Source Technologies ST9335 Bedienungsanleitung

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65

Zur Seite of

Richtige Gebrauchsanleitung

Die Vorschriften verpflichten den Verkäufer zur Übertragung der Gebrauchsanleitung Source Technologies ST9335 an den Erwerber, zusammen mit der Ware. Eine fehlende Anleitung oder falsche Informationen, die dem Verbraucher übertragen werden, bilden eine Grundlage für eine Reklamation aufgrund Unstimmigkeit des Geräts mit dem Vertrag. Rechtsmäßig lässt man das Anfügen einer Gebrauchsanleitung in anderer Form als Papierform zu, was letztens sehr oft genutzt wird, indem man eine grafische oder elektronische Anleitung von Source Technologies ST9335, sowie Anleitungsvideos für Nutzer beifügt. Die Bedingung ist, dass ihre Form leserlich und verständlich ist.

Was ist eine Gebrauchsanleitung?

Das Wort kommt vom lateinischen „instructio”, d.h. ordnen. Demnach kann man in der Anleitung Source Technologies ST9335 die Beschreibung der Etappen der Vorgehensweisen finden. Das Ziel der Anleitung ist die Belehrung, Vereinfachung des Starts, der Nutzung des Geräts oder auch der Ausführung bestimmter Tätigkeiten. Die Anleitung ist eine Sammlung von Informationen über ein Gegenstand/eine Dienstleistung, ein Hinweis.

Leider widmen nicht viele Nutzer ihre Zeit der Gebrauchsanleitung Source Technologies ST9335. Eine gute Gebrauchsanleitung erlaubt nicht nur eine Reihe zusätzlicher Funktionen des gekauften Geräts kennenzulernen, sondern hilft dabei viele Fehler zu vermeiden.

Was sollte also eine ideale Gebrauchsanleitung beinhalten?

Die Gebrauchsanleitung Source Technologies ST9335 sollte vor allem folgendes enthalten:
- Informationen über technische Daten des Geräts Source Technologies ST9335
- Den Namen des Produzenten und das Produktionsjahr des Geräts Source Technologies ST9335
- Grundsätze der Bedienung, Regulierung und Wartung des Geräts Source Technologies ST9335
- Sicherheitszeichen und Zertifikate, die die Übereinstimmung mit entsprechenden Normen bestätigen

Warum lesen wir keine Gebrauchsanleitungen?

Der Grund dafür ist die fehlende Zeit und die Sicherheit, was die bestimmten Funktionen der gekauften Geräte angeht. Leider ist das Anschließen und Starten von Source Technologies ST9335 zu wenig. Eine Anleitung beinhaltet eine Reihe von Hinweisen bezüglich bestimmter Funktionen, Sicherheitsgrundsätze, Wartungsarten (sogar das, welche Mittel man benutzen sollte), eventueller Fehler von Source Technologies ST9335 und Lösungsarten für Probleme, die während der Nutzung auftreten könnten. Immerhin kann man in der Gebrauchsanleitung die Kontaktnummer zum Service Source Technologies finden, wenn die vorgeschlagenen Lösungen nicht wirksam sind. Aktuell erfreuen sich Anleitungen in Form von interessanten Animationen oder Videoanleitungen an Popularität, die den Nutzer besser ansprechen als eine Broschüre. Diese Art von Anleitung gibt garantiert, dass der Nutzer sich das ganze Video anschaut, ohne die spezifizierten und komplizierten technischen Beschreibungen von Source Technologies ST9335 zu überspringen, wie es bei der Papierform passiert.

Warum sollte man Gebrauchsanleitungen lesen?

In der Gebrauchsanleitung finden wir vor allem die Antwort über den Bau sowie die Möglichkeiten des Geräts Source Technologies ST9335, über die Nutzung bestimmter Accessoires und eine Reihe von Informationen, die erlauben, jegliche Funktionen und Bequemlichkeiten zu nutzen.

Nach dem gelungenen Kauf des Geräts, sollte man einige Zeit für das Kennenlernen jedes Teils der Anleitung von Source Technologies ST9335 widmen. Aktuell sind sie genau vorbereitet oder übersetzt, damit sie nicht nur verständlich für die Nutzer sind, aber auch ihre grundliegende Hilfs-Informations-Funktion erfüllen.

Inhaltsverzeichnis der Gebrauchsanleitungen

  • Seite 1

    ST9335 Secure MICR Printer User ’ s Guide Source T echnologies 2910 Whitehall Park Drive Charlotte, NC 28273 www .sourcetech.com techsupport@sourcetech.com 800-922-8501[...]

  • Seite 2

    This manual serves as a reference for Source T echnologies Secure MICR Printers. The user manual that ships with your printer contains details on printer setup and operations and should be read first. This manual should be used as a reference for learning more about MICR technology , and developing MICR printing applications. This guide was produce[...]

  • Seite 3

    T able of Contents 1 Printer Installation .......................................................... 1 2 MICR Overview ................................................................ 2 The Check Processing System .................................... 2 MICR Printing Today .................................................... 2 3 MICR Check Design ..[...]

  • Seite 4

    8 Audit T rail Report ............................................................ 34 Report Details ............................................................... 34 Audit T rail Menu ............................................................ 3 4 Audit T rail Command Set .............................................. 36 Figure 8.1: Audit T rail[...]

  • Seite 5

    Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 1 All rights reserved 1 Printer Installation For complete information on how to unpack and setup your printer , see your printer ’s user ’s guide. Please read the following if you are going to install the printer driver shipped with your printer . 1. Locate the CD that wa[...]

  • Seite 6

    Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 2 All rights reserved 2 MICR Overview MICR stands for Magnetic Ink Character Recognition. All MICR documents have a MICR line with numbers and symbols printed in a MICR font with magnetically chargeable toner. Each character of the MICR font has a unique waveform when sensed [...]

  • Seite 7

    Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 3 All rights reserved The key standards that address check documents are as follows: ANSI X9.7 Specifications for Bank Check Background and Convenience Amount Field ANSI X9.13 Specifications for Placement and Location of MICR Printing ANSI X9.18 Paper Specifications for Check[...]

  • Seite 8

    Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 4 All rights reserved 3 MICR Check Design General Features of Check Design To be a legal and negotiable document, the necessary elements required on a check are the date, amount, payee, drawee institution, and payer’s signature. Other elements included in a good check desig[...]

  • Seite 9

    Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 5 All rights reserved Duplexing We do not recommend printing on both sides of the paper (duplexing) when printing checks. MICR toner on the back of a check can cause read failures in the MICR Line. Order your check stock with any necessary information preprinted on the back. [...]

  • Seite 10

    Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 6 All rights reserved image capture equipment and is also a fraud deterrent. A fixed pitch courier font, or if available OCR-B, are also acceptable fonts to print the convenience amount. Note: The Source T echnologies’ Secure Numeric Font (see Appendix C) should not be used[...]

  • Seite 11

    Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 7 All rights reserved Account Title The account title is normally printed in the upper left corner of the check. It includes the name of the account holder and other information such as addresses, telephone numbers, and logos. The data in the title should be legible and suffi[...]

  • Seite 12

    Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 8 All rights reserved Routing Field Positions 43 to 33 The routing field is bounded by T ransit Symbols ( : ) in positions 43 and 33. It contains fixed format information about the drawee institution. Consult with your bank for the specific data field to be placed here for ea[...]

  • Seite 13

    Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 9 All rights reserved Figure 3.1: Sample Check A . Serial Number: Must be in the upper right corner and match the serial number in the MICR line (see D for further explanation). B. Fractional Routing T ransit Number: Should be in the upper right corner and must match the rout[...]

  • Seite 14

    Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 10 All rights reserved 4 Quality Issues A high quality MICR document can be read by bank reader/sorter equipment many times with no readability issues and does not result in damage to bank equipment. This quality is the result of a well designed printer, an originally manufac[...]

  • Seite 15

    Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 11 All rights reserved MICR Check Stock Check stock has a large impact on the resulting quality and security of your MICR document. Here are a few features that should be considered when selecting a check stock. Please see Chapter 4 for more information on check stock securit[...]

  • Seite 16

    Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 12 All rights reserved Moisture The paper moisture content should be between 4.7 and 5.5%. S torage conditions have much to do with the final moisture content of most papers. S tore your check stock in a cool, dry , environmentally stable and secure area. Protective wrappings[...]

  • Seite 17

    Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 13 All rights reserved 5 Security Issues Printing negotiable documents from blank paper on desktop MICR laser printers makes security a top priority for any company embarking on a desktop check printing project. Good security programs integrate hardware, software, your employ[...]

  • Seite 18

    Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 14 All rights reserved Security Note Check fraud in the United States is a continuing problem. We have attempted to identify security features that can be incorporated into the base check stock. However, these may not prove 100% fraud preventative. Over time, technology will [...]

  • Seite 19

    Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 15 All rights reserved 8. Move methods of fraud detection to the item’s point of entry into the clearing system. For example, low cost readers can detect low magnetic strength in the MICR line which is a good indication of attempts to copy an original. 9. Always verify the [...]

  • Seite 20

    Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 16 All rights reserved 6 MICR Features Source Technologies’ Secure MICR Printers are designed to allow both general office document printing and secure MICR document printing. You may print a variety of conventional jobs with regular Lexmark toner using all of the printer f[...]

  • Seite 21

    Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 17 All rights reserved eye. This font provides protection against reproduction by most scanners and copiers because they cannot successfully print the tiny letters. Most check printers use this font in the signature area of their preprinted checks. We recommend using this fon[...]

  • Seite 22

    Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 18 All rights reserved Flash Memory is an optional feature. It is user managed and resources can be designated as “secure” or “unsecure.” Secure resources are loaded to flash with the STL command and have ID numbers greater than or equal to 10000. They can only be acc[...]

  • Seite 23

    Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 19 All rights reserved The Audit Menu deals with the optional Audit T rail Report settings. See chapter 7 for more information. Entering MICR Mode T o print MICR documents, your Secure MICR Printer uses special alphanumeric text commands called MICR Mode commands. There are t[...]

  • Seite 24

    Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 20 All rights reserved When entering MICR mode with the &%STH command, the printer will: • Check to see if the proper Front Panel Combination has been entered (when enabled). • Allow access to secure check printing resources such as MICR fonts and secure fonts which a[...]

  • Seite 25

    Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 21 All rights reserved In order to set a new password the current password must first be sent. Caution: Errors made in sending the new password command could lead to setting it to an unknown value. If the Password is unknown the printer must be returned to Source T echnologie[...]

  • Seite 26

    Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 22 All rights reserved Print Secure Numeric Font & %SMFddd..ddd~ &%SMF Lead in sequence ddd...ddd Data to be printed in this font ~ Command terminator The dollar sign ($) is not a command terminator for this command. For both security fonts the tilde ~ (hex 7E) is the[...]

  • Seite 27

    Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 23 All rights reserved Resource number 5001 is reserved for the Audit T rail overlay , see chapter 7. Format Flash Memory &%SFF$ &%SFF Lead in sequence $ Command terminator This command formats flash memory . A valid password command must precede this command. Caution[...]

  • Seite 28

    Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 24 All rights reserved DES and AES Decr yption Data Encryption Standard (DES) and the recently approved Advanced Encryption Standard (AES) are both supported in the Source T echnologies Secure MICR Printers. The minimum Code Level support for AES is 8.5j. Levels 8.5i. and low[...]

  • Seite 29

    Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 25 All rights reserved Section 6: MICR Features Set AES Decryption Key Command &% STSET AESKEY <32 Hex Characters> $ The command also requires a MICR Password Command be sent prior to the Key Command. The key data is similar to DES, but is twice in length with 32 He[...]

  • Seite 30

    Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 26 All rights reserved Customer Character Conversation Command The Custom Character Conversion Command can be used to resolve some problems in printer data streams. An example might be to remove a special command character in an existing data stream that was used by your prev[...]

  • Seite 31

    Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 27 All rights reserved Special Alert and Custom Beep Command Using the Beep Command, the printer data stream can alert printer operators that important pages are currently being printed. The STBEEP1 command sounds its special beeps but does not stop the printer . STBEEP2 stop[...]

  • Seite 32

    Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 28 All rights reserved 7 IBM Host Programming Features and Examples Hex T ransfer The Hex T ransfer feature allows the user to send PCL escape sequence printer commands to the printer with simple text strings. Y ou may send any valid command or string of commands with no limi[...]

  • Seite 33

    Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 29 All rights reserved Hex T ransfer Examples &&??&% This command enables Hex T ransfer On &%1B 26 6C 34 48 $ or &% 1B $& l 4H Sends the PCL Esc sequence: <Esc>&l4H which is a paper source command identifying what tray the paper will be pulle[...]

  • Seite 34

    Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 30 All rights reserved Figure 7.1 MICR Mode Command Example The following example shows the MICR Mode commands and Hex Transfer commands in use. This datastream would print the check on the following page (assuming the check macro and the signature are loaded as flash resourc[...]

  • Seite 35

    Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 31 All rights reserved Figure 7.2: Sample Check Section 7: IBM Host Programming Features and Examples VOID CHECK NO : 1000 2910 Whitehall Park Drive Charlotte, NC 28273 (704) 969-7500 First National Bank of Any State Any City , NC 27514 CHECK No . 1000 66-156 531 DA TE Octobe[...]

  • Seite 36

    Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 32 All rights reserved The commands in Figure 7.1 in order of appearance : &%STFPASSWORD$ Password Command. &%SMCP0001$ MICR Definition Command with the count set to one. &%STP10001$ Unlock Flash Resource number 10001. &%STP20000$ Unlock Flash Resource number [...]

  • Seite 37

    Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 33 All rights reserved Escape Character T ranslation In many IBM host environments, the programmer cannot send an ESC character (ASCII hex 1B) to the printer from within the application. Your Secure MICR Printer allows you to define the ESC character as a printable character [...]

  • Seite 38

    Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 34 All rights reserved 8 Audit T rail Reports The Audit T rail Report feature provides a report of the printer ’s MICR printing activity . The printer must have flash memory to utilize this option. Details of each flagged check record sent to the printer are provided since [...]

  • Seite 39

    Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 35 All rights reserved point, and no alpha characters. For example: Valid Formats Invalid Formats “$1,234,567.89” “$1,23,” “4321234.56” “432.123” “5,321” “34 test” “$.89” “12$123” If the value in field 4 is in an invalid format, that line will [...]

  • Seite 40

    Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 36 All rights reserved Audit T rail Report Command Set &%SAR$ Start Audit Record &%SAR Lead in sequence $ Command terminator Marks the start of an audit record and begins a PJL job.. This command must be inserted in the datastream after MICR Mode is entered and before[...]

  • Seite 41

    Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 37 All rights reserved Audit Report Field Four &%SQ4d..d~ &%SQ4 Lead in sequence d..d Data to be printed ~ Command terminator This command identifies the data to be printed in the fourth column of the report. It is a maximum of 16 characters in length. Since a total o[...]

  • Seite 42

    Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 38 All rights reserved Print and Purge Audit Report &%SPURGExx$ &%SPURGE Lead in string x option(s) $ Command terminator This command prints and purges the Audit Report. All recorded information is deleted. The optional field can be any combination of the following le[...]

  • Seite 43

    Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 39 All rights reserved St art Audit Feedback Command &%SAF$ The printer will report to the host that sent this command every time an audit job successfully prints. Each report will be a 151 byte string: byte 1 STX (0x02) bytes 2-15 field 1 of the audit record (from SQ1) 1[...]

  • Seite 44

    Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 40 All rights reserved &&??&% &%STFP ASSWORD$ &%SMCP0001$ &%SAR$ &%STP10001$ &%STP20000$ &%1B266C3178307331683261363466306F3165316C372E3330431B2661304C 1B28733130481B266B31302E3030481B26663130303031793358$ 1000 &%SQ1 200 $ 200 V endor S[...]

  • Seite 45

    Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 41 All rights reserved Figure 8.2 Audit T rail Check Sample The datastream in Figure 7.1 will print the following check (assuming the check macro and signature are loaded as flash resources). Section 8: Audit Trail Reports VOID VOID CHECK NO : 1000 2910 Whitehall Park Drive C[...]

  • Seite 46

    Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 42 All rights reserved The commands in Figure 8.1 in order of appearance. (Audit Report fields shown in bold) &&??&% Hex transfer enable. &%STFPASSWORD$ Password command. &%SMCP0001$ MICR definition command with the count set to one. &%SAR$ Activates A[...]

  • Seite 47

    Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 43 All rights reserved &%1B(3@ PCL command to return to the default font. &%1B$&f0S PCL command to push (store) the current cursor position. &%1B$*p296x3184Y PCL command to move the cursor to 296X, 3184Y. At 300 dpi, this is .97 inches across and 10.61 inches [...]

  • Seite 48

    Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 44 All rights reserved This Audit Report is just one example of a report format. Any of the seven fields can be manipulated to show any information the user feels is appropriate. For example, the check amount could be in field 3 rather than field 4; or field 5 could contain i[...]

  • Seite 49

    Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 45 All rights reserved 9 Error Messages Your Secure MICR Printer has a set of front panel error messages unique to MICR applications. These messages appear if there is a MICR related problem. The printer may also print an error message on the page near where the error occurre[...]

  • Seite 50

    Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 46 All rights reserved Error Message on Display Printed Message Description Action Can’t Purge Pswd not enabled Can’t Sort Insufficient Memory Command Decode Error Convert to Esc Error Flash Full Purge and Format Load MICR T oner Macro Definition Error Macro Definition Er[...]

  • Seite 51

    Secure MICR Printer User’s Guide © Source T echnologies July 2003 A1 All rights reserved Appendix A: E13B MICR Font Mapping Command &%SMDddd..ddd$ MICR Font Description Alpha/Numeric Hex V alues Character V alues 1 / / / / / Amount Symbol A a / 41 61 2F : : : : : Transit Symbol T t B b : 54 74 42 62 3A ; ; ; ; ; On-Us Symbol O o C c ; 4 F 6F[...]

  • Seite 52

    Secure MICR Printer User’s Guide © Source T echnologies July 2003 A2 All rights reserved Description Alpha/Numeric Hex V alues CMC7 Font Characters V alues 1 Zero 0 30 One 1 3 1 Tw o 2 3 2 Three 3 33 Four 4 3 4 Five 5 35 Six 6 3 6 Seven 7 3 7 Eight 8 3 8 Nine 9 3 9 Colon : 3A Semi-Colon ; 3B Less Than < 3 C Equal = 3 D Greater Than > 3E 1 [...]

  • Seite 53

    Secure MICR Printer User’s Guide © Source T echnologies July 2003 A3 All rights reserved Appendix C: Secure Numeric Font Mapping Command &%SMFddd...dd~ Description Alpha/Numeric Hex V alue Secure Font Character Character Dollar Sign $ 2 3 Left Bracket ( 2 8 Right Bracket ) 2 9 Asterisk * 2 A Comma , 2 C Dash - 2 D Period . 2E Slash / 2 F Zer[...]

  • Seite 54

    Secure MICR Printer User’s Guide © Source T echnologies July 2003 A4 All rights reserved Appendix C continued: Secure Numeric Font Mapping Description Alpha/Numeric Hex V alue Secure Font Character Character Three 3 33 Four 4 3 4 Five 5 35 Six 6 3 6 Seven 7 3 7 Eight 8 3 8 Nine 9 3 9 Arrow > 3 E Example: &%SMF($>>>1,123.00)~ will[...]

  • Seite 55

    Secure MICR Printer User’s Guide © Source T echnologies July 2003 A5 All rights reserved Appendix D: ICR Secure Numeric Font Mapping Command &%SMIxxxxxx~ Description Alpha/Numeric Hex V alue Character Character Zero 0 30 One 1 31 Tw o 2 3 2 Three 3 33 Four 4 3 4 Five 5 3 5 Six 6 3 6 Seven 7 37 Eight 8 3 8 Nine 9 3 9 Asterisk * 2 A Comma , 2 [...]

  • Seite 56

    Secure MICR Printer User’s Guide © Source T echnologies July 2003 A6 All rights reserved Appendix E: MICR Mode Command Summary Description Command Structure Function Password &%STFP ASSWORD$ Must be sent to enable &%STHP ASSWORD$ MICR Mode MICR Definition &%SMCPxxxx$ MICR Line Count command Set New Passwor d &%STExxxxxxxx$ Sets n[...]

  • Seite 57

    Secure MICR Printer User’s Guide © Source T echnologies July 2003 A7 All rights reserved Appendix F: Audit Report Command Summary Description Command Structure Function Start Audit Record &%SAR$ Activates Audit Trail and begins PJL job Audit Report Field One &%SQ1.d$ Records first field on the Audit Report - does not print Print MICR E13[...]

  • Seite 58

    Secure MICR Printer User’s Guide  Source T echnologies July 2003 All rights reserved Appendix G: PJL Based MICR Commands In addition to supporting the T ext Based MICR Command Set described in Sections 6 and 7, this Secure MICR printer also supports the PJL based MICR Commands used on our slower speed models. The MICR code functions emulate th[...]

  • Seite 59

    Secure MICR Printer User’s Guide  Source T echnologies July 2003 All rights reserved PJL Re-Lock Sequence W ith A New Password V alue <ESC>%-12345X@PJL DEFAULT LRESOURCE:”flash:” LRWLOCK=”xxxxxxxx”(0D)(0A) <ESC>%-12345X This command requires the resources to be previously unlocked. The new password is represented by the val[...]

  • Seite 60

    Secure MICR Printer User’s Guide  Source T echnologies July 2003 All rights reserved MICR FONT NOTE – The E-13B and CMC7 Fonts are 8 characters per inch. T o position correctly at an exact 8 characters per inch, the printer must be set to an internal Unit of Mea- sure of 600 DPI or greater or must have a horizontal motion index command at 8 [...]

  • Seite 61

    Secure MICR Printer User’s Guide  Source T echnologies July 2003 All rights reserved CARTRIDGE STATUS = UNKNOWN = OK = LOW = EMPTY CARTRIDGE SERIAL# = XXXXXXXX TONER LEVEL = 0-9 = UNKNOWN CARTRIDGE COUNT = XXXX LOW THRESHOLD = XXXX EMPTY THRESHOLD = XXXX • Printer S tate “Ready” is the expected return • Serial Number = Printer Serial N[...]

  • Seite 62

    Secure MICR Printer User’s Guide  Source T echnologies July 2003 All rights reserved PJL MICR Command Example Figure 8.1, is an illustration of an Accounts Payable check and remitt ance information. The page used a PCL MACRO for the static data and background design. This manual does not address MACRO design and programming, but the variable t[...]

  • Seite 63

    Secure MICR Printer User’s Guide  Source T echnologies July 2003 All rights reserved PCL Font Calls, Positioning Commands and V ariable Print Dat a The next eleven lines of data in the example call printer resident fonts, position the cursor , and print the variable information. We are again using the minimal data required, particularly the fo[...]

  • Seite 64

    Secure MICR Printer User’s Guide  Source T echnologies July 2003 All rights reserved FIGURE 8.1 SAMPLE ACCOUNTS PA Y ABLE CHECK[...]

  • Seite 65

    Secure MICR Printer User’s Guide  Source T echnologies July 2003 All rights reserved PJL and PCL commands used to print the sample check: <ESC>%-12345X@PJL LDECLARE LRESOURCE:"flash:" LRWLOCK="P ASSWORD" @PJL ENTER LANGUAGE = PCL <ESC>&l2a1h6d1e64F <ESC>&u600D <ESC>&f100y3X <ESC>(s4[...]