Gasboy 1000 Series Technical Reference Manual User Manual
Page 105
FleetKey Systems
03/07/03
4-13
Personal Identification Number (PIN)
Description
For optimum security, keys can be encoded to require the entry of a PIN number.
The system operator loads a 4-digit working key for encrypting and decrypting
PINs. The system uses an encryption process with this 4-digit working key and
the PIN you specify. The PIN number for each key is selected at the time of
encoding and can be assigned or user-selected. Encryption of PINs assures that
an unauthorized person cannot determine a key’s PIN even if he can obtain
access to the actual data on the key.
Auto Lockout
During the fueling process, the user can proceed with the transaction only if the
number entered matches the PIN calculated by the system. The system can be
set up to automatically lock out the key after three consecutive PIN entry errors.
Display
You can have the system calculate and display the PIN on the LCD display using
diagnostic test 0 and inserting the key for which the PIN is to be calculated.
Lockout
Description
The system operator can control access to the system by validating/invalidating
keys by number. Key numbers can be validated/invalidated individually, in strings
of up to twenty assorted key numbers, or by ranges of consecutive key numbers.
A key could also become invalid when a user tries to enter a PIN number
unsuccessfully three consecutive times. A standard FleetKey system is
configured to handle validation for 10,000 5-digit key numbers ranging from
00001 to 09999. Additional consecutive blocks of 10,000 numbers can be
requested at order time. Remember, additional lockouts decrease the number of
transactions that can be stored in the system.
Manual Entry
Field
In addition to lockout by key number, the Manual Keypad Entry option also allows
lockout on a manual entry field. This option must be specified at the time of order
and manual entry field length is limited to four digits.
Lockout Options
Validating a user’s key allows that user to access the system; invalidating a key
locks out that user from the system. The process by which you control access to
your system is called lockout. The file in which valid and invalid keys are stored is
called the lockout file. There are two types of lockout files: a negative key file,
where you validate all keys and invalidate individual keys, or a positive key file,
where you invalidate all keys and validate individual key numbers.
Product Authorization
Description
The product authorization feature controls access to fuel type(s). Using the LF
command, the system operator can load up to nine authorization codes (1-9) with
up to nine fuel types per code. The user is permitted to access only the fuel
type(s) loaded into the system for the authorization code encoded on his key.
The authorization code 0 permits access to all fuels. Figure 4-6 shows a product
authorization code table initiated by the PF command.