background image

VeriFone Part Number 24964, Revision B

V

x

810

Reference Guide

Summary of Contents for DUET Vx810

Page 1: ...VeriFone Part Number 24964 Revision B Vx810 Reference Guide ...

Page 2: ...gram before placing the software into productive use This document including without limitation the examples and software programs is supplied As Is VeriFone Inc 2099 Gateway Place Suite 600 San Jose CA 95110 USA 1 800 VERIFONE www verifone com VeriFone Part Number 24964 Revision B VX810 Reference Guide 2008 VeriFone Inc VeriFone the VeriFone logo Omni VeriCentre Verix and ZonTalk are registered t...

Page 3: ...le Function PF Keys 19 Sound 20 CHAPTER 3 Setup Selecting Location 21 Ease of Use 21 Environmental Factors 21 Electrical Considerations 22 Unpacking the Shipping Carton 22 Examining the Vx810 Features 23 Installing Replacing MSAM Cards 24 Options 26 Vx810 CTLS Module 26 Vx810 DUET Base Unit 28 Privacy Shield 29 Cable Connections 30 Other Devices 30 RS 232 Connection with External Power Brick 30 St...

Page 4: ... VeriShield File Signing Tool 85 System Requirements 85 Operating Modes 85 Command Line Entries 86 Command Line Mode Syntax Example 88 Graphical Interface Mode 88 CHAPTER 6 Performing Downloads Downloads and Uploads 91 Download Methods 91 Download Tools 92 Download Content 93 Full and Partial Downloads 94 Support for Multiple Applications 96 How the File System Supports Multiple Applications 96 Th...

Page 5: ...113 Software Checklist 113 Checklist for Effects on Files and Settings in the Receiving Device 114 Direct Application Download Procedure 114 Direct Operating System Downloads 119 Hardware Checklist 119 Software Checklist 119 Checklist for Effects on Files and Settings in the Receiving Device 119 Direct Operating System Download Procedure 120 Back to Back Application Downloads 124 Hardware Checklis...

Page 6: ...s 137 Accessories and Documentation 139 Power Pack 139 Connectivity Cables 139 Privacy Shield 139 VeriFone Cleaning Kit 139 Documentation 140 CHAPTER 10 Troubleshooting Guidelines Display Does Not Show Correct Readable Info 141 Blank Display 141 Device Does Not Dial Out 142 Keypad Does Not Respond 142 Transactions Fail To Process 142 APPENDIX A System Messages Error Messages 143 Information Messag...

Page 7: ...ng the Vx810 Keys Explains the operational features of the Vx810 and describes how to use the Vx810 keys to perform all the data entry or system mode tasks described in this manual Chapter 3 Setup Explains how to set up and install the Vx810 It tells you how to select a location establish power and telephone line connections and how to configure optional peripheral devices Chapter 4 System Mode De...

Page 8: ...0 Quick Installation Guide VPN 24961 Vx810 Installation Guide VPN 24963 Vx810 Certifications and Regulations Sheet VPN 24960 Vx810 CTLS Quick Installation Guide VPN 28601 Vx810 CTLS Certifications and Regulations Sheet VPN 28600 Vx810 DUET Quick Installation Guide VPN 24968 Vx810 DUET Installation Guide VPN 24969 Vx810 DUET Reference Guide VPN 24970 Vx810 DUET Certifications and Regulations Sheet ...

Page 9: ...ronyms Acronym Definitions 3DES Triple Data Encryption Standard AC Alternating Current ARM Advanced RISC Machines CTLS Contactless CTS Clear to Send DC Direct Current ECR Electronic Cash Register EMV Europay MasterCard and Visa GID Group Identifier ICC Integrated Chip Card Smart Card LCD Liquid Crystal Display MSAM Micromodule size Security Access Module MSR Magnetic Stripe Reader OS Operating Sys...

Page 10: ...PREFACE Conventions and Acronyms 10 VX810 REFERENCE GUIDE SSL Secure Sockets Layer SRAM Static Random Access Memory USB Universal Serial Bus Table 2 Acronyms Acronym Definitions ...

Page 11: ...upgrades to contactless or other emerging technologies without replacing the PIN pad The Vx810 also offers an array of connectivity options all from a single port including serial USB or optional Ethernet so you can connect to almost any device or ECR Plus the Vx810 gives you the option to add a base unit with a printer and modem to create a fully loaded payment solution with a hand over PIN pad a...

Page 12: ...paration minimizes or eliminates the need to re certify existing payment applications every time an application is added or modified Flexibility and Future Proofing Can Put You Years Ahead to Safeguard Your Investment Includes an SD card slot for supporting application download via SD memory card The SD card slot also serves as an SDIO expansion port to simplify upgrades to contactless the Vx810 C...

Page 13: ... appeal Offers 128 x 128 high resolution display with white backlighting for enhanced readability and branding opportunities MAXui design provides a large keypad and screen without wasted space Programmable function keys and on screen prompts add to the Vx810 s outstanding usability Works well as either a handheld or a counter poll mounted device offering flexibility in placement ...

Page 14: ...VX810 OVERVIEW Features and Benefits 14 VX810 REFERENCE GUIDE ...

Page 15: ... Vx810 keypad which consists of four ATM style function keys F1 to F4 four programmable function keys PF1 to PF4 an ALPHA key a main keypad 0 to 9 and and three command keys CANCEL CLEAR and ENTER Using these keys you can perform all data entry tasks described in this manual The function keys allow you to navigate though the system mode menus and select specific operations Figure 2 The Vx810 Keys ...

Page 16: ...LOAD NEEDED appears You can enter system mode by simultaneously pressing F2 and F4 and entering the password Once in system mode you can configure the device as required or perform downloads To know more about system mode operations see System Mode Entering System Mode While in Normal Mode If you enter system mode while in normal mode the active application is preempted and system mode takes contr...

Page 17: ...ing our example press the 2 key then ALPHA to display the letter A 3 Press ALPHA as many times as required to display the desired character For example press 2 to display the number 2 press ALPHA once to display the letter A twice to display B or three times to display C If two or more characters display on the Vx810 screen pressing ALPHA changes the last character on the line to the next letter n...

Page 18: ...8 TUV 8 T U V 9 WXY 9 W X Y 0 SP 0 space a a The key also supports eight additional characters and _ To enter press once then ALPHA four times To enter press once then ALPHA five times To enter press once then ALPHA six times To enter press once then ALPHA seven times To enter press once then ALPHA eight times To enter press once then ALPHA nine times To enter press once then ALPHA ten times To en...

Page 19: ...em mode the specific effect of pressing the CLEAR key depends on the currently active system mode menu ENTER Key In normal mode the ENTER key is used to end a procedure confirm a value or entry answer Yes to a query or select a displayed option In system mode press the enter key to begin a selected procedure step forward or backward in a procedure and confirm data entries The specific effect of th...

Page 20: ...FERENCE GUIDE Sound The Vx810 supports only monophonic sound capabilities The keys produce a beeping sound when pressed NOTE The OS does not contain any pre defined tunes This feature is handled entirely by an application The OS merely provides an API ...

Page 21: ...cation convenient for both merchant and cardholder Select a flat support surface such as a countertop or table Select a location near a power outlet and the other device ECR or computer connected to the Vx810 For safety do not string cables or cords across a walkway Environmental Factors Do not use the device where there is high heat dust humidity moisture or caustic chemicals or oils Keep the dev...

Page 22: ...oduct and any tampering can cause it to cease to function or to operate in an insecure manner 1 Remove and inspect the contents of the shipping carton Since the Vx810 ships in multiple configurations the carton can include Vx810 device Data cable Power adapter Power adapter patch cable Power pack Power cord ECR cable Privacy shield 2 Remove all plastic wrapping from the device and components 3 Rem...

Page 23: ...nd keys CANCEL Red CLEAR Yellow and ENTER Green A magnetic stripe card reader built onto the top right side An icon on the Vx810 surface shows the proper card swipe direction with the stripe located near the bottom edge of the card when the card is slotted in and the stripe faces the side where the icon is printed A primary smart card reader built onto the front side An icon indicates the proper c...

Page 24: ...able compartment door open the data cable compartment door and then unplug the data cable NOTE VeriFone ships variants of the Vx810 for different markets Your device may have a different configuration For example the Vx810 may or may not have a PSCR it may or may not have an MSR it may have none or 3 SAMs flash ROM size may be from 4MB to 8MB or 16MB and SRAM size may be from 2MB to 4MB However th...

Page 25: ...ve any previously installed MSAM card by sliding the card out 5 Install an MSAM card by sliding it into the numbered slots The MSAM card has a notch on one corner to ensure correct positioning of the MSAM card when inserted The correct card position is also indicated on the MSAM card slot Figure 5 MSAM Insertion 6 Replace the MSAM compartment door and reinstall the locking screws Figure 6 Replacin...

Page 26: ...810 CTLS Module To install the Vx810 CTLS module 1 Place the device facedown on a soft clean surface to protect the lens from scratches 2 Remove the Dummy SD card from the SD card slot of the Vx810 3 Carefully insert the RFID SD card of the RFID canopy into the SD card slot of the Vx810 Figure 8 Sliding the RFID Canopy NOTE Store the Dummy SD card in a safe place This may be used again in the even...

Page 27: ...that fit into slots in the Vx810 CTLS module and two tabs at the narrow end that fit into ribs in the Vx810 PIN pad s SD card compartment NOTE First insert the fine threaded black machine screw into the Vx810 PIN pad Then install the 3 sharp threaded self tapping machine screws into the Vx810 CTLS module The self tapping screws will require a significant amount of force to install Use the appropri...

Page 28: ...modem Ethernet USB and serial ports Connecting the Vx810 PIN pad to the Vx810 DUET Base Unit To connect the Vx810 PIN pad to the Vx810 DUET 1 Unscrew the latch on the upper right corner of the Vx810 s bottom casing then slide it open Figure 11 Opening the Vx810 latch 2 Attach the PIN pad connector to the slot then screw the latch back on Figure 12 Connecting the PIN pad Connector PIN PAD CONNECTOR...

Page 29: ...Connect the power cord Figure 14 Connecting the Power Pack For more information on the Vx810 DUET base unit please refer to the Vx810 DUET Reference Guide VPN 24970 Privacy Shield A privacy shield can be installed on the Vx810 keypad for added consumer protection during keypad entry Figure 15 Installed Privacy Shield ...

Page 30: ...as 3 5W In cases where the other device is only able to provide a 7V DC output to power the Vx810 the other device must be able to source at least 0 5A of current Otherwise proper functioning of the Vx810 is not guaranteed Figure 16 Connection with Another Device RS 232 Connection with External Power Brick A special dongle cable is used where one end of the cable plugs into the Vx810 while the oth...

Page 31: ... USB socket for connecting to the USB based host and a DC jack for external power connection In addition a Type A USB socket is provided on the junction box to support application download via a USB flash drive Figure 19 USB with Download Support Powered USB For a USB based host with PoweredUSB feature a straight cable is all that is required The Vx810 supports the 12V DC option Figure 20 PoweredU...

Page 32: ...resentative Before connecting a power supply disconnect the power pack cord from the power outlet Make all Vx810 and device ECR or PC connections before connecting the power pack cord into a wall outlet or surge protector When the Vx810 has power and an application is loaded the application starts after the initial VeriFone copyright screen and displays a unique copyright screen If no application ...

Page 33: ...rd 2 Insert it into the smart card reader slot in a smooth continuous motion until it seats firmly 3 Remove the card when the display indicates the transaction is completed Figure 22 Smart Card Reader Use Using the Magnetic Stripe Card Reader To conduct a magnetic stripe card transaction 1 Position a magnetic stripe card with the stripe facing the keypad 2 Swipe it through the magnetic stripe card...

Page 34: ...mart card transaction 1 Gently tap the card onto or hold the card within 4 cm against the surface of the RFID canopy 2 An activated LED visual on the RFID canopy accompanied by a short beeping sound indicates a successful transaction Figure 24 Contactless Smart Card Reader Use NOTE Proper care to ensure that the Vx810 CTLS module is working properly includes preventing the module from coming into ...

Page 35: ...s used exclusively by those responsible for configuring deploying and managing on site Vx810 installations When to Use System Mode Use the system mode functions to perform different subsets of related tasks Application programmers configure a development device download development versions of applications then test and debug these applications until they are validated and ready to be downloaded t...

Page 36: ... Performing Downloads section Verifying Device Status The device you are using may or may not have an application running on it After you have set up the device refer to Setup and the device is turned on use the following guidelines to verify device status regarding software and current operating mode If no application is loaded onto system SRAM or flash ROM the message DOWNLOAD NEEDED appears on ...

Page 37: ...lled through a download For more information on managing file groups refer to the Verix V Operating System Programmers Manual VPN 23230 Passwords Passwords for the Vx810 are enforced by the Verix V operating system OS in compliance with PCI PED password requirements These requirements include the requiring of two passwords for sensitive operations and the requiring of all passwords to be at least ...

Page 38: ...nt password When you key in a password an asterisk appears for each character you type These asterisks prevent your password from being seen by an unauthorized person You can use the ALPHA key to change the characters or symbols you enter This does not cause additional asterisks to appear CAUTION If you change the System Mode password but forget it later on no password recovery method is available...

Page 39: ...first ten characters entered Download Password Change A user can set the System Mode password or any GID password by downloading a Password Change parameter from any download server VeriCentre DDL or customer developed server If the downloaded password is at least five characters long and no more than ten characters long the OS will accept the new password If the downloaded password is more than t...

Page 40: ...equirement until the user attempts to perform an operation which requires a password When a password requiring operation is performed the user will be required to change the password to a compliant password before the operation can be performed Any applications loaded on the device will be unaffected by the new OS CAUTION It is possible for a download server to change a password to one which can n...

Page 41: ...p is required The password is only required once per session per file group System Mode Procedures The procedures in this section explain how to use each of the system mode menus Each procedure description starts at a main system mode menu Each procedure takes you step by step through a complete system mode operation in the following sequence 1 When a main system mode menu appears select an option...

Page 42: ...l font is used and text is typed in title case The Action column provides a procedural description that Describes the current step and context of the procedure Indicates the entries to perform using the keypad in response to a prompt or message Provides additional explanations or information about the steps for that particular system mode menu option A submenu row indicates a specific menu invoked...

Page 43: ...usly pressing F2 and F4 You can extend the display period of this screen by pressing any key during the initial three seconds Each key press extends the display period an additional three seconds Application Prompt or DOWNLOAD NEEDED GO FILE NOT FOUND If an application already resides on the device an application specific prompt is displayed If no application resides on the device the following me...

Page 44: ...A ALPHA 6 6 8 3 1 then press ENTER If you enter an incorrect password the device exits the SYSTEM MODE ENTRY screen Verify your password and re enter it To quit this operation and return to the application prompt or DOWNLOAD NEEDED screen press CANCEL SYS MODE MENU 1 EDIT PARAMETERS F2 DOWNLOAD F3 RESTART F4 ª SYS MODE MENU 1 is the first menu displayed To cycle through to the other menus press th...

Page 45: ...T PARAMETERS F2 To abort any action at any step press CANCEL GROUP SELECT GROUP ID nn APP NOT EMPTY Scroll to the group whose parameters you want to edit by pressing PF1 to move up the list or PF2 to move down the list and then pressing ENTER You can also enter the desired group number using the Number 0 to 9 keys and then pressing ENTER SYSTEM MODE DOWNLOAD GROUP nn PASSWORD _ _ _ _ _ _ _ _ _ _ T...

Page 46: ... select YES F3 to confirm or NO F4 to cancel the action DOWNLOAD SYS MODE MENU 1 EDIT PARAMETERS F2 DOWNLOAD F3 RESTART F4 ª To download an application to your device select DOWNLOAD F3 To abort any action at any step press CANCEL SYSTEM MODE DOWNLOAD GROUP ID nn Type the Group ID valid values are 1 to 15 of the group into which you want to download files to Refer to Chapter 6 for detailed downloa...

Page 47: ... available For example the Modem option will only appear if the Vx810 PIN pad is connected to the Vx810 DUET base SYS MODE DOWNLOAD Gnn TCPIP F2 USB F3 To view the other download sources press the PF2 key SYS MODE DOWNLOAD Gnn UNIT RECEIVE MODE WAITING FOR DOWNLOAD The device is ready to receive a download from the selected source SYS MODE DOWNLOAD Gnn _ _ _ _ _ _ _ DOWNLOADING NOW During download...

Page 48: ...evice one that contains an application reclaim all available flash ROM space Unlike SRAM unused flash ROM and duplicate flash ROM information are not automatically reclaimed during a download To reclaim this space perform a defragment operation from system mode refer to the procedure Defragment Flash ROM for Application Downloads This operation makes all files in flash ROM memory contiguous You mu...

Page 49: ...e keypad CONFIG SYS Protected and Non protected Records The concept of protected and non protected records applies only to the CONFIG SYS files in your device Prior to a download the recommended procedure is to clear SRAM files Protected records in the file Group 1 CONFIG SYS file are retained in a full application download and when SRAM is cleared Protected records are those with search keys begi...

Page 50: ... FUNCTIONS F2 TERMINAL INFO F3 CLOCK F4 ª To perform memory functions select MEMORY FUNCTIONS F2 To abort any action at any step press CANCEL SYS MODE MEM FUNCS RAM 2048 FLASH 4096 USAGE F2 DIRECTORIES F3 CLEAR MEM F4 This screen shows the amount of installed SRAM and flash ROM memory To view memory usage select USAGE F2 MEMORY USAGE RAM FILES 6 INUSE 1 KB AVAIL 1907 KB FLASH FILES 1 INUSE 6 KB AV...

Page 51: ... whose directory you want to view To view the files in SRAM memory for the selected group select RAM FILES F3 To view the files in flash ROM memory for the selected group select FLASH FILES F4 MEMORY FUNCTIONS X CLEAR MEM SYS MODE MENU 2 MEMORY FUNCTIONS F2 TERMINAL INFO F3 CLOCK F4 ª To perform memory functions select MEMORY FUNCTIONS F2 To abort any action at any step press CANCEL SYS MODE MEM F...

Page 52: ...GROUPS F4 SYS MODE MEMORY CLEAR ALL F2 KEEP PROTECTED VARIABLES F3 Selecting CLEAR CONFIG SYS F2 will further display the following options Select CLEAR ALL F2 to clear all CONFIG SYS records including both protected and non protected records Select KEEP PROTECTED VARIABLES F3 to clear non protected CONFIG SYS records but retain protected CONFIG SYS records RAM FLASH CLEARED COALESCING FLASH This ...

Page 53: ... VX810 Country of Manufacture GEN Generic Keypad Type 0 TelCo 1 Calculator 2 Singapore Display Resolution 128 x 128 pixels Magnetic Stripe Reader Type Presence of a Printer 0 No 1 Yes SYS MODE TERM INFO PINPAD 1 LIFE 143457 RSET 070613131233 RCNT 171 TAMPER DETECTED N CONTACTLESS PRESENT Y ª Integrated PIN Pad 1 Yes 0 No Running Life in seconds Last Reset Date Time in YYMMDDHHMMSS format where YY ...

Page 54: ...formation select DIAGS AND LOGS F3 SYS MODE DIAGS PRINTER DIAG F2 KEYBOARD DIAG F3 MAG CARD DIAG F4 ª To run a test on the installed printer select PRINTER DIAG F2 To run a test on the keypad select KEYBOARD DIAG F3 To run a test on the magnetic stripe reader MSR select MAG CARD DIAG F4 SYS MODE DIAGS SCREEN DIAG F2 IPP DIAG F3 SMART CARD DIAG F4 ª To perform a diagnostic test on the screen select...

Page 55: ...U SYSTEM INFO F2 DIAGS AND LOGS F3 To perform system diagnostic tests and view log information select DIAGS AND LOGS F3 SYS MODE DIAGS SMART CARD DIAG F2 KEYBOARD DIAG F3 MAG CARD DIAG F4 ª To run a test on any inserted ICC or SAM cards select SMART CARD DIAG F2 VOYAGER VER 02080000 DRVR VER 070329161412 PHILIP VER 2 0 6 06 SMART CARD TEST F3 LIST SYNC DRIVERS F4 The screen displays system and dri...

Page 56: ...IONS F2 TERMINAL INFO F3 CLOCK F4 ª To view device configuration information select TERMINAL INFO F3 To abort any action at any step press CANCEL SYS MODE MENU SYSTEM INFO F2 DIAGS AND LOGS F3 To perform system diagnostic tests and view log information select DIAGS AND LOGS F3 SYS MODE DIAGS SMART CARD DIAG F2 KEYBOARD DIAG F3 MAG CARD DIAG F4 ª To run a test on the keypad select KEYBOARD DIAG F3 ...

Page 57: ...eader MSR select MAG CARD DIAG F4 SYS MODE TRK 1 NO DATA TRK 2 NO DATA TRK 3 NO DATA The Vx810 has 3 track high coercivity bi directional MSR heads Initially each track will indicate NO DATA SYS MODE TRK 1 VALID DATA TRK 2 VALID DATA TRK 3 VALID DATA When you swipe a magnetic stripe card through the MSR slot a successful read would indicate VALID DATA for each track An unsuccessful read may indica...

Page 58: ...part of the screen that is not shaded black indicates defective pixels A successful screen test is indicated by all 128 x 128 pixels being shaded BLACK Any part of the screen that is not shaded black indicates defective pixels TERMINAL INFO X DIAGS AND LOGS X IPP DIAG SYS MODE MENU 2 MEMORY FUNCTIONS F2 TERMINAL INFO F3 CLOCK F4 ª To view device configuration information select TERMINAL INFO F3 To...

Page 59: ...F3 CLOCK F4 ª To view device configuration information select TERMINAL INFO F3 To abort any action at any step press CANCEL SYS MODE MENU SYSTEM INFO F2 DIAGS AND LOGS F3 To perform system diagnostic tests and view log information select DIAGS AND LOGS F3 SYS MODE DIAGS REMOTE DIAGS F2 DEBUGGER F3 ª To perform remote diagnostic tests select REMOTE DIAGS F2 This option is reserved for VeriFone use ...

Page 60: ... GROUP nn Type the Group ID valid values are 1 to 15 of the files you want to debug Then press ENTER LOAD DBMON OUT This message is displayed when the debugger tool is run SYSTEM MODE FILE GROUP nn PASSWORD _ _ _ _ _ _ _ _ _ _ To continue enter the required password TERMINAL INFO X DIAGS AND LOGS X ERROR LOG SYS MODE MENU 2 MEMORY FUNCTIONS F2 TERMINAL INFO F3 CLOCK F4 ª To view device configurati...

Page 61: ...empt to execute an illegal instruction TASK Task Number indicates type of task that was currently executed 1 Data abort attempt to access data at an invalid address 2 Program abort attempt to execute code at an invalid address TIME time of crash clock time of the error in the format YYMMDDhhmmss where YY year MM month DD day hh hour mm minute and ss second CPSR Current Program Status Register cont...

Page 62: ...LOG F2 TAMPER LOG F3 To view the tamper logs select TAMPER LOG F3 TAMPER LOG 18 OCT 05 23 10 TAMPER CODE 0 00 04 10 OCT 05 12 05 TAMPER CLEAR 10 OCT 05 12 00 TAMPER CODE 2 00 00 The Tamper Log screen displays a list of possible tamper events The list is sorted from the most current tamper event to the oldest event The date is displayed in DD MON YY format while the time is displayed as a 24 hour c...

Page 63: ... retain date and time settings when the device is switched off SYS MODE TIME CURRENT TIME 10 01 50 NEW TIME _ _ _ _ _ _ Selecting EDIT TIME F2 will prompt you to enter new time values Enter the new time in HH MM SS format then press ENTER SYS MODE DATE CURRENT DATE 06 15 07 NEW DATE _ _ _ _ _ _ Selecting EDIT DATE F3 will prompt you to enter new date values Enter the new date in MM DD YY format th...

Page 64: ... SYS MODE MENU 3 CONTRAST F2 PASSWORDS F3 IPP KEY LOAD F4 ª To adjust screen contrast select CONTRAST F2 To abort any action at any step press CANCEL SYS MODE CONTRAST CONTRAST UP F2 CONTRAST DOWN F3 TOGGLE INVERSE F4 To increase screen contrast select CONTRAST UP F2 To decrease screen contrast select CONTRAST DOWN F3 To inverse the screen select TOGGLE INVERSE F4 From having black text on a white...

Page 65: ...Y AGAIN This message appears if you enter an incorrect password Press ENTER to try again Re enter your password SYS MODE PASSWORD Gnn NEW _ _ _ _ _ _ _ _ _ _ Enter the new password then press ENTER SYS MODE PASSWORD Gnn AGAIN_ _ _ _ _ _ _ _ _ _ Re enter the new password then press ENTER SYS MODE PASSWORD Gnn PLEASE TRY AGAIN This message is displayed if the entry and re entry of the new password d...

Page 66: ...ter an incorrect password Press ENTER to try again Re enter your password INTERNAL PIN PAD KEY LOADING MODE BYTES SENT 0 BYTES RCVD 0 END F4 A communication channel is opened through COM2 to the IPP to allow key loading The number of bytes sent and received is displayed Press END F4 when done The system will restart KEY LOADING STOPPED TIMER EXPIRED This message is displayed if no data is sent wit...

Page 67: ... the VeriShield security architecture which has both physical and logical components The logical security component of the VeriShield architecture which is part of the operating system software is called the file authentication module File authentication is a secured process for authenticating files using digital signatures cryptographic keys and digital certificates This process makes it possible...

Page 68: ...les are encrypted and password protected for data security Others such as digital certificates and signature files do not need to be kept secure to safeguard the overall security of VeriShield Within the VeriShield File Signing Tool you can recognize the special file types that support the file authentication process by the filename extensions All digital certificates are generated and managed by ...

Page 69: ...ust be downloaded together with the new signature and target files to authenticate Signer Private Keys Are Issued to Secure the File Signing Process Signer private keys are loaded onto a smart card This smart card is securely delivered to the business entity that the device sponsor has authorized to sign download and authenticate applications to run on the sponsor s device The VeriFone CA can also...

Page 70: ...he SDK 4 The default certificate VXSIGN CRT and default key VXSIGN KEY included in the SDK are inputs for the VeriShield File Signing Tool 5 Using the application file default certificate and default key the VeriShield File Signing Tool creates a signature file p7s 6 The signature file and the original application file are loaded onto a development device where the following actions occur a The de...

Page 71: ...cates for deployment devices 2 Based on information provided by the sponsor through the VeriFone CA Web site the VeriFone CA determines the required certificate structure 3 The VeriFone CA generates the following items for the sponsor a Smart card containing a set of certificates and private key b Smart card PIN 4 The VeriFone CA sends the smart card and smart card PIN to the sponsor 5 The sponsor...

Page 72: ...d extracts the signer key signer certificate and sponsor certificate from the smart card 3 VeriShield uses the extracted data along with the application file to create a signature file p7s 4 VeriShield creates files suitable for downloading from the extracted smart card data 5 The signature file application file and extracted signer and sponsor certificates are downloaded onto a deployment device ...

Page 73: ... application file s calculated signature d If these values match the operating system marks the application file authenticated and allows it to run 6 Each successfully authenticated executable application file is allowed to run on the device otherwise the executable remains stored in the device s memory but is not allowed to run The following diagram describes the deployment process Figure 28 The ...

Page 74: ...cally secure using file authentication requirements Decide Which Files to Authenticate in a Specific Application The first step in the file authentication process is to determine which files must be authenticated for an application to meet its design specifications for logical security under the VeriShield security architecture In most cases application designers make these decisions based on spec...

Page 75: ... file that failed to authenticate is the main application out specified in the CONFIG SYS GO variable the main application is not allowed to run If the executable that failed to authenticate is a secondary executable out or shared library lib used by the main application the CONFIG SYS GO application executes and runs until it issues a function call to that library When the main application attemp...

Page 76: ...ile Signing Tool to verify file signatures Hierarchical Relationships Between Certificates All digital certificates are hierarchically related to one another Under the rules of the certificate hierarchy managed by the VeriFone CA a lower level certificate must always be authenticated under the authority of a higher level certificate This rule ensures the overall security of VeriShield To manage hi...

Page 77: ...e stored in the device s certificate tree or one being downloaded with the new certificate In a batch download containing multiple certificates each lower level certificate must be authenticated under an already authenticated higher level certificate Whether or not the data a new certificate contains is added to the device s certificate tree depends on if it is successfully authenticated The follo...

Page 78: ...tion development process is being completed and while the new application is being tested on a development device a sponsor can order specific sponsor and signer certificates from the VeriFone CA to use to logically secure sponsor and signer privileges when the Vx810 is prepared for deployment Customer specific sponsor and signer certificates are usually downloaded onto a device as part of the sta...

Page 79: ...ning certificates in a device This allows the flexibility of unique signatures for each executable or data files Figure 29 Certificate Trees in Development and Deployment Devices Permanency of the Certificate Tree The data contained in a digital certificate is stored in the device s certificate tree when the certificate is authenticated and the certificate file itself is erased from SRAM The certi...

Page 80: ...signing process as well as the application files you want to sign and authenticate Customer signer certificate This unique certificate is a required input for the VeriShield File Signing Tool and must be downloaded onto the device along with the signature files and target application files to authenticate unless already downloaded onto the device in a previous operation Customer signer private key...

Page 81: ...pment state by Deleting the current sponsor and signer certificates from the device s application partition Restoring the default certificate to the device s application partition Figure 30 Certificate Replacement Process File Authentication and the File System Application Memory Logically Divided Into File Groups The memory of a Vx810 is logically divided into two main areas or partitions Operati...

Page 82: ...cated Although not enforced by the operating system it is recommended that only one application be stored per file group in the application partition Any number of executable files can however be stored in a single file group Using the CONFIG SYS GO variable you can specify only one application to automatically execute following a download and device restart The defined application is usually the ...

Page 83: ... not authorized file authentication for that application fails If for example Application B is downloaded onto GID4 where it is authorized to run but the signature files for all Application B executable files are downloaded onto GID7 file authentication for Application B fails and it is not allowed to run Each certificate contains an attribute to verify if an application is valid for a particular ...

Page 84: ...tificate file is erased from the target file group s SRAM NOTE Normally signature files are retained in the device even after being used to authenticate executable code or data files This is to facilitate back to back downloads as described in Chapter 6 Users who do not intend to perform back to back downloads can remove signature files after use gaining space for other files Automatic removal is ...

Page 85: ...ost computer in two user modes Command line mode Windows PC DOS shell Command line mode is useful for application developers who perform batch file downloads and is convenient when using file download tools provided by VeriFone such as the VeriCentre Download Management Module DMM and the DDL EXE direct download utility In command line mode you can sign a batch of files in a single operation Graph...

Page 86: ... Mode Switches for VeriShield File Signing Toola Switch Description Requirements C c Signer certificate file name crt Required input for development devices and deployment devices Use the VXSIGN CRT default signer certificate for development devices Use the signer certificate issued by the VeriFone CA for deployment devices K k Signer private key filename key Required input for development devices...

Page 87: ...he out or lib file to download and also stores this information in the signature file as part of the special filetype attribute Note Signature files must be downloaded onto the target file group s SRAM If the target file is authenticated the corresponding p7s file is moved to the same memory area as the target file it authenticates For example if the target file is stored in flash ROM F its p7s fi...

Page 88: ...tch indicates that the application file file out must be signed by the VeriShield File Signing Tool Executable files such as out and lib files must always be signed if they are to run on the device following a download Depending on the application s logical security requirements other types of files such as data files and font files may also need to be signed and authenticated on download The s sw...

Page 89: ...r a filename for the signature file to be generated The filename extension must always be p7s You can also choose another directory on the host PC to store the generated signature file When all entries are complete press ALT O or click the OK button to execute VeriShield File Signing Tool and generate the signature file otherwise press ALT A or click CANCEL to exit the the VeriShield File Signing ...

Page 90: ...VeriShield File Signing Tool 90 VX810 REFERENCE GUIDE ...

Page 91: ... performing downloads The term download also refers to a device receiving data The term upload describes the process of a device sending data Use any of the following two operations to program deploy transfer data files from and support devices Host computer downloads Applications operating systems or OS updates and associated files transfer from a host PC to the Vx810 Back to back downloads Appli...

Page 92: ...abase and communications management tool VeriCentre automates application downloads and updates to device records NOTE The device will automatically download the file VeriFone zip from a USB flash drive SD memory card without the user having to go through System Mode under the following conditions The USB flash drive SD memory card is connected before the device is turned on The USB flash drive SD...

Page 93: ...n be developed by VeriFone customers or third parties on customer request One or more applications must be downloaded onto the Vx810 before it can be deployed at a customer site and used to process transactions Files related to file authentication The logical component of the VeriShield security architecture in the Vx810 is file authentication For an executable to run on a Vx810 it must be authent...

Page 94: ... full application download During this process SRAM is cleared Following a full application download the device restarts and the file authentication module is invoked If application files are authenticated and config sys GO variable is set then the application executes Direct downloads Back to back downloads Partial application download A subset of application executables font files or data files ...

Page 95: ...re authenticated the new OS updates replaces the existing OS Application files stored in the memory area where the OS downloads Group 1 are erased Direct downloads Note Full back to back OS downloads are not supported Partial operating system download Either an entire or a partial OS version transfers from a host PC to the Vx810 device Files related to file authentication and device configuration ...

Page 96: ... such a way that the data integrity of each application is ensured and applications do not interfere with each other see File Groups How the File System Supports Multiple Applications The application memory partition of the Vx810 is divided into 15 logically defined sub partitions called file groups or GIDs for example Group 1 Group 2 and so on through GID15 Another partition of the device s memor...

Page 97: ...nload into specific file groups If GID1 is selected as the target group in system mode you can download files into GID1 and redirect files into any of the other file groups as required in the same download operation If another file group is selected as the target file group you can download files only into that group and redirect files only to GID15 For example if you select GID5 as the target gro...

Page 98: ... provide instructions to redirect the file to flash ROM as part of the procedure see Manually Redirecting Files There are two methods used to redirect files during an application download depending on the download tool If you are using DMM you must manually create and include special zero length files called SETDRIVE x and SETGROUP n on the download computer and add these files to the batch downlo...

Page 99: ...ticated when the device restarts after the download The GO variable in this example indicates that the FOO OUT application executes on restart after successful authentication The two data files that follow the zero length SETDRIVE F file FOO DAT and FOO VFT are redirected into GID1 flash ROM Because it follows the inserted zero length SETDRIVE I file GOO DAT downloads into Group 1 SRAM FOO OUT FOO...

Page 100: ...the SETGROUP filename SETGROUP 1 GID1 is assumed Restrictions on File Redirection The Vx810 file system restricts how you can redirect files to other file groups Here are the important points to remember The main application must always be downloaded onto GID1 Because of the way file groups are managed in the Vx810 file system only two schemes are available for redirecting files during a batch app...

Page 101: ...ows SETDRIVE drive letter where drive letter is I for SRAM default or F for flash ROM and SETGROUP group number where group number is 1 15 For example the command line entry DDL SETDRIVE F cardco lib SETDRIVE I SETGROUP 15 card dat downloads the executable file cardco lib into the flash ROM of the selected target group and the data file card dat into Group 15 SRAM Because drive or group settings a...

Page 102: ...e receiving device in a single operation For this type of download you must select Group 1 as the target group on the sending and receiving devices When you initiate the download on the receiving device all application files as well as all special files required for file authentication and device configuration settings on the sending device download to the receiving device In this type of data tra...

Page 103: ...ny required certificates download in the same operation After the download is complete and the device restarts the file authentication module is invoked if a new signature file or certificate is detected If the application executable is authenticated it is allowed to run on the device Otherwise it does not execute If one executable file required by an application with multiple executables fails to...

Page 104: ...cation files Certificate files and signature files can download into the SRAM of any file group For this reason the file authentication module searches through the entire file system all file groups for new files with these filename extensions each time the device restarts 3 The file authentication module builds a list of all newly detected certificates and signature files If no new certificates o...

Page 105: ...file it detects Each p7s file is checked as it is detected a list is not built and multiple processing passes are not required If a signature file is authenticated AUTHENTIC is displayed and the target file is flagged authentic If the authentication process fails FAILED is displayed for five seconds and the device beeps three times The routine continues processing the next signature file until all...

Page 106: ...redirected as required the device restarts and the GO application executes File Group Permissions This section discusses how file authentication controls who which business entity can store application files in which file groups in the Vx810 file system By inserting zero length SETDRIVE x and SETGROUP n files into a download list you can specify which drive x I SRAM or F flash ROM and in which gro...

Page 107: ...rget group other than Group 1 the operation fails Before initiating an OS download either full or partial ensure that enough memory space is available in Group 1 SRAM to temporarily store the OS files and that any application files can also be stored in Group 1 If a full OS download was selected in system mode the device automatically restarts and the new OS is processed and replaces the existing ...

Page 108: ...equired passwords All signature files required to authenticate the download applications must reside in the memory of the sending device They must not be deleted through the FA variable being cleared to 0 on previous downloads Any sponsor and signer certificates downloaded onto and authenticated on the sending device are stored in the certificate tree of that device When you perform a back to back...

Page 109: ...ions Due to the Authentication Process The file authentication process takes some time The total amount of time required depends on a number of factors The number and size of application files The number of certificates and signature files Whether the file compression feature of Download Manager is being used to perform the download Here are a few additional considerations that may affect the tota...

Page 110: ...ons to clear the entire SRAM and flash ROM of a specific file group as necessary to ensure proper use of available memory in the target group Support for File Compression For information regarding file compression refer to the Verix V Operating System Programmers Manual VPN 23230 Effect of Downloads on Existing Files and Data When downloading application files and data to a Vx810 device an importa...

Page 111: ...eration together with the certificates and signature files required to authenticate them Set Up the Download Environment The first step in performing a download to a Vx810 device is to establish the physical communication link between the sending and receiving systems required to support the following download methods Direct serial cable connection for direct application and OS downloads The link ...

Page 112: ...he 14 pin header end of the cable to the Vx810 2 Connect the female DB 9 connector end of the cable to the RS 232 serial port of the host computer 3 Connect an external power brick to the DC jack provided on the DB 9 connector housing Figure 34 Serial Cable Connection with Multi Port Adapter Cable Connection for Back to Back Application Downloads To prepare for a back to back application download ...

Page 113: ...puter One signature file downloads for each executable out or lib to run on the device The filenames in the batch download list on the host computer indicate which application files to redirect to flash ROM and file groups other than the target group Ensure that filenames and CONFIG SYS variables to download are correct in relation to those stored in the memory of the receiving device to avoid acc...

Page 114: ...device When new certificates are authenticated on the receiving device the data they contain is stored in the certificate tree and the certificate files are deleted from the SRAM of the target group Table 17 Common Steps to Start a Download Step Display Action 1 VERIFONE VX810 QG000829 03 29 2007 VERIX DEFAULT CERTIFICATE COPYRIGHT 1997 2007 VERIFONE ALL RIGHTS RESERVED At startup the device displ...

Page 115: ...DE ENTRY PASSWORD _ _ _ _ _ _ _ _ _ _ If an application prompt appeared and you chose to enter system mode you are prompted to type the system password If DOWNLOAD NEEDED appeared use the default password Z66831 This password is entered as 1 ALPHA ALPHA 6 6 8 3 1 then press ENTER If you enter an incorrect password the device exits the SYSTEM MODE ENTRY screen Verify your password and re enter it T...

Page 116: ...ssword is Z66831 This is entered as 1 ALPHA ALPHA 6 6 8 3 1 then press ENTER SYS MODE PASSWORD Gnn PLEASE TRY AGAIN This message appears if you enter an incorrect password Press ENTER to try again Re enter your password 3 SYS MODE DOWNLOAD Gnn SINGLE APP F3 MULTI APP F4 To download a single application select SINGLE APP F3 To download multiple applications select MULTI APP F4 4 SYS MODE DOWNLOAD G...

Page 117: ...p7s files included in the download Then these special files process one at a time certificates process first then signature files When the file authentication module is invoked the status display informs you of the progress of the file authentication process If file authentication succeeds for a specific certificate the AUTHENTIC message is displayed directly below the certificate filename If file...

Page 118: ...en all new signature files are authenticated the device restarts and the application specified in the GO variable or the default application in Group 1 executes and starts running on the device 8 Application Prompt or DOWNLOAD NEEDED If the downloaded application successfully authenticates the corresponding application prompt or logo is displayed upon restart The device can now process transaction...

Page 119: ...ownload operation The following files provided by VeriFone CA for full OS downloads must reside on the host computer The new OS version or OS update Q out 1 out 2 out 3 out 4 out 5 out 6 out A signature file called VFI p7s for the OS update This signature file is generated by the VeriFone CA using the high level OS certificates for the Vx810 platform A file called VFI PED This file is an encrypted...

Page 120: ...nticate the new OS are processed by the file authentication module of the receiving device the same as application files When the device restarts and the new OS files process they are moved out of the Group 1 SRAM into the Group 0 area of the Vx810 file system Table 19 Direct Operating System Download Procedure Step Display Action 1 SYSTEM MODE DOWNLOAD GROUP ID nn Type the Group ID valid values a...

Page 121: ...ownload from the selected source Initiate the download by executing the proper commands in the download tool running on the host computer when the receiving device is ready to receive the direct OS download SYS MODE DOWNLOAD Gnn _ _ _ _ _ _ _ DOWNLOADING NOW During download a line of asterisks appears that shows the percentage of completion Each asterisk equals approximately 10 of the download Whe...

Page 122: ...When the file authentication module is invoked the status display informs you of the progress of the file authentication process If file authentication succeeds for a specific certificate the AUTHENTIC message is displayed directly below the certificate filename If file authentication fails for a specific certificate the FAILED message is displayed for five seconds below the filename and the devic...

Page 123: ...e validated When all new signature files are authenticated the device restarts and begins processing the new OS full download or it returns control to system mode partial download If you are performing a partial download the device does not restart until you manually press the F4 key in SYS MODE MENU 1 If an application resides on the device following the OS download it executes on restart Note Be...

Page 124: ... on both devices The current CONFIG SYS variables date and time and other device configuration settings on the sending device are those downloaded onto the receiving device Ensure that the desired settings are correct All signature files required to authenticate the application files being downloaded onto the receiving device are present in the SRAM or flash ROM file system of the sending device T...

Page 125: ...ure that the download is exactly what you want your receiving device to receive 2 Configure the sending device to receive an application download from a PC From SYS MODE MENU 1 set Group 1 and COM2 as the port to receive the download 3 Connect a cable between the RS 232 serial ports of the PC and the sending device 4 Initiate the file transfer on the PC 5 From SYS MODE MENU 1 on the sending device...

Page 126: ... previously authenticated files are not changed prior to the file transfer operation 2 Configure the receiving device to receive an application download from the sending device From SYS MODE MENU 1 set Group 1 and COM2 as the port to receive the file transfer 3 Connect a cable VPN 08362 01 R between the RS 232 serial ports of the source and receiving devices using a UART Dongle connected to each d...

Page 127: ...ck Application Downloads VX810 REFERENCE GUIDE 127 The following diagram describes the procedure for a back to back application download from a sending Vx810 device to a receiving Vx810 device Figure 36 Back To Back Download Process ...

Page 128: ...dure Step Display Action 1 Connect a MOD10 cable P N 05651 XX between the RS 232 serial ports of the devices using a UART Dongle connected to each device Then start up both devices 2 Application Prompt or DOWNLOAD NEEDED GO FILE NOT FOUND After start up the sending device displays the application prompt while the receiving device displays DOWNLOAD NEEDED For both devices enter system mode by simul...

Page 129: ... 1 EDIT PARAMETERS F2 DOWNLOAD F3 RESTART F4 ª For the sending device press the Asterisk key to enter Upload mode Enter the system mode password when prompted SYS MODE UPLOAD _ _ _ _ _ _ _ UPLOADING NOW To message UPLOADING NOW is displayed During upload a line of asterisks appears that shows the percentage of completion Each asterisk equals approximately 10 of the download SYS MODE UPLOAD UPLOAD ...

Page 130: ...PERFORMING DOWNLOADS Back to Back Application Downloads 130 VX810 REFERENCE GUIDE ...

Page 131: ...cklighting Supports 16 lines x 21 characters with standard font set Magnetic Card Reader Optional Triple track High coercivity Bi directional Compliant to ISO 7810 and ISO 7811 Primary Smart Card Reader Optional Support for ISO 7816 1 8V 3V 5V or synchronous and asynchronous cards EMV Level 1 and Level 2 Type approved SAM Card Reader Optional 1 3 Security Access Modules SD Card Reader Support for ...

Page 132: ... keys F1 to F4 4 programmable function keys PF1 to PF4 1 ALPHA key Main keypad 0 to 9 and 3 command keys CANCEL CLEAR and ENTER Peripheral Ports Single multi connector which supports power RS 232 USB Client USB Host Ethernet and power over Ethernet Supported Memory Media SD Memory Card Sandisk SD SDSDB 512 SDSDB 256 SDSDB 128 USB Flash Drive Sandisk Cruzer Mini SDCZ2 256 A10 Memorex Thumbdrive 325...

Page 133: ...rmance standards for its intended use and expected market VeriFone recognizes its responsibility to minimize the environmental impacts of its operations and products The Vx810 is classified as a portable general purpose device It is designed for operation in retail environments where the product is handed over the counter to the consumer for payment transactions PIN verification etc This device is...

Page 134: ...ectrical Fast Transients EFT Burst Immunity IEC 61000 4 4 2004 Surge IEC 61000 4 5 2005 Conducted Immunity IEC 61000 4 6 2004 A1 2004 A2 2006 Magnetic Field Susceptibility IEC 61000 4 8 2001 Voltage Dips IEC 61000 4 11 2004 Harmonic Current Emissions EN 61000 3 2 2006 Flicker EN 61000 3 3 1995 A1 2001 A2 2005 Safety Standards This device is compliant to the following immunity standards for informa...

Page 135: ... not drop knock or shake the device Rough handling can break internal circuit boards and fine mechanics Do not use harsh chemicals cleaning solvents or strong detergents to clean the device Use only a soft clean dry cloth for cleaning For best results use the VeriFone Cleaning Kit Do not paint the device Paint can clog the moving parts and prevent proper operation Keep the device free from any sma...

Page 136: ... for other electronic devices may look similar but they may affect your device s performance or damage it Potentially Explosive Environments Do not use this device in any area with a potentially explosive atmosphere and obey all signs and instructions Potentially explosive atmospheres include areas where you would normally be advised to turn off your vehicle engine Sparks in such areas could cause...

Page 137: ...urn Authorization MRA number The following procedure describes how to return one or more Vx810 devices for repair or replacement U S customers only To return a Vx810 device 1 Gather the following information from the printed labels on the bottom of each Vx810 device to be returned Model Name That is Vx810 Part Number P N 12 digit alphanumeric code For example M281 503 02 DMO Serial Number S N 9 di...

Page 138: ...nt at i_mra_help verifone com Place the information you gathered in Step 1 in the body of your email including a description of the problem you are having with each device d Complete the Contact Form found at http www verifone com aboutus contact contact_form cfm In the Inquiry field specify VeriFone MRA Department followed by the information you gathered in Step 1 and the description of the probl...

Page 139: ...ontact your local VeriFone distributor to determine which power pack or power cord fits your needs CPS 11212 3A R DC Power Supply VPN 07152 02 R AC Power Cord Connectivity Cables VPN 08360 01 R Cable 14 PIN Header IO Box with 12V DC Power Socket Mini USB Socket USB Socket and RJ48 Socket 1 0m VPN 08360 02 R Cable 14 PIN Header IO Box with 12V DC Power Socket Mini USB Socket USB Socket and RJ48 Soc...

Page 140: ...x810 CTLS Quick Installation Guide VPN 28601 Vx810 CTLS Certifications and Regulations Sheet VPN 28600 Vx810 DUET Quick Installation Guide VPN 24968 Vx810 DUET Installation Guide VPN 24969 Vx810 DUET Reference Guide VPN 24970 Vx810 DUET Certifications and Regulations Sheet VPN 24967 Vx810 Privacy Shield Quick Installation Guide VPN 24965 Verix V Operating System Programmers Manual VPN 23230 Verix ...

Page 141: ...service provider Blank Display When the Vx810 s display screen does not show any information Check the device s power connection Remove and reapply power to the device If the problem persists contact your local VeriFone service provider NOTE The Vx810 device comes equipped with tamper evident labels The Vx810 contains no user serviceable parts Do not under any circumstance attempt to disassemble t...

Page 142: ...one representative Transactions Fail To Process There are several reasons why the device may not be processing transactions Use the following steps to troubleshoot failures Check Magnetic Stripe Card Reader Perform a test transaction using one or more different magnetic stripe cards to ensure the problem is not a defective card Process a transaction manually using the keypad instead of the card re...

Page 143: ...may be resolved through another download of the file This message is displayed if you enter an incorrect system mode password or an incorrect file group password Repeat the password entry and press ENTER A corrupt file is detected in the SRAM file system at device start up after power on or during restart This message may indicate a hardware problem the error condition may be resolved through anot...

Page 144: ...e the debugging tool you must sign download and authenticate the DBMON OUT application This message displays if you select REMOTE DIAGS F3 in SYS MODE MENU 2 and the optional Terminal Management Agent TMA software is not resident in the Vx810 device The TMA software is required to perform remote diagnostics For more information about support for remote diagnostics contact your VeriFone service pro...

Page 145: ...ad each asterisk represents 10 of the download When ten asterisks appear the data transfer is complete This information appears when you select ERROR TMPR LOGS F4 in SYS MODE MENU 2 or on system crash Select TAMPER LOG F4 to view a list of possible tamper events Select ERROR LOG F3 to display the following information which helps developers interpret the cause of the most recent unrecoverable soft...

Page 146: ...PASSWORD CHANGED Displayed when the new password is accepted In a back to back download the sending device displays this message when you initiate an upload from the receiving device To stop the upload press CANCEL on either device When you invoke a local system mode diagnostic test of the magnetic stripe card reader status information appears for the data tracks TRK1 TRK2 and TRK3 on the card To ...

Page 147: ...ed one by one In special cases where system certificates are being installed SYSTEM CERTIFICATE is displayed instead of CHECK CERTIFICATE This message is displayed when the file authentication module detects a new signature file together with the application file for which the signature file was generated during a download to the Vx810 device If the authentication is successful AUTHENTIC is displa...

Page 148: ...Information Messages 148 VX810 REFERENCE GUIDE ...

Page 149: ...RS 232 Transmit Data 7 SGND System Ground 8 USB_HOST USB Host Signal 9 USB_HOST USB Host Signal 10 SGND System Ground 11 EXTPWR 12V DC External Power 12 EXTPWR 12V DC External Power 13 EXTGND External Ground 14 RESERVED n a LOOKING INTO CONNECTOR Connector Pin Function Description 1 NC No Connection 2 NC No Connection 3 DCD Data Carrier Detect 4 DTR Data Terminal Ready 5 GND Signal Ground 6 RXD RS...

Page 150: ...PORT PINOUTS COM Port 150 VX810 REFERENCE GUIDE ...

Page 151: ... 27 71 47 G 103 67 g 8 08 BS 40 28 72 48 H 104 68 h 9 09 HT 41 29 73 49 I 105 69 i 10 0A LF 42 2A 74 4A J 106 6A j 11 0B VT 43 2B 75 4B K 107 6B k 12 0C FF 44 2C 76 4C L 108 6C l 13 0D CR 45 2D 77 4D M 109 6D m 14 0E SO 46 2E 78 4E N 110 6E n 15 0F SI 47 2F 79 4F O 111 6F o 16 10 DLE 48 30 0 80 50 P 112 70 p 17 11 DC1 49 31 1 81 51 Q 113 71 q 18 12 DC2 50 32 2 82 52 R 114 72 r 19 13 DC3 51 33 3 83...

Page 152: ...8 3A 90 5A Z 122 7A z 27 1B ESC 59 3B 91 5B 123 7B 28 1C FS 60 3C 92 5C 124 7C 29 1D GS 61 3D 93 5D 125 7D 30 1E RS 62 3E 94 5E 126 7E 31 1F US 63 3F 95 5F _ 127 7F DEL Table 21 Vx810 ASCII Table Dec Hex ASCII Dec Hex ASCII Dec Hex ASCII Dec Hex ASCII ...

Page 153: ...ate indicates the number of bits per second that are transmitted or received by the device s serial ports or modem Bit Short for binary digit Either of the two digits 0 and 1 in the binary number system Also a unit of information equal to one binary decision The bit is the smallest unit of storage and hence of information in any binary system within a computer Byte A term developed to indicate a m...

Page 154: ...st computers are also used to process transactions that originate from a distributed network of POS terminals Input The process of entering data into a processing system or a peripheral device such as a PIN pad terminal or the data that is entered Interface A common boundary between two systems devices or programs Also to interact with a device Keyed file editor A keyed file editor lets you create...

Page 155: ...ical or physical access to a system or circuit Also a connection point with associated control circuitry that allows I O devices to be connected to the internal bus of a microprocessor POS terminal A device used at the point of sale which is usually at a merchant site where a customer pays for goods or services received Information concerning the sale can be entered into the device and transmitted...

Page 156: ...n of sliding a magnetic stripe card through a card reader The Vx810 card reader has a bi directional swipe direction The user must hold the card so that the magnetic stripe is faces in and towards the keyboard System Mode For the Vx810 system mode temporarily disables normal mode operations allowing you to perform local functions such as downloads diagnostics and other operations that cannot be pe...

Page 157: ... a serial cable Track 1 2 or 3 data Information stored on tracks 1 2 or 3 of a debit or credit card magnetic stripe which can be read by a magnetic card reader device such as the one that is integrated in the Vx810 Transaction An exchange of data resulting in a transfer of goods services value or information between two parties Variable A string of characters that denotes some value stored within ...

Page 158: ...GLOSSARY 158 VX810 REFERENCE GUIDE ...

Page 159: ...s and settings 119 hardware checklist 119 procedure 120 software checklist 119 documentation 139 downloads content 93 methods 91 back to back downloads 91 direct downloads 91 USB downloads 92 tools 92 VeriCentre 92 VeriCentre DMM 92 DUKPT 12 77 132 E EMV 9 12 131 error messages 143 F file authentication Certificate Authority VeriFone 67 file system 81 authenticate files 83 file groups 81 restricti...

Page 160: ...uct Vx810 features and benefits 12 flexibility and future proofing 12 reliability and security 12 ultra sleek PIN pad 13 overview 11 S service and support accessories and documentation 139 cleaning kit 139 connectivity cables 139 documentation 140 power pack 139 privacy shield 139 product returns 137 setup cable connections ethernet connection 32 powered USB 31 RS 232 connection 30 Standard USB 31...

Page 161: ... REMOTE DIAGS 59 SCREEN DIAG 57 SMART CARD DIAG 55 TAMPER LOG 62 SYSTEM INFO 52 menu 3 64 CONTRAST 64 IPP KEY LOAD 65 PASSWORDS 64 operations 36 local operations 36 remote operations 36 passwords 37 file group passwords 38 maintenance 38 manual password change 39 system mode password 38 procedures 41 when to use 35 T troubleshooting blank display 141 device does not dial out 142 display does not s...

Page 162: ...Vx810 Reference Guide VeriFone Part Number 24964 Revision B VeriFone Inc 2099 Gateway Place Suite 600 San Jose CA 95110 USA 1 800 VERIFONE www verifone com ...

Reviews: