EasyManua.ls Logo

Magtek eDynamo - Table of Contents

Magtek eDynamo
245 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
0 - Table of Contents
eDynamo| Secure Card Reader Authenticator | Programmer’s Manual (COMMANDS)
Page 8 of 245 (D998200115-17)
Table of Contents
LIMITED WARRANTY......................................................................................................................................... 6
FCC WARNING STATEMENT ............................................................................................................................. 7
FCC COMPLIANCE STATEMENT ....................................................................................................................... 7
CANADIAN DOC STATEMENT ........................................................................................................................... 7
CE STANDARDS ................................................................................................................................................. 7
UL/CSA ............................................................................................................................................................... 7
RoHS STATEMENT ............................................................................................................................................. 7
Table of Contents .............................................................................................................................................. 8
1 Introduction ............................................................................................................................................. 14
1.1 About This Document .................................................................................................................... 14
1.2 About SDKs ..................................................................................................................................... 14
1.3 About Terminology ......................................................................................................................... 15
1.4 About Connections and Data Formats ........................................................................................ 16
1.5 About Device Features .................................................................................................................. 18
2 Connection Types .................................................................................................................................... 21
2.1 How to Use USB Connections (USB Only) ................................................................................... 21
2.1.1 About USB Reports, Usages, Usage Pages, and Usage IDs ............................................. 22
2.1.2 How to Send Commands On the USB Connection ............................................................ 23
2.1.3 How to Receive Data On the USB Connection (HID Only) ................................................ 25
2.2 How to Use Bluetooth LE Connections (Bluetooth LE Only) ..................................................... 26
2.2.1 About GATT Characteristics .................................................................................................. 26
2.2.2 How to Connect to a Device Using Bluetooth LE ............................................................... 28
2.2.3 How to Send Commands On the Bluetooth LE Connection............................................. 28
2.2.4 How to Receive Data On the Bluetooth LE Connection.................................................... 29
3 Data Formats .......................................................................................................................................... 29
3.1 How to Use HID Format (HID Only) .............................................................................................. 29
3.2 How to Use GATT Format (GATT Only) ......................................................................................... 31
4 Security Levels ........................................................................................................................................ 33
4.1 About Message Authentication Codes (MAC) ............................................................................ 33
4.2 Security Level 2 .............................................................................................................................. 33
4.3 Security Level 3 .............................................................................................................................. 33
4.4 Security Level 4 (MSR Only) .......................................................................................................... 33
4.5 Command Behaviors By Security Level ...................................................................................... 34
5 Encryption, Decryption, and Key Management .................................................................................. 36
5.1 Determining Key ............................................................................................................................. 36
5.2 Decrypting Data .............................................................................................................................. 37
6 Magnetic Stripe Card Data Sent from Device to Host (MSR Only | Keypad Entry Only) ............. 38

Table of Contents

Other manuals for Magtek eDynamo

Related product manuals