CASTLES TECHNOLOGY VEGA5000S EFT-POS Terminal Book 2 User Manual Confidential Version1.1 May 2014 Castles Technology Co., Ltd. 2F, No. 205, Sec. 3, Beixin Rd., XindianDistrict, New Taipei City 23143, Taiwan R.O.C. http://www.castech.com.tw WARNING Information in this document is subject to change without prior notice. No part of this publication may be reproduced, transmitted, stored in a retrieval system, nor translated into any human or computer language, in any form or by any means, electronic, mechanical, magnetic, optical, chemical, manual, or otherwise, without the prior written permission of Castles Technology Co., Ltd. All trademarks mentioned are proprietary of their respective owners. Castles Technology Co., Ltd. Confidential All Right Reserved. Pg. 2 Revision History Version Date Descriptions 1.0 1.01 1.1 Nov 18, 2012 Initial creation. May 12, 2014 Add the terminal starting up description May 12, 2014 Add the description of GDB via USB Castles Technology Co., Ltd. Confidential All Right Reserved. Pg. 3 Contents 1. Introduction .................................................................................................................. 6 1.1. Type of Terminal .................................................................................................. 6 2. Hardware Setup (Portable) .......................................................................................... 8 2.1. Parts of the Terminal ........................................................................................... 8 2.2. Inserting the Battery ........................................................................................... 11 2.3. Inserting the SAM Card ..................................................................................... 12 2.4. Inserting the Paper Roll ..................................................................................... 13 2.5. Inserting the GSM SIM Card .............................................................................. 14 2.6. Inserting the Memory card ................................................................................. 15 3. Basic Operation ......................................................................................................... 16 3.1. Program Manager .............................................................................................. 16 3.2. Download AP ..................................................................................................... 17 3.3. System Info........................................................................................................ 18 3.4. Memory Status .................................................................................................. 19 3.5. System Settings ................................................................................................. 20 3.6. Test Utility .......................................................................................................... 23 3.7. Factory Reset .................................................................................................... 25 3.8. Power Off .......................................................................................................... 26 3.9. Function Key Password Change ........................................................................ 27 3.10. Share Object Management ................................................................................ 28 3.11. CTOS TMS ........................................................................................................ 29 3.12. ULD Key Hash ................................................................................................... 30 4. Secure File Loading ................................................................................................... 31 4.1. ULD Key System ............................................................................................... 31 4.1.1. ULD Manufacturer Key ........................................................................... 31 4.1.2. ULD User Key ........................................................................................ 33 4.1.3. Key Change ........................................................................................... 33 4.2. File Signing ........................................................................................................ 34 4.2.1. Signing Kernel Module ........................................................................... 34 4.2.2. Signing User Files .................................................................................. 36 4.3. File Loading ....................................................................................................... 40 4.3.1. Download by User Loader ...................................................................... 40 4.3.2. Download by Removable Media ............................................................. 43 Castles Technology Co., Ltd. Confidential All Right Reserved. Pg. 4 4.4. Changing ULD User Key.................................................................................... 45 5. Font Management ...................................................................................................... 53 5.1. Loading New Font.............................................................................................. 53 5.2. Custom Font ...................................................................................................... 56 5.3. Using TrueType Font (TTF) ............................................................................... 64 6. Advance Features ...................................................................................................... 66 6.1. VEGA5000S GNU Project Debugger (GDB) ...................................................... 66 6.1.1. About GDB ............................................................................................. 66 6.1.2. SetupGDB .............................................................................................. 67 6.1.3. Start Debugging ..................................................................................... 68 7. Operation Notes ......................................................................................................... 72 7.1. Operation Notes ................................................................................................ 72 Castles Technology Co., Ltd. Confidential All Right Reserved. Pg. 5 1. Introduction This document provide a guildeline on operating and configuringCastles VEGA5000S terminal. The scope of this document includesetting up the terminal, basic operation, application life cycle, and some advance features. 1.1. Type of Terminal There are two types of VEGA5000S terminal, portable and countertop. The major different is portable type can be battery operated. Portable type is designed as two pieces of hardware, handset and base unit. Handset unit features major components, and also optional contactless reader and GRPS modem.Wired connection like power, modem, Ethernet, USB or serial ports, are be located in base unit. There are additional power connection and USB port on handset unit, allow the handset unit can be operated alone. Handset Base Front View Rear View Front View Rear View Side View Castles Technology Co., Ltd. Confidential All Right Reserved. Pg. 6 To start up the terminal,portable type needs to press F1 key butcountertop typewill auto start when the power connector is connected with adapter. Castles Technology Co., Ltd. Confidential All Right Reserved. Pg. 7 2. Hardware Setup (Portable) 2.1. Parts of the Terminal Front (Portable and Countertop) 13 1 2 4 9 12 11 10 8 3 5 6 7 VEGA5000S 1. LCD Display 9. Smart Card Reader ColorTFT : VEGA5000S 10. LED 2. ProgrambleFunction Keys F1 : Power keyfor PT only.(Press 3s) Left : Green Middle : Orange Right: Red 3. Navigation Key []
11. Contactless Module LED 4. Keyboard 5. Cancel Key 6. Clear Key 7. Enter Key 8. Magnectic Stripe Reader 12. Contactless Card Landing Zone 13. Paper Roll Handle Castles Technology Co., Ltd. Confidential All Right Reserved. Pg. 8 Rear (Portable) 14 16 15 17 19 21 18 20 VEGA5000S VEGA5000S 14. Recharable Battery Cover 15. Battery Cover Lock 16. Base Connector 17. SAM Slots 18. Micro SD Card Slot 19. GSM SIM Card Slots 20. RTC Battery 21. Battery Connector VEGA5000S Rechargable Battery Castles Technology Co., Ltd. Confidential All Right Reserved. Pg. 9 Side 22 23 VEGA5000S Portable 22. Power Connector 23. USB Port Base (Portable) 24 33 29 28 32 26 27 30 31 25 24. Base Connector 25. Base LED 26. Power Connector 27. Com port 1 28. Com port 2 29. Com port 3 30. Modem - Line Port 31. Modem Tel Port 32. Ethernet Port 33. USB Port 2.2. Inserting the Battery Align Step 2 Step 1: Unlock Battery cover Step 2: Remove battery cover Step 3: Insert battery into compament, battery contact point must align with battery connector. Step 1 Step 3 Castles Technology Co., Ltd. Confidential All Right Reserved. Pg. 11 2.3. Inserting the SAM Card SAM1 SAM2 SAM3 SAM4 VEGA5000S Portable Step 1: Remove battery cover / back cover Step 2:
Insert SAM card into desire slot. Portable SAM 1 & 2:
Gold contact at lower side of card and facing right. SAM 3 & 4:
Gold contact at lower side of card and facing left. Countertop SAM 1 & 2 & 3:
Gold contact at upper side of card and facing down. SAM 4 :
Gold contact at upper side of card and facing up. Castles Technology Co., Ltd. Confidential All Right Reserved. Pg. 12 2.4. Inserting the Paper Roll Step 3 Step 1 Step 2 Step 1: Push paper roll box handle. Step 2: Gentle open paper roll cover. Step 3:
Insert paper roll as direction showed. Paper specification Width: 57mm Outside diameter: 40mm Castles Technology Co., Ltd. Confidential All Right Reserved. Pg. 13 2.5. Inserting the GSM SIM Card SIM2 SIM1 VEGA5000S Portable Step 1: Remove battery cover / back cover Step 2: Open SIM socket and insert GSM SIM card into desire slot. Portable SIM 1 & 2:
Gold contact at upper side of card and facing down. Countertop SIM 1 & 2:
Gold contact at lower side of card and facing down. Castles Technology Co., Ltd. Confidential All Right Reserved. Pg. 14 2.6. Inserting the Memory card Micro SD VEGA5000S Portable VEGA5000S Countertop Micro SD Step 1: Remove battery cover / back cover Step 2:
Insert Micro SD memory card. Portable Micro SD :
Gold contact at lower side of card and facing right. Countertop Micro SD :
Gold contact at upper side of card and facing up. Castles Technology Co., Ltd. Confidential All Right Reserved. Pg. 15 3. Basic Operation 3.1. Program Manager Upon power on, terminal will enter Program Manager if not default application selected. All user applications are list in Program Manager. User may select an application and run the application or view the application info, delete the application or set to default run upon power on. User may enter System Menu to configure terminal settings. Program Manager Program Manager
-----------01/02 1.App1 2.App2 F1:Download Press [F1] button to enter System Menu. Press [F2] button to toggle default application selection. Press [F3] button to delete application. Press [F4] button to view application info. Press [OK] button to run application. Press [] or [] button to select application. System Menu Page 1 System Menu 1.Download AP 2.System Info 3.Memory Status 4.Sys Settings 5.Test Utility 6.Factory Reset 7.Power Off Press [] button to page 2. Page 2 System Menu 1.FK PWD Change 2.Share objMng 3.Castles TMS 4.ULD KEY HASH Castles Technology Co., Ltd. Confidential All Right Reserved. Pg. 16 3.2. Download AP Download user application or kernel modules firmware. System Menu System Menu 1.Download AP 2.System Info 3.Memory Status 4.Sys Settings 5.Test Utility 6.Factory Reset 7.Power Off Press [1] button to enter Download AP menu. Download AP Menu Download EX 1.RS232 or USB 2.USB Disk 3.SD Card Select DW Source Select download source:
Press [1] button to select source as RS232 or USB connection and enter ULD download mode. Press [2] button to select source as USB disk. Press [3] button to select source as SD card. Castles Technology Co., Ltd. Confidential All Right Reserved. Pg. 17 3.3. System Info View kernel module firmware information. System Menu System Menu 1.Download AP 2.System Info 3.Memory Status 4.Sys Settings 5.Test Utility 6.Factory Reset 7.Power Off Press [2] button to enter System Info menu. System Info Menu Page 1 Page 2 Page 3 SYSTEM INFO
---Kernel Ver---
BOOTSULD : V0064 CRYPTOHAL: VF057 KMS : V0056 LINUXKNL : V0024 ROOTFS : V0050 SYSTEM INFO
--- KOVer ---
SECURITY : V0076 SYSUPD : V0080 KMODEM : N/A DRV : V0089 USB : V0078 SC : V0083 SYSTEM INFO
--- SO Ver 1 ---
UART : V0072 USBH : V0070 MODEM : V0075 ETHERNET : V0078 FONT : V0076 LCD : V0073 Press [OK] button to next page. Page 4 Page 5 Page 6 SYSTEM INFO
--- SO Ver 2 ---
PRT : V0073 RTC : V0073 ULDPM : V0078 PPP MODEM: V0086 EMVL2 : V0072 KMS : V0073 SYSTEM INFO
--- HWMVer ---
CRDL/ETHE: V3004 CLM-MP : V0015
--- APVer ---
ULDPM : V0043 Page 7 SYSTEM INFO
--- SO Ver 4 ---
CTOSAPI : V0083 SYSTEM INFO
--- SO Ver 3 ---
FS : V0075 GSM : V0080 BARCODE : V0073 TMS : V0072 TLS : V0071 CLVW : V0076 SYSTEM INFO
--- HWMVer ---
HUSBID:0CA6A050 CUSBID:N/A
--Factory S/N---
0000010600035717 Page 8 Castles Technology Co., Ltd. Confidential All Right Reserved. Pg. 18 3.4. Memory Status View terminal flash memory and RAM information. System Menu System Menu 1.Download AP 2.System Info 3.Memory Status 4.Sys Settings 5.Test Utility 6.Factory Reset 7.Power Off Press [3] button to enter Memory Status menu. Memory Status Menu MEMORY STATUS
--FLASH Memory--
Total: 31616KB Used : 22640KB
--SDRAM Memory--
Total: 31872KB Used : 10908KB Castles Technology Co., Ltd. Confidential All Right Reserved. Pg. 19 3.5. System Settings View or change terminal system settings. Setting Key Sound Descriptions Enable (Y) or disable (N) the beep sound when pressing any key. Exec DFLT AP Enable (Y) or disable (N) execution of default selected application. USB CDC Mode Enable (Y) or disable (N) USB CDC mode. FunKey PWD Enable (Y) or disable (N) password protection to access function key (F1 ~ F4) in Program Manager. PMEnter PWD Enable (Y) or disable (N) password protection to enter Program Manager. SET USB Host Enable (Y) or disable (N) USB host mode. Base USB CDC Enable (Y) or disable (N) USB CDC mode in base unit. [Portable model only]
List SHR Lib Enable (Y) or disable (N) to list all shared libraries in Key MNG Mode
<TBC>
Program Manager. Bat Threshld Battery charging threshold value. [Portable model only]
Null Cradle Enable (Y) if base is null cradle. [Portable model only]
Debug Mode Enable (Y) or disable (N) console debug mode. Debug Port Serial port for console debug. Mobil AutoON
<TBC>
GDB Mode Enable (Y) or disable (N) GDB mode. [VEGA5000S only]
GDB Timeout GDB connection timeout. [VEGA5000S only]
GDB Channel GDB connection channel. [VEGA5000S only]
ETHER IP/PORT GDB Ethernet connection setting. [VEGA5000S only]
Castles Technology Co., Ltd. Confidential All Right Reserved. Pg. 20 System Menu System Menu 1.Download AP 2.System Info 3.Memory Status 4.Sys Settings 5.Test Utility 6.Factory Reset 7.Power Off Press [4] button to enter System Settings menu. System Settings Menu Page 1 SYS SETTINGS Key Sound : Y Exec DFLT AP: Y
-AP Name USB CDC Mode: Y FunKeyPWD : N PMEnterPWD : N F3: Next Page Press [] or [] button to select setting. Press [OK] button to change the setting value. Press [] button to toggle Y N Y. Press [F3] button to next page. Page 2 SYS SETTINGS SET USB Host: N Base USB CDC: X List SHR Lib: N Key MNG Mode: 0 Bat Threshld: X Null Cradle : X F2:Prev F3:Next Press [] or [] button to select setting. Press [OK] button to change the setting value. Press [] button to toggle Y N Y. Press [F2] button to previous page. Press [F3] button to next page. Castles Technology Co., Ltd. Confidential All Right Reserved. Pg. 21 Page 3 SYS SETTINGS Debug Mode : N Debug Port : X Mobil AutoON: Y F2:Prev F3:Next Press [] button to select setting. Press [OK] button to change the setting value. Press [] button to toggle Y N Y. Press [F2] button to previous page. Press [F3] button to next page. Page 4 (VEGA5000S only) SYS SETTINGS GDB Mode : Y GDB Timeout: 60s GDB Channel : E ETHER IP/PORT 192.120.100.222 5000 F2:Prev Page Press [] button to select setting. Press [OK] button to change the setting value. Press [] button to toggle Y N Y. Press [F2] button to previous page. Castles Technology Co., Ltd. Confidential All Right Reserved. Pg. 22 3.6. Test Utility Perform terminal hardware components diagnostic. System Menu System Menu 1.Download AP 2.System Info 3.Memory Status 4.Sys Settings 5.Test Utility 6.Factory Reset 7.Power Off Press [5] button to enter Test Utility menu. Test Utility Menu Page 1 Main Menu 0009 1:LCD 2:KBD 3:FLASH 4:SCM 5:Light 6:MSR 7:LED 8:RTC 9:PRNTR 0:FONT
[F2]Comm Menu
[F3]Power Off Press [1] button to diagnose LCD. Press [2] button to diagnose keyboard. Press [3] button to diagnose flash memory. Press [4] button to diagnose smart card module. Press [5] button to diagnose backlight. Press [6] button to diagnose magnetic stripe reader. Press [7] button to diagnose LED. Press [8] button to diagnose real time clock. Press [9] button to diagnose printer. Press [0] button to view font. Press [F2] button to enter Communication Test Menu. Press [F3] button to power off. Press [] button to next page. Note: Default password for changing RTC is 8418. Castles Technology Co., Ltd. Confidential All Right Reserved. Pg. 23 Page 2 Main Menu 1:CL_Transparent 2:CL Card Test 3:SD Card Test
:PAGE1 X:EXIT Press [1] button to diagnose contactless reader in transparent mode. Press [2] button to diagnose contactless card. Press [3] button to diagnose SD memory card. Press [] button to previous page. Press [X] button to exit. Communication Test Menu Communicate Test 1. COM1 2. Com2 3. Com3 4. Ethernet Test 5. USB Test 6. Modem Test 7. GPRS Test 8. All Test Press [1] button to diagnose Com 1. Press [2] button to diagnose Com 2. Press [3] button to diagnose Com 3. Press [4] button to diagnose Ethernet module. Press [5] button to diagnose USB. Press [6] button to diagnose modem. Press [7] button to diagnose GPRS. Press [8] button to diagnose all, item 1 to 7. Castles Technology Co., Ltd. Confidential All Right Reserved. Pg. 24 3.7. Factory Reset Perform factory reset, all user application, fonts and data will be deleted. System Menu System Menu 1.Download AP 2.System Info 3.Memory Status 4.Sys Settings 5.Test Utility 6.Factory Reset 7.Power Off Press [6] button to enter Factory Reset menu. Factory Reset Menu Factory Reset OK to reset ?
Press [OK] button to perform factory reset. Factory Reset Password :
****
Enter factory reset password.Default password: 8418 Castles Technology Co., Ltd. Confidential All Right Reserved. Pg. 25 3.8. Power Off Power off terminal. System Menu System Menu 1.Download AP 2.System Info 3.Memory Status 4.Sys Settings 5.Test Utility 6.Factory Reset 7.Power Off Press [7] button to power off terminal. Castles Technology Co., Ltd. Confidential All Right Reserved. Pg. 26 3.9. Function Key Password Change Change function key access password. System Menu (Page 2) System Menu 1.FK PWD Change 2.Share objMng 3.Castles TMS 4.ULD KEY HASH Press [1] button to enter FunKey Password menu. FunKey Password Menu FunKey Password Enter Password:
****
Enter current password. (Default password is "0000") FunKey Password New Password:
****
Confirm Password
****
Enter new password. Enter new password again to confirm. FunKey Password New Password:
****
Confirm Password
****
PWD Changed OK Castles Technology Co., Ltd. Confidential All Right Reserved. Pg. 27 3.10. Share Object Management View share object in terminal. System Menu (Page 2) System Menu 1.FK PWD Change 2.Share objMng 3.Castles TMS 4.ULD KEY HASH Press [2] button to enter Share Object Management menu. Share Object Management Menu Share objMng 1.Share LIB 2.Share File Press [1] button to view shared library. Press [2] button to view shared file. Castles Technology Co., Ltd. Confidential All Right Reserved. Pg. 28 3.11. CTOS TMS Connect to TMS (Terminal Management Softare) server, set or delete TMS configuration. System Menu (Page 2) System Menu 1.FK PWD Change 2.Share objMng 3.Castles TMS 4.ULD KEY HASH Press [3] button to enter Castles TMS menu. Castles TMS Menu CASTLES TMS 1.Connect Server 2.SetConfig 3.DelConfig Press [1] button to connect to TMS server. Press [2] button to set TMS configuration. Press [3] button to delete TMS configuration. Castles Technology Co., Ltd. Confidential All Right Reserved. Pg. 29 3.12. ULD Key Hash View ULD user keyset hash value. System Menu (Page 2) System Menu 1.FK PWD Change 2.Share objMng 3.Castles TMS 4.ULD KEY HASH Press [4] button to view hash value. USER ENC KEY 9572BC621C1D5406 0856D00BCC207000 D3320077 USER SIGN KEY A927768EA7DD7B9E 7E3F395C10726B6F 43B35C5A Castles Technology Co., Ltd. Confidential All Right Reserved. Pg. 30 4. Secure File Loading Castles implemented an interface in terminal named User Loader(ULD) to provide secure file loading to system memory. Loading of user application, kernel firmware, font and others must use User Loader. The loading process is secure by signing the files using ULD Key System. 4.1. ULD Key System The ULD Key System uses two key sets for securely managing the kernel updating and application downloading. Each key set contains two RSA key pairs. One is used for key encryption and the other is used for signature. These two key sets are specified as below:
ULD Manufacturer Key Set ULD Manufacturer Key Encryption Key (RSA) ULD Manufacturer Signature Key (RSA) ULD User Key Set ULD User Key Encryption Key (RSA) ULD User Signature Key (RSA) For VEGA5000S, the RSA key length is 2048bits. 4.1.1. ULD Manufacturer Key The system consists of several kernel modules. These kernel modules are provided by the Manufacturer, and released in CAP format file with encryption and signing via ULD Manufacturer Keys. The ULD Manufacturer keys are managed and maintained by the manufacturer. The manufacturer uses these keys to generate kernel CAP files for updating the system. However, the system is not permited to be updated with these kernel CAP files directly generated by the manufacturer. This is because only the user can have the privilege to decide whether the system is to be updated. Therefore, before system Castles Technology Co., Ltd. Confidential All Right Reserved. Pg. 31 updating, the kernel CAP files must be signed via ULD User Key to get the user permission. For simple expression, we call the kernel CAP files generated by the manufacturer as unsigned kernel CAP(s) and call the kernel CAP files signed by the user later as signed kenel CAP(s). Notes:
1. Tthe kernel modules are encrypted by a random-generated 3DES key, which is retrieved from the Key Encryption Block of the CAP by ULD Manufacturer Key Encryption Key, not directly encrypted by ULD RSA Key. 2. The sign action via ULD User Keys actually is done by the second encryption. The second encryption is done by using the random-
generated 3DES key, which is encrypted by ULD User Key Encryption Key, to perform Triple DES encryption again on the cipher data segment of the kernel CAP files. This ensures that the system cannot retrieve the correct data from the kernel CAPs without the user permission. Castles Technology Co., Ltd. Confidential All Right Reserved. Pg. 32 CAP GeneratorKernel ModuleULD Manufacturer KeysUnsigned Kernel CAPsUnsigned Kernel CAPsCAP Signing ToolSigned Kernel CAPsULD User Keys 4.1.2. ULD User Key ULD User Key are used to encrypt and sign the user/shared applications. In addition, they are as goalkeepers to prevent the system updating without user permission. This is done by the kernel CAPs which are encrypted and signed by the manufacturer having to perform the signed action via ULD User Keys. Notes: Applications are encrypted by a random-generated 3DES key, which is retrieved from the Key Encryption Block of the CAP by ULD User Key Encryption Key, not directly encrypted by ULD RSA Key. 4.1.3. Key Change The ULD RSA Keys are able to be changed. The system uses a special CAP file, KEY CAP, for the manufacturer and user to change their own keys. The KEY CAP contains a new set of ULD keys (Key Encryption Key and Signature Key). These new keys are encrypted and signed via the original keys. In other words, if the user would like to change the ULD User Keys, they have to use their original ULD User Keys with the new ULD User Keys to generate a KEY CAP. Castles Technology Co., Ltd. Confidential All Right Reserved. Pg. 33 ApplicationApplication CAPsULD User KeysCAP GeneratorKey CAP GeneratorOriginal ULD Manufacturer/User KeysNew ULD Manufacturer/User KeysUser KEY CAP 4.2. File Signing 4.2.1. Signing Kernel Module Castles will release new version of kernel module in unsigned form. This files required to sign with ULD User Key before it can load to terminal. Castles Technology provided a tool named CAP Signing Tool to perform this task. The CAP Signing Tool is located at:
VEGA5000S C:\Program Files\Castles\VEGA5000S\tools\Signing Tool Run CAP Signing Tool
(VEGA5000S) Insert Key Card and select smart card reader Castles Technology Co., Ltd. Confidential All Right Reserved. Pg. 34 Enter Key Card PIN CAP Signing Tool is ready, press Select MCI File button to browse the file. Output file will be located in signed folder. Castles Technology Co., Ltd. Confidential All Right Reserved. Pg. 35 4.2.2. Signing User Files Following files are required to sign before load to terminal. This is to ensure the application data and codes confidential and integrity. The output fille will be CAP file which is file format defined by Castles. User application User application data files User application library Font file Share library Share files System setting Key CAP (Manufacturer ULD Key Set) Castles Technology provided a tool named CAP Generator to perform this task. The CAP Generator is located at:
VEGA5000S C:\Program Files\Castles\VEGA5000S\tools\CAPG (KeyCard) Run CAP Generator Castles Technology Co., Ltd. Confidential All Right Reserved. Pg. 36 Insert Key Card and select smart card reader Enter Key Card PIN Castles Technology Co., Ltd. Confidential All Right Reserved. Pg. 37 CAP Generator is ready, select the correct Type from the list. Press Step 1: Select AP Executable File to select file to sign. This is valid for all the files to sign. Castles Technology Co., Ltd. Confidential All Right Reserved. Pg. 38 Enter file details and press Step 2: Sign Application to sign the file. This is valid for all the files to sign. The output file will be in a set. A mci file with one or more CAP files.CAP file contents the signed file binaries, where MCI file contents the list of CAP files. App.CAP App.mci Note: If user would like to load multiple set of signed file, create a new file with extension of mmci. Then put the mmci file contents with the list of mci file. MultiApp.mmci Castles Technology Co., Ltd. Confidential All Right Reserved. Pg. 39 4.3. File Loading There are several ways of loading file to VEGA5000S terminal. Download by User Loader Download by removable media Download by user application Download by Castles TMS User Loader is a tool provided by Castles Technology. Its the formal way to download file to terminal. User may implement their own ways of updating application or files using CTOS API provided, CTOS_UpdateFromMMCI(). Castles TMS (CTMS or CASTLES Terminal Management System) is provided by Castles Technology. Its use to perform remote download via Ethernet, GPRS/UMTS or modem. 4.3.1. Download by User Loader The Loader is located at:
VEGA5000S C:\Program Files\Castles\VEGA5000S\tools\Loader Run User Loader Castles Technology Co., Ltd. Confidential All Right Reserved. Pg. 40 Select COM port Browse and select mci file or mmci file Setup terminal to enter download mode Press [F1] button in Program Manager (PM) Press [1] button to select 1. Download AP Press [1] button again to select download via RS232 or USB Castles Technology Co., Ltd. Confidential All Right Reserved. Pg. 41 Press Download button to start. Note: To download using USB cable, terminal must enable CDC mode. Set USB CDC Mode to Y. SYS SETTINGS Key Sound : Y Exec DFLT AP: Y
-AP Name USB CDC Mode: Y FunKeyPWD : N PMEnterPWD : N F3: Next Page Castles Technology Co., Ltd. Confidential All Right Reserved. Pg. 42 4.3.2. Download by Removable Media The file download process can be achieved without PC by using removable media, USB flash drive or MicroSD memory card. We recommend dont put unwanted file to removable media, as it will increase the time during detection. Create a folder name vxupdate under root directory. root vxupdate Place the mci file and cap file to vxupdate folder. root vxupdate App.CAP App.mci Note: If user would like to load multiple application, create a new file with extension of mmci. Then put the mmci file contents with the list of mci file. MultiApp.mmci Castles Technology Co., Ltd. Confidential All Right Reserved. Pg. 43 Insert removable media to terminal, and select the removable media type in Download AP menu. Download AP Menu Download EX 1.RS232 or USB 2.USB Disk 3.SD Card Select DW Source o Press [2] button to select USB flash drive. o Press [3] button to select MicroSD card. Finally, terminal will process the file vxupdate folder. Castles Technology Co., Ltd. Confidential All Right Reserved. Pg. 44 4.4. Changing ULD User Key User may change their ULD User Key Set stored in Key Card. Castles Technology provided a tool named Secure Key Generator to perform this task. For VEGA5000S Run Secure Key Generator Insert Key Card and select smart card reader Enter Key Card PIN, default PIN is 1234. Castles Technology Co., Ltd. Confidential All Right Reserved. Pg. 45 To change Key Card PIN, press Update PIN button. If not, please skip this steps. o Enter new PIN, enter new PIN again to confirm, then press [Enter] button to change PIN in Key Card. Castles Technology Co., Ltd. Confidential All Right Reserved. Pg. 46 Castles Technology Co., Ltd. Confidential All Right Reserved. Pg. 47 To view current key set hash value, goto Option and select key. Castles Technology Co., Ltd. Confidential All Right Reserved. Pg. 48 To generate new user key set o Run RSA Key Generator o Select Key Length as 2048 (bits), then press [Generate] button to generate the RSA key set. Result:
Castles Technology Co., Ltd. Confidential All Right Reserved. Pg. 49 o Copy RSA key components to RSA Key for Kenc in Secure Key Generator. o Generate second RSA key set for Signature. Castles Technology Co., Ltd. Confidential All Right Reserved. Pg. 50 o Click [Get Hash] button to calculate the hash value for key sets. o Please copy down all the values into a text file and keep in a safe place. You will need this if you need to create duplicate Key Card. To generate the key CAP for the newly generated user key set, press [Make Key CAP File] button. Castles Technology Co., Ltd. Confidential All Right Reserved. Pg. 51 The output file will be located in the Secure Key Generator folder. SecureKeyGenerator key.mci key.cap To update the newly generated key set to Key Card, press [Save to Card]
button to write the key set to Key Card. Castles Technology Co., Ltd. Confidential All Right Reserved. Pg. 52 5. Font Management 5.1. Loading New Font Run FontManager.exe Located at C:\Program Files\Castles\Font Manager Select font to download Castles Technology Co., Ltd. Confidential All Right Reserved. Pg. 53 Press [Setting] button to configure terminal type. Select VEGA5000, press [Save] button to save and return font manager. Press [Generate] to create the font file. Castles Technology Co., Ltd. Confidential All Right Reserved. Pg. 54 Output file Font.FNT will be located at sub-directory named Font in Font Manager folder. Font Manager Font Font.FNT Sign the file using CAP Generator, the type must set to 11 Linux Font. Lastly, download the signed file (CAP file) to terminal using Loader. Castles Technology Co., Ltd. Confidential All Right Reserved. Pg. 55 5.2. Custom Font User may create font they preferred for displaying or printing on terminal. There are two zone defined:
Zone 0x00 ~ 0x7F ASCII characters, you may replace with the font type preferred or your own language character set. Zone 0x80 ~ 0xFF Free to use, you may use for symbols. Following steps demonstrate how to create a 12x24 font. Run GLCD Font Creator Select [File] [New Font] [Import An Existing System Font]
Castles Technology Co., Ltd. Confidential All Right Reserved. Pg. 56 Select the font needed, simply choose a font size. The final value of font size should be determine by the minimum pixel width. You may need to repeat this steps few times to find the best fit font size. Set the import range from 0 to 127. Castles Technology Co., Ltd. Confidential All Right Reserved. Pg. 57 Check the minimum pixel width and height. If the pixel width of the font size is larger than expected, then you have to repeat the previous steps to import font with smaller size. Use the following buttons to adjust the font size to match with expected font size. Add columnonrigh Removecolum nonleft t Removecolumn onright Remove row on bottom Add row on bottom Remove row on top Add column on left Add row on top Castles Technology Co., Ltd. Confidential All Right Reserved. Pg. 58 After adjust font size, select [File] [Export for MicroElektronika]. Select output format as [mikroC]. Castles Technology Co., Ltd. Confidential All Right Reserved. Pg. 59 Remove comment // Code for char from offset 0x00 to 0x1F. Remove empty line if found. Then click [Save] button to save to file. Remove Remove Remove Remove Run Font Manager Tool. Click [Setting] button Castles Technology Co., Ltd. Confidential All Right Reserved. Pg. 60 Enter the file name, font id, and select the size. Click [Create] button, and select the C file previously created using GLCD Font Generator. Castles Technology Co., Ltd. Confidential All Right Reserved. Pg. 61 Select [Font Manager] tab and tick the newly creately font, and press
[Generate] button to export to FNT file. Castles Technology Co., Ltd. Confidential All Right Reserved. Pg. 62 Use CAP Generator to conver the FNT file to CAP. Set type to [11 Linux Font], press [Step 1] button select the FNT file. Then press [Step 2] to generate CAP file. Download the font CAP file to terminal. In terminal application, add following code to display message using the newly created font. CTOS_LanguageConfig(0xA000,d_FONT_12x24,0,d_FALSE);
CTOS_LanguageLCDSelectASCII(0xA000);
CTOS_LCDTPrintXY(1, 1, "ABCDEFGH");
Or print message using the newly created font. CTOS_LanguagePrinterSelectASCII(0xA000);
CTOS_PrinterPutString("ABCDEFGH");
Castles Technology Co., Ltd. Confidential All Right Reserved. Pg. 63 5.3. Using TrueType Font (TTF) TrueType Font (TTF) is only supported in VEGA5000S terminal.You may download the TrueType font preferred to terminal for displaying or printing. Following steps demonstrate how to use Cooper Black True Type font. Copy the TTF file needed to a empty folder. TTF COOPBL.TTF Use CAP Generator to conver the TTF file to CAP. Set type to [11 Linux Font], press [Step 1] button select the TTF file. Then press [Step 2] to generate CAP file. Download the font CAP file to terminal. Castles Technology Co., Ltd. Confidential All Right Reserved. Pg. 64 In terminal application, add following code to display message using the newly added font. CTOS_LCDTTFSelect("COOPBL.TTF", 0);
CTOS_LCDFontSelectMode(d_FONT_TTF_MODE);
CTOS_LCDTSelectFontSize(0x203C); // 32x60 CTOS_LCDTClearDisplay();
CTOS_LCDTPrintXY(1, 1, "Hello World");
Or print message using the newly added font. CTOS_PrinterTTFSelect("COOPBL.TTF", 0);
CTOS_PrinterFontSelectMode(d_FONT_TTF_MODE);
CTOS_LanguagePrinterFontSize(0x203C, 0, 0); // 32x60 CTOS_PrinterPutString("Hello World");
Castles Technology Co., Ltd. Confidential All Right Reserved. Pg. 65 6. Advance Features 6.1. VEGA5000S GNU Project Debugger (GDB) Developers may use GDB to debug the programs directly on VEGA5000Sterminal. 6.1.1. About GDB GDB, the GNU Project debugger, allows you to see what is going on
`inside' another program while it executes -- or what another program was doing at the moment it crashed. GDB can do four main kinds of things (plus other things in support of these) to help you catch bugs in the act:
Start your program, specifying anything that might affect its behavior. Make your program stop on specified conditions. Examine what has happened, when your program has stopped. Change things in your program, so you can experiment with correcting the effects of one bug and go on to learn about another. For more detail, please refer to http://sources.redhat.com/gdb/. Castles Technology Co., Ltd. Confidential All Right Reserved. Pg. 66 6.1.2. SetupGDB Access to GDB Setting Menu. System Menu 1.Download AP 2.System Info 3.Memory Status 4.Sys Settings 5.Test Utility 6.Factory Reset 7.Power Off SYS SETTINGS GDB Mode : N GDB Timeout : X GDB Channel : X ETHER IP/PORT F2:Prev Page Press [4] button to enter System Settings menu. Press [F3] button three times to GDB Setting Menu (page 4). Change following settings:
Set GDB Mode to Y (enable) Set GDB Timeout, the time that GDB server (on terminal) waits for connection. Default is 60 seconds. Set GDB Channel, the communication channel between GDB server (on terminal) and SDK IDE on PC. E indicates to use TCP/IP channel U indicates USB mode Set Ethernet IP & Port, terminal IP address and GDB server (on terminal) port. Ifcoummincation channel is set to TCP/IP. SYS SETTINGS GDB Mode : N GDB Timeout : X GDB Channel : X ETHER IP/PORT F2:Prev Page Change to SYS SETTINGS GDB Mode : Y GDB Timeout: 60s GDB Channel : E ETHER IP/PORT 192.168.0.71 5000 F2:Prev Page Press [] button to select setting. Press [OK] button to change the setting value. Press [] button to toggle Y N Y. Castles Technology Co., Ltd. Confidential All Right Reserved. Pg. 67 6.1.3. Start Debugging The GDB function is supported in the Castles SDK version 6.10 or higher. Please ensure you have already installed this SDK into your computer before using GDB. Step 1: Run Castles CTOS Development Suite Step 2: Open project to debug Step 3: Set project configuration to Debug Step 4: Rebuild the project. Castles Technology Co., Ltd. Confidential All Right Reserved. Pg. 68 Step 5: Sign the application and load the CAP files to terminal. Program Manager
-----------01/02 1.V5S_Hello F1:Download Step 6: Execute the application. Step 7: Press [OK] button to confirm open debug mode. Terminal will wait for connection from SDK IDE until timeout. Open Debug Mode Confirm?
Y:OK N:X Press OK Local IP:
192.168.0.71 Listen Port:
5000 Listening 59 Step 7: In SDK IDE, from Debug menu select Attach Debugger. Castles Technology Co., Ltd. Confidential All Right Reserved. Pg. 69 Step 8: Select debugger as gdbserver. Step 8:
Ethernet Channel:
Please input the terminal IP address andGDB port in the format remote HostIP:HostPort on the Target editor.Andselect your application from the Project combobox. When finishing, pressOK button to connect with the terminal. USB Channel:
If using USB channel to debug, input port number in the format remote/dev/ttySn on theTarget editor. n indicates comport number minus 1. Forexample, if the PC port that the terminal connects with is COM3, pleaseinputremote /dev/ttyS2 on the Target editor.Andselect your application from the Project combobox. When finishing, pressOK button to connect with the terminal. Castles Technology Co., Ltd. Confidential All Right Reserved. Pg. 70 Step 9: Press OK. After successful connected to terminal, the debug menu will beenable. User may use breakpoint or use Step Over for tracing. Castles Technology Co., Ltd. Confidential All Right Reserved. Pg. 71 7. Operation Notes 7.1. Operation Notes 1. VEGA5000S mainly used both on table and hand-held. 2. When inserting or swiping the cards, there will be some distance between the terminal and human body, rather than be appressed to the human body. 3. The VEGA5000S would not be put into the pocket or tie around the waist.
~ END ~
Castles Technology Co., Ltd. Confidential All Right Reserved. Pg. 72 FCC Regulations This device complies with part 15 of the FCC Rules. Operation is subject to the following two conditions: (1) This device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation. Changes or modifications not expressly approved by the party responsible for compliance could void the users authority to operate the equipment.
*******************************************************************************************************************
*********
This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation. If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one or more of the following measures:
Reorient or relocate the receiving antenna. Increase the separation between the equipment and receiver. Connect the equipment into an outlet on a circuit different from that to which the receiver is connected. Consult the dealer or an experienced radio/TV technician for help.
*******************************************************************************************************************
*********