VX 675 Reference Guide * X C E L N A I O T F N I E R D E I V NF O 7 ’ 4 PR S ’” 0 1 QZ. GH I 2 ABC 5 JKL 8 TUV -SP # R I V E S 9 3 DEF 6 MNO WXY N O I 3 . E VeriFone Part Number DOC265-004-EN-E, Revision E.
VX 675 Reference Guide © 2013 VeriFone, Inc. All rights reserved. No part of the contents of this document may be reproduced or transmitted in any form without the written permission of VeriFone, Inc. The information contained in this document is subject to change without notice. Although VeriFone has attempted to ensure the accuracy of the contents of this document, this document may include errors or omissions.
CONTENTS PREFACE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 Audience. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 Organization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 Related Documentation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 Conventions and Acronyms . . . . . . . . . . . . . . . . . .
C ONTENTS VX 675 ECR (Fiscal Module) Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Customer Display . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . VX 675 3G and GPS Support. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . GPS Receiver . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Connecting by 3G . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
C ONTENTS C Manually Redirecting Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Redirecting Files to Other File Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . Restrictions on File Redirection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Using DDL.EXE to Automatically Redirect Files . . . . . . . . . . . . . . . . . . . . . File Redirection in Operating System Downloads. . . . . . . . . . . . . . . . . . . .
C ONTENTS APPENDIX A System Messages Error Messages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 145 Information Messages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 153 APPENDIX B Troubleshooting Terminal Does Not Start . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 163 Guidelines Terminal Display Does Not Show Correct/Readable Info. . . . . . . . . . . . . . . . .
PREFACE This guide is your primary source of information for setting up and installing the VX 675 terminal. Audience Organization This guide is useful for anyone installing and configuring a VX 675 terminal. Basic descriptions of the terminal features are also provided. This guide is organized as follows: Chapter 1, Terminal Overview. Provides an overview of the VX 675 terminal. Chapter 2, Terminal Setup. Explains how to set up and install the VX 675 terminal.
P REFACE Related Documentation Appendix E, VX 675 Battery Information. Provides information about the VX 675 Smart Battery.
P REFACE Conventions and Acronyms Table 1 Convention Document Conventions Meaning Example NOTE The pencil icon is used to highlight important information. RS-232-type devices do not work with the PINpad port. CAUTION The caution symbol indicates possible hardware or software failure, or loss of data. The terminal is not waterproof or dustproof, and is intended for indoor use only. WARNING The lighting symbol is used as a warning when bodily injury might occur.
P REFACE Conventions and Acronyms Acronym Definitions Various acronyms are used in place of the full definition. Table 2 presents acronyms and their definitions.
CHAPTER 1 Terminal Overview This chapter provides a brief description of the VX 675 terminal. This terminal features a color screen display, fast processor, abundant memory, and PCI 3.0 security. The VX 675 terminal is a portable, battery-powered device designed to fit comfortably during handheld consumer-facing applications. It features a 2.8” TFT LCD display and a backlit spill-resistant keypad.
TERMINAL O VERVIEW Features at a Glance Features at a Glance The following are the features of VX 675: • 400 MHz ARM11 RISC processor delivers power and usability in a convenient “hand-over” design. • Multi-application operating environment. • Advanced memory architecture to meet tomorrow’s needs with support for 192 MB. • Backward compatibility with VeriFone solutions help reduces development costs.
TERMINAL O VERVIEW Features and Benefits Performance and • Durability • Fast transactions due to powerful 400 MHz ARM11 processor. High-capacity 3.6 V 2200 mAh Li-ion battery. VX 675 3G supports 3.7 V 2200 mAh Li-ion battery pack. • Base for drop-and-go charging. • Rounded corners and drop resistant to 3 feet on concrete floor to minimize breakage. • 192 MB of memory. Security • PCI PED 3.0 approved for debit and other PIN-based transactions. • EMV Level 1 and 2 Type Approval.
TERMINAL O VERVIEW Features and Benefits 14 VX 675 REFERENCE GUIDE
CHAPTER 2 Terminal Setup This chapter describes terminal setup procedures.
TERMINAL S ETUP Selecting Terminal Location Selecting Terminal Location Use the following guidelines when selecting a location for your VX 675 terminal. Environmental • Factors CAUTION • Do not use the terminal where there is high heat, dust, humidity, moisture, or caustic chemicals or oils. • Keep the terminal away from direct sunlight and anything that radiates heat, such as a stove or motor. • Do not use the terminal outdoors.
TERMINAL S ETUP Unpacking the Shipping Carton Unpacking the Shipping Carton Open the shipping carton and carefully inspect its contents for possible tampering or shipping damage. The VX 675 device is a secure product and any tampering may cause the terminal to cease to function properly.
TERMINAL S ETUP Examining Terminal Features Examining Terminal Features Before you continue the installation process, see the terminal features illustrated below. Figure 3 VX 675 Terminal Features (Front Panel) Front Panel The front panel includes the following features: • A 2.8” TFT LCD display. • A set of keys that include: a A 12-key, telephone-style keypad (keypads may vary in style). b Three color-coded function keys below the keypad (from left to right: CANCEL, CLEAR, ENTER).
TERMINAL S ETUP Examining Connection Ports NOTE Examining Connection Ports • A smart card reader, built into the bottom of the terminal. For directions on how to use a smart card, see Conducting Smart Card Transactions. • A SAM (security access module) compartment, built into the bottom of the terminal inside the back compartment. The VX 675 terminal contains an MSAM cardholder to support stored-value card programs or other merchant card requirements.
TERMINAL S ETUP Installing the Paper Roll Installing the Paper Roll A fast, quiet thermal printer is built into the VX 675 terminal. Before you can process transactions that require a receipt or record, you must install a roll of thermal-sensitive paper in the printer. The ITP uses a roll of single-ply, thermal-sensitive paper: 25mm and 40mm. A pink out-of-paper indicator line appears on the edge of the paper approximately 18 inches before the end of the roll.
TERMINAL S ETUP Installing the Paper Roll 6 Drop the paper roll into the printer tray. PP Figure 7 Loading Paper Roll NOTE VX 675 with ECR functionality uses 40mm paper roll. 7 Pull paper up past the glue residue on the paper roll. 8 Close the paper roll cover by gently pressing directly on the cover until it clicks shut, allowing a small amount of paper past the glue residue to extend outside the printer door.
TERMINAL S ETUP Installing the SIM Card Installing the SIM Card The VX 675 terminal for GPRS modems supports the installation of a GSM SIM (Subscriber Identity Module). Use the following procedure to install a SIM card. To install or replace 1 the card Turn off the terminal. 2 Place the terminal upside down on a soft, clean surface to protect the lens from scratches. 3 Unscrew and remove the back compartment cover. 4 Lift the battery pack.
TERMINAL S ETUP Installing the SD Card 6 Return the battery pack to its original position. 7 Close and screw the back compartment cover. Installing the SD Card VX 675 3G supports micro SD card installation. Use the following procedures to replace or install an SD card. To install or replace 1 the SD card: Turn off the terminal. 2 Lift and turn the rubber flap cover. 3 Insert the micro SD card. The card should lock in place when inserted correctly. 4 Replace the rubber flap cover.
TERMINAL S ETUP Battery Behavior (No Power Pack) NOTE Battery Behavior (No Power Pack) • VX 675 battery pack is not customer changeable and therefore should not be disconnected and removed. • Li-ion batteries are not affected by shallow charging. Furthermore, when the terminal has no external power source or battery, the coin cell battery provides power to the security circuit.
TERMINAL S ETUP Connecting the Terminal Power Pack Connecting the Terminal Power Pack After installing the battery, connect the VX 675 terminal to the provided power source for initial charging. CAUTION Using an incorrectly rated power supply may damage the terminal or cause it not to work as specified. Before troubleshooting, ensure that the power supply being used to power the terminal matches the requirements specified on the bottom of the terminal.
TERMINAL S ETUP Charging the Battery Charging the Battery NOTE After unpacking your VX 675 terminal, connect the power pack to the unit for 4.65 hours or until fully charged. The terminal charges the VX 675 battery when the terminal is in the base. For more information, see Docking the Terminal on the Base. The battery has a safety circuit to protect the Li-ion cells from overcharging and over-discharging. If the battery is over-discharged, the safety circuit shuts down the battery.
TERMINAL S ETUP Powering Up the Base Full-Feature Base A charging base with Dial, Ethernet, Serial (RS-232), and USB Host ports for full back-up connectivity options and support to some peripherals like ECR, check reader, and barcode reader, among others. Figure 13 Powering Up the Base Full-Feature Base Showing Dial, Ethernet, Serial, Micro-USB and USB Host Ports Use the procedure in this section to connect the VX 675 Base to a power source.
TERMINAL S ETUP Docking the Terminal on the Base Docking the Terminal on the Base The VX 675 terminal can be placed on the base when not in use for continuous charging of its battery. $ Figure 15 Undocking the Terminal from the Base Docking the VX 675 Terminal on the Base The VX 675 terminal can be taken from the base when in use.
TERMINAL S ETUP Conducting Smart Card Transactions Conducting Smart Card Transactions The smart card transaction procedure may vary from one application to another. Verify the procedure with your application provider before performing a smart card transaction. To Conduct a Smart 1 Card Transaction Position a smart card with the contacts facing upward (see illustration below). 2 Insert the smart card into the smart card reader slot in a smooth, continuous motion until it seats firmly.
TERMINAL S ETUP Connecting to USB Host 3 Swipe the card through the magnetic card reader. Figure 18 Connecting to USB Host Using the Magnetic Card Reader USB Host support, allows you to download applications and secure keys via USB flash drive. To connect to the 1 USB Host Power up the base by inserting the micro-USB plug into the micro-USB port of the base as shown in Figure 14. 2 Make sure that the terminal is docked on the base.
TERMINAL S ETUP VX 675 ECR (Fiscal Module) Support VX 675 ECR (Fiscal Module) Support The fiscal module allows ECRs to have direct connection to the Ministry of Finance servers. When a mobile transaction is made, the transaction data is sent over to the Ministry of Finance servers, and then goes to the banking host system. The fiscal module stores the transaction data (up to 2 MB). A metallic seal is placed on the right side, under the MSR to secure the fiscal module.
TERMINAL S ETUP VX 675 3G and GPS Support 32 VX 675 REFERENCE GUIDE
CHAPTER 3 Using the Terminal Keys Before proceeding to other tasks, familiarize yourself with the operational features of the VX 675 terminal keypad to enter data. This section describes how to use the VX 675 keypad, which consists of four programmable function keys (PF1 to PF4), a 5-way navigation key, a 12-key telephone-style main keypad (0 to 9, *, and #), and three command keys (CANCEL, CLEAR, and ENTER). Using these keys, you can perform all data-entry tasks described in this manual.
U SING THE TERMINAL K EYS Data Entry Modes Data Entry Modes NOTE Before you can use the keys on the front panel to enter ASCII characters, the VX 675 terminal must be in a mode that accepts keyed data entry. There are two terminal operating modes, each enabling you to press keys to enter data under specific circumstances: • Normal mode: This is the terminal operating mode where an application program is present in mDRAM and currently running.
U SING THE TERMINAL K EYS Main Keypad Command Key The following are the command keys of the terminal’s keypad. Descriptions NOTE The terminal’s operating mode and context determine the specific action performed when you press one of the function keys. The following descriptions are provided solely to acquaint you with some general characteristics of these function keys before presenting more detailed Verix Terminal Manager procedure descriptions.
U SING THE TERMINAL K EYS Main Keypad 36 VX 675 REFERENCE GUIDE
CHAPTER 4 Verix Terminal Manager This chapter describes a category of terminal functions called terminal manager operations. • Press ENTER and 7 keys at the same time and enter the password to open the Verix Terminal Manager (VTM). See Entering Verix Terminal Manager. • Since files are loaded into specific groups, VTM users can view files, delete files, and manage configuration variables. See File Groups. • Use the system and file group passwords to secure applications and information on the terminal.
VERIX TERMINAL M ANAGER Local and Remote Operations Local and The terminal manager operations available on a VX 675 terminal can be divided Remote into the following two categories or types: Operations • Local operations address a stand-alone terminal and do not require communication or data transfers between the terminal and another terminal or computer. Perform local Verix Terminal Manager operations to configure, test, and display information about the terminal.
VERIX TERMINAL M ANAGER File Groups File Groups The VX 675 operating system implements a file system in memory. Files are assigned to one of 15 groups for access control. Groups are similar to directories on a computer in that different applications can be stored in separate file groups, just like different computer applications can be stored in separate directories. Groups are referred to as Group n or GIDn throughout this manual.
VERIX TERMINAL M ANAGER Verix Terminal Manager Menus System Password When you key in the system password to enter terminal manager, an asterisk (*) appears for each character you type. These asterisks prevent your password from being seen by an unauthorized person. NOTE Some application program downloads automatically reset the system password. If your system password no longer works, check if a download has changed your password.
VERIX TERMINAL M ANAGER Verix Terminal Manager Menus to return to a previous menu, press the UP icon () on the left side of the screen. To go to the next menu, press the DOWN icon (). The smaller arrows on the right side of the screen, UP () and DOWN (), are used to select any submenu from the list. Pressing ENTER will choose the highlighted function. To return to the main Verix Terminal Manager menu and cancel any changes, press the CANCEL key.
VERIX TERMINAL M ANAGER Verix Terminal Manager Menus The Display column in Table 3 indicates what appears on the terminal display screen at each step of the procedure. Please note the following conventions used in this column: • If a prompt or message appears on the screen exactly as it is described, it is shown in Arial bold font and in lower case with the first letter capitalized. For example, Download Needed.
VERIX TERMINAL M ANAGER Verix Terminal Manager Menus Table 4 Enter Verix Terminal Manager Display Action VERIFONE VX675 QT65010M 03/09/2012 Verix COPYRIGHT 1997-2012 VERIFONE ALL RIGHTS RESERVED BATTERY 100% FOR STATUS PRESS KEY 3 At startup, the terminal displays a copyright notice screen that shows the terminal model number, the OS version of the VX 675 stored in the terminal’s memory, the date the firmware was loaded into the terminal, and the copyright notice.
VERIX TERMINAL M ANAGER Verix Terminal Manager Menus Table 4 Enter Verix Terminal Manager (continued) Display Action If an application prompt appeared and you chose to enter the terminal manager, you are prompted to type the system password. TERMINAL MGR ENTRY Please Enter Password ___________________ Use the default password “166831.” This password is entered as: 1 6 6 8 3 1, and press ENTER. Use CLEAR to delete the entry and correct any mistakes.
VERIX TERMINAL M ANAGER Verix Terminal Manager Menus Menu 1 In this menu you can restart the terminal, edit parameters, download terminal software updates, check memory usage and availability, as well as view the contents of I: drive and F: drive directories. You can also clear the memory and calibrate the touchscreen.
VERIX TERMINAL M ANAGER Verix Terminal Manager Menus Table 5 Verix Terminal Manager Menu 1 (continued) Display Action VERIX TERMINAL MGR Please enter To continue, enter the required password. If you enter an incorrect password, the following message appears: Password for GID n: Change Passwords Gn ___________________ Please Try Again Press ENTER. Verify your password and reenter it. 3> DOWNLOAD To continue, enter the Group ID.
VERIX TERMINAL M ANAGER Verix Terminal Manager Menus Table 5 Verix Terminal Manager Menu 1 (continued) Display Action VTM DOWNLOAD MGR Gn Select the type of download mode: Full dnld or Partial dnld. A full download will delete all data on the group’s memory. A partial download only adds new files to the group’s memory. If a downloaded file is identical to an existing file in the memory, the existing file is replaced.
VERIX TERMINAL M ANAGER Verix Terminal Manager Menus Table 5 Verix Terminal Manager Menu 1 (continued) Display Action VTM DOWNLOAD MGR Gn If you selected YES from the previous screen, a confirmation screen appears. Select YES to confirm or NO to cancel the deletion. **** WARNING **** Confirm Deletion For Application 1> Yes 2> NO If a FULL multiple download has been previously done, this screen appears instead of the previous two screens.
VERIX TERMINAL M ANAGER Verix Terminal Manager Menus Table 5 Verix Terminal Manager Menu 1 (continued) Display Action VTM DOWNLOAD MGR Gnn If you selected 1> MODEM and *ZP (host phone number) is not defined, you must enter valid phone number (up to 32 characters long) and press ENTER. *ZP Host Phone num ___________________ ___________________ Select 2> COM1 to download via the COM 1 port. VTM DOWNLOAD MGR Gnn Select 3> COM7 to download via the COM 7 port.
VERIX TERMINAL M ANAGER Verix Terminal Manager Menus Table 5 Verix Terminal Manager Menu 1 (continued) Display Action VTM DOWNLOAD MGR Gnn Select 6> TCPIP to download from your TCPIP connection. No *ZTCP Variable and no VxEOS An application that supports the TCP stack is loaded with the OS to be able to use the 6> TCPIP option. If no application can be found, an error message appears. Not all listed options are available for all platforms.
VERIX TERMINAL M ANAGER Verix Terminal Manager Menus Table 5 Verix Terminal Manager Menu 1 (continued) Display Action VTM DOWNLOAD MGR Gnn If you selected 6> TCPIP and *ZP (TCP address) is not defined, you must enter a valid TCP address (up to 40 characters long including the colon and port number) and press ENTER.
VERIX TERMINAL M ANAGER Verix Terminal Manager Menus Table 5 Verix Terminal Manager Menu 1 (continued) Display Action VTM DOWNLOAD MGR Gnn If *ZT (terminal ID used by VeriCentre) is not defined, you must enter a valid terminal ID (up to 15 characters long) and press ENTER.
VERIX TERMINAL M ANAGER Verix Terminal Manager Menus Table 5 Verix Terminal Manager Menu 1 (continued) Display Action VTM DOWNLOAD MGR Gnn If you selected 2> COM1 or 3> COM7 , a line of asterisks appears that shows the percentage of completion. Each asterisk equals approximately 10% of the download. UNIT RECEIVE MODE ***________________ You can cancel a download in progress by pressing CANCEL. Doing so restarts the terminal.
VERIX TERMINAL M ANAGER Verix Terminal Manager Menus Table 5 Verix Terminal Manager Menu 1 (continued) Display Action 5> DIRECTORY LISTING NAVIGATION CONTROLS 2/8 Up/Down 1/7 Page Up/Down * Send to Com Port # Send to Printer ENT Select To continue, enter the Group ID. The value of 1 is for the primary application while value between 115 is for other applications. Press ENTER. CONFIG.SYS protected records that begin with * or # are retained when you clear a mDRAM file group.
VERIX TERMINAL M ANAGER Verix Terminal Manager Menus Table 5 Verix Terminal Manager Menu 1 (continued) Display Action 6> CLEAR MEMORY To clear a file group’s memory, enter the group ID. VERIX TERMINAL MGR Press ENTER. Group ID: _1 To choose an option in the menu, press the corresponding number on the keypad or scroll down to the option using the DOWN arrow then press ENTER. VERIX TERMINAL MGR 1> Clear CONFIG.
VERIX TERMINAL M ANAGER Verix Terminal Manager Menus Table 5 Verix Terminal Manager Menu 1 (continued) Display Action 7> CALIBRATE SCREEN This option is not available for this terminal.
VERIX TERMINAL M ANAGER Verix Terminal Manager Menus Table 5 Verix Terminal Manager Menu 1 (continued) Display Action VTM MGR TERMINAL INFO This screen shows additional configuration information specific to your terminal: Rcnt • Number of seconds the terminal has run (Life) 2009 Tamper Detected Heap 1232 Stack 2280 CERT 531010 N • Last reset date and time, in YYMMDDHHMMSS format (where YY = year, MM = month, DD = day, HH = hour, MM = minute, and SS = second).
VERIX TERMINAL M ANAGER Verix Terminal Manager Menus Table 5 Verix Terminal Manager Menu 1 (continued) Display Action 9> DIAGS To choose an option in the menu, press the corresponding number on the keypad or scroll down to the option using the DOWN key and press ENTER. VERIX DIAGS MGR 1> Printer Diag 2> IPP Diag 3> ICC Diags 6> Debugger To run printer diagnostics and test the printer, select 1> PRINTER DIAG. 7> Tamper Log To test the internal PIN pad, select 2> IPP DIAG.
VERIX TERMINAL M ANAGER Verix Terminal Manager Menus Table 5 Verix Terminal Manager Menu 1 (continued) Display Action VERIX DIAGS MGR To choose an option in the menu, press the corresponding number on the keypad or scroll down to the option using the DOWN key and press ENTER. 1> Battery Status 2> USB Info 3> Display Testscreen 5> RAD Switch To view battery status, select 1> BATTERY STATUS then press ENTER. 6> CIB Information To view USB info, select 2> USB INFO.
VERIX TERMINAL M ANAGER Verix Terminal Manager Menus Table 5 Verix Terminal Manager Menu 1 (continued) Display Action 9> DIAGS 2> IPP DIAG INTERNAL PIN PAD MEMORY TEST PASSED IPP8 EMUL02A 05/08 01 SN: 0000000000000000 BAUD: 1200 RESET 3 MODE: VISA EXIT 4 When you select 2, the INTERNAL PIN PAD screen appears and the diagnostic test begins. The firmware version and download date, IPP serial number, baud rate, and mode are displayed.
VERIX TERMINAL M ANAGER Verix Terminal Manager Menus Table 5 Verix Terminal Manager Menu 1 (continued) Display Action 9> DIAGS 4> KEYBOARD DIAG TERMINAL MGR KBD TEST KEYCODE nn This screen displays the hexadecimal ASCII keycode for each key you press. The value displayed corresponds to the actual key pressed. Other values assigned to keys are software dependent. To test the keyboard, press some keys and check that they match their keycodes (for example, the 1 key displays keycode 31).
VERIX TERMINAL M ANAGER Verix Terminal Manager Menus Table 5 Verix Terminal Manager Menu 1 (continued) Display Action 9> DIAGS 6> DEBUGGER VERIX TERMINAL MGR Group ID: nn VERIX TERMINAL MGR Please enter Password for GID nn ___________________ Enter the current password for the selected file group and press ENTER. If you enter an incorrect password, PLEASE TRY AGAIN appears. Press ENTER. Verify your password and reenter it. To return to the VERIX DIAGS MGR screen press CANCEL.
VERIX TERMINAL M ANAGER Verix Terminal Manager Menus Table 5 Verix Terminal Manager Menu 1 (continued) Display Action 9> DIAGS 7> TAMPER LOGS TAMPER LOG 03/13/12 03/13/12 01/01/00 01/01/00 01/01/00 01/01/00 19:38 19:36 17:07 00:00 00:57 00:00 CLEAR 020000 CLEAR 7FFFFF CLEAR 7FFFFF The Tamper Log screen displays a list of possible tamper events. The list is sorted from the most current tamper event to the oldest event.
VERIX TERMINAL M ANAGER Verix Terminal Manager Menus Table 5 Verix Terminal Manager Menu 1 (continued) Display Action 9> DIAGS 8> RKL LOG RKL LOG INFO To go back to the VERIX DIAGS MGR screen, press CANCEL. pg nn 9> DIAGS 8> RKL LOG To go back to the VERIX DIAGS MGR screen, press CANCEL. Outputting log . . .
VERIX TERMINAL M ANAGER Verix Terminal Manager Menus Menu 2 In this menu, you can view the terminal configuration information, change system passwords, perform remote diagnosis, view error and tamper logs, update time and date, load IPP key and adjust display contrast. Some application program downloads automatically reset the system password. Edit Keyed Files A keyed file is a collection of individual records that contain ASCII data and are identified by unique search keys.
VERIX TERMINAL M ANAGER Verix Terminal Manager Menus For more information about using VeriCentre Download Management Module in client/server installations, please contact your local VeriFone representative. Table 6 Verix Terminal Manager Menu 2 Display Action VERIX TERMINAL MGR To view the error and tamper logs, select 1>SYSTEM ERROR LOG. 1> System Error Log To set the date and time, select 2> CLOCK. 2> Clock To adjust the display contrast, beeper and backlight, select 3> CONSOLE SETTINGS.
VERIX TERMINAL M ANAGER Verix Terminal Manager Menus Table 6 Verix Terminal Manager Menu 2 (continued) Display Action 1> SYSTEM ERROR LOG CPSR 60000010 The error log screens display internal diagnostic information about the most recent unrecoverable software error. If you report a terminal problem, you may be asked to provide this information.
VERIX TERMINAL M ANAGER Verix Terminal Manager Menus Table 6 Verix Terminal Manager Menu 2 (continued) Display Action 2> CLOCK To adjust the current time one hour forward, select 1> INCREMENT HOUR. VTM CLOCK MANAGER 1> INCREMENT HOUR 2> EDIT TIME 3> EDIT DATE 4> DECREMENT HOUR To see the time, select 2> EDIT TIME. To set the date, select 3> EDIT DATE. To adjust the current time one hour back, select 4> DECREMENT HOUR.
VERIX TERMINAL M ANAGER Verix Terminal Manager Menus Table 6 Verix Terminal Manager Menu 2 (continued) Display Action 2> CLOCK 3> EDIT DATE Enter the new date in MONTH/DAY/YEAR (MM/DD/YY) format. VTM DATE Current Date: To correct a mistake, press CLEAR to delete and enter the correct number; press ENTER to set the new date. HH:MM:SS New Date: ___ / ___ / ___ The current time and date is then displayed on the next screen. Press CANCEL to return to the third menu of the VERIX TERMINAL MGR.
VERIX TERMINAL M ANAGER Verix Terminal Manager Menus Table 6 Verix Terminal Manager Menu 2 (continued) Display Action 4> CHANGE PASSWORDS To change the password of file Group, select FILE GROUP. Then, go to the GROUP nn PASSWORD procedure below. See Passwords for more information. VTM PASSWORD MGR 1> File Group 2> TERMINAL MGR Entry To change the password of another file group, select File Group, enter the appropriate file group number and press ENTER. Then, go to the NEW PASSWORD procedure below.
VERIX TERMINAL M ANAGER Verix Terminal Manager Menus Table 6 Verix Terminal Manager Menu 2 (continued) Display Action VTM PASSWORD MGR Type the new password and press ENTER. To correct a mistake, press CLEAR to delete the entry and then reenter the new password. New ___________________ The terminal requests that you verify the new password. Reenter the new password and press ENTER.
VERIX TERMINAL M ANAGER Verix Terminal Manager Menus Table 6 Verix Terminal Manager Menu 2 (continued) Display Action 5> KEY MANAGEMENT 1> IPP KEY LOAD VERIX TERMINAL MGR Please enter Password for GID nn ___________________ Enter the current password for the selected file group and press ENTER. Note: This requires group 1 privileges and the group 1 password. If you enter an incorrect password, PLEASE TRY AGAIN appears. Press ENTER. Verify your password and reenter it.
VERIX TERMINAL M ANAGER Verix Terminal Manager Menus Table 6 Verix Terminal Manager Menu 2 (continued) Display Action RKL RSA KEY LOADING Press CANCEL to stop the key load session. BYTES SENT 0 BYTES RCVD 0 PRESS CANCEL TO END 5> KEY MANAGEMENT 3> RKL KEY STATUS RKL Key Status Press ENTER to view the Private Key Hash. Public key name Press CANCEL to return to the KEY MANAGEMENT screen.
VERIX TERMINAL M ANAGER Verix Terminal Manager Menus 74 VX 675 REFERENCE GUIDE
CHAPTER 5 File Authentication This chapter discusses the following VeriShield Retain file authentication security architecture, VeriShield Retain file authentication module, and the organizational infrastructure that supports it (see Introduction to File Authentication).
F ILE A UTHENTICATION Introduction to File Authentication Special Files Used The following specially formatted files support the file authentication process: in the File • A digital certificate is a digital public document used to verify the signature of Authentication a file. Process • A digital signature is a piece of information based on both the file and the signer’s private cryptographic key. The file sender digitally signs the file using a private key.
F ILE A UTHENTICATION Introduction to File Authentication A sponsor certificate is authenticated under a higher-level system certificate, called the application partition certificate. NOTE Only one sponsor certificate is permitted per terminal. An application cannot be loaded without both a Sponsor and signer certificate. • Signer certificate: Certifies the right to sign and authenticate files for terminals belonging to the sponsor.
F ILE A UTHENTICATION Introduction to File Authentication Development Process In this process: 1 The application developer creates an application file. 2 The application developer applies for Sponsor and Signer certificates. The absence of a “default” signer certificate compels developers to apply for a dedicated Signer certificate. 3 The developer assigns a name to the application file. 4 The application file becomes a required input for the VeriShield File Signing Tool.
F ILE A UTHENTICATION Introduction to File Authentication The following diagram describes the development process. DEPLOYMENT PROCESS FULLY DEBUGGED APPLICATION FILE DEVELOPER CREATES APPLICATION. APPLICATION FILE CREATED (WITH DEVELOPERASSIGNED NAME). APPLICATION FILE SDK VERISHIELD '(9(/23(5 CERTIFICATE '(9(/23(5 KEY '(9(/23(5 $33/,(6 )25 6,*1(5 &(57,),&$7( SIGNATURE FILE (.P7S) DEBUG APPLICATION FILE; MAKE NECESSARY CHANGES. 1) DEVELOPMENT OS SEARCHES FOR A .P7S FILE. 2) IF A .
F ILE A UTHENTICATION Introduction to File Authentication Pre-Deployment Process In this process: 1 A sponsor goes to the VeriFone CA Web site and requests certificates for deployment terminals. 2 Based on information provided by the sponsor through the VeriFone CA Web site, the VeriFone CA determines the required certificate structure. 3 The VeriFone CA generates the following items for the sponsor: a Smart card containing a set of certificates and private key. b Smart card PIN.
F ILE A UTHENTICATION Introduction to File Authentication Deployment Process (see Figure 26) In this process: 1 The sponsor provides the application file (from the development process), the smart card, and smart card PIN (from the pre-deployment process) as inputs to VeriShield Retain. 2 VeriShield Retain extracts the signer key, signer certificate, and sponsor certificate from the smart card. 3 VeriShield Retain uses the extracted data, along with the application file, to create a signature file (*.
F ILE A UTHENTICATION Introduction to File Authentication Figure 26 illustrates the deployment process. DEVELOPMENT PROCESS PRE-DEPLOYMENT PROCESS SIGNER SMART CARD SMART CARD PIN FULLY DEBUGGED APPLICATION FILE SIGNER CERTIFICATE SPONSOR CERTIFICATE SIGNER PRIVATE KEY VERISHIELD FILE SIGNING TOOL SIGNATURE FILE (*.*.P7S) * 7 ’ 4 PR S ’” X 0 SIGNER CERTIFICATE 1 QZ. 2 ABC I 5 JKL 3 DEF 8 TUV 6 MNO 9 WXY # GH -SP Figure 26 SPONSOR CERTIFICATE 1) DEVELOPMENT OS SEARCHES FOR A *.*.
F ILE A UTHENTICATION Introduction to File Authentication Authentication Requirements for Specific File Types For the purposes of file authentication, executable code files include two file types that can be recognized by the filename extensions listed in Table 8. Table 8 Executable File Extensions File Type Extension Compiled and linked application files *.out Global function libraries *.
F ILE A UTHENTICATION Introduction to File Authentication It is not mandatory to always download a signature file and its target application file at the same time. For example, you can download the corresponding signature file in a separate operation.
F ILE A UTHENTICATION Introduction to File Authentication For non-executable files, it is the application’s responsibility to confirm that all of the files it uses successfully authenticated on download completion, and when the application executes the first time following a restart. NOTE Because the application is responsible for verifying data files and prompt files, it is recommended that each application check the ATTR_NOT_AUTH bit of all relevant files on restart.
F ILE A UTHENTICATION Introduction to File Authentication A development set of higher-level certificates is downloaded into each VX 680 terminal upon manufacture. When you take a new VX 680 terminal out of its shipping carton, certificate data is already stored in the terminal’s certificate tree. In this just-out-of-the-box condition, the VX 675 terminal is called a development terminal. A sponsor requests a set of digital certificates from the VeriFone CA to establish sponsor and signer privileges.
F ILE A UTHENTICATION Introduction to File Authentication Deployment Terminals While the application development process is being completed and while the new application is being tested on a development terminal, a sponsor can order specific sponsor and signer certificates from the VeriFone CA to use to logically secure sponsor and signer privileges when the VX 675 terminal is prepared for deployment.
F ILE A UTHENTICATION Introduction to File Authentication Figure 27 illustrates the certificate trees in development and deployment terminals. ** ’ X X QZ 1 1QZ. .
F ILE A UTHENTICATION Introduction to File Authentication Table 9 Differences Between Required Inputs Development Terminals Deployment Terminals Manufacturing inputs to the file signing process are included, together with the VeriShield File Signing Tool in the VX 675 SDK. These inputs make it possible for anyone who has the VX 675 SDK to sign and authenticate files.
F ILE A UTHENTICATION Introduction to File Authentication Replace a Sponsor Certificate A sponsor may need to clear the current sponsor certificate from a terminal so that a new sponsor can load certificates and applications. To do this, the original sponsor must order a “clear” smart card from the VeriFone CA. The clear smart card is specific to the requesting sponsor.
F ILE A UTHENTICATION File Authentication and the File System File Authentication and the File System Application Memory Logically Divided Into File Groups The memory of a VX 675 terminal is logically divided into two main areas, or partitions: • operating system • applications The application partition is further divided into sub-partitions. These sub-partitions are called file groups or GIDs.
F ILE A UTHENTICATION File Authentication and the File System • The main application stored in GID1 can access files, secondary applications, or function libraries stored in any other file group. • The application downloaded into GID1 is always the primary application for the terminal. This application is owned by the primary terminal sponsor (sponsor A) in cases where there are multiple sponsors. • The Group 1 application controls any and all secondary applications stored in terminal memory.
F ILE A UTHENTICATION File Authentication and the File System If the signature file authenticates its target file, and if the *FA variable is present in the CONFIG.SYS file of the target file group and is set to 1, the signature file is retained in memory and is automatically moved, if necessary, into the same logical file system (I: or F:) as the target file it authenticates.
F ILE A UTHENTICATION VeriShield File Signing Tool The normal size of a signature file is approximately 400 bytes. Depending on the application’s size and on how memory space is allocated, the area available for storing multiple signature files must be carefully managed. The memory space required by a certificate file is also approximately 400 bytes, but certificate files are temporary.
F ILE A UTHENTICATION VeriShield File Signing Tool You can also specify to store the target file in the target file group’s I: drive (default location) or in the target file group’s F: drive. If required, you can navigate through the file system on your PC to select the signer certificate file (*.crt) and signer private key file (*.key) to use as inputs to the file signing process.
F ILE A UTHENTICATION VeriShield File Signing Tool Command-Line Table 11 lists the switches that make up the command-line mode syntax for the Entries for the File file signing tool (VeriShield File Signing Tool). Signing Tool Table 11 Command-Line Mode Switches for VeriShield File Signing Toola Switch Description Requirements -C, -c Signer certificate file name (*.crt). Required input for development terminals and deployment terminals. Use the VxSIGN.
F ILE A UTHENTICATION VeriShield File Signing Tool Table 11 Command-Line Mode Switches for VeriShield File Signing Toola Switch Description Requirements -S, -s Name of the signature file (*.p7s) for VeriShield File Signing Tool to generate for the target application file. Required for development terminals and for deployment terminals. -L, -l Specifies to store the target application file to sign and authenticate in the drive F: file system. Optional entry.
F ILE A UTHENTICATION VeriShield File Signing Tool application’s logical security requirements, other types of files, such as data files and font files, may also need to be signed and authenticated on download. • The -s switch is followed by the name of the signature file to be generated, file.p7s. • The -c switch is followed by the name of the signer certificate to be used for file authentication with the development terminal, “vxsign.crt.
CHAPTER 6 Performing Downloads This chapter contains information and procedures to allow you to perform the various types of data transfers required to: • Develop applications for the VX 675 terminal. • Prepare VX 675 terminals for deployment. • Maintain VX 675 terminal installations in the field. • Transfer data to/from terminals. In this chapter, information pertaining to file authentication is only discussed in the context of procedures while performing file downloads.
P ERFORMING D OWNLOADS Download Tools • NOTE Download Tools NOTE Back-to-back downloads: Files and data transfer from a sending VX 675 terminal to a receiving VX 675 terminal are sent over using the service dongle, it connects the RS-232 serial ports of the two systems. An external UART Dongle on both the sending and receiving terminal is required to attach the special cable.
P ERFORMING D OWNLOADS Full and Partial Downloads A complete OS is downloaded to each VX 675 terminal during the manufacture. If necessary, download newer versions during application development, or when preparing for deployment to on-site terminals. • Applications and related files: An application is a computer program consisting of one or more executables, including compiled and linked object files (*.out), and one or more function libraries (*.lib). Most applications also include font files (*.vft, *.
P ERFORMING D OWNLOADS Full and Partial Downloads The various types of full and partial download procedures are listed and described in Table 12. Table 12 Download Type Full application download Types of Full and Partial Downloads Description and Effects An entire application, including all executables and data files, transfers from one system to another in a single operation.
P ERFORMING D OWNLOADS Full and Partial Downloads Table 12 Download Type Full operating system download Types of Full and Partial Downloads Download Methods Supported Description and Effects An entire OS version transfers from a host PC to the VX 675 terminal. • Direct downloads Note: Files related to file authentication and terminal configuration settings can be included in a full OS download. During this process, memory is cleared. Full backto-back OS downloads are not supported.
P ERFORMING D OWNLOADS Support for Multiple Applications Support for Multiple Applications • Partial downloads are routinely performed by many applications. This procedure, which can be automated by an application running on a remote host computer, permits the host application to update data files and terminal configuration settings in a VX 675 terminal and then return control to the main application.
P ERFORMING D OWNLOADS Use of I: drive and F: drive Physical and The VX 675 operating system controls physical access to GIDs 1–15 using Logical Access to password-protected Verix Terminal Manager functions. File Groups To download data into a specific file group, first enter Verix Terminal Manager and choose the target group by making the appropriate menu selections, then, enter the correct password for that file group. Each file group has its own CONFIG.SYS file. The CONFIG.
P ERFORMING D OWNLOADS Use of I: drive and F: drive Redirection of Files You can download application files into I: drive or F: drive memory. By default, During Application files downloaded to a specific file group are stored in the I: drive of that group. To Downloads store a file in the F: drive memory of that file group, provide instructions to redirect the file to F: drive as part of the procedure (see Manually Redirecting Files).
P ERFORMING D OWNLOADS Use of I: drive and F: drive The *GO variable in this example indicates that the FOO.OUT application executes on restart, after successful authentication. The two data files that follow the zerolength SETDRIVE.F file, FOO.DAT and FOO.VFT, are redirected into GID1 F: drive. Because it follows the inserted zero-length SETDRIVE.I file, GOO.DAT downloads into Group 1 I: drive. FOO.OUT FOO.P7S *GO=FOO.OUT SETDRIVE.F FOO.DAT FOO.VFT SETDRIVE.I GOO.
P ERFORMING D OWNLOADS Use of I: drive and F: drive Restrictions on File The VX 675 file system restricts how you can redirect files to other file groups. Redirection Here are the important points to remember: • The main application must always be downloaded into GID1.
P ERFORMING D OWNLOADS Use of I: drive and F: drive Using DDL.EXE to The version of DDL.EXE included in the VX 675 SDK allows you to change the Automatically default drive and file group for a direct download by preceding the filename(s) on Redirect Files the DDL command line with a special filename. The syntax is as follows: SETDRIVE. where, drive letter is I: (default) or F:, and/or SETGROUP. where, group number is 1–15. For example, the command-line entry DDL SETDRIVE.
P ERFORMING D OWNLOADS File Authentication Requirements In this type of data transfer operation, some file redirection does occur automatically as a result of the file authentication procedure that occurs on the receiving terminal. This redirection process is transparent during the download. Briefly, all files initially download into I: drive, and are then redirected based on the directory and subdirectory names of the sending terminal’s file system.
P ERFORMING D OWNLOADS File Authentication Requirements • Application files other than executables (for example, font and data files) may also require logical security under file authentication. In these cases, each protected non-executable file also requires a corresponding signature file. • Digital certificates (*.crt) and signature files (*.p7s) are required to authenticate both application files and operating system files, which must be downloaded into the I: drive of the target file group.
P ERFORMING D OWNLOADS File Authentication Requirements 4 Certificates are always processed first (before signature files). The processing routine is called one time for each certificate in the list. If a certificate is authentic, it is noted, and the next certificate is processed. This process continues in random order until all certificates are authenticated. When a certificate file in the processing list is authenticated, the “Authentic” message is displayed below the corresponding filename.
P ERFORMING D OWNLOADS File Authentication Requirements • If a signature file is authenticated, “AUTHENTIC” is displayed and the target file is flagged authentic. • If the authentication process fails, “FAILED” is displayed for five seconds and the terminal beeps three times (see Figure 31). The routine then continues processing the next signature file until all newly detected signature files are checked.
P ERFORMING D OWNLOADS File Authentication Requirements By inserting zero-length SETDRIVE.x and SETGROUP.n files into a download list, you can specify which drive (x = I: or F:) and in which group (n = 1–15) to store an application file. In addition to this file redirection protocol, the file authentication module controls which files are allowed, under the authority of the signer certificate used to sign them, to be stored in which file groups in the VX 675 file system.
P ERFORMING D OWNLOADS File Authentication Requirements OS. In this download operation, all application files stored in Group 1 are automatically erased. • If a partial OS download was selected in the Verix Terminal Manager, the operating system returns control to Verix Terminal Manager after the download completes. To process the new OS, you must manually restart the terminal by selecting the appropriate Verix Terminal Manager menu option.
P ERFORMING D OWNLOADS File Authentication Requirements certificates are checked one by one and, on authentication, are added to the certificate tree of the receiving terminal. Then, all signature files are checked. • Downloaded certificates (receiving terminal) must synchronize with the certificate data present in the certificate tree.
P ERFORMING D OWNLOADS Effect of Downloads on Existing Files and Data Effect of Downloads on Existing Files and Data NOTE When downloading application files and data to a VX 675 terminal, an important consideration is the effect of download procedure on existing application files, files used in the file authentication process, and terminal configuration settings stored in CONFIG.SYS files in the receiving terminal.
P ERFORMING D OWNLOADS Effect of Downloads on Existing Files and Data Direct Application This section provides the hardware and software checklist needed for direct Downloads application downloads. The procedure for direct application downloads is also discussed. Hardware Checklist The correct cable connects the download computer serial port (COM1 or COM2) to the RS-232 serial port (COM1) of the VX 675 terminal. Software Checklist Download Manager, VeriCentre, or DDL.
P ERFORMING D OWNLOADS Effect of Downloads on Existing Files and Data Direct Application The procedure in Table 14 describes how to perform a direct application Download download from a host download computer into the Group 1 application memory Procedure area of a VX 675 deployment terminal. Steps described in the Action column are performed directly on the VX 675 terminal. Notes provided in this column indicate and explain actions you must perform on the host computer.
P ERFORMING D OWNLOADS Effect of Downloads on Existing Files and Data Table 13 Step Common Steps to Start a Download (continued) Display Action 2 If an application already resides on the terminal, an application-specific prompt is displayed. Otherwise, an error message is displayed. For more information on startup errors, see STARTUP ERRORS. 3 TERMINAL MGR Entry Please Enter Password ___________________ Enter the Verix Terminal Manager password.
P ERFORMING D OWNLOADS Effect of Downloads on Existing Files and Data Table 13 Common Steps to Start a Download (continued) Step Display Action 4 VERIX TERMINAL MGR The first of the two VERIX TERMINAL MGR menus is displayed. To toggle through other menu, tap the UP () 1> Restart 2> Edit Parameters and DOWN icon ().
P ERFORMING D OWNLOADS Effect of Downloads on Existing Files and Data Table 14 Direct Application Download Procedure (continued) Step Display Action 2 VERIX TERMINAL MGR Enter the password of the selected file group. For example, if Group 1 is the target group, the GROUP _1 PASSWORD message shown at left is displayed. Please enter Password for GID 1: 3 ___________________ To continue, enter the required file group password and press ENTER to confirm entry.
P ERFORMING D OWNLOADS Effect of Downloads on Existing Files and Data Table 14 Direct Application Download Procedure (continued) Step Display Action 4 VTM DOWNLOAD MGR Gn Select the type of download mode: Full dnld or Partial dnld. To return to VERIX TERMINAL MGR, press CANCEL. 1> Full dnld 2> Partial dnld 5 VTM DOWNLOAD MGR Gn Select the download mode: Modem, COM1, COM2 , SD Card, Memory Stick, TCPIP, USB Dev, COM6 (If there are 1> Modem any additional menu options press the DOWN key).
P ERFORMING D OWNLOADS Effect of Downloads on Existing Files and Data Table 14 Direct Application Download Procedure (continued) Step Display Action 7 VTM DOWNLOAD MGR Gn Initiate the download by executing the proper command(s) in the download tool running on the host computer. The data transfer operation starts, and the status messages are displayed on the terminal screen.
P ERFORMING D OWNLOADS Effect of Downloads on Existing Files and Data Table 14 Direct Application Download Procedure (continued) Step Display Action 9 **VERIFYING FILES** CHECK CERTIFICATE The file authentication module continues to authenticate any new signature files downloaded with the OS files. (FILENAME.CRT) When the signature file authentication routine starts, the status display informs you of the progress of the authentication process.
P ERFORMING D OWNLOADS Direct Operating System Downloads Direct Operating System Downloads Hardware Checklist This section provides the hardware and software checklist needed for direct operating system downloads. The procedure for direct operating system downloads is also discussed. The correct cable connects the download computer serial port (COM1 or COM2) to the RS-232 serial port (COM1) of the VX 675 terminal. Software Checklist Download Manager, VeriCentre, or DDL.
P ERFORMING D OWNLOADS Direct Operating System Downloads The certificate tree that exists on the receiving terminal is not modified unless one or more new certificate files required to authenticate the new OS are being downloaded to the terminal. When new certificates authenticate on the receiving terminal, the data they contain is stored in the certificate tree and the certificate files are deleted from the Group 1 I: drive.
P ERFORMING D OWNLOADS Direct Operating System Downloads Table 15 Direct Operating System Download Procedure (continued) Step Display Action 2 VERIX TERMINAL MGR Enter the password of the selected file group (Group 1) and press ENTER to confirm the entry. Please enter Password for GID 1: ___________________ 3 VTM DOWNLOAD MGR Gn 1> Single-app 2> Multi-app For a single application download, select Single-app. For multiple application download, select Multi-app.
P ERFORMING D OWNLOADS Direct Operating System Downloads Table 15 Direct Operating System Download Procedure (continued) Step Display Action 5 VTM DOWNLOAD MGR Gn Select the terminal port to use for the data transfer from the host computer to the receiving terminal. (If there are any additional menu options, press the DOWN key.
P ERFORMING D OWNLOADS Direct Operating System Downloads Table 15 Step 7 Direct Operating System Download Procedure (continued) Display Action **VERIFYING FILES** CHECK CERTIFICATE (FILENAME.CRT) **AUTHENTIC** or --- FAILED --- When the OS download is complete, the terminal restarts automatically. The file authentication module on the receiving terminal begins to check for new certificate (*.crt) and signature (*.p7s) files included in the download.
P ERFORMING D OWNLOADS Back-to-Back Application Downloads Table 15 Direct Operating System Download Procedure (continued) Step Display Action 9 (Application Prompt) If you performed a full OS download, the DOWNLOAD NEEDED prompt is displayed. or A direct application download on the receiving terminal can be performed. DOWNLOAD NEEDED If you performed a partial OS download and manually restarted the terminal, the application residing in the terminal (if any) executes.
P ERFORMING D OWNLOADS Back-to-Back Application Downloads Checklist for Effects on Files and Settings in the Receiving Terminal A back-to-back application download overwrites existing applications, libraries, or any other files stored in the I: drive of the receiving terminal. All CONFIG.SYS records and settings on the receiving terminal—protected and non-protected—are replaced by those of the sending terminal.
P ERFORMING D OWNLOADS Back-to-Back Application Downloads The PC transfers files to the Gold terminal. Download Application Files to Target Terminal 1 Configure a Gold terminal for an application download operation to a deployment terminal: • If the *FA variable (if present in the application) is set to 0, you can reset it to 1. For more information on the *FA variable, refer to the Verix eVo Volume I: Operating System Programmers Manual (VPN DOC00301).
P ERFORMING D OWNLOADS Back-to-Back Application Downloads Figure 32 illustrates these two phases and how they relate to each other. PC CONFIGURED FOR DOWNLOAD OPERATION. PC TRANSFERS FILES TO GOLD TERMINAL. 1. IF *FA VARIABLE IS PRESENT, *FA MUST = 1. SDK 2. ALL CERTIFICATES, .P7S FILES, APPLICATIONS, AND SO ON MUST BE PRESENT. 3. DOWNLOAD IS MIRROR COPY OF WHAT TO DEPLOY. 4. CABLE CONNECTED BETWEEN PC AND GOLD TERMINAL. 5. INITIATE THE DOWNLOAD. GOLD TERMINAL CONFIGURED TO RECEIVE PC DOWNLOAD.
P ERFORMING D OWNLOADS Back-to-Back Application Downloads The procedure in Table 16 walks you through a back-to-back application download from a sending VX 675 terminal (Gold) to a receiving VX 675 terminal (Target). Back-to-back downloads require that one terminal, the Gold terminal, be loaded with the required applications. The receiving terminal is the Target terminal. The procedure in Table 16 assumes the following: NOTE • The Target terminal has no applications loaded.
P ERFORMING D OWNLOADS Back-to-Back Application Downloads Table 16 Step 7 Back-to-Back Application Download Procedure Gold Terminal Target Terminal Select 2 (COM1) in the next VERIX TERMINAL MGR DOWNLOAD screen. DOWNLOADING NOW is displayed. Both terminals display a status indicator, where each dash represents a 10% increment of the download. Ensure that the Gold terminal displays UPLOAD COMPLETE before returning to VERIX TERMINAL MGR MENU 1.
CHAPTER 7 Specifications This chapter discusses power requirements, dimensions, and other specifications of the VX 675 terminal. Power Micro-USB Power Pack 5V DC 1.0 A UL, ITE listed, LPS power supply: a Input rated: 100-240V AC, 50/60 Hz b Output rated: 5V DC 1.0 A Temperature • Operating temperature: 0Cto +50C (32F to 122F) • Non-operating temperature: -30C to 60C (-22F to 140F) • Relative humidity: 5% to 90%; non-condensing External • Dimensions • • Length: 148mm (5.
S PECIFICATIONS External Dimensions 138 VX 675 REFERENCE GUIDE
CHAPTER 8 Maintenance The VX 675 terminal and base have no user-serviceable parts. Cleaning the Terminal To clean the terminal and base, use a clean cloth slightly dampened with water and a drop or two of mild soap. For stubborn stains, use alcohol or an alcoholbased cleaner. CAUTION Never use thinner, trichloroethylene, or ketone-based solvents – they may cause deterioration of plastic or rubber parts. Do not spray cleaners or other solutions directly onto the keypad or terminal display.
M AINTENANCE Smart Card Reader 140 VX 675 REFERENCE GUIDE
CHAPTER 9 VeriFone Service and Support For VX 675 terminal problems, contact your local VeriFone representative or service provider. For VX 675 product service and repair information: Returning a Terminal for Service NOTE • USA – VeriFone Service and Support Group, 1-800-VeriFone (837-4366), Monday - Friday, 8 A.M. - 8 P.M., Eastern time • International – Contact your VeriFone representative Before returning a VX 675 terminal or base to VeriFone, you must obtain an MRA number.
VERI F ONE S ERVICE AND S UPPORT Accessories and Documentation c Complete the Inquiry Contact Form at http://www.verifone.com/aboutus/ contact/contact_form.cfm. NOTE • Address the Subject box with to “VeriFone MRA Dept.” • Reference the model and part number in the Note box. One MRA number must be issued for each VX 675 terminal you return to VeriFone, even if you are returning several of the same model. 3 Describe the problem(s).
VERI F ONE S ERVICE AND S UPPORT Accessories and Documentation Micro-USB Cable VPN SUB265-001-01-A Micro-USB service dongle Documentation VX 675 Certifications and Regulations Sheet VPN DOC265-001-EN VX 675 Quick Installation Guide VPN DOC265-002-EN VX 675 Installation Guide VPN DOC265-003-EN VX 675 Base Certifications and Regulations Sheet VPN DOC265-005-EN VX 675 Full-Featured Base Quick Installation Guide VPN DOC265-026-EN VX 675 USB Base Quick Installation Guide VPN DOC265-025-EN VX 675 E
VERI F ONE S ERVICE AND S UPPORT Accessories and Documentation 144 VX 675 REFERENCE GUIDE
APPENDIX A System Messages This appendix describes error and information messages, which are grouped into two categories. For ease of use, these messages are grouped alphabetically in each of these two categories. These messages include the following: Error Messages • Digital certificate displays and signature file downloaded to the terminal. • File authentication module processes. • File compression module use messages from the VeriCentre DMM terminal management and download tool.
S YSTEM M ESSAGES Error Messages Table 17 Error Messages (continued) Display Action DEBUGGER ERRORS ALREADY DEBUGGING The debugger has already been invoked. LOAD DBMON.OUT The DBMON.OUT debugging monitor program is included in the SDK, but is not stored in the terminal memory of a factory unit. To use the debugging tool, you must sign, download, and authenticate the DBMON.OUT application.
S YSTEM M ESSAGES Error Messages Table 17 Error Messages (continued) Display Action VTM DOWNLOAD MGR Gn The following error message may occur while connecting to a host during wireless download: GID: nn APP ID: nnnn STATUS: CONNECTING • NO CARRIER - The terminal could not establish a connection with the host. • LOST CARRIER - The carrier was lost during connection. • BUSY - The host is currently busy. • NO ENQ FROM HOST - The host did not send an ENQ (Enquiry).
S YSTEM M ESSAGES Error Messages Table 17 Error Messages (continued) Display Action PASSWORD ERRORS Change Passwords G1 Please Try Again VERIX TERMINAL MGR Please enter Password for GID n: __________ You entered an invalid GID password. Press CANCEL or ENTER and enter a valid password. This message is displayed when you initiate the procedure for modifying existing Verix Terminal Manager passwords through Change Passwords in VERIX TERMINAL MGR MENU 2.
S YSTEM M ESSAGES Error Messages Table 17 Error Messages (continued) Display Action VTM PASSWORD MGR Again __________ PRINTER DIAGNOSTICS ERRORS Printer ID Version Status P 0PRED1A2 22 NO PAPER is displayed when you select TEST or PAPER FEED and there is no paper installed in the printer.
S YSTEM M ESSAGES Error Messages Table 17 Error Messages (continued) Display Action REMOTE DIAGNOSTICS ERROR LOAD TERMINAL MANAGEMENT AGENT The (optional) Terminal Management Agent (TMA) software is not resident in the VX 675 terminal. The TMA software is required to perform remote diagnostics. For more information about support for remote diagnostics, contact your VeriFone service provider.
S YSTEM M ESSAGES Error Messages Table 17 Error Messages (continued) Display Action STARTUP ERRORS DOWNLOAD NEEDED The following error messages may occur if a defect is found on the *GO variable. *GO is a variable in the CONFIG.SYS file and is the first thing that runs on startup if available. • NO *GO VARIABLE - There is no *GO environment variable in the group one CONFIG.SYS file. • *GO NOT FOUND - The *GO variable is set but the executable file is missing.
S YSTEM M ESSAGES Error Messages Table 17 Error Messages (continued) Display Action **VERIFYING FILES** COMPARE SIGNATURE This message appears on screen when the file authentication module fails to authenticate a new signature file. *FAILED* appears for five seconds and the terminal beeps three times to draw attention to the filename of the certificate that could not be authenticated. FILENAME.P7S FILENAME.OUT *FAILED* This message remains on screen until all new signature files are checked.
S YSTEM M ESSAGES Information Messages Information Messages The following information messages may appear when the VX 675 terminal is in terminal manager. Table 18 Information Messages Display Action DOWNLOADING INFORMATION VERIX TERMINAL MGR UPLOAD I:CONFIG.SYS ****______ UPLOADING NOW During a back-to-back download session, this screen appears on the Gold terminal indicating that an application is being uploaded to the Target terminal.
S YSTEM M ESSAGES Information Messages Table 18 Information Messages Display Action VERIX TERMINAL MGR DOWNLOAD Gnn An application is being downloaded to a receiving VX 675 terminal from a host PC directly over a serial cable. The terminal displays a series of asterisks (*) to indicate the progress of the download (each asterisk represents 10% of the download). When ten asterisks appear, the data transfer is complete.
S YSTEM M ESSAGES Information Messages Table 18 Information Messages Display Action ERROR LOG VERIX ERROR LOG TYPE TASK TIME CPSR PC LR ADDR 1 2 060302201212 40000010 00000004 70448B23 27FFFFEF9 The following information helps developers interpret the cause of the most recent unrecoverable software error that occurred on the terminal: This first screen displays the following: • TYPE (error type), where the error type code is: • 1= Data abort: attempt to access data at an invalid address.
S YSTEM M ESSAGES Information Messages Table 18 Information Messages Display Action INTERNAL PIN PAD DIAGNOSTICS INFORMATION INTERNAL PIN PAD MEMORY TEST PASSED IPP8 EMUL02A 05/08 SN: 0000000000000000 BAUD: 1200 MODE: VISA 01 After an internal PIN pad diagnostic session, the firmware version and download date, IPP serial number, baud rate, and mode are displayed.
S YSTEM M ESSAGES Information Messages Table 18 Information Messages Display Action MEMORY INFORMATION Drive I: Files_____ n This screen displays how much I: drive and F: drive memory is used and how much is available. Inuse____________ nn KB • INUSE - Closest estimate of used memory (in KB). Drive F: Files_____n • AVAIL - Lowest number of free memory (in KB).
S YSTEM M ESSAGES Information Messages Table 18 Information Messages Display ALL RAM AND FLASH CLEARED ALL RAM AND FLASH CLEAR Action This screen indicates that all I: and F: drive data within a GID is deleted. This screen indicates that all I: and F: drive data within all GIDs is deleted and the memory is being merged.
S YSTEM M ESSAGES Information Messages Table 18 Information Messages Display Action PRINTER DIAGNOSTICS INFORMATION Printer ID Version Status P 0PRED1A2 22 This screen displays the printer ID, firmware version, and the printer status appear. See the Verix eVo Volume I: Operating System Programmers Manual (VPN DOC00301). for specifics on application development and the internal thermal printer.
S YSTEM M ESSAGES Information Messages Table 18 Information Messages Display Action CUSTOMER CARD POWER UP: PASSED GET ATR: PASSED READ TEST: PASSED WRITE TEST: PASSED READ VERIFY TEST: PASS ALL TESTS: PASSED When a SAM card is tested, the following information is displayed.
S YSTEM M ESSAGES Information Messages Table 18 Information Messages Display Action VERIFONE VX675 QT65010M 03/09/2012 Verix **TAMPER** COPYRIGHT 1997-2012 VERIFONE ALL RIGHTS RESERVED **VERIFYING FILES** COMPARE SIGNATURE FILENAME.P7S FILENAME.OUT *AUTHENTIC* If an attempt to break into the terminal’s system has been made, the message * * T A M P E R * * is displayed in place of the certificate on the startup screen. The terminal will remain in this state until the condition has been remedied.
S YSTEM M ESSAGES Information Messages Table 18 Information Messages Display Action VTM MGR TERMINAL INFO The following screens show configuration information specific to your terminal: Serl No • SERL NO - serial number PTID 12000000 • PTID - permanent terminal identification number Part • PART - terminal part number Rev OS Ver QT65010M Modl Ctry Keypad Display 240320 Mag RDR Pinpad • REV - terminal hardware version number • OS VER - operating system version • MODL - model number • CT
APPENDIX B Troubleshooting Guidelines The troubleshooting guidelines provided in the following section are included to help you install and configure your VX 675 terminal successfully. Typical examples of malfunction you may encounter while operating your VX 675 terminal and steps you can take to resolve them are listed in this chapter. If the problem persists even after performing the outlined guidelines or if the problem is not described below, contact your local VeriFone representative for assistance.
TROUBLESHOOTING G UIDELINES Battery Does Not Charge Battery Does Not Charge NOTE Blank Display The VX 675 battery must initially receive a full charge to ensure proper operation. • Allow the VX 675 terminal to remain connected to the power pack for 6 hours to ensure the battery receives a full charge. • Li-ion batteries are not affected by shallow charging. Furthermore, when the terminal has no external power source or battery the coin cell battery provides power to the security circuit.
TROUBLESHOOTING G UIDELINES Printer Paper Jam • Verify that the printer door is properly latched. • If the problem persists, contact your VeriFone distributor or service provider. Printer Paper If paper jams inside the printer: Jam • Press the button at the bottom of the terminal to unlatch the paper roll cover, then open the cover. WARNING • Remove the damaged paper from the paper roll and clear the feed mechanism. • Install a roll of printer paper, as described in Installing the Paper Roll.
TROUBLESHOOTING G UIDELINES Transactions Fail to Process Check the Smart Card Reader • Perform a test transaction using several different smart cards to ensure the problem is not a defective card. • Ensure that the card is inserted correctly and that the card is not removed prematurely. • Contact your VeriFone distributor or service provider. • If the manual transaction does not work, proceed to Check the Signal Strength.
APPENDIX C Port Pinouts The following tables list the pinouts for VX 675 terminal’s micro-USB port and VX 675 Full-Feature and USB base’s Dial, Ethernet, Serial (RS-232), and USB Host ports. Micro-USB Port Connector 0). Pin Function Description 1 EXT_VBUS 5Vdc External Power input. 2 USB_DN multi-port, USB Signal - / RS-232 TX 3 USB_UP multi-port, USB Signal + / RS-232 RX 4 NC No connection Note: 0). RS-232 Port (FFB only) Connector USB_ID Note: in VX 675 3G.
P ORT P INOUTS Telco Port (FFB only) Telco Port (FFB only) Connector LOOKING INTO MOD 6P4C Ethernet Port (FFB only) USB Host Port (FFB and USB base) Connector Connector 4 168 VX 675 REFERENCE GUIDE 3 2 1 PIN Function Description 1 NC No connection 2 NC No connection 3 Tip Telephone line 4 Ring Telephone line 5 NC No connection 6 NC No connection PIN Function Description 1 TXD+ Transmit data + 2 TXD- Transmit data - 3 RXD+ Receive data + 4 NC No connection 5
APPENDIX D ASCII Table The ASCII Table Table 19 An ASCII table for the VX 675 display is presented in Table 19.
ASCII TABLE The ASCII Table 170 VX 675 REFERENCE GUIDE
APPENDIX E VX 675 Battery Information Battery NOTE The VX 675 terminal uses a Lithium-ion battery. The internal logic of the battery prevents both overcharging and undercharging (a fault condition in which the battery level goes well below the minimum acceptable charge and the battery becomes unusable). The VX 675 terminal will operate on battery power or on power pack power. The battery charger in the terminal will be active whenever the power pack is connected.
VX 675 B ATTERY I NFORMATION Battery Light weight Lithium is the lightest metal. Thus, lithium-ion batteries enable the manufacture of lightweight devices. Long Life Lithium-ion batteries require low maintenance. They do not exhibit memory effects, thereby eliminating the need for scheduled cycling to prolong the battery life. Does Not Require Prolonged Initial Charging Unlike their nickel-cadmium counterparts, lithium-ion batteries do not require prolonged initial charging.
VX 675 B ATTERY I NFORMATION Notable VX 675 Battery Specifications Transportation Restrictions • It is illegal to ship fully charge batteries by air because they may cause accidental explosions. • Shipment of large quantities of lithium-ion batteries may be subject to regulatory control. NOTE These precautions do not apply to personal carry-on battery packs. Storage Precautions Notable VX 675 Battery Specifications • Do not fully charge batteries before storage.
VX 675 B ATTERY I NFORMATION Battery FAQs (for VX 675) Trip Recovery The VX 675 battery features a trip recovery system, which resolves faulty or hazardous conditions that led to a safety trip. Application of current through the charger will reset the safety circuit. Battery FAQs (for VX 675) Should I allow the battery to discharge completely before charging? No. It is better to recharge the battery often and avoid frequent full discharge. However, allow a full discharge once a month to enable reset.
VX 675 B ATTERY I NFORMATION General Battery Terms and Definitions Safety/Protection Circuit The VX 675 terminal is equipped with a safety/protection circuit that protects the terminal from damage. For more information, see Safety/Protection Circuit. Voltage Under system load, the VX 675 terminal reports battery pack voltage. The range is from 3V to 4.2V. It is updated every 20 seconds. General Battery Terms and Definitions The following terms and definitions apply to most battery types, in general.
VX 675 B ATTERY I NFORMATION General Battery Terms and Definitions Charge Rate This refers to the amount of current applied to the battery during charging. NOTE Charge rate for the VX 675 terminal's battery: Initially 0.7A tapering to zero at end of charge. Charge Time The amount of time required to charge a battery. Maximum charge time refers to the amount of time to fully charge a fully discharged battery. NOTE Typical charge time for the VX 675 terminal’s battery: 2200 mAh in approximately 4.
VX 675 B ATTERY I NFORMATION General Battery Terms and Definitions Discharging Refers to the process of converting the chemical energy of a battery into electrical energy, and the transfer of the electrical energy into a load. Self-Discharge Rate The amount by which the charge of the battery is reduced without providing any current to an external terminal or load.
VX 675 B ATTERY I NFORMATION General Battery Terms and Definitions 178 VX 675 REFERENCE GUIDE
GLOSSARY Application ID An alphanumeric code that Bit Short for binary digit. Either of the two digits 0 identifies an application program downloaded to a terminal from a download computer. For ZonTalk 2000 application downloads, the application ID is stored in the CONFIG.SYS record which begins with the *ZA key. A VX 675 application ID can be up to 21 characters long. For VeriCentre Download Management Module, the application ID, as well as other CONFIG.
G LOSSARY Certificate Also called a digital certificate. A digital Diagnostics Techniques employed for detection document or file that attests to the binding of a public key to an individual or entity, and that allows verification that a specific public key does in fact belong to a specific individual. and isolation of malfunctions and errors in programs, systems, and devices. In a diagnostic test, a program or routine is run to detect failures or potential failures.
G LOSSARY Input The process of entering data into a Messages Words and symbols appearing on the processing system or a peripheral terminal such as a terminal, or the data that is entered. display screen which inform the user of the terminal of the result of a process, or if an error has occurred. The term “prompt” is used when the displayed message is requesting the user to enter information or to select an option. Interface A common boundary between two systems, devices, or programs.
G LOSSARY PC Abbreviation for personal computer. Usually, PC refers to an IBM-compatible personal computer. Peripheral terminal In a computer system, any equipment that provides the processing unit with outside communication. Typical peripheral devices for a POS terminal include PINpads and check readers. Application files and data are stored in the nonvolatile flash memory system. By default, files downloaded to the terminal are stored in the I: drive of the target file group(s). See Flash memory.
G LOSSARY Verix Terminal Manager For the VX 675, Verix Track 1, 2, or 3 data Information stored on tracks Terminal Manager temporarily disables normal mode operations, allowing you to perform local functions such as downloads, diagnostics, and other operations that cannot be performed while the application program is running. 1, 2, or 3 of a debit or credit card magnetic stripe, which can be read by a magnetic card reader terminal, such as the one that is integrated in the VX 675 terminal.
G LOSSARY 184 VX 675 REFERENCE GUIDE
INDEX A accessories 142 documentation 143 power packs 142 VeriFone cleaning kit 142 ATR test 159 B back-to-back application downloads checklist for effects on files and settings in the receiving terminal 132 hardware checklist 131 software checklist 131 back-to-back downloads 99, 100 file authentication 115 redirect files during 109 Base Station 26 battery capacity definition 176 battery cells definition 175 battery packs definition 175 battery status definition 175 C certificates and signature files 110
I NDEX E full and partial downloads 101 full application 102 full operating system 103 host PC 99 operating system files 100 OS files and file authentication 114 partial application 102 partial operating system 103 procedure for performing a direct application download 119 procedure for performing back-to-back application downloads 132 redirecting files during 106 redirecting files to flash memory 106 redirecting files to other file groups 107 redirection of files during downloads 106 back-to-back download
I NDEX H CONFIG.
I NDEX T trip recovery 174 voltage 175 smart battery battery life 26 charging 26 conserving power 24, 164 disposal 26, 171 features 23 recharging 26 troubleshooting 164 smart card diagnostics 159 specifications DC power pack 137 power 137 temperature 137 state of charge definition 175 system mode 37 CONFIG.
I NDEX W Customer display 31 Fiscal module 31 Ministry of Finance 31 W wireless transactions 28 VX 675 REFERENCE GUIDE 189
Federal Communication Commission Interference Statement This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions: (1) This device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation. This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules.
Radiation Exposure Statement: This device meets the government’s requirements for exposure to radio waves. This device is designed and manufactured not to exceed the emission limits for exposure to radio frequency (RF) energy set by the Federal Communications Commission of the U.S. Government. The exposure standard for wireless device employs a unit of measurement known as the Specific Absorption Rate, or SAR. The SAR limit set by the FCC is 1.6W/kg.
Industry Canada statement This device complies with Industry Canada license-exempt RSS standard(s). Operation is subject to the following two conditions: (1) this device may not cause interference, and (2) this device must accept any interference, including interference that may cause undesired operation of the device. Le présent appareil est conforme aux CNR d'Industrie Canada applicables aux appareils radio exempts de licence.
Česky [Czech] Dansk [Danish] [Jméno výrobce] tímto prohlašuje, že tento [typ zařízení] je ve shodě se základními požadavky a dalšími příslušnými ustanoveními směrnice 1999/5/ES. Undertegnede [fabrikantens navn] erklærer herved, at følgende udstyr [udstyrets typebetegnelse] overholder de væsentlige krav og øvrige relevante krav i direktiv 1999/5/EF.
[Polish] zasadniczymi wymogami oraz pozostałymi stosownymi postanowieniami Dyrektywy 1999/5/EC. Portuguê [Nome do fabricante] declara que este [tipo de equipamento] está conforme com os requisitos essenciais e outras disposições da Directiva 1999/5/CE. s [Portuguese ] Slovensko [Slovenian] Slovensky [Slovak] Suomi [Finnish] [Ime proizvajalca] izjavlja, da je ta [tip opreme] v skladu z bistvenimi zahtevami in ostalimi relevantnimi določili direktive 1999/5/ES.
VeriFone, Inc. 2099 Gateway Place, Suite 600 San Jose, CA, 95110 USA 1-800-VERIFONE www.verifone.com C E L N A I O T F N I E R D E I V NF O R VX 675 Reference Guide VeriFone Part Number DOC265-004-EN-E, Revision E.3 I V E S N O I 3 .