Source Technologies 1352 MICR 40 manuel d'utilisation

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65

Aller à la page of

Un bon manuel d’utilisation

Les règles imposent au revendeur l'obligation de fournir à l'acheteur, avec des marchandises, le manuel d’utilisation Source Technologies 1352 MICR 40. Le manque du manuel d’utilisation ou les informations incorrectes fournies au consommateur sont à la base d'une plainte pour non-conformité du dispositif avec le contrat. Conformément à la loi, l’inclusion du manuel d’utilisation sous une forme autre que le papier est autorisée, ce qui est souvent utilisé récemment, en incluant la forme graphique ou électronique du manuel Source Technologies 1352 MICR 40 ou les vidéos d'instruction pour les utilisateurs. La condition est son caractère lisible et compréhensible.

Qu'est ce que le manuel d’utilisation?

Le mot vient du latin "Instructio", à savoir organiser. Ainsi, le manuel d’utilisation Source Technologies 1352 MICR 40 décrit les étapes de la procédure. Le but du manuel d’utilisation est d’instruire, de faciliter le démarrage, l'utilisation de l'équipement ou l'exécution des actions spécifiques. Le manuel d’utilisation est une collection d'informations sur l'objet/service, une indice.

Malheureusement, peu d'utilisateurs prennent le temps de lire le manuel d’utilisation, et un bon manuel permet non seulement d’apprendre à connaître un certain nombre de fonctionnalités supplémentaires du dispositif acheté, mais aussi éviter la majorité des défaillances.

Donc, ce qui devrait contenir le manuel parfait?

Tout d'abord, le manuel d’utilisation Source Technologies 1352 MICR 40 devrait contenir:
- informations sur les caractéristiques techniques du dispositif Source Technologies 1352 MICR 40
- nom du fabricant et année de fabrication Source Technologies 1352 MICR 40
- instructions d'utilisation, de réglage et d’entretien de l'équipement Source Technologies 1352 MICR 40
- signes de sécurité et attestations confirmant la conformité avec les normes pertinentes

Pourquoi nous ne lisons pas les manuels d’utilisation?

Habituellement, cela est dû au manque de temps et de certitude quant à la fonctionnalité spécifique de l'équipement acheté. Malheureusement, la connexion et le démarrage Source Technologies 1352 MICR 40 ne suffisent pas. Le manuel d’utilisation contient un certain nombre de lignes directrices concernant les fonctionnalités spécifiques, la sécurité, les méthodes d'entretien (même les moyens qui doivent être utilisés), les défauts possibles Source Technologies 1352 MICR 40 et les moyens de résoudre des problèmes communs lors de l'utilisation. Enfin, le manuel contient les coordonnées du service Source Technologies en l'absence de l'efficacité des solutions proposées. Actuellement, les manuels d’utilisation sous la forme d'animations intéressantes et de vidéos pédagogiques qui sont meilleurs que la brochure, sont très populaires. Ce type de manuel permet à l'utilisateur de voir toute la vidéo d'instruction sans sauter les spécifications et les descriptions techniques compliquées Source Technologies 1352 MICR 40, comme c’est le cas pour la version papier.

Pourquoi lire le manuel d’utilisation?

Tout d'abord, il contient la réponse sur la structure, les possibilités du dispositif Source Technologies 1352 MICR 40, l'utilisation de divers accessoires et une gamme d'informations pour profiter pleinement de toutes les fonctionnalités et commodités.

Après un achat réussi de l’équipement/dispositif, prenez un moment pour vous familiariser avec toutes les parties du manuel d'utilisation Source Technologies 1352 MICR 40. À l'heure actuelle, ils sont soigneusement préparés et traduits pour qu'ils soient non seulement compréhensibles pour les utilisateurs, mais pour qu’ils remplissent leur fonction de base de l'information et d’aide.

Table des matières du manuel d’utilisation

  • Page 1

    IBM Infoprint 1352 MICR 40 Secure MICR Printer User ’ s Guide Source T echnologies 2910 Whitehall Park Drive Charlotte, NC 28273 www .sourcetech.com techsupport@sourcetech.com 800-922-8501[...]

  • Page 2

    This manual serves as a reference for Source T echnologies Secure MICR Printers. The user manual that ships with your printer contains details on printer setup and operations and should be read first. This manual should be used as a reference for learning more about MICR technology , and developing MICR printing applications. This guide was produce[...]

  • Page 3

    T able of Contents 1 Printer Installation .......................................................... 1 2 MICR Overview ................................................................ 2 The Check Processing System .................................... 2 MICR Printing Today .................................................... 2 3 MICR Check Design ..[...]

  • Page 4

    8 Audit T rail Report ............................................................ 34 Report Details ............................................................... 34 Audit T rail Menu ............................................................ 3 4 Audit T rail Command Set .............................................. 36 Figure 8.1: Audit T rail[...]

  • Page 5

    Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 1 All rights reserved 1 Printer Installation For complete information on how to unpack and setup your printer , see your printer ’s user ’s guide. Please read the following if you are going to install the printer driver shipped with your printer . 1. Locate the CD that wa[...]

  • Page 6

    Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 2 All rights reserved 2 MICR Overview MICR stands for Magnetic Ink Character Recognition. All MICR documents have a MICR line with numbers and symbols printed in a MICR font with magnetically chargeable toner. Each character of the MICR font has a unique waveform when sensed [...]

  • Page 7

    Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 3 All rights reserved The key standards that address check documents are as follows: ANSI X9.7 Specifications for Bank Check Background and Convenience Amount Field ANSI X9.13 Specifications for Placement and Location of MICR Printing ANSI X9.18 Paper Specifications for Check[...]

  • Page 8

    Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 4 All rights reserved 3 MICR Check Design General Features of Check Design To be a legal and negotiable document, the necessary elements required on a check are the date, amount, payee, drawee institution, and payer’s signature. Other elements included in a good check desig[...]

  • Page 9

    Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 5 All rights reserved Duplexing We do not recommend printing on both sides of the paper (duplexing) when printing checks. MICR toner on the back of a check can cause read failures in the MICR Line. Order your check stock with any necessary information preprinted on the back. [...]

  • Page 10

    Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 6 All rights reserved image capture equipment and is also a fraud deterrent. A fixed pitch courier font, or if available OCR-B, are also acceptable fonts to print the convenience amount. Note: The Source T echnologies’ Secure Numeric Font (see Appendix C) should not be used[...]

  • Page 11

    Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 7 All rights reserved Account Title The account title is normally printed in the upper left corner of the check. It includes the name of the account holder and other information such as addresses, telephone numbers, and logos. The data in the title should be legible and suffi[...]

  • Page 12

    Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 8 All rights reserved Routing Field Positions 43 to 33 The routing field is bounded by T ransit Symbols ( : ) in positions 43 and 33. It contains fixed format information about the drawee institution. Consult with your bank for the specific data field to be placed here for ea[...]

  • Page 13

    Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 9 All rights reserved Figure 3.1: Sample Check A . Serial Number: Must be in the upper right corner and match the serial number in the MICR line (see D for further explanation). B. Fractional Routing T ransit Number: Should be in the upper right corner and must match the rout[...]

  • Page 14

    Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 10 All rights reserved 4 Quality Issues A high quality MICR document can be read by bank reader/sorter equipment many times with no readability issues and does not result in damage to bank equipment. This quality is the result of a well designed printer, an originally manufac[...]

  • Page 15

    Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 11 All rights reserved MICR Check Stock Check stock has a large impact on the resulting quality and security of your MICR document. Here are a few features that should be considered when selecting a check stock. Please see Chapter 4 for more information on check stock securit[...]

  • Page 16

    Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 12 All rights reserved Moisture The paper moisture content should be between 4.7 and 5.5%. S torage conditions have much to do with the final moisture content of most papers. S tore your check stock in a cool, dry , environmentally stable and secure area. Protective wrappings[...]

  • Page 17

    Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 13 All rights reserved 5 Security Issues Printing negotiable documents from blank paper on desktop MICR laser printers makes security a top priority for any company embarking on a desktop check printing project. Good security programs integrate hardware, software, your employ[...]

  • Page 18

    Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 14 All rights reserved Security Note Check fraud in the United States is a continuing problem. We have attempted to identify security features that can be incorporated into the base check stock. However, these may not prove 100% fraud preventative. Over time, technology will [...]

  • Page 19

    Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 15 All rights reserved 8. Move methods of fraud detection to the item’s point of entry into the clearing system. For example, low cost readers can detect low magnetic strength in the MICR line which is a good indication of attempts to copy an original. 9. Always verify the [...]

  • Page 20

    Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 16 All rights reserved 6 MICR Features Source Technologies’ Secure MICR Printers are designed to allow both general office document printing and secure MICR document printing. You may print a variety of conventional jobs with regular Lexmark toner using all of the printer f[...]

  • Page 21

    Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 17 All rights reserved eye. This font provides protection against reproduction by most scanners and copiers because they cannot successfully print the tiny letters. Most check printers use this font in the signature area of their preprinted checks. We recommend using this fon[...]

  • Page 22

    Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 18 All rights reserved Flash Memory is an optional feature. It is user managed and resources can be designated as “secure” or “unsecure.” Secure resources are loaded to flash with the STL command and have ID numbers greater than or equal to 10000. They can only be acc[...]

  • Page 23

    Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 19 All rights reserved The Audit Menu deals with the optional Audit T rail Report settings. See chapter 7 for more information. Entering MICR Mode T o print MICR documents, your Secure MICR Printer uses special alphanumeric text commands called MICR Mode commands. There are t[...]

  • Page 24

    Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 20 All rights reserved When entering MICR mode with the &%STH command, the printer will: • Check to see if the proper Front Panel Combination has been entered (when enabled). • Allow access to secure check printing resources such as MICR fonts and secure fonts which a[...]

  • Page 25

    Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 21 All rights reserved In order to set a new password the current password must first be sent. Caution: Errors made in sending the new password command could lead to setting it to an unknown value. If the Password is unknown the printer must be returned to Source T echnologie[...]

  • Page 26

    Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 22 All rights reserved Print Secure Numeric Font & %SMFddd..ddd~ &%SMF Lead in sequence ddd...ddd Data to be printed in this font ~ Command terminator The dollar sign ($) is not a command terminator for this command. For both security fonts the tilde ~ (hex 7E) is the[...]

  • Page 27

    Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 23 All rights reserved Resource number 5001 is reserved for the Audit T rail overlay , see chapter 7. Format Flash Memory &%SFF$ &%SFF Lead in sequence $ Command terminator This command formats flash memory . A valid password command must precede this command. Caution[...]

  • Page 28

    Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 24 All rights reserved DES and AES Decr yption Data Encryption Standard (DES) and the recently approved Advanced Encryption Standard (AES) are both supported in the Source T echnologies Secure MICR Printers. The minimum Code Level support for AES is 8.5j. Levels 8.5i. and low[...]

  • Page 29

    Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 25 All rights reserved Section 6: MICR Features Set AES Decryption Key Command &% STSET AESKEY <32 Hex Characters> $ The command also requires a MICR Password Command be sent prior to the Key Command. The key data is similar to DES, but is twice in length with 32 He[...]

  • Page 30

    Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 26 All rights reserved Customer Character Conversation Command The Custom Character Conversion Command can be used to resolve some problems in printer data streams. An example might be to remove a special command character in an existing data stream that was used by your prev[...]

  • Page 31

    Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 27 All rights reserved Special Alert and Custom Beep Command Using the Beep Command, the printer data stream can alert printer operators that important pages are currently being printed. The STBEEP1 command sounds its special beeps but does not stop the printer . STBEEP2 stop[...]

  • Page 32

    Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 28 All rights reserved 7 IBM Host Programming Features and Examples Hex T ransfer The Hex T ransfer feature allows the user to send PCL escape sequence printer commands to the printer with simple text strings. Y ou may send any valid command or string of commands with no limi[...]

  • Page 33

    Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 29 All rights reserved Hex T ransfer Examples &&??&% This command enables Hex T ransfer On &%1B 26 6C 34 48 $ or &% 1B $& l 4H Sends the PCL Esc sequence: <Esc>&l4H which is a paper source command identifying what tray the paper will be pulle[...]

  • Page 34

    Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 30 All rights reserved Figure 7.1 MICR Mode Command Example The following example shows the MICR Mode commands and Hex Transfer commands in use. This datastream would print the check on the following page (assuming the check macro and the signature are loaded as flash resourc[...]

  • Page 35

    Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 31 All rights reserved Figure 7.2: Sample Check Section 7: IBM Host Programming Features and Examples VOID CHECK NO : 1000 2910 Whitehall Park Drive Charlotte, NC 28273 (704) 969-7500 First National Bank of Any State Any City , NC 27514 CHECK No . 1000 66-156 531 DA TE Octobe[...]

  • Page 36

    Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 32 All rights reserved The commands in Figure 7.1 in order of appearance : &%STFPASSWORD$ Password Command. &%SMCP0001$ MICR Definition Command with the count set to one. &%STP10001$ Unlock Flash Resource number 10001. &%STP20000$ Unlock Flash Resource number [...]

  • Page 37

    Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 33 All rights reserved Escape Character T ranslation In many IBM host environments, the programmer cannot send an ESC character (ASCII hex 1B) to the printer from within the application. Your Secure MICR Printer allows you to define the ESC character as a printable character [...]

  • Page 38

    Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 34 All rights reserved 8 Audit T rail Reports The Audit T rail Report feature provides a report of the printer ’s MICR printing activity . The printer must have flash memory to utilize this option. Details of each flagged check record sent to the printer are provided since [...]

  • Page 39

    Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 35 All rights reserved point, and no alpha characters. For example: Valid Formats Invalid Formats “$1,234,567.89” “$1,23,” “4321234.56” “432.123” “5,321” “34 test” “$.89” “12$123” If the value in field 4 is in an invalid format, that line will [...]

  • Page 40

    Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 36 All rights reserved Audit T rail Report Command Set &%SAR$ Start Audit Record &%SAR Lead in sequence $ Command terminator Marks the start of an audit record and begins a PJL job.. This command must be inserted in the datastream after MICR Mode is entered and before[...]

  • Page 41

    Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 37 All rights reserved Audit Report Field Four &%SQ4d..d~ &%SQ4 Lead in sequence d..d Data to be printed ~ Command terminator This command identifies the data to be printed in the fourth column of the report. It is a maximum of 16 characters in length. Since a total o[...]

  • Page 42

    Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 38 All rights reserved Print and Purge Audit Report &%SPURGExx$ &%SPURGE Lead in string x option(s) $ Command terminator This command prints and purges the Audit Report. All recorded information is deleted. The optional field can be any combination of the following le[...]

  • Page 43

    Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 39 All rights reserved St art Audit Feedback Command &%SAF$ The printer will report to the host that sent this command every time an audit job successfully prints. Each report will be a 151 byte string: byte 1 STX (0x02) bytes 2-15 field 1 of the audit record (from SQ1) 1[...]

  • Page 44

    Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 40 All rights reserved &&??&% &%STFP ASSWORD$ &%SMCP0001$ &%SAR$ &%STP10001$ &%STP20000$ &%1B266C3178307331683261363466306F3165316C372E3330431B2661304C 1B28733130481B266B31302E3030481B26663130303031793358$ 1000 &%SQ1 200 $ 200 V endor S[...]

  • Page 45

    Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 41 All rights reserved Figure 8.2 Audit T rail Check Sample The datastream in Figure 7.1 will print the following check (assuming the check macro and signature are loaded as flash resources). Section 8: Audit Trail Reports VOID VOID CHECK NO : 1000 2910 Whitehall Park Drive C[...]

  • Page 46

    Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 42 All rights reserved The commands in Figure 8.1 in order of appearance. (Audit Report fields shown in bold) &&??&% Hex transfer enable. &%STFPASSWORD$ Password command. &%SMCP0001$ MICR definition command with the count set to one. &%SAR$ Activates A[...]

  • Page 47

    Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 43 All rights reserved &%1B(3@ PCL command to return to the default font. &%1B$&f0S PCL command to push (store) the current cursor position. &%1B$*p296x3184Y PCL command to move the cursor to 296X, 3184Y. At 300 dpi, this is .97 inches across and 10.61 inches [...]

  • Page 48

    Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 44 All rights reserved This Audit Report is just one example of a report format. Any of the seven fields can be manipulated to show any information the user feels is appropriate. For example, the check amount could be in field 3 rather than field 4; or field 5 could contain i[...]

  • Page 49

    Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 45 All rights reserved 9 Error Messages Your Secure MICR Printer has a set of front panel error messages unique to MICR applications. These messages appear if there is a MICR related problem. The printer may also print an error message on the page near where the error occurre[...]

  • Page 50

    Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 46 All rights reserved Error Message on Display Printed Message Description Action Can’t Purge Pswd not enabled Can’t Sort Insufficient Memory Command Decode Error Convert to Esc Error Flash Full Purge and Format Load MICR T oner Macro Definition Error Macro Definition Er[...]

  • Page 51

    Secure MICR Printer User’s Guide © Source T echnologies July 2003 A1 All rights reserved Appendix A: E13B MICR Font Mapping Command &%SMDddd..ddd$ MICR Font Description Alpha/Numeric Hex V alues Character V alues 1 / / / / / Amount Symbol A a / 41 61 2F : : : : : Transit Symbol T t B b : 54 74 42 62 3A ; ; ; ; ; On-Us Symbol O o C c ; 4 F 6F[...]

  • Page 52

    Secure MICR Printer User’s Guide © Source T echnologies July 2003 A2 All rights reserved Description Alpha/Numeric Hex V alues CMC7 Font Characters V alues 1 Zero 0 30 One 1 3 1 Tw o 2 3 2 Three 3 33 Four 4 3 4 Five 5 35 Six 6 3 6 Seven 7 3 7 Eight 8 3 8 Nine 9 3 9 Colon : 3A Semi-Colon ; 3B Less Than < 3 C Equal = 3 D Greater Than > 3E 1 [...]

  • Page 53

    Secure MICR Printer User’s Guide © Source T echnologies July 2003 A3 All rights reserved Appendix C: Secure Numeric Font Mapping Command &%SMFddd...dd~ Description Alpha/Numeric Hex V alue Secure Font Character Character Dollar Sign $ 2 3 Left Bracket ( 2 8 Right Bracket ) 2 9 Asterisk * 2 A Comma , 2 C Dash - 2 D Period . 2E Slash / 2 F Zer[...]

  • Page 54

    Secure MICR Printer User’s Guide © Source T echnologies July 2003 A4 All rights reserved Appendix C continued: Secure Numeric Font Mapping Description Alpha/Numeric Hex V alue Secure Font Character Character Three 3 33 Four 4 3 4 Five 5 35 Six 6 3 6 Seven 7 3 7 Eight 8 3 8 Nine 9 3 9 Arrow > 3 E Example: &%SMF($>>>1,123.00)~ will[...]

  • Page 55

    Secure MICR Printer User’s Guide © Source T echnologies July 2003 A5 All rights reserved Appendix D: ICR Secure Numeric Font Mapping Command &%SMIxxxxxx~ Description Alpha/Numeric Hex V alue Character Character Zero 0 30 One 1 31 Tw o 2 3 2 Three 3 33 Four 4 3 4 Five 5 3 5 Six 6 3 6 Seven 7 37 Eight 8 3 8 Nine 9 3 9 Asterisk * 2 A Comma , 2 [...]

  • Page 56

    Secure MICR Printer User’s Guide © Source T echnologies July 2003 A6 All rights reserved Appendix E: MICR Mode Command Summary Description Command Structure Function Password &%STFP ASSWORD$ Must be sent to enable &%STHP ASSWORD$ MICR Mode MICR Definition &%SMCPxxxx$ MICR Line Count command Set New Passwor d &%STExxxxxxxx$ Sets n[...]

  • Page 57

    Secure MICR Printer User’s Guide © Source T echnologies July 2003 A7 All rights reserved Appendix F: Audit Report Command Summary Description Command Structure Function Start Audit Record &%SAR$ Activates Audit Trail and begins PJL job Audit Report Field One &%SQ1.d$ Records first field on the Audit Report - does not print Print MICR E13[...]

  • Page 58

    Secure MICR Printer User’s Guide  Source T echnologies July 2003 All rights reserved Appendix G: PJL Based MICR Commands In addition to supporting the T ext Based MICR Command Set described in Sections 6 and 7, this Secure MICR printer also supports the PJL based MICR Commands used on our slower speed models. The MICR code functions emulate th[...]

  • Page 59

    Secure MICR Printer User’s Guide  Source T echnologies July 2003 All rights reserved PJL Re-Lock Sequence W ith A New Password V alue <ESC>%-12345X@PJL DEFAULT LRESOURCE:”flash:” LRWLOCK=”xxxxxxxx”(0D)(0A) <ESC>%-12345X This command requires the resources to be previously unlocked. The new password is represented by the val[...]

  • Page 60

    Secure MICR Printer User’s Guide  Source T echnologies July 2003 All rights reserved MICR FONT NOTE – The E-13B and CMC7 Fonts are 8 characters per inch. T o position correctly at an exact 8 characters per inch, the printer must be set to an internal Unit of Mea- sure of 600 DPI or greater or must have a horizontal motion index command at 8 [...]

  • Page 61

    Secure MICR Printer User’s Guide  Source T echnologies July 2003 All rights reserved CARTRIDGE STATUS = UNKNOWN = OK = LOW = EMPTY CARTRIDGE SERIAL# = XXXXXXXX TONER LEVEL = 0-9 = UNKNOWN CARTRIDGE COUNT = XXXX LOW THRESHOLD = XXXX EMPTY THRESHOLD = XXXX • Printer S tate “Ready” is the expected return • Serial Number = Printer Serial N[...]

  • Page 62

    Secure MICR Printer User’s Guide  Source T echnologies July 2003 All rights reserved PJL MICR Command Example Figure 8.1, is an illustration of an Accounts Payable check and remitt ance information. The page used a PCL MACRO for the static data and background design. This manual does not address MACRO design and programming, but the variable t[...]

  • Page 63

    Secure MICR Printer User’s Guide  Source T echnologies July 2003 All rights reserved PCL Font Calls, Positioning Commands and V ariable Print Dat a The next eleven lines of data in the example call printer resident fonts, position the cursor , and print the variable information. We are again using the minimal data required, particularly the fo[...]

  • Page 64

    Secure MICR Printer User’s Guide  Source T echnologies July 2003 All rights reserved FIGURE 8.1 SAMPLE ACCOUNTS PA Y ABLE CHECK[...]

  • Page 65

    Secure MICR Printer User’s Guide  Source T echnologies July 2003 All rights reserved PJL and PCL commands used to print the sample check: <ESC>%-12345X@PJL LDECLARE LRESOURCE:"flash:" LRWLOCK="P ASSWORD" @PJL ENTER LANGUAGE = PCL <ESC>&l2a1h6d1e64F <ESC>&u600D <ESC>&f100y3X <ESC>(s4[...]