
3
Introduction
ID TECH's SREDKey encrypted keypad is a PCI SRED device, which means (among other
things) it incorporates tamper detection features. This document gives background on
how the tamper detection functionality works and how units can be evaluated in the
field as to their tamper status.
Tamper Trigger State
Once a unit's tamper detection functionality has been triggered in service, the
SREDKey's LCD will display the trigger cause until power-down. Also, the unit will
erase all sensitive data, including cryptographic keys, and enter a deactivated state.
Once deactivation has occurred, each time the unit powers up, its LCD will display
the trigger cause for 5 seconds. Then “Activating…”displays on the LCD, and no
“Ready”message will appear until the unit is repaired and reactivated by the
manufacturer.
The trigger cause will appear in abbreviated form as one of: HTF LTF HVF3 HBF LBF
SDI1 SDI2 HVF1 or VGF. These abbreviations are explained in the table further below.
Note:
When powering on for the first time after triggering tamper, the LCD will
display “Init MSR, please wait... ”for several seconds, then display
the trigger cause for 5 seconds (until that message is erased on purpose);
then “Activating…”displays on the LCD. Because a tamper event causes
all keys and secure data to be lost, the MAXQ processor needs to re-
authenticate with SecureHead, internally. This needs to occur at the factory.
If the battery is off, all of the tamper settings will be lost. So for the first time
power on, the MAXQ will work in user-load mode to set tamper detection,
and the LCD backlight is on but displays nothing. Please re-apply power to
the unit.
There may be one or more reasons for the triggering of a tamper condition;
all appropriate display codes will display on the LCD. If multiple messages
displayed on the LCD, it means several tamper conditions were triggered.
(See below.) Contact your ID TECH representative.