Range of up to 30 feet (10 meters) • Multicolor LED to indicate reader status 10 Mobile. Rugged. Adaptable. 7
  • 8. uDynamoMagTek’s uDynamo provides universal connection options for its users. The uDynamo secure card reader authenticator connects to a wide variety of devices through its retractable headphone jack. It also provides a USB interface for connection with various devices including Windows or Mac PCs, and is perfect for virtual terminals. The uDynamo combines the latest technologies for reliable and secure mobile payments and identification. Benefits The uDynamo SCRA allows merchants to make secure transactions while on-the-go using mobile devices and connecting through their mobile headphone jack or USB connections. The secure card reader authenticator uses the MagneSafe™ Security Architecture to protect cardholder data through instant dynamic encryption, tokenization and authentication. Features • Adjustable stabilizer for a variety of devices • Swipe path design yields highest read reliability on first pass • Triple DES encryption sealed inside the head • Derived Unique Key per Device and Transaction • Remote configuration and key loading • Headphone jack interface - digital output • Retractable headphone jack • USB interface (power and comm i/o) • Track 1, 2 and 3 data • Mutual device/host authentication • Anti-skimming features • Counterfeit detection - cards and devices • Tamper resistant, evident and responsive enclosures • Token generation (the card, the PAN and the transaction) • Reads ANSI/ISO/AAMVA cards 8 Compact. Portable. Universal. 9
  • 9. uDynamoMagTek’s uDynamo provides universal connection options for its users. The uDynamo secure card reader authenticator connects to a wide variety of devices through its retractable headphone jack. It also provides a USB interface for connection with various devices including Windows or Mac PCs, and is perfect for virtual terminals. The uDynamo combines the latest technologies for reliable and secure mobile payments and identification. Benefits The uDynamo SCRA allows merchants to make secure transactions while on-the-go using mobile devices and connecting through their mobile headphone jack or USB connections. The secure card reader authenticator uses the MagneSafe™ Security Architecture to protect cardholder data through instant dynamic encryption, tokenization and authentication. Features • Adjustable stabilizer for a variety of devices • Swipe path design yields highest read reliability on first pass • Triple DES encryption sealed inside the head • Derived Unique Key per Device and Transaction • Remote configuration and key loading • Headphone jack interface - digital output • Retractable headphone jack • USB interface (power and comm i/o) • Track 1, 2 and 3 data • Mutual device/host authentication • Anti-skimming features • Counterfeit detection - cards and devices • Tamper resistant, evident and responsive enclosures • Token generation (the card, the PAN and the transaction) • Reads ANSI/ISO/AAMVA cards 8 Compact. Portable. Universal. 9
  • 10. BulleTSecurity anywhere. With the BulleT secure card reader authenticator (SCRA) security comes with the flexibility and portability of a Bluetooth wireless interface. Small enough to fit into the palm of your hand, the BulleT enables secure wireless communications with a PC or mobile phone using the popular Bluetooth interface. Not only does the BulleT encrypt card data from the moment the card is swiped, but it also enables card authentication to immediately detect counterfeit or altered cards. Benefits Ideal for merchants and financial institutions’ mobile users, the BulleT offers MagneSafe™ security features with the convenience of a Bluetooth interface. This powerful combination assures card data protection, transaction security and convenience needed to secure mobile applications with strong encryption and the capability to implement two-factor authentication. The BulleT is specifically designed to leverage the existing magnetic stripe card as a secure token empowering cardholders with the freedom and confidence of knowing that their transactions are secure and protected anytime, anywhere. Features • Bluetooth interface • Handheld and wireless • Protects card data per PCI DSS requirements • MagnePrint® card authentication • MagneSafe technology • Device/host authentication • Unique, non-changeable device serial number • Triple DES encryption • DUKPT key management • Tokenization • Masked data • Reads up to 3 tracks • Bidirectional read • Reads ANSI/ISO/AAMVA cards plus custom formats • Rechargeable battery with 5-year life; standard USB cables to recharge; hundreds of card swipes between charges • Range of up to 30 feet (10 meters) • Multicolor LED to indicate reader status 10 Mobile. Rugged. Adaptable. 7
  • 11. iDynamo Adapter kit available. Made for iPad 3, iPad 2, iPad, iPhone 4S, iPhone 4, iPhone 3GS, and iPod touch 2nd, 3rd and 4th generation. iDynamoFrom the company that leads with “Security from the Inside” MagTek has done it again with the iDynamo, a secure card reader authenticator (SCRA) designed to work with Apple iOS products. The iDynamo offers MagneSafe TM security and delivers open standards encryption with simple, yet proven DUKPT key management, immediate tokenization of card data and MagnePrint® card authentication to maximize data protection and prevent the use of counterfeit cards. Mobile merchants can now leverage the power of the iPad 3, iPad 2, iPad, iPhone 4S, iPhone 4, iPhone 3GS, and iPod touch without the worries of handling or storing sensitive card data at any time. Benefits Ideal for merchants and mobile users, the iDynamo offers MagneSafe security features combined with the power of iPhone and iPod Touch products. This powerful combination assures convenience and cost savings while maximizing card data protection and transaction security from the moment the card is swiped all the way to authorization. No other card reader beats the protection offered by a MagneSafe product. Other devices claim to encrypt data in the reader. The iDynamo encrypts the data inside the read head, closest to the magnetic stripe and offers additional security layers with immediate tokenization of card data and MagnePrint card authentication. This layered approach to security far exceeds the protection of encryption by itself, decreases the scope of PCI compliance, and reduces fraud. The iDynamo is rugged and affordable, so it not only withstands real world use, it performs to the high standards set by MagTek as the leader in magnetic card reading products for nearly 40 years. Features • Ergonomic and rugged design • Protects card data per PCI DSS requirements • MagnePrint card authentication • MagneSafe security architecture • Generates dynamic payment card data with each swipe • Device/host authentication • Unique, non-changeable serial number • Time bound session IDs • Triple DES encryption • DUKPT key management • Tokenization • Masked data • Reads up to 3 tracks • Bidirectional read • Reads ANSI/ISO/AAMVA cards plus custom formats • Made for iPhone 4S, iPhone 4, iPhone 3GS, iPad 3, iPad 2, iPad and iPod touch 6 “Made for iPod” and “Made for iPhone” and “Made for iPad” mean that an electronic accessory has been designed to connect specifically to iPod or iPhone or iPad respectively, and has been certified by the developer to meet Apple performance standards. Apple is not responsible for the operation of this device or its compliance with safety and regulatory standards. iPhone, iPod touch and iPad are trademarks of Apple Inc., registered in the U.S. and other countries. Bluetooth. Portable. Secure. 11
  • 12. FlashSecure transactions, anywhere, anytime. The Flash secure card reader authenticator (SCRA) offers faster mobile transactions. The Flash leverages the card swipe to securely capture and encrypt card data in advance at the point of service (pizza delivery, home cosmetic sales, etc.) and make that data available for secure, routine card processing. Benefits The Flash offers enhanced MagneSafe™ security features. The card data is not only captured in a single swipe, but is also encrypted at the moment of swipe. This enables dozens of transactions to be stored with a single reader. The encrypted information is later transferred to a PC, where an application can retrieve the transactions to reconcile orders, verify amounts, and process transactions. With security features that exceed current PCI DSS requirements for card data protection and transaction security, the Flash offers the convenience demanded by today’s on-the-go users. Features • Handheld and wireless • Stores dozens of transactions • Protects card data per PCI DSS requirements • MagnePrint® card authentication • MagneSafe technology • Device/host authentication • Unique, non-changeable device serial number • Triple DES encryption • DUKPT key management • Tokenization • Masked data • Reads up to 3 tracks • Bidirectional read • Reads ANSI/ISO/AAMVA cards plus custom formats • USB HID no third party device driver is required • Rechargeable battery with 5-year life; standard USB cables to recharge; hundreds of swipes per battery charge • Multicolor LED to indicate reader status 12 Small-footprint. USB Powered. Bidirectional. 5
  • 13. DynamagFor retailers and financial institutions that want security, ergonomic design and ease-of-use, the Dynamag secure card reader authenticator (SCRA) is MagneSafe™ secured and offers a reliable and convenient swipe path with complete security features for the peace of mind you can trust. Specifically designed to meet PCI DSS requirements to secure card data, the Dynamag employs the industry standard, Triple DES encryption and is USB powered. This bidirectional SCRA conveniently makes any existing electronic transaction more secure. Benefits The Dynamag enables retailers and financial institutions to “future proof” their POS and PC-based electronic transactions that support today’s traditional applications and tomorrow’s advanced security requirements. The Dynamag is 100% interface compatible with all traditional MagTek readers. It gives you the flexibility to activate advanced security features including card authentication, data encryption, and device/host authentication remotely when higher security is necessary. Features • Ergonomic design • Industry standard footprint • Protects card data per PCI DSS requirements • MagnePrint® card authentication • MagneSafe technology • Device/host authentication • Unique, non-changeable device serial number • Triple DES encryption • DUKPT key management • Tokenization • Masked data • Reads up to 3 tracks • Bidirectional read • Reads ANSI/ISO/AAMVA cards plus custom formats • USB HID or USB keyboard emulation; no third party device driver is required • USB powered • Multicolor LED to indicate reader status 4 Memory SCRA. Long Life Battery. Portable. 13
  • 14. MagneSafe™SecurityArchitectureMagneSafe Security Architecture is a foundation you can build on. The MagneSafe Security Architecture (MSA) has evolved exponentially from its inception in 2006 when it delivered the industry’s first Secure Card Reader Authenticators (SCRAs) for secure electronic transactions. The MSA is a digital identification and authentication architecture that safeguards consumers and their personal data. Designed to exceed PCI regulations, MSA leverages strong encryption, secure tokenization, counterfeit detection, tamper recognition, data relevance and integrity, and dynamic digital transaction signatures, which together validate and protect the entire transaction and each of its components. A key feature of the MSA is MagnePrint® card authentication, a patented, proven technology which reliably identifies counterfeit credit cards, debit cards, gift cards, ATM cards and ID cards at the point of swipe, before fraud occurs. MSA’s multi-layer security provides unmatched protection and flexibility for safer online transactions. Layers of Security Industry experts agree that a layered approach is the best approach for security and MagneSafe provides the layers necessary in one easy to implement, scalable solution. SCRAs provide true end-to-end encryption with the encryption occurring within the reader, along with tokenization formatting capabilities. Encryption and tokenization are preventive measures that help to protect cardholder data, at rest and in transit, and at various points through the payment infrastructure. Encryption and Tokenization however, do not protect cardholder data that exists outside of the network. Here data is widely available form other data capture venues such as pocket skimmers, unattended gas pumps, phishing and pharming sites, and telephone scammers. The multi-layer security of MagneSafe adds the unmatched protection both cardholders and relying parties require through sophisticated card, device and data authentication methods that assure a valid transaction. SCRAs deliver dynamic payment card data (digital identifiers of ID), and magnetic card stripe fingerprinting (MagnePrint) which provides counterfeit detection, counters skimming attempts and stops fraudulent transactions in real-time. No other security device in the market today is able to do everything that MagneSafe does in one easy to implement, scalable, cost-effective solution. MagneSafe SCRAs transform the existing magnetic stripe card into a highly secured payment and identification token with proven ability to identify counterfeit cards and prevent card fraud. Fraud Prevention It’s now possible for card issuers to uniquely identify each physical card they send out by analyzing its magnetic signature. By recording this signature, and making it available to be ‘reference checked’ by merchants at the same time they swipe for authorization, the cards and processes all stay the same, and only the counterfeit cards are declined. When a card-present transaction is submitted, the MagnePrint® of the card read at the transaction point is transmitted along with the card and other transaction data. The MagnePrint risk management tool compares the ‘transaction MagnePrint value’ to a ‘reference MagnePrint value’ already present in the authorization database, calculates the degree of correspondence (the match value) between the two values, and makes a judgment about the card’s authenticity based on all available transaction information, including the match value. During one test, a run of a million transactions with an acceptance threshold set at 0.5 resulted in a “false accept” rate of zero, that is all attempts to process fraudulent cards were thwarted, and the resulting “false reject” rate was only 0.027 percent. In comparing a given ‘transaction MagnePrint value’ to its ‘reference MagnePrint value’, the scoring algorithm assigns a match value between zero (no match) and one (perfect match). The authorization methodology allows each relying party to select an acceptance threshold between zero and one for its transactions, or even to specify a threshold that varies according to the characteristics of the transaction (e.g., more stringent for higher-dollar transactions originating from a fraud prone merchant). 14 Secure Card Reader Authenticators (SCRAs) 3 Dynamag Ergonomically designed, compact and is able to mount conveniently to most flat surfaces where space is a premium. iDynamo Mobile merchants can now leverage the power of their Apple iOS products without the worries of handling or storing sensitive card data at any time. uDynamo Connect a secure card reader authenticator to your mobile device through the headphone jack or USB connection for secure transactions. BulleT Bluetooth interface and sleek ergonomic design, enables secure wireless communications with a PC or mobile phone. Flash Offer secure storage for fast, mobile transactions where cables or wireless connections are not accessible all in a handy ergonomic design.
  • 15. 2 Merchants, retailers and financial institutions rely on MagTek. Secure card reader authenticators (SCRAs) capture data with a single swipe and they offer the flexible options needed for PCI DSS compliance and ease-of- use. MagneSafe™ SCRAs deliver data encryption, card authentication, and device/host authentication to protect cardholders from identity theft and card fraud. They proactively identify counterfeit cards and for the ultimate in application flexibility and interface options, MagTek SCRAs deliver the configuration choice you need with the reliability you know you can trust. When it comes to card reading security and reliability… …MagTek means quality. Evolution of Card Reading Technology MagneSafe SCRAs are characterized by their ability to: • Read and encrypt cardholder data • Generate a unique encryption key per swipe • Mutually authenticate the reader and a legitimate host • Manage time bound sessions • Capture and transmit the dynamic digital identifiers • Generate a unique token of the transaction • Features Ideal for PCI 2.0 applications • Triple DES Encryption • DUKPT Key Management • MagnePrint Card Authentication • Secure Tokenization • Device & Host Authentication • MagnePrint® technology • Masked Data • Unique, non-changeable device serial numbering SCRA secure card reader authenticator SCR secure (encryption) card reader MSR magnetic stripe reader Read card data Tokenization Encryption Read MagnePrint® Dynamic data generation Masked data Transmit stochastic encrypted data Transmit card data Time-bound sessions Mutual hardware/ host authentication Authenticate the card ManagedbyMerchantManagedbytheReaderAvailableonlythroughMSA Read card data Tokenization Encryption within the reader Read MagnePrint Dynamic data generation Masked data Transmit stochastic encrypted data Transmit card data Time-bound sessions Mutual hardware/ host authentication Authenticate the card ManagedbyMerchantManagedbytheReaderAvailableonlythroughMSA Read card data Tokenization Encryption in the read head Read MagnePrint Dynamic data generation Masked data Transmit stochastic encrypted data Transmit card data Time-bound sessions Mutual hardware/ host authentication ManagedbyMagneSafe®SecurityArchitecture(MSA) Authenticate the card Real-time counterfeit card detection Real-time counterfeit detection Real-time counterfeit detection PA-DSS Statement for Payment Applications The use of MagTek SCRAs and the Magensa Payment Protection Gateway (MPPG), when properly implemented, will dramatically reduce the scope of Requirements 1, 2 and 11 and provide additional scope reduction for requirements 3, 5, 6, 7, 9, 10, and 12. In order to take advantage of the reduced or eliminated PA-DSS scope that may be achieved by the combination of MagneSafe equipped SCRAs and the Magensa Payment Protection Gateway, the following conditions must also exist. 1. All card reading must be accomplished by the use of MagneSafe-enabled SCRAs. 2. No manually, keyed entered transactions are permitted through any application interfaces. Key entered PANs for card not present transactions must be entered on a MagTek (PCI PED 2.x compliant) IPAD or IPAD SC. 3. All transactions must be routed through the MPPG. 4. Neither the merchant nor the application provider possess or have access to the decryption keys used by the SCRAs to encrypt the cardholder data. 5. The SCRAs are set to Security level 3 or above. As with all Payment Applications, the final determination of applicability of PA-DSS should be performed by a qualified PA-QSA. 15
  • 16. Secure Card Reader Authenticators MagTek® Inc., 1710 Apollo Court, Seal Beach, CA 90740 | p 562-546-6400 | f 562-546-6301 | 800-788-6835 | www.magtek.com Registered to ISO 9001:2008 © Copyright 2012 MagTek, Inc. PN 99875460 Rev 5.02 12/12 About MagTek Since 1972, MagTek has been a leading manufacturer of electronic devices and systems for the reliable issuance, reading, transmission and security of cards, checks, PINs and other identification documents. Leading with innovation and engineering excellence, MagTek is known for quality and dependability. Its products include secure card reader authenticators, small document scanners, PIN pads and card personalization and issuance systems. These products are used worldwide by financial institutions, retailers, hotels, law enforcement agencies and other organizations to provide secure and efficient electronic payment and identification transactions. Today, MagTek continues to innovate with the development of a new generation of Protection Services secured by the MagneSafe™ Security Architecture. By leveraging strong encryption, secure tokenization, real-time authentication and dynamic transaction data, MagneSafe products enable users to assess and validate the trustworthiness of credentials used for online identification, payment processing and other high-value electronic transactions. MagTek is based in Seal Beach, California and has sales offices throughout the United States, Europe, and Asia, with independent distributors in over 40 countries. For more information, please visit www.magtek.com.