0 - Table of Contents
eDynamo| Secure Card Reader Authenticator | Programmer’s Manual (COMMANDS)
Page 8 of 245 (D998200115-17)
Table of Contents
LIMITED WARRANTY......................................................................................................................................... 6
FCC WARNING STATEMENT ............................................................................................................................. 7
FCC COMPLIANCE STATEMENT ....................................................................................................................... 7
CANADIAN DOC STATEMENT ........................................................................................................................... 7
CE STANDARDS ................................................................................................................................................. 7
UL/CSA ............................................................................................................................................................... 7
RoHS STATEMENT ............................................................................................................................................. 7
Table of Contents .............................................................................................................................................. 8
1 Introduction ............................................................................................................................................. 14
1.1 About This Document .................................................................................................................... 14
1.2 About SDKs ..................................................................................................................................... 14
1.3 About Terminology ......................................................................................................................... 15
1.4 About Connections and Data Formats ........................................................................................ 16
1.5 About Device Features .................................................................................................................. 18
2 Connection Types .................................................................................................................................... 21
2.1 How to Use USB Connections (USB Only) ................................................................................... 21
2.1.1 About USB Reports, Usages, Usage Pages, and Usage IDs ............................................. 22
2.1.2 How to Send Commands On the USB Connection ............................................................ 23
2.1.3 How to Receive Data On the USB Connection (HID Only) ................................................ 25
2.2 How to Use Bluetooth LE Connections (Bluetooth LE Only) ..................................................... 26
2.2.1 About GATT Characteristics .................................................................................................. 26
2.2.2 How to Connect to a Device Using Bluetooth LE ............................................................... 28
2.2.3 How to Send Commands On the Bluetooth LE Connection............................................. 28
2.2.4 How to Receive Data On the Bluetooth LE Connection.................................................... 29
3 Data Formats .......................................................................................................................................... 29
3.1 How to Use HID Format (HID Only) .............................................................................................. 29
3.2 How to Use GATT Format (GATT Only) ......................................................................................... 31
4 Security Levels ........................................................................................................................................ 33
4.1 About Message Authentication Codes (MAC) ............................................................................ 33
4.2 Security Level 2 .............................................................................................................................. 33
4.3 Security Level 3 .............................................................................................................................. 33
4.4 Security Level 4 (MSR Only) .......................................................................................................... 33
4.5 Command Behaviors By Security Level ...................................................................................... 34
5 Encryption, Decryption, and Key Management .................................................................................. 36
5.1 Determining Key ............................................................................................................................. 36
5.2 Decrypting Data .............................................................................................................................. 37
6 Magnetic Stripe Card Data Sent from Device to Host (MSR Only | Keypad Entry Only) ............. 38