beautypg.com

Appendix a examples, Appendix a, Examples – MagTek DynaPro Mini Programmer's99875629 User Manual

Page 77: Appendix a - examples

background image

Appendix A - Examples

DynaPro Mini| PIN Encryption Device | Programmer’s Reference (Commands)


Page 77

Appendix A

Examples

A.1 How to Get MSR/PIN Data from the Device for a Bank Simulation

This section provides a byte-for-byte example of transmitting commands using the USB connection and
the Apple 30-pin connection. All data shown in this section is in hexadecimal format. USB connections
require bytes be transmitted in least significant byte (little endian) order; iOS requires bytes be
transmitted in most significant byte (big endian) order, so iOS command strings will appear as the byte-
by-byte reverse of the others.

1) Host sends out Report 0x03 – Request Swipe Card to the device, which expands to the following

bytes:

a) 01: Execute command in Get mode (OS only)

b) 03: Report ID (03=Report 0x03 – Request Swipe Card)

c) 20: Wait time (20=32 seconds)

d) 00: Display message ID (00=swipe card/idle)

e) 01: Beep prompt tone for card swipe (01=one beep)

Sample command data of Report 0x03 – Request Swipe Card

03 20 00 01

USB format of command

01 03 20 00 01

iOS format of command (Note MSB order)

2) Device sends back Report 0x01 – Response ACK to the host, which expands to the following bytes.

If the Report 0x03 – Request Swipe Card command had failed (i.e. ACK status not = 00), the
device would not have returned a device state input report to the host:

a) 01: Report ID (01=Report 0x01 – Response ACK)

b) 00: ACK status of Report 0x03 – Request Swipe Card (00=Command is good)

c) 03: Report ID of the command being ACKed (03=Report 0x03 – Request Swipe Card)

Sample response for Report 0x01 – Response ACK

01 00 03

USB format of command

01 00 03

iOS format of command (Note MSB order)

3) The device prompts the user to swipe his or her card, and sends Report 0x20 – Device State Report

to the host, which expands to the following bytes:

a) 20: Report ID (20=Report 0x20 – Device State Report)

b) 02: Device state (02=Wait for card)

c) 08: Session state (08=Card data available)

d) 40: Device status (40=Not authenticated)

e) 47: Device cert status (PIN CRL, PIN CA cert, Device CA cert & Device cert exist)

f) 07: Hardware status (Keypad calibrated, Mag Head programmed, Tamper sensors active)

Sample Report 0x20 – Device State Report

20 02 08 40 47 07

USB format of command