Home

Ingenico 6780 User Guide

image

Contents

1. Setting Up the Phone Number to Dial This option is not applicable to the Ingenico 6780 since none of the Ingenico 6780 configurations have a modem Setting Up the Modem Speed This option is not applicable to the Ingenico 6780 since none of the Ingenico 6780 configurations have a modem Changing the Position of the Host Port or Aux Port The ports are labeled Host Aux and E NET and by default Port 1 Host Port 2 Aux Port 3 Ethernet However you may configure Port 1 2 or 3 as the Host port or Aux port through this menu option For example if your host uses Ethernet you may set your host port as Port 3 Display Action Restart the terminal by pressing 1 Cancel Enter simultaneously while the terminal is starting up press 1 3 simultaneously to access the Extended Menu Extended Menu Serialnum Inject System Config System Info Supervisor Menu Using the stylus tap Supervisor Menu Enter Password Key password 2 6 3 4 then press Enter Supervisor Menu Change Password Application File Security Sys Parameters Tap Sys Parameters Ingenico 6780 User s Guide 61 Sys Parameters Download Method Download Port Setup Port Tap Setup Port Setup Port Port1 Port2 Port3 Dial Host Port Aux Port Tap Host or Aux port and then press Enter Dial COM1 COM2 COM3 Select the port you want By default C
2. Ingenico 6780 User s Guide 97 text entry key are not injected or if download key is not injected The three security options Visa PED Mode Prompt MACing and Code MACing can only be turned off through the key injection module If the Visa PED mode section indicates to turn Visa PED mode on but the platform code files in the download package or terminal cannot pass the authentication or cannot find MAC information in the certificate file then Visa PED mode cannot turn on and the download fails If the Visa PED Mode section indicates to turn Code MACing on but the platform and financial application code files in the download package or terminal cannot pass the authentication or cannot find MAC information in the certificate file Code MACing cannot turn on and the download fails Note The first line of the file must end with a carriage return and line feed The second line is considered to begin at the first character immediately after the first carriage return and line feed characters of the file 1043 Application Descriptor Section The application descriptor section is an area of the secure certificate file that contains information pertaining to the application code files The section identifier Appl lt cr gt lt f gt marks the beginning of the application descriptor section within the file The section ends before the start of the next section identifier i e encountered by lt cr gt
3. If the register is reloaded immediately after powering up the Ingenico 6780 may not come up in the correct state Signing in at the register and seeing if the Ingenico 6780 display reads Please Slide Card can determine this If it does not i e display continues to read Closed then perform the same steps as for the next error message EFT Device Not Available EFT Device Not Available If the EFT Device Not Available message displays on the register perform the following steps 1 Check to make sure the Ingenico 6780 is on and is displaying the first prompt screen of your application software 2 On the register press the Clear key and select the transaction type again If the problem persists continue to step 3 3 To restart the Ingenico 6780 device press Cancel 0 Enter simultaneously The Ingenico 6780 restarts and the first prompt screen of the application software displays 110 Chapter 13 IBMEFT Troubleshooting Section 13 1 Card Read Error 13 3 4 On the register press the Clear key and select either the CREDIT or DEBIT transaction type again The Ingenico 6780 should now be at the first prompt screen of your application software i e it now reads Please Slide Card If not sign off the register and then sign on again EFT Device Not Available During Check Authorization If the EFT Device Not Available message displays on the register during check authorization 1 C
4. Ingenico 6780 User s Guide ingenico Ingenico 6780 User s Guide Part Number DIV350489 Revision A Released December 8 2006 Copyright 2006 Ingenico Corp All rights reserved Ingenico Inc Ingenico Canada Ltd 1003 Mansell Road 79 Torbarrie Road Toronto Ontario Atlanta GA 30076 Canada M3L 1G5 Tel 770 594 6000 Tel 416 245 6700 Fax 770 594 6003 Fax 416 245 6701 www ingenico us com www ingenico ca U S Help Desk IngeCare Canadian Help Desk IngeCare customerservice us ingenico com customersfirst us ingenico com Tel 800 435 3014 Tel 888 900 8221 Fax 770 594 6026 Fax 905 795 9343 Mon Fri 8 00 a m 6 00 p m Hours Mon Fri 8 30 a m 5 00 p m EST Sat 10 00 a m 3 00 p m EST No part of this publication may be copied distributed stored in a retrieval system translated into any human or computer language transmitted in any form or by any means without the prior written consent of Ingenico Ingenico and the Ingenico logo are registered trademarks of Ingenico Corp All other brand names and trademarks appearing in this guide are the property of their respective holders Information in this document is subject to change without notice Table of Contents Chapter 1 Introductionsiicnccttee te ieee 1 1 1 Payment TYPOS cscs scicats anda iain aesiacaas 1 T2 SOMIMGCLIVILY e a oc ald ns cada aa ceded baad nd eaa 1 13 About this Manuialicccnc no eeca sees eee se
5. 3 simultaneously to access the Extended Menu Extended Menu Using the stylus tap Diagnostic Menu Serialnum Inject System Config System Info Supervisor Menu Diagnostic Menu Diagnostic Menu Tap Keypad Display Keypad Keypad Press a key to test Here we pressed 0 Y ao The key value and hexadecimal value stored in the To exit press Cancel terminal s memory returns When finished press Cancel 74 Testing the Beeper This feature tests the beeper by sounding and displaying each possible beep type Display Action Restart the terminal by pressing 1 Cancel Enter simultaneously while the terminal is starting up press 1 3 simultaneously to access the Extended Menu Extended Menu Using the stylus tap Diagnostic Menu Serialnum Inject System Config System Info Supervisor Menu Diagnostic Menu Diagnostic Menu Tap Beeper Display Keypad 68 Chapter 7 Diagnostic Menu Section 7 3 Testing the Keypad 7 5 Beeper Length Click Frequency Low The terminal displays and sounds each possible beep type Testing the RS232 Connection This feature tests the RS232 connection Display Action Restart the terminal by pressing 1 Cancel Enter simultaneously while the terminal is starting up press 1 3 simultaneously to access the Extended Menu Extended Menu Serialnum Inject System Config System Info Supervisor Menu Diagnostic Menu Using the
6. 3 5 3 Changing the Beep Tones This option allows you to change the tone of the beep that sounds on key press To hear what each beep sounds like see Testing Display Action the Beeper on page 68 Restart the terminal by pressing 1 Cancel Enter simultaneously while the terminal is starting up press 1 3 simultaneously to access the Extended Menu Extended Menu Serialnum Inject System Info Supervisor Menu Using the stylus tap System Config System Config Change Date Time Display Contrast Key Press Beep Tap Key Press Beep Beep Tone Status Disable Press Enter to select Enable Key Beep Length Tone Tap Tone Beep Tone Low MOLON I a Select the option you want Key Beep Length Tone PREV You are returned to the previous menu Tap Prev to return to the previous menu Ingenico 6780 User s Guide 15 Turning the Backlight Off 3 6 361 Turning the Backlight Off This allows you to turn the backlight on the display screen on or off You may also set the backlight to be off when idle only see next section DIREN Action Restart the terminal by pressing 1 Cancel Enter simultaneously while the terminal is starting up press 1 3 simultaneously to access the Extended Menu Extended Menu Using the stylus tap System Config Serialnum Inject System Config System Info Supervisor M
7. Restart the terminal by pressing 1 Cancel Enter simultaneously while the terminal is starting up press 1 3 simultaneously to access the Extended Menu Extended Menu Serialnum Inject System Config System Info Supervisor Menu Diagnostic Menu Display Keypad Beeper RS232 Tailgate USB Mag Stripe Reader Smart Card Reader Smart Card Reader Insert Card Now Smart Card Reader The terminal displays the results of the smart card SynchXXX card test Smart Card Reader Please remove the card Using the stylus tap Diagnostic Menu Tap Smart Card Reader Insert a smart card Remove the card Ingenico 6780 User s Guide 7 10 Testing the SAMs This feature tests communication between the SAM slots and the SAM micro controller SMC Display Action Restart the terminal by pressing 1 Cancel Enter simultaneously while the terminal is starting up press 1 3 simultaneously to access the Extended Menu Extended Menu Serialnum Inject System Config System Info Supervisor Menu Diagnostic Menu Diagnostic Menu Tap SAM Using the stylus tap Diagnostic Menu Display Keypad Beeper RS232 Tailgate USB Mag Stripe Reader Smart Card Reader SAM SAM Found SAM Slot Found SAM Slot2 Found SAM Slot3 Found SAM Slot4 SAM Check Slot2 ATR Read data from Slot2 Result ATR means answer to reset SAM Power off all slots S
8. Select Port1 Port2 or Port3 By default Port 1 Host Port 2 Aux Port 3 E NET port Ethernet Port X Interface Type Baud Rate Data Bits Stop Bits Parity LAN Address Retry Count Response TMO Tap Response TMO timeout Response TMO 10 ms Old Value 300 Enter New Value Enter an amount of time after which the port should cease waiting for a response in units of 1 100 of a second Ingenico 6780 User s Guide 47 649 Setting the Poll Timeout Poll Timeout is the amount of time the host waits for a response after transmitting a device poll before it records a device poll timeout in units of one tenths of a second This time varies It depends on the number of devices connected to the host system The more devices connected to the host the longer it takes the host to poll each device If the PIN pad device misses more than 16 consecutive polls the host will abandon the device Display Action Restart the terminal by pressing 1 Cancel Enter simultaneously while the terminal is starting up press 1 3 simultaneously to access the Extended Menu Extended Menu Using the stylus tap Supervisor Menu Serialnum Inject System Config System Info Enter Password Key password 2 6 3 4 then press Enter Supervisor Menu Tap Sys Parameters Change Password Application File Security Sys Parameters Sys Parameters Tap Setup Port Downlo
9. 010000000000 Erase File Tap YES or NO No Yes Erasing File If you selected YES the terminal confirms it is erasing the file Chapter 5 Supervisor Menu Section 5 4 Application File in Terminal Select File If you selected NO you are returned to the sysPara cfg SELECT File prompt Select another file to erase i or press Cancel to return to a previous menu ss Security 55 1 Setting the Key Injection Port Display Action Restart the terminal by pressing 1 Cancel Enter simultaneously while the terminal is starting up press 1 3 simultaneously to access the Extended Menu Extended Menu Serialnum Inject System Config System Info Supervisor Menu Enter Password Key password 2 6 3 4 then press Enter Supervisor Menu Change Password Application File Security Key Check Value Erase App Keys Key Injection Inject Keys Injection Port Injection Port Using the stylus tap Supervisor Menu Tap Security Press Enter to select Key Injection Tap Injection Port Select the port you want COM1 COM2 Ethernet Updating Ingenico 6780 User s Guide 55 2 Injecting Keys DIREM Action Restart the terminal by pressing 1 Cancel Enter simultaneously while the terminal is starting up press 1 3 simultaneously to access the Extended Menu Extended Menu Serialnum Inject System Config Sy
10. Sponsor key KTK key transfer key also known as TMk 16 This key will be loaded as clear text All Level 2 keys will be transferred to the debit terminal encrypted under this key A default key is set if no customer key is injected es Terminal Based Keys Key Name Index Length Description of Key Secure Text Entry 1 8 16 This key is loaded encrypted under the KTK Form Authorization All prompts and or screens used for Secure Key PEFMk Text Entry of all applications will be authenticated using this key if the Prompts Authentication Key security option is set to terminal based 0 Clear Text Entry 2 8 16 This key is loaded encrypted under the KTK Form Authorization All prompts and or screens used for Clear Text Key CEFMk Entry of all applications will be authenticated using this key if Prompts Authentication Key security option is set to terminal based 0 Application 3 8 16 This key is the variant of KTK It will be used to Download verify the MAC value of the fingerprint of the Authorization Key code being downloaded into the device Code CDMk MACing always uses the Application Download Authorization Key Ingenico 6780 User s Guide Application Based Keys 9 4 941 Special Keys Special keys are loaded encrypted under the KTK The SSA will have a key structure matrix indexed by application ID These keys can be both single length DES keys and dou
11. Poll TMO Turnaround TMO Port 3 Interface Type Baud Rate Data Bits Stop Bits Parity Retry Count Response TMO DHCP Local IP Local IP Port Server IP Server IP Port IP Add Mask Gateway Primary DNS Secondary DNS Domain Name Dial Dial Phone Num Modem Speed Host Port COM1 COM2 COM3 Aux Port COM1 COM2 COM3 Auto Detect AD On Off On Off AD Timeout Ingenico 6780 User s Guide AD Retry Times Parameter Editor Diagnostic Menu_ Display Keypad Beeper RS232 COM1 COM2 Tailgate USB Mag Stripe Reader Smart Card Reader SAM Touch Screen Signature Capture Pen Calibration Finger Calibration SCV Verification Ingenico use only Chapter 2 Extended Menu Overview Section 2 5 Finding Options in the Extended Menu Ingenico 6780 User s Guide System Configuration Menu 31 Overview This chapter explains how to perform the functions in the system configuration menu change date and time set display contrast and adjust beep tones length and tone 32 Changing the Date and Time Restart the terminal by pressing 1 Cancel Enter simultaneously while the terminal is starting up press 1 3 simultaneously to access the Extended Menu Extended Menu Serialnum Inject System Info Supervisor Menu System Config System Date Time Using the
12. Port1 Port2 Port3 Interface Type Baud Rate Data Bits Stop Bits Parity Retry Count Response TMO DHCP 50 Chapter 6 System Parameters Menu Section 6 4 Setting Up the Port 6 4 12 DHCP Select None or Auto and then press Enter Updating Defining the Local IP Address If your terminal is using Ethernet and DHCP is set to None you will need to configure the local IP address which identifies the terminal on the network Each machine connected to the Internet has an address known as an Internet Protocol address IP address The IP address takes the form of four numbers separated by dots for example 192 168 0 5 Display Action Restart the terminal by pressing 1 Cancel Enter simultaneously while the terminal is starting up press 1 3 simultaneously to access the Extended Menu Extended Menu Serialnum Inject System Config System Info Supervisor Menu Using the stylus tap Supervisor Menu Enter Password Key password 2 6 3 4 then press Enter Supervisor Menu Change Password Application File Security Sys Parameters Tap Sys Parameters Sys Parameters Download Method Download Port Setup Port Tap Setup Port Setup Port Port1 Port2 Tap Port3 Ethernet Port3 Interface Type Baud Rate Data Bits Stop Bits Parity DHCP Local IP Tap Local IP Ingenico 6780 User s Guide 51 Local IP 192
13. 90 9 5 2 Change Terminal ID Option ccsccccccsssceceescsseseecesecsesaeseseseseesesseeeesesseneseesnnnees 90 9 5 3 Prompt MACING riesia eiii eaa a adda eyed woes ip AAi iia Aai aa 90 9 5 4 COJE MAGING aaa E rA EREEREER RE R E 91 9 5 5 Double Length Key MAC Calculation 2 ccccccccsecesssecesneeceeneetsanetsseeesnnsersaes 91 9 5 6 Atalla Key Block Protection Option cccccssccccsssssssessessesecseseesecseneeseesseeeseeeeenees 92 9 5 7 Terminal Startup Verify MAC OptiOn 21 ccccccccscceceseeeeneececeeecenesessaeeeseneeteneeeeas 92 9 5 8 Visa PED Mode Options ns irern Dewees ah tiene ed eae 92 9 5 9 Financial Key OptiOn oerste EA EEEE EEEE VOER 93 Chapter 10 Secure Certificate cccsseseeeeesssesesesseseseees 94 101 OVENVIEW aia a a a a ea 94 10 2 Securing PROCESS ton cu cscs cede tees dated acu ennienni aa sate ted sade aa aa a e 94 10 9 Secure Certificate Text Filecsec2acccie atccetd esecend esdeetdeetesuad etcdendeetesendeebden 95 10 4 Secure Certificate Descriptor Sections cccceeeeeeeeeeeeeeeeeeeeeeeeeeeees 96 10 4 1 Secure Certificate MAC Descriptor S CtION 2 ccceccceeseeceeecetsteetsneeeeeseetstnens 96 10 4 2 Visa PED Mode Descriptor Section 2 cccscceceeeeeeeseeeeneeceeeeeceneseseneeeseetersanens 97 10 4 3 Application Descriptor Section scccccscceesseceenceceneeesnseeeeneeceneeeesiassseneecenetersanens 98 10 4 4 Secure File Descriptor
14. Code MACing is enabled During the terminal download process if the downloaded certificate file is valid and the download is successful SSA will replace the previous copy if it exists with the new copy The secure certificate file will also be used each time the terminal starts up to authenticate the MAC of the user application s CFS and DFS if the security option Terminal Startup Verify MAC Option is enabled The following section describes how the securing process uses the secure certificate and gives practical considerations for application developers Securing Process The securing process can be used during the validation of the application code files and application data files The secure certificate will be downloaded into the data file system DFS first along with code files and data files The secure certificate contains all security related information and information about all of the code files and data files in the download package The securing process is composed of the following steps 1 The secure certificate is used to validate the complete download of all required download files If Code MACing is enabled downloading any file that is not listed in the secure certificate file causes the download to fail 2 The maintenance application sends a request to SSA to validate the secure certificate file 94 Chapter 10 Secure Certificate Section 10 1 Overview 10 3 3 The secure certificate file is us
15. Domain Name If you are using Ethernet and DHCP is set to None you will need to set the domain name to use Domain names are the human readable addresses used on the Internet e g www microsoft com The Domain Name Service DNS translates these names into IP addresses which TCP IP programs use directly Action Restart the terminal by pressing 1 Cancel Enter simultaneously while the terminal is starting up press 1 3 simultaneously to access the Extended Menu Ingenico 6780 User s Guide 59 Extended Menu Serialnum Inject System Config System Info Supervisor Menu Using the stylus tap Supervisor Menu Enter Password Key password 2 6 3 4 then press Enter Supervisor Menu Change Password Application File Security Sys Parameters Tap Sys Parameters Sys Parameters Download Method Download Port Setup Port Tap Setup Port Setup Port Port1 Port2 Tap Port3 Ethernet Port3 Interface Type Baud Rate Data Bits Stop Bits Parity DHCP Local IP Local IP Port Server IP Server IP Port IP Add Mask Gateway Primary DNS Secondary DNS Domain Name Tap Y until you reach Domain Name then tap Domain Name 60 Chapter 6 System Parameters Menu Section 6 4 Setting Up the Port 6 4 21 6 4 22 6 4 23 Enter the domain name For example to enter A press 2 twice To enter C press 2 four times Updating
16. Ingenico 6780 terminal goes into the online or offline state Ensure that all Ingenico 6780 terminals that have attempted an IBMEFTDL or parameter level upgrade are running the proper levels of software see section 4 2 Finding Version Numbers on page 17 Record discrepancies if any are found to have failed acceptance of the download and note the location of the device If a download fails always conduct a second download attempt and report second failures to your Ingenico Project Manager Check the properties of the communications port to make sure that the interrupt request and input output range has not been changed Ingenico 6780 User s Guide 105 Download Errors 21 Error Opening Port This error message displays on the computer or cash register The following sections list possible causes and corresponding solutions 1211 Communications port that IBMEFTDL is using is already being used by another application Close the other application and run the download file again 121 2 Communications port is not working Try another computer Ask your Ingenico representative to change the batch file to work with the new communications port Change to the new communications port then run the new batch file 121 Hardware settings in i6780 have been changed 1 Check the properties of the communications port to make sure that the interrupt request and input output range has not been changed In Windows 98 or 2000
17. Port Server IP Server IP Port IP Add Mask Gateway Enter the address of the gateway XXX XXX XXX XXX Updating 6418 Setting the Primary DNS If you are using Ethernet and DHCP is set to None you will need to enter the primary Domain Name Service DNS This is used to change Internet domain names and computer names into IP addresses and vice versa DNS specifications require that each domain name is served by at least two DNS servers for redundancy a primary and secondary Display Action Restart the terminal by pressing 1 Cancel Enter simultaneously while the terminal is starting up press 1 3 simultaneously to access the Extended Menu Extended Menu Serialnum Inject System Config System Info Supervisor Menu Enter Password Key password 2 6 3 4 then press Enter Supervisor Menu Change Password Application File Security Sys Parameters Using the stylus tap Supervisor Menu Tap Sys Parameters Ingenico 6780 User s Guide 57 Sys Parameters Download Method Download Port Setup Port Setup Port Tap Port3 Ethernet Tap Setup Port Port1 Port2 Ports Tap Y until you reach Primary DNS then tap Interface Type Primary DNS Baud Rate Data Bits Stop Bits Parity DHCP Local IP Local IP Port Server IP Server IP Port IP Add Mask Gateway Primary DNS Primary DNS Enter the address of the Primary DNS XXX XXX XXX XXX Upd
18. Setting the Auto Detect Retry Ties ccccccccccecesceeseseeseneeceneeessanetseseeceneteraes 64 e IN Hte e A E Sebel E tev Gcenide Scenbleniconstens 65 whabter 7 Diagnostic Menu cccseceeeeeceeseseeeeeeseeeeeees 67 OVGIVIOW sacs eth eee las ota asta alta ee ale hte 67 gt Testing the Display Contrast ccccccccccceeeeeeeeeeeeeeeeeeeeesseeeeeeeeeeenees 67 1 9 testing TNE Keypad sroti cubed ced ieie ei dubtdend kta ded aE 68 TA Testing the Beeper scccncncneeees oes iddei eide teiginiai 68 7 5 Testing the R5232 Connection exc ceetcdetcesicenectleteecesteenecevteteccestceneceetets 69 7 6 Testing the RS485 Tailgate Connection nnnn eee 70 7 7 Testing the USB Port eeir ants dd antunddans sdlacined melee 71 7 8 Testing the Magnetic Stripe Reader ee 72 7 9 Testing the Smart Card Reader eene 73 7 10 Testing the SAMS iscsi cess cst ekcaaatencieied iti teaneiade eae taaaisia ee leaeaaetens 74 7 11 Testing the TOUCH SC CN tins csocaientasin beats lueheqlelen bend alewdenielwbgdolecleaialow bess 75 7 12 Testing Signature Capture w 2 s c2 ced e2csdsbikseidabiGeeeediksieidieleldcdsde eee eaenwebed 76 7 13 Testing Pen Calibration ect coctisetteatscaticcivesdionrsaadiretusntliarienimssdisenseeatte 77 7 14 Testing Finger Calibration ccccccsseesseeeeeeeeeceeeseeeeeeeeeeeeeeeeesseeeeeeees 78 7 15 SCV Verification Ingenico USE only cccceeeeeeeeeeeeeeeteeeeeeeeeeeee
19. Tap Prev to return to the previous menu Ingenico 6780 User s Guide 17 System Info Menu a1 Overview This chapter explains how to navigate through the system info menu to view the following system information check versions of download files operating system SSA and applications check security information such as MACing and view parameter settings 42 Finding Version Numbers This allows you to look up the current version numbers for hardware firmware and software loaded in your terminal Display Action Restart the terminal by pressing 1 Cancel Enter simultaneously while the terminal is starting up press 1 3 simultaneously to access the Extended Menu Extended Menu Serialnum Inject System Config Supervisor Menu System Info Versions Security Info Using the stylus tap System Info Press Enter to select Versions Versions This screen displays the version numbers of the EFTL XXXX download files EFTL and EFTP Talif chip Digitizer loader and application operating system EFIE KERA OS System and Security Application SSA TALIF XX XX maintenance application MNT APP and all other DIG LOADER XX XX XX applications DIG APP XX XX XX Tap Prev to return to the previous menu OS XX XX SSA VARO5 XX XX APP 1 XX XX 18 Chapter 4 System Info Menu Section 4 1 Overview 4s Checking the Security Information This allows you to look up information related
20. bytes Biggest Free Mem Chun 0 bytes Backup SRAM Size 0 bytes Cancel The security options and serial number display When you are finished reading it tap Cancel to return to the previous menu Note Values listed are examples only Chapter 4 System Info Menu Section 4 4 RAM Info Viewing All Parameter Values This menu option allows you to view the current system parameter settings To change system parameters see Chapter 6 System Parameters Menu on page 38 BION Action Restart the terminal by pressing 1 Cancel Enter simultaneously while the terminal is starting up press 1 3 simultaneously to access the Extended Menu Extended Menu Serialnum Inject System Config Supervisor Menu System Info Versions Security Info View Parameters Version Info 1 1 Using the stylus tap System Info Tap View Parameter The current parameter settings display To scroll down to the next screen press When you are finished reading it press Cancel to Key Entry Beep return to the previous menu Enable Key Beep Length Click Key Beep Tone Low Note Your parameter values may be different Device Type Signature Capture LCD Contrast 100 Key Inj Port COM1 Manufacture ID INGNAR Device Type ID 16780N Backlight TMO TMO timeout 11s LCD Backlight 100 Ingenico 6780 User s Guide 21 COM1 AutoDet Res RS485 COM 1AutoDet
21. get the DFS information from the terminal and manually delete any redundant files Go to the Core Menu or Production Menu by restarting the terminal and pressing the top left corner of the screen while the terminal is starting up Select AdvancedOptions enter the password and then select FormatDFS This method will reformat the data file system and delete all existing data files Comm Receive Error This error occurs when the terminal doesn t receive a message from the host within the timeout period To resolve the error extend the Response TMO setting in the terminal or host Ingenico 6780 User s Guide 109 IBMEFT Troubleshooting 13 1 13 2 This section describes how to resolve error messages that may appear on your Ingenico 6780 device display if using IBMEFTDL Card Read Error If the Card Read Error message displays on the device after swiping a card through the MSR Try swiping the card a few more times varying the speed at which the card is physically drawn through the reader Try swiping the card in the reverse direction i e if swiping the card from top to bottom try swiping the card from bottom to top front to back back to front Make sure that you are swiping the card in a straight line i e make sure the MSR card is always touching the bottom of the MSR track If none of these actions work then the MSR card is worn and cannot be read electronically Enter the card number manually
22. host in Tailgate mode If it fails then it will decide that COM1 is working in RS232 mode Therefore the less retry times the less amount of time it will take to auto detect the communications type Display Action Restart the terminal by pressing 1 Cancel Enter simultaneously while the terminal is starting up press 1 3 simultaneously to access the Extended Menu Extended Menu Using the stylus tap Supervisor Menu Serialnum Inject System Config System Info Enter Password Key password 2 6 3 4 then press Enter Supervisor Menu Tap Sys Parameters Change Password Application File Security Sys Parameters Sys Parameters Tap Auto Detect Download Method Download Port Setup Port Auto Detect 64 Chapter 6 System Parameters Menu Section 6 5 Configuring the Host Port Auto Detect Feature Auto Detect Tap AD Retry Times AD On Off AD Timeout AD Retry Times AD Retry Times The current value displays Enter the number of Old Value XXXXX times to retry the auto detection of the Host port Enter New Value from 0 to 10 Editing Parameters Although most parameters can be updated through the menu using the graphical user interface the parameter editor allows you to edit parameters manually by entering the parameter ID number and numeric or alphanumeric value This method is not recommended since it is easy to make a mistake The parameter editor is typically used by developers and technicians
23. lt f gt or the end of the file There must be at least one application descriptor otherwise the secure validation process fails Only the first application descriptor is accepted and parsed within the application section The application descriptor is in the format MAC 12345678 applname dstfilename ext authmethod encrypt srcfilename ext The first field of the application descriptor is the MAC for the application MACz is a text string identifying that the pre calculated fingerprint follows 12345678 is the Hex ASCII representation of the most significant 4 bytes of the MAC applied by the securing utility prior to download appiname represents the application name of the application binary being loaded For instance CA2100_IBMEF dstfilename ext represents the code file name of the application binary file residing in the terminal For instance WW002G011010 authmethod represents the code file authentication method i e the MAC calculation method that the code file used Possible values SHA1 MAC 98 Chapter 10 Secure Certificate Section 10 4 Secure Certificate Descriptor Sections 10 4 4 CBC MAC Use Code Download MAC Key CDMK XOR 0x0000 0000 0000 OOFF for each half of the key to do MAC calculation verification The MAC is calculated before the code file is encrypted If the code file is specified to be encrypted then the calculated data needs to be a multiple of 8 bytes If it isn t the generated encrypted co
24. stylus tap System Config Tap System Date Time Display Contrast Enter Date Key the new date using the format YYYYMMDD 2003 08 22 then press Enter To bypass press Enter re DEF 3 ee Enter Time Key the new time using the format HHMM then 17H21 press Enter The system uses a 24 hour clock To bypass press Enter Note You do not need to enter the H for hour 10 Chapter 3 System Configuration Menu Section 3 1 Overview A fr wZzeuc 6 5 H a B RS lt E N 3 Bs PRS WXY 7 9 11 Ingenico 6780 User s Guide 3 3 3 4 Changing the Display Contrast If you are have difficulty reading your terminal screen you can increase or decrease the contrast This setting is stored in sysPara cfg You can also test the display contrast see Testing the Display Contrast on page 67 Display Action Restart the terminal by pressing 1 Cancel Enter simultaneously while the terminal is starting up press 1 3 simultaneously to access the Extended Menu Extended Menu Serialnum Inject System Info Supervisor Menu Using the stylus tap System Config System Config System Date Time Display Contrast Tap Display Contrast Contrast 100 M The current value is displayed between 0 and 100 To decrease the contrast press the key To increase the contrast press the key When the desired setting is reache
25. the HOST start uloop exe Connect USB Port OK 2 From the terminal press Enter Start PC App then Push OK Key to send USB Diagnostic The results of the test display To exit press MESSAGE n Cancel Send Ingenico 6780 User s Guide 7s Testing the Magnetic Stripe Reader This feature tests the magnetic stripe reader Display Action Restart the terminal by pressing 1 Cancel Enter simultaneously while the terminal is starting up press 1 3 simultaneously to access the Extended Menu Extended Menu Serialnum Inject System Config System Info Supervisor Menu Diagnostic Menu Display Keypad Beeper RS232 Tailgate USB Mag Stripe Reader MSR Using the stylus tap Diagnostic Menu Tap Mag Stripe Reader Swipe a magnetic stripe card Swipe Card Now MSR The terminal displays how many tracks were read 2 tracks read MSR The terminal displays the results of the test for the TrackNumber 2x Status 0x first track read Length 40x MSR The terminal displays the results of the test for the TrackNumber 1x Status 4x next track read Length 54x Diagnostic Menu You are returned to the previous menu Display Keypad Beeper RS232 Tailgate USB WW Feo RS alelemacstsve 1s 72 Chapter 7 Diagnostic Menu Section 7 8 Testing the Magnetic Stripe Reader 7s Testing the Smart Card Reader This feature tests the smart card reader Display Action
26. to be decrypted Possible values Y N If the data file is encrypted it should be encrypted under the variant of CDMK Use Code Download MAC Key CDMK XOR 0x0000 0000 0000 OOFF for each half of the key as the variant of CDMK to do encryption decryption If the data file is specified to be encrypted the MAC value is calculated and then added to the certificate file Next it will encrypt the data using the variant of CDMK If the data file is not a multiple of 8 bytes the last data block will have zeros appended for encryption calculation The number of zeros that are appended to the code file are also appended to the end of the output encrypt file e g adds 4 to represent four zeros An encrypted data file will be generated with extension enc The encrypted secure data file thus consists of two portions The first portion is variable in length depending on the size of the 100 Chapter 10 Secure Certificate Section 10 4 Secure Certificate Descriptor Sections 10 4 5 original application code file It consists of groups of encrypted data Each group is of 8 bytes long If necessary the last group is padded with zeros to make up 8 bytes before encryption The second portion is one byte long Its value indicates the number of zeros padded to the last group of data It is in clear form existence is an option to determine whether the file must exist in terminal memory in order for secure validation to succe
27. to security and key management Display Action Restart the terminal by pressing 1 Cancel Enter simultaneously while the terminal is starting up press 1 3 simultaneously to access the Extended Menu Extended Menu Serialnum Inject System Config Supervisor Menu System Info Versions Security Info Security Info Prompt MAC Key When you are finished reading it tap Cancel to Terminal Based return to the previous menu Using the stylus tap System Info Tap Security Info The security options and serial number display Reinject SN Note Your parameter values may be different Do Not Erase Keys Prompt MACing Disable Code MACing Disable MAC Calculation Double Length Key Atalla KBK Disable Startup Verify MACing Disable PED Mode Disable Financial Key App Based Serial Number XXXXXXXXX Cancel Ingenico 6780 User s Guide 4 4 RAM Info This allows you to look up information on your terminal s memory space Display Action Restart the terminal by pressing 1 Cancel Enter simultaneously while the terminal is starting up press 1 3 simultaneously to access the Extended Menu Extended Menu Serialnum Inject System Config System Info Supervisor Menu Using the stylus tap System Info System Info Versions Security Info RAM Info Tap RAM Info Security Info Total RAM Size 0 bytes Smallest Free Mem Siz 0
28. verifies that only certified applications and files are loaded into the device During security download if Code MACing is enabled all the code files will be authenticated after they are downloaded The authentication method is given in the certificate file which includes NONE SHA1 MAC MAC etc Double Length Key MAC Calculation This option controls how the MAC calculation algorithm operates when the MAC key is a double length key This setting only applies to MAC calculation in financial transactions Possible Encryption Description Values 0 EDE encrypt Double length key encryption on each block of data decrypt Default encrypt 1 E encrypt Single length key encryption on each block of data except for the last block which uses EDE encryption Ingenico 6780 User s Guide 956 Atalla Key Block Protection Option This option controls whether the double length master session key injection is protected by the Atalla key block injection If the option is enabled double length master or session key can only be injected through Atalla key block Possible Status Description Values 0 Disabled No protection is applied Double length master session key can be injected through any format Default 1 Enabled Protection is applied Double length master key and double length session key can only be injected through Atalla key block They cannot be injected through the normal key format Single
29. 168 0 5 Enter the local IP address 64 13 Setting the Local IP Port Number If your terminal is using Ethernet and DHCP is set to None you will need to configure the local IP port for the terminal to use This is a number that is used in TCP IP applications to designate which application the device is communicating with Display Action Restart the terminal by pressing 1 Cancel Enter simultaneously while the terminal is starting up press 1 3 simultaneously to access the Extended Menu Extended Menu Using the stylus tap Supervisor Menu Serialnum Inject System Config System Info Enter Password Key password 2 6 3 4 then press Enter Supervisor Menu Tap Sys Parameters Change Password Application File Security Sys Parameters Sys Parameters Tap Setup Port Download Method Download Port Setup Port Setup Port Tap Port3 Ethernet Port1 Port2 rons Tap Local IP Port Interface Type Baud Rate Data Bits Stop Bits Parity DHCP Local IP Local IP Port 52 Chapter 6 System Parameters Menu Section 6 4 Setting Up the Port Local IP Port Old Value XXXXX Enter New Value Enter the local IP port number 64 14 Defining the Server IP Address If your terminal is using Ethernet and DHCP is set to None you will need to configure the download server s IP address Display Action Restart the terminal by pressing 1 Cancel Enter simultaneou
30. Application Keys The key check value is a hexadecimal value that is used to verify that you have the right key in the terminal You can find a key check value for terminal keys or application keys This section covers application keys Display Action Restart the terminal by pressing 1 Cancel Enter simultaneously while the terminal is starting up press 1 3 simultaneously to access the Extended Menu Extended Menu Using the stylus tap Supervisor Menu Serialnum Inject System Config System Info Enter Password Key password 2 6 3 4 then press Enter Supervisor Menu Tap Security Change Password Application File Security Tap Key Check Value Key Injection Key Check Value Erase App Keys Serialnum Inject Key Check Value Select the type of key check values you want to Term Keys see Application Keys Application Keys Select the application you want APP 1 APP2 34 Chapter 5 Supervisor Menu Section 5 5 Security 5 5 7 APP1 Special Keys M S Keys DUKPT Keys Special Keys The values for the keys you selected display one Secure Text Key of the following three screens will display Special 012345 Keys M S Keys or DUKPT Keys Select the type of keys you want Clear Text Key 123456 M S Keys Master Key 0 XXXXXX Session Key 0 XXXXXX Master Key 1 XXXXXX Session Key 1 XXXXXX etc DUKPT Keys DUKPT Key 0 XXXXXX DUKPT Key 1 XXXXXX etc Erasing Application Keys The
31. Certificate Section 10 4 Secure Certificate Descriptor Sections IBMEFT Download n Prerequisites The prerequisites are The ability to accept downloaded files and store on system A download utility IBMEFT or NCREFT IBM EFT uses an IBM protocol for downloading and NCR uses an NCR protocol for downloading A POS system that supports IBMEFTDL NCREFTDL or equivalent functionality as determined by your project manager Note IBMEFTDL is an Ingenico download utility that runs on the store controller or server It downloads data through the ECR to the Ingenico 6780 using the IBMEFT protocol NCREFTDL is supported and managed directly by NCR for NCR customers 12 Preparation Ensure equipment is functional and in the right place Ensure store network is operational Ensure each cash register is functional and connected to the network Ensure store controller has the ability to manage all download files and interface with each ECR Ensure that each Ingenico 6780 terminal is connected to an ECR Ensure that the application levels are the same in all Ingenico 6780 terminals It is a good idea to download to a small number of terminals first 11 3 Timing To perform a download on an RS232 Type A communication running at 19200 bps it takes approximately 25 minutes 9600 bps it takes approximately 40 minutes Ingenico 6780 User s Guide 103 11 4 11 4 1 11 4 2 Download Process Outline The downlo
32. ETH Domain Name Dial Phone Num Modem Speed 9600 Appl Comment 0 0 0 0 24 Chapter 4 System Info Menu Section 4 5 Viewing All Parameter Values Supervisor Menu s1 Overview This chapter explains how to change the supervisor password check or erase the application file in the terminal and perform the following security functions set key injection port allow key injection check the key value and allow the serial key to be injected s2 Supervisor Menu Password This is the default password for entering the Supervisor Menu Display Action Restart the terminal by pressing 1 Cancel Enter simultaneously while the terminal is starting up press 1 3 simultaneously to access the Extended Menu Extended Menu Using the stylus tap Supervisor Menu Serialnum Inject System Config System Info Supervisor Menu Enter Password Key password 2 6 3 4 then press Enter Ga E Note If an incorrect password is entered the lt message Password Invalid displays then a TD prompt asks you to reenter the password After T three incorrect passwords the application returns EB to the Extended Menu es TUV Ingenico 6780 User s Guide 25 5 3 Changing the Supervisor Menu Password Ingenico recommends that you do not change the Supervisor Menu password If you do change the Supervisor menu password and then forget what that password is the unit will
33. Erase App Keys option lists applications you can choose to delete the keys to these applications The applications listed no longer exist in the terminal but the terminal has found keys that are still associated to them These orphan keys are the only ones that the Extended Menu allows you to erase The i6780 terminal keeps the keys of deleted applications so that if a new version of the application is downloaded the keys for that application will already be loaded in the terminal However if an application is no longer needed the customer may choose to delete the keys using this menu option Display Action Restart the terminal by pressing 1 Cancel Enter simultaneously while the terminal is starting up press 1 3 simultaneously to access the Extended Menu Extended Menu Serialnum Inject System Config System Info Supervisor Menu Enter Password Key password 2 6 3 4 then press Enter Using the stylus tap Supervisor Menu Ingenico 6780 User s Guide 35 Supervisor Menu Tap Security Change Password Application File Security Key Injection Key Check Value Erase App Keys Serialnum Inject Erase App Keys Select the application with the keys you want to App A delete Tap Erase App Keys App Keys Erase Tap Yes or No Erase App A Keys D O Processing Displays if app keys were deleted You are returned to the previous menu 558 In
34. FS manages the storage of all code files in flash devices A configuration file lists all the code files composing and describing an application The System and Security Application manages the CFS Data File System The Data File System DFS manages storage and organization of permanent data The DFS enables each application to create directories and to store data in files inside flash devices The allocation of CFS and DFS in flash memory a total of 8 MB is determined at the factory e g 2 5 CFS and 5 5 DFS Human Machine Interface The Human Machine Interface HMI peripheral allows applications to interface to the human element of the system through the sensory input output devices present in the system such as the display keypad and stylus Memory Management Unit The Memory Management Unit MMU controls memory access permissions aborting illegal accesses It protects the memory of the operating system and of each application so that applications cannot access or destroy data and code in the operating system or in other applications Each application is fire walled from the other applications using the MMU Each application runs in its own MMU virtual context that prevents any other applications from accessing its data The operating system runs inside its own MMU virtual context in supervisor mode Each application runs inside its own MMU virtual context in user mode The MMU translates these virtual addresses into physical addr
35. HOST port which connects to POS terminals can connect to the following protocols RS232 USB PoweredUSB RS485 IVI LAN protocol or RS485 Tailgate protocol North America only The AUX port is RS232 for connecting an auxiliary device such as a printer or check reader The E NET port is for connecting to Ethernet 10 base T TCP IP The ITI port is not used Note For instructions on making these connections refer to the Ingenico 6780 Installation Guide Terminal Architecture I MSR SCR Millenium ASIC Processor User Application System amp Security Application Maintenance Application Digitizer Operating System Processor Store Controller Cash Register Ingenico 6780 Figure 3 Terminal Architecture As illustrated in Figure 3 Terminal Architecture the Millennium ASIC processor runs programs that act as an interface between the ECR and the Ingenico 6780 terminal the Ingenico 6780 User s Guide 81 8 4 1 operating system system and security application maintenance application and user application Operating System The operating system is comprised of several elements Some of the more prominent ones are explained in this section Code File System The operating system is separated in several code files and any application can be implemented as one or several code files Code files can be run and downloaded independently from each other The Code File System C
36. MC stands for SAM micro controller Close all smc slots 74 Chapter 7 Diagnostic Menu Section 7 10 Testing the SAMs Testing the Touch Screen This feature displays a grid When you touch anywhere on the screen a box on the grid is darkened Display Action Restart the terminal by pressing 1 Cancel Enter simultaneously while the terminal is starting up press 1 3 simultaneously to access the Extended Menu Extended Menu Serialnum Inject System Config System Info Supervisor Menu Diagnostic Menu Display Keypad Beeper RS232 Tailgate USB Mag Stripe Reader Smart Card Reader SAM Using the stylus tap Diagnostic Menu Tap Touch Screen This feature displays a grid When you tap the screen a box on the grid is darkened to let you E know where you tapped This allows you to test a portion of the screen you suspect may be having problems To exit tap the X in the top left corner Ingenico 6780 User s Guide Testing Signature Capture 7 12 This feature displays a signature capture screen so you can test how a signature inks and displays on the screen Display Action Restart the terminal by pressing 1 Cancel Enter simultaneously while the terminal is starting up press 1 3 s
37. OM1 Host COM2 Aux COM3 Ethernet Updating Configuring the Host Port Auto Detect Feature 6 5 By default the Host port is set to automatically detect the communications method being used on that port RS232 RS485 IVI LAN protocol RS485 Tailgate protocol USB or PoweredUSB 65 1 Disabling or Enabling the Auto Detect Feature When the auto detect feature is enabled on the host port it will automatically detect the communications method being used on that port By default the Host port s Auto Detect feature is enabled Display Action Restart the terminal by pressing 1 Cancel Enter simultaneously while the terminal is starting up press 1 3 simultaneously to access the Extended Menu Extended Menu Using the stylus tap Supervisor Menu Serialnum Inject System Config System Info Enter Password Key password 2 6 3 4 then press Enter Supervisor Menu Tap Sys Parameters Change Password Application File Security Sys Parameters 62 Chapter 6 System Parameters Menu Section 6 5 Configuring the Host Port Auto Detect Feature Sys Parameters Download Method Download Port Setup Port Auto Detect Auto Detect Press Enter to select AD On Off NBO i ii AD Timeout AD Retry Times AD On Off Tap Auto Detect Select the option you want Off On 65 2 Setting the Auto Detect Timeout You can configure the amount of time after which th
38. On Off OFF COM1 AutoDet TMO 500ms COM1 AutoDet Retry 3 Download Method IBMEFT Download Port Number COM1 Download Port Type RS232 Last download result No Download Host Port Number COM1 Aux Port Number COM2 Press to advance to the next screen COM1 Interface Type RS232 COM1 Baud Rate 9600 COM1 Data Bits 8 COM1 Stop Bits 1 COM1 Parity NONE COM1 LAN Address 104 COM1 Retry Times 3 COM1 Resp TMO 3000ms COM1 Poll TMO 3000ms COM1 TurnArd TMO 3000ms TMO timeout 22 Chapter 4 System Info Menu Section 4 5 Viewing All Parameter Values COM2 Interface Type RS232 COM2 Baud Rate 9600 COM2 Data Bits 8 COM2 Stop Bits 1 COM2 Parity NONE COM2 LAN Address 101 COM2 Retry Times 3 COM2 Stop Bits 1 COM2 Parity NONE COM2 LAN Address 101 COM2 Retry Times 3 COM2 Resp TMO 3000ms COM2 Poll TMO 3000ms COM2 TurnArd TMO 3000ms COMS Interface Type RS232 COMS3 Baud Rate 19200 COMS3 Data Bits 8 TMO timeout COM3 Stop Bits 1 COMBS Parity NONE COMBS Retry Times NONE Ingenico 6780 User s Guide 23 COMS3 Resp Timeout 3000ms ETH DHCP NONE AUTO AUTO ETH Local IP Add 0 0 0 0 ETH Local IP Port 0 ETH Remote IP Add 0 0 0 0 ETH Remote IP Port 0 ETH IP Add Mask 0 0 0 0 ETH Gateway 0 0 0 0 ETH Primary DNS 0 0 0 0 ETH Secondary DNS 0 0 0 0
39. S232 data bits t the character following this parameter is the required RS232 parity setting An n means none parity e means even o means odd parity 2 Write these parameters down 3 Next go the Ingenico 6780 terminal to read the current settings to see if they are the same Restart the terminal by pressing 1 Enter Cancel while it is restarting access the Extended Menu by pressing 1 and 3 simultaneously 4 Select System Info and then select View Parameter The screen displays the current download configuration for the port the terminal has configured to do the download the baud rate data bits stop bits and parity of that port 5 Compare these settings to the IBMEFTDL parameters that you wrote down in step 2 they should be the same If not change them using the following steps 6 From the Communications menu press Cancel twice to return to the Supervisor Menu Enter the password select System Parameters and then select Download Method Select IBMEFT or NCREFT 7 Press Cancel to return to the System Parameters menu and then select Download Port Select the correct download port and correct communication type Ingenico 6780 User s Guide 107 12 3 12 4 12 5 12 6 8 Press Cancel to return to the System Parameters menu and then select Setup Port Select the port to setup and select the correct baud rate data bits stop bits and parity 9 After all the settings
40. SSA API Ingenico 6780 User s Guide 89 9 5 1 9 5 2 9 5 3 Prompts Authentication Key Options This option controls whether the prompt authentication keys are based on the terminal or the application These options will be used when doing any secure data entry When prompt MACing is enabled and the prompts authentication key security option is set to 0 terminal based at data entry time the secure text and clear text prompts will be verified with the terminal based special keys When prompt MACing is enabled and the prompts authentication key security option is set to 1 application based at data entry time the secure text and clear text prompts will be verified with application based special keys Possible Values Description 0 Prompts authentication key is terminal based If Prompt MACing is also enabled the form s prompt display will be authenticated by the terminal based clear text key and security text key Default 1 Prompts authentication key is application based The form s prompt display is authenticated by an application based clear text key or a security text key Change Terminal ID Option This option controls the financial keys existence once the terminal ID is re loaded Possible Values Description 0 Changing Terminal ID will not erase all keys Default Once the terminal ID is re injected through the key injection process the existing keys will be retained 1 Changin
41. Section s nnnnnnnnnoeneeeeeeneenornornneennernnerrnerrnorrnernnee 99 10 4 5 Non Secure File Descriptor S CtION 1 22 cccccceceeeseetseceeeeceeetetseeeseneecsnntetaes 101 10 4 6 Delete Application Code File Descriptor Section ccccsecccecesscecesesseeeeeenseees 102 10 4 7 Delete Data File Descriptor S CtION 22 cccceccceeeeesseceeneeceeeeetseeeseneecsnetetaes 102 10 4 8 Delete Whole Application Descriptor Section ccccsescccesstseeesssceeeseeseeeeeenseees 102 Chapter 11 IBMEFT Download sssssssssnsnununununnnunununununnnnn 103 E a S a IKSO UTEE E A E E E E A S A 103 VARS e Prepari O a ea a e Aa A e EE E AA a AE EEA A AAEE 103 A Misco R a ao acess da E E AEE 103 114 D wnload Processi arenero erneer vec ecenecentcen eeneceneqeaecegenes cepeueneceneeente este 104 11 4 1 OMIM ctr a ce Yad tis i tl uss noire atondeta aes a ational cient 104 11 42 PO CODACKR t aa a aaa aa a a aa aaa aa sade te Aaa Aaaa 104 Chapter 12 Download Errors ccccceceeeeeeeeeeeeeeeeeeeeeeneeeneeeees 106 12 1 Error Opening Port ssssssssseerrerrrrrrrttrrrrtrttrrnttnttttrrrnrrnntrrnnnnnn rnnr ennenen 106 12 1 1 Communications port that IBMEFTDL is using is already being used by another applhicaton iesieta ieii iiaa anada ANELEE Eai ATAA 106 12 1 2 Communications port is not working 1 cc ccccccceceseeesseceeeeecseeeetseetenseeesnetetaes 106 12 1 3 Hardware settings in i6780 have been CHANGEA cccsecceeetecece
42. Security Options 9 5 9 Financial Key Option This option controls whether the financial keys are application based or terminal based Caution If you change this security option previously loaded financial keys will be lost Possible Status Description Values 0 Disabled Financial keys are application based Default For application based financial keys SSA supports 10 Master Session keys and 10 DUKPT keys per application 1 Enabled Financial keys are terminal based For terminal based financial keys SSA supports 64 Master Session keys and 10 DUKPT keys per terminal Ingenico 6780 User s Guide 93 Secure Certificate 10 1 10 2 Overview This chapter is extracted from the NAR Secure Certificate document part 0190 00252 0103 revision 1 03 The secure certificate file is a descriptor of all of the software components that are necessary to make up one or more applications that are going to be downloaded to the Secure PIN Entry Device such as the i6780 Note Terms used in this chapter are explained in Terminal Architecture on page 81 If the secure Code MACing option is enabled the downloaded application must provide what is called a secure certificate file certific txt This file contains security information for every file and application to be downloaded It can also indicate which application code file or data file needs to be deleted This certificate is mandatory if
43. System Architecture The server local or remote sends information to the store controller if present which sends it to each host or point of sale device typically an electronic cash register ECR and each ECR sends it to the Ingenico 6780 terminal attached to it The Ingenico 6780 terminal in turn sends information back through the chain Figure 1 and Figure 2 illustrate the information flow for stores with and without a store controller Server Store Controller ECR Ingenico 6780 ECR ECR ECR Ingenico Ingenico Ingenico 6780 6780 6780 Figure 1 Single Unit Architecture Figure 2 Multiple Unit Architecture Chapter 8 Architecture Section 8 1 Overview 8 3 8 4 Host Connections The point of sale POS system which can be comprised of the server store controller and host devices communicates with the Ingenico 6780 terminal through an RS232 or RS485 serial interface Ethernet LAN or USB depending on the requirements of the host device typically a computer or ECR Data is sent using one of these interfaces over a cable that connects the host device to the Ingenico 6780 terminal The Ingenico 6780 terminal can connect directly to a cash register computer Ethernet LAN or RS485 LAN Peripherals such as check readers and printers can be connected to the AUX port Depending on your configuration there are two to four communication ports The
44. a Right click My Computer then select Properties b Click the Device Manager tab c From the list double click Ports double click Communications Ports and then go to the Resources tab 2 Ensure the settings for COM1 are the default as follows Interrupt Request is 04 Input Output Range is 03F8 3 Ensure the settings for COM2 are the default as follows Interrupt Request is 03 Input Output Range is 02F8 106 Chapter 12 Download Errors Section 12 1 Error Opening Port 12 2 12 2 1 12 2 2 Received 3 NAKs or Timeout in sendVISAPacket This error message displays on the computer or cash register The following sections list possible causes and corresponding solutions Connection between the host and i6780 may be loose Ensure the cables are securely connected Communications port settings and EFT NCR protocol setting in i6780 may be wrong The following procedure explains how to compare the configuration that you have in your IBMEFTDL file to make sure that it is the same as the default setup configuration in your Ingenico 6780 terminal for details see Default Setup Configuration on page 98 1 To find the communication port settings in your IBMEFTDL file open the download batch file search for the keyword ibmeftdl and find the following parameters b the number following this parameter is the required RS232 baud rate d the number following this parameter is the required R
45. a systematic incremental procedure in order to ensure consistency of download on all units in store For assistance in the preparation to implement a multiple unit simultaneous download procedure please contact your Ingenico Project Manager If a power outage or glitch occurs during the download or if you disconnect the Ingenico 6780 terminal during the download the terminal will cease to function If the disruption occurred during the upgrade of the System amp Security Application the terminal will need to be sent to an authorized repair facility for recovery contact your project manager Monitor both the store controller and Ingenico 6780 terminal during the download process If the download fails it will assist troubleshooting efforts to know at what point the download failed and to record what error code displays on either the store controller or on the i6780 terminal display 104 Chapter 11 IBMEFT Download Section 11 4 Download Process To run your batch file 1 2 Ensure the Ingenico 6780 terminals are in the ready state Load files into the store controller s PIN pad program directory Initiate a download from the controller The cashier display details activity and status updates such as Downloading PROG Xxxx or Downloading PARM xxxx The Ingenico 6780 terminal indicates a summary of its activity IBM EFT prog Dowld blk When complete the cashier display reads Closed or Enter Item The
46. ad Method Download Port Setup Port Setup Port Select Port or Port2 Ron By default Port 1 Host Port 2 Aux Port2 Port x Tap Poll TMO timeout Interface Type Baud Rate Data Bits Stop Bits Parity LAN Address Retry Count Response TMO Poll TMO Poll Timeout Enter an amount of time after which the port Old Value 300 should cease polling in units of 1 100 of a second Enter New Value 48 Chapter 6 System Parameters Menu Section 6 4 Setting Up the Port 6 4 10 Setting the Turnaround Timeout The Turnaround Timeout indicates the time a concentrator or a hub will wait between its request for data and a device s response in a poll sequence Display Action Restart the terminal by pressing 1 Cancel Enter simultaneously while the terminal is starting up press 1 3 simultaneously to access the Extended Menu Extended Menu Serialnum Inject System Config System Info Supervisor Menu Using the stylus tap Supervisor Menu Enter Password Key password 2 6 3 4 then press Enter Supervisor Menu Change Password Application File Security Sys Parameters Tap Sys Parameters Sys Parameters Download Method Download Port Setup Port Tap Setup Port Setup Port Port1 Port2 Select Port1 or Port2 By default Port 1 Host Port 2 Aux Port X Interface Type Baud Rate Data Bits Stop Bits Parity LAN Address Retry Count Response TMO Poll TMO Turna
47. ad process is as follows 1 Ensure that all Ingenico 6780 terminals operating in the store are running the same levels of software If they are not take note of the software levels see Finding Version Numbers on page 18 then check with your account manager before proceeding to see if additional testing is necessary 2 Install all of the necessary Ingenico download utility and EFT files to the proper directory on the store controller or server 3 From the store controller initiate the download 4 Sign onto each cash register that has an Ingenico 6780 terminal attached to it The store controller will check for Ingenico 6780 EFT version levels If the EFT version levels differ from the Ingenico 6780 the store controller will detect that and automatically update the software Note For stores that operate 24 hours the process involves going to one unused register at a time until every cash register and every Ingenico 6780 terminal is upgraded Ask store management for cashier assistance to prevent interruption of store operations and facilitate awareness of progress While the download is in process at a terminal it cannot be used to process transactions Feedback Depending on your cash register configuration the i6780 terminal may not be used if PROGxxxx PARMxxxx is displayed during download If no message is displayed in the cashier display debit and credit transactions cannot be processed It is critical to execute
48. an be read by all applications that reside in the terminal s2 Setting the Download Method Use this procedure to select IBMEFT NCREFT Zontalk GEMS or Germany as your download method Display Action Restart the terminal by pressing 1 Cancel Enter simultaneously while the terminal is starting up press 1 3 simultaneously to access the Extended Menu Extended Menu Serialnum Inject System Config System Info Supervisor Menu Enter Password Key password 2 6 3 4 then press Enter Supervisor Menu Change Password Application File Security Sys Parameters Sys Parameters Download Method Download Port Setup Port Using the stylus tap Supervisor Menu Tap Sys Parameters Press Enter to select Download Method 38 Chapter 6 System Parameters Menu Section 6 1 Overview Download Method IBMEFT NCREFT Zontalk GEMS Germany Select the method you want Note The default is IBMEFT Updating ss Selecting the Download Port Use this procedure to select the port you will use for downloading applications Display Action Restart the terminal by pressing 1 Cancel Enter simultaneously while the terminal is starting up press 1 3 simultaneously to access the Extended Menu Extended Menu Serialnum Inject System Config System Info Supervisor Menu Enter Password Key password 2 6 3 4 then press Enter S
49. are updated the terminal will update the system parameter setting when you exit the Extended Menu the terminal will reset Default Setup Configuration IBMEFT NCR protocol selection IBMEFT Download Port Number Com1 Download Port Type RS232 RS232 baud rate 19200 RS232 data bits 8 RS232 parity No parity RS232 stop bits 1 Error Bad Prog The flash memory in the terminal may not match the flash memory requirement of EFTL file Contact your account manager to arrange to have the terminal sent in for repair Device already loaded with program x and parameter y This error message displays on the computer or cash register if the Ingenico 6780 has already been upgraded CRC Error The CRC Error message followed by multiple characters in a string displays on the Ingenico 6780 to indicate that the Security Module has been compromised Notate error to report with issue Notify your Ingenico project m anager immediately and request RMA number authorization to return unit to an authorized repair facility for recovery Chapter 12 Download Errors Section 12 3 Default Setup Configuration 12 7 12 8 Not Enough DFS Space This error occurs during a download if the Ingenico 6780 terminal s data file system does not have enough space to receive any additional download components To resolve the error clean up the DFS to make room for downloads There are two ways to do this Use MLDT or Wingload 32 to
50. art in 3 seconds 78 Chapter 7 Diagnostic Menu Section 7 14 Testing Finger Calibration 7 15 Please touch box Calibrate Finger a Using your finger touch the four box grid The box moves around to the next corner touch again Tip For the calibration to succeed you need to touch the buttons from the side Touch the left buttons with your left hand and the right buttons with your right hand Repeat until you are notified that the test was successful Calibrate Finger Calibration Succeeded You are notified if the finger calibration was successful If calibration failed try again making sure to follow the preceding tip SCV Verification Ingenico use only This test is used by the manufacturer authorized repair centers and deployment centers to verify that the correct configuration has been loaded for the customer You can find the same information by going to the System Info menu and selecting Version Numbers for details see Finding Version Numbers on page 18 Ingenico 6780 User s Guide 79 Architecture 8 2 Overview To understand downloading it helps to understand the architecture of the Ingenico 6780 terminal Terms explained in this chapter are used in the subsequent chapters This chapter explains the system architecture how the unit connects to the host device and the terminal s architecture
51. ating 64 19 Setting the Secondary DNS If you are using Ethernet and DHCP is set to None you will need to enter the secondary Domain Name Service DNS This is used to change Internet domain names and computer names into IP addresses and vice versa DNS specifications require that each domain name is served by at least two DNS servers for redundancy a primary and secondary Display Action Restart the terminal by pressing 1 Cancel Enter simultaneously while the terminal is starting up press 1 3 simultaneously to access the Extended Menu Extended Menu Serialnum Inject System Config Using the stylus tap Supervisor Menu System Info Enter Password Key password 2 6 3 4 then press Enter 58 Chapter 6 System Parameters Menu Section 6 4 Setting Up the Port 6 4 20 Supervisor Menu Change Password Application File Security Sys Parameters Tap Sys Parameters Sys Parameters Download Method Download Port Setup Port Tap Setup Port Setup Port Port1 Port2 Tap Port3 Ethernet Port3 Interface Type Baud Rate Data Bits Stop Bits Parity DHCP Local IP Local IP Port Server IP Server IP Port IP Add Mask Gateway Primary DNS Secondary DNS Tap Y until you reach Secondary DNS then tap Secondary DNS Secondary DNS XXX XXX XXX XXX Enter the address of the secondary DNS Updating Setting the
52. ble length triple DES keys These two Application Special Keys are only used if the Prompts Authentication Key security option is set to 1 application based see section 9 5 1 on page 90 If Prompt MACing is also enabled the Secure Text and Clear Text prompts will be verified with these two keys If the Prompts Authentication Key is set to 0 terminal based the terminal based keys are used instead see section 9 3 on page 87 Key Name Index Length Description of Key Secure Text Entry 1 8 16 This key is loaded encrypted under the KTK Form Authorization All prompts and or screens used for Secure Key Text Entry of the application will be authenticated using this key if the Prompts Authentication Key security option is set to application based 1 Clear Text Entry 2 8 16 This key is loaded encrypted under the KTK Form Authorization All prompts and or screens used for Clear Text Key Entry of the application will be authenticated using this key if the Prompts Authentication Key security option is set to application based 1 942 Master Keys Master keys are loaded encrypted under the KTK or current Master Key For application based financial keys the SSA will have a key structure matrix indexed by application ID The device can accommodate up to ten master keys per application or 64 master keys per terminal Each key is independent and used to transport the corresponding working session key Available indexes for master keys are 0 9 per app
53. ble within each menu Chapter 3 System Configuration Menu explains how to perform the functions in the system configuration menu change date and time set display contrast and adjust beep tones Chapter 4 System Info Menu explains how to navigate through the system info menu to view the following system information check versions check security info and view parameters Chapter 5 Supervisor Menu gives the password to enter this menu and explains how to change the password It explains how to check or erase the application file in the terminal and how to perform the following security functions set key injection port allow key injection check the key value and allow the serial key to be injected Chapter 6 System Parameters Menu explains how to indicate the download method set the download port setup the port and configure the host port s auto detect feature Chapter 7 Diagnostic Menu explains how to perform diagnostic tests on the display keypad beeper communications MSR smart card reader SAMs touch screen and signature capture Chapter 8 Architecture explains the system architecture host communications and terminal architecture It explains the components inside the terminal that are referred to in subsequent chapters Chapter 9 Key Architecture explains the sponsor key KTK terminal based keys application based keys and security options such as MACing Chapter 10 Secure Certificate explains th
54. c cccccceccceeseeeeeeeeeeeeeeeeeeeeeeeeeeeeeesetereeeeeses 38 Selecting the Download Polt 2 cccccccendecetecneeceteendeceteeneeeeteendeeetenneeenneene 39 Setting Up the POM serisesssereeninaninanireni dette nanira nnana ranan nanan naaa Ena 40 6 4 1 Selecting the Download Interface Type 1 ccccccceeeeseseseeneeceneeessaneteneeessnntetaes 40 6 4 2 Setting the Baud RatG miisismim sieniniai iiaei iaiaaeaia riinas iiiaae iaaa 41 6 4 3 Setting the Data Bits sirrssismi miniin ai aaeain tei bin viedo eta Eiana 42 6 4 4 Setting the Stop Bits iis seis nee aeann i aea iiaeaa ainda Tiainen betes 43 6 4 5 Setting the Parity activo noe ink esl hee et ieee eee 44 6 4 6 Defining the LAN ACOYV SS 11 2 ccccsccecescsseseceeeeecenesesaeecsennecssetsaseseneecsnnnesaes 45 6 4 7 Setting the Retry COUN cccssccccscecesnecesnsesnsecseneecenesesnaaecseneesenessssaseseneecsnnnersaes 46 6 4 8 Setting the Response TIMCOUL ccccceeccessseceeeeceneteenaeeesneeceneeetsaeteeneecsnneetaes 47 6 4 9 Setting the Poll TiM OUt 1 ccccscccesececesecsenseceeeeecenecessaeecseneecenetsnaeeseneecsensesiaes 48 6 4 10 Setting the Turnaround Timeout 1 ccccccccencecenceceseeeenseceeeeeceeeeeseeecseaeecseneetsaes 49 64 11 Enabling DHCP it sii Bendis Mia ais eh at a A led ad eae 50 6 4 12 Defining the Local IP ACCT SS sscccccsccceseecenececeseesenseceeatectenstsaeessneecsnnentaes 51 6 4 13 Setting the Local IP Port NUMDGL 2 cccccc
55. cation development environment In the North American market standard user applications include the Retail Base Application JavaPOS and OPOS A user application accesses secure functions such as the display screen screen buttons terminal keys and signature capture through the security module of the SSA For all other functions such as port communications smart card and magnetic stripe reader the user application accesses the operating system directly Digitizer The digitizer is a chip with software on it that handles the interface with the user It receives finger and stylus input from the display screen which it sends to the operating system where it goes first to the human machine interface to be processed The HMI sends the data to the SSA for security screening The SSA sends it to the user application Transmitting Data The operating system receives commands from the host through a port magnetic stripe reader MSR and smart card reader and sends them to the user application Secure functions such as display screen screen buttons terminal keys and signature capture are sent to the SSA for security screening before being sent to the user application The user application controls the terminal through customer specific forms and prompts that it sends to the SSA for security screening The SSA then sends the data to the display screen The user application uses the operating system to send and receive messages to the ho
56. ccesceceseeeenseceeeeecenetetesaeeseseecenneetiaes 52 6 4 14 Defining the Server IP ACVCSS 1 ccccccccssceceeececeeeeeeneeceeeeecseestseeeseneetsnneetaes 53 6 4 15 Setting the Server IP Port NUMDED 1 c scccccscceceseeeeseececeeeceneeetsaeeeeeneesenneetaes 54 6 4 16 Setting the Subnet MASK u ccccccccsecccessecseeeceneceseaeessaaeecenesessaesssnsecseneessnntesaes 55 6 4 17 Setting the GatOway sccccsccccssececsesesnsecseececenenecaaecseneecsensessansesasecseneessnnsesaes 56 6 4 18 Setting the Primary DNS uu ssccccscccceecceesseceseeceneneceaeessaaeecsnenessanstsneecseneecsnnsesaes 57 6 4 19 Setting the Secondary DNS sccccceccecseeceeneeceneeecneeeenaececneeeseeseeeeeseneecsnnsetsaes 58 6 4 20 Setting the DOMAIN NAMe 1 ccscccceecceesseceeneeceneteceeeseeeeceneeetsasetsnaecseneetsnneetiaes 59 6 4 21 Setting Up the Phone Number to Diall 2s cccccccccesceessseceeneeceneeetssesseneessnneetsaes 61 6 4 22 Setting Up the Modem Speed sccccsccccesceceeeeeceneesenseeseneeetenesteneneseneessnntesiaes 61 6 4 23 Changing the Position of the Host Port Or AUX POft ccccccsccccessssceseeeseeeeseeees 61 Configuring the Host Port Auto Detect Feature ccccceeeeceeeeeeeeeeeeeees 62 6 5 1 Disabling or Enabling the Auto Detect F Qture ccscccceecccsssecesneceneeetsnneeeaes 62 6 5 2 Setting the Auto Detect Timeout ccccccccssceceeneeceseeessseeeeneeceeneessaeseeneecennsesaes 63 6 5 3
57. d press Enter to accept and return to the configuration menu Note If you press Cancel or Clear the contrast setting is not changed Note The terminal modifies contrast settings automatically when temperatures vary Adjusting the Display Backlight Brightness You can adjust the brightness of the backlight on the display screen DIREN Action Restart the terminal by pressing 1 Cancel Enter simultaneously while the terminal is starting up press 1 3 simultaneously to access the Extended Menu Extended Menu Serialnum Inject System Info Supervisor Menu Using the stylus tap System Config 12 Chapter 3 System Configuration Menu Section 3 3 Changing the Display Contrast 3 5 3 5 1 System Config System Date Time Display Contrast Key Press Beep Tap Display Backlight Backlight 100 M Vv To adjust the backlight brightness Press to increase the brightness Press to decrease the brightness Press Enter when finished Changing the Beep Tones You may disable enable or change the beep tones that sound when keys are pressed These settings are stored in sysPara cfg To test the beep tones see Testing the Beeper on page 68 Enable Disable Beep Tones Display Action Restart the terminal by pressing 1 Cancel Enter simultaneously while the terminal is starting up press 1 3 simultaneously to access t
58. de file will have zeros appended at the end of the file for MAC calculation encrypt represents whether the code file is encrypted and needs to be decrypted Possible values Y N If the code file is encrypted it should be encrypted under the variant of CDMK The applied variant method is use CDMK XOR 0x0000 0000 0000 FFOO for each half of the key to do encryption decryption If the code file needs to be encrypted the MAC value will be calculated and it will be added to the certificate file Next it will encrypt the code using the variant of CDMkK starting from address 0x0200 the code file header is not encrypted If the code file is not a multiple of 8 bytes the last data block will have zeros appended for encryption calculation The number of zeros that are appended to the code file are also appended to the end of the output encrypt file e g adds 4 to represent four zeros An encrypted code file will be generated with extension enc The encrypted application code file thus consists of three portions The first 0x0200 bytes i e 512 bytes are the first 512 bytes of the original application code file in clear form The second portion is variable in length depending on the size of the original application code file It consists of groups of encrypted data Each group is of 8 bytes long The last group is padded with 0 s to make up 8 bytes if necessary before encryption The third portion is one byte lon
59. e Ingenico 6780 s key architecture A default key is used for the highest level Sponsor Key KTK Key Transfer Key Customers can change the sponsor key Figure 4 shows the sponsor key under the terminal ID because the sponsor key is unique per terminal All keys indicated are loaded by the financial institution or authorized injection facility The cryptographic keys must be injected into the i6780 terminal in a Key Secure Room The KTK is the only key that can be transported in the clear between the Key Injection Utility and the device The rest of the keys may be generated randomly entered in the system as cryptograms or entered by key parts using principles of both split knowledge and dual control Use a key injection utility such as Ingenico s WinKeyFac software program to perform these functions and to set security options see Security Options on page 89 Financial keys Master Session and DUKPT can be based on an application or a terminal By default all financial keys are based on an application as shown in Figure 4 By changing the value of the Financial Key security option see Financial Key Option on page 93 you can make all financial keys based on a terminal however this will erase all previously injected financial keys Some keys are segregated by application The application number is part of the application name Once the keys are injected the application number is used as the application reference When t
60. e securing process and the components of the secure certificate Chapter 11 BMEFT Download explains the prerequisites preparation timing and steps involved with the IBMEFT method of downloading Chapter 12 Download Errors explains how to resolve errors that might be encountered during an IBMEFT download Chapter 13 BMEFT Troubleshooting explains how to resolve error messages that may appear on your Ingenico 6780 display if using IBMEFTDL Conventions Used in this Manual The following table explains the conventions used in this manual Chapter 1 Introduction Section 1 3 About this Manual 1 5 2 1 5 4 Convention Use Example Brackets Highlights a key to press on the terminal 1 Bold Highlights text that displays on the computer screen My Computer Code Highlights coding used in descriptors MAC 12345678 Italic Highlights book titles important terms variables appiname Kits The following kits are available from your Ingenico representative including integration and development kits used to write custom applications to run on the Ingenico 6780 terminal Basic Installation Kit The Basic Installation Kit consists of an Ingenico 6780 terminal and an Ingenico 6780 to ECR cable Refer to the Ingenico 6780 Installation and Operations Guide for detailed instructions on installing the unit Store Installation Kit The store installation kit consists of the contents of the Basic Installation K
61. e unit will cease trying to automatically detect the communications in Port 1 in units of 1 100 of a second Display Action Restart the terminal by pressing 1 Cancel Enter simultaneously while the terminal is starting up press 1 3 simultaneously to access the Extended Menu Extended Menu Serialnum Inject System Config System Info Supervisor Menu Enter Password Key password 2 6 3 4 then press Enter Supervisor Menu Change Password Application File Using the stylus tap Supervisor Menu Tap Sys Parameters Security Sys Parameters Download Method Download Port Setup Port Auto Detect AD On Off AD Timeout AD Retry Times Tap Auto Detect Tap AD Timeout Ingenico 6780 User s Guide AD Timeout Old Value XXXXXXXXX Enter New Value Enter the amount of time after which the unit will cease trying to automatically detect the communications in the Port 1 in units of 1 100 of a second 65 3 Setting the Auto Detect Retry Times The Auto Detect Retry Times indicates how many times the terminal will attempt a communications protocol before trying the next one on the list For example if it is set to 3 when the terminal starts up it will try 3 times to connect to the HOST in USB mode If it fails then it will try 3 times to connect to the HOST in RS485 mode If it fails then it will try 3 times to connect to the
62. ed Y indicates that the file must exist If Y is selected and the file exists but does not validate then the secure process fails N indicates the file need not exist If N is selected then the file optionally may or may not exist for validation to succeed srcfilename ext represents the full or relative DOS path and file name that the data file binary resides in This field is not used by the secure process but may be used by the securing utility Note When Visa PED Mode is on the BIN configuration file has to be included in the Security File Section and the applname should be SSA Non Secure File Descriptor Section The non secure file descriptor section is an area of the secure certificate file that contains information pertaining to the files that do not require secure fingerprint validation All files of an application that have not been defined in the secure file section must be defined in the non secure file section The non secure file descriptor section begins with the descriptor NonSecFiles lt cr gt lt lf gt This section ends with the start of the next section header i e encountered by lt cr gt lt f gt or end of the file The non secure file descriptor is in the format appliname filename ext class existence appiname represents what application this data file belongs to filename ext represents the relative path and file name where the data file will reside in the UNICAPT 32 file sys
63. ed Menu and includes a chart of menu options Subsequent chapters explain how to perform functions in the Extended Menu The Extended Menu descriptions are current as of SSA VARO5 version 2 36 22 Accessing the Extended Menu To access the Extended Menu Restart the terminal by pressing 1 Cancel Enter simultaneously while the terminal is starting up press 1 3 simultaneously to access the Extended Menu 23 Navigating the Extended Menu The current menu name displays on the first line and the menu options appear on subsequent lines To press a screen button use your finger or the stylus To select a menu item tap it using the stylus or use the keys to select see following table Note Because the menu items are small touching a menu item with your finger to select will not work use the stylus instead Or you may use the following keys to navigate the menu Keys Action USA Canada Europe Scroll down one item Scroll up one item X Enter X OK X Enter Initiate selected menu option lt Clear lt Corr lt Clear No effect in the Extended Menu O Cancel O Can Ann O Cancel Return to the previous menu If you are at the Extended Menu return to application s idle prompt Note As you can see in the table there are three sets of keys one for each region This 4 Chapter 2 Extended Menu Overview Section 2 1 Overview manual will refer to the keys by
64. ed to validate the signature of code files and data files as soon as they are installed The secure certificate can also be accessed as needed throughout the download procedure 4 Ifthe download is successful the secure certificate file will be erased from a temporary location and updated into SSA s memory Secure Certificate Text File The secure certificate is a text file that contains security information for a download package Once the text file is constructed it must be passed through a securing utility which generates the MAC of the certificate The utility will also generate MACs for all of the software components described in the certificate The secure certificate contains all the security information necessary for SSA to determine if the downloaded application is eligible to upgrade The secure certificate is also a descriptor of all the software components that are necessary to make up a download session In effect the secure certificate represents an application descriptor file that contains secured fingerprints for each of the software components representing the application The following is an example of a secure certificate text file MAC 12345678 VisaPEDMode ls Appl MAC 12345678 applname dstfilename ext authmethod encrypt srcfilename ext SecFiles MAC 12345678 applname dstfilename ext class authmethod encrypt existence srcfilename ext MAC 12345678 applname dstfilename ext class authmethod encrypt ex
65. eeeeetess 79 Chapter 8 Architecture cee 80 8 1 OVGIVICW 200 2 lec le ied tale pul ete Re eee eA tee end ld 80 8 2 System Architecture acc cacti tacc eile laia lindane eae 80 Bo FIOSE COMMGCHOMS G a2 estes cost nevtcesccmscenccesnceocees samoccuce eoneeetgeanuececesanexsceueces 81 8 4 Terminal ArCWntGCUre n2icac etek eee eee asian bes 81 8 4 1 Operating Systems rdr Aidt kein diese in atin a Does able ae Aes 82 8 4 2 DIQUUIZO ERE IEE EEE I E E eb pate E Sea ete ieee 84 8 4 3 FRANSIMRUNG Data rE AAN a EE a TTE EN 84 8 5 Download File Architecture cccccccccccssseeccccceeeeceesseeeeeesseeeeeeessaeeeees 85 vhapter 9 Key Archit Cture vinci fccccceccccceccceceditcctececesesecesecese 86 OVE IVIGW 2h 2 Bi ect ches as tcl ti ees Ie eat SN aM OS 86 o Sp nsor Key KTK oe a rl a re ate te nae na te ENa n AAK EARE AAR Taa 87 9 3 Terminal Based Keyser aeiee e eE eaea 87 9 4 Application Based Keys ccccccccccseeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeaaeeneeeeeeeees 88 9 4 1 SPECIA KEV Saiz ees sasiivcessadcctestancwesssa cece saandeess T A er Ae TRES 88 9 4 2 Master Keys TuTo TAEA E pete lebeieereitatel tienes E 88 9 4 3 Session KOS danarra aa adsdesesieesivssnandodensnsedbaasussosensacdevistaadvienesets 89 9 4 4 DUK PT KES oier e a ESAE A AARATI OAE EIA AETA AOSS 89 9 57 S6C OpIONS aan 4 eos e cos Ah E N EE ER 89 9 5 1 Prompts Authentication Key Options ccccccccececeseeeseseeteeecsneeessaneeeeneecseneetaes
66. enu Systeni Config Tap Backlight Change Date Time Display Contrast Key Press Beep Backlight On Off Backlight Select Always On or Always Off Awaye on For instructions on how to set the idle timeout for Always Off the backlight see the following section Idle Timeout System Configuration Updating Backlight The current value displays in reverse video Always On Tap Prev to return to the previous menu WEN ERO Idle Timeout 16 Chapter 3 System Configuration Menu Section 3 6 Turning the Backlight Off 3 6 2 Setting Backlight to Off When Idle When the terminal is not in use this option allows you to set an amount of time after which the backlight on the display screen automatically turns off When a customer or process engages the terminal the backlight is turned back on DIREN Action Restart the terminal by pressing 1 Cancel Enter simultaneously while the terminal is starting up press 1 3 simultaneously to access the Extended Menu Extended Menu Serialnum Inject System Config System Info Using the stylus tap System Config System Config Change Date Time Display Contrast Key Press Beep Backlight Tap Backlight Backlight Always On Always Off Idle Timeout Tap Idle Timeout Idle Timeout s Old Value Always On Enter New Value Enter the new timeout value in seconds System Configuration Updating Backlight Always On Always Off Idle Timeout PREV
67. es Bees 2 1 4 Conventions Used in this Manual csc ccce nd cece ecccecd ude cecd ceed ccc edd eeceeusce 2 19 TRUS ch esearch R RT Data Daca tah Da 3 1 5 1 Basie instalation Ko raian an aaa EA a deg DAAT EEI ATENA EA A 3 1 5 2 Store Installation Kit anastasia adar eaii ei aaia 3 1 5 3 Retail Base Application Integration Kit cccsccccssececessseeeeesnteeeceenieeeesenneeeeeenees 3 1 5 4 OPOS Software Development Kit ccccccccsscceceeceneeeeseeceeneeceneeessaesseneeseeeeeseneees 3 1 5 5 JavaPOS Software Development Kit s snsnsnsnnrnrnrnsnenenerererereeeerennnenenenerennrnenenes 3 1 5 6 UNICAPT 32 Software Development Kit ccccccssccecseeceeneeceseeteneeeeeseesseeeesnneees 3 sapier 2 Extended Menu OvervieW ssssssssssssnsnsnsnnnnnnnnnnnnn 4 OVETVIGW EE EEEE EEEE AEEA EEEE 4 Accessing the Extended Menu ssssssssseeeseeeesssssesssssssesesesersersererserrrrrererrenne 4 2 3 Navigating the Extended Menu 4 2 4 Finding the Current Setting ox ve cectccnetetcenteentceetesatcenteestdeeteteedentcentceetcanet 5 2 5 Finding Options in the Extended Menu 5 el i 3 System Configuration Menu cccceeeeeeeeeees 10 OOVST VIG E E AE EE cave stat awa A T AE E O rein gier esos makes 10 gt Changing the Date and Time 22 cccccceeececeeeeeeeeeeeeeeeeeeeeeteeeeneneneneneeees 10 3 3 Changing the Display Contrast eee 12 3 4 Adjusting the Display Backlight Brightness nn 12 3 5 Cha
68. esses The MMU presents the physical memory locations to a program so it can access the code and data This partitioning prevents any application from accessing other application data or operating system data All applications are linked at the same virtual address using the MMU This allows independent development of all applications using the same framework However communications between applications are not completely prevented they are managed through the application manager peripheral Application Manager Peripheral The Application Manager Peripheral is the main component of the multi application management system It is in charge of the management of all UNICAPT 32 native applications which run in the operating system simultaneously The application manager peripheral provides mechanisms that allow synchronization between applications and exchange of data 82 Chapter 8 Architecture Section 8 4 Terminal Architecture System and Security Application The System and Security Application SSA has two modules The system module contains the terminal s Extended Menu where users can change options related to downloading diagnostics system parameters and system configuration The security module implements all security requirements such as key injection and key management The cryptography functions of the operating system including key storage areas are only accessible to the security module The security module provide
69. etsteeeeeenneees 106 12 2 Received 3 NAKs or Timeout in sendVISAPacket eeeeeeeeeeeee 107 12 2 1 Connection between the host and i6780 May be l00SC sccceecessteceeteeetsees 107 12 2 2 Communications port settings and EFT NCR protocol setting in i6780 may DEWGONG sisese aces sat estas sk atenan EA RR 107 12 3 Default Setup Configuration s c 2 c 2 2002s Belk eect esate ne eetnesdene 108 12 4 Error Bad Prog nce ceo ee a a a e 108 12 5 Device already loaded with program x and parameter y eeeee 108 T2 6 e ORO EO T Su a he e anda a AAE A ea a 108 12 7 Not Enough DFS Space 2 000 eeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeee 109 12 8 Comm Receive EXTON oere cen cceecenerenecenecenecenecentceussenecenesentceneseneceseceueceste 109 Chapter 13 IBMEFT Troubleshooting sssssssssssnennnnnnnnnnnnnn 110 13 1 Card Read Erorr aa eana eaaa aA E ARARE EEEE AEA Eint 110 13 2 EFT Device Not Available o 3s scc c2 ccsccsccesncesceacacdsececeeetscedesenecesasedereceuenes 110 13 3 EFT Device Not Available During Check Authorization 0000000000 111 Revision History Date Changes Manual Revision Initial Release Introduction 11 Payment Types The Ingenico 6780 customer input terminal supports payment information processing and authorization at the point of sale POS in your business With the appropriate application software the Ingenico 6780 terminal supports the following payment types Cred
70. g Its value indicates the number of 0 s padded to the last group of data It is in clear form Note Code file 0 won t be encrypted even if the encrypt field is specified to be yes srcfilename ext represents the relative or full path of the code file residing in the computer For instance code WW002G011010 This field is not used by the secure process but will be used by the securing utility Secure File Descriptor Section The secure file descriptor section is an area of the secure certificate file that contains information pertaining to the files that require secure fingerprint validation By being able to define the files that require fingerprint validation the developer can maintain some level of control over what and how much of the application needs to be validated If an application has parameter files that could change dynamically from an external source then these files can be defined in the non secure section thus escaping the rigors of fingerprint validation The securing party has ultimate control Ingenico 6780 User s Guide 99 over whether to accept or reject such a configuration This decision is made prior to MACing the secure certificate The secure file descriptor section is found after the identifier SecFiles lt cr gt lt f gt and before the next section identifier i e encountered by lt cr gt lt f gt or end of the file The secure file descriptor is in the format MAC 12345678 a
71. g Terminal ID will erase the keys Once the terminal ID is re injected all of the financial keys including Master Session and DUKPT keys will be erased Prompt MACing Prompt MACing controls how a data entry form s display prompts are shown Possible Status Description Values 0 Disabled Prompts are not authenticated before being displayed the screen Default 1 Enabled Prompts are authenticated and then displayed on the screen Prompt MACing uses a key that depends on how the form prompt authentication option is set If set to 90 Chapter 9 Key Architecture Section 9 5 Security Options 9 5 4 9 5 5 Terminal based Prompt MACing will use terminal based clear text key if the form is set to clear text entry It will use the terminal based security text key if the form is set to secure text entry Application based Prompt MACing will use application based clear text key if the form is set to clear text entry It will use the application based security text key if the form is set to security text entry Prompt MACing will be used to authenticate the prompts during the data entry process and the load font process Code MACing Code MACing controls how code files are updated Possible Status Description Values 0 Disabled No authentication is performed on code file updates Default 1 Enabled Special authentication is performed on code file updates Code MACing
72. he Extended Menu Extended Menu Serialnum Inject System Info Supervisor Menu Using the stylus tap System Config System Config System Date Time Display Contrast Display Backlight Key Press Beep Tap Key Press Beep Beep Tone Status To turn on key press beeps tap Enable To turn off key press beeps tap Disable Disable Key Beep Tap Prev Length To change the beep length or tone see the Tone following tables Note Prompt displays if you selected Enable Ingenico 6780 User s Guide 13 35 2 Changing the Beep Length This option allows you to change how long the beep sounds on key press To hear what each beep sounds like see Testing the Beeper described on page 68 Display Action Restart the terminal by pressing 1 Cancel Enter simultaneously while the terminal is starting up press 1 3 simultaneously to access the Extended Menu Extended Menu Using the stylus tap System Config Serialnum Inject System Config System Info Supervisor Menu System Config Tap Key Press Beep Change Date Time Display Contrast Display Backlight Key Press Beep Beep Tone Status Disable Key Beep Length Tone Beep Length Select the option you want Short Long Key Beep You are returned to the previous menu Length Tap Prev to return to the previous menu Tone 14 Chapter 3 System Configuration Menu Section 3 5 Changing the Beep Tones
73. he application calls a cryptographic function it passes the application reference as the application name The SSA will check that the caller passes the application name and from the name it will determine the number that defines the injected key set Single length DES keys have a length of 8 bytes Double length triple DES keys have a length of 16 bytes The evel of the specific key set indicates the position of the key set in the internal key hierarchy For example keys at Level 1 sponsor keys are loaded in clear text and sit at the top of the key hierarchy Keys at Level 2 are loaded encrypted under the keys at Level 1 Keys at Level 3 are loaded encrypted under the keys at Level 2 Loading a key at a higher level will cause the erasure of all the related lower level keys The following sections describe each key 86 Chapter 9 Key Architecture Section 9 1 Overview Terminal Based Keys Variant Keys Security Options Clear Text Key Secure Text Key App Download Authorization Key Authorization Terminal ID Sponsor Key Authorization Keys Application Based Keys Financial Keys Master Session DUKPT Figure 4 Key Architecture APP 1 Clear Text Key 22 Sponsor Key KTK Index Length APP 1 Master Key 1 0 APP n Master Key APP n DUKPT Key APP 1 Session Key 1 0 0 bs Description of Key
74. heck to make sure the Ingenico 6780 is on and is displaying the first prompt screen of your application software 2 On the register press the Clear key and select the transaction type again If the problem persists continue to step 3 3 To restart the Ingenico 6780 device press Cancel 0 Enter simultaneously The Ingenico 6780 restarts and the first prompt screen of the application software displays 4 On the register press the Clear key and select the CHECK transaction type The Ingenico 6780 should now be at the first prompt screen of your application software i e it now reads Please Slide Card If not sign off the register and then sign on again Ingenico 6780 User s Guide 111
75. imultaneously to access the Extended Menu Extended Menu Using the stylus tap Diagnostic Menu Serialnum Inject System Config System Info Supervisor Menu Diagnostic Menu Diagnostic Menu Tap until you reach Signature Capture then tap Display Signature Capture Keypad Beeper RS232 Tailgate USB Mag Stripe Reader Smart Card Reader SAM Touch Screen Signature Capture This feature displays a signature capture screen Clear so you can test how a signature inks and displays on the screen When finished tap OK Please sign with pen 76 Chapter 7 Diagnostic Menu Section 7 12 Testing Signature Capture Testing Pen Calibration Your terminal was calibrated by the manufacturer and you will not need to recalibrate it This feature is for use by repair facilities If they replace the glass on the display screen or if they run a production test application they need to recalibrate the terminal Display Action Restart the terminal by pressing 1 Cancel Enter simultaneously while the terminal is starting up press 1 3 simultaneously to access the Extended Menu Extended Menu Serialnum Inject System Config System Info Supervisor Menu Diagnostic Menu Diagnostic Menu Tap V until you reach Pen Calibration then tap Display Pen Calibration Keypad Beeper RS232 Tailgate USB Mag Stripe Reader Smart Card Reader SAM Touch Screen Signature Capture Pen Calibration Please remove hands objects from aro
76. inal Keys The key check value is a hexadecimal value that is used to verify that you have the right key in the terminal You can find a key check value for terminal keys or application keys This section covers terminal keys DIEGEM Action Restart the terminal by pressing 1 Cancel Enter simultaneously while the terminal is starting up press 1 3 simultaneously to access the Extended Menu Extended Menu Serialnum Inject System Config System Info Supervisor Menu Using the stylus tap Supervisor Menu Enter Password Key password 2 6 3 4 then press Enter Supervisor Menu Change Password Application File Tap Security Security Key Injection Erase App Keys Serialnum Inject Tap Key Check Value Key Check Value Application Keys Select the type of key check values you want to see Terminal Keys Special Keys M S Keys DUKPT Keys Select the type of terminal key Special Keys KTK XXXXXX Secure Text Key XXXXXX Clear Text Key XXXXXX Download Key XXXXXX The values for the keys you selected display one of the following three screens will display Special Keys M S Keys or DUKPT Keys Ingenico 6780 User s Guide 33 M S Keys Master Key 0 Session Key 0 Master Key 1 Session Key 1 etc DUKPT Keys DUKPT Key 0 DUKPT Key 1 etc 5 5 6 Finding the Key Check Value
77. ion File in MermniMalcccsvoca esasedeiacare cacesnetevacdundecactnelevecivedevnderwenty 27 5 4 1 Reading the Application File oo cesesccccessseceeeenneeeeeeneeesesaeeeeeseaaeeesneaseeeteesaeerene 27 5 4 2 Erasing the Application Fila Satni nmin eisien aee iae niania dapin 28 DO CUM DY EAA EE EE E ERATE 29 5 5 1 Setting the Key Injection POFt cccccccceecceesseceeneeceneeesnaeeeeneeeteneetsaeeseneeeenneetaes 29 5 5 2 Injecting Keys iros tecessci tevin heeeiges oie to neces de Asan eed vente ots baste Eves ei dianar 30 5 5 3 Setting the Key IN X 00 ssecccescccesceceseecesnesenaecseneecesaessenaeceeneeseeetssaseneneecsensetaes 31 5 5 4 Setting the Application Number cccccccesseceeececeeeeeseeeseneeceneeessnaeeeeneecsnnsesaes 32 5 5 5 Finding the Key Check Value Terminal K YS cccccccsscecesseesssssseseessneetsees 33 5 5 6 Finding the Key Check Value Application K YS ccccccsscccssssseseecesseetstneteaes 34 5 5 7 Erasing Application Keys cssccccscccccececeseeesnsecceneeceneeesaeseseneecseeessaesseneeeseneesaes 35 5 5 8 Injecting a Serial NUMDGL ccccccccccceceeeeeenseeeeeeeceneeesaetsceeeecseeteaeseeneeesensetaes 36 System Parameters ozs docccece cocks cramecteceepeeuictebeheeer deeb enceaseceeetepereeeeeseteneeepeees 37 Chapter6 System Parameters MeNu ccccssssessssees OO 6 1 6 2 6 3 6 4 6 5 6 6 COVOIVIGW EEEE E EE Gadha see AE A AEE 38 Setting the Download Method c
78. iple DES keys Similar to the master keys the device supports four types of working session keys Key Name Description of Key Working session This key is loaded encrypted under the corresponding Master Terminal PIN Key Terminal PIN Key It is used to encrypt the customer PIN for WTPk transmission to the host Working session This key is loaded encrypted under the corresponding Master Message Message Authentication Code Key It is used to authenticate the Authentication customer transaction Code Key WMACK Working session This key is loaded encrypted under the corresponding Master Communication Communication Key It is used to encrypt customer transaction Key WCk data between the debit terminal and the host Working session This key is decrypted by the Master Atalla Variant Key which is Atalla Key created from the Master Atalla Key according to the type of operation to be performed DUKPT Keys The Initial PIN Pad Keys IPPKs are loaded encrypted under the KTK The device can accommodate up to ten separate DUKPT engines Each engine is initialized with an IPPK Available indexes for the DUKPT engines are 0 9 The IPPKs can be both single length DES keys and double length triple DES keys Security Options This section provides a synopsis of each security option All the security options can be loaded during key injection The user application can request the security options setting from an
79. iptor section is an area of the data file that contains information pertaining to the files to be deleted The delete data file descriptor section begins with the descriptor DeleteFiles lt cr gt lt lf gt The section ends with the start of the next section header i e encountered by lt cr gt lt f gt or end of the file The delete file descriptor is in the format appliname filename ext class appiname represents the application this data file belongs to filename ext represents the relative path and file name where the data file resides in the UNICAPT 32 file system For instance bitmaps card bmp class represents the particular categorization of the file within the terminal s file system Possible values 0 private 1 public 10 48 Delete Whole Application Descriptor Section The delete whole application descriptor section is an area of application to be deleted The delete whole application descriptor section begins with the identifier DeleteWholeAppj lt cr gt lt lf gt This section ends with the start of the next section header i e encountered by lt cr gt lt f gt or end of the file The delete whole application descriptor is in the format applname appiname represents the application name that is going to be deleted For example US0901_UPOS Note The operating system maintenance application and System amp Security Application cannot be deleted Only the financial application can be deleted 102 Chapter 10 Secure
80. istence srcfilename ext NonSecFiles applname filename ext class existence applname filename ext class existence DeleteAppl applname codefilenamel applname codefilename2 DeleteFiles applname filename ext class applname filename ext class DeleteWholeApp applname Ingenico 6780 User s Guide 95 Note All lines within the secure certificate text file are terminated with a character sequence carriage return followed by line feed e g lt cr gt lt f gt except for the last line of the file The fields of the file are described more fully in the sections that follow w4 Secure Certificate Descriptor Sections The following descriptor sections make up a secure certificate Secure certificate MAC descriptor section Visa PED mode descriptor section Application descriptor section Secure file descriptor section Non secure file descriptor section Delete application code file descriptor section Delete data file descriptor section Delete the whole application descriptor section 10 41 Secure Certificate MAC Descriptor Section This section which is the MAC of the secure certificate file must exist on the first line of the file If it does not validation fails If it does a MAC is calculated on the secure certificate using SHA1 MAC starting from the first character of the second line of the file until the end of the file If the MAC detected on
81. it Debit ATM Electronic Benefits Transfer EBT The Ingenico 6780 is also a utility platform for electronic marketing such as advertising and loyalty programs In addition to payment the terminal can be used for the following Customer graphics display Item scrolling Loyalty programs Advertising Instant credit Personal messaging Cross selling Electronic couponing The Ingenico 6780 terminal can capture an electronic image of a customer s signature for credit transactions and transmit it to a host system i e cash register or computer 12 Connectivity The Ingenico 6780 terminal can connect directly to a cash register computer Ethernet LAN or RS485 LAN Peripherals such as check readers and bar code scanners can be connected to the AUX port For more information about connectivity refer to the Ingenico 6780 Installation amp Operations Guide part number DIV350487 Ingenico 6780 User s Guide 1 About this Manual Chapters 1 through 7 explain how to use the Extended Menu Chapters 8 through 10 give background information to help you understand downloading and key management and Chapters 11 12 and 13 address downloading Chapter 1 Introduction gives an overview of the terminal this manual and kits that are available Chapter 2 Extended Menu Overview explains how to navigate the Extended Menu and find the unit s current configuration settings It also lists the options availa
82. it plus a CD ROM containing the Ingenico 6780 Retail Base Application program and parameter files and a copy of the MLDT utility program Retail Base Application Integration Kit The Retail Base Application Integration Kit consists of the Store Installation Kit an adapter kit and all necessary manuals This allows for the connection of the Ingenico 6780 to an IBM PC for downloading a program or parameters using MLDT OPOS Software Development Kit This kit contains the programs files and manuals needed to allow a programmer to write a custom application for a register or host that interfaces with the Ingenico 6780 using OPOS object linking and embedding for retail point of sale JavaPOS Software Development Kit This kit contains the programs files and manuals needed to allow a programmer to develop a custom application for a register or host that interfaces with the Ingenico 6780 using JavaPOS Java for retail point of sale UNICAPT 32 Software Development Kit This kit allows a programmer to develop a custom application for the Ingenico 6780 terminal using Ingenico s operating system UNICAPT 32 Ingenico 6780 User s Guide Extended Menu Overview 21 Overview The Extended Menu allows you to configure the terminal get system information check the file system do key injection get key check value set system parameters for downloading and test the product hardware This chapter explains how to navigate the Extend
83. jecting a Serial Number When authorized repair technicians replace a damaged terminal they sometimes need to inject the serial number of the old terminal into a new terminal Display Action Restart the terminal by pressing 1 Cancel Enter simultaneously while the terminal is starting up press 1 3 simultaneously to access the Extended Menu Extended Menu Serialnum Inject System Config System Info Supervisor Menu Enter Password Key password 2 6 3 4 then press Enter Supervisor Menu Change Password Application File Using the stylus tap Supervisor Menu Tap Security 36 Chapter 5 Supervisor Menu Section 5 5 Security 5 6 Security Tap Serialnum Inject Key Injection Key Check Value Erase App Keys Serialnum Inject Inject Serial The terminal will now accept a serial number Wait for online injection Cancel System Parameters The system parameters are explained in the following chapter Ingenico 6780 User s Guide 37 System Parameters Menu 1 Overview This chapter explains how change system parameters These parameters allow you to indicate the download method set the download port setup the port and configure the host port s auto detect feature To view a list of current parameter settings see Viewing All Parameter Values on page 21 All system parameters are saved in the public file sysPara cfg which c
84. k like this mode mode represents the value of the Visa PED mode before the certificate file is updated and before the download starts Possible Description Values i No security mode is set 1 7 BO Visa PED mode 00000B2B1 B1 Code MACing B0 B2 Prompt MACing 1 Visa PED mode 000000001 Visa PED mode will not be enabled if the secure text entry key and the clear text entry key are not injected or if the download key is not injected 2 Code MACing 000000010 Code MACing will not be enabled if the download key is not injected 3 Visa PED mode and Code MACing 000000011 Visa PED mode and Code MACing will not be enabled if the secure text entry key and clear text entry key are not injected or if the download key is not injected 4 Prompt MACing 000000100 Prompt MACing will not be enabled if the secure text entry key and clear text entry key are not injected 5 Visa PED Mode and Prompt MACing 000000101 This option will not be enabled if the secure text entry key and clear text entry key are not injected or if the download key is not injected 6 Prompt MACing and Code MACing 000000110 This option will not be enabled if the secure text entry key and clear text entry key are not injected or if the download key is not injected 7 Visa PED mode and Prompt MACing and Code MACing 000000111 This option will not be enabled if the secure text entry key and clear
85. length master session keys Atalla key block format keys single or double feature keys and single or double DUKPT keys can be injected through both the normal key format and Atalla key block format 95 7 Terminal Startup Verify MAC Option This option controls whether the terminal needs to verify the MAC at terminal startup for user application code files and data files that are contained in a valid certificate file The default value is disabled because the manufacturer does not load the certificate file Possible Status Description Values 0 Disabled Disable startup verify MAC option Default 1 Enabled Enable startup verify MAC option 958 Visa PED Mode Option This option controls whether the terminal runs in Visa PED mode In this mode if prompt MAC verification fails PIN exhaustion validation and the three button limit will be applied when prompt MAC verification fails PIN exhaustion validation means that the customer can only enter their PIN three times after the third failed attempt the terminal returns to the idle prompt The three button limit means that forms that do not have Prompt MACing are limited to three buttons If the form requires more than three data inputs such as PIN entry or cash back amount it must have prompt MACing Possible Status Description Values 0 Disabled Normal mode 1 Enabled Visa PED mode 92 Chapter 9 Key Architecture Section 9 5
86. lication or 0 63 per terminal These keys can be both single length DES keys and double length triple DES keys The device supports four types of master keys Key Name Description of Key Master Terminal This key is used to encrypt the Working session Terminal PIN PIN Key MTPk Key WTPK Master Message This key is used to encrypt the Working session Message Authentication Authentication Code Key WMACK Code Key MMACKk Master This key is used to encrypt the Working session Communication Communication Key WCK 88 Chapter 9 Key Architecture Section 9 4 Application Based Keys 9 4 3 9 4 4 9 5 Key MCK Master Atalla Key This key is used to XOR a value for PIN entry MAC or encrypt decrypt to form master variant keys to decrypt for PIN entry MAC and COM session keys Session Keys These keys are loaded encrypted under the corresponding master keys This means that the type and index of the working session key have to match the type and index of the corresponding master key that was used to encrypt it For application based financial keys the SSA will have a key structure matrix indexed by application ID The device can accommodate up to ten working session keys per application or up to 64 working session keys per terminal Available indexes for the working session keys are 0 9 per application or 0 64 per terminal These keys can be both single length DES keys and double length tr
87. need to be sent to an authorized repair facility to be reset The applications and security keys will need to be reloaded into the unit Display Action Restart the terminal by pressing 1 Cancel Enter simultaneously while the terminal is starting up press 1 3 simultaneously to access the Extended Menu Extended Menu Serialnum Inject System Config System Info Supervisor Menu Using the stylus tap Supervisor Menu Enter Password Key password 2 6 3 4 then press Enter Supervisor Menu Change Password Application File Press Enter to select Change Password Old Password o gt 5 oc lt o o e Enter old password then press Enter od lt Enter new password then press Enter Caution See preceding warning 26 Chapter 5 Supervisor Menu Section 5 3 Changing the Supervisor Menu Password New Password Again Enter new password again to confirm then press Enter aa aa a AAT E R Password Updated Be sure to make a note of your new password See preceding warning s4 Application File in Terminal 541 Reading the Application File Display Action Restart the terminal by pressing 1 Cancel Enter simultaneously while the terminal is starting up press 1 3 simultaneously to access the Extended Menu Extended Menu Using the stylus tap Supervisor Menu Serialnum Injec
88. nging the Beep Tones n eeen 13 3 5 1 Enable Disable Beep TOMCS 2 cccccccccesccsessececececenetesaeesenenessneetsnaseseneecsensessaes 13 3 5 2 Changing the Beep Length ou seccceecccssceceencecennnesnaeeseneeceseneesaestaneecseneessnnnesaes 14 3 5 3 Changing the Beep TONES ccsccccescccsssececeeceneteseaeeseneecseeeeeseaeeseneeseeeeecsnneesaes 15 3 6 Turning the Backlight Off eneee 16 3 6 1 Turning the Backlight OFf c cccccccccecessseceeneeceneeeceeseseneeceeeeeseaneseeeeseneeteneeteas 16 3 6 2 Setting Backlight to Off When ldle escccssccceenteceneeeseeeeesneeceneeeseaeeesneecenneessaes 17 whapier 4 System Info MeNU sscccseeeeeeeesssseeseeseeseeees 18 ORNs de ce eE bce Nth ak Datei Mallee Nib ree Nea edad 18 ie Finding Version Numbers ssiccscicccrnk catenin iene nies eniveenksl 18 4 3 Checking the Security Information cece eeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeee 19 4A RAMIN Oee Pe Reet eee Cara een ety E AEE OAE A E AEE R EEE 20 4 5 Viewing All Parameter ValUCS cece eeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeees 21 Chapter 5 Supervisor Menu ccccceceeeeeeeeeeeeeeeeeeeeeeneeenenenes 20 5 1 5 2 5 3 5 4 5 5 5 6 OVEIVIEW s naen een ces eee 25 Supervisor Menu Password cccceessseeeeeeeceeeeeeeesseeeeeeeeeeeeeeassseeeeeeees 25 Changing the Supervisor Menu PaSSwotd cccccccccceeeeeeeeeeeeeeeeeeeeeees 26 Applicat
89. pplname dstfilename ext class authmethod encrypt existence srcfilename ext The first field of the secure file descriptor is the MAC for the application data file MACsz is a text string identifying that the pre calculated fingerprint follows 12345678 is the Hex ASCII representation of the most significant 4 bytes of the MAC applied by the securing utility prior to download appiname represents what application this data file belongs to dstfilename ext represents the relative path and file name where the data file will reside in the UNICAPT 32 file system For instance bitmaps card bmp class represents the particular categorization of the file within the terminal s file system Possible values 0 private 1 public authmethod represents the data file authentication method i e the MAC calculation method that the data file used Possible values SHA1 MAC CBC MAC Use Code Download MAC Key CDMK XOR 0x0000 0000 0000 OOFF for each half of the key as the variant of CDMK to do MAC calculation verification The variant of CDMK that results from the XOR operation is used for both methods The MAC is calculated before the data file is encrypted If the data file is specified to be encrypted then the calculated data needs to be a multiple of 8 bytes If it isn t the generated encrypted code file will have zeros appended at the end of the file for MAC calculation encrypt represents whether the data file is encrypted and needs
90. r that communicates with the host in the specified download protocol to receive data and send responses Each download protocol has its own download application The maintenance application sends the code files and application data files it receives to the data file system DFS first At the end of download it releases the COM port and then requests an offline download from the SSA The SSA maintenance module performs a security call back to decrypt unzip and authenticate the code before it writes the code file to the code file system CFS Also it takes the data files from DFS goes through the call back function to authenticate them and puts them in the right place within the DFS The download port selection download protocol and port setting can be set in the supervisor menu see Chapter 6 System Parameters Menu on page 38 Ingenico 6780 User s Guide 83 8 4 2 8 4 3 User Application A user application controls the terminal through customer specific forms and prompts User applications are also called payment applications or financial applications There can be a single user application or multiple ones User applications vary widely An application may be thick and contain much business logic or it may be a thin layer that simply passes on requests from the register Ingenico provides standard user applications intended for certain markets or you can create your own user applications using Ingenico s Ingedev appli
91. re connecting your terminal to a local area network LAN through the Host or Aux port Display Action Restart the terminal by pressing 1 Cancel Enter simultaneously while the terminal is starting up press 1 3 simultaneously to access the Extended Menu Extended Menu Serialnum Inject System Config System Info Supervisor Menu Enter Password Key password 2 6 3 4 then press Enter Supervisor Menu Change Password Application File Security Sys Parameters Download Method Download Port Setup Port Using the stylus tap Supervisor Menu Tap Sys Parameters Tap Setup Port Setup Port Select Port1 or Port2 ron By default Port 1 Host Port 2 Aux Port2 Port X Interface Type Baud Rate Data Bits Stop Bits Parity LAN Address LAN Address Key the appropriate LAN address then press Old Value 104 Enter Enter New Value Tap LAN Address Ingenico 6780 User s Guide 6 4 7 Setting the Retry Count This option sets the number of times the COM port should retry communications in the event of failure 0 to 10 Display Action Restart the terminal by pressing 1 Cancel Enter simultaneously while the terminal is starting up press 1 3 simultaneously to access the Extended Menu Extended Menu Serialnum Inject System Config System Info Supervisor Menu Using the stylus tap Supervisor Menu Enter Pass
92. round TMO Tap Turnaround TMO Turnaround TMO Old Value 300 Enter New Value Enter an amount of time after which the port should cease turnaround in units of 1 100 of a second Ingenico 6780 User s Guide 49 64 11 Enabling DHCP DHCP stands for dynamic host configuration protocol This is commonly used when a company uses a fixed static IP address such as 81 2 5 12 to show to the outside world but the IP addresses inside the company are not seen from the outside and may change They may be attributed dynamically by a server DHCP server when machines startup If your terminal is using Ethernet you can set the DHCP address to None or Auto If set to None the terminal will not use DHCP because a fixed address has been assigned the terminal If set to Auto when the terminal starts up it will ask the DHCP server to assign it an IP address Display Action Restart the terminal by pressing 1 Cancel Enter simultaneously while the terminal is starting up press 1 3 simultaneously to access the Extended Menu Extended Menu Using the stylus tap Supervisor Menu Serialnum Inject System Config System Info Enter Password Key password 2 6 3 4 then press Enter Supervisor Menu Tap Sys Parameters Change Password Application File Security Sys Parameters Sys Parameters Tap Setup Port Download Method Download Port Setup Port Setup Port Tap Port3 Ethernet
93. s tap Supervisor Menu Tap Sys Parameters Tap Setup Port Setup Port Setup Port Select Port1 Port2 or Port3 For By default Port 1 Host Port 2 Aux Port 3 Port2 E NET port Ethernet Port3 Set Port X Tap Stop Bits Interface Type Baud Rate Data Bits Stop Bits Stop Bits Select the appropriate stop bits value 1 2 Updating Ingenico 6780 User s Guide 645 Setting the Parity Set the parity according to the host requirements DIEGEM Action Restart the terminal by pressing 1 Cancel Enter simultaneously while the terminal is starting up press 1 3 simultaneously to access the Extended Menu Extended Menu Tap Supervisor Menu Serialnum Inject System Config System Info Enter Password Key password 2 6 3 4 then press Enter Supervisor Menu Using the stylus tap Sys Parameters Change Password Application File Security Sys Parameters Sys Parameters Tap Setup Port Download Method Download Port Setup Port SEIR Rott Select Port1 Port2 or Port3 For By default Port 1 Host Port 2 Aux Port 3 Port2 E NET port Ethernet Port3 Set Port X Tap Parity Interface Type Baud Rate Data Bits Stop Bits Parity Select the appropriate parity None Odd Even 44 Chapter 6 System Parameters Menu Section 6 4 Setting Up the Port 646 Defining the LAN Address Use this procedure if you a
94. s Parameters Change Password Application File Security Sys Parameters Sys Parameters Tap Setup Port Download Method Download Port Setup Port Setup Port Tap Port3 Ethernet Port1 Port2 Ports Tap Y until you reach Server IP Port then tap Interface Type Server IP Port Baud Rate Data Bits Stop Bits Parity DHCP Local IP Local IP Port Server IP Server IP Port 54 Chapter 6 System Parameters Menu Section 6 4 Setting Up the Port 6 4 16 Server IP Port Old Value XXXXX Enter New Value Enter the server IP port number Setting the Subnet Mask IP Add Mask The IP Add Mask menu option refers to the subnet mask A subnet mask is a number starting with 255 that is unique for your network Display Action Restart the terminal by pressing 1 Cancel Enter simultaneously while the terminal is starting up press 1 3 simultaneously to access the Extended Menu Extended Menu Serialnum Inject System Config System Info Supervisor Menu Using the stylus tap Supervisor Menu Enter Password Key password 2 6 3 4 then press Enter Supervisor Menu Change Password Application File Security Sys Parameters Tap Sys Parameters Sys Parameters Download Method Download Port Setup Port Tap Setup Port Setup Port Port1 Port2 Tap Port3 Ethernet Ingenico 6780 User s Guide 55 Port3 Interface Type Baud Rate Data Bi
95. s a cryptography API to other applications The SSA blocks any user applications from using the HMI peripheral of the operating system Thus all requests by the user application to display forms or receive touch or stylus input must go through the SSA The SSA then rejects any improper insecure requests such as Activate more than 8 screen buttons which could be used to create a false PIN pad Activate PIN entry with a prompt that has no valid message authentication code MAC if the MACing option is on this prevents the improper collection of the encryption results of known data Activate clear text entry with a prompt that has no valid MAC if the MACing option is on Activate clear text entry with a prompt that contains words such as PIN NIP etc if the MACing option is off Retrieve pixel coordinates of individual screen touches which could be used to create a false PIN pad Request more than 30 PIN encryptions within 15 seconds when using MASTER PIN KEY Maintenance Application The maintenance application is in charge of system components and secure application download It is an extension of the SSA and the SSA invokes it It executes before other user applications in order to check version numbers and download new software if needed The maintenance application communicates with the user application through the peripheral application manager PAM The maintenance application has a downloade
96. s that allow a logical progression through the tests Once a test is selected a test or a series of tests will be performed on the selected entity The result of the test will be displayed to facilitate diagnosis of the malfunctioning parts 72 Testing the Display Contrast To change the display contrast see Changing the Display Contrast on page 12 To test the display contrast follow this procedure This test tests all pixels to see if they are working Display Action Restart the terminal by pressing 1 Cancel Enter simultaneously while the terminal is starting up press 1 3 simultaneously to access the Extended Menu Extended Menu Serialnum Inject System Config System Info Supervisor Menu Diagnostic Menu Keypad Using the stylus tap Diagnostic Menu Tap Display The pixels are tested to determine if any are not working or are stuck on The unit goes through the following sequence All pixels on White screen displays Every other pixel off Light gray screen displays All pixels off Dark gray screen displays Every other pixel on Light gray screen displays Ingenico 6780 User s Guide 67 Testing the Keypad 7 3 This allows you to test each key to ensure the proper value returns Display Action Restart the terminal by pressing 1 Cancel Enter simultaneously while the terminal is starting up press 1
97. sly while the terminal is starting up press 1 3 simultaneously to access the Extended Menu Extended Menu Serialnum Inject System Config System Info Supervisor Menu Enter Password Key password 2 6 3 4 then press Enter Supervisor Menu Change Password Application File Security Sys Parameters Download Method Download Port Setup Port Setup Port Tap Port3 Ethernet Using the stylus tap Supervisor Menu Tap Sys Parameters Tap Setup Port Port1 Port2 Ports Tap WV until you reach Server IP then tap Server Interface Type IP Baud Rate Data Bits Stop Bits Parity DHCP Local IP Local IP Port Ingenico 6780 User s Guide Server IP 192 168 0 5 Enter the server IP address 64 15 Setting the Server IP Port Number If your terminal is using Ethernet and DHCP is set to None you will need to configure the download server s IP port number This is a number that is used in TCP IP applications to designate which application the device is communicating with Display Action Restart the terminal by pressing 1 Cancel Enter simultaneously while the terminal is starting up press 1 3 simultaneously to access the Extended Menu Extended Menu Using the stylus tap Supervisor Menu Serialnum Inject System Config System Info Enter Password Key password 2 6 3 4 then press Enter Supervisor Menu Tap Sy
98. st through a port The operating system provides the user application with debit and credit card information from the MSR and stored value from the smart card reader The operating system encrypts the user PIN This encrypted information is sent from the operating system to the user application From the user application it goes from the cash register to the store controller and then on to banks and other processors The digitizer handles the interface with the user It receives input from the touch screen and translates it into data that the operating system and SSA can process and encrypt Chapter 8 Architecture Section 8 4 Terminal Architecture ss Download File Architecture The download file is installed on the server The customer is responsible for sending the code from the server to the electronic cash registers ECRs Each ECR sends the code to its Ingenico 6780 terminal On the POS system two software components are required Files to be downloaded to the Ingenico 6780 terminal Downloader specific to the cash register Ingenico supports several formats including IBM EFT download format NCR download format GEMS and GEMS Lite Ingenico 6780 User s Guide 85 Key Architecture 9 1 Overview This chapter is extracted from the document NAR System amp Security Application SSA Software Architecture Key Architecture section revision 1 19 Figure 4 on page 87 provides an overview of th
99. stem Info Supervisor Menu Enter Password Key password 2 6 3 4 then press Enter Supervisor Menu Change Password Application File Security Key Check Value Erase App Keys Serialnum Inject Key Injection Inject Keys Injection Port Key Injection Wait for command Using the stylus tap Supervisor Menu Tap Security Press Enter to select Key Injection Press Enter to select Inject Keys The terminal will now accept the key injection For instructions on how to inject keys see the manual for your key injection software such as Ingenico s KeyFac or WinKeyFac When finished press Cancel to return to the previous menu 30 Chapter 5 Supervisor Menu Section 5 5 Security 55 3 Setting the Key Index DIREN Action Restart the terminal by pressing 1 Cancel Enter simultaneously while the terminal is starting up press 1 3 simultaneously to access the Extended Menu Extended Menu Serialnum Inject System Config System Info Supervisor Menu Enter Password Key password 2 6 3 4 then press Enter Supervisor Menu Change Password Application File Security Key Check Value Erase App Keys Serialnum Inject Using the stylus tap Supervisor Menu Tap Security Tap Enter to select Key Injection Key Injection Tap Index Select X Inject Keys Injection Port Index Select X Index Select Enter the new index selec
100. stylus tap Diagnostic Menu Diagnostic Menu Tap RS232 Display Keypad Beeper RS232 RS232 Select the communications port to test COM1 COM2 RS232 The results of the test display Host 14200 None Press Cancel to exit Test Ingenico 6780 User s Guide 69 Testing the RS485 Tailgate Connection 7 6 This feature tests the RS485 Tailgate connection on the HOST port Restart the terminal by pressing 1 Cancel Enter simultaneously while the terminal is starting up press 1 3 simultaneously to access the Extended Menu Extended Menu Using the stylus tap Diagnostic Menu Serialnum Inject System Config System Info Supervisor Menu Diagnostic Menu Tap Tailgate Display Keypad Beeper RS232 Tailgate The results of the test display To exit press IBM 46xx Test Cancel 2A23 0x68 70 Chapter 7 Diagnostic Menu Section 7 6 Testing the RS485 Tailgate Connection 77 Testing the USB Port This feature tests the USB connection Display Action Restart the terminal by pressing 1 Cancel Enter simultaneously while the terminal is starting up press 1 3 simultaneously to access the Extended Menu Extended Menu Serialnum Inject System Config System Info Supervisor Menu Diagnostic Menu Diagnostic Menu Tap USB Using the stylus tap Diagnostic Menu Display Keypad Beeper RS232 Tailgate USB USB Diagnostic 1 From
101. t System Config System Info Supervisor Menu Enter Password Key password 2 6 3 4 then press Enter Supervisor Menu Tap Application File Change Password Application File Select Appl Select the application you want to check App A App B App C Select File Select the file sysPara cfg Ingenico 6780 User s Guide 5 4 2 File Menu Erase Press Enter to select Read sysPara cfg Read SOF 010000000000 010000000000 The contents of the file display To scroll down to the next screen press When you are finished reading it press Cancel to return to the previous menu Erasing the Application File Display Action Restart the terminal by pressing 1 Cancel Enter simultaneously while the terminal is starting up press 1 3 simultaneously to access the Extended Menu Extended Menu Serialnum Inject System Config System Info Supervisor Menu Using the stylus tap Supervisor Menu Enter Password Key password 2 6 3 4 then press Enter Supervisor Menu Change Password Application File Security Tap Application File Erase Select Appl Select the application you want to erase App A App B App C Select File Select the file you want to erase sysPara cfg File Menu Tap Erase Read Syspara cfg Erase SOF The contents of the file display To erase press Enter
102. t value and then press Old Value X Enter Enter New Value ABC oc az N lt Key Injection The Index Select Y option now reflects the new Inject Keys index number Injection Port Index Select Y Ingenico 6780 User s Guide 554 Setting the Application Number You will have to know the four digit application ID number to perform this procedure Display Action Restart the terminal by pressing 1 Cancel Enter simultaneously while the terminal is starting up press 1 3 simultaneously to access the Extended Menu Extended Menu Serialnum Inject System Config System Info Supervisor Menu Enter Password Key password 2 6 3 4 then press Enter Supervisor Menu Change Password Application File Security Key Check Value Erase App Keys Serialnum Inject Key Injection Tap App Select AAAA Inject Keys Injection Port Index Select X App Select AAAA App Select Enter the new application select value and then Old Value XXXX press Enter Enter New Value Using the stylus tap Supervisor Menu Tap Security Press Enter to select Key Injection e s502 lt Le o Key Injection The Index Select BBBB option now reflects the Inject Keys new application number Injection Port Index Select Y App Select BBBB 32 Chapter 5 Supervisor Menu Section 5 5 Security 5 5 5 Finding the Key Check Value Term
103. tem For instance bitmaps card bmp class represents the particular categorization of the file within the terminal s file system Possible values 0 private 1 public existence is an option to determine whether the file must exist in terminal memory in order for secure validation to succeed Y indicates that the file must exist If Y is selected and the file exists but does not validate then the secure process fails N indicates the file need not exist If N is selected then the file optionally may or may not exist for validation to succeed Ingenico 6780 User s Guide 101 1046 Delete Application Code File Descriptor Section The delete application code file descriptor section is an area of the code to be deleted The delete application code file descriptor section begins with the descriptor DeleteAppl lt cr gt lt f gt The section ends with the start of the next section header i e encountered by lt cr gt lt f gt or end of the file The delete code file descriptor is in the format applname codefilenam appiname represents the application that this code file belongs to codefilename represents the code file that belongs to an application For example CA0003001000 Note The operating system maintenance application and System amp Security Application cannot be deleted Only the financial application can be deleted 104 7 Delete Data File Descriptor Section The delete data file descr
104. the USA key names European users will need to reverse the and keys in the instructions 24 Finding the Current Setting The current setting will be highlighted in reverse video Explanation COM1 In this example COM2 is the current setting COM2 25 Finding Options in the Extended Menu Menu Submenu Submenu Submenu Serialnum Inject System Config System Date Time Display Contrast Display Backlight Key Press Beep Enable Length Tone Disable Backlight On Off Always On Always Off Idle Timeout Ingenico 6780 User s Guide 5 System Info Versions Security Info RAM Info View Parameter Supervisor Menu Change Password Application File AppA Read AppB Erase Security Key Injection Inject Keys Injection COM1 Patt com2 Index Select App Select Key Check Value Term Keys Application Keys Erase App Keys Key1 Key2 SerialnumInject Sys Parameters Download Method IBMEFT NCREFT Zontalk GEMS Germany Download Port 1 Port Port 2 Port 3 Setup Port Port 1 Interface Type Baud Rate Data Bits Stop Bits Parity Retry Count Response TMO LAN Address Poll TMO Chapter 2 Extended Menu Overview Section 2 5 Finding Options in the Extended Menu Turnaround TMO Port 2 Interface Type Baud Rate Data Bits Stop Bits Parity Retry Count Response TMO LAN Address
105. the first line of the file is not the same as the calculated MAC validation fails The first line of the file must be in the following format MAC 12345678 The first field of the application descriptor is the MAC for the secure certificate file itself MACs is a text string indicating that the precalculated fingerprint follows 12345678 is the Hex ASCII representation of the most significant 4 bytes of the MAC value of the SHA1 result for the whole certificate file precalculated and applied by the securing utility prior to download Note The first line of the file must end with a carriage return and line feed The second line is considered to begin at the first character immediately after the first carriage return and line feed characters of the file 96 Chapter 10 Secure Certificate Section 10 4 Secure Certificate Descriptor Sections 10 4 2 Visa PED Mode Descriptor Section The Visa PED mode descriptor section allows you to set the terminal into a special mode that meets the Visa PIN encryption device PED requirements Visa PED mode should be entered before downloading The section identifier VisaPedMode lt cr gt lt f gt marks the beginning of the Visa PED mode section within the file The Visa PED Mode descriptor section is found after the secure certificate MAC section identifier and before the start of the next section identifier i e encountered by lt cr gt lt f gt The first line of the file must loo
106. the host requirements Display Action Restart the terminal by pressing 1 Cancel Enter simultaneously while the terminal is starting up press 1 3 simultaneously to access the Extended Menu Extended Menu Using the stylus tap Supervisor Menu Serialnum Inject System Config System Info Enter Password Key password 2 6 3 4 then press Enter Supervisor Menu Tap Sys Parameters Change Password Application File Security Sys Parameters Sys Parameters Tap Setup Port Download Method Download Port Setup Port SEIM ron Select Port1 Port2 or Port3 a By default Port 1 Host Port 2 Aux Port 3 Port2 E NET port Ethernet Port3 Port X Tap Data Bits Interface Type Baud Rate Data Bits Stop Bits Data Bits Select the appropriate data bits value 5 6 7 8 Updating 42 Chapter 6 System Parameters Menu Section 6 4 Setting Up the Port 644 Setting the Stop Bits Set the stop bits according to the host requirements Display Action Restart the terminal by pressing 1 Cancel Enter simultaneously while the terminal is starting up press 1 3 simultaneously to access the Extended Menu Extended Menu Serialnum Inject System Config System Info Supervisor Menu Enter Password Key password 2 6 3 4 then press Enter Supervisor Menu Change Password Application File Security Sys Parameters Download Method Download Port Using the stylu
107. to Detect Result you select Port 1 and Auto Detect Result the RS232 application will detect the communications type of a cable plugged into the selected port and return RS485 that information to you 40 Chapter 6 System Parameters Menu Section 6 4 Setting Up the Port Tailgate USB Ethernet Dial 3201 642 Setting the Baud Rate Set the baud rate according to the host requirements Display Action Restart the terminal by pressing 1 Cancel Enter simultaneously while the terminal is starting up press 1 3 simultaneously to access the Extended Menu Extended Menu Serialnum Inject System Config System Info Supervisor Menu Enter Password Key password 2 6 3 4 then press Enter Supervisor Menu Change Password Application File Security Sys Parameters Download Method Download Port Setup Port Setup Port Tap Port1 Port2 or Port3 Port1 By default Port 1 Host Port 2 Aux Port 3 Port2 E NET port Ethernet Using the stylus tap Supervisor Menu Tap Sys Parameters Tap Setup Port Port X Interface Type Data Bits Stop Bits Baud Rate Tap Baud Rate Select the appropriate baud rate 19200 38400 57600 Ingenico 6780 User s Guide 76800 115200 Updating Press Cancel to return to the previous menu 643 Setting the Data Bits Set the data bits according to
108. to change settings that are not available in the menu options Display Action Restart the terminal by pressing 1 Cancel Enter simultaneously while the terminal is starting up press 1 3 simultaneously to access the Extended Menu Extended Menu Serialnum Inject System Config System Info Supervisor Menu Enter Password Key password 2 6 3 4 then press Enter Supervisor Menu Change Password Application File Security Sys Parameters Download Method Download Port Setup Port Auto Detect Parameter Editor Using the stylus tap Supervisor Menu Tap Sys Parameters Tap Parameter Editor Ingenico 6780 User s Guide Parameter ID yo O a ag oc lt Enter the parameter ID maximum three digits Updating For a listing of parameter ID numbers descriptions and values for the North American terminal application ask your Ingenico representative for the latest copy of the internal document NAR SSA Library Security Part 66 Chapter 6 System Parameters Menu Section 6 6 Editing Parameters Diagnostic Menu 7 Overview This chapter describes the diagnostic tests that the customer can perform on the Ingenico 6780 The diagnostic tests allow you to isolate failures in field installed Ingenico 6780 units These tests are part of the operating system and are not changed by applications The diagnostics are menu driven with feature
109. ts Stop Bits Parity DHCP Local IP Local IP Port Server IP Server IP Port IP Add Mask Tap until you reach IP Add Mask then tap IP Add Mask IP address mask or subnet mask IP ADD MASK XXX XXX XXX XXX Enter the subnet mask Updating 6417 Setting the Gateway If you are using Ethernet you will need to enter the IP address of the gateway server A gateway is a router it is a specific host on the network which can transmit requests from one network to another in this case from the Ethernet network to the Internet and back again In many cases this will be the subnet with a 1 address i e 192 168 1 1 Display Action Restart the terminal by pressing 1 Cancel Enter simultaneously while the terminal is starting up press 1 3 simultaneously to access the Extended Menu Extended Menu Using the stylus tap Supervisor Menu Serialnum Inject System Config System Info Enter Password Key password 2 6 3 4 then press Enter Supervisor Menu Tap Sys Parameters Change Password Application File Security Sys Parameters Sys Parameters Tap Setup Port Download Method Download Port Setup Port 56 Chapter 6 System Parameters Menu Section 6 4 Setting Up the Port Setup Port Tap Port3 Ethernet Port1 Port2 Port3 Tap Y until you reach Gateway then tap Interface Type Gateway Baud Rate Data Bits Stop Bits Parity DHCP Local IP Local IP
110. und the display Calibration will start in 3 seconds Using the stylus tap Diagnostic Menu Using the stylus tap the four box grid The box moves around to the next corner tap again Repeat until you are notified if the test was successful Calibrate Pen Please tap box Ingenico 6780 User s Guide Calibrate Pen Calibration Succeeded You are notified if the calibration succeeded or failed Testing Finger Calibration 7 14 Your terminal was calibrated by the manufacturer and you will not need to recalibrate it This feature is for use by repair facilities If they replace the glass on the display screen or if they run a production test application they need to recalibrate the terminal DIREM Action Restart the terminal by pressing 1 Cancel Enter simultaneously while the terminal is starting up press 1 3 simultaneously to access the Extended Menu Extended Menu Using the stylus tap Diagnostic Menu Serialnum Inject System Config System Info Supervisor Menu Diagnostic Menu Diagnostic Menu Tap Y until you reach Finger Calibration then Display tap Finger Calibration Keypad Beeper RS232 Tailgate USB Mag Stripe Reader Smart Card Reader SAM Touch Screen Signature Capture Pen Calibration Finger Calibration Please remove hands objects from around the display calibration will st
111. upervisor Menu Change Password Application File Security Sys Parameters Download Method Download Port Setup Port Download Port Select the port that you want to use as the download port by default 1 for Host 2 for Aux or Port2 3 for E NET Ethernet Port3 Using the stylus tap Supervisor Menu Tap Sys Parameters Tap Download Port Ingenico 6780 User s Guide Setting Up the Port 6 4 64 1 Selecting the Download Interface Type Use this procedure to select RS232 RS485 Ethernet etc as the interface type for Port1 Host Port2 Aux or Port3 Ethernet Display Action Restart the terminal by pressing 1 Cancel Enter simultaneously while the terminal is starting up press 1 3 simultaneously to access the Extended Menu Extended Menu Using the stylus tap Supervisor Menu Serialnum Inject System Config System Info Enter Password Key password 2 6 3 4 then press Enter Supervisor Menu Tap Sys Parameters Change Password Application File Security Sys Parameters Sys Parameters Tap Setup Port Download Method Download Port Setup Port pennicad Lor Tap Port1 Port2 or Port3 By default Port 1 Host Port 2 Aux Port 3 Port2 E NET port Ethernet Port3 Dial Host Port Aux Port PortX Press Enter to select Interface Type Interface Type Baud Rate Data Bits PortX Select the communications method you want If Au
112. word Key password 2 6 3 4 then press Enter Supervisor Menu Change Password Application File Security Sys Parameters Tap Sys Parameters Sys Parameters Download Method Download Port Setup Port Tap Setup Port Setup Port Port1 Port2 Port3 Select Port1 or Port2 By default Port 1 Host Port 2 Aux Port X Interface Type Baud Rate Data Bits Stop Bits Parity LAN Address Retry Count Tap Retry Count Retry Count Old Value 4 Enter New Value Enter the number of times the COM port should retry in the event of failure 0 to 10 Chapter 6 System Parameters Menu Section 6 4 Setting Up the Port 6 4 8 Setting the Response Timeout This option sets the amount of time after which the port should cease waiting for a response in units of 1 100 of a second Display Action Restart the terminal by pressing 1 Cancel Enter simultaneously while the terminal is starting up press 1 3 simultaneously to access the Extended Menu Extended Menu Serialnum Inject System Config System Info Supervisor Menu Using the stylus tap Supervisor Menu Enter Password Key password 2 6 3 4 then press Enter Supervisor Menu Change Password Application File Security Sys Parameters Tap Sys Parameters Sys Parameters Download Method Download Port Setup Port Tap Setup Port Setup Port Port1 Port2 Port3

Download Pdf Manuals

image

Related Search

Related Contents

EMPLASTE DE MADERA  SOCIETE / DIVERS  Tripp Lite S454006 SCSI/Fibre Channel      Canada Gazette, Part II - Publications du gouvernement du Canada  COLORado 1-Tri IP User Manual Rev. 7  ! AVERTISSEMENT - Napoleon Products    

Copyright © All rights reserved.
Failed to retrieve file