Source Technologies ST9530 manual

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70

Go to page of

A good user manual

The rules should oblige the seller to give the purchaser an operating instrucion of Source Technologies ST9530, along with an item. The lack of an instruction or false information given to customer shall constitute grounds to apply for a complaint because of nonconformity of goods with the contract. In accordance with the law, a customer can receive an instruction in non-paper form; lately graphic and electronic forms of the manuals, as well as instructional videos have been majorly used. A necessary precondition for this is the unmistakable, legible character of an instruction.

What is an instruction?

The term originates from the Latin word „instructio”, which means organizing. Therefore, in an instruction of Source Technologies ST9530 one could find a process description. An instruction's purpose is to teach, to ease the start-up and an item's use or performance of certain activities. An instruction is a compilation of information about an item/a service, it is a clue.

Unfortunately, only a few customers devote their time to read an instruction of Source Technologies ST9530. A good user manual introduces us to a number of additional functionalities of the purchased item, and also helps us to avoid the formation of most of the defects.

What should a perfect user manual contain?

First and foremost, an user manual of Source Technologies ST9530 should contain:
- informations concerning technical data of Source Technologies ST9530
- name of the manufacturer and a year of construction of the Source Technologies ST9530 item
- rules of operation, control and maintenance of the Source Technologies ST9530 item
- safety signs and mark certificates which confirm compatibility with appropriate standards

Why don't we read the manuals?

Usually it results from the lack of time and certainty about functionalities of purchased items. Unfortunately, networking and start-up of Source Technologies ST9530 alone are not enough. An instruction contains a number of clues concerning respective functionalities, safety rules, maintenance methods (what means should be used), eventual defects of Source Technologies ST9530, and methods of problem resolution. Eventually, when one still can't find the answer to his problems, he will be directed to the Source Technologies service. Lately animated manuals and instructional videos are quite popular among customers. These kinds of user manuals are effective; they assure that a customer will familiarize himself with the whole material, and won't skip complicated, technical information of Source Technologies ST9530.

Why one should read the manuals?

It is mostly in the manuals where we will find the details concerning construction and possibility of the Source Technologies ST9530 item, and its use of respective accessory, as well as information concerning all the functions and facilities.

After a successful purchase of an item one should find a moment and get to know with every part of an instruction. Currently the manuals are carefully prearranged and translated, so they could be fully understood by its users. The manuals will serve as an informational aid.

Table of contents for the manual

  • Page 1

    Secure MICR Printer User’s Guide i © Source Technologies September 2005 All Rights Reserved ST9530 Secure MICR Printer User’s Guide Source Technologies 2910 Whitehall Park Drive Charlotte, NC 28273 www.sourcetech.com techsupport@sourcetech.com 800-922-8501[...]

  • Page 2

    Secure MICR Printer User’s Guide ii © Source Technologies September 2005 All Rights Reserved This manual serves as a reference for Source Technologies Secure MICR Printers. The user manual that ships with your printer contains details on printer setup and operations and should b e read first. This manual should be used as a reference for le arni[...]

  • Page 3

    Secure MICR Printer User’s Guide iii © Source Technologies September 2005 All Rights Reserved Table of Contents 1 Printer Inst allation ........................................................... 1 2 MICR Over view ................................................................ 2 The Check Proce ssing S ystem ...................................[...]

  • Page 4

    Secure MICR Printer User’s Guide iv © Source Technologies September 2005 All Rights Reserved 8 Audit Trai l Repor t ............................................................ 36 Report De tails ............................................................... 36 Audit Tra il Menu ............................................................ 36 Au[...]

  • Page 5

    Secure MICR Printer User’s Guide © Source Technologies September 2005 1 All Rights Reserved 1. Printer Installation For complete information on how to unpack and setup your printer, see your printer’s user’s guide. Please read the following if you are goi ng to install the printer driver shipped with your printer. 1. Locate the CD that was s[...]

  • Page 6

    Secure MICR Printer User’s Guide © Source Technologies September 2005 2 All Rights Reserved 2. MICR Overview MICR stands for Magnetic Ink Character Re cognition. All MICR documents have a MICR line with numbers and symbols pr inted in a MICR font with m agnetically chargeable toner. Each character of the MICR font has a unique waveform when sens[...]

  • Page 7

    Secure MICR Printer User’s Guide © Source Technologies September 2005 3 All Rights Reserved The key standards that address c heck documents are as follows: ANSI X9.7 Specifications for Bank C heck Background and Conv enience Amount Field ANSI X9.13 Specifications for Pl acement and Location of MICR Printing ANSI X9.18 Paper Specifications for Ch[...]

  • Page 8

    Secure MICR Printer User’s Guide © Source Technologies September 2005 4 All Rights Reserved 3. MICR Check Design General Features of Check Design To be a legal and negotiable document, the nec essary elements required on a check are the date, amount, payee, drawee inst itution, and payer’s signature. Other elements included in a good check des[...]

  • Page 9

    Secure MICR Printer User’s Guide © Source Technologies September 2005 5 All Rights Reserved Duplexing Use caution if printing on both sides of t he paper (duplexing) when printing checks. MICR toner on the back of a check can caus e read failures in the MICR Line. Order your check stock with any necessary informa tion preprinted on the back. If [...]

  • Page 10

    Secure MICR Printer User’s Guide © Source Technologies September 2005 6 All Rights Reserved courier font, or if available OCR-B, are also acceptable fonts to print the convenience amount. Note: The Source Technologies’ Secure Nu meric Font (see Appendix C) should not be used in the convenience amount since it is not a machine readable font. Am[...]

  • Page 11

    Secure MICR Printer User’s Guide © Source Technologies September 2005 7 All Rights Reserved so that if the MICR data account number is destroyed, the draw ee institution can refer to the account title in or der to trace the account number. Memo Line This line is located in the lower left quadrant of the check, and is not required. Data printed h[...]

  • Page 12

    Secure MICR Printer User’s Guide © Source Technologies September 2005 8 All Rights Reserved On-Us Field Positions 32 to 14 The On-us field contains the makers’ a ccount number. The structure and content of this field is left to the drawee bank. On personal checks this field also contains the check serial numbers. The On-Us fi eld may not consi[...]

  • Page 13

    Secure MICR Printer User’s Guide © Source Technologies September 2005 9 All Rights Reserved Figure 3.1: Sample Check A. Serial Number: Must be in the upper right corner and match the serial number in the MICR line (see D for further explanation). B. Fractional Routing Transit Number: Should be in the upper right corner and must match the routing[...]

  • Page 14

    Secure MICR Printer User’s Guide © Source Technologies September 2005 10 All Rights Reserved 4. Quality Issues A high quality MICR document can be read by bank reader/sorter equipment many times with no readability issues and does not result in damage to bank equipment. This quality is the result of a well designed printer, an orig inally manufa[...]

  • Page 15

    Secure MICR Printer User’s Guide © Source Technologies September 2005 11 All Rights Reserved MICR Check Stock Check stock has a large impact on the resu lting quality and security of your MICR document. Here are a few features that sh ould be considered when selecting a check stock. Please see Chapter 4 for more information on check stock securi[...]

  • Page 16

    Secure MICR Printer User’s Guide © Source Technologies September 2005 12 All Rights Reserved 5. Security Issues Printing negotiable do cuments from blank paper on desktop MICR laser printers makes security a top priority for any company em barking on a desktop che ck printing project. Good security programs integr ate hardware, software, your em[...]

  • Page 17

    Secure MICR Printer User’s Guide © Source Technologies September 2005 13 All Rights Reserved Security Note Check fraud in the United States is a conti nuing problem. We have attempted to identify security features that can be incorporated in to the base check stock. However, these may not prove 100% fraud preventativ e. Over time, technology wil[...]

  • Page 18

    Secure MICR Printer User’s Guide © Source Technologies September 2005 14 All Rights Reserved 7. Use “Positive Pay” check services from your financial institution that match check number and dollar amounts to known information. Financial institutions should encourage full participation of corporate clients. 8. Move methods of fraud det ection[...]

  • Page 19

    Secure MICR Printer User’s Guide © Source Technologies September 2005 15 All Rights Reserved 6. MICR Features Source Technologies’ Secure MICR Printers are designed to allow both general office document printing and secure MICR document printing. You may print a variety of conventional jobs with regular Lexmark toner usi ng all of the printer [...]

  • Page 20

    Secure MICR Printer User’s Guide © Source Technologies September 2005 16 All Rights Reserved MicroPrint Your Secure MICR Printer also contains the Mi croPrint font. MicroP rint is text less than .010” tall. It can easily be r ead with a magnifying glass but appears to be a solid line to an unaided eye. This font provides protection against rep[...]

  • Page 21

    Secure MICR Printer User’s Guide © Source Technologies September 2005 17 All Rights Reserved Resource Storage Check-related resources, such as form over lays and signatures, are st ored in your printer with unique identification numbers. ID numbers must be less t han 32767. Number 5001 is reserved for the Audit Trail overlay. Your Secure MICR Pr[...]

  • Page 22

    Secure MICR Printer User’s Guide © Source Technologies September 2005 18 All Rights Reserved The Security Lock option allows the user to activate and set a front panel combination for additional security. This feature prevents any one from printing checks without the proper 8- digit combination. See the MICR Mode Co mmands section of this chapte[...]

  • Page 23

    Secure MICR Printer User’s Guide © Source Technologies September 2005 19 All Rights Reserved NOTE: The &%STF command must be entered at the beginning of the print job before any other prin t data is received. &%STH Command The &%STH command does not set-up the prin ter for check printing activity as completely as the &%STF comman[...]

  • Page 24

    Secure MICR Printer User’s Guide © Source Technologies September 2005 20 All Rights Reserved Example: &%SMCP0010$ Prints 16 (Hex 10) MICR lines before disab ling MICR mode. This command defines how many MICR lines may print in the current job. When the count decrements to zero, MICR mode is terminated. Set New Password Command &%STExxxxx[...]

  • Page 25

    Secure MICR Printer User’s Guide © Source Technologies September 2005 21 All Rights Reserved Print MICR CMC7 Font &%SM7ddd...ddd$ &%SM7 Lead in sequence ddd...ddd Data to be printed in CMC7 font $ Command terminator Prints the specified data in the CMC7 MI CR font which is used in Europe and South America. The font and its correct spacin[...]

  • Page 26

    Secure MICR Printer User’s Guide © Source Technologies September 2005 22 All Rights Reserved Load Flash Resource &%STLxxxxxyyyyyyzdd....dd &%STL Lead in sequence xxxxx Resource number in decimal, must be 5 digits yyyyyy Byte count of resource file in Hex, must be 6 positions z Format of the resource file S = Single byte binary format D =[...]

  • Page 27

    Secure MICR Printer User’s Guide © Source Technologies September 2005 23 All Rights Reserved Tray Unlock Command &%STTU#$ &%STTU# Unlocks tray # The tray to be unlocked (c hoose from 1, 2 or 3 only) $ Command terminator Tray Swapping Commands &%STTSON$ / &%STTSOFF$ &%STTSON Turns tray swapping on &%STTSOFF Turns tray swap[...]

  • Page 28

    Secure MICR Printer User’s Guide © Source Technologies September 2005 24 All Rights Reserved DES and AES Decryption Data Encryption Standard (DES) and the Ad vanced Encryption Standard (AES) are both supported in the Source Technologies Secure MICR Printers. The minimum Code Level support for AES is 8.5j. Levels 8.5i. and lower only support DES.[...]

  • Page 29

    Secure MICR Printer User’s Guide © Source Technologies September 2005 25 All Rights Reserved bytes are 0 through 9, A through F. Alpha key characters can be upper or lower case. Command characters must be upper case. An example of a valid key command - &%STSETDESKEY5f00FF7E3DA938eb$ The key value remains in the printer until another key comm[...]

  • Page 30

    Secure MICR Printer User’s Guide © Source Technologies September 2005 26 All Rights Reserved Both commands require the MICR Password Command. The ON command blocks the copy function with MICR toner. The OFF co mmand allows the copy function with MICR toner. The factory default is OFF Note – Postscript Language print jobs downl oaded from a hos[...]

  • Page 31

    Secure MICR Printer User’s Guide © Source Technologies September 2005 27 All Rights Reserved &%STC1E$ replace 1E with nothing - simply removes all 1E characters from the data &%STC00$ turn character conversion off Special Alert and Custom Beep Command Using the Beep Command, the prin ter data stream can alert printer operators that impor[...]

  • Page 32

    Secure MICR Printer User’s Guide © Source Technologies September 2005 28 All Rights Reserved MICRpoint Feature Fine positioning of the MICR Line characters is accomplished us ing the MICRpoint feature. The feature only works with the SMD & SM7 MICR Print Co mmands using the printer’s resident MICR fonts. The exact location of the entire MI[...]

  • Page 33

    Secure MICR Printer User’s Guide © Source Technologies September 2005 29 All Rights Reserved then use the RIGHT key to enter a value. In th is instructional case it’s 36. Using the key pad enter 36. Select the center key to save t he value. The values are stored in internal FLASH memory in the printer and will remain the same until changed by [...]

  • Page 34

    Secure MICR Printer User’s Guide © Source Technologies September 2005 30 All Rights Reserved 7. IBM Host Programming Features and Examples Hex Transfer The Hex Transfer feature allows the user to send PCL escape sequence printer commands to the printer with simple text strings. You may send any valid command or string of commands with no limit o[...]

  • Page 35

    Secure MICR Printer User’s Guide © Source Technologies September 2005 31 All Rights Reserved Hex Transfer Examples &&??&% This command enable s Hex Transfer On &%1B 26 6C 34 48 $ Sends the PCL Esc sequence: Or <Esc>&l4H &% 1B $& l 4H which is a paper source command identifying what tray the paper will be pulled [...]

  • Page 36

    Secure MICR Printer User’s Guide © Source Technologies September 2005 32 All Rights Reserved Figure 7.1 MICR Mode Command Example The following example shows the MICR Mo de commands and Hex Transfer commands in use. This datastream would print the c heck on the following page (assuming the check macro and the signature are l oaded as flash resou[...]

  • Page 37

    Secure MICR Printer User’s Guide © Source Technologies September 2005 33 All Rights Reserved The commands in Figure 7.1 in order of appearance : &%STFPASSWORD$ Password Command. &%SMCP0001$ MICR Definition Comm and with the count set to one. &%STP10001$ Unlock Flash Resource number 10001. &%STP20000$ Unlock Flash Resource number [...]

  • Page 38

    Secure MICR Printer User’s Guide © Source Technologies September 2005 34 All Rights Reserved Escape Character Translation In many IBM host environments, the progra mmer cannot send an ESC character (ASCII hex 1B) to the printer from within t he application. Your Secure MI CR Printer allows you to define the ESC character as a printable character[...]

  • Page 39

    Secure MICR Printer User’s Guide © Source Technologies September 2005 35 All Rights Reserved Figure 7.2: Sample Check[...]

  • Page 40

    Secure MICR Printer User’s Guide © Source Technologies September 2005 36 All Rights Reserved 8. Audit Tr ail Reports The Audit Trail Report feature pr ovides a report of the printer’ s MICR printing activity. The printer must have flash memory to utilize this option. Details of each flagged check record sent to the printer are provi ded since [...]

  • Page 41

    Secure MICR Printer User’s Guide © Source Technologies September 2005 37 All Rights Reserved The values in field four of the Audit Trail Report can be added together with the total provided at the end of the report. This feature is activated through t he MICR menu. Select Audit Menu>Sum Field 4. The values in field 4 must follow certain guide[...]

  • Page 42

    Secure MICR Printer User’s Guide © Source Technologies September 2005 38 All Rights Reserved $ Command terminator Ends the Audit Record and the PJL job (i gnored if there was no Start Audit Record Command). Audit Report Field One &%SQ1d..d$ &%SQ1 Lead in sequence d..d Data to be stored $ Command terminator This command identifies the dat[...]

  • Page 43

    Secure MICR Printer User’s Guide © Source Technologies September 2005 39 All Rights Reserved Audit Report Field Five &%SQ5d..d$ &%SQ5 Lead in sequence d..d Data to be printed $ Command terminator This command identifies the data to be printed in the fifth column of the repo rt. This field is a maximum of eight characters. Audit Report Fi[...]

  • Page 44

    Secure MICR Printer User’s Guide © Source Technologies September 2005 40 All Rights Reserved For example, the command &%SPURGES$ sorts the records by the MICR line while the command &%SPURGESO$ sorts the records by t he MICR line and prints an overlay with the data. Options can be forced on with these commands but they cannot be forced o[...]

  • Page 45

    Secure MICR Printer User’s Guide © Source Technologies September 2005 41 All Rights Reserved 151 ETX (0x03) The printer will continue to repor t until it is powered off and back on. Figure 8.1 Audit Trail Commands Example The following example shows the Audit Trail, MICR Mode and Hex Transfer commands in use. &&??&% &%STFPASSWORD[...]

  • Page 46

    Secure MICR Printer User’s Guide © Source Technologies September 2005 42 All Rights Reserved Figure 8.2 Audit Trail Check Sample The datastream in Figure 7.1 will print the fo llowing check (assuming the check macro and signature are loaded as flash resources).[...]

  • Page 47

    Secure MICR Printer User’s Guide © Source Technologies September 2005 43 All Rights Reserved The commands in Figure 8.1 in order of a ppearance. (Audit Repor t fields shown in bold) &&??&% Hex transfer enable. &%STFPASSWORD$ Password command. &%SMCP0001$ MICR definition comm and with the count set to one. &%SAR $ Activate[...]

  • Page 48

    Secure MICR Printer User’s Guide © Source Technologies September 2005 44 All Rights Reserved &%1B$(200X! PCL command to print font number 200. In this example font 200 is a signature previously l oaded into flash memory. Here we call it and print it wit h an exclamation point (!). &%1B(3@ PCL command to return to the default font. &%[...]

  • Page 49

    Secure MICR Printer User’s Guide © Source Technologies September 2005 45 All Rights Reserved Figure 8.3 Audit Trail Report Audit Report page1 Records 1 t hrough 10 of 10 *indicat es check did not print * *indicates gap in ch eck numbers 200 :00001000; :123 456789: 12345 678912345678: Vendor Systems $2,014.44 February 10, 2001 10:33:44 AM 200 :00[...]

  • Page 50

    Secure MICR Printer User’s Guide © Source Technologies September 2005 46 All Rights Reserved 9. Error Messages Your Secure MICR Printer has a set of front panel error messages unique to MICR applications. These messages appear if there is a MICR related problem. The printer may also print an error message on the page near where the error occurre[...]

  • Page 51

    Secure MICR Printer User’s Guide © Source Technologies September 2005 47 All Rights Reserved regular toner is present, the printer will stop all printing and display this message. toner is not available, you must power-off your printer and restart the print job at a later time when MICR toner is available. Macro Definition Error Invalid decode m[...]

  • Page 52

    Secure MICR Printer User’s Guide © Source Technologies September 2005 48 All Rights Reserved characters. software, it must be eight characters long. MICR Password Error Password Match Error Password sent does not match the current stored password. Check the Password Command in your software. Password Not Enabled Error A secure command was sent w[...]

  • Page 53

    Secure MICR Printer User’s Guide © Source Technologies September 2005 A1 All Rights Reserved Appendix A: E13B MICR Font Mapping Command &%SMDddd..ddd$ MICR Font Description Alpha/Numeric Hex Values Character Values 1 / Amount Symbol A a / 41 61 2F : Transit Symbol T t B b : 54 74 42 62 3A ; On-Us Symbol O o C c ; 4F 6F 43 63 3B = Dash Symbol[...]

  • Page 54

    Secure MICR Printer User’s Guide © Source Technologies September 2005 A2 All Rights Reserved Appendix B: CMC7 MICR Font Mapping Command &%SM7ddd..ddd$ Description Alpha/Numeric Hex Values CMC7 Font Characters Values 1 Zero 0 30 One 1 31 Two 2 32 Three 3 33 Four 4 34 Five 5 35 Six 6 36 Seven 7 37 Eight 8 38 Nine 9 39 Colon : 3A Semi-Colon ; 3[...]

  • Page 55

    Secure MICR Printer User’s Guide © Source Technologies September 2005 A3 All Rights Reserved Less Than < 3C Equal = 3D Greater Than > 3E The CMC7 Font in the example above is magnified for purposes of clarity.[...]

  • Page 56

    Secure MICR Printer User’s Guide © Source Technologies September 2005 A4 All Rights Reserved Appendix C: Secure Numeric Font Mapping Command &%SMFddd...dd~ Description Alpha/Numeric Hex Value Secure Font Character Character Dollar Sign $ 23 Left Bracket ( 28 Right Bracket ) 29 Asterisk * 2A Comma , 2C Dash - 2D Period . 2E Slash / 2F Zero 0 [...]

  • Page 57

    Secure MICR Printer User’s Guide © Source Technologies September 2005 A5 All Rights Reserved Appendix C continued: S ecure Numeric Font Mapping Description Alpha/Numeric Hex Value Secure Font Character Character Two 2 32 Three 3 33 Four 4 34 Five 5 35 Six 6 36 Seven 7 37 Eight 8 38 Nine 9 39 Arrow > 3E[...]

  • Page 58

    Secure MICR Printer User’s Guide © Source Technologies September 2005 A6 All Rights Reserved Example: &%SMF($>>>15,575.00)~ NOTE: The secure fonts in the example are magnified for purposes of clarity.[...]

  • Page 59

    Secure MICR Printer User’s Guide © Source Technologies September 2005 A7 All Rights Reserved Appendix D: ICR Secure Numeric Font Mapping Command &%SMIxxxxxx~ Description Alpha/Numeric Hex Value Secure Font Character Character Zero 0 30 One 1 31 Two 2 32 Three 3 33 Four 4 34 Five 5 35 Six 6 36 Seven 7 37 Eight 8 38 Nine 9 39 Asterisk * 2A Com[...]

  • Page 60

    Secure MICR Printer User’s Guide © Source Technologies September 2005 A8 All Rights Reserved Appendix E: MICR Mode Command Summary Description Command Structure F unction Password &%STFPASSWO RD$ Must be sent to enable &%STHPASSWORD$ MICR Mode MICR Definition &%SMCPxxxx $ MICR Line Count command Set New Password &%STExxxxxxxx$ Se[...]

  • Page 61

    Secure MICR Printer User’s Guide © Source Technologies September 2005 A9 All Rights Reserved Tray Swapping Commands &%STTSON Turns tray swapping ON &%STTSOFF$ Turn s tray swapping OFF Quit MICR MODE Command &%STQ$ Terminates MICR Mode[...]

  • Page 62

    Secure MICR Printer User’s Guide © Source Technologies September 2005 A10 All Rights Reserved Appendix F: Audit Report Command Summary Description Command Structure Function Start Audit Record &%SAR$ Activate s Audit Trail and begins PJL job Audit Report Field One &%SQ1.d$ Records firs t field on the Audit Report - does not print Print M[...]

  • Page 63

    Secure MICR Printer User’s Guide © Source Technologies September 2005 A11 All Rights Reserved Appendix G: PJL Based MICR Commands In addition to supporting the Text Based MICR Command Set described in Sections 6 and 7, this Secure MICR printer also supports the PJL based MICR Commands used on our slower speed models. The MI CR code functions emu[...]

  • Page 64

    Secure MICR Printer User’s Guide © Source Technologies September 2005 A12 All Rights Reserved Sent after PCL, this sequence re-locks t he resources with no change in the password value. The PJL syntax of LDELETEPASSWORD is not the password. The command sequence terminates with the UEL command (Unive rsal Exit Language). This is optional but reco[...]

  • Page 65

    Secure MICR Printer User’s Guide © Source Technologies September 2005 A13 All Rights Reserved MICR FONT NOTE – The E-13B and CMC7 Fonts are 8 c haracters per inch. To position correctly at an exact 8 characters per inch, t he printer must be set to an internal Unit of Measure of 600 DPI or greater or must have a horizontal motion index command[...]

  • Page 66

    Secure MICR Printer User’s Guide © Source Technologies September 2005 A14 All Rights Reserved CARTRIDGE STATUS = UNKNOWN = OK = LOW = EMPTY CARTRIDGE SERIAL# = XXXXXXXX TONER LEVEL = 0-9 = UNKNOWN CARTRIDGE COUNT = XXXX LOW THRESHOLD = XXXX EMPTY THRESHOLD = XXXX • Printer State o “Ready” is the expected return • Serial Number = Printer [...]

  • Page 67

    Secure MICR Printer User’s Guide © Source Technologies September 2005 A15 All Rights Reserved PJL Unlock Sequence The first two lines of the variable text ex ample are PJL commands that unlock the MICR font resources and enter PCL language proce ssing. The password used is PASSWORD, the initial ship default. These commands and all following comm[...]

  • Page 68

    Secure MICR Printer User’s Guide © Source Technologies September 2005 A16 All Rights Reserved FIGURE 8.1 SAMPLE ACCOUNTS PAYABLE CHECK[...]

  • Page 69

    Secure MICR Printer User’s Guide © Source Technologies September 2005 A17 All Rights Reserved PJL and PCL commands used to print the sample check: <ESC>%-12345X@PJL LDECLARE LRESOURC E:"flash:" LRWLOCK="PASSWORD" @PJL ENTER LANGUAGE = PCL <ESC>&l2a1h6d1e64F <ESC>&u600D <ESC>&f100y3X <ESC[...]

  • Page 70

    Secure MICR Printer User’s Guide © Source Technologies September 2005 A18 All Rights Reserved <ESC>%-12345X@PJL LDELETEPASSW ORD LRESOURCE:"flash:" <ESC>%-12345X[...]