Instruction/ maintenance manual of the product ST9530 Source Technologies
Go to page of 70
Secure MICR Printer User’s Guide i © Source Technologies September 2005 All Rights Reserved ST9530 Secure MICR Printer User’s Guide Source Technologies 2910 Whitehall Park Drive Charlotte, NC 28273 www.
Secure MICR Printer User’s Guide ii © Source Technologies September 2005 All Rights Reserved This manual serves as a reference for Source Technologies Secure MICR Printers. The user manual that ships with your printer contains details on printer setup and operations and should b e read first.
Secure MICR Printer User’s Guide iii © Source Technologies September 2005 All Rights Reserved Table of Contents 1 Printer Inst allation ........................................................... 1 2 MICR Over view .................................
Secure MICR Printer User’s Guide iv © Source Technologies September 2005 All Rights Reserved 8 Audit Trai l Repor t ............................................................ 36 Report De tails ....................................................
Secure MICR Printer User’s Guide © Source Technologies September 2005 1 All Rights Reserved 1. Printer Installation For complete information on how to unpack and setup your printer, see your printer’s user’s guide. Please read the following if you are goi ng to install the printer driver shipped with your printer.
Secure MICR Printer User’s Guide © Source Technologies September 2005 2 All Rights Reserved 2. MICR Overview MICR stands for Magnetic Ink Character Re cognition. All MICR documents have a MICR line with numbers and symbols pr inted in a MICR font with m agnetically chargeable toner.
Secure MICR Printer User’s Guide © Source Technologies September 2005 3 All Rights Reserved The key standards that address c heck documents are as follows: ANSI X9.7 Specifications for Bank C heck Background and Conv enience Amount Field ANSI X9.13 Specifications for Pl acement and Location of MICR Printing ANSI X9.
Secure MICR Printer User’s Guide © Source Technologies September 2005 4 All Rights Reserved 3. MICR Check Design General Features of Check Design To be a legal and negotiable document, the nec essary elements required on a check are the date, amount, payee, drawee inst itution, and payer’s signature.
Secure MICR Printer User’s Guide © Source Technologies September 2005 5 All Rights Reserved Duplexing Use caution if printing on both sides of t he paper (duplexing) when printing checks. MICR toner on the back of a check can caus e read failures in the MICR Line.
Secure MICR Printer User’s Guide © Source Technologies September 2005 6 All Rights Reserved courier font, or if available OCR-B, are also acceptable fonts to print the convenience amount. Note: The Source Technologies’ Secure Nu meric Font (see Appendix C) should not be used in the convenience amount since it is not a machine readable font.
Secure MICR Printer User’s Guide © Source Technologies September 2005 7 All Rights Reserved so that if the MICR data account number is destroyed, the draw ee institution can refer to the account title in or der to trace the account number. Memo Line This line is located in the lower left quadrant of the check, and is not required.
Secure MICR Printer User’s Guide © Source Technologies September 2005 8 All Rights Reserved On-Us Field Positions 32 to 14 The On-us field contains the makers’ a ccount number. The structure and content of this field is left to the drawee bank. On personal checks this field also contains the check serial numbers.
Secure MICR Printer User’s Guide © Source Technologies September 2005 9 All Rights Reserved Figure 3.1: Sample Check A. Serial Number: Must be in the upper right corner and match the serial number in the MICR line (see D for further explanation). B.
Secure MICR Printer User’s Guide © Source Technologies September 2005 10 All Rights Reserved 4. Quality Issues A high quality MICR document can be read by bank reader/sorter equipment many times with no readability issues and does not result in damage to bank equipment.
Secure MICR Printer User’s Guide © Source Technologies September 2005 11 All Rights Reserved MICR Check Stock Check stock has a large impact on the resu lting quality and security of your MICR document. Here are a few features that sh ould be considered when selecting a check stock.
Secure MICR Printer User’s Guide © Source Technologies September 2005 12 All Rights Reserved 5. Security Issues Printing negotiable do cuments from blank paper on desktop MICR laser printers makes security a top priority for any company em barking on a desktop che ck printing project.
Secure MICR Printer User’s Guide © Source Technologies September 2005 13 All Rights Reserved Security Note Check fraud in the United States is a conti nuing problem. We have attempted to identify security features that can be incorporated in to the base check stock.
Secure MICR Printer User’s Guide © Source Technologies September 2005 14 All Rights Reserved 7. Use “Positive Pay” check services from your financial institution that match check number and dollar amounts to known information. Financial institutions should encourage full participation of corporate clients.
Secure MICR Printer User’s Guide © Source Technologies September 2005 15 All Rights Reserved 6. MICR Features Source Technologies’ Secure MICR Printers are designed to allow both general office document printing and secure MICR document printing.
Secure MICR Printer User’s Guide © Source Technologies September 2005 16 All Rights Reserved MicroPrint Your Secure MICR Printer also contains the Mi croPrint font. MicroP rint is text less than .010” tall. It can easily be r ead with a magnifying glass but appears to be a solid line to an unaided eye.
Secure MICR Printer User’s Guide © Source Technologies September 2005 17 All Rights Reserved Resource Storage Check-related resources, such as form over lays and signatures, are st ored in your printer with unique identification numbers. ID numbers must be less t han 32767.
Secure MICR Printer User’s Guide © Source Technologies September 2005 18 All Rights Reserved The Security Lock option allows the user to activate and set a front panel combination for additional security. This feature prevents any one from printing checks without the proper 8- digit combination.
Secure MICR Printer User’s Guide © Source Technologies September 2005 19 All Rights Reserved NOTE: The &%STF command must be entered at the beginning of the print job before any other prin t data is received.
Secure MICR Printer User’s Guide © Source Technologies September 2005 20 All Rights Reserved Example: &%SMCP0010$ Prints 16 (Hex 10) MICR lines before disab ling MICR mode. This command defines how many MICR lines may print in the current job. When the count decrements to zero, MICR mode is terminated.
Secure MICR Printer User’s Guide © Source Technologies September 2005 21 All Rights Reserved Print MICR CMC7 Font &%SM7ddd...ddd$ &%SM7 Lead in sequence ddd...ddd Data to be printed in CMC7 font $ Command terminator Prints the specified data in the CMC7 MI CR font which is used in Europe and South America.
Secure MICR Printer User’s Guide © Source Technologies September 2005 22 All Rights Reserved Load Flash Resource &%STLxxxxxyyyyyyzdd....dd &%STL Lead in sequence xxxxx Resource number in de.
Secure MICR Printer User’s Guide © Source Technologies September 2005 23 All Rights Reserved Tray Unlock Command &%STTU#$ &%STTU# Unlocks tray # The tray to be unlocked (c hoose from 1, 2 o.
Secure MICR Printer User’s Guide © Source Technologies September 2005 24 All Rights Reserved DES and AES Decryption Data Encryption Standard (DES) and the Ad vanced Encryption Standard (AES) are both supported in the Source Technologies Secure MICR Printers.
Secure MICR Printer User’s Guide © Source Technologies September 2005 25 All Rights Reserved bytes are 0 through 9, A through F. Alpha key characters can be upper or lower case.
Secure MICR Printer User’s Guide © Source Technologies September 2005 26 All Rights Reserved Both commands require the MICR Password Command. The ON command blocks the copy function with MICR toner. The OFF co mmand allows the copy function with MICR toner.
Secure MICR Printer User’s Guide © Source Technologies September 2005 27 All Rights Reserved &%STC1E$ replace 1E with nothing - simply removes all 1E characters from the data &%STC00$ turn .
Secure MICR Printer User’s Guide © Source Technologies September 2005 28 All Rights Reserved MICRpoint Feature Fine positioning of the MICR Line characters is accomplished us ing the MICRpoint feature. The feature only works with the SMD & SM7 MICR Print Co mmands using the printer’s resident MICR fonts.
Secure MICR Printer User’s Guide © Source Technologies September 2005 29 All Rights Reserved then use the RIGHT key to enter a value. In th is instructional case it’s 36.
Secure MICR Printer User’s Guide © Source Technologies September 2005 30 All Rights Reserved 7. IBM Host Programming Features and Examples Hex Transfer The Hex Transfer feature allows the user to send PCL escape sequence printer commands to the printer with simple text strings.
Secure MICR Printer User’s Guide © Source Technologies September 2005 31 All Rights Reserved Hex Transfer Examples &&??&% This command enable s Hex Transfer On &%1B 26 6C 34 48 $ Se.
Secure MICR Printer User’s Guide © Source Technologies September 2005 32 All Rights Reserved Figure 7.1 MICR Mode Command Example The following example shows the MICR Mo de commands and Hex Transfer commands in use.
Secure MICR Printer User’s Guide © Source Technologies September 2005 33 All Rights Reserved The commands in Figure 7.1 in order of appearance : &%STFPASSWORD$ Password Command. &%SMCP0001$ MICR Definition Comm and with the count set to one.
Secure MICR Printer User’s Guide © Source Technologies September 2005 34 All Rights Reserved Escape Character Translation In many IBM host environments, the progra mmer cannot send an ESC character (ASCII hex 1B) to the printer from within t he application.
Secure MICR Printer User’s Guide © Source Technologies September 2005 35 All Rights Reserved Figure 7.2: Sample Check.
Secure MICR Printer User’s Guide © Source Technologies September 2005 36 All Rights Reserved 8. Audit Tr ail Reports The Audit Trail Report feature pr ovides a report of the printer’ s MICR printing activity. The printer must have flash memory to utilize this option.
Secure MICR Printer User’s Guide © Source Technologies September 2005 37 All Rights Reserved The values in field four of the Audit Trail Report can be added together with the total provided at the end of the report. This feature is activated through t he MICR menu.
Secure MICR Printer User’s Guide © Source Technologies September 2005 38 All Rights Reserved $ Command terminator Ends the Audit Record and the PJL job (i gnored if there was no Start Audit Record Command). Audit Report Field One &%SQ1d..d$ &%SQ1 Lead in sequence d.
Secure MICR Printer User’s Guide © Source Technologies September 2005 39 All Rights Reserved Audit Report Field Five &%SQ5d..d$ &%SQ5 Lead in sequence d..d Data to be printed $ Command terminator This command identifies the data to be printed in the fifth column of the repo rt.
Secure MICR Printer User’s Guide © Source Technologies September 2005 40 All Rights Reserved For example, the command &%SPURGES$ sorts the records by the MICR line while the command &%SPURGESO$ sorts the records by t he MICR line and prints an overlay with the data.
Secure MICR Printer User’s Guide © Source Technologies September 2005 41 All Rights Reserved 151 ETX (0x03) The printer will continue to repor t until it is powered off and back on. Figure 8.1 Audit Trail Commands Example The following example shows the Audit Trail, MICR Mode and Hex Transfer commands in use.
Secure MICR Printer User’s Guide © Source Technologies September 2005 42 All Rights Reserved Figure 8.2 Audit Trail Check Sample The datastream in Figure 7.1 will print the fo llowing check (assuming the check macro and signature are loaded as flash resources).
Secure MICR Printer User’s Guide © Source Technologies September 2005 43 All Rights Reserved The commands in Figure 8.1 in order of a ppearance. (Audit Repor t fields shown in bold) &&??&% Hex transfer enable. &%STFPASSWORD$ Password command.
Secure MICR Printer User’s Guide © Source Technologies September 2005 44 All Rights Reserved &%1B$(200X! PCL command to print font number 200. In this example font 200 is a signature previously l oaded into flash memory. Here we call it and print it wit h an exclamation point (!).
Secure MICR Printer User’s Guide © Source Technologies September 2005 45 All Rights Reserved Figure 8.3 Audit Trail Report Audit Report page1 Records 1 t hrough 10 of 10 *indicat es check did not print * *indicates gap in ch eck numbers 200 :00001000; :123 456789: 12345 678912345678: Vendor Systems $2,014.
Secure MICR Printer User’s Guide © Source Technologies September 2005 46 All Rights Reserved 9. Error Messages Your Secure MICR Printer has a set of front panel error messages unique to MICR applications. These messages appear if there is a MICR related problem.
Secure MICR Printer User’s Guide © Source Technologies September 2005 47 All Rights Reserved regular toner is present, the printer will stop all printing and display this message. toner is not available, you must power-off your printer and restart the print job at a later time when MICR toner is available.
Secure MICR Printer User’s Guide © Source Technologies September 2005 48 All Rights Reserved characters. software, it must be eight characters long. MICR Password Error Password Match Error Password sent does not match the current stored password. Check the Password Command in your software.
Secure MICR Printer User’s Guide © Source Technologies September 2005 A1 All Rights Reserved Appendix A: E13B MICR Font Mapping Command &%SMDddd.
Secure MICR Printer User’s Guide © Source Technologies September 2005 A2 All Rights Reserved Appendix B: CMC7 MICR Font Mapping Command &%SM7ddd.
Secure MICR Printer User’s Guide © Source Technologies September 2005 A3 All Rights Reserved Less Than < 3C Equal = 3D Greater Than > 3E The CMC7 Font in the example above is magnified for purposes of clarity.
Secure MICR Printer User’s Guide © Source Technologies September 2005 A4 All Rights Reserved Appendix C: Secure Numeric Font Mapping Command &%SMFddd...dd~ Description Alpha/Numeric Hex Value Secure Font Character Character Dollar Sign $ 23 Left Bracket ( 28 Right Bracket ) 29 Asterisk * 2A Comma , 2C Dash - 2D Period .
Secure MICR Printer User’s Guide © Source Technologies September 2005 A5 All Rights Reserved Appendix C continued: S ecure Numeric Font Mapping Description Alpha/Numeric Hex Value Secure Font Chara.
Secure MICR Printer User’s Guide © Source Technologies September 2005 A6 All Rights Reserved Example: &%SMF($>>>15,575.00)~ NOTE: The secure fonts in the example are magnified for purposes of clarity.
Secure MICR Printer User’s Guide © Source Technologies September 2005 A7 All Rights Reserved Appendix D: ICR Secure Numeric Font Mapping Command &%SMIxxxxxx~ Description Alpha/Numeric Hex Value.
Secure MICR Printer User’s Guide © Source Technologies September 2005 A8 All Rights Reserved Appendix E: MICR Mode Command Summary Description Command Structure F unction Password &%STFPASSWO R.
Secure MICR Printer User’s Guide © Source Technologies September 2005 A9 All Rights Reserved Tray Swapping Commands &%STTSON Turns tray swapping ON &%STTSOFF$ Turn s tray swapping OFF Quit .
Secure MICR Printer User’s Guide © Source Technologies September 2005 A10 All Rights Reserved Appendix F: Audit Report Command Summary Description Command Structure Function Start Audit Record &%SAR$ Activate s Audit Trail and begins PJL job Audit Report Field One &%SQ1.
Secure MICR Printer User’s Guide © Source Technologies September 2005 A11 All Rights Reserved Appendix G: PJL Based MICR Commands In addition to supporting the Text Based MICR Command Set described in Sections 6 and 7, this Secure MICR printer also supports the PJL based MICR Commands used on our slower speed models.
Secure MICR Printer User’s Guide © Source Technologies September 2005 A12 All Rights Reserved Sent after PCL, this sequence re-locks t he resources with no change in the password value. The PJL syntax of LDELETEPASSWORD is not the password. The command sequence terminates with the UEL command (Unive rsal Exit Language).
Secure MICR Printer User’s Guide © Source Technologies September 2005 A13 All Rights Reserved MICR FONT NOTE – The E-13B and CMC7 Fonts are 8 c haracters per inch.
Secure MICR Printer User’s Guide © Source Technologies September 2005 A14 All Rights Reserved CARTRIDGE STATUS = UNKNOWN = OK = LOW = EMPTY CARTRIDGE SERIAL# = XXXXXXXX TONER LEVEL = 0-9 = UNKNOWN .
Secure MICR Printer User’s Guide © Source Technologies September 2005 A15 All Rights Reserved PJL Unlock Sequence The first two lines of the variable text ex ample are PJL commands that unlock the MICR font resources and enter PCL language proce ssing.
Secure MICR Printer User’s Guide © Source Technologies September 2005 A16 All Rights Reserved FIGURE 8.1 SAMPLE ACCOUNTS PAYABLE CHECK.
Secure MICR Printer User’s Guide © Source Technologies September 2005 A17 All Rights Reserved PJL and PCL commands used to print the sample check: <ESC>%-12345X@PJL LDECLARE LRESOURC E:".
Secure MICR Printer User’s Guide © Source Technologies September 2005 A18 All Rights Reserved <ESC>%-12345X@PJL LDELETEPASSW ORD LRESOURCE:"flash:" <ESC>%-12345X.
An important point after buying a device Source Technologies ST9530 (or even before the purchase) is to read its user manual. We should do this for several simple reasons:
If you have not bought Source Technologies ST9530 yet, this is a good time to familiarize yourself with the basic data on the product. First of all view first pages of the manual, you can find above. You should find there the most important technical data Source Technologies ST9530 - thus you can check whether the hardware meets your expectations. When delving into next pages of the user manual, Source Technologies ST9530 you will learn all the available features of the product, as well as information on its operation. The information that you get Source Technologies ST9530 will certainly help you make a decision on the purchase.
If you already are a holder of Source Technologies ST9530, but have not read the manual yet, you should do it for the reasons described above. You will learn then if you properly used the available features, and whether you have not made any mistakes, which can shorten the lifetime Source Technologies ST9530.
However, one of the most important roles played by the user manual is to help in solving problems with Source Technologies ST9530. Almost always you will find there Troubleshooting, which are the most frequently occurring failures and malfunctions of the device Source Technologies ST9530 along with tips on how to solve them. Even if you fail to solve the problem, the manual will show you a further procedure – contact to the customer service center or the nearest service center