EasyManua.ls Logo

Ingenico i6780 User Manual

Ingenico i6780
119 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
Page #1 background imageLoading...
Page #1 background image
Ingenico 6780
User’s Guide

Table of Contents

Other manuals for Ingenico i6780

Question and Answer IconNeed help?

Do you have a question about the Ingenico i6780 and is the answer not in the manual?

Ingenico i6780 Specifications

General IconGeneral
BrandIngenico
Modeli6780
CategoryPayment Terminal
LanguageEnglish

Summary

Ingenico 6780 User's Guide

Payment Types

Details supported payment types like Credit, Debit, ATM, and EBT.

System Info Menu

Checking the Security Information

Guides on viewing security options and serial number related to key management.

Supervisor Menu

Supervisor Menu Password

Details the default password and procedure to enter the Supervisor Menu.

Changing the Supervisor Menu Password

Explains how to change the supervisor password, with a caution about forgetting it.

Security

Introduces security functions including key injection and check value.

Setting the Key Injection Port

Configures the communication port (COM1, COM2, Ethernet) for key injection.

Injecting Keys

Details the process of injecting cryptographic keys into the terminal.

Injecting a Serial Number

Procedure for authorized technicians to inject a new terminal's serial number.

System Parameters Menu

Diagnostic Menu

Testing the Magnetic Stripe Reader

Tests the magnetic stripe reader by swiping cards and checking track reads.

Testing the Smart Card Reader

Tests the smart card reader by inserting cards and checking read results.

Testing the SAMs

Tests communication between SAM slots and the SAM micro-controller (SMC).

Key Architecture

Overview

Introduces the terminal's key architecture, including sponsor keys and key types.

Sponsor Key (KTK)

Describes the Sponsor Key (KTK) used for transferring Level 2 keys securely.

Terminal Based Keys

Details keys like PEFMK and CEFMK that are loaded encrypted under KTK for terminal-based authentication.

Application Based Keys

Explains special keys authenticated using application-based options.

Special Keys

Details Secure Text Entry and Clear Text Entry keys used for application-based authentication.

Master Keys

Describes various master keys like MTPK, MMACK, MCK, used for encrypting session keys.

Session Keys

Details working keys (WTPK, WMACK, WCK, Atalla) loaded under master keys for specific operations.

DUKPT Keys

Explains Initial PIN Pad Keys (IPPKs) used for DUKPT engines.

Security Options

Synopsis of security options like Prompts Authentication, Terminal ID, MACing, etc.

Prompts Authentication Key Options

Controls whether authentication keys are terminal or application based for secure data entry.

Change Terminal ID Option

Controls the existence of financial keys when the terminal ID is re-loaded.

Prompt MACing

Controls how data entry form prompts are displayed and authenticated.

Code MACing

Controls how code files are updated and authenticated during download.

Visa PED Mode Option

Controls whether the terminal operates in Visa PED mode for PIN entry security.

Financial Key Option

Controls whether financial keys are application or terminal based, with a caution about data loss.

Secure Certificate

Securing Process

Details the steps for validating application code and data files using a secure certificate.

IBMEFT Download

Prerequisites

Lists requirements for accepting downloaded files and using download utilities.

Download Process

Outlines the steps involved in performing a software download.

Outline

Step-by-step procedure for initiating and monitoring the software download process.

Download Errors

Error Opening Port

Lists causes and solutions for errors related to opening communication ports.

Communications port that IBMEFTDL is using is already being used by another application

Solution for port conflict errors where another application uses the required port.

Communications port is not working

Troubleshooting steps for issues with non-functional communication ports.

Hardware settings in i6780 have been changed

Verifies and resets hardware communication port settings if they have been altered.

Received 3 NAKs or Timeout in sendVISAPacket()

Addresses errors related to connection timeouts or failed packet transmissions.

Communications port settings and EFT/NCR protocol setting in i6780 may be wrong

Procedure to compare and correct terminal port settings with download utility parameters.

CRC Error

Signifies a compromised Security Module, requiring RMA for recovery.

IBMEFT Troubleshooting

Card Read Error

Troubleshooting steps for errors when reading cards via the Magnetic Stripe Reader (MSR).

EFT Device Not Available

Guides on resolving the "EFT Device Not Available" message on the register.

EFT Device Not Available – During Check Authorization

Specific steps to resolve "EFT Device Not Available" during check authorization.

Related product manuals