Benutzeranleitung / Produktwartung 1352 MICR 40 des Produzenten Source Technologies
Zur Seite of 65
IBM Infoprint 1352 MICR 40 Secure MICR Printer User ’ s Guide Source T echnologies 2910 Whitehall Park Drive Charlotte, NC 28273 www .sourcetech.com techsupport@sourcetech.
This manual serves as a reference for Source T echnologies Secure MICR Printers. The user manual that ships with your printer contains details on printer setup and operations and should be read first. This manual should be used as a reference for learning more about MICR technology , and developing MICR printing applications.
T able of Contents 1 Printer Installation .......................................................... 1 2 MICR Overview ................................................................ 2 The Check Processing System .................................... 2 MICR Printing Today .
8 Audit T rail Report ............................................................ 34 Report Details ............................................................... 34 Audit T rail Menu ............................................................ 3 4 Audit T rail Command Set .
Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 1 All rights reserved 1 Printer Installation For complete information on how to unpack and setup your printer , see your printer ’s user ’s guide. Please read the following if you are going to install the printer driver shipped with your printer .
Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 2 All rights reserved 2 MICR Overview MICR stands for Magnetic Ink Character Recognition. All MICR documents have a MICR line with numbers and symbols printed in a MICR font with magnetically chargeable toner.
Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 3 All rights reserved The key standards that address check documents are as follows: ANSI X9.7 Specifications for Bank Check Background and Convenience Amount Field ANSI X9.13 Specifications for Placement and Location of MICR Printing ANSI X9.
Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 4 All rights reserved 3 MICR Check Design General Features of Check Design To be a legal and negotiable document, the necessary elements required on a check are the date, amount, payee, drawee institution, and payer’s signature.
Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 5 All rights reserved Duplexing We do not recommend printing on both sides of the paper (duplexing) when printing checks. MICR toner on the back of a check can cause read failures in the MICR Line.
Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 6 All rights reserved image capture equipment and is also a fraud deterrent. A fixed pitch courier font, or if available OCR-B, are also acceptable fonts to print the convenience amount.
Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 7 All rights reserved Account Title The account title is normally printed in the upper left corner of the check. It includes the name of the account holder and other information such as addresses, telephone numbers, and logos.
Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 8 All rights reserved Routing Field Positions 43 to 33 The routing field is bounded by T ransit Symbols ( : ) in positions 43 and 33. It contains fixed format information about the drawee institution.
Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 9 All rights reserved Figure 3.1: Sample Check A . Serial Number: Must be in the upper right corner and match the serial number in the MICR line (see D for further explanation).
Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 10 All rights reserved 4 Quality Issues A high quality MICR document can be read by bank reader/sorter equipment many times with no readability issues and does not result in damage to bank equipment.
Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 11 All rights reserved MICR Check Stock Check stock has a large impact on the resulting quality and security of your MICR document. Here are a few features that should be considered when selecting a check stock.
Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 12 All rights reserved Moisture The paper moisture content should be between 4.7 and 5.5%. S torage conditions have much to do with the final moisture content of most papers. S tore your check stock in a cool, dry , environmentally stable and secure area.
Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 13 All rights reserved 5 Security Issues Printing negotiable documents from blank paper on desktop MICR laser printers makes security a top priority for any company embarking on a desktop check printing project.
Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 14 All rights reserved Security Note Check fraud in the United States is a continuing problem. We have attempted to identify security features that can be incorporated into the base check stock.
Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 15 All rights reserved 8. Move methods of fraud detection to the item’s point of entry into the clearing system. For example, low cost readers can detect low magnetic strength in the MICR line which is a good indication of attempts to copy an original.
Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 16 All rights reserved 6 MICR Features Source Technologies’ Secure MICR Printers are designed to allow both general office document printing and secure MICR document printing.
Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 17 All rights reserved eye. This font provides protection against reproduction by most scanners and copiers because they cannot successfully print the tiny letters. Most check printers use this font in the signature area of their preprinted checks.
Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 18 All rights reserved Flash Memory is an optional feature. It is user managed and resources can be designated as “secure” or “unsecure.” Secure resources are loaded to flash with the STL command and have ID numbers greater than or equal to 10000.
Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 19 All rights reserved The Audit Menu deals with the optional Audit T rail Report settings. See chapter 7 for more information. Entering MICR Mode T o print MICR documents, your Secure MICR Printer uses special alphanumeric text commands called MICR Mode commands.
Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 20 All rights reserved When entering MICR mode with the &%STH command, the printer will: • Check to see if the proper Front Panel Combination has been entered (when enabled).
Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 21 All rights reserved In order to set a new password the current password must first be sent. Caution: Errors made in sending the new password command could lead to setting it to an unknown value.
Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 22 All rights reserved Print Secure Numeric Font & %SMFddd..ddd~ &%SMF Lead in sequence ddd...ddd Data to be printed in this font ~ Command terminator The dollar sign ($) is not a command terminator for this command.
Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 23 All rights reserved Resource number 5001 is reserved for the Audit T rail overlay , see chapter 7. Format Flash Memory &%SFF$ &%SFF Lead in sequence $ Command terminator This command formats flash memory .
Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 24 All rights reserved DES and AES Decr yption Data Encryption Standard (DES) and the recently approved Advanced Encryption Standard (AES) are both supported in the Source T echnologies Secure MICR Printers.
Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 25 All rights reserved Section 6: MICR Features Set AES Decryption Key Command &% STSET AESKEY <32 Hex Characters> $ The command also requires a MICR Password Command be sent prior to the Key Command.
Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 26 All rights reserved Customer Character Conversation Command The Custom Character Conversion Command can be used to resolve some problems in printer data streams.
Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 27 All rights reserved Special Alert and Custom Beep Command Using the Beep Command, the printer data stream can alert printer operators that important pages are currently being printed.
Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 28 All rights reserved 7 IBM Host Programming Features and Examples Hex T ransfer The Hex T ransfer feature allows the user to send PCL escape sequence printer commands to the printer with simple text strings.
Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 29 All rights reserved Hex T ransfer Examples &&??&% This command enables Hex T ransfer On &%1B 26 6C 34 48 $ .
Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 30 All rights reserved Figure 7.1 MICR Mode Command Example The following example shows the MICR Mode commands and Hex Transfer commands in use.
Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 31 All rights reserved Figure 7.2: Sample Check Section 7: IBM Host Programming Features and Examples VOID CHECK NO : 1000 2910 Whitehall Park Drive Charlotte, NC 28273 (704) 969-7500 First National Bank of Any State Any City , NC 27514 CHECK No .
Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 32 All rights reserved The commands in Figure 7.1 in order of appearance : &%STFPASSWORD$ Password Command. &%SMCP0001$ MICR Definition Command with the count set to one.
Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 33 All rights reserved Escape Character T ranslation In many IBM host environments, the programmer cannot send an ESC character (ASCII hex 1B) to the printer from within the application.
Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 34 All rights reserved 8 Audit T rail Reports The Audit T rail Report feature provides a report of the printer ’s MICR printing activity . The printer must have flash memory to utilize this option.
Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 35 All rights reserved point, and no alpha characters. For example: Valid Formats Invalid Formats “$1,234,567.89” “$1,23,” “4321234.56” “432.123” “5,321” “34 test” “$.
Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 36 All rights reserved Audit T rail Report Command Set &%SAR$ Start Audit Record &%SAR Lead in sequence $ Command terminator Marks the start of an audit record and begins a PJL job.
Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 37 All rights reserved Audit Report Field Four &%SQ4d..d~ &%SQ4 Lead in sequence d..d Data to be printed ~ Command terminator This command identifies the data to be printed in the fourth column of the report.
Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 38 All rights reserved Print and Purge Audit Report &%SPURGExx$ &%SPURGE Lead in string x option(s) $ Command terminator This command prints and purges the Audit Report.
Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 39 All rights reserved St art Audit Feedback Command &%SAF$ The printer will report to the host that sent this command every time an audit job successfully prints.
Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 40 All rights reserved &&??&% &%STFP ASSWORD$ &%SMCP0001$ &%SAR$ &%STP10001$ &%STP20000$ &.
Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 41 All rights reserved Figure 8.2 Audit T rail Check Sample The datastream in Figure 7.1 will print the following check (assuming the check macro and signature are loaded as flash resources).
Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 42 All rights reserved The commands in Figure 8.1 in order of appearance. (Audit Report fields shown in bold) &&??&% Hex transfer enable. &%STFPASSWORD$ Password command.
Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 43 All rights reserved &%1B(3@ PCL command to return to the default font. &%1B$&f0S PCL command to push (store) the current cursor position. &%1B$*p296x3184Y PCL command to move the cursor to 296X, 3184Y.
Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 44 All rights reserved This Audit Report is just one example of a report format. Any of the seven fields can be manipulated to show any information the user feels is appropriate.
Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 45 All rights reserved 9 Error Messages Your Secure MICR Printer has a set of front panel error messages unique to MICR applications. These messages appear if there is a MICR related problem.
Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 46 All rights reserved Error Message on Display Printed Message Description Action Can’t Purge Pswd not enabled Can’t Sort.
Secure MICR Printer User’s Guide © Source T echnologies July 2003 A1 All rights reserved Appendix A: E13B MICR Font Mapping Command &%SMDddd..ddd$ MICR Font Description Alpha/Numeric Hex V alue.
Secure MICR Printer User’s Guide © Source T echnologies July 2003 A2 All rights reserved Description Alpha/Numeric Hex V alues CMC7 Font Characters V alues 1 Zero 0 30 One 1 3 1 Tw o 2 3 2 Three 3 .
Secure MICR Printer User’s Guide © Source T echnologies July 2003 A3 All rights reserved Appendix C: Secure Numeric Font Mapping Command &%SMFddd...dd~ Description Alpha/Numeric Hex V alue Secure Font Character Character Dollar Sign $ 2 3 Left Bracket ( 2 8 Right Bracket ) 2 9 Asterisk * 2 A Comma , 2 C Dash - 2 D Period .
Secure MICR Printer User’s Guide © Source T echnologies July 2003 A4 All rights reserved Appendix C continued: Secure Numeric Font Mapping Description Alpha/Numeric Hex V alue Secure Font Character Character Three 3 33 Four 4 3 4 Five 5 35 Six 6 3 6 Seven 7 3 7 Eight 8 3 8 Nine 9 3 9 Arrow > 3 E Example: &%SMF($>>>1,123.
Secure MICR Printer User’s Guide © Source T echnologies July 2003 A5 All rights reserved Appendix D: ICR Secure Numeric Font Mapping Command &%SMIxxxxxx~ Description Alpha/Numeric Hex V alue Ch.
Secure MICR Printer User’s Guide © Source T echnologies July 2003 A6 All rights reserved Appendix E: MICR Mode Command Summary Description Command Structure Function Password &%STFP ASSWORD$ Mu.
Secure MICR Printer User’s Guide © Source T echnologies July 2003 A7 All rights reserved Appendix F: Audit Report Command Summary Description Command Structure Function Start Audit Record &%SAR$ Activates Audit Trail and begins PJL job Audit Report Field One &%SQ1.
Secure MICR Printer User’s Guide Source T echnologies July 2003 All rights reserved Appendix G: PJL Based MICR Commands In addition to supporting the T ext Based MICR Command Set described in Sections 6 and 7, this Secure MICR printer also supports the PJL based MICR Commands used on our slower speed models.
Secure MICR Printer User’s Guide Source T echnologies July 2003 All rights reserved PJL Re-Lock Sequence W ith A New Password V alue <ESC>%-12345X@PJL DEFAULT LRESOURCE:”flash:” LRWLOCK=”xxxxxxxx”(0D)(0A) <ESC>%-12345X This command requires the resources to be previously unlocked.
Secure MICR Printer User’s Guide Source T echnologies July 2003 All rights reserved MICR FONT NOTE – The E-13B and CMC7 Fonts are 8 characters per inch.
Secure MICR Printer User’s Guide Source T echnologies July 2003 All rights reserved CARTRIDGE STATUS = UNKNOWN = OK = LOW = EMPTY CARTRIDGE SERIAL# = XXXXXXXX TONER LEVEL = 0-9 = UNKNOWN CARTRID.
Secure MICR Printer User’s Guide Source T echnologies July 2003 All rights reserved PJL MICR Command Example Figure 8.1, is an illustration of an Accounts Payable check and remitt ance information. The page used a PCL MACRO for the static data and background design.
Secure MICR Printer User’s Guide Source T echnologies July 2003 All rights reserved PCL Font Calls, Positioning Commands and V ariable Print Dat a The next eleven lines of data in the example call printer resident fonts, position the cursor , and print the variable information.
Secure MICR Printer User’s Guide Source T echnologies July 2003 All rights reserved FIGURE 8.1 SAMPLE ACCOUNTS PA Y ABLE CHECK.
Secure MICR Printer User’s Guide Source T echnologies July 2003 All rights reserved PJL and PCL commands used to print the sample check: <ESC>%-12345X@PJL LDECLARE LRESOURCE:"flash:&q.
Ein wichtiger Punkt beim Kauf des Geräts Source Technologies 1352 MICR 40 (oder sogar vor seinem Kauf) ist das durchlesen seiner Bedienungsanleitung. Dies sollten wir wegen ein paar einfacher Gründe machen:
Wenn Sie Source Technologies 1352 MICR 40 noch nicht gekauft haben, ist jetzt ein guter Moment, um sich mit den grundliegenden Daten des Produkts bekannt zu machen. Schauen Sie zuerst die ersten Seiten der Anleitung durch, die Sie oben finden. Dort finden Sie die wichtigsten technischen Daten für Source Technologies 1352 MICR 40 - auf diese Weise prüfen Sie, ob das Gerät Ihren Wünschen entspricht. Wenn Sie tiefer in die Benutzeranleitung von Source Technologies 1352 MICR 40 reinschauen, lernen Sie alle zugänglichen Produktfunktionen kennen, sowie erhalten Informationen über die Nutzung. Die Informationen, die Sie über Source Technologies 1352 MICR 40 erhalten, werden Ihnen bestimmt bei der Kaufentscheidung helfen.
Wenn Sie aber schon Source Technologies 1352 MICR 40 besitzen, und noch keine Gelegenheit dazu hatten, die Bedienungsanleitung zu lesen, sollten Sie es aufgrund der oben beschriebenen Gründe machen. Sie erfahren dann, ob Sie die zugänglichen Funktionen richtig genutzt haben, aber auch, ob Sie keine Fehler begangen haben, die den Nutzungszeitraum von Source Technologies 1352 MICR 40 verkürzen könnten.
Jedoch ist die eine der wichtigsten Rollen, die eine Bedienungsanleitung für den Nutzer spielt, die Hilfe bei der Lösung von Problemen mit Source Technologies 1352 MICR 40. Sie finden dort fast immer Troubleshooting, also die am häufigsten auftauchenden Störungen und Mängel bei Source Technologies 1352 MICR 40 gemeinsam mit Hinweisen bezüglich der Arten ihrer Lösung. Sogar wenn es Ihnen nicht gelingen sollte das Problem alleine zu bewältigen, die Anleitung zeigt Ihnen die weitere Vorgehensweise – den Kontakt zur Kundenberatung oder dem naheliegenden Service.