VeriFone Vx 685 User guide

Category
POS terminals
Type
User guide

This manual is also suitable for

Verifone Part Number DOC260-004-EN-E, Revision E
VX 685/VX 690
Reference Guide
All rights reserved. No part of the contents of this document may be reproduced or transmitted in any form without the written
permission of Verifone, Inc.
The information contained in this document is subject to change without notice. Although Verifone has attempted to ensure the
accuracy of the contents of this document, this document may include errors or omissions. The examples and sample programs are
for illustration only and may not be suited for your purpose. You should verify the applicability of any example or sample program
before placing the software into productive use. This document, including without limitation the examples and software programs, is
supplied “As-Is.”
Verifone, Inc.
1-800-Verifone
www.verifone.com
Verifone Part Number DOC260-004-EN-E, Revision E
VX 685/VX 690 Reference Guide
© 2017 Verifone, Inc.
Verifone, the Verifone logo, VeriCentre, Verix V, Verix eVo, VeriShield, VeriFind, VeriSign, and VeriFont are registered trademarks of
Verifone. Other brand names or trademarks associated with Verifone’s products and services are trademarks of Verifone, Inc.
Product Warranty
For product warranty information, go to: www.verifone.com/terms.
Comments? Please e-mail all comments on this document to your local Verifone Support Team.
Acknowledgments
RealView is a registered trademark of ARM Ltd. For information and ARM documentation, visit: www.arm.com
VISA is a registered trademark of VISA USA, Inc.
All other brand names and trademarks appearing in this manual are the property of their respective holders.
VX 685/VX 690 Reference Guide 3
CONTENTS
PREFACE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
Audience. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
Organization. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
Related Documentation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
Conventions and Acronyms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
Conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
Acronym Definitions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
CHAPTER 1
Terminal Overview Features and Benefits . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
Exceptional Ease of Use. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
Performance and Durability . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
Security. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
Contactless Capability . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
Communication Technology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
Differences Between VX 685 and VX 690 Terminals. . . . . . . . . . . . . . . . . . . . . 13
CHAPTER 2
Using the Terminal
Keys
Data Entry Modes. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
The Keypad . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
Function Key Descriptions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
CHAPTER 3
Verix Terminal
Manager
When to Use Verix Terminal Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
Local and Remote Operations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
Verifying Terminal Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
Entering Verix Terminal Manager. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
File Groups. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
Passwords . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
System Password. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
File Group Passwords. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
Verix Terminal Manager Menus . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
Verix Terminal Manager Procedures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
Enter and Exit Verix Terminal Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
Menu 1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
Menu 2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
CHAPTER 4
File Authentication
Introduction to File Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55
The Verifone Certificate Authority. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55
Special Files Used in the File Authentication Process . . . . . . . . . . . . . . . . . 56
How File Authentication Works. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
Planning for File Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62
Digital Certificates and the File Authentication Process . . . . . . . . . . . . . . . . 65
File Authentication and the File System. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71
VeriShield File Signing Tool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74
CONTENTS
4 VX 685/VX 690 REFERENCE GUIDE
VeriShield File Signing Tool System Requirements . . . . . . . . . . . . . . . . . . . 74
Operating Modes for the VeriShield File Signing Tool . . . . . . . . . . . . . . . . . 74
Command-Line Entries for the File Signing Tool . . . . . . . . . . . . . . . . . . . . . 76
Graphical Interface Mode for the VeriShield File Signing Tool. . . . . . . . . . . 78
CHAPTER 5
Performing
Downloads
Downloads and Uploads. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79
Download Methods. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79
Download Tools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80
Download Content . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81
Full and Partial Downloads. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82
Support for Multiple Applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84
How the File System Supports Multiple Applications . . . . . . . . . . . . . . . . . . 84
The Main Application is Always Stored in GID1 . . . . . . . . . . . . . . . . . . . . . . 84
Physical and Logical Access to File Groups. . . . . . . . . . . . . . . . . . . . . . . . . 85
Use of I: drive and F: drive . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85
Redirection of Files During Application Downloads . . . . . . . . . . . . . . . . . . . 85
Manually Redirecting Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86
Redirecting Files to Other File Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87
Restrictions on File Redirection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88
Using DDL.EXE to Automatically Redirect Files. . . . . . . . . . . . . . . . . . . . . . 89
File Redirection in Operating System Downloads. . . . . . . . . . . . . . . . . . . . . 89
File Redirection in Back-to-Back Application Downloads . . . . . . . . . . . . . . . 89
File Authentication Requirements. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90
Required Certificates and Signature Files . . . . . . . . . . . . . . . . . . . . . . . . . . 90
The File Authentication Process During an Application Download. . . . . . . . 91
File Group Permissions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94
Download an Operating System Update Provided by Verifone . . . . . . . . . . 94
File Authentication for Back-to-Back Application Downloads . . . . . . . . . . . . 95
Timing Considerations Due to the Authentication Process. . . . . . . . . . . . . . 96
Support for File Compression. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96
Effect of Downloads on Existing Files and Data. . . . . . . . . . . . . . . . . . . . . . . . . 97
Set Up the Download Environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97
Cable Connection for Back-to-Back Application Downloads . . . . . . . . . . . . 98
Direct Application Downloads. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98
Hardware Checklist. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98
Software Checklist . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98
Checklist for Effects on Files and Settings in the Receiving Terminal . . . . . 99
Direct Application Download Procedure . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99
Direct Operating System Downloads . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 106
Hardware Checklist. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 106
Software Checklist . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 106
Checklist for Effects on Files and Settings in the Receiving Terminal . . . . 106
Direct Operating System Download Procedure . . . . . . . . . . . . . . . . . . . . . 107
Download by Telephone. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 112
Hardware Checklist. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 112
Software Checklist . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 112
Telephone Download Procedure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 112
Back-to-Back Application Downloads. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117
Hardware Checklist. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117
Software Checklist . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117
Checklist for Effects on Files and Settings in the Receiving Terminal . . . . 118
CONTENTS
VX 685/VX 690 REFERENCE GUIDE 5
Back-to-Back Application Download Procedure . . . . . . . . . . . . . . . . . . . . . 118
Download from a USB Flash Drive. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 122
Build a Verifone.zip File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123
USB Flash Drive Download Procedure. . . . . . . . . . . . . . . . . . . . . . . . . . . . 126
APPENDIX A
System Messages
Error Messages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 131
Information Messages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 139
APPENDIX B
Port Pinouts Micro-USB Port . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 149
Micro-USB Port (BT Base Power Supply) . . . . . . . . . . . . . . . . . . . . . . . . . . . . 149
Micro-USB Port (BT Base Device). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 149
RS-232 Port (BT Base only). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 150
Ethernet Port (BT Base only) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 150
USB Host Port (BT Base and Charging Base). . . . . . . . . . . . . . . . . . . . . . . . . 150
Telco Port (BT Base only) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 150
APPENDIX C
ASCII Table ASCII Table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 151
GLOSSARY . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 153
INDEX. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 159
CONTENTS
6 VX 685/VX 690 REFERENCE GUIDE
VX 685/VX 690 REFERENCE GUIDE 7
PREFACE
This guide is your primary source of information for setting up and installing the
terminal.
Audience
This guide is useful for anyone installing and configuring a terminal. Basic
descriptions of the terminal features are also provided.
Organization
This guide is organized as follows:
Chapter 1, Terminal Overview. Provides an overview of the terminal.
Chapter 2, Using the Terminal Keys. Explains the operational features of the
terminal and describes how to use the terminal keys to perform all the data entry
or system mode tasks described in this manual.
Chapter 3, Verix Terminal Manager. Describes password-controlled,
Verix Terminal Manager operations, as well as how to use it to perform a variety of
test and configuration procedures.
Chapter 4, File Authentication. Describes the file authentication module of the
VeriShield security architecture and describes how to use the file signing utility,
VeriShield File Signing Tool to generate signature files.
Chapter 5, Performing Downloads. Documents procedures for downloading
applications and files to units.
Appendix A, System Messages. Provides description about error and information
messages, which are grouped into two categories.
Appendix B, Port Pinouts. Provides list of pinouts for the terminal, dongles, and
cable connectors.
Appendix C, ASCII Table. Provides an ASCII table.
Related
Documentation
To learn more about the VX 685/VX 690 terminal, refer to the following set of
documents:
VX 690 Certifications and Regulations Sheet, VPN DOC260-001-EN
VX 690 3G-BT-WiFi Certifications and Regulations Sheet,
VPN DOC260-009-EN
VX 685 Certifications and Regulations Sheet, VPN DOC262-001-EN
VX 690 Quick Installation Guide, VPN DOC260-002-EN
VX 685 Quick Installation Guide, VPN DOC262-002-EN
VX 685/VX 690 Charging Base Quick Installation Guide, VPN
DOC260-007-EN
VX 690 BT Base Quick Installation Guide, VPN DOC260-008-EN
PREFACE
Conventions and Acronyms
8 VX 685/VX 690 REFERENCE GUIDE
VX 690 Charging Base Certifications and Regulations Sheet,
VPN DOC260-005-EN
VX 690 BT Base Certifications and Regulations Sheet,
VPN DOC260-006-EN
VX 685/VX 690 Installation Guide, VPN DOC260-003-EN
Verix eVo Volume I: Operating System Programmers Manual, VPN
DOC00301
Verix eVo Volume II: Operating System and Communications Programmers
Guide, VPN DOC00302
Verix eVo Volume III: Operating System Programming Tools Reference
Manual, VPN DOC00303
VX 690 HW ERS Rev A00, SPC260-007-01-A.
VX 690 Base ERS, SPC260-010-01-A.
VX 690 PRD Rev. A02-2, SPC260-001-01-A.
VX 690 OS ERS Rev 0.04.
VX 685 HW ERS Rev 004, SPC262-001-01-A.
VX 685 OS ERS Rev 0.01.
Conventions and
Acronyms
This section describes conventions and acronyms used in this manual.
Conventions
Various conventions are used to help you quickly identify special formatting. Table
1 describes these conventions and provides examples of their use.
Table 1 Document Conventions
Convention Meaning Example
Blue Text in blue indicates terms that
are cross referenced.
See Conventions and Acronyms.
Italics Italic typeface indicates book
titles or emphasis.
You must install a roll of thermal-
sensitive paper in the printer.
Courier The courier typeface is used
while specifying onscreen text,
such as text that you would enter
at a command prompt, or to
provide an URL.
RetrieveClearCardData
retrieves the previous swipe's
clear track data and places it into
the pstSwipeOut
argument.
PREFACE
Conventions and Acronyms
VX 685/VX 690 R
EFERENCE GUIDE 9
Acronym Definitions
Various acronyms are used in place of the full definition. Table 2 presents
acronyms and their definitions.
The pencil icon is used to
highlight important information.
RS-232-type devices do not work
with the PINpad port.
The caution symbol indicates
possible hardware or software
failure, or loss of data.
The terminal is not waterproof or
dustproof, and is intended for
indoor use only.
The lightning symbol is used as a
warning when bodily injury might
occur.
Due to risk of shock do not use
the terminal near water.
Table 1 Document Conventions
Convention Meaning Example
NOTE
CAUTION
WARNING
Table 2 Acronym Definitions
Acronym Definitions
AC Alternating Current
ADE Account Data Encryption
A-GPS Assisted Global Positioning System
BT Bluetooth
CDMA Code Division Multiple Access
ECR Electronic Cash Registers
EMV Europay MasterCard and VISA
GPRS General Packet Radio Service
GPS Global Positioning System
GSM Global System for Mobile Communication
HSPA High Speed Packet Access
ITP Internal Thermal Printer
MRA Merchandise Return Authorization
MSAM Micromodule-Size Security Access Module
PED PIN Entry Device
PIN Personal Identification Number
QVGA Quarter Video Graphics Array
RJ45 Registered Jack 45
PREFACE
Conventions and Acronyms
10 VX 685/VX 690 REFERENCE GUIDE
RS-232 Recommended Standard 232
R-UIM Removable User Identity Module
SAM Security Access Module
SD Secure Digital
SIM Subscriber Identity Module
TFT Thin Film Transistor
UART Universal Asynchronous Transmitter/Receiver
UMTS Universal Mobile Telecommunications System
USB Universal Serial Bus
VPN Verifone Part Number
Table 2 Acronym Definitions
Acronym Definitions
VX 685/VX 690 REFERENCE GUIDE 11
CHAPTER 1
Terminal Overview
The terminal is a portable, battery-powered device designed to fit comfortably
during handheld consumer-facing applications. It features a vibrantly colored 3.5”
QVGA display, touch screen, and a backlit spill-resistant keypad. It supports a
variety of communications technologies including: GPRS, 3G radio with GPS/A-
GPS, 802.11 a/b/g/n wireless fidelity (Wi-Fi), and Bluetooth wireless technology
(BT). Refer to Table 3 for a detailed list of features available for VX 685 and
VX 690.
Figure 1 VX 685/VX 690 Terminal
Features and
Benefits
The terminal focuses on optimizing cost structure and providing better form factor.
It provides the right combination of features and functions in a sleek, ergonomic
device that fits in the palm of your hand.
Exceptional Ease of
Use
Bold, ergonomic design is sleek, stylish, and lightweight for conveniently
handling the unit to the consumer for PIN entry or other input.
Large 3.5” QVGA display for boundless application possibilities and easy
readability under various lighting conditions.
TERMINAL OVERVIEW
Features and Benefits
12 VX 685/VX 690 REFERENCE GUIDE
Touchscreen for icon-based applications or electronic signature capture
support.
Intuitive telco-style keypad with control keys and interchangeably detects key
presses from tactile keypad and the touchscreen.
40 mm diameter paper roll with a trouble-free, drop-in, “clam shell” loading.
Quiet and fast integrated thermal printer with a rear placement to maximize
the user interface area.
Unidirectional magnetic stripe card reader with an extended blade for optimal
card reading.
Performance and
Durability
Fast transactions due to powerful 400 MHz ARM 11 processor.
High-capacity 3.7 V 2450 mAh Li-ion battery.
Standard base for drop-and-go charging and full feature Bluetooth base for
VX 690 for full back-up connectivity options and support to some peripheral
device.
Terminal and base support peripheral connection via the USB Host and USB
device ports. Bluetooth base also supports peripheral connection via the serial
connection port.
Rounded corners and drop resistant to 3 feet on concrete floor to minimize
breakage.
192 MB of memory (128 MB flash, 64 MB RAM) with optional removable micro
SD flash memory.
Security
Incorporates tamper-detection circuitry to resist unauthorized intrusion and
supports a broad spectrum of software-based security features.
PCI 3.X approved for debit and other PIN-based transactions.
EMV Level 1 Type Approval.
Supports reliable security available including SSL, VeriShield file
authentication, and VeriShield Protect to help prevent fraud and other
intrusions. Latest WPA2 Wi-Fi security and supports VeriShield Protect
encryption implementations.
Contactless
Capability
Advanced contactless architecture that future-proofs investment with a single
contactless interface (SingleCl), SoftSAMs, and side-by-side application
architecture.
On-screen tap zone (CTLS logo) for optimized user experience.
Contactless version accepts EMV and magstripe contactless payments as
well as PIN-based transactions.
TERMINAL OVERVIEW
Differences Between VX 685 and VX 690 Terminals
VX 685/VX 690 R
EFERENCE GUIDE 13
Communication
Technology
3G/GPRS/GPS: Long-range wireless payment for retailers that have no
physical location limitations.
Bluetooth: Simple, plug-and-play installation for locations that need short-
range wireless capability.
Wi-Fi: Ideal for retailers that need multiple wireless devices and have existing
IP infrastructure.
Differences
Between VX 685
and VX 690
Terminals
VX 685 and VX 690 terminals are mostly identical and offer the same general
benefits. It is important to know the differences in their intrinsic features.
Table 3 Features Comparison
Features VX 685 GPRS VX 690 3G-BT VX 690 3G-BT-WiFi
Processor 400 MHz ARM 11 400 MHz ARM 11 400 MHz ARM 11
OS Verix OS Verix OS Verix OS
Memory 64 MB SDRAM/128 MB Flash 64 MB SDRAM/128 MB Flash 64 MB SDRAM/128 MB Flash
Display 3.5” QVGA 3.5” QVGA 3.5” QVGA
Touchscreen Resistive type Capacitive Type Capacitive Type
Radio GPRS (Gemalto BGS2-W) 3G (Cinterion PHS8-P) 3G (Cinterion PHS8-P)
Bluetooth NA Yes Yes
GPS NA Yes Yes
Wi-Fi NA NA Yes
Magnetic card reader Triple Track, bi-directional Triple track, bi-directional Triple track, bi-directional
Smart card reader ISO 7816, 1.8 V, 3 V, 5 V,
synchronous and
asynchronous cards
ISO 7816, 1.8 V, 3 V, 5 V,
synchronous and
asynchronous cards
ISO 7816, 1.8 V, 3 V, 5 V,
synchronous and
asynchronous cards
SAM slots 2 2 2
SIM Single Dual Dual
Micro SD NA Yes Yes
Audio speaker NA Yes Yes
USB integrated 1 Host/client 1 Host/client 1 Host/client
Security PCI 3.0 PCI 3.0 PCI 3.0
CTLS NXP PN512 C2 NXP PN512 C2 NXP PN512 C2
Printer 30 lps 30 lps 30 lps
Battery 3.7 V DC/2450 mAh 3.7 V DC/2450 mAh 3.7 V DC/2450 mAh
Paper roll 40 mm 40 mm 40 mm
Charger 5 V DC/2.2 A 5 V DC/2.2 A 5 V DC/2.2 A
Dimension (mm) 163 x 78 x 52 163 x 78 x 52 163 x 78 x 52
TERMINAL OVERVIEW
Differences Between VX 685 and VX 690 Terminals
14 VX 685/VX 690 REFERENCE GUIDE
VX 685/VX 690 REFERENCE GUIDE 15
CHAPTER 2
Using the Terminal Keys
Before proceeding to other tasks, familiarize yourself with the operational features
of the terminal keypad to enter data.
This section describes how to use the keypad, which consists of a 15-key
Telephone-style keypad with three control keys on the right side of the keypad.
These keys you can perform all data entry tasks described in this manual.
Figure 2 Front Panel Key Arrangement
&$1&(/.(<
&/($5.(<
(17(5.(<
7(/(3+21(67</(.(<3$'
728&+6&5((1/&'
NOTE
Actual keypad may vary.
USING THE TERMINAL KEYS
Data Entry Modes
16 VX 685/VX 690 REFERENCE GUIDE
Data Entry
Modes
Before you can use the keys on the front panel to enter ASCII characters, the
terminal must be in a mode that accepts keyed data entry. There are two terminal
operating modes, each enabling you to press keys to enter data under specific
circumstances:
Normal mode: This is the terminal operating mode where an application
program is present in mDRAM and currently running.
Verix Terminal Manager (VTM) mode: This is a special, password-controlled
terminal operating mode for performing a variety configuration procedures that
cannot be performed when an application is running.
If you turn on a terminal with an application stored in memory and *GO variable set
to the application name, the application executes and the terminal automatically
enters normal mode. The application then controls how terminal keys process
transactions and when you can use specific keys to type characters or respond to
prompts.
The Keypad
Using the keypad, you can enter up to 50 ASCII characters, including the letters
A–Z, the numerals 0–9, and the following 20 special characters: (*), (,), (‘), (“), (-),
(.), (#), (%), (:), (!), (+), (@), (=), (&), (space), (;), ($), (_), (\), and (/).
Alphabetic characters are entered by pressing its corresponding number in the
keypad multiple times within a given time.
NOTE
If you enter Verix Terminal Manager while a terminal application is running in
normal mode, Verix Terminal Manager preempts the application and takes control
of the display and keyboard. The only way to exit Verix Terminal Manager is to
restart the terminal. For this reason, once you enter the Verix Terminal Manager,
you cannot return to the application in the same session.
NOTE
The VTM functions described in the Verix Terminal Manager section requires you
to enter numbers, letters, or symbols using the keypad.
USING THE TERMINAL KEYS
The Keypad
VX 685/VX 690 R
EFERENCE GUIDE 17
Function Key
Descriptions
The following are the function keys of the terminal’s keypad.
Cancel Key
Pressing the Cancel key in normal mode—when the terminal’s application is
loaded and running. It terminates the current function or operation.
In Verix Terminal Manager, use Cancel to perform a variety of functions. The most
common use of Cancel in Verix Terminal Manager is to exit a Verix Terminal
Manager submenu and return to the main Verix Terminal Manager menu. The
specific effect of pressing the Cancel key depends on the currently active Verix
Terminal Manager menu.
Clear Key
In normal mode, the Clear key is commonly used to delete a number, letter, or
symbol on the terminal’s display screen. Press Clear one time to delete the last
character typed on a line. To delete additional characters, moving from right-to-
left, press Clear once for each character or hold down Clear to delete all
characters in a line.
In Verix Terminal Manager, the specific effect of pressing the Clear key depends
on the currently active Verix Terminal Manager menu.
Enter Key
In normal mode, the Enter key is generally used in the same way as the enter key
on a PC, that is, to end a procedure, confirm a value or entry, answer “Yes” to a
query, or select a displayed option.
In Verix Terminal Manager, press the Enter key to begin a selected procedure,
step forward or backward in a procedure, and confirm data entries. The specific
effect of the Enter key depends on the currently active Verix Terminal Manager
menu.
NOTE
The terminal’s operating mode and context determine the specific action
performed when you press one of the function keys. The following descriptions
are provided solely to acquaint you with some general characteristics of these
function keys before presenting more detailed Verix Terminal Manager procedure
descriptions.
USING THE TERMINAL KEYS
The Keypad
18 VX 685/VX 690 REFERENCE GUIDE
VX 690 REFERENCE GUIDE 19
CHAPTER 3
Verix Terminal Manager
This chapter describes a category of terminal functions called terminal manager
operations.
Press ENTER and 7 keys at the same time and enter the password to open the
Verix Terminal Manager (VTM). See Entering Verix Terminal Manager.
Since files are loaded into specific groups, VTM users can view files, delete
files, and manage configuration variables. See File Groups.
Use the system and file group passwords to secure applications and
information on the terminal. See Passwords.
Use the terminal manager menus and submenus to configure terminals;
download and debug applications; perform diagnostics such changing console
settings, managing keys and view terminal information; and perform routine
tests and terminal maintenance. See Verix Terminal Manager Menus.
Verix Terminal Manager is used exclusively by those responsible for configuring,
deploying, and managing on-site terminal installations.
When to Use
Verix Terminal
Manager
Use the Verix Terminal Manager functions to perform different subsets of related
tasks:
Application programmers configure a development terminal, download
development versions of the application program, then test and debug the
application until it is validated and ready to be downloaded to other terminals.
Deployers of terminals to end-user sites perform the specific tasks required
to deploy a new terminal on-site, including configuring the terminal,
downloading application software, and testing the terminal prior to
deployment.
Terminal administrators or site managers change passwords, perform
routine tests and terminal maintenance, and configure terminals for remote
diagnostics and downloads by telephone.
To perform the subset of tasks that corresponds to a job, select the appropriate
Verix Terminal Manager menu(s) and execute the corresponding procedure(s).
VERIX TERMINAL MANAGER
Local and Remote Operations
20 VX 690 REFERENCE GUIDE
Local and
Remote
Operations
The terminal manager operations available on a terminal can be divided into the
following two categories or types:
Local operations address a stand-alone terminal and do not require
communication or data transfers between the terminal and another terminal or
computer. Perform local Verix Terminal Manager operations to configure, test,
and display information about the terminal.
Remote operations require communication between the terminal and a host
computer (or another terminal) over a telephone line or a cable connection.
Perform remote Verix Terminal Manager operations to download application
software to the terminal, upload software from one terminal to another, or
download over the phone line using a modem dongle from VeriCentre or from
another download host.
This chapter contains descriptions on how to perform local Verix Terminal
Manager operations. For information on performing remote operations, such as
downloads, refer to Performing Downloads for more information.
Verifying
Terminal Status
The terminal you are using may or may not have an application program running
on it. After you have set up the terminal (refer to VX 685/VX 690 Installation
Guide, VPN - DOC260-003-EN-A) and the terminal is turned on, use the following
guidelines to verify terminal status regarding software and current operating
mode:
If no application program is loaded into terminal memory, the message
DOWNLOAD NEEDED appears on the display screen.
If an application program is loaded and *GO is set in the configuration file in
group 1 to the application’s name into terminal memory, an application-specific
prompt appears. The application is running and the terminal is in normal
mode. If all installation steps are complete, the terminal can process
transactions.
Entering Verix
Terminal
Manager
To prevent unauthorized use of the Verix Terminal Manager menus, the terminal
OS requires a system password each time you enter Verix Terminal Manager. To
access the Verix Terminal Manager password entry screen, simultaneously press
the
ENTER and 7 keys.The default, factory-set system password is “166831.” Use
the following key sequence to enter this password:
1 6 6 8 3 1 ENTER
After entering the correct password, the terminal enters the terminal manager and
displays the first terminal manager main menu. You can now cycle through all
Verix Terminal Manager main menus.
NOTE
From this point, press ENTER and 7 key simultaneously to access Verix Terminal
Manager and perform the required download.
  • Page 1 1
  • Page 2 2
  • Page 3 3
  • Page 4 4
  • Page 5 5
  • Page 6 6
  • Page 7 7
  • Page 8 8
  • Page 9 9
  • Page 10 10
  • Page 11 11
  • Page 12 12
  • Page 13 13
  • Page 14 14
  • Page 15 15
  • Page 16 16
  • Page 17 17
  • Page 18 18
  • Page 19 19
  • Page 20 20
  • Page 21 21
  • Page 22 22
  • Page 23 23
  • Page 24 24
  • Page 25 25
  • Page 26 26
  • Page 27 27
  • Page 28 28
  • Page 29 29
  • Page 30 30
  • Page 31 31
  • Page 32 32
  • Page 33 33
  • Page 34 34
  • Page 35 35
  • Page 36 36
  • Page 37 37
  • Page 38 38
  • Page 39 39
  • Page 40 40
  • Page 41 41
  • Page 42 42
  • Page 43 43
  • Page 44 44
  • Page 45 45
  • Page 46 46
  • Page 47 47
  • Page 48 48
  • Page 49 49
  • Page 50 50
  • Page 51 51
  • Page 52 52
  • Page 53 53
  • Page 54 54
  • Page 55 55
  • Page 56 56
  • Page 57 57
  • Page 58 58
  • Page 59 59
  • Page 60 60
  • Page 61 61
  • Page 62 62
  • Page 63 63
  • Page 64 64
  • Page 65 65
  • Page 66 66
  • Page 67 67
  • Page 68 68
  • Page 69 69
  • Page 70 70
  • Page 71 71
  • Page 72 72
  • Page 73 73
  • Page 74 74
  • Page 75 75
  • Page 76 76
  • Page 77 77
  • Page 78 78
  • Page 79 79
  • Page 80 80
  • Page 81 81
  • Page 82 82
  • Page 83 83
  • Page 84 84
  • Page 85 85
  • Page 86 86
  • Page 87 87
  • Page 88 88
  • Page 89 89
  • Page 90 90
  • Page 91 91
  • Page 92 92
  • Page 93 93
  • Page 94 94
  • Page 95 95
  • Page 96 96
  • Page 97 97
  • Page 98 98
  • Page 99 99
  • Page 100 100
  • Page 101 101
  • Page 102 102
  • Page 103 103
  • Page 104 104
  • Page 105 105
  • Page 106 106
  • Page 107 107
  • Page 108 108
  • Page 109 109
  • Page 110 110
  • Page 111 111
  • Page 112 112
  • Page 113 113
  • Page 114 114
  • Page 115 115
  • Page 116 116
  • Page 117 117
  • Page 118 118
  • Page 119 119
  • Page 120 120
  • Page 121 121
  • Page 122 122
  • Page 123 123
  • Page 124 124
  • Page 125 125
  • Page 126 126
  • Page 127 127
  • Page 128 128
  • Page 129 129
  • Page 130 130
  • Page 131 131
  • Page 132 132
  • Page 133 133
  • Page 134 134
  • Page 135 135
  • Page 136 136
  • Page 137 137
  • Page 138 138
  • Page 139 139
  • Page 140 140
  • Page 141 141
  • Page 142 142
  • Page 143 143
  • Page 144 144
  • Page 145 145
  • Page 146 146
  • Page 147 147
  • Page 148 148
  • Page 149 149
  • Page 150 150
  • Page 151 151
  • Page 152 152
  • Page 153 153
  • Page 154 154
  • Page 155 155
  • Page 156 156
  • Page 157 157
  • Page 158 158
  • Page 159 159
  • Page 160 160
  • Page 161 161
  • Page 162 162
  • Page 163 163
  • Page 164 164
  • Page 165 165
  • Page 166 166

VeriFone Vx 685 User guide

Category
POS terminals
Type
User guide
This manual is also suitable for

Ask a question and I''ll find the answer in the document

Finding information in a document is now easier with AI