Verifone P200-P400
Verifone P200-P400
Verifone P200-P400
Reference Guide
Comments? Please e-mail all comments on this document to your local Verifone Support Team.
Verifone, Inc.
1-800-VERIFONE
www.verifone.com
Verifone Part Number DOC435-004-EN-B, Revision B
CONTENTS
PREFACE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
Audience. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
Organization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
Related Documentation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
Conventions and Acronyms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
Conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
Acronym Definitions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
CHAPTER 1
Overview P200 and P400 Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
Power by USB Supply . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
Power by Serial Port of VX 520 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
Features and Benefits . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
Exceptional Ease of Use. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
Performance and Durability . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
Contactless Capability . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
Communication Technology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
Differences Between P200 and P400 PINpad . . . . . . . . . . . . . . . . . . . . . . . . . . 12
CHAPTER 2
Using the PINpad Data Entry Modes. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
Keys The Keypad . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
Function Key Descriptions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
CHAPTER 3
System Mode When to Use System Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
Local and Remote Operations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
Verifying PINpad Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
Entering System Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
Exiting System Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
Passwords . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
System Password . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
Default Password . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
System Mode Menus . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
System Mode Procedures. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
Procedure Description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
Logging in to System Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
Submenus. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
CHAPTER 4
File Authentication Introduction to File Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
The Verifone Certificate Authority . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
Special Files Used in the File Authentication Process . . . . . . . . . . . . . . . . . 36
How File Authentication Works . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
Planning for File Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
P200/P400 REFERENCE GUIDE 3
C ONTENTS
CHAPTER 5
Performing Downloads and Uploads. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
Downloads Download Methods and Procedures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48
Direct downloads . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48
DDL Command Line Syntax . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48
DDL Command Line File. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
DDL Example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
Downloading without an Onboard Application . . . . . . . . . . . . . . . . . . . . . . . 49
Network Download Utility . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
File Signing and Signature Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
APPENDIX A
System Messages Error Messages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
Information Messages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56
APPENDIX B
Port Pinouts Multi I/O Connection Port . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59
Multi I/O Connector Cable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60
RS-232 Port (USB-Serial Dongle) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61
Ethernet Port (USB-Serial Dongle). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61
USB Pinout
(Mini Port on USB-Serial Dongle). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61
DC Input Jack Polarity for
435-044-01-A Cable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61
USB Pinout
(USB-Serial Dongle) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61
APPENDIX C
ASCII Table The ASCII Table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63
G L O S S A R Y . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65
I N D E X . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67
This guide is the primary source of information for setting up and installing the
P200 or P400 PINpad.
Audience This guide is useful for anyone installing and configuring the PINpad.
Related Refer to the following set of documents to learn more about the PINpad:
Documentation • P400 Certifications and Regulations Sheet, VPN DOC435-001-EN
• P400 Quick Installation Guide, VPN DOC435-002-EN
• P400/P400 Plus Installation Guide, VPN DOC435-003-EN
• P200/P400 Mounting Adapter Quick Installation Guide, VPN DOC435-005-EN
• P200 Certifications and Regulations Sheet, VPN DOC430-001-EN
• P200 Quick Installation Guide, VPN DOC430-002-EN
• P200/P200 Plus Installation Guide, VPN DOC430-003-EN
• Engage Low-Profile Privacy Shield Quick Installation Guide,
VPN DOC000-021-EN
Conventions and This section describes conventions and acronyms used in this manual.
Acronyms
Conventions Various conventions are used to help you quickly identify special formatting. Table
1 describes these conventions and provides examples of their use.
Table 1 Document Conventions
Convention Meaning Example
Blue Text in blue indicates terms that See Conventions and Acronyms.
are cross referenced.
Italics Italic typeface indicates book You must install a roll of thermal-
titles or emphasis. sensitive paper in the printer.
Courier The courier typeface is used RetrieveClearCardData
while specifying onscreen text, retrieves the previous swipe's
such as text that you would enter clear track data and places it into
at a command prompt, or to the pstSwipeOut argument.
provide an URL.
The pencil icon is used to RS-232-type devices do not work
NOTE highlight important information. with the PINpad port.
Acronym Definitions Various acronyms are used in place of the full definition. Table 2 presents
acronyms and their definitions.
Table 2 Acronym Definitions
Acronym Definitions
AC Alternating Current
BT Bluetooth
SD Secure Digital
Overview
P400 and P200 are Verifone’s next generation integrated retail PINpad device.
P200 serve the needs of small to medium retailers while P400’s touchscreen
functionality and sophisticated design fits perfectly for high-end retail
establishments.
Although the units are a consumer facing handheld device, it can also be fix
mounted in some integrated retail scenarios. Given this, the product’s design is
equally appealing as a handheld PINpad and robust enough to look and function
appropriate in a fixed mount setting.
P200 and P400 P200 PINpad has a 2.8” QVGA screen display while P400 PINpad features a 3.5”
Features color touchscreen LCD display. P200 Plus and P400 Plus supports 802.11b/g/n
wireless fidelity (Wi-Fi) and Bluetooth (BT) BLE iBeacon profile only. P200 and
P400 are both equipped with fast processor, abundant memory, and has
integrated contactless features. P200 and P400 supports PCI 4.0 security. See
Table 3 for more information.
NOTE
Verifone ships variants of the device for different markets. Your device may have a
different configuration.
Power by USB P400 can be powered with 5 V supply from USB port (5 V at 500 mA) with the
Supply following power-saving conditions controlled by the OS:
• Maximum audio output volume is reduced.
• LCD backlight intensity is reduced to 30% (not suitable for high-glare, outdoor
usage).
• Keypad backlight is disabled.
• Ethernet functionality is unavailable.
• BT and Wi-Fi functions are unavailable.
• The maximum USB cable length supported is 4.1 m (CBL280-025-02-A).
• In CTLS payment mode, the micro-processor operating frequency is reduced
to 300 MHz until the PINpad exits CTLS mode.
• Multi-media function (video playback or audio function) has to be switched off
by the user or customer app when CTLS payment mode is activated. Other
modes of payment like smart card and MSR payment can be supported.
NOTE CTLS payment mode is defined as the state of the device where RF transmission
is broadcasting to allow for a CTLS payment. This is activated either during the
scanning of items or at the completion of scanning items during the checkout
process, depending on how the application sets it up. As soon as checkout is
complete the device exits CTLS payment mode and remains off until activated for
the next checkout.
Power by Serial For recommended connectivity and feature constraint imposed due to limitation of
Port of VX 520 source power from VX 520, please refer to P400/P400 Plus Installation Guide,
VPN - DOC435-003-EN and P200/P200 Plus Installation Guide, VPN -
DOC430-003-EN respectively.
Features and The unit provides the right combination of features and functions including a triple-
Benefits track magnetic stripe card reader, smart card reader, color touchscreen display
(P400 only) and integrated contactless module.
Exceptional Ease of • 2.8” QVGA and 3.5” color TFT LCD display for boundless application
Use possibilities and easy readability.
• Vertical magnetic stripe card reader with an extended blade for optimal card
reading.
• Touchscreen for icon-based applications or electronic signature capture
support (P400 and P400 Plus only).
Performance and • Fast transactions due to powerful 600 MHz ARM Cortex A9 processor.
Durability • Rounded corners and drop resistant to 3 feet on concrete floor to minimize
breakage.
• 384 MB (P200/P400) or 1 GB (P200/P400 Plus) of memory with optional
removable SD flash memory.
Communication • Wi-Fi: Ideal for retailers that need multiple wireless devices and has existing
Technology IP infrastructure (P200 Plus and P400 Plus only).
• Bluetooth: Support iBeacon which is the intended short range application for
P200 Plus and P400 Plus.
Differences P200 and P400 PINpads are mostly identical and offer the same general benefits.
Between P200 It is important to know the differences in their intrinsic features.
and P400 PINpad
Before proceeding to other tasks, familiarize yourself with the operational features
of the keypad to enter data.
This section describes how to use the keypad, which consists of a 12-key Telco-
style keypad with three color-coded keys below the keypad. Using these keys you
can perform all data entry tasks described in this manual. For added convenience,
the keypad is automatically back-lit when you power on the device.
TELCO STYLE
KEYPAD
ENTER
CANCEL CLEAR
P200 PINpad also has a navigation keys that allows users to navigate through the
menus and select specific operations.
NAVIGATION
KEYS
TELCO STYLE
KEYPAD
CANCEL ENTER
CLEAR
Figure 4 Keypad Arrangement on P200/P200 Plus
Data Entry Before you can use the keys on the front panel to enter ASCII characters, the
Modes PINpad must be in a mode that accepts keyed data entry. There are two PINpad
operating modes, each enabling you to press keys to enter data under specific
circumstances:
• Normal mode: This is the operating mode where an application program is
present in mDRAM and currently running.
• System mode: This is a special, password-controlled operating mode for
performing a variety configuration procedures that cannot be performed when
an application is running.
The application controls how PINpad keys process transactions and when you
can use specific keys to type characters or respond to prompts.
The Keypad You can enter up to 44 ASCII characters, including the letters A–Z, the numerals
0–9, and special characters: (,), (‘), (“), (:), (-), (<space>), (/), and (+) using the
keypad.
Alphabetic characters are entered by pressing its corresponding number in the
keypad multiple times within a given time. Special characters can be entered by
using the asterisk (*) key or the zero number key (0). With the smaller case
character selected using the hash key (#), press the asterisk or the zero number
key continuously until the desired character is displayed. Some of the special
characters may or may not be available when terminal is on System mode.
Function Key The following are the function keys of the PINpad’s keypad.
Descriptions
NOTE The PINpad’s operating mode and context determine the specific action
performed when you press one of the function keys. The following descriptions
are provided solely to acquaint you with some general characteristics of these
function keys before presenting more detailed System mode procedure
descriptions.
Cancel Key
Pressing the Cancel key in normal mode when the PINpad’s application is loaded
and running terminates the current function or operation.
In System mode, use Cancel to perform a variety of functions. The most common
use of Cancel in System mode is to exit a System mode submenu and return to
the main System mode menu. The specific effect of pressing the Cancel key
depends on the currently active System mode menu. In the System mode login
screen, a special menu can be accessed by pressing the Cancel key — Reboot,
Run Apps, Transfer Logs, and System Info can be accessed without logging in or
entering any password.
Clear Key
In normal mode, the Clear key is commonly used to delete a number, letter, or
symbol on the PINpad’s display screen. Press Clear one time to delete the last
character typed on a line. To delete additional characters, moving from right-to-
left, press Clear once for each character or hold down Clear to delete all
characters in a line.
In System mode, the specific effect of pressing the Clear key depends on the
currently active System mode menu.
Enter Key
In normal mode, the Enter key is generally used in the same way as the enter key
on a PC, that is, to end a procedure, confirm a value or entry, answer “Yes” to a
query, or select a displayed option.
In System mode, press the Enter key to begin a selected procedure, step forward
or backward in a procedure, and confirm data entries. The specific effect of the
Enter key depends on the currently active System mode menu.
Navigation Key
P200 and P200 Plus has navigation keys that can be used to navigate through the
system mode menus/application menus and select specific operations.
System Mode
When to Use Use the System mode functions to perform different subsets of related tasks:
System Mode • Application programmers: Configure a development PINpad, download
development versions of the application program, then test and debug the
application until it is validated and ready to be downloaded to other PINpads.
• Deployers of PINpads to end-user sites: Perform the specific tasks required
to deploy a new PINpad on-site, including configuring the PINpad,
downloading application software, and testing the PINpad prior to deployment.
• PINpad administrators or site managers: Change passwords, perform
routine tests and PINpad maintenance, and configure PINpads for remote
diagnostics and downloads.
To perform the subset of tasks that corresponds to a job, select the appropriate
System mode menu(s) and execute the corresponding procedure(s).
Local and The System mode operations available on a PINpad can be divided into the
Remote following two categories or types:
Operations • Local operations: Addresses a stand-alone unit and do not require
communication or data transfers between the unit and another terminal or
computer. Perform local System mode operations to configure, test, and
display information about the PINpad.
• Remote operations: Requires communication between the unit and a host
computer (or another terminal) over a cable connection. Perform remote
System mode operations to download application software to the PINpad,
upload software from one PINpad to another, or download from another
download host.
This chapter contains descriptions on how to perform local System mode
operations. For information on performing remote operations, such as downloads,
refer to Performing Downloads for more information.
Verifying The device you are using may or may not have an application program running on
PINpad Status it. After you have set up the device (refer to P400/P400 Plus Installation Guide,
VPN - DOC435-003-EN or P200/P200 Plus Installation Guide, VPN -
DOC430-003-EN) and the unit is turned on, use the following guidelines to verify
PINpad status regarding software and current operating mode:
• If no application program is loaded into the PINpad’s memory, the unit enters
the System Mode screen.
• If an application program is loaded into PINpad’s flash, an application-specific
prompt appears. The application runs and the unit is in normal mode.
Entering System With an application loaded, use the following procedure to enter System Mode.
Mode
NOTE Before entering System Mode and selecting the function(s) to perform, verify that
the unit has been installed as described in P400/P400 Plus Installation Guide,
VPN - DOC435-003-EN or P200/P200 Plus Installation Guide, VPN -
DOC430-003-EN. Make sure that the unit is connected to a power source and is
turned on.
Users (Prod)
supervisor
level1
level2
maintenance
NOTE A special menu can be accessed by pressing the Cancel key — Reboot, Run
Apps, Transfer Logs, and System Info can be accessed without logging in or
entering any password.
3 Once the login has been selected, enter the password. If the password is pre-
expired or is pending change the user must enter the current password and
then a new password (pre-defined in the case of a pending password change).
The new password must be entered twice for validation. The default System
Mode password is:166831.
4 If the password is entered correctly, the System Mode idle screen displays. If
the password is not entered correctly, the error “password was entered
incorrectly” displays and the login screen will be displayed again.
Main (Prod)
Information
Administration
Update
Security
Diagnostics
Manufacturing
Exit
Run Applications
Exiting System After successful completion, some operations automatically exit System mode
Mode and restart the device. Other operations require that you manually exit System
mode and restart the device by tapping or selecting Log Out or Reboot from the
Exit submenu.
CAUTION Without the password, you are unable to access System mode operations and
may be prevented from requesting a download, performing remote diagnostics,
or changing any of the information already stored in memory. The unit can,
however, continue to process transactions in normal mode.
If you change a password but forgot it later on, the user may opt to expire the
user passwords. Expiring user passwords clears out ALL user passwords at the
same time. Consider advising all users before proceeding with this option.
To expire user passwords, access the System mode Security > Password
manager option or contact your local Verifone representative for assistance.
NOTE
Passwords must be in numeric characters only and must be at least seven digits
and less than 10 digits in length.
System Password To prevent unauthorized use of the System mode menus, the unit OS requires a
system password each time you enter System mode.
When you key in the system password to enter System mode, an asterisk (*)
appears for each character you type. These keys prevent your password from
being seen by an unauthorized person.
NOTE Some application program downloads automatically reset the system password.
If your system password no longer works, check if a download has changed your
password.
Default Password From manufacturing, each file group uses the default password “166831” and
entered as follows:
System Mode Access the submenus by tapping or selecting the onscreen panel option. The
Menus System mode screen and submenus are shown below.
System Mode The procedures in this section explain how to use each of the System mode menu
Procedures options. Each procedure description starts at a main System mode menu. Each
procedure takes you step-by-step through a complete System mode operation in
the following sequence:
1 At the idle System mode screen, select an operation by tapping the
corresponding on-screen menu panel.
2 Complete the operation.
3 Return to the main System mode screen by tapping or pressing the back
button at the upper left hand portion of the screen or use the red cancel or
back keys on your keypad. Scroll through the screen by pressing the onscreen
buttons (up, down, and right) or by using the navigation keys on P200 units.
Procedure Procedure descriptions are arranged in a tabular format. The Display column
Description indicates what appears on the PINpad display screen at each step of the
procedure. Please note the following conventions used in this column:
• If a prompt or message appears on the screen exactly as it is described. For
example:
*TAMPER*
MAINTENANCE REQUIRED - VAT
A submenu row indicates a specific menu evoked from a main menu screen. A
description of that screen and procedure immediately follows the submenu row.
The following keys have the same function on all submenus:
• Press the green ENTER key to choose the function and display the submenu
selected. When editing, pressing ENTER will save a newly entered variable.
• Press the yellow BACK key to go back to the previous submenu or menu
option.
• Press the red CANCEL key to exit any submenu without saving changes.
Logging in to To enter System Mode after you have turned on the device, follow the procedure
System Mode described below.
NOTE On successful completion, some operations automatically exit System mode and
restart the device. Other operations require that you exit System mode and
restart the device. To manually exit System mode, choose Exit from the main
menu and then select Reboot.
supervisor
level1
level2
maintenance
Information
Administration
Update
Security
Diagnostics
Manufacturing
Exit
Run Applications
Submenus The following submenus are available from the home screen. The user may
navigate through the screen using the touch screen function, or by using the up,
down, right or back keys provided at the top portion of the screen. Use the
Navigation Keys when selecting menus and specific options when using P200.
Table 5 System Mode Submenus
Display Action
Home > Information> Basic information
To view device information, select Information from
the main System mode menu and then select the
Basic information panel. Scroll through the screen
Basic information
using the touch screen function or use the up and down
arrow keys provided at the top portion of the screen.
Model P400 Plus
The sample screen display shown on the left contains:
SN 540-002-300
• Basic Information: Displays basic information such
Part Number M435-003-04-WWA-4 as model, serial number, part number, HW Revision,
HW Rev. 006 unit id, SOC Revision, Vault, SRED, Open Protocol,
Application Manager version, SBI, RFS version, etc.
UID 87252089
Critical Values:
SOC Revisions VFI2111
• Build: Base build release date
Vault 2.1.2.3807 • Vault Version: Security vault version
SRED 5.2.03 Note: Information provided in this screen may vary
depending on the terminal used.
BT Yes
Contactless Yes
Magstripe Yes
User root
Note: Information provided in this screen may vary
depending on the terminal used.
Category fs
Date
Option
Total 83.242
Used 46.227
Free 37.016
Install
Logs
Install
Manufacturing
Load MIB
Reboot
Logout
OK
File Authentication
This chapter discusses the following VeriShield Retain file authentication security
architecture, VeriShield Retain file authentication module, and the organizational
infrastructure that supports it.
This chapter also explains how the file authentication process may affect the tasks
normally performed by application programmers, deployers, site administrators, or
entities authorized to download files to a PINpad.
Lastly, this chapter explains how to generate the signature files required to
perform downloads and authenticate files on the unit using the file signing utility
(see VeriShield File Signing Tool (FST)).
In Performing Downloads, the topic of file authentication is also discussed in the
context of specific file download procedures.
Introduction to The unit has a security architecture, called VeriShield, which has both physical
File and logical components. The logical security component of the VeriShield
Authentication architecture, which is part of the unit’s operating system software, is called file
authentication (FA).
FA is a secured process for authenticating files using digital signatures,
cryptographic keys, and digital certificates. This process makes it possible for the
sponsor of a device to logically secure access to the device by controlling who is
authorized to download application files to that device. It verifies the file’s origin,
sender’s identity, and integrity of the file’s information.
The Verifone To manage the tools and processes related to FA, Verifone has established a
Certificate Authority centralized Verifone Certificate Authority, or Verifone CA. This agency is
responsible for managing keys and certificates. The Verifone CA uses an
integrated set of software tools to generate and distribute digital certificates and
private cryptographic keys to customers who purchase PINpads.
Special Files Used The following specially formatted files support the FA process:
in the File
• A digital certificate (*crt file) is a digital public document used to verify the
Authentication
signature of a file.
Process
• A digital signature (*.p7s file) is a piece of information based on both the file
and the signer’s private cryptographic key. The file sender digitally signs the
file using a private key. The file receiver uses a digital certificate to verify the
sender’s digital signature.
• Signer private keys are securely conveyed to clients on smart cards. On
P200 and P400, private keys are not kept in files. The secret passwords
required by clients to generate signature files, using signer private keys, are
sent as PINs over a separate channel such as registered mail or encrypted e-
mail.
Digital certificates and signature files, do not need to be kept secure to safeguard
the overall security of VeriShield Retain.
The special file types that support the file authentication process are recognized
by their filename extensions.
Table 6 VeriShield File Signing Tool Filename Extensions
File Type Extension
Signature *.p7s
Digital certificate *.crt
All digital certificates are generated and managed by the Verifone CA, and are
distributed on request to PINpad clients—either internally within Verifone or
externally to sponsors.
All certificates issued by the Verifone CA for the PINpad platform, and for any
Verifone platform with the VeriShield Retain security architecture, are
hierarchically related. That is, a lower-level certificate can only be authenticated
under the authority of a higher-level certificate.
The security of the highest-level certificate, called the platform root certificate, is
tightly controlled by Verifone.
The required cryptographically related private keys that support the file
authentication process are also generated and distributed by the Verifone CA.
NOTE
Only one sponsor certificate is permitted per PINpad.
• Signer certificate: Certifies the right to sign and authenticate files for PINpads
belonging to the sponsor.
Signer Private Keys Are Issued to Secure the File Signing Process
Signer private keys are loaded onto a smart card. This smart card is securely
delivered to the business entity that the PINpad sponsor has authorized to sign,
download, and authenticate applications to run on the sponsor’s PINpad.
The Verifone CA can also issue additional sets of sponsor and signer certificates,
signer private keys to support multiple sponsors, and multiple signers for a
specific platform.
To establish the logical security of applications to download to a PINpad, the
designated signer uses the signer private key issued by the Verifone CA as this is
a required input to the VeriShield File Signing Tool. Every signature file contains
information about the signer private key used to sign it.
When a signature file is generated using a signer private key. Successful
authentication depends on whether the signer private key used to sign the target
file matches the signer certificate stored in the PINpad’s certificate tree.
REQUESTS
CERTIFICATES FOR VERIFONE CA
DEPLOYMENT DETERMINES
PINpad FROM VERIFONE CA REQUIRED
SPONSOR
VERIFONE CA WEB WEB SITE CERTIFICATE
SITE. STRUCTURE.
VERIFONE CA
GENERATES A SET
OF CERTIFICATES
FOR THE SPONSOR.
SMART
CARD
PIN
Development Process
The Development Process is the same as the Deployment Process except
different cards are ordered and used. Proceed to the Deployment section.
Deployment Process
In this process:
1 The sponsor provides the application file (from the development process) and
the smart card and smart card PIN (from the certificate request process) as
inputs to VeriShield.
2 VeriShield unlocks the smart card with the provided PIN, sends the file to be
signed to the smart cart that will compute the signature with the resident
private key. VeriShield extracts the signature, signer certificate, and sponsor
certificate from the smart card.
3 VeriShield uses the extracted data, along with the application file, to create a
signature file (*.p7s).
4 VeriShield creates files suitable for downloading from the smart card data.
5 The signature file, the application file, and the extracted signer and sponsor
certificates are downloaded into a deployment PINpad, where the following
actions occur:
a When an attempt is made to install an application executable or data file, a
matching signature and certificate must be present.
b The operating system compares the application file's signature against the
values stored in the application file's calculated signature.
6 Each successfully authenticated application file is installed on the PINpad
(otherwise, the application file is deleted on failed authentication and an error
message is displayed.)
DEVELOPMENT PRE-DEPLOYMENT
PROCESS PROCESS
SMART
CARD
PIN
FULLY DEBUGGED
APPLICATION FILE SIGNER SPONSOR SIGNER
CERTIFICATE CERTIFICATE PRIVATE KEY
VERISHIELD
FILE SIGNING
TOOL
Planning for File File authentication is an integral part of every PINpad. To safeguard the PINpad’s
Authentication logical security, FA requires that any downloaded application file must be
successfully authenticated before the operating system installs on the unit.
Download and The PINpad’s Secure Installer plays a critical role on system and application
Installation startup as well as authenticating and installing all components; application,
system and OS.
How Signature Files Signature files are downloaded together with their target application files in the
Authenticate Target same data transfer operation. When an attempt is made to install an application
Files executable or data file, a matching signature and certificate must be present. The
operating system compares the application file's signature against the values
stored in the application file's calculated signature.
Determine All downloaded files must have an associated signature as part of the download
Successful otherwise the installation fails. To ensure a target file successfully authenticated
Authentication after a download, confirm that all downloaded files are installed. If an application
file is not successfully authenticated, the operating system does not allow it to
install and run, either following the initial download or on subsequent PINpad
restarts.
Digital Certificates The file authentication module always processes certificates before it processes
and the File signature files. Digital certificates (*.crt files) generated by the Verifone CA
Authentication have two important functions in the file authentication process:
Process
• They define the rules for file location and usage (for example, the valid file
group, replaceable *.crt files, parent *.crt files, whether child
*.crt files can exist, and so on).
• They convey the public cryptographic keys generated for PINpad sponsors
and signers that are the required inputs to the VeriShield File Signing Tool to
verify file signatures.
certificate tree and the failed certificate file (usually ~400 bytes) is not
retained.
Development Devices
A development device is a device that maintains a set of certificates in its
certificate tree. This set of certificates includes a special client certificate called a
development signer certificate.
In the development device, applications must still be signed and authenticated
before they can run on the device. A development device provides additional
application debug capabilities.
Deployment Devices
While the application development process is being completed and while the new
application is being tested on a development device, a sponsor can order specific
sponsor and signer certificates from the Verifone CA to use to logically secure
sponsor and signer privileges when the device is prepared for deployment.
Customer-specific sponsor and signer certificates are usually downloaded to a
device as part of the standard application download procedure performed by a
deployment service. In this operation, the new sponsor and signer certificates
replace the development sponsor certificate that is part of the factory set of
certificates, as shown in Figure 9.
When the sponsor and signer certificates are downloaded and successfully
authenticated, the device is ready for deployment.
Ultimately, it is the sponsor decides on how to implement the logical security
provided by FA on a field-deployed device. Additional certificates can be obtained
from the Verifone CA anytime to implement new sponsor and signer relationships
in deployment devices.
DEVELOPMENT TERMINAL
DEVELOPMENT TERMINAL DEPLOYMENT TERMINAL
DEPLOYMENT TERMINAL
ROOT
ROOT ROOT
ROOT
VERIFONE
VERIFONE APPLICATION
APPLICATION VERIFONE
VERIFONE APPLICATION
APPLICATION
PARTITION
PARTITION PARTITION
PARTITION PARTITION
PARTITION PARTITION
PARTITION
DEVELOPMENT
DEVELOPMENT DEPLOYMENT
DEPLOYMENT
SPONSOR
SPONSOR SPONSOR
SPONSOR
OPERATING
OPERATING CERTIFICATE
CERTIFICATE OPERATING
OPERATING CERTIFICATE
CERTIFICATE
SYSTEM
SYSTEM (VALIDATED
(VALIDATED SYSTEM
SYSTEM (VALIDATED
(VALIDATED
BY
BY THE
THE BY
BY THE
THE
APPLICATION
APPLICATION APPLICATION
APPLICATION
PARTITION
PARTITION PARTITION
PARTITION
CERTIFICATE)
CERTIFICATE) CERTIFICATE)
CERTIFICATE)
DEVELOPMENT
DEVELOPMENT
SIGNER DEPLOYMENT
DEPLOYMENT
SIGNER CERTIFICATE
CERTIFICATE
CERTIFICATE CERTIFICATE
(VALIDATED (VALIDATED
(VALIDATED BY
BY
(VALIDATED BY
BY THE
THE
THE SPONSOR
SPONSOR THE SPONSOR
SPONSOR
CERTIFICATE) CERTIFICATE)
CERTIFICATE)
CERTIFICATE)
VeriShield File The devices are shipped from manufacturer without a development certificate — a
Signing Tool development certificate is not available for download.
(FST) For development, like for deployment, customers must obtain VeriShield signer
cards and use the VeriShield File Signing Tool to sign all executable and other file
to be logically protected.
Development and production signer cards must be generated under distinct
sponsor certificates, so that development cards could be distributed, without any
security concern to personnel non-authorized to sign production software.
Downloading To download a package or packages to the device, the following must be done:
Application Files
1 Generate one or more install packages.
2 Sign the individual install packages with FST.
3 Combine one or more install packages and package signatures into a bundle.
4 The bundle may also contain signer certificates and a remove file (to remove
previous version of the application).
5 Sign the bundle.
6 Combine one or more bundles and bundle signatures into a single download
file.
A file named “control” in the package CONTROL directory contains information
relating to the package. A packaging tool with built-in help information is available
to create packages.
Performing Downloads
This chapter contains information and procedures to allow you to perform the
various types of data transfers required to:
• Develop applications for the PINpad.
• Prepare PINpads for deployment.
• Maintain PINpad installations in the field.
• Transfer data to/from PINpads, terminals (Host), and PC.
In this chapter, information pertaining to file authentication is only discussed in the
context of procedures while performing file downloads. See File Authentication for
more information.
The PINpad contains ports that allow connection to a network or other terminals
(for back-to-back downloads). See Download Methods and Procedures.
Downloads and The PINpad can perform a download via the following connectivity options:
Uploads • Using NFS
• Using the ZonTalk Protocol via Serial connection
• Using the Netloader
• Using a local USB memory device / SD device
Refer to sample screen display in Table 5 (Home>Update) for more information.
Serial download can also be done without using an onboard application, please
refer to Downloading without an Onboard Application for more information.
Downloads require moving the application and/or application data files from a
remote computer to the PINpad. In the device application development,
application files are downloaded from a development PC directly to the PINpad. In
the field, application files must be transferred from the device’s controlling device
(ECR, LAN controller, and so on) to the PINpad.
The device supports a module called the Secure Installer (SI). The SI is
responsible for authentication and installation of applications and operating
system components. It follows a well defined specification requiring bundles and
packages. The detailed information on creation of download files for the device is
contained in the Programmer's Manual.
Also note that the device SDK includes a tool called the Package Manager to aid
developers and deployment personal create and maintain bundles and packages.
Download The following methods are available for file and data downloads through the
Methods and download and upload procedures.
Procedures
Direct downloads The usual download utility program is Direct Download (DDL) utility. It is normally
available with the device’s Developer’s Toolkit (DTK), and can be obtained
through Verifone. DDL is a subset program of the Verifone VeriTalk download
application. It is designed specifically for a direct (RS-232/USB) download from a
PC to a device. As the DDL utility sends files from the PC, the device display
shows the progression of the download. The file name is shown on Line 1 of the
display with nnn showing the number of blocks downloaded. Line 2 indicates the
percent complete of the download where each asterisk represents 10%.
Features Description
-c<delta time> Sets the date and time on the PINpad to the host PCs date
and time. Also, specifies a delta value to add or subtract
from the hour, for example, -c+1 specifies the PC’s time plus
one hour.
Note: The maximum hour value that can be set is ± 23
hours.
file 1 [file2...] Specifies one or more files to download. Files with the .OUT
extension are treated as binary data; all others are assumed
text files.
Features Description
DDL Command Line If you need to specify more variables than what the DOS command line allows,
File you can use a simple configuration file (-F option) to extend the length of the
command line. A command line file is an ASCII text file that allows you to supply
as many variables as required.
DDL Example Download the file app.tgz using the PC’s COM port 2 (app.tgz is a binary file).
DDL -p2 -iapp.tgz
Each line in the command line file should consist of one variable:
-p2 app.tgz
The command line would be:
DDL -F<filename>
Downloading Use the following procedure to perform a download from a host PC to an P200 or
without an Onboard P400 PINpad with no application installed. The PINpad must be powered on to
Application begin the procedure.
1 Make all cable connections.
2 Launch the DDL application on the host PC.
3 Enter System mode using a secure password.
4 Tap Update panel on the main System mode menu.
5 Tap Serial panel tab to perform direct download to the PINpad.
6 Select the COM Port (COM1).
7 Select Baud Rate to start download process.
Asterisks (*) display on screen to indicate the state of the download. Each asterisk
denotes approximately 10% completion. On download completion, the PINpad
returns to the main screen.
Network Download Network Download transfers files from a PC to the PINpad. A network download
Utility client, included with the SDK, must be installed onto a PC. Before the file transfer
can begin, the network settings must be configured and then the transfer starts by
tapping the “Netloader” under Transfer.
File Signing and File signing is required. File signing is performed with the VeriShield File Signing
Signature Files tool. The result of signing a file is a new signature file also called a .P7S file. The
.P7S file must be included as part of the download. The -k option is not used by
the PINpad. Signature files are also supported as input files. These are specified
just like application data files, with a -i option.
System Messages
This appendix describes error and information messages, which are grouped into
two categories. For ease of use, these messages are grouped alphabetically in
each of these two categories.
These messages include the following:
• Digital certificate displays and signature file downloaded to the PINpad.
• File authentication module processes.
• File compression module use messages from the VeriCentre DMM terminal
management and download tool.
Error Messages The following error messages may appear when the PINpad is in System Mode.
Use the Navigation keys when selecting menus and specific options when using a
P200 PINpad.
Password incorrect.
Please wait...
OK
OK
OK
OK
OK
OK
SECURITY ERRORS
Key Loading Bank or ADE or VRK error is displayed
when key loading password has expired.
Bank or ADE
Select OK to close the error message and enter new
password.
OK Cancel
OK
Information The following information messages may appear when the PINpad is in System
Messages Mode.
Table 8 Information Messages
Display Action
KEYPAD DIAGNOSTICS INFORMATION
This screen displays the number of times a key is
pressed during a keyboard diagnostics session.
1 2 3
(0) (0) (0)
4 5 6
(0) (0) (0)
7 8 9
(0) (0) (0)
* 0 #
(0) (0) (0)
X <- O
(0) (0) (0)
Port Pinouts
The tables in this appendix list pinouts for the P200 and P400 PINpad, dongles,
and cable connectors.
Multi I/O
Connection Port
Multi I/O
Connector Cable
Connector Pin Function Description
Connector P461
1 EXTGND Cable Shield Ground
2 ETH_TXP Ethernet Transmit data +
3 ETH_TXN Ethernet Transmit data -
Connector P461
4 EXTGND Cable Shield Ground
1 2 1 2
5 ETH_RXP Ethernet Receive data +
6 ETH_RXN Ethernet Receive data -
7 EXTGND Signal Ground
8 N.C. No connection
13 14 13 14
9 N.C. No connection
Connector P460
10 SGND Signal Ground
11 RXD_HOST RS-232 Receive data
12 TXD_HOST RS-232 Transmit data
13 CTS_HOST RS-232 Clear to Send
14 RTS_HOST RS-232 REquest to Send
Connector P460
1 EXTGND Cable Shield Ground
2 USB_DEVICE- USB Device Signal -
3 USB_DEVICE+ USB Device Signal +
4 SGND Signal ground
5 RXD_HOST RS-232 Receive data
6 TXD_HOST RS-232 Transmit data
7 SGND Signal Ground
8 USB_HOST- USB Host -
9 USB_HOST+ USB Host +
10 SGND Signal Ground
11 EXTPWR External Power
12 EXTPWR External Power
13 EXTGND Cable Shield Ground
14 +5V USB Reserved (USB ID)
DC Input Jack
Polarity for
435-044-01-A
Cable
1 2 3 4 5
Plug
ASCII Table
The ASCII Table An ASCII table for the P200/P400 display is presented in Table 9.
ASCII Abbreviation for American Standard Code for used in simple calculators. The 16-key core keypad
Information Interchange. A 7-bit code (with no parity of the terminal is used to enter data and perform
bit) that provides a total of 128 bit patterns. ASCII operations.
codes are widely used for information interchange in
data processing and communication systems. Manual transaction A transaction involving the
manual entry of account information from the
Baud The number of times per second that a terminal keypad instead of automatic entry of the
system, especially a data transmission channel, information from a reading terminal, such as a
changes state. The state of a system may represent magnetic stripe card reader.
a bit, digit, or symbol. For a POS terminal, the baud
rate indicates the number of bits per second that are POS terminal A terminal used at the point of sale,
transmitted or received by the terminal’s serial ports. which is usually at a merchant site where a customer
pays for goods or services received. Information
Boot loader Also called a bootloader or bootstrap concerning the sale can be entered into the terminal
loader. A short program, stored in non-volatile and transmitted to a remote host computer for
memory, that allows the terminal to continue verification and processing.
operating during an operating system download
procedure, until the new operating system is RS-232 Also RS-232C. A widely used standard
downloaded into terminal memory. interface that covers the electrical connection
between data communication equipment. The RS-
Calendar/clock chip A real-time clock inside the 232 interface standard was developed by the EIA
terminal which keeps track of the current date and (Electronic Industries Association) and is essentially
time. equivalent to the CCITT’s V.24 interface.
Card reader Also called magnetic stripe card Serial port A connection point through which
reader. The slot on the right side of the terminal that digital information is transferred one digital bit at a
automatically reads data stored in the magnetic time. Same as serial interface. The terminal has one
stripe on the back of a specially-encoded card when serial port, available at the multiport connector. The
you swipe the card through the slot. main serial port on a download computer is usually
assigned the terminal ID, COM1.
Certificate Also called a digital certificate. A digital
document or file that attests to the binding of a public Swipe The action of sliding a magnetic stripe card
key to an individual or entity, and that allows through a terminal card reader. The card reader has
verification that a specific public key does in fact a bi-directional swipe direction. The user must hold
belong to a specific individual. the card so that the magnetic stripe is faces in and
towards the keyboard.
File authentication A process through which one
proves and verifies the origin of a file, the identity of Track 1, 2, or 3 data Information stored on tracks
the sender, and the integrity of the information it 1, 2, or 3 of a debit or credit card magnetic stripe,
contains. which can be read by a magnetic card reader
terminal, such as the one that is integrated in the
Firmware System software, including the operating terminal.
system, boot loader, default display font, and system
messages, stored in terminal memory. Variable A string of characters that denotes some
value stored within the computer and that can be
Keypad A small keyboard or section of a keyboard changed during execution. A variable may be
containing a smaller number of keys, generally those internal to a program, in which case it is held in
P200/P400
Reference Guide