ID TECH
10721 Walker Street
Cypress, CA 90630
(714) 761-6368
www.idtechproducts.com
This document, as well as the hardware and software it describes, is furnished under license and may
only be used in accordance with the terms of such license. The content of this paper is furnished for
informational use, subject to change without notice, and not to be construed as a commitment by ID
TECH. ID TECH assumes no responsibility or liability for any errors or inaccuracies that may appear in
this document.
Except as permitted by such license, no part of this publication may be reproduced or transmitted by
electronic, mechanical, recorded, or any other method, or translated into another language or
language form without the express written consent of ID TECH. ID TECH is a registered trademark of
International Technologies and Systems Corporation. ViVOpay and Value through Innovation are
trademarks of International Technologies and Systems Corporation. Other trademarks are the
property of the respective owner.
Warranty Disclaimer
The services and hardware are provided "as is" and "as-available," and the use of these services and
hardware are at the user’s own risk. ID TECH does not make, and hereby disclaims, any and all other
express or implied warranties, including, but not limited to warranties of merchantability, title, fitness
for a particular purpose, and any warranties arising from any course of dealing, usage, or trade
practice. ID TECH does not warrant that the services or hardware will be uninterrupted, error-free, or
completely secure.
Page | 2
Page 3
iMag, iMag Pro (II) User Manual
Caution: The ViVOpay Kiosk III should be mounted 1-2 feet away from other
Caution: Danger of Explosion if battery is incorrectly replaced. Replace only with
Warning: Avoid close proximity to radio transmitters which may reduce the ability
FCC Regulatory Compliance
Notices Class B Equipment
This equipment has been tested and found to comply with the limits for a Class B digital device
pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection
against harmful interference in a residential installation. This equipment generates, uses, and can
radiate radio frequency energy and, if not installed and used in accordance with the instructions, may
cause harmful interference to radio communications. However, there is no guarantee that
interference will not occur in a particular installation. This device complies with part 15 of the FCC
rules. Operation is subject to two conditions: (1) This device may not cause harmful interference, and
(2) this device must accept any interference received, including interference that may cause
undesired operation.
If this equipment does cause harmful interference to radio or television reception, which can be
determined by turning the equipment off and on, the user is encouraged to try and correct the
interference by one or more of the following measures:
• Reorient or relocate the receiving antenna.
• Increase the separation between the equipment and the receiver.
• Connect the equipment into an outlet on a circuit different from that to which the receiver is
connected.
• Consult the dealer or an experienced radio/TV technician for help.
Changes or modifications to the ViVOpay Kiosk III not expressly approved by ID TECH could void the
user's authority to operate the ViVOpay Kiosk III.
IC Compliance Warning
Operation is subject to two conditions: (1) This device may not cause harmful interference, and
(2) this device must accept any interference received, including interference that may cause
undesired operations.
Cautions and Warnings
ViVOpay Kiosk IIIs. Can be adjusted based on lane setup.
same or equivalent type recommended by the manufacturer. Discard used
batteries according to the manufacturer’s instructions.
4.2. Get Firmware Version .......................................................................................................................................................... 6
4.3. Get Setting ............................................................................................................................................................................... 7
4.4. Function ID Table ................................................................................................................................................................... 7
4.4.2. Read SecurityLevel ID ........................................................................................................................................................................................... 8
4.4.3. Get Firmware Version ........................................................................................................................................................................................... 8
5.1. iMag/ iMag Pro(II) Unencrypted Data Output Format ................................................................................................ 9
6. DECRYPTION EXAMPLE ............................................................................................................................................................... 12
6.1. Decrypted Data ................................................................................................................................................................... 14
-30 °C to 70 °C ( -22 °F to 158 °F) non -condensing
Dimensions:
iMag: 95 mm (L) x 30 mm (H) x 71 mm (W)
iMag Pro II: 59.2mm(L) x 13.1mm(H) x 32.6mm(W)
1. Introduction
ID TECH iMag is a snap-on, magnetic stripe reader designed to work with iPhone and iPod Touch. The
iMag Pro works with all Apple mobile devices including the iPad. The reader delivers a superior
reading performance because of its ability to encrypt sensitive card data. The data encryption process
prevents card holder information from being accessed when the data is stored or in transit, so the
data remains secure from beginning until end.
The reader fully supports TDES and AES data encryption using DUKPT key management method.
2. Features
• Compact for comfort and mobility
• No external power supply required
• Mini USB port enables charging Apple devices with external cable
• Bi-directional card reading
• Reads encoded data that meets ANSI/ISO/AAMVA standards and some custom formats such
as ISO track 1 format on track 2 or 3
• Reads up to three tracks of card data
• Provides clear text confirmation data including card holder’s name and a portion of the PAN
as part of the Masked Track Data
3. Specifications
iMag Pro: 59mm (L) x 14 mm (H) x 32 mm (W)
Page | 5
Page 6
iMag, iMag Pro (II) User Manual
4.1. Setting Command
The Setting command is a collection of many function-setting blocks in the following format:
Command:
<STX><S><FuncSETBLOCK1>…<FuncBLOCKn><ETX><LRC>
Response:
<ACK> for successful settings or <NAK> for the wrong commands such as invalid funcID, length,
and value.
Each function-setting block <FuncSETBLOCK> has the following format:
<FuncID><Len><FuncData>
Where:
• <FuncID> is a one-byte ID identifying the function being set.
• <Len> is a one-byte length count for the function-setting block <FuncData>.
• <FuncData> is the current setting for this function. It has the same format as in the
sending command for this function.
Example:
Set DUKPT Key management
CMD: \02\53\58\01\31\03\3A
OUT: 06
4.2. Get Firmware Version
The Get Firmware Version command returns the firmware version back to the application.
Command:
<STX><R><FmVerID><ETX><LRC 1>
Response:
<ACK> <STX><Version String><ETX><LRC 2>
<Version String> is in the format of “ID TECH iMag Swipe Reader x.y.z” where x.y.z is the
major and minor version number.
Page | 6
Page 7
iMag, iMag Pro (II) User Manual
Function Name
Function ID
Description
EncryptionID
0x4C
Security Algorithm
‘2’ AES
SecurityLevelID
0x7E
Security Level (Read Only) ‘0’ ~ ‘3”
Default value ‘1’
GetFirmwareVersion
0x22
Returns current firmware version
4.3. Get Setting
The Get Setting command retrieves the reader’s current settings.
Command:
<STX> <R> <ReviewID> <ETX> <LRC 1>
Response:
<ACK> <STX> <FuncID> <Len> <FuncData> <ETX> <LRC 2>
<FuncID>, <Len>, and <FuncData> retrieves the reader’s current settings.
T2 clear/mask data
T3 clear/mask data
T1 encrypted data
T2 encrypted data
T3 encrypted data
Page | 9
Page 10
iMag, iMag Pro (II) User Manual
level 4 only, not used here)
ETX
Note 2: Track 1 3 status byte.
Note 3: Clear/mask data sent status
Field 4:
Bit 0:
1—track 1 decoded data present
Bit 1:
1—track 2 decoded data present
Bit 2:
1—track 3 decoded data present
Bit 3:
1—track 1 decoded data present
Bit 4:
1—track 2 decoded data present
Bit 5:
1—track 3 decoded data present
Bit 6,
7—Reserved for future use
T1 hashed (20 bytes each) (if
encrypted and hash tk1 allowed)
T2 hashed (20 bytes each) (if
encrypted and hash tk2 allowed)
T3 hashed (20 bytes each) (if
encrypted and hash tk3 allowed)
KSN (10 bytes)
CheckLRC
CheckSum
Where:
<STX> = 02h, <ETX> = 03h
Card Type is 8x for an enhanced encryption format and 0x for original encryption format.
Value Encode Type Description
00h / 80h ISO/ABA format
01h / 81h AAMVA format
03h / 83h Other
04h / 84h Raw; un-decoded format
For Type 04 or 84 Raw data format, all the tracks are encrypted and no mask data is sent. There
are no track indicators of ‘01’, ‘02’, or ‘03’ in front of each track.
Track indicators ‘01’,’02’, and ‘03’ still exist for non-encrypted mode.
Decoded bit: 1 for decode success or no sampling data; 0 for decode error (with sampled data but
failed to decode)
Sampling bit:1 for sample data exist; 0 for sample data does not exist.
Page | 10
Page 11
iMag, iMag Pro (II) User Manual
Field 8: Clear/masked data sent status byte:
Bit 0:
track 1 clear/mask data present
Bit 1:
track 2 clear/mask data present
Bit 2:
track 3 clear/mask data present
Bit 3:
reserved for future use
Bit 4:
reserved for future use
Bit 5:
reserved for future use
Field 9: Encrypted data sent status:
Bit 0:
1— track 1 encrypted data present
Bit 1:
1— track 2 encrypted data present
Bit 2:
1— track 3 encrypted data present
Bit 3:
1— track 1 hash data present
Bit 4:
track 2 hash data present
Bit 5:
track 3 hash data present
Bit 6:
session ID present
Bit 7:
KSN present
Field 8 (clear/mask data sent status) and Field 9 (encrypted/hash data sent status) is sent out in
enhanced encryption format, the default of iMag/ iMag Pro output format.
Note 4: Encrypted/Hash data sent status
General concept for each track:
• The reader will send No Clear Data if the data is encrypted.
• If the data is not encrypted the reader will send Clear Data and the hash will not send.
Page | 11
Page 12
iMag, iMag Pro (II) User Manual
02—
STX character
98—
low byte of total length
01—
high byte of total length
80—
card type byte (interpretation new format ABA card)
3F—
3 tracks of data all good
48—
length of track 1
23—
length of track 2
6B—
length of track 3
03—
tracks 1 and 2 have masked/clear data
BF
— bit 7 =1—KSN included
Bit
6=0— no Session ID included so not level 4 encryption
Bit:
5=1—track 3 hash data present
Bit:
4=1—track 2 hash data present
Bit:
3-1—track 1 hash data present
Bit:
2=1—track 3 encrypted data present
Bit:
1=1—track 2 encrypted data present
Bit:
0=1—track 1 encrypted data present
6. Decryption Example
The key for all examples is 0123456789ABCDEFFEDCBA9876543210.
The following is an example of a decrypted three-track ABA card using enhanced encryption format
(recognizable due high bit of the fourth byte underlined 80):
Track 2 encrypted length 0x32 rounded up to 8 bytes =0x38 (56 decimal) :
AB3B10A3FBC230FBFB941FAC9E82649981AE79F2632156E775A06AEDAFAF6F0 A
184318C5209E55AD
Track 3 encrypted length 0x6B rounded up to 8 bytes =0x70 (64 decimal):
44A9CCF6A78AC240F791B63284E15B4019102BA6C505814B585816CA3C2D2F42
A99B1B9773EF1B116E005B7CD8681860D174E6AD316A0ECDBC687115FC89360A
EE7E430140A7B791589CCAADB6D6872B78433C3A25DA9DDAE83F12FEFAB530 CE
405B701131D2FBAAD970248A45600093
Track 1 data hashed length 20 bytes:
3418AC88F65E1DB7ED4D10973F99DFC8463FF6DF
Track 2 encrypted length 0x6B rounded up to 8 bytes =0x70 (64 decimal) :
113B6226C4898A9D355057ECAF11A5598F02CA31
Track 3 data hashed length 20 bytes:
688861C157C1CE2E0F72CE0F3BB598A614EAABB1
KSN length 10 bytes
6299490119000000002
Page | 13
Page 14
iMag, iMag Pro (II) User Manual
LCR, check sum, and ETX06E203
Clear/Masked Data in ASCII:
Track 1: %*4266********9999^BUSH JR/GEORGE