Technical manual _iWL220/250
ICO_MKP_009_GU_EN_V4
3/60
Copyright © 2010 Ingenico
All rights reserved
Contents
1. Document __________________________________________________ 11
1.1. Document change history______________________________________________ 11
1.2. Document sign off ____________________________________________________ 11
2. Equipment __________________________________________________ 13
2.1. Introduction _________________________________________________________ 13
2.2. General hardware description __________________________________________ 13
2.2.1. Terminal’s description _________________________________________________________ 13
2.2.1.1. Dimensions & weight __________________________________________________________ 13
2.2.1.1.1. With 25 mm paper roll ______________________________________________________ 13
2.2.1.1.2. With 40 mm paper roll _____________________________________________________ 14
2.2.1.2. Functional overview ________________________________________________________ 14
2.2.2. Base description ______________________________________________________________ 16
2.3. Technical hardware characteristics ______________________________________ 16
2.3.1. Processor ____________________________________________________________________ 16
2.3.2. Memory capacity ______________________________________________________________17
2.3.3. Booster ______________________________________________________________________17
2.3.4. Data security __________________________________________________________________17
2.3.4.1. Hardware design ____________________________________________________________17
2.3.4.2. Software design ___________________________________________________________ 18
2.3.4.3. Product activation _________________________________________________________ 18
2.3.5. The isolation mechanism by electronic locking system _______________________________ 18
2.3.5.1. Isolation __________________________________________________________________ 18
2.3.5.2. MMU features _____________________________________________________________ 19
2.3.5.3. Inviolable memory protection ________________________________________________ 19
2.3.5.4. OS is inviolable and protected ________________________________________________ 19
2.3.5.5. The OS ensures the inter-violability of software application ________________________ 19
2.3.6. Card readers _________________________________________________________________ 19
2.3.6.1. Main smart card reader _____________________________________________________ 19
2.3.6.2. 2
nd
card reader ____________________________________________________________ 20