beautypg.com

Source Technologies ST9530 User Manual

Page 3

background image

Secure MICR Printer User’s Guide

iii

© Source Technologies

September 2005

All Rights Reserved

Table of Contents


1 Printer

Installation ...........................................................1


2 MICR

Overview ................................................................2

The

Check

Processing System.....................................2

MICR

Printing Today.....................................................2


3 MICR

Check

Design.........................................................4

General

Features

of Check Design...............................4

Position and Dimension Gauge ....................................4

Design

Elements in Detail.............................................4

Figure 3.1 Sample Check .............................................9

4 Quality

Issues ..................................................................10

Printer

Features ............................................................10

MICR

Toner ..................................................................10

MICR

Check

Stock........................................................11

5 Security

Issues ................................................................13

Check Stock Security Features.....................................13

Security Note ................................................................14

6 MICR

Features .................................................................16

MICR

Mode...................................................................16

MICR

Fonts...................................................................16

Secure

Fonts ................................................................16

MicroPrint......................................................................16
Bi-Directional Feedback................................................17
Resource

Storage.........................................................17

MICR

Menu...................................................................18

Entering

MICR Mode ....................................................18

MICR

Mode

Commands ...............................................20

DES and AES Decryption .............................................24

MFP Copy Defeat Commands ......................................25

Custom

Character

Conversion Commands ..................26

Special Alert and Custom Beep Command...................27

MICRpoint.....................................................................28

7 IBM Host Programming Features and Examples..........30
Hex

Transfer .................................................................30

Figure 7.1: MICR Mode Command Example ................32

Escape

Character Transition ........................................34

Figure 7.2: Sample Check ............................................35