Blue Bamboo - Exceptionally affordable transaction technology for the world (PocketPOS™ P200, P25 Printer, H50A Terminal etc.)
Merchant Corner  
  Contact Us  |  Support Ticket  |  Sales Inquiry  |  Login
 
 
 

 

 
Interoperability

What are the benefits of a Java based terminal?
The Java environment has three big advantages:
a) Java is a high level programming environment allowing programmers to develop applications much faster than older programming languages.
b) The availability of Java programmers is very high. Programming talent for other operating systems is often difficult to find.
c) Java applications are portable to other terminals (discussed below).

These factors result in an overall lower cost to develop applications for the Blue Bamboo terminals.

How can one develop applications on the Blue Bamboo terminal?
To start with, the application developer does not need a terminal. The developer will normally follow the following steps:
a) Use Java to develop or modify the application based on the GP interface standard
b) Use the GP or Shera's PC based simulator to debug the application
Once the application is completed on the simulator, the developer can attach a terminal to the Shera's simulator to test the card swiping, LCD display, key press, printing, and so on. At last, developer can move the application to the terminal to test it.

Why does application portability matter?
Application portability is important because it allows the terminal owner to preserve the investment of developing the application to use in other terminals. With only minor or no changes a certified application can be ported to a new Java terminal. A good example of a certified Java application is the Visa Smart POS used by Blue Bamboo as its base debit application. This application was developed and certified by Visa.

Java solution

How fast is Blue Bamboo's Java solution?

It is as fast as compiled C code on an ARM7 based CPU.

Why does the Blue Bamboo terminal need less memory?
The Blue Bamboo terminal uses less memory because the Java Virtual Machine (JVM) is based on our bytecode processor. It does not need to take large memory blocks to interpret a Java program byte by byte and translate it into machine code. In addition, Blue Bamboo adopted JEFF technology, which can save about 60% of the ROM space and the majority of RAM -- more than 90% RAM in some cases.

Why can Blue Bamboo provide a Java terminal at an affordable price?
The three reasons for its lower cost are:
a) Lower memory requirements
b) Lower power demands because of the high processor efficiency
c) Semiconductor technology incorporates many functions and components with the terminal SoC (System on a Chip)

Security

What cryptographic functions do the Blue Bamboo terminal supports and why it matters?
The Blue Bamboo terminal is equipped with optimized crypto engines which can support all the cryptographic methods required by EMV and PED specifications, such as DES, 3DES, AES, RSA (both public key and private key encryption), MD5 and SHA1. In addition, these functionalities are used to manage the security of the terminal platform and multi-application loading/unloading.

How fast are these cryptographic functions?
Take an example, RSA private key encryption, which is the most timing-consuming function, can be completed in one second if the key length is 1024 bits. For the public key encryption with the same key length, it can be done hundreds of times in one second, if the public exponent is 3.

Multiple application

How does the terminal support multiple applications?
The Blue Bamboo terminal provides a multiple application platform. New applications can be installed remotely even after the terminal has been deployed at the merchant location. Every application on the terminal has independent code space and data storage. Applications can also be unload remotely.

How secure will the application download be?
Before the application is downloaded, a secure connection will be established between the Terminal Management Server (TMS) and the terminal. The application data will then be encrypted during the downloading.

How to prevent a Trojan program or virus from being installed in the terminal?
Every new application must come with a unique digital certificate. This is signed by the terminal owner to ensure the integrity and legitimacy of this application. Terminals will then check the certificate before install this new application.

How to stop an application from accessing unauthorized resources?
Every new application must come with some configuration data that indicates its security level, what resource it can access and what service it can use. These configurations are signed by the terminal owner, which can then be checked and stored in the terminal when the new application is installed. An Access Manager module is embedded in the terminal platform to control the resource access according to the stored configurations when the application is running.

Low cost

What is the total cost of a POS terminal?
The total cost of the terminal is not only the cost of the terminal itself, but also the cost of the application development. In some cases the development and certification can run into a very significance cost. In both of these counts, the Blue Bamboo terminals have an advantage.

Why are Blue Bamboo terminals high performance, feature rich and have a low price?
Blue Bamboo terminals are designed from the ground up. Their hardware and software architecture are optimized for POS terminals. In other words, their SoC chips and GP compliant software make the total cost of ownership of these terminals the lowest in the industry.

Why do Blue Bamboo terminals have low power consumption?
The Blue Bamboo has low power requirements because of its low memory, high CPU efficiency and reduced component count due to the SoC.

  Print this page

 

 
 Legal  |  Contact Us  |  Report Website Problems or Make a Suggestion
Click to Subscribe our enewsletter