User's Manual
Table Of Contents
- VX 675
- Contents
- Preface
- Terminal Overview
- Terminal Setup
- Selecting Terminal Location
- Unpacking the Shipping Carton
- Examining Terminal Features
- Examining Connection Ports
- Installing the Paper Roll
- Installing the SIM Card
- Installing the SD Card
- Using the Battery
- Battery Behavior (No Power Pack)
- Connecting the Terminal Power Pack
- Charging the Battery
- Using the VX 675 Base Stations
- Powering Up the Base
- Docking the Terminal on the Base
- Undocking the Terminal from the Base
- Conducting Wireless Transactions
- Conducting Smart Card Transactions
- Using the Magnetic Card Reader
- Connecting to USB Host
- VX 675 ECR (Fiscal Module) Support
- VX 675 3G and GPS Support
- Using the Terminal Keys
- Verix Terminal Manager
- File Authentication
- Performing Downloads
- Downloads and Uploads
- Download Methods
- Download Tools
- Download Content
- Full and Partial Downloads
- Support for Multiple Applications
- Use of I: drive and F: drive
- File Authentication Requirements
- Required Certificates and Signature Files
- The File Authentication Process During an Application Download
- File Group Permissions
- Download an Operating System Update Provided by VeriFone
- File Authentication for Back-to-Back Application Downloads
- Timing Considerations Due to the Authentication Process
- Support for File Compression
- Effect of Downloads on Existing Files and Data
- Direct Operating System Downloads
- Back-to-Back Application Downloads
- Specifications
- Maintenance
- VeriFone Service and Support
- System Messages
- Troubleshooting Guidelines
- Port Pinouts
- ASCII Table
- VX 675 Battery Information
- Glossary
- Application ID
- Application program
- Application prompt
- ASCII
- Back-to-back application download
- Baud
- Bit
- Block
- Boot loader
- Buffer
- Byte
- Calendar/clock chip
- Card reader
- Carrier
- Certificate
- Character
- CONFIG.SYS file
- CPU
- Data
- Data entry
- Data packet
- Default
- Delete
- Diagnostics
- Direct download
- Display
- Download
- File authentication
- Firmware
- Fixed prompt
- Flash memory
- Host computer
- Input
- Interface
- Keyed file character set
- Keyed file editor
- Keyed file record
- Keypad
- Local functions
- Manual transaction
- Memory
- Messages
- Non-volatile memory
- Normal Mode
- Packet
- Packet-switched networks
- Parameter
- Password
- PC
- Peripheral terminal
- Port
- POS terminal
- Power pack
- Prompt
- Protocol
- PTID
- RAM
- Remote host computer
- Scroll
- Search key
- Serial port
- Signature file
- mDRAM
- Subroutine
- Swipe
- Verix Terminal Manager
- Verix Terminal Manager password
- Terminal
- Terminal ID
- Terminal-to-terminal application upload
- Track 1, 2, or 3 data
- Transaction
- Variable
- Volatile memory
- Index
- Contact VeriFone
INDEX
E
186 VX 675 REFERENCE GUIDE
full and partial downloads 101
full application 102
full operating system 103
host PC 99
operating system files 100
OS files and file authentication 114
partial application 102
partial operating system 103
procedure for performing a direct application
download 119
procedure for performing back-to-back applica-
tion downloads 132
redirecting files during 106
redirecting files to flash memory 106
redirecting files to other file groups 107
redirection of files during downloads 106
back-to-back downloads 109
how operating system files are redirected
109
using DDL.EXE to automatically redirect files
109
restrictions on redirecting files to other file
groups 108
select port 47, 123
store the main application in file Group 1 104
support for multiple applications 104
physical and logical access to file groups 105
terminal configuration settings 101
tools 100
types of download operations 99
use of RAM and flash memory 105
implications for data transfers 105
E
electric current
definition 176
electrical considerations 16
environmental factors 16
error log 67
F
file authentication 110
and downloads 111
authenticating files in specific file groups 91
back-to-back downloads 115
deciding which files to authenticate 83
definition of file authentication 75
deployment process 77, 81
development process 77, 78
digital signature 76
downloading OS files and 114
for non-executable application files 83
guidelines for downloading specific file types 93
planning for successful file authentication 82
pre-deployment process 77, 80
relationship to file groups 91
special files used in the file authentication pro-
cess 76
VeriShield security architecture 83
file authentication certificates
adding new certificates 88
application partition certificate 77
certificate tree 85
control file signing privileges 86
customer sponsor certificate 89
default sponsor certificate 87
definition 76
development certificates 86
downloading a certificate 86
downloading sponsor and signer certificates 87
file size 94
hierarchical relationships 76, 85
how they are authenticated 85
in a development terminal 86
main functions 85
platform root certificate 76
signer certificate 77
sponsor certificate 76
file authentication keys
how private cryptographic keys are conveyed to
customers 76
private cryptographic key 76
public cryptographic key 85
relationship to signature files 76
file authentication process flow
confirming successful authentication 84
effect of failed authentication 84
running the *GO application following authenti-
cation 84
visual and audible indications during processing
84
when the ATTR_NOT_AUTH bit is set 85
file authentication signature files
file size 94
file group password 40
file groups 39
password 40, 45, 70
store main application in Group 1 104
file signing
customer signer PIN 89
how signature files authenticate application files
84
required inputs to the file signing process 88
using the signer private key 77
VeriShield File Signing Tool 94
files