Secure MICR Printer User’s Guide
Copyright Copyright Copyright ©2009 by Source Technologies, LLC. All rights reserved. No part of this document may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying, recording, or by any information storage and retrieval system, without permission in writing from Source Technologies, LLC.
Table of Contents Table of Contents 1. Printer and Driver Installation...............................................................................5 Driver Overview...........................................................................................................6 Downloading the Universal Driver................................................................................7 Unzipping the Driver ....................................................................................................
Appendix A: E13B MICR Font Mapping .....................................................................61 Appendix B: CMC7 MICR Font Mapping....................................................................61 Appendix C: Secure Numeric Font Mapping .............................................................61 Appendix D: ICR Secure Numeric Font Mapping ......................................................61 Appendix E: MICR Mode Command Summary..........................................................
Printer and Driver Installation | 1 1. Printer and Driver Installation Note: To access Source Technologies’ secure fonts loaded on the printer, such as the E13B MICR font, download the universal driver as described in the next section. The printer drivers on this CD may be used for general office printing but do not facilitate using secure fonts. For complete information on how to unpack and setup your printer, see your printer’s user’s guide. 1.
Printer and Driver Installation | 1 Driver Overview Your new MICR printer requires specific PCL 5 commands to load and print secure fonts such as the MICR E13B font. These specific commands may be coded in to your custom application, or if you use a software program such as Source Technologies’ CheckPartner™ Enterprise, these commands are automatically sent to the printer as needed.
Printer and Driver Installation | 1 Downloading the Universal Driver 1. Browse to the URL below from your web browser. http://www.sourcetech.com/support/drivers.asp 2. From this page go to the section for the particular operating system you are using such as Widows 2000, XP, etc. 3. Click on your specific model such ST9612, ST9620 etc. 4. When the File Security dialog box appears, select Save. 5.
Printer and Driver Installation | 1 Installing the Driver Note: Do not connect the printer at this time. 1. From the Source Tech Driver folder, double-click the driver installation program. Note: The name of the driver’s .exe program will vary depending on the operating system being used. There will only be one executable file included with the driver. 2. Click Next >. 3. Click I accept the terms, and then click Next >.
Printer and Driver Installation | 1 4. Leave the “Save files in folder” option as shown above then click Next >. 5. After the installation program installs the necessary files, the following message will be displayed revealing the next steps required to install the driver. At the same time, an “Add Printer Wizard” will run as shown in the next step.
Printer and Driver Installation | 1 6. Click Cancel if connecting through USB. 7. Power on the printer and wait for the New Hardware Wizard to appear. 8. Select “No, not this time,” then Next >.
Printer and Driver Installation | 1 9. Select Install from a list or specific location (Advanced). 10. Click Next >. 11. Click Don’t search, I will choose the driver to install. 12. Click Next >. 13. Scroll down the list and select Printers.
Printer and Driver Installation | 1 14. Click Next >. 15. Click Have Disk.
Printer and Driver Installation | 1 16. Select Browse. Browse to the driver files on your disk and then select Open. 17. Select OK. 18. Select Source Technologies from the Manufacturer list and then click Next >. 19. Select Yes to continue. 20. Once the files have copied, select Finish to close the Wizard.
Printer and Driver Installation | 1 Configure the Driver to enable MICR Mode To unlock the secure font resources located in the printer, the driver must be configured to send down a separator page before each print job. The separator page contains the necessary commands to unlock the resources. 1. Click Start then select the Printer and Faxes folder. 2. Locate the printer you just installed and right-click the icon. Then select Properties. 3.
Printer and Driver Installation | 1 Configure the Driver to Recognize the Printer Secure Fonts 1. Select the Fonts tab. Select Update List. 2. Select the upper Browse button. Locate the directory that contains the 96XXfont.pcm file and select OK. 3. Select the Search Path button. 4. Select ST 96XX Font Collection. Then select the Add to driver button. 5. Select the Done. 6. When you have made all of the desired changes choose OK to save your settings.
Printer and Driver Installation | 1 3. Choose the port to which your MICR printer is connected and then select Next >. 4. Select the Have Disk button and the Browse button and locate the driver files. Select Source Technologies as the Manufacturer and select Next >. 5. Choose Keep existing driver and select Next >.
Printer and Driver Installation | 1 6. Enter a Printer name to differentiate it from the MICR instance of the driver and then decide if it is to be the default printer. Select Next >. 7. If you do not wish to share your printer on a network, leave the "Do Not share this printer" button marked and choose "Next". Otherwise, select the "Share as" radio button and enter the name you wish to assign to this shared printer. Then choose Next >.
Printer and Driver Installation | 1 Selecting the printer Printing Secure font resources from a Windows Application First, set the MICR printer as the active printer – in most applications this is done by selecting Print from the File menu. This is not necessary if the MICR printer is the default printer. Source Technologies’ fonts should appear in the application’s font formatting options. The fonts are named: ICR Secure 12 pt. MICR CMC7 8 pt. MicroPrint 1 pt. MICR E13B 8 pt. SECURE 36 pt.
Printer and Driver Installation | 1 Comparison of printer drivers configured as MICR and non-MICR CONFIGURED FOR MICR CONFIGURED FOR NON-MICR MICR_on.sep separator page used Unlocks Secure Resources (fonts) Copy Count = 1 Jam Recovery = Off MICR Toner ONly DEFAULT MICRJOB=ON Secure Fonts enabled by 96xxFont.pcm ICR Secure 12 pt. MICR CMC7 8 pt. MICR E13B 8 pt. MicroPrint 1 pt. SECURE 36 pt. MICR_off.
MICR Overview | 2 2. MICR Overview MICR stands for Magnetic Ink Character Recognition. All MICR documents have a MICR line with numbers and symbols printed in a unique MICR font with magnetically chargeable ink or toner. Each character of the MICR font has a unique waveform when sensed magnetically. Financial institutions and the Federal Reserve use the MICR line to identify and sort checks.
MICR Overview | 2 Hardcopy: Global Engineering Documents Phone 800-854-7179 or 303-397-7956 Fax 303-397-2740 global@ihs.com http://global.ihs.com Softcopy: X9 Electronic Bookstore www.X9.org - click ESS www.ansi.org - click ESS or http://webstore.ansi.org The key standards that address check documents are as follows: ANS X9.7 Specifications for Bank Check Background and Convenience Amount Field ANS X9.100-160 Specifications for Placement and Location of MICR Printing ANS X9.
MICR Check Design | 3 3. MICR Check Design General Features of Check Design To be a legal and negotiable document, the necessary data elements required on a check are the date, amount, payee name, payer’s bank name, and payer’s signature. Other elements included in a good check design are: the amount in words, account title, check serial number, fractional routing number and MICR line. A good check design contains security features and is formatted to be easily read by both machines and the human eye.
MICR Check Design | 3 Data Elements Date The date is a required data element for a check. It represents the day upon which or after which the transfer of the check amount may take place. The date is usually placed in the upper right portion of the check so it does not interfere with the convenience amount field. The common format is Month, Day and Year, however, the military format of Day, Month and Year is also acceptable. Amount The amount of the check is a required data element for negotiation.
MICR Check Design | 3 Given the available area on the document, you may need to use a smaller font when printing larger value amounts. Payee Area The payee is a necessary data element for a negotiable document. The payee area is generally to the left side of the document either above or below the amount in words. It is often preceded by the words “Pay to the Order Of.” The payee data should not enter the MICR clear band which extends 5/8 of an inch above the bottom of the check.
MICR Check Design | 3 Reserve District and drawee institution. Consult with your bank for the proper routing number and format for each of your accounts. MICR Line Accurate high-speed processing of your checks by financial institutions is enabled by the accuracy and integrity of the data in the MICR line. Refer to figure 3.1 for the location of the following MICR line fields.
MICR Check Design | 3 Figure 3.1: Sample Check A. Serial Number: Must be in the upper right corner and match the serial number in the MICR line (see D for further explanation). B. Fractional Routing Transit Number: Should be in the upper right corner and must match the routing transit number in the MICR line with the exception of the state prefix number (ex. 66 = NC, 67 = SC, 64 = GA, etc.) and the preceding zeros. C. Bank Name, State, City: The bank logo is optional.
Quality Issues | 4 4. Quality Issues A high quality MICR document can be read by bank reader/sorter equipment many times with no readability issues and does not result in damage to bank equipment. This quality is the result of a well designed printer, an originally manufactured MICR toner cartridge and high quality check stock. Printer Features Your Secure MICR Printer is equipped with some features to ensure high quality MICR documents.
Quality Issues | 4 MICR Check Stock Check stock has a significant impact on the resulting quality and security of your MICR document. Here are a few features that should be considered when selecting a check stock. Please see Chapter 5: Security Issues for more information on check stock security features. Quality Quality MICR check printing with your Source Technologies’ secure MICR printer requires check stock that matches the printer’s requirements.
Security Issues | 5 5. Security Issues Printing negotiable documents from blank paper on desktop MICR laser printers makes security a top priority for any company embarking on a desktop check printing project. Combating fraud is a moving target. As soon as a new weapon is developed, malicious forces are at work to devise workarounds to it. Good security programs integrate hardware, software, your employees, processes, and your financial institution into a secure check production system.
Security Issues | 5 should not be linked or be equal to the check serial number due to the potential of double feeding in laser printers. Note: These features serve as a general guide for check security. You should not consider these features as an all inclusive list. We recommend consulting with your paper supplier for any additional comments or suggestions. 4. Firms accepting checks should be aware of damaged MICR lines.
MICR Features | 6 6. MICR Features Source Technologies secure MICR printers are designed to allow both general office document printing and secure MICR document printing. You may print a variety of conventional jobs with regular Lexmark toner using all of the printer features available such as network printer utilities. Source Technologies printers come standard with HP PCL5, PCL6 and PostScript Level 2 emulations.
MICR Features | 6 Most check printers use this font in the signature area of their preprinted checks. We recommend using this font to help deter check fraud. The text in this font can either be fixed, such as the name of your organization, or it can be variable, such as the check amount and payee name. The use of variable text provides an additional method of protection against check counterfeiters. Use of the “MP” designate symbol, to identify the line as MicroPrint, is optional.
MICR Features | 6 Resource Storage Check-related resources, such as form overlays and signatures, are stored in your printer with unique identification numbers. ID numbers must be less than 32767. Number 5001 is reserved for the Audit Trail overlay. Your Secure MICR Printer has two areas where you may store these resources: FLASH and RAM Memory. Flash Memory is an optional feature. It is user managed and its resources can be designated as “secure” or “unsecure.
MICR Features | 6 MICR Type designates the printer as a “normal” Source Technologies secure MICR printer. The default is “normal.” Hex Transfer and Density Control are normally reserved for ST Technical Support. MICRpoint is a feature that allows for fine positioning of the MICR line by the operator. The Audit Menu deals with the optional Audit Trail Report settings. See chapter 7 for more information.
MICR Features | 6 the beginning of their job. Use the &%STH command if you experience page ejects while in &%STF mode. When entering MICR mode with the &%STH command, the printer will: • • • Verify if the proper Front Panel Combination has been entered (when enabled). Allow access to secure check printing resources such as MICR fonts and secure fonts which are stored in printer ROM.
Caution: Errors made in sending the new password command could lead to setting it to an unknown value. If the Password is unknown the printer must be returned to Source Technologies to be reset to PASSWORD. Activate/Set Front Panel Combination Lock &%STSxxxxxxxx$ (optional) &%STS Lead in sequence xxxxxxxx Eight digit sequence, valid characters 0-9 $ Command terminator Sets and activates the front panel MICR combination lock.
MICR Features | 6 Print MICR CMC7 Font &%SM7ddd...ddd$ &%SM7 Lead in sequence ddd...ddd Data to be printed in CMC7 font $ Command terminator Prints the specified data in the CMC7 MICR font which is used in Europe and South America. The font and its correct spacing begin at the current cursor position modified by the MICRpoint adjustment setting at the start of the command. After the terminator is sent, the printer will return to its default font, and the MICR count will be decremented by one.
MICR Features | 6 Load Flash Resource &%STLxxxxxyyyyyyzdd....dd &%STL Lead in sequence xxxxx Resource number in decimal, must be 5 digits yyyyyy Byte count of resource file in Hex, must be 6 positions z Format of the resource file S = Single byte binary format D = Double byte text format dd...dd Flash resource file. e.g. forms overlay, signatures etc. Resource number values may be between 00001 to 32767.
MICR Features | 6 &%STTU# Unlocks tray # The tray to be unlocked (choose from 1, 2 or 3 only) $ Command terminator Tray Swapping Commands &%STTSON$ / &%STTSOFF$ &%STTSON Turns tray swapping on &%STTSOFF Turns tray swapping off $ Command terminator This command allows you to redefine the PCL values for Trays 2 and 3 to allow software and operational consistency with older printers in the system. Swapping ON causes any &l4H to be replaced with 5H and vice-versa.
MICR Features | 6 Decryption Commands Decryption requires printer processing overhead. In our testing encrypted printer data steams near or below 100K bytes per page do not seem to affect printer speed in term of pages per minute or first page out timings. Some testing done with print files from 500K to 1 Meg per page revealed up to a 30% degradation in speed. It is therefore recommended the encryption be reserved for the confidential portions of the data when large file sizes are anticipated.
MICR Features | 6 Custom Character Conversation Command The Custom Character Conversion Command can be used to resolve some problems in printer data streams. An example might be to remove a special command character in an existing data stream that was used by your previous printer hardware. Without changing your data stream, these special characters can either be removed, converted to Nulls, or converted to other sets of data to accomplish what is required.
Note: The two-digit frequency value is inverted. Higher values result in lower frequency. &%STBEEP1$ Emits three long beeps, three short beeps, three long beeps and three short beeps in succession. &%STBEEP2$ The operator's panel displays the message "Press Go to Stop Beeping" and repeatedly emits five long beeps.
For instructional value, assume the current MICRpoint values are at 0, the default values. For best positioning from using a gauge and the current printed output, the MICR line needs to move up about 1/20th of an inch, and to the right ¼ of the typical character width. The MICR character 0 is 0.091 inches wide. Move the line up 36 decipoints and to the right about 15 decipoints. While in the MICR Menu with MICRpoint Adjustment selected, select Horizontal.
IBM Host Programming Features and Examples | 7 7. IBM Host Programming Features and Examples Hex Transfer The Hex Transfer feature allows the user to send PCL escape sequence printer commands to the printer with simple text strings. You may send any valid command or string of commands with no limit on the length or complexity. Form macros, signatures, or simple commands may be passed through any platform to the printer since they are simple text.
IBM Host Programming Features and Examples | 7 Hex Transfer Examples &&??&% &%1B 26 6C 34 48 $ -or&% 1B $& l 4H &% 1B 45$ -or&% 1B $E This command enables Hex Transfer On Sends the PCL Esc sequence– &l4H –which is a paper source command identifying the tray from which the paper will be pulled. This command is a printer reset PCL command which consists of the Esc character and printable E character. It may be sent by simply putting the Esc character in Hex.
IBM Host Programming Features and Examples | 7 Figure 7.1 MICR Mode Command Example The following example shows the MICR Mode commands and Hex Transfer commands in use. This datastream would print the check on the following page (assuming the check macro and the signature are loaded as flash resources).
IBM Host Programming Features and Examples | 7 The commands in Figure 7.1 in order of appearance: &%STFPASSWORD$ Password Command. &%SMCP0001$ MICR Definition Command with the count set to one. &%STP10001$ Unlock Flash Resource number 10001. &%STP20000$ Unlock Flash Resource number 20000. &%1B26...3358$ PCL sequence in hex which sets the page format and enables macro number 10001. &%1B$(s1p16v0s3b4148T PCL sequence which changes the font to Univers 16 point.
IBM Host Programming Features and Examples | 7 Escape Character Translation In many IBM host environments, the programmer cannot send an ESC character (ASCII hex 1B) to the printer from within the application. Your Secure MICR Printer allows you to define the ESC character as a printable character or a combination of two printable characters. You can select combinations of 1 or 2 characters which are translated to a Hex 1B when they are sent to the printer.
IBM Host Programming Features and Examples | 7 Figure 7.2: Sample Check Note: The printed output from the commands listed in Figure 7.1 is shown below.
Audit Trail Reports | 8 8. Audit Trail Reports The Audit Trail Report feature provides a report of the printer’s MICR printing activity. The printer must have flash memory to utilize this option. Details of each flagged check record sent to the printer are provided since the last audit report was purged from flash memory. Report Details A record (check) must be bounded by a start of record command and an end of record command.
Audit Trail Reports | 8 The values in field 4 must follow certain guidelines to be included in the column summation. Dollar signs and commas must be properly located, no more than two numbers after a decimal point, and no alpha characters. For example: Valid Formats “$1,234,567.89” “4321234.56” “5,321” “$.89” Invalid Formats “$1,23,” “432.
Audit Trail Reports | 8 This command identifies the data to be printed in the first column of the report. It is a maximum of 14 characters in length. If less than 14 characters are sent, the printer fills the field with spaces when the audit report is printed. This field is only recorded in the audit report; it is not printed on the check. Audit Report Field Two-MICR Line &%SMDd..d$ or &%SM7d..d$ &%SMD or &%SM7 Lead in sequence d..
Audit Trail Reports | 8 d..d Data to be printed $ Command terminator This command identifies the data to be printed in the sixth column of the report. This field is a maximum of 19 characters. Audit Report Field Seven &%SQ7d..d$ &SQ&7 Lead in string d..d Data to be stored $ Command terminator This command identifies the data to be printed in the seventh column of the report. This field is a maximum of 12 characters. The data in this field is recorded for the Audit Report only.
Audit Trail Reports | 8 The optional field can be any combination of the following letters: T Total Field 4 O Overlay S Sort by MICR line U Unsuccessful report only C Communicate - send report to host instead of printing The report sent back to the host begins with SOH (0x01) and ends with EOT (04). Since the reports can be quite long, they will likely be broken into separate buffers which may be interspersed with non-audit buffers such as PJL JOB status.
Audit Trail Reports | 8 Figure 8.1 Audit Trail Commands Example The following example shows the Audit Trail, MICR Mode and Hex Transfer commands in use. &&??&% & % 1 6 F 3 1 B 2 2 6 6 &%STFPASSWORD$ &%SMCP0001$ &%SAR$ &%STP10001$ &%STP20000$ B 2 6 6 C 3 1 7 8 3 0 7 3 3 1 6 8 3 2 6 1 3 6 3 4 6 6 3 0 1 6 5 3 1 6 C 3 7 2 E 3 3 3 0 4 3 1 B 2 6 6 1 3 0 4 C 8 7 3 3 1 3 0 4 8 1 B 2 6 6 B 3 1 3 0 2 E 3 0 3 0 4 8 1 B 6 3 1 3 0 3 0 3 0 3 1 7 9 3 3 5 8 $ 1000 &%SQ1200$200 Vendor Systems Oct.
Audit Trail Reports | 8 Figure 8.2 Audit Trail Check Sample The datastream in Figure 8.1 will print the following check (assuming the check macro and signature are loaded as flash resources).
Audit Trail Reports | 8 The commands in Figure 8.1 in order of appearance (Audit Report fields shown in bold). &&??&% Hex transfer enable. &%STFPASSWORD$ Password command. &%SMCP0001$ MICR definition command with the count set to one. &%SAR$ Activates Audit Report recording. &%STP10001$ Unlock flash resource number 10001. &%STP00200$ Unlock flash resource number 200. &%1B26...3358$ PCL sequence in hex which sets the page format and enables macro number 10001.
Audit Trail Reports | 8 &%1B(3@ flash memory. Here we call it and print it with an exclamation point (!). PCL command to return to the default font. &%1B$&f0S PCL command to push (store) the current cursor position. &%1B$*p296x3184Y PCL command to move the cursor to 296X, 3184Y. At 300 dpi, this is .97 inches across and 10.61 inches down. We are precisely positioning the MICR line. &%SMD...$ Print E-13B MICR command.
Audit Trail Reports | 8 Figure 8.
Error Messages | 9 9. Error Messages Your Secure MICR Printer has a set of front panel error messages unique to MICR applications. These messages appear if there is a MICR related problem. The printer may also print an error message on the page near where the error occurred. In many cases you can receive more information about a displayed error by pressing Go to print the job which caused the error. Then inspect the printed page for a more detailed error message.
Error Message on Display File System Error Can’t Open File Printed Message Flash Full Purge and Format Integer string incorrect length Integer string incorrect length Invalid AES/DES key Invalid Convert to Escape Character Invalid Convert to Escape Character Macro Definition Error Invalid decode mode specified Macro Definition Error Macro ID greater than 32767 limit.
Error Message on Display MICR Definition Line Count Error Printed Message MICR Password Error Password Length Error. MICR Password Error Password Match Error Nonhexadecimal Value Received Nonhexadecimal value received. Non integer value received.
Appendix A Appendix A: E13B MICR Font Mapping 1 Select only one alphanumeric character to call the font.
Appendix B Appendix B: CMC7 MICR Font Mapping Command &%SM7ddd..
Appendix B Equal = 3D Greater Than > 3E Note: The CMC7 Font in the example above is magnified for purposes of clarity.
Appendix C Appendix C: Secure Numeric Font Mapping Command – &%SMFddd...dd~ Description Alpha/Numeric Character Hex Value Dollar Sign $ 23 Left Bracket ( 28 Right Bracket ) 29 Asterisk * 2A Comma , 2C Dash - 2D Period .
Appendix C Appendix C continued: Secure Numeric Font Mapping Description Alpha/Numeric Character Hex Value Two 2 32 Three 3 33 Four 4 34 Five 5 35 Six 6 36 Seven 7 37 Eight 8 38 Nine 9 39 Arrow > 3E Source Technologies, LLC 65 Secure Font Character ST9650 Secure MICR Printer User’s Guide
Appendix C Example: &%SMF($>>>15,575.00)~ will print...... Note: The secure fonts in the example are magnified for purposes of clarity.
Appendix D Appendix D: ICR Secure Numeric Font Mapping Command Description &%SMIxxxxxx~ Alpha/Numeric Character Hex Value Zero 0 30 One 1 31 Two 2 32 Three 3 33 Four 4 34 Five 5 35 Six 6 36 Seven 7 37 Eight 8 38 Nine 9 39 Asterisk * 2A Comma , 2C Period .
Appendix E Appendix E: MICR Mode Command Summary Description MICR Definition Command &%STFPASSWORD$ &%STHPASSWORD$ &%SMCPxxxx$ Set New Password &%STExxxxxxxx$ Activate/Set Front Panel &%STSxxxxxxxxx$ Password Structure Function Must be sent to enable MICR Mode MICR Line Count command Sets new password. Must be preceded by current password Turns on and sets front panel Combination Lock, must be 8 integers Prints E13-B MICR font at the current print position. Please refer to Appendix A.
Appendix F Appendix F: Audit Report Command Summary Description Start Audit Record Command &%SAR$ Structure Function Activates Audit Trail and begins PJL job Audit Report Field One &%SQ1.d$ Records first field on the Audit Report does not print Print MICR E13B Font &%SMD..d$ Print and records MICR line Audit Report Field Three &%SQ3d..$ Records third field on the Audit Report Print the Check Amount &%SQ4d..
Appendix G Appendix G: PJL Based MICR Commands In addition to supporting the Text Based MICR Command Set described in Sections 6 and 7, this Secure MICR printer also supports the PJL based MICR Commands used on our slower speed models. The MICR code functions emulate the presence of FLASH memory for the 5 secured font resources. The FLASH Memory option is not required for the five fonts.
Appendix G Fonts and Secured Resources The ST Secure MICR printer has five fonts password protected in Flash memory. The printer requires PJL commands with the correct password value to unlock the font resources, followed by PCL to print the fonts. They are then re-locked by PJL commands or by a printer power cycle. The PJL commands to unlock the fonts must precede all PCL commands. The re-lock PJL commands must follow the PCL commands and final form feed command.
Appendix G PCL Font Call Commands After PJL has unlocked the MICR Flash resources, the ST-9116 uses standard PCL5e commands to print. The five resident Source Technologies MICR font resources are all bitmapped fonts and therefore cannot be scaled larger or smaller than the bitmapped images. These fonts can be called by either a PCL Font Selection String or by their ID.
Appendix G (10O(s0p8h8v0s7b360T&k15H font data The Selection String (30802X&k15H font data The ID Call See Font Mapping Appendix pages for specific character set data for each font. PJL Info MICR Command The ST Secure MICR Printer supports an optional custom bi-directional PJL Inquiry Command. The command provides printer information and cartridge information for network management.
Appendix G • • • • Toner Level o A single digit return giving a rough estimate of toner remaining o 9 = Full, 0 = Empty Cartridge Count = xxxx o Data indicating toner usage by counting pixels printed Low Threshold = xxxx o The Toner Low point based on cartridge count value Empty Threshold = xxxx o A cartridge count value that determines when printing must stop to ensure quality MICR documents PJL MICR Command Example Figure 8.1, is an illustration of an Accounts Payable check and remittance information.
Appendix G *p300x600Y is a PCL positioning command. In this case its values are 600 pixels down and 300 pixels to the right of the upper left corner of the page. The Unit of measure command determines the exact distance. The next 4 lines call our secured MICR font resources. We are using the ID for the font call. The Form Feed prints the page. PJL Re-Lock Sequence The last two lines re-lock the secured fonts. The password was not changed in this example.
Appendix H Appendix H: Accounts Payable Source Technologies, LLC 76 ST9650 Secure MICR Printer User’s Guide
Appendix H PJL and PCL commands used to print the sample check: %-12345X@PJL LDECLARE LRESOURCE:"flash:" LRWLOCK="PASSWORD" @PJL ENTER LANGUAGE = PCL &l2a1h6d1e64F &u600D &f100y3X (s4099t0b10H *p300x600Y xxxxxxxxx xx/xx/xxxx $x,xxx.xx 3% $x,xxx.xx *p300x2775Y xxxxxxxxx xx/xx/xxxx $x,xxx.xx 3% $x,xxx.