EPP wire drawing waterproof metal encryption keyboard for ATM and
kioskProduct name:Metal encryption keyboardProduct model:GZ-B009026GProduct specification:100*91.5mm1 OverviewThis product is a metal password keyboard with 4 PSAM card
functions. With DES and 3DES functions,Support PSAM card complying with ISO7816, t = 0 and T = 1 protocol2 performance index2.1 communication parametersStandard RS232 serial communication interface. 1 start bit, 1 stop
bit.Optional communication rate: 9600 bps.Optional data format: n, 8, 12.2 specification and operation speedIn line with the specifications of the people's Bank of China.Encryption and decryption speed < 1 second.2.3 electrical performancePower supply: DC + 5V DC power supply.Power consumption: below 1W in working state and below 200MW in non
working state.Power failure key keeping: when the power supply is cut off
instantaneously and for a long time, the memory data will not be
lost.2.4 mechanical propertiesKey life: over 200000 times.Key pressure: 3N (n).Key stroke: 0.45mm.Key material: stainless steel.Panel material: stainless steel.Key surface characters: laser lettering and strong paint.2.5 environmental adaptabilityWorking temperature: - 10 ℃ ~ + 40 ℃ relative humidity: 40-90%
(under normal conditions).Storage temperature: - 30 ℃ ~ + 55 ℃ relative humidity: 20-95% (no
condensation).Atmospheric pressure: 60-106 kPa.2.6 reliabilityMTBF >20000h,MTTR<30min.3 keyboard commandsCommand format: 02h + < ln > + < CMD > + < data >
+ < BCC >Return format: 02h + < ln > + < st > + < data > +
< BCC >Ln -- represents the number of bytes of CMD and data or ST and
data.CMD -- command keyword.Data -- data information exchanged.BCC -- byte exclusive or checksum from ln to data.ST - explain as follows:04H - command executed successfully15h - wrong command parameter80h -- timeout errorA4H -- the command can be executed successfully, but the master key
is invalidB5h -- invalid command and master keyE0h -- invalid commandFXH - error in self check:X=0 CPU wrongX=1 SRAM wrongX = 2 keyboard has short circuit errorX = 3 serial level errorX = 4 CPU card errorX = 6 master key failureX = 7 misc. Error3.1 take the product version number and other parameters.Command: 02h + 01h + 30h + < BCC >Return: 02h + < ln > + < st > + < data > + <
BCC >. St may be 04H, 15h, e0h, F0H. F0H indicates that e2rom
chip is not installed.Description: data = ver + Sn + rechang, where VER is the version
number of 16 bytes (ASCII code), the first 4 bytes (BCD) of Sn is
the production serial number, the last 4 bytes are all "00" (if
there is a cryptographic algorithm chip, it is its number), and
rechang is the charging time of 2 bytes (hardware support
required).3.2 program reset self check, key not cleared.Command: 02h + 01h + 31h + < BCC > (02h + 02h + 31h + 38h +
BCC can reinitialize 8 master keys in the keyboard to 38h)Description: after the keyboard self check, if the master key is
valid (16 master keys are verified by BCC), the buzzer will ring
once, and the self check status is in St.Return: 02h + 01h + < st > + < BCC >. St may be 04H,
15h, e0h, FXH.3.3 install the master key (except for Sam card mode).Command: 02h + 0ah + 32H + < m > + < TMK > + < BCC
>Description: the master key number m is 1 byte (00-0fh), and the 16
master keys TMK are 8 / 16 / 16 bytes (corresponding to DES, 3DES
and chip modes respectively). If the master key number m is 1 byte
(41-4fh), it needs to be decrypted and saved with the original
master key of the same number.Return: 02h + 01h + < st > + < BCC >. St may be 04H,
15h, A4H, b5h, C4H, d5h, E0. 04H indicates that the master key has
been loaded.3.4 install the work key (except for Sam card mode).Command: 02h + 0Bh + 33H + < m > + < n > + < WP >
+ < BCC > ciphertext WP is 8 bytesDescription: the working key ciphertext WP is 8 / 16 / 24 bytes
(corresponding to DES, 3DES and chip modes respectively).Return: 02h + 01h + < st > + < BCC >. St may be 04H,
15h, A4H, b5h, C4H, d5h, e0h.Note: the working key No. n (00-03h) is used to encrypt the working
key WP with the master key No. m (DES / 3DES). After the password
keyboard is decrypted, the WP working key area is saved for the
encryption and decryption command of the following keyboard data.3.5 card number or account number installed (for anxix9.8
encryption)Command: 02h + 0dh + 34h + < card-no > + < BCC >Description: card number or account card-no is a 12 byte ASCII
numeric code.Return: 02h + 01h + < st > + < BCC >. St may be 04H,
15h, C4H, d5h, e0h.3.6 start password keyboard encryptionCommand: 02h + 06h + 35h + < pin-l + < disp-md > + <
jm-md > + < ts-md > + < timeout > + < BCC >Description: the following tableVariable | description | optional | PIN-L | The password length pin-l is 1 byte (1-16, 0 means to resend the
last result). Enter the length of the password pin on the keyboard. | 0~0F | DISP-MD | Display mode disp-md is 1 byte (1 = display "*", 2 = display clear
text, not supported). | 01/02 | JM-MD | The encryption mode jm-md is 1 byte (1 = encryption after operation
with card-no, 2 = direct encryption without operation with card-no | 01/02 | TS-MD | The prompt mode ts-md is 1 byte (0 = no prompt, 1 = LCD display
"please input password", and voice prompt "Hello!" Please enter the
password ". 2 = LCD display "input again", and voice prompt "please
input again") | 00/01/02 | TIMEOUT | The timeout time is 1 byte (1-255 seconds). If the timeout time
exceeds this time, there is no key to exit. | 00~FF |
Function: turn on the keyboard automatically, and allow key input
after prompt. When input, it is required to judge the length of
input password compared with pin-l, if it is less than pin-lBut if there is a confirmation key, or the pin-l does not need a
confirmation key, it needs to be supplemented with 00 / FFH to an
integer multiple of 8 bytes in length. According to the encryption
mode, whether the operation of card-no and pin's identity
information is needed (according to ansix9.8 or ISO 9564 or ibm3624
during pin block operation), then the password encryption operation
is carried out, and finally the returned data is saved in the
buffer until the password command is obtained. If you exit after
timeout, there will be no ciphertext in the returned state only.Return: 02h + 01h + < st > + < BCC >. St may be 04H,
15h, A4H, b5h, C4H, d5h, e0h.3.7 data encryption (except for Sam card mode).Command: 02h + 09 + 36h + < string > + < BCC >Description: encrypts the 8-byte plaintext string with the current
working key (DES / 3DES). Perform password encryption and return
ciphertext data.Return: 02h + 09h + < st > + < ciphertext string > +
< BCC > St may be 04H, 15h, A4H, b5h, C4H, d5h, e0h.3.8 data decryption (except for Sam card mode).Command: 02h + 9 + 37h + < ciphertext string > + < BCC
>Description: decrypts the 8-byte ciphertext string with the current
working key (DES / 3DES). Perform password decryption operation and
return clear text data.Return: 02h + 09h + < st > + < plain text string > +
< BCC >. St may be 04H, 15h, A4H, b5h, C4H, d5h, e0h.3.9 take product serial number stringCommand: 02h + 01h + 38h + < BCC >Return: 02h + 09h + < st > + < serial number string > +
< BCC >. St may be 04H, 15h, e0h.Note: the sequence number string is 8 bytes. There is one byte for
year (two bits for BCD code), one byte for month (two bits for BCD
code), and two bytes for production serial number (four bits for
BCD code). The last four bytes are four 00h when there is no cipher
algorithm chip.3.10 display stringCommand: 02h + < ln > + 39H + < string > + < BCC
>.Description: not supported.Return: 02h + 01h + < st > + < BCC >. St may be 04H,
15h, e0h.Note: the Chinese character code is encoded according to the
password keyboard font, and the character number must be displayed
by the password keyboard. If no string part of the table clears the
display.3.11 Data Mac operation (except Sam card mode)Command: 02h + 09h + 41h + < string > + < BCC >Description: use the current MAC working key (DES / 3DES) to
calculate the 8-byte plaintext string. Returns MAC string data.Return: 02h + 09h + st + < MAC string > + < BCC > St
may be 04H, 15h, A4H, b5h, C4H, d5h, e0h.3.12 access the password in the keyboard (except for Sam card mode)Command: 02h + 01h + 42h + < BCC >Description: returns the previously encrypted ciphertext in the
buffer, and turns off the password state to restore the original
state.Return: 02h + 0eh + < st > + < ciphertext > + < CN
> + < Sn > + < BCC >. St may be 04H, 15h, A4H, b5h,
C4H, d5h, e0h.Note: cn is a 1-byte operation sequence number, with one password
added for each operation. SN is the unique serial number of the
4-byte cipher chip. Pin code only allows 0-9 number keys, delete
key and confirm key. Pin code cannot be used for other function
keys, but the original code will be sent out if the keyboard is
opened before startup.3.13 activate the work key (except for Sam card mode).Command: 02h + 03h + 43h + < m > + < n > + < BCC
>Description: activate master key No. m with work key No. n as the
current work key The current working key is specified for all
password operations in the future. If the master key is used as the
current working key, only the M (00-0fh) parameter is needed, which
has nothing to do with n (00-03h). See B.16 command explanation.Return: 02h + 01h + < st > + < BCC >. St may be 04H,
15h, A4H, b5h, C4H, d5h, e0h.3.14 send back characterCommand: 02h + 02h + 44h + < Chr > + < BCC >Description: the password keyboard will immediately return the
received characters.Return: 02h + 02h + < st > + < Chr > + < BCC >.
St may be 04H, 15h, C4H, d5h, E0. Chr represents an ASCII
character.3.15 send switch keyboard and key soundCommand: 02h + 02h + 45h + < CTL > + < BCC >Description: turn on / off password keyboard, turn on / off key
(BZ) sound. When the keyboard is open, once there is a pressure
key, it will actively send out the key value code. If the button
(BZ) sound is also on, it will sound when the button is pressed.
There are also communication parameter settings.Return: 02h + 01h + < st > + < BCC >. St may be 04H,
15h, C4H, d5h, E0.
|