description |
---|
This section describes how the Token Management Platform uses dedicated Approval Devices to identify users and their roles in operations. It also describes the operations and actions that clients can |
Token Management Platform (TMP) is a cloud-based service that secures and stores the keys necessary to sign transactions. To guarantee that the client has full control over the authorisation and signing process, RIDDLE&CODE developed the Approval Devices. The devices are held by the client on the premises and by the authorised personnel of an organisation.
Approval Devices are physical devices used for authentication and access to the TMP interface and for providing secure and trusted approval capabilities. Each Approval Device is secured by its own cryptographic identity, with the capability to limit the access and management of operations, settings and policies. All communication channels between the devices and the core components of the TMP are hardened and encrypted.
Approval Devices have the following functions:
- authentication and access to the TMP
- management of critical functionalities like Policy Layer rules
- approval of transactions.
There are two types of authentication methods used to guarantee that only authorised Approval Devices and users can access the TMP:
- FIDO2 for authentication of the device
- PIN for authentication of the user.
At the core of the Approval Devices is a dedicated Secure Element, a part of RIDDLE&CODE’s “Built for Blockchain” product range featuring CC EAL 6+ compliant crypto accelerator and crypto storage chips, which enable secure storage of the digital identity (private key) on any given device through the combination of hardware and software. The TMP’ Policy Layer checks against the Secure Element and its identity for each transaction to guarantee that only authorised devices can create and approve transactions.
The devices support modern algorithms that are focused around Elliptic Curve cryptography. The core integrity of the Approval Devices is defined by the cryptographic private-public key pair that is defined on the cryptographic processor during its first initialisation (TRNG).
These tamper-evident devices are developed as an industrial-grade cryptocurrency wallet to support trading and identity management. The following principles have been implemented during the development and design of the device:
- zero-trust principle
- PIN protection
- single-purpose computer
- limiting the attack surface
- off-the-bus cryptographic secrets
- physical security (FIPS 140-2 level 2)
- secure firmware update process.
Approval Devices are based on devices that achieved FIPS 142 Level 2 compliance (with the aim of compliance with FIPS 142 Level 3) and the Secure Elements with Common Criteria EAL 6+ certification.
Hardware | |
---|---|
Touch screen | 3.5" |
Resolution | 32x240 pixels |
Connectivity | USB-C |
MCU | ARM STM32F4 MCU |
- Multiple crypto accelerators and crypto storage ICs
- Secure Boot
- Signed Firmware
- Secure Firmware update
- Verifiable FW (signed by RIDDLE&CODE)
\