TROY Group 3015 User Manual

Document #50-70540-001 Rev. A
Security Printing Solutions
User’s Guide
(TROY MICR / IRD 3015 Security Printing Solutions)
Acknowledgements
Some of the TROY products include cryptographic software written by Eric Young (eay@cryptsoft.com) The Twofish encryption/decryption source code used in the TROY Memory Card is provided by Crytopane.
TROY is a registered trademark. TROYmark™ and AutoProtect™ are registered trademarks of TROY Group, Inc. All rights reserved. Microsoft Windows, PostScript, TrueType, LaserJet, and all other product names mentioned in this publication are trademarks or registered trademarks
of their respective companies. Information and descriptions contained herein are the property of TROY Group, Inc. Such information and descriptions may not be copied,
disseminated, or distributed without the express written consent of TROY Group, Inc. This publication is subject to change without notice. © 2010 TROY Group, Inc.
Table of Contents
Preface
Conventions
This manual is designed and formatted for use as an online document (viewed on your computer screen). For best results, use Adobe Acrobat Reader 7.0 or higher to view or print this document. Using earlier versions of Adobe Acrobat Reader to view or print this document may not produce a properly formatted document on your computer screen. The latest version of Adobe Acrobat Reader is available as a free download from the Adobe website at http://www.adobe.com.
This User’s Guide uses these conventions:
Bold indicates emphasis or a minor heading. Italic refers to a document title or is used for emphasis.
COURIER type indicates text visible on a computer screen or keys on your computer keyboard.
DISPLAY FONT indicates text visible on the printer control panel display.
The letter λ is used in examples to distinguish the small letter l from the numeral 1 (one).
The character Ø is used in examples to distinguish the letter O from the numeral 0 (zero).
<Esc>, <CR>, <LF>, <FF>, etc. are control characters. Use a text editor to enter the equivalent of the character.
For example, to get <Esc> using a DOS text editor, hold down the Ctrl key; and press the [ (left square bracket)
key. Other text editors may vary.
NOTE: Notes contain important information set off from the text.
CAUTION: Caution messages appear before procedures, which, if not observed, could result in loss of data or in
damage to equipment.
WARNING: Warning messages alert you to a specific procedure or practice, which if not followed correctly, could
cause serious personal injury.
Security Printing Solutions User’s Guide -- 50-70540-001 Rev. A TOC-1
Table of Contents
Section 1 – Features Overview
Introduction ............................................................................................................................................1-1
How to Use This Manual........................................................................................................................1-3
Features Summary .................................................................................................................................1-4
Section 2 – Understanding TROY’s Features
Introduction ............................................................................................................................................2-1
Default and Temporary Printer Settings .............................................................................................2-1
Printer Security States...........................................................................................................................2-2
MICR Mode.....................................................................................................................................2-3
User Login Status ............................................................................................................................2-4
Keylock Switch.................................................................................................................................2-4
Softlock Settings...............................................................................................................................2-4
MICR Toner Cartridge Sensing.....................................................................................................2-4
Pre-Defined Security States............................................................................................................2-5
Standard Printer Features.....................................................................................................................2-7
MICR Mode Enabled......................................................................................................................2-7
MICR Mode Disabled .....................................................................................................................2-8
Jam Recovery Disable.....................................................................................................................2-8
TROY MICR Toner Cartridge Detection.....................................................................................2-9
MICR Toner Low/Off-Line............................................................................................................2-9
Automatic Print Density .................................................................................................................2-9
User-Selectable Printer Features ........................................................................................................2-10
Printer Type and MICR Mode.....................................................................................................2-10
Administrator Name and Password.............................................................................................2-12
User Names and Passwords..........................................................................................................2-13
Flash-File System...........................................................................................................................2-14
TROYmark™................................................................................................................................2-15
Security Printing Solutions User’s Guide -- 50-70540-001 Rev. A TOC-2
Table of Contents
Encryption / Decryption................................................................................................................2-17
Audit Reports.................................................................................................................................2-18
TROY Security Fonts....................................................................................................................2-20
Firmware Update Capability........................................................................................................2-21
Exact Positioning Technology ......................................................................................................2-21
Auto-Rotate Feature......................................................................................................................2-22
Paper Tray Mapping.....................................................................................................................2-22
Replaceable Escape Character.....................................................................................................2-23
Language Support.........................................................................................................................2-23
Decryption Mode...........................................................................................................................2-23
Hardware-Based Security Features....................................................................................................2-24
Printer Keylock..............................................................................................................................2-24
Paper Tray Locks..........................................................................................................................2-25
Paper Tray Security Cover...........................................................................................................2-25
Section 3 – System Planning and Implementation
Introduction ............................................................................................................................................3-1
Maintaining MICR Security..................................................................................................................3-1
Implementing the TROY Security Printing Solution..........................................................................3-2
Planning Worksheet...............................................................................................................................3-4
Section 4 – Using the TROY Printer Utility
Introduction ............................................................................................................................................4-1
Menu Structure.......................................................................................................................................4-2
Basic Printer Utility Operations............................................................................................................4-3
Managing System Security ....................................................................................................................4-5
Setting the Administrator Password..............................................................................................4-5
Security Printing Solutions User’s Guide -- 50-70540-001 Rev. A TOC-3
Table of Contents
Assigning User Names and Passwords ..........................................................................................4-7
Selecting Security Options............................................................................................................4-10
Re-Mapping Printer Paper Trays................................................................................................4-13
Setting Regional Options ..............................................................................................................4-14
Selecting Data Capture Fonts for Audit Reports and TROYmark™......................................4-15
Identifying Your Installed Printer Driver Type.........................................................................4-16
Generating the TROYmark™ Background Pattern..................................................................4-17
Implementing the Secure Seal Feature........................................................................................4-19
Using the Pattern Processor ................................................................................................................4-19
Printing the Pattern Processor Report........................................................................................4-20
Managing Audit Reports .....................................................................................................................4-21
Adjusting the MICR Line and/or Page Image Positioning...............................................................4-25
Using the Auto-Rotate Feature............................................................................................................4-27
Managing Printer Resources...............................................................................................................4-28
Printing a List of Printer Resources............................................................................................4-28
Adding Printer Resources.............................................................................................................4-29
Deleting Printer Resources...........................................................................................................4-30
Updating the Printer Firmware..........................................................................................................4-31
Printing Test and Demonstration Pages.............................................................................................4-32
Verifying MICR Print Quality.....................................................................................................4-32
Identifying Print Defects...............................................................................................................4-33
Accessing TROY Fonts Using Non-Windows Applications.......................................................4-34
Verifying Windows Font Support................................................................................................4-34
Verifying PCL 5e Communication...............................................................................................4-36
Verifying Printer Configuration..................................................................................................4-39
Downloading Files to the Printer ........................................................................................................4-40
Obtaining Technical Assistance ..........................................................................................................4-41
Security Printing Solutions User’s Guide -- 50-70540-001 Rev. A TOC-4
Table of Contents
Section 5 – Using the TROY Port Monitor
Introduction ............................................................................................................................................5-1
Installing the TROY Port Monitor.......................................................................................................5-3
Accessing the TROY Port Monitor.......................................................................................................5-3
Using the TROY Port Monitor..............................................................................................................5-5
Connection Tab................................................................................................................................5-5
Encryption Tab................................................................................................................................5-6
Security Tab.....................................................................................................................................5-7
Section 6 – Using the Printer Control Panel
Introduction ............................................................................................................................................6-1
Security....................................................................................................................................................6-1
Functionality...........................................................................................................................................6-1
Accessing Printer Features.............................................................................................................6-2
Entering the Administrator Password...........................................................................................6-2
Saving/Restoring Printer Settings..................................................................................................6-3
TROY Security Printing Solution Menu Map.....................................................................................6-4
Using the Exact Positioning Technology ..............................................................................................6-6
Section 7 – Using TROY Fonts
Introduction ............................................................................................................................................7-1
Accessing and Using TROY Fonts........................................................................................................7-1
Accessing the TROY Fonts Using Windows Applications...........................................................7-1
Accessing the TROY Fonts Using Non-Windows Applications..................................................7-1
Using TROY MICR Fonts..............................................................................................................7-2
Using the Convenience Amount Fonts...........................................................................................7-2
Using the TROY Security Fonts.....................................................................................................7-2
Using the TROY Messaging Fonts.................................................................................................7-2
Security Printing Solutions User’s Guide -- 50-70540-001 Rev. A TOC-5
Table of Contents
Using the TROY OCR Fonts..........................................................................................................7-2
Using the Reverse Helvetica Font ..................................................................................................7-2
Using the TROY AutoProtect Font................................................................................................7-3
Using the TROY Microprint Font .................................................................................................7-3
Using the POSTNET Font ..............................................................................................................7-3
Using the British Pound and Euro Symbols..................................................................................7-3
Using the Data Capture Fonts........................................................................................................7-4
Using Printer Fonts and Screen Fonts..................................................................................................7-6
MICR Font Guidelines...........................................................................................................................7-7
Priority of Font Locations...............................................................................................................7-7
Font Character Mapping.......................................................................................................................7-8
Determining a Character Mapping ...............................................................................................7-9
Accessing Unmapped Characters ..................................................................................................7-9
Standard ASCII Character Set....................................................................................................7-10
TROY MICR E-13B 12-Point Font .............................................................................................7-11
TROY MICR CMC-7 12-Point Font...........................................................................................7-12
TROY Enhanced Convenience Amount (Scalable)....................................................................7-12
TROY Large Convenience Amount 18-Point Font....................................................................7-13
TROY Small Convenience Amount 24-Point Font.....................................................................7-13
TROY AutoProtect™ Font...........................................................................................................7-14
TROY Security Font (Scalable) ...................................................................................................7-14
TROY Security Font (Spanish)(Scalable)...................................................................................7-14
TROY Reverse Helvetica Font.....................................................................................................7-15
TROY OCR-A Font (Scalable).....................................................................................................7-16
TROY OCR-B Font (Scalable).....................................................................................................7-18
TROY UPC-A Barcode.................................................................................................................7-20
TROY UPC-E Barcode.................................................................................................................7-21
Security Printing Solutions User’s Guide -- 50-70540-001 Rev. A TOC-6
Table of Contents
TROY EAN-8 Barcode..................................................................................................................7-22
TROY EAN-13 Barcode................................................................................................................7-23
TROY BC25 Barcode....................................................................................................................7-24
TROY BC39 Barcode....................................................................................................................7-25
TROY BC128 Barcode..................................................................................................................7-26
TROY POSTNET..........................................................................................................................7-27
TROY POSTNET Reverse (optional)..........................................................................................7-28
International Convenience Amount Fonts.........................................................................................7-29
British Large Convenience Amount Font ...................................................................................7-29
French Large Convenience Amount Font...................................................................................7-29
Italian Large Convenience Amount Font....................................................................................7-29
Spanish Large Convenience Amount Font..................................................................................7-29
British Small Convenience Amount Font....................................................................................7-30
French Small Convenience Amount Font ...................................................................................7-30
Italian Small Convenience Amount Font....................................................................................7-30
Spanish Small Convenience Amount Font..................................................................................7-30
Section 8 – Troubleshooting / Error Messages
Troubleshooting by Symptom...............................................................................................................8-1
Troubleshooting by Printer Control Panel Display Message...........................................................8-10
Software Uninstall Procedures............................................................................................................8-16
Appendix A – Duplexer Installation
Installing the Duplexer Assembly ........................................................................................................A-1
Security Printing Solutions User’s Guide -- 50-70540-001 Rev. A TOC-7
Section 1 Features Overview
Introduction
Thank you for purchasing your TROY Security Printing Solution. You have chosen the highest quality MICR (Magnetic Ink Character Recognition) printing solution available today that offers convenience, flexibility, security, and precision for printing high-quality MICR documents.
This User’s Guide provides information for setting up and using your TROY Security Printing Solution. The TROY Security Printing Solutions covered in this User’s Guide are available in the product configurations described below:
TROY MICR Font Memory Card – designed for use in selected Hewlett-Packard LaserJet printers, the
TROY MICR Font Memory Card features an enhanced collection of MICR, OCR (Optical Character Recognition), barcode, and security fonts designed for printing financial documents. None of the operational or security features listed in this guide pertain to this product. This product can be added to a standard Hewlett Packard printer.
TROY MICR Secure Memory Card – designed for use in selected Hewlett-Packard LaserJet printers, the
TROY MICR Secure Memory Card features an enhanced collection of MICR, OCR (Optical Character Recognition), security fonts, and barcode fonts. The TROY MICR Secure Memory Card also includes several convenient, easy-to-use operational and security features, including a flash-file system for storage of public printing resources such as company logos, electronic forms, and custom fonts. The TROY MICR Secure Memory Card automatically configures the printer to create the highest quality MICR documents possible and prevents inadvertent printing of duplicate checks.
TROY MICR Printer – a Hewlett-Packard printer pre-configured with the TROY MICR Memory Card,
plus TROY’s MICR toner sensing system, a TROY MICR toner cartridge, and optional input paper tray locks. This product is designed for printing high-quality MICR documents and utilizes several convenient, easy-to-use operational features, including a flash-file system for storage of printing resources such as company logos, electronic forms, and custom fonts.
TROY MICR Secure Printer – a Hewlett-Packard printer pre-configured with the TROY MICR Secure
Memory Card (described above), plus TROY’s MICR toner sensing system, a TROY MICR toner cartridge, and optional input paper tray locks. This product is designed for the secure printing of high­quality MICR documents and utilizes several convenient, easy-to-use operational and security features, including a flash-file system for storage of printing resources such as company logos, electronic forms, and custom fonts.
Security Printing Solutions User’s Guide -- 50-70540-001 Rev. A 1-1
Section 1 Features Overview
Introduction (cont.)
TROY MICR Secure EX Printer – a Hewlett-Packard printer pre-configured with the TROY MICR
Secure Memory Card (described on the previous page), plus TROY’s MICR toner sensing system, a TROY MICR toner cartridge, a printer keylock switch, input paper tray locks, and also includes the TROYmark feature, AutoProtect font, and Secure Seal technology. This top-of-the-line product is designed for the secure printing of high-quality MICR documents and utilizes several convenient, easy-to­use operational and security features, including a flash-file system for storage of printing resources such as company logos, electronic forms, and custom fonts.
TROY IRD Printer – a Hewlett-Packard printer pre-configured with the TROY MICR Memory Card
(described on the previous page), plus TROY’s MICR toner sensing system, a TROY MICR toner cartridge, a duplexer, and optional input paper tray locks. This product is designed for printing high­quality IRD MICR documents and utilizes several convenient, easy-to-use operational features, including a flash-file system for storage of printing resources such as company logos, electronic forms, and custom fonts.
TROY IRD Secure EX Printer – a Hewlett-Packard printer pre-configured with the TROY MICR Secure
Memory Card (described on the previous page), plus TROY’s MICR toner sensing system, a TROY MICR toner cartridge, a printer keylock switch, input paper tray locks, a duplexer, and also includes the TROYmark feature, AutoProtect font, and Secure Seal technology. This top-of-the-line product is designed for the secure printing of high-quality IRD MICR documents and utilizes several convenient, easy-to-use operational and security features, including a flash-file system for storage of printing resources such as company logos, electronic forms, and custom fonts.
NOTE: This User’s Guide covers all configurations of TROY Security Printing Solutions. Therefore, some of the topics and/or features described in this manual may not be applicable to your specific TROY Security Printing Solution.
Security Printing Solutions User’s Guide -- 50-70540-001 Rev. A 1-2
Section 1 Features Overview
How to Use this Manual
Before setting up your new TROY Security Printing Solution, it is recommended that you read the first three sections of this User’s Guide to familiarize yourself with the features available of your TROY Security Printing Solution, and to develop an implementation plan for setting up and managing your TROY printing environment.
A RECOMMENDED APPROACH FOR USING THIS MANUAL IS AS FOLLOWS:
Familiarize Yourself with the Features of Your TROY Security Printing Solution: Begin by reading the
summary of TROY features (listed on the following pages) designated for your TROY Security Printing Solution. These summaries quickly introduce all of the user-selectable features available in each of the TROY Security Printing Solutions. Many of these features can be enabled/disabled or configured to meet the needs of your MICR printing environment. Identify the features specific to your TROY Security Printing Solution and decide which of these features you wish to implement within your MICR printing environment.
Study the Features You Wish to Implement: Read Section 2 – Understanding TROY’s Features for a
description of the TROY Security Printing Solutions features you wish to implement.
Develop an Implementation Plan: Read Section 3 – System Planning and Implementation for suggestions
on developing an implementation plan that will allow you to efficiently setup and manage your MICR printing system. Planning your MICR printing system configuration in advance will minimize the setup time and optimize your day-to-day operations.
Roll Out the Implementation Plan: Use the procedures in Section 4 – Using the TROY Printer Utility,
Section 5 – Using the TROY Port Monitor, Section 6 – Using the Printer Control Panel, and Section 7 –
Using TROY Fonts to roll out the implementation plan for your TROY Security Printing Solution.
NOTE
: If you have any difficulties using your TROY Security Printing Solution, please refer to Section 8 – Troubleshooting / Error Messages for more information. If you need additional assistance, please call TROY Technical Support at (800) 332-6427 Monday through Friday, 8:00 AM to 8:00 PM, Eastern Standard Time.
Security Printing Solutions User’s Guide -- 50-70540-001 Rev. A 1-3
Section 1 Features Overview
Features Summary
The TROY features listed below allow you to customize the operation of your TROY Security Printing Solution, adding flexibility, convenience, and security. Some of these features may not be available for your specific type of Security Printing Solution. The following table summarizes the TROY product features and availability:
*Product Code
1 = TROY MICR / IRD Secure EX Printer 2 = TROY MICR Secure Printer / TROY MICR Secure Memory Card Kit 3 = TROY MICR / IRD Printer 4 = TROY Font Memory Card Kit
Feature Description Access Product
TROY MICR Fonts Prints the MICR line at the bottom of the check using the ANSI E-13B or the
ISO CMC-7 MICR font
TROY Convenience Fonts
TROY Security Fonts Prints the legal amount information on the check for security and readability
TROY OCR Fonts Prints names and address on the check that are to be read by automated
TROY Microprint Font Prints security messages on checks that cannot be reproduced by
TROY Barcode and POSTNET Fonts
British Pound and Euro Symbols
TROY AutoProtect™ Font
Secure Seal Technology
TROY Invisible Font Adds text to the check that will not print in the main body of the check or
TROYmark™ Prints a user-defined repeating background diagonally on the check using
User Names and Passwords
Prints the check amount information in the Legal Amount field of the check for increased readability
(English and Spanish)
optical readers
photocopying Prints several types of industry-standard barcodes for a variety of uses, and
also includes a POSTNET font for printing the U.S. postal bar code that represents the 9-digit zip code printed below the postal address
Used as the British or European currency symbol for the respective country (used in place of U.S dollar sign). These symbols can be selected to print in the audit reports. The decimal point or comma (default) can be selected.
Provides a visual safeguard to identify checks printed without TROY MICR toner and/or the TROY MICR font
Encodes check information (e.g., payee, account #, amount, etc.) into a seal (or logo) printed on the check that can only be read by decoding software
check stub but can be captured for use in the audit report or the TROYmark background image that is printed diagonally on the face of the check
redundant check information to prevent fraud Provides user-level security for the secure resources (MICR font, signatures,
macros) stored in the printer memory
(Application) 1, 2, 3, 4
(Application) 1, 2, 3, 4
(Application) 1, 2, 3, 4
(Application) 1, 2, 3, 4
(Application) 1, 2, 3, 4
(Application) 1, 2, 3, 4
(Application) 1, 2, 3, 4
(Application) 1
(Application) 1, 2
(Application) Printer Utility
Port Monitor 1
Port Monitor Printer Utility
1
1, 2
Security Printing Solutions User’s Guide -- 50-70540-001 Rev. A 1-4
Section 1 Features Overview
Features Summary (cont.)
Feature Description Access Product
Control Panel Password
Data Encryption / Decryption
Audit Reports Records and prints a selectively detailed report of the MICR printing activity by
Flash-File System Uses a non-volatile memory area of the T ROY memory card to store
Flash Memory Update
Exact Positioning Technology
Auto-Rotate Allows 180-degree rotation of your check image so that the MICR line prints
Paper Tray Re­mapping
MICR Toner Cartridge Sensing
3-Position Keylock Uses a physical key to select the mode of the printer – Printer Locked (no
Soft-Lock Allows the administrator to set a 4-digit PIN to prevent users from disabling the
Job Lock Restricts the printing of a specific print job to users having the PIN (personal
Paper Tray Security Cover
Paper Tray Locks Allows paper trays to be locked to prevent unauthorized access to check stock
Replaceable Escape Character
Allows only administrators to access the MICR features from the printer control panel by using a unique password
Provides encryption of data sent over a public network to the MICR printer and decryption of the data at the printer
capturing user-selected information from each check during a print job
signatures/logos, macros, forms, etc. Allows administrators to download firmware maintenance or feature updates
into to the TROY memory card Allows vertical and horizontal repositioning of the MICR line on the check or
repositioning and/or rotation of the entire page
on the leading edge of the printed page Overrides the printer default paper tray assignment with user tray assignment
preferences (e.g., paper tray #2 reassigned to be used as paper tray #1) Selects either continuous MICR toner cartridge sensing or checks for MICR
toner only when a TROY MICR font is used to prevent the printing of MICR documents using non-MICR toner
printing), MICR Locked (print non-MICR documents only), Print MICR (MICR fonts/secure resources are available)
Printer Locked mode or the MICR Locked mode
identification number) associated with the print job Prevents rear access to the check stock stored inside the printer paper trays Printer
stored inside the printer Allows an alternate ASCII character to be used to represent a particular ASCII
escape character used in PCL commands when that escape character cannot be used in Windows
Control Panel 1, 2, 3
Port Monitor 1, 2
Printer Utility Control Panel
(Application) Printer Utility
Printer Utility 1, 2, 3
Printer Utility Control Panel
Printer Utility Control Panel
Printer Utility 1, 2, 3
Printer Utility Control Panel
Printer 1
Printer Utility Control Panel
Printer Utility Control Panel
Printer
Port Monitor Printer Utility Control Panel
1, 2
1, 2, 3
1, 2, 3
1, 2, 3, 4
1, 2, 3 (except Font kit)
1, 2
1, 2
1, (option for #2)
1, (option for #2)
1, 2, 3
Security Printing Solutions User’s Guide -- 50-70540-001 Rev. A 1-5
Section 2 Understanding TROY’s Features
Introduction
Default and Temporary Printer Settings
TROY Security Printing Solutions offer many convenient features for managing and printing high-quality MICR documents in single or multi-user environments. This section provides detailed descriptions of the features built into the TROY Security Printing Solutions. For specific operating procedures and guidelines, refer to the appropriate sections of this guide for using the TROY Printer Utility, TROY Port Monitor, and printer control panel.
TROY standard security features (described on page 2-7) provide the basic functionality built into each TROY
Security Printing Solution. These features operate automatically and cannot be defeated or re-configured by the
user. TROY user-selectable security features (refer to page 2-12) offer additional configuration flexibility to
selected TROY Security Printing Solutions.
NOTE: This section covers all the features of TROY Secure Printing Solutions. Therefore, some of the topics and/or features described may not be applicable to your specific TROY Security Printing Solution. Refer to the features summary in Section 1 of this User’s Guide.
Each feature of a TROY Security Printing Solution has a default setting within the printer. These default settings determine how each printer feature will function when a print job is sent to the printer. The administrator can change the default settings to meet the needs of a variety of MICR printing environments using the TROY Printer Utility or the printer control panel.
There are also a number of features that can be varied on a print job by print job basis. Using data encryption and default paper tray mappings are examples of job-specific features. After each print job completes, all feature settings return to their default values. Use the TROY Port Monitor to select job-specific features. Refer to
Section 5 – Using the TROY Port Monitor - for more detailed information.
Security Printing Solutions User’s Guide -- 50-70540-001 Rev. A 2-1
Section 2 Understanding TROY’s Features
Printer Security States
To help maintain a secure MICR printing environment, TROY Security Printing Solutions have security features that, in combination, create security states. The interdependency of these security states ensures the integrity of the MICR printing security features, which can be enabled and/or configured to meet your specific security requirements. These features can be accessed through the TROY Printer Utility or the printer control panel. It is important that the administrator create a unique administrator password to safeguard the security settings by preventing unauthorized access to the TROY Printer Utility and the printer control panel.
The MICR functions built into the TROY Security Printing Solutions operate under a pre-defined set of security states. When a MICR print job is sent to the printer, the TROY printer firmware monitors up to four security states to determine if the pre-defined set of conditions is correct to allow the MICR job to print.
These four security states, monitored sequentially, are as follows:
MICR mode – MICR mode enabled or disabled (software-based feature)
Login status – Valid user name and password entered (optional)
Keylock switch position and/or Softlock setting – MICR Locked, Printer Locked, or Print MICR modes
MICR toner cartridge sensing – TROY MICR toner cartridge installed in printer
NOTE: The printer keylock switch is present on TROY MICR / IRD Secure EX printers only. MICR toner cartridge sensing is present on all TROY printer models. The Softlock feature is present on TROY MICR Secure, MICR / IRD Secure EX printers, and MICR Secure Memory Card Kits only.
Security Printing Solutions User’s Guide -- 50-70540-001 Rev. A 2-2
Section 2 Understanding TROY’s Features
MICR Mode
TROY Security Printing Solutions can be set to a default MICR mode of either ENABLED or DISABLED to suit the security requirements of your MICR printing environment. MICR mode must be enabled to allow the printing of MICR checks and documents. The following table describes the operational characteristics of the MICR mode enabled and disabled states. Refer to page 2-7 in this section for detailed information.
MICR Mode Operational Characteristics
MICR ENABLED
MICR DISABLED
A TROY MICR font call will cause the user login, printer keylock switch, Softlock, and MICR toner cartridge statuses to be checked for MICR printing availability. If the correct conditions exist (authorized user login, keylock switch set to appropriate setting, Softlock PIN validated, and a MICR toner cartridge installed), the MICR print job will proceed normally. Sending a MICR will change the MICR
A TROY MICR font call will cause an alternate font to be automatically substituted using the same font data. The current status of the printer keylock switch, Softlock, or presence of a MICR toner cartridge will not affect the MICR printing availability. MICR cannot be printed with MICR mode Sending a MICR ENABLE command will change the MICR DISABLED mode to MICR ENABLED.
ENABLED mode to MICR DISABLED.
DISABLE command
DISABLED.
NOTE: The printer keylock switch is present on TROY MICR / IRD Secure EX printers only. MICR toner cartridge sensing is present on all TROY printer models. The Softlock feature is present on TROY MICR Secure, MICR / IRD Secure EX printers, and MICR Secure Memory Card Kits only.
Security Printing Solutions User’s Guide -- 50-70540-001 Rev. A 2-3
Section 2 Understanding TROY’s Features
User Login Status
Keylock Switch
Softlock Settings
MICR Toner Cartridge Sensing
If the administrator has implemented user names and passwords, a valid user name and password must be provided in the TROY Printer Utility or entered at the printer control panel before any of the printer’s secure resources can be accessed or a MICR print job can be printed. Refer to page 2-13 in this section for detailed information.
The 3-position printer keylock switch allows the printer’s secure resources to be locked out (allowing only non-MICR documents to print), or the printer can be completely disabled (no documents can be printed). The printer keylock switch overrides all MICR mode settings selected in either the TROY Printer Utility or the TROY Port Monitor. Refer to page 2-24 in this section for detailed information.
The Softlock feature prevents unauthorized printing of documents (selectable to lock out either MICR, non­MICR, or all documents) by requiring that a valid 4-digit PIN (Personal Identification Number) be entered at the
printer control panel before a job will print. On TROY MICR Secure EX printers, the Softlock feature works in
conjunction with the physical 3-position printer keylock switch, adding an additional layer of security and providing an alternate method for controlling access to print jobs. Refer to page 4-10 for detailed information.
To prevent the printing of MICR documents with standard (non-MICR) toner, all TROY printers are designed to detect the presence of a TROY MICR toner cartridge installed inside the printer. A MICR toner cartridge must be installed in the printer before printing MICR documents. Banks will reject all checks not printed with MICR toner and you may be charged a manual processing fee for each rejected (machine-unreadable) check. Refer to
page 2-9 in this section for detailed information.
Security Printing Solutions User’s Guide -- 50-70540-001 Rev. A 2-4
Section 2 Understanding TROY’s Features
Pre-defined Security States
The following table describes the general pre-defined security states built into TROY Security Printing Solutions.
Φ TROY MICR / IRD Secure EX Printers Only
Security Printing Solutions Feature
Print TROY E13-B MICR font Print TROY CMC-7 MICR font
Print TROY Convenience Amount fonts
Access TROY Auxiliary fonts (Data Capture, OCR, AutoProtect
Access signatures, fonts, logos, forms, and macros stored in the secure
Access signatures, fonts, logos, forms and macros stored in the public
Use the TROYmark™ feature for the background image on your checks
Encrypt MICR print data sent to your MICR printer over a network
Add or delete a printer user name and password
Print an audit report
Use Exact Positioning Technology feature to adjust the MICR line position on your printed checks
, Messaging, Microprint, Security, etc.)
memory area of the printer
memory area of the printer
Required Security State
(MICR Printers)
MICR mode enabled MICR toner cartridge installed
N/A Valid user login
N/A Valid user login
N/A Valid user login
(No security requirements) (No security requirements)
N/A
N/A
N/A Valid administrator login
N/A Valid user login
Valid administrator login Valid administrator login
Required Security State
(MICR Secure Printers)
MICR mode enabled TROY MICR toner cartridge installed Valid user login Valid PIN entered for Softlock (if
enabled) Keylock switch set to Print MICR Φ
Valid user login Φ
Encryption and decryption passwords must be the same
Security Printing Solutions User’s Guide -- 50-70540-001 Rev. A 2-5
Section 2 Understanding TROY’s Features
Pre-defined Security States (cont.)
Use the Auto-Rotate Feature
Re-map the printer paper trays
Print a list of the printer’s secure resources
Add or delete secure printer resources in the printer’s flash-file system
Update the printer firmware
Print the MICR Quality Document MICR mode enabled
Print the Windows Security Font demonstration page
Print the PCL MICR demonstration page MICR mode enabled
Print the printer configuration page
Valid administrator login Valid administrator login
Valid administrator login Valid administrator login
Valid administrator login Valid administrator login
Valid administrator login Valid administrator login
Valid administrator login Valid administrator login
MICR toner cartridge installed
MICR mode enabled MICR toner cartridge installed Valid user login Valid PIN entered for Softlock (if
enabled)
MICR toner cartridge installed
(No security requirements) (No security requirements)
Φ TROY MICR / IRD Secure EX Printers Only
MICR mode enabled TROY MICR toner cartridge installed Valid user login Valid PIN entered for Softlock (if
enabled) Keylock switch set to Print MICR Φ MICR mode enabled TROY MICR toner cartridge installed Valid user login Valid PIN entered for Softlock (if
enabled) Keylock switch set to Print MICR Φ MICR mode enabled TROY MICR toner cartridge installed Valid user login Keylock switch set to Print MICR Φ
Security Printing Solutions User’s Guide -- 50-70540-001 Rev. A 2-6
Section 2 Understanding TROY’s Features
Standard Printer Features
MICR Mode Enabled
In addition to the printing features provided in the Hewlett-Packard LaserJet printers, TROY Security Printing Solutions include additional functionality specifically designed for printing high-quality MICR documents. These standard printer features are included in all TROY Security Printing Solutions and function automatically without user intervention.
To print MICR (Magnetic Ink Character Recognition) on financial documents and checks, TROY printers use a
special MICR mode. With MICR mode enabled (factory default MICR mode is MICR Enabled), specific printer
features are automatically set to the required mode for printing MICR documents. In addition, TROY printers will check for the presence of a TROY MICR toner cartridge, the state of the Softlock feature, and the position of the printer keylock switch to determine if the proper security states exist (i.e., TROY MICR toner cartridge
installed, valid PIN entered for Softlock feature, printer keylock switch set to Print MICR) to allow MICR
printing using TROY Security fonts. MICR mode provides the following special features:
Enables access to the TROY Security fonts.
Displays Load MICR TONER on the printer control panel, and will not print MICR documents if a TROY
MICR toner cartridge is not installed when the keylock switch is set to Print MICR.
Disables Jam Recovery feature (does not allow the automatic reprinting of a document after a paper jam).
Automatically sets the Print Density (lightness/darkness of the printed characters) to the necessary value
required for high-quality MICR printing.
Places the printer off-line after a LOW MICR TONER message.
Maintains full PCL (Printer Control Language) functionality.
NOTE: If MICR mode is not enabled and an attempt is made to use the TROY MICR font, an alternate font will automatically be substituted for the MICR font.
NOTE
: The printer keylock switch is present on TROY MICR / IRD Secure EX printers only. The Softlock feature is present on TROY MICR Secure, MICR / IRD Secure EX printers, and MICR Secure Memory Card Kits only.
Security Printing Solutions User’s Guide -- 50-70540-001 Rev. A 2-7
Section 2 Understanding TROY’s Features
MICR Mode Disabled
Jam Recovery Disable
With MICR mode disabled, the printer functions as a normal Hewlett-Packard LaserJet printer in standard PCL (Printer Control Language) mode with all MICR features disabled. In PCL mode, the TROY Security Printing Solutions provide the following features:
Switches Jam Recovery ON (any page that did not properly exit the printer will be automatically
reprinted).
Enables printing with or without a MICR toner cartridge installed.
Blocks access to fonts stored in the secure memory area of the TROY flash-file system but continues to
allow access to the Convenience Amount fonts.
The toner low/off-line function will be set to the user default condition.
A major security concern is the possibility of printing duplicate MICR documents after a paper jam, without the printer or application software acknowledging the event. With MICR mode disabled, TROY printers will automatically reprint pages being processed by the printer when a paper jam occurs.
With MICR mode enabled, the Jam Recovery function is disabled to prevent the unwanted reprinting of a financial document. When a paper jam occurs, all information being processed will be erased from the printer memory (all image-processed pages that have not reached the output tray will be lost). Up to three pages of data could be lost. When a paper jam occurs, the software application should provide the necessary jam recovery options and reprint any documents lost during the jam.
Security Printing Solutions User’s Guide -- 50-70540-001 Rev. A 2-8
Section 2 Understanding TROY’s Features
TROY MICR Toner Cartridge Detection
MICR Toner Low/Off-Line
Automatic Print Density
TROY printers use a MICR toner cartridge detection sensor designed to detect the presence of a TROY MICR toner cartridge installed in the printer. If MICR mode is enabled with the Softlock feature disabled (valid PIN
entered) and/or the printer keylock switch set to Print MICR, and a TROY MICR toner cartridge is not installed when an attempt is made to use a MICR font, the LOAD MICR TONER message will display on the printer control
panel and the MICR features will be disabled. In order to proceed with MICR printing, you must replace the
non-MICR toner cartridge with a TROY MICR toner cartridge, and then press CONTINUE to proceed -- or press
CANCEL to stop the print job.
NOTE: TROY Security Printing Solutions require the use of TROY MICR toner cartridges to print MICR documents. For information on MICR toner, refer to the TROY MICR Basics Handbook, Section 4 - Selecting Check Paper and MICR Toner.
NOTE: The printer keylock switch is present on TROY MICR / IRD Secure EX printers only. The Softlock feature is present on TROY MICR Secure, MICR / IRD Secure EX printers, and MICR Secure Memory Card Kits only.
Printing when toner is low may cause reader/sorter misreading at the bank due to low MICR signal levels. When the printer is switched into MICR mode ENABLED and a toner low condition occurs, the printer will go off-line,
and a LOW TONER message will be displayed on the printer control panel. You should replace the used toner
cartridge with a new TROY MICR toner cartridge before you place the printer back on-line.
NOTE: To ensure consistent MICR print quality, always replace the TROY MICR toner cartridge when your TROY printer first displays a LOW TONER message.
Each time the printer is switched to MICR mode enabled, the print density is automatically set to a pre­determined value required for MICR printing. If the user changes the density setting to accommodate a non­MICR print job, the density will automatically return to the pre-determined MICR value when the printer is switched back to MICR mode ENABLED.
NOTE: You can change the density setting; however, the printer will ignore the setting and use the pre-determined MICR setting when printing MICR documents. TROY does not support any density setting other than the pre­determined MICR density value.
Security Printing Solutions User’s Guide -- 50-70540-001 Rev. A 2-9
Section 2 Understanding TROY’s Features
User­Selectable Printer Features
Printer Type and MICR Mode
The user-selectable printer features allow you to customize the operation of your TROY Security Printing Solution, adding flexibility, convenience and security. The TROY Printer Utility is designed to assist the administrator with the configuration of the printer’s default MICR and security features (refer to Section 4 –
Using the TROY Printer Utility for detailed information). The TROY Port Monitor is designed to allow
authorized users access to the printer’s secured resources and to select print job-specific features (refer to Section
5 – Using the TROY Port Monitor for detailed information). Before making any changes to the factory default printer settings, the administrator should refer to Section 3 – System Planning and Implementation to obtain
helpful suggestions for setting up and managing your MICR printing system.
TROY Security Printing Solutions can be set to one of four pre-defined Printer Types to suit the security
requirements of your MICR printing environment. MICR mode must be enabled to allow the printing of MICR documents. If a user attempts to print MICR documents with MICR mode disabled, the documents will print;
however, an alternate font will be automatically substituted for the MICR font. The MICR On setting provides the lowest level of security, while the MICR Off with Timeout setting provides the highest level of security for
MICR printing.
The Printer Type determines the default MICR mode (either MICR enabled or MICR disabled) for the MICR printer. The default MICR mode is the default state of the TROY Security Printing Solutions printer (either
MICR enabled or MICR disabled) when the printer is first powered up and/or when the current MICR print job has finished (depending on the printer type selected). Specific commands written into your check-writing application will automatically enable and disable MICR mode as needed for your MICR printing environment; however, the printer will always automatically reset itself to the pre-defined MICR mode when the printer is first powered up or when the current MICR print job has finished. The table on the next page describes the user-
selectable Printer Types that can be selected using the TROY Printer Utility.
NOTE: All TROY Security Printing Solutions are shipped from the factory with the default MIC R mode set to “MICR Enabled”.
Security Printing Solutions User’s Guide -- 50-70540-001 Rev. A 2-10
Section 2 Understanding TROY’s Features
Printer Type and MICR Mode (cont.)
Printer Type Feature Description Security Level
MICR Off (timeout)
MICR Off
MICR Always
MICR On
(factory default)
The default MICR mode is DISABLED. At the end of every print job, the MICR mode will automatically be set to disabled.
The default MICR mode is DISABLED. When the printer is powered ON, the MICR mode will automatically be set to disabled.
The default MICR mode is ENABLED. When the printer is powered ON, the MICR mode will automatically be set to enabled.
The default MICR mode is ENABLED. When the printer is powered ON, the MICR mode will automatically be set to enabled.
High
Medium-High
Medium-High
Medium
NOTE: All TROY Security Printing Solutions are shipped from the factory with the default MIC R mode set to “MICR Enabled”.
Security Printing Solutions User’s Guide -- 50-70540-001 Rev. A 2-11
Section 2 Understanding TROY’s Features
Administrator Name and Password
TROY Security Printing Solutions use an administrator password to secure the printer features and settings. The
printer uses a permanent default user name (ADMIN) that cannot be deleted or modified; however, the
administrator password can be modified using the TROY Printer Utility or the printer control panel. The administrator default password is no password (displayed as zero on the printer control panel and as a blank password field in the TROY Printer Utility); however, administrators are encouraged to setup a unique password to restrict access to the TROY Security Printing Solution’s features and settings. After an administrator password is set, all standard Hewlett-Packard printer features normally available through the printer control panel will remain accessible to anyone without entering a password.
NOTE: The administrator’s password is stored in the printer’s non-volatile flash memory and will remain resident even when the printer power is turned OFF.
NOTE: It is the administrator’s responsibility to safeguard all name and password information, including printouts and the electronic name and password lists (UPL files) saved on the administrator’s computer.
Although the administrator password can be set via the printer control panel, TROY strongly recommends using the TROY Printer Utility to select or modify the administrator password (see note below). The TROY Printer Utility will automatically update the printer’s administrator password whenever the password is changed in the printer utility. However, changing the administrator password at the printer control panel will not update the TROY Printer Utility password (no bi-directional communication). The administrator password stored in the printer and the TROY Printer Utility must be identical in order to access the printer features using the TROY Printer Utility.
NOTE: Initially, the default password for the printer is blank (no password). To maintain printer security, it is strongly recommended that the administrator change the password to prev ent unauthorized access to the printer control panel.
NOTE: If you plan to use the TROY Printer Utility exclusively to set or enter the administrator password (recommended), then both letters and numbers may be used for the administrator password.
Security Printing Solutions User’s Guide -- 50-70540-001 Rev. A 2-12
Section 2 Understanding TROY’s Features
User Names and Passwords
The user names and passwords feature allows the administrator to set up to 20 user names and passwords (one administrator and 19 users) to prevent unauthorized access of the TROY Security Printing Solution’s secure resources and other security features. All names and passwords are stored in the secure memory area of the TROY flash-file system and can be assigned and/or modified by the administrator using the TROY Printer Utility. The administrator can print a list of active user names and passwords using the TROY Printer Utility or printer control panel.
A valid user login is required to access and use the following list of features from the printer control panel. These features are available in selected TROY Security Printing Solutions:
TROY Security fonts
TROYmark™
Resources stored in the secure memory area of the printer’s flash-file system
MICR mode selection
Paper tray mapping
Printing and/or deleting audit reports
Printing sample reports containing MICR characters (Windows Demo and PCL Demo pages)
User names will be automatically recorded in the audit data for each print job initiated by a user. The system default user password is blank (no password) and not entering a user password when assigning a new user will allow that user to access the TROY printer’s secure resources without using a password. Attempts to add duplicate users will be ignored. If you choose not to set up any user names and passwords, TROY strongly recommends that administrators set up an administrator password to prevent unauthorized access to the TROY printer features and settings from the TROY Printer Utility, the TROY Port Monitor, or the printer control panel.
Security Printing Solutions User’s Guide -- 50-70540-001 Rev. A 2-13
Section 2 Understanding TROY’s Features
Flash-File System
TROY Security Printing Solutions contain a non-volatile flash-file system that can be used to store printing
resources (company logos, forms, macros, etc.). TROY MICR Secure printers, MICR Secure EX printers, and MICR Secure Memory Card Kits have a flash-file system that is divided into a secure and public memory area. Digitized signatures, logos, and other proprietary printer resources are typically stored in the secure area of the
flash-file system to prevent unauthorized access to these resources. If user names and passwords are set up by the administrator, each user must log in to the printer using a valid user name and password to obtain access to these secure resources.
Public resources, such as commonly used company logos, forms, macros, or other non-proprietary printer
resources, can be stored in the public memory area of the flash-file system for access by all users without
requiring valid user login. All TROY Security Printing Solutions (except the Font Memory Card Kit) contain a public flash-file system.
By entering a valid administrator password, the administrator can use the TROY Printer Utility to add or delete these resources from the secure and/or public memory areas of the flash-file system.
NOTE: Resources stored in the printer’s flash-file system will remain resident even when the printer power is switched OFF.
NOTE: Only “clean” PCL macros can be saved and executed from the flash-file system. The macro cannot contain any PJL (Printer Job Language) or Esc E (reset) commands. If a macro was created in Windows by printing to a file using a PCL 5e printer driver, then you must open the macro file in a Hex editor and manually remove all PJL and Esc E commands before the macro can be used with the printer. Please refer to the Hewlett-Packard PCL manual for additional information.
Security Printing Solutions User’s Guide -- 50-70540-001 Rev. A 2-14
Section 2 Understanding TROY’s Features
TROYmark™
If using OS Win
2008,Vista,Win7
or using App . Net
contact Tech
support for
implementation
To discourage fraudulent alteration of the check, TROY MICR / IRD Secure EX printers (available as an option
for TROY MICR Secure printers and TROY MICR Secure Memory Card Kits) can produce a background watermark (printed as a diagonally repeating pattern across the face of the check) using user-defined information taken directly from the check data (i.e., convenience amount, payee name, etc.). For example, by capturing the convenience amount or payee name fields of the check, the anti-tampering watermark will be specific to each check, adding to the security of the printed document (see the example on the next page).
The special TROY fonts, used to generate the check information in the background image, must be defined for each available check field in order to capture the desired check data for use in TROYmark™ (refer to Section 4 –
Using the TROY Printer Utility). Once the TROYmark
Section 5 – Using the TROY Port Monitor), TROYmark
feature is enabled in the TROY Port Monitor (refer to
will remain active for the duration of the print job.
TROYmark™ can be selected to print at one of three pre-set density levels: light (approximately a 7% gray), medium (approximately an 11% gray), and dark (approximately a 15% gray). The administrator can also define three custom gray levels using the TROY Printer Utility. The background density is selected based upon the initial check design to ensure readability of the printed information on the check.
Once the desired check fields are selected for use in the background image, the inclusion and exclusion rectangles must then be defined (see page 5-8 for details). The inclusion rectangle (one area only) will contain the user­defined TROYmark™ image and the exclusion rectangle (up to ten selected exclusion areas) will remain void of any TROYmark™ image to ensure compliance with the ANSI X/9B check specifications. At a minimum, the exclusion rectangle must include an area surrounding the convenience amount. The TROY Messaging font can also be used to define data that can be included in the TROYmark™ image that will not actually appear elsewhere
on the check (refer to the Section 7 – Using TROY Fonts).
Security Printing Solutions User’s Guide -- 50-70540-001 Rev. A 2-15
Section 2 Understanding TROY’s Features
TROYmark™ (cont.)
(EXAMPLE OF THE TROYMARK
Security Printing Solutions User’s Guide -- 50-70540-001 Rev. A 2-16
BACKGROUND IMAGE INCORPORATED INTO A CHECK)
Loading...
+ 123 hidden pages