Manual davinci VENDING Installation and commissioning

Installation and commissioning
guidelines for davinci VENDING
Technical specification
Version 2.5
Table of contents
List of abbreviations ....................................................................................................................3
1
1.1
1.2
1.3
1.4
1.5
1.5.1
1.6
1.7
1.8
1.8.1
1.8.2
Installation .......................................................................................................................4
Machine front cutout measurements ................................................................................5
Installation of the VENDING module ................................................................................6
Installation of a contact-based motor/insertion reader ......................................................7
Installation of the RFID reader .........................................................................................8
Power supply concept .....................................................................................................9
Connecting the components ..........................................................................................10
PIN allocation of the connections................................................................................... 11
Grounding .....................................................................................................................12
Privacy protection requirements (PCI) ...........................................................................13
Design rules: .................................................................................................................15
Design criteria for the privacy protection ........................................................................16
2
Commissioning a terminal .............................................................................................18
3
Functions menu overview ..............................................................................................19
4
4.1
4.2
4.3
4.4
Dismantling protection ...................................................................................................20
Display screens .............................................................................................................20
Exchanging the VENDING module ................................................................................21
Test commissioning without activation ...........................................................................22
Mounting instruction ......................................................................................................22
5
davinci SAFE .................................................................................................................23
Page 2
List of abbreviations
EMV
Europay MasterCard VISA (card payments)
Electromagnetic compatibility (electronic)
ECR
Electronic Cash Register
ep2
eft/pos 2000: CH standard based on the EMV standard
in electronic payment traffic
PW
Password
SW
Software
TID
Terminal ID
Trm
Terminal
TRX
Transaction
Great care was taken with the compilation of the information in this document. Further developments in the field of electronic payment transactions and
technology could result in changes that could lead to deviations from the descriptions in this document. Therefore, SIX Payment Services assumes no
liability for the topicality, completeness and accuracy of the information provided in this operating manual. Any liability claims made against SIX
Payment Services relating to damages or loss, either in a material or immaterial form, caused by the use or non-use of the information offered or by the
use of erroneous or incomplete information, are fundamentally excluded, unless it can be proven that SIX Payment Services acted intentionally or with
gross negligence.
You can find the latest edition of this document on our website at: www.six-payment-services.com.
Page 3
1
Installation
The cutout measurements described in this document must be used for the installation of the
components in the machine front. The PCI requirements pertaining to privacy protection must
be observed when installing the components. Particular attention must be paid to the torque of
the screws/nuts; otherwise, correct operation cannot be guaranteed.
Note:
(Applies for all assemblies)
•
The machine front in which the contact-based reading is to be installed may not be thicker
than max. 4 mm.
•
The nuts/screws for fastening all components must be tightened with a torque of 0.8 Nm
(±10%). This also applies to the 4 screws that hold the mouthpiece module together.
•
The outer 4 screws (attaching the reader to the machine front) may be tightened for the final
attachment with a max. torque of 0.3 Nm.
•
The PCI requirements for privacy protection are listed in section 1.8.
Page 4
1.1 Machine front cutout measurements
Cutout for RFID reader
Welded bolt M5 (4x)
Cutout for PINPAD
Cutout for motor and hybrid-manual
reader
Figure: Cutout from the machine front for the davinci module
Page 5
1.2 Installation of the VENDING module
The VENDING module is mounted to the front of the machine using the self-locking screws. The
appropriate measurements of the machine front cutout and positioning of the mounting bolts are
found in section 1.1.
Note:


When mounting the VENDING module please make sure that it is firmly attached to the
machine front; otherwise the dismantling protection could be triggered.
The seating surface for the dismantling protection switch must be smooth and flat.
Welded bolt M5 (4x)
Cutout for PINPAD
Figure: Borehole measurements for the davinci module
Page 6
1.3 Installation of a contact-based motor/insertion reader
The two davinci VENDING contact-based card readers include a motor reader with a shutter
and a hybrid insertion reader. The installation of this type of reader is described using a motor
reader as an example. An insertion reader can be installed the same way.
First the mouthpiece and the supporting plate are attached to the machine front. Water drainage
channels are built into the supporting plate, as are the bolts for attaching the motor reader.
These will be attached in a second step using self-locking nuts. The mouthpiece is attached to
the housing using the outer fastening screws.
Figure: Motor reader installation
Page 7
1.4 Installation of the RFID reader
The RFID reader is attached to the machine front using the fastening screws.
Figure: Installation of the RFID reader
Page 8
1.5 Power supply concept
The davinci VENDING module's power supply concept is designed to be diverse in order to
meet a range of customer requirements. Power to the davinci VENDING module can be
supplied through a motor reader, hybrid manual reader, a power adapter or a vending machine.
Power can also be supplied to other components in these instances along with the davinci
VENDING modules.
Back side of the davinci VENDING module
Back side of the motor reader
and the hybrid manual reader
Back side of the RFID reader
Page 9
1.5.1
Connecting the components
Connecting the components is described in this section. The maximum length of the connecting
cable between the reader and the davinci VENDING module is two meters. Only the cable
specified by SIX Payment Services may be used.
In this example, the davinci VENDING module is combined with an RFID reader and a motor
reader. The connected motor reader may, or may not, be equipped with a shutter. Power is
supplied to the entire system though the motor reader‟s power supply connection. A hybrid
manual reader can also be connected instead of a motor reader.
RFID reader
davinci VENDING module
Motor reader or hybrid manual
reader
Power
supply
connection
Data transmission and power supply
Page 10
1.6 PIN allocation of the connections
PIN allocation for the davinci VENDING module
PIN allocation for the card reader
12V-36V DC
PIN allocation for the RFID reader
Page 11
Grounding
Proper grounding must be ensured between the davinci VENDING module and the reader
(hybrid manual reader or motor reader).
Figure: Grounding example
Page 12
1.7 Privacy protection requirements (PCI)
The following figures serve as examples for terminals featuring integrated privacy protection
that meets the PCI security requirements for unattended payment terminals. Other
implementations must also be permitted under certain circumstances.
Example of an unattended payment terminal with privacy protection zone, top view
Page 13
Sample keypad field of an unattended payment terminal, cross section
Sample keypad field of an unattended payment terminal, side view
Page 14
1.7.1 Design rules:
These definitions apply for a privacy screen that is integrated as a design feature in an unattended payment terminal. It can be provided as part of the keypad or through the casing of the
unattended payment terminal. The rules and diagrams listed above are guidelines that can also
be replaced by other means with at least the same degree of efficiency.
The keypad reference center is the column line in the middle of the keypad, in the row containing the 5 key.
The privacy screen should offer the following shielding angles:
The protection is based on the angle of observation and includes no specific technical
installations, such as structural screens.
Page 15
1.7.2 Design criteria for the privacy protection
The following measures can be used to ensure an effective screening of the keypad during PIN
entry. These measures are generally combined; in some cases only a single measure is used
alone.
Note:
These options do not preclude the use of privacy protection measures as defined in A1;
however, they do permit less restrictive structural measures, e.g. ≥ 20°.
Positioning of the terminal on the checkout stand in a manner that makes observation of the PIN
entry process impossible. Examples include:

Privacy screens at the checkout counter. The privacy screens can be intended solely for
screening purposes or can be part of the general design of the checkout counter, e.g.
function as sales space.

Positioning of the unattended payment terminal so that spying out of the PIN entry is
hindered due to the angle. Fold-up (temporary) privacy protection that is attached to the
installation site of the unattended payment terminal. Customers (according to
instructions and requirements) or merchants can turn the privacy protection during the
PIN entry sideways and/or to tip it forwards/backward to hinder observation of the PIN
entry with an adjustable device installed at the unattended payment terminal. Positioning
of surveillance cameras on site so that the keypad for PIN entry cannot be seen.
Instructing the cardholder in regard to secure PIN entry. This can take place through a
combination of the following measures:

Signage at the unattended payment terminal;

User guidance on the display, potentially with a screen to click;

Printed information at the point of sale, and

application of a logo for secure PIN entry.
Other measures are also possible. Listed above are examples of measures that a supplier can
suggest to protect PINs during PIN entry. The supplier must provide appropriate procedures in
the documentation for the unattended payment terminal, including a table that shows which
procedures should be used in order to provide protection against specific observation corridors.
Page 16
The following is an example of such a table:
Observation corridors
Method
Cashier
Customers
in queue
Customers
elsewhere
On-site
cameras
Remote
cameras
UPR Stand A
M
H
L
L
L
UPR Stand B
H
H
H
L
M
Checkout counter A
L
M
M
L
H
Checkout counter B
H
H
M
H
H
customer instruction
H*
H*
H*
H*
H*
Sample table for observation corridors and PIN protection measures
* Measures for customer instruction are hardly repeatable and should therefore be combined with other measures.
N = low, M = medium, H = high
The table must show the purchaser of the unattended payment terminal which methods he can
use to protect the customers‟ PINs. To be noted when choosing suitable measures, is that
sufficient protection is ensured from all observation corridors.
Page 17
2
Commissioning a terminal
Once the terminal has been properly installed, it must be activated and placed in operation with
the appropriate parameters.
Note:
If the davinci VENDING module‟s communication takes place through the vending machine, the
operation of the terminal may differ from these instructions.
During the following steps, any necessary entry selections can also be made using the arrow
button and confirmed with the „OK‟ button.
After the terminal ID is entered, the terminal starts the software download, configuration and
initialization.
The terminal is operationally ready as soon as the word “Welcome” and the card brands appear
on the screen.
Page 18
3
Functions menu overview
The terminal must first be approved by vending machines in order to be able to select these
functions.
(MPD command: 4 - 1 Activate the service menu on the terminal)
Once activated, the terminal password must be entered. Each terminal has a password that is
defined according to customer preference during activation.
The following menu structures can be selected with the arrow button and confirmed with the
„OK‟ button. The STOP button can be used to jump back a level.
Hardware test menu
This hardware test menu is reached as follows: After a power-up, the MENU button must be pressed
while the white screen is being built. Entry of the “Z” password is then required.
Menu items:
1.
2.
3.
4.
Test PINpad
Test external reader
List installed firmware
Exit
Each button must be pressed once, otherwise you cannot proceed.
The card is read 10 times
List of the installed SW modules
Abort
Page 19
4
Dismantling protection
In compliance with the international PCI rules, the individual components of the davinci
VENDING terminal are equipped with dismantling protection. Components dismantled in the
field must therefore always be returned to SIX Payment Services to be reactivated.
4.1 Display screens
The dismantling protection consists of electronic contacts that can be found at the front of the
device and can only be activated through correct assembly of the components. Although the
dismantling protection of one component is active, you can take a reading from the status
indicator on the display:
Display
Tampered (0)
Tampered (2)
Description
 The security of the VENDING module
was activated or damaged
Assistance
 Send VENDING module
back to SIX Payment
Services
Reader Tampered (0) Reader
Tampered (2)
Not mounted (4)
 The security of the reader was activated
or damaged
 Send reader back to
SIX Payment Services
 The VENDING module is not correctly
mounted
 Check contacts on the
dismantling protection
 Activation possible after
correct assembly
Reader not
mounted (4)
 The reader is not correctly mounted
 The mouthpiece is not correctly
mounted
 Activation possible after
correct assembly
 Possibly check contacts
on the dismantling protection or the assembly
of the mouthpiece
Not activated (5)
 The dismantling protection of the
VENDING module is not active
 Activate
Reader not activated (5)
 The dismantling protection of the reader
has not yet been activated
 Activate
Not mounted (7)
 The VENDING module is not correctly
mounted
 Device must be sent
back to SIX Payment
Services for reactivation
 The VENDING module has been removed
Page 20
Reader not
mounted (7)
 The reader is not correctly mounted
 The reader has been removed
 Device must be sent
back to SIX Payment
Services for reactivation
 The mouthpiece is not correctly
mounted
Not activated (8)
 The dismantling protection of the
VENDING module is closed again. A
password is necessary to reactivate it
 Device must be sent
back to SIX Payment
Services for reactivation
 No transactions are possible in this
state
Reader not activated (8)
 The dismantling protection of the reader
is closed again.
 A password is necessary to reactivate it
 Device must be sent
back to SIX Payment
Services for reactivation
 No transactions are possible In this
state
4.2 Exchanging the VENDING module
When exchanging the VENDING module, it is to be noted that the card reader must also be
exchanged. Otherwise, it will no longer be technically possible to conduct “plain text” PIN
verifications against chip cards which have an SDA chip (static data authentication). Under
certain circumstances, they would then no longer function properly.  The CH Maestro card is
not affected by this.
4.3 Test commissioning without activation
During a menu query pertaining to the activation, the STOP button can be used to abort the
activation and subsequent entry of the Z password. In this way, the status of the dismantling
protection is not queried or changed. The terminal can be placed in operation and, for example,
initialized in this mode.  Important: No transactions can be conducted in this mode. After
powering up again, the same "Activation menu" appears.
Page 21
4.4 Help with assembly
 If the silicon seal is not correctly
mounted, the device must be sent
back.
 Once the silicon seal is correctly
mounted, the device is waterproof
and can be mounted
 The flex is very sensitive and may
not be bent and touched.

There maybe no gap between the
card reader and the mouthpiece
Page 22
5
Davinci SAFE
Mounting instruction davinci II SAFE
1
2
Upper
mounting
Resetting the
box
3
Opening the box
Note the direction!
4
Fastening the
base plate
Unscrew nuts
Page 23