Key Injection

Key Injection (Point of Interaction)

Secure payment processing - Encrypt credit card data immediately upon swipe, dip, tap or key entry in electronic payment terminals and Point of Interaction (POI) devices

Ensuring that data remains encrypted until it reaches the Solution Provider’s secure decryption environment. This keeps sensitive card data from entering the merchant's payment environment providing them with the strongest data protection available against hackers.

Business value

Business value


Designed for the Payment Processing Industry

  • Provides secure encryption of payment data at the POI
  • Supports both DUKPT and Master/Session methodologies and key loading, while enabling customers to load and support EMV keys.
  • Terminal-specific functionality is also supported through the KeyBRIDGE injection dashboard for each supported device.
  • Custom wiring diagrams detail all of the necessary features and functions of KeyBRIDGE-certified point-of-interaction terminals so that users have all of the necessary details to properly load each device.
  • Use of secure encryption methodologies and cryptographic key operations, including key generation, distribution, loading/injection and administration

Device & Data Security

  • Full support for all key types, including but not limited to DUKPT (PIN, MAC, or Data), standard E2E keys, KEKs, Master Session methods as well as alternative derivation techniques.
  • Manages unlimited Key Encryption Keys (KEKs)
  • Retrieval of the secure data requires dual control access from two key custodians assigned to the group to which the secret data is associated.

Effective audit logging

  • The platform streamlines key injection operational efficiency while automatically capturing all relevant audit log details that can be exported and validated
  • Enables remote audit management & detailed key inventory
  • Provides Audit Logs including date & timestamp, a unique audit ID,POI terminal details, Key Serial Number – KSI & DID portion only (injection only)
  • Communicates Status: Pass or Failure

Remote Access

Remote Key Delivery- Supporting the remote distribution of keys to deployed (POI) terminals


Software Simulator included

Included simulator allowing for evaluation and integration testing to benchmark the best possible solution for each specific case

Deployment options

Deployment options


On Premise

  • Useful for centralized use cases without a requirement of scalability or remote accessibility and existing legacy infrastructure
  • Defined total cost of ownership
  • Complete control on hardware and software, including configuration and upgrades
  • Secured uptime in areas with insatiable internet connectivity
  • Preferred choice in industry-segments where regulation imposes restrictions

In the Cloud

  • Strategic architectural fit & risk management for your high value assets 
  • Provides flexibility, scalability and availability of HSM-as-a-service
  • Ideal for a multi-cloud strategy, supporting multi-cloud deployments & allows for migration flexibility
  • Allows you to seamlessly work with any Cloud Service Provider
  • Easy-to-use remote management and on-site key ceremony service option
  • Full control over data through encryption key life-cycle and key administration
  • Secured data privacy through Bring-Your-Own-Key procedures

Contact us

We look forward to answering your questions.

How can we help you?

Talk to one of our specialists and find out how Utimaco can support you today.
You have selected two different types of downloads, so you need to submit different forms which you can select via the two tabs.

Your download request(s):

    By submitting below form you will receive links for your selected downloads.

    Your download request(s):

      For this type of documents, your e-mail address needs to be verified. You will receive the links for your selected downloads via e-mail after submitting below form.

      About Utimaco's Downloads

      Visit our Downloads section and select from resources such as brochures, data sheets, white papers and much more. You can view and save almost all of them directly (by clicking the download button).

      For some documents, your e-mail address needs to be verified. The button contains an e-mail icon.

      Download via e-mail


      A click on such a button opens an online form which we kindly ask you to fill and submit. You can collect several downloads of this type and receive the links via e-mail by simply submitting one form for all of them. Your current collection is empty.