User’s Guide
Security Printing Solutions
(For use with all TROY 2300, 4200, and 4300 Security Printing Solutions)
NOTE: For best results, view this document using Adobe Acrobat Reader 5.0 or higher.
Click on the main headings in the table of contents to link directly to that section.
Open the Adobe Acrobat Reader navigation pane to use the links for this document.
Document #50-70376-001 Rev. C
Acknowledgements
Some of the TROY products include cryptographic software written by Eric Young (eay@cryptsoft.com)
The Twofish encryption/decryption source code used in the TROY MICR DIMM is provided by Crytopane.
TROY is a registered trademark. TROYmark™ and AutoProtect™ are registered trademarks of TROY Group, Inc. All rights reserved.
Microsoft Windows, PostScript, TrueType, LaserJet, and all other product names mentioned in this publication are trademarks or registered trademarks
of their respective companies.
Information and descriptions contained herein are the property of TROY Group, Inc. Such information and descriptions may not be copied,
disseminated, or distributed without the express written consent of TROY Group, Inc. This publication is subject to change without notice.
© 2003 TROY Group, Inc.
Printed in the United States of America
December 1, 2003
Table of Contents
Preface
This manual is designed and formatted for use as an online document (viewed on your computer screen). The
document contains electronic links that group the applicable information for your specific security printing
solution. The document can also be printed; however, it is recommended that you print only the pages applicable
to your security printing solution. Printing the entire document will print all the pages for all of the TROY
Security Printing Solutions covered in this manual. For best results, you must use Adobe Acrobat Reader 5.0 or
higher to view or print this document. Earlier versions of Adobe Acrobat Reader will not produce a properly
formatted document on your computer screen. Adobe Acrobat Reader 5.0 is available as a free download from
the Adobe Web site at http://www.adobe.com.
Conventions
This User’s Guide uses these conventions:
Bold indicates emphasis or a minor heading.
Italic refers to a document title or is used for emphasis.
COURIER type indicates text visible on a computer screen or keys on your computer keyboard.
DISPLAY FONT indicates text visible on the printer control panel display.
The letter l is used in examples to distinguish the small letter l from the numeral 1 (one).
The character Ø is used in examples to distinguish the letter O from the numeral 0 (zero).
<Esc>, <CR>, <LF>, <FF>, etc. are control characters. Use a text editor to enter the equivalent of the character.
For example, to get <Esc> using a DOS text editor, hold down the Ctrl key; and press the [ (left square bracket)
key. Other text editors may vary.
NOTE:
Notes contain important information set off from the text.
CAUTION:
Caution messages appear before procedures, which, if not observed,
could result in loss of data or in damage to equipment.
WARNING:
Warning messages alert you to a specific procedure or practice,
which, if not followed correctly, could cause serious personal injury.
Security Printing Solutions User’s Guide -- Document #50-70376-001 Rev. C
TOC-1
Table of Contents
Section 1 – Features Overview
Introduction .........................................................................................................................................1-1
How to Use This Manual.....................................................................................................................1-3
Features Summary ..............................................................................................................................1-4
Section 2 – Understanding TROY’s Features
Introduction .........................................................................................................................................2-1
Default and Temporary Printer Settings ..........................................................................................2-1
Printer Security States ........................................................................................................................2-2
MICR Mode ..................................................................................................................................2-3
User Login Status .........................................................................................................................2-4
Keylock Switch..............................................................................................................................2-4
Softlock Settings............................................................................................................................2-4
MICR Toner Cartridge Sensing..................................................................................................2-4
Pre-Defined Security States .........................................................................................................2-5
Standard Printer Features..................................................................................................................2-7
MICR Mode Enabled ...................................................................................................................2-7
MICR Mode Disabled ..................................................................................................................2-8
Jam Recovery Disable ..................................................................................................................2-8
TROY MICR Toner Cartridge Detection..................................................................................2-9
MICR Toner Low/Off-Line .........................................................................................................2-9
Automatic Print Density ..............................................................................................................2-9
User-Selectable Printer Features .....................................................................................................2-10
Printer Type and MICR Mode..................................................................................................2-10
Administrator Name and Password..........................................................................................2-12
User Names and Passwords .......................................................................................................2-13
Flash-File System........................................................................................................................2-14
TROYmark™ .............................................................................................................................2-15
Security Printing Solutions User’s Guide -- Document #50-70376-001 Rev. C
TOC-2
Table of Contents
Encryption / Decryption.............................................................................................................2-17
Audit Reports..............................................................................................................................2-18
TROY Security Fonts.................................................................................................................2-20
Firmware Update Capability.....................................................................................................2-21
Exact Positioning Technology ...................................................................................................2-21
Auto-Rotate Feature...................................................................................................................2-22
Paper Tray Mapping..................................................................................................................2-22
Replaceable Escape Character..................................................................................................2-23
Language Support ......................................................................................................................2-23
Decryption Mode ........................................................................................................................2-23
Hardware-Based Security Features .................................................................................................2-24
Printer Keylock...........................................................................................................................2-24
Paper Tray Locks .......................................................................................................................2-25
Paper Tray Security Cover........................................................................................................2-25
Section 3 – System Planning and Implementation
Introduction .........................................................................................................................................3-1
Maintaining MICR Security...............................................................................................................3-1
Implementing the TROY Security Printing Solution.......................................................................3-2
Planning Worksheet ............................................................................................................................3-4
Section 4 – Using the TROY Printer Utility
Introduction .........................................................................................................................................4-1
Menu Structure....................................................................................................................................4-2
Basic Printer Utility Operations.........................................................................................................4-3
Managing System Security .................................................................................................................4-5
Setting the Administrator Password...........................................................................................4-5
Assigning User Names and Passwords (MICR Secure EX Printers Only) .......................................4-7
Security Printing Solutions User’s Guide -- Document #50-70376-001 Rev. C
TOC-3
Table of Contents
Selecting Security Options .........................................................................................................4-10
Re-Mapping Printer Paper Trays.............................................................................................4-13
Selecting Data Capture Fonts for Audit Reports and TROYmark™ ...................................4-15
Generating the TROYmark™ Background Pattern...............................................................4-18
Managing Audit Reports ..................................................................................................................4-20
Adjusting the MICR Line and/or Page Image Positioning............................................................4-24
Using the Auto-Rotate Feature.........................................................................................................4-26
Managing Printer Resources ............................................................................................................4-27
Updating the Printer Firmware ................................................................................................4-27
Adding / Deleting Printer Resources ........................................................................................4-28
Printing Test and Demonstration Pages..........................................................................................4-32
Verifying MICR Print Quality ..................................................................................................4-32
Identifying Print Defects............................................................................................................4-33
Accessing TROY Fonts Using Non-Windows Applications....................................................4-34
Verifying Windows Font Support.............................................................................................4-34
Verifying PCL 5e Communication............................................................................................4-36
Verifying Printer Configuration ...............................................................................................4-39
Downloading Files to the Printer .....................................................................................................4-40
Obtaining Technical Information ....................................................................................................4-41
Section 5 – Installing the TROY Support Files
Introduction .........................................................................................................................................5-1
Install the HP PCL 5e Printer Driver for Microsoft Windows .......................................................5-1
Install the TROY Support Files for Windows ..................................................................................5-3
Install the TROY Software for Windows ..........................................................................................5-6
Test the TROY Font Support for Windows....................................................................................5-10
Accessing TROY Fonts Using Non-Windows Applications....................................................5-10
Security Printing Solutions User’s Guide -- Document #50-70376-001 Rev. C
TOC-4
Table of Contents
Check the MICR Print Quality ........................................................................................................5-12
Identifying Print Defects............................................................................................................5-13
Software Uninstall Procedures.........................................................................................................5-13
Section 6 – Using the TROY Port Monitor
Introduction .........................................................................................................................................6-1
Installing the TROY Port Monitor ....................................................................................................6-3
Accessing the TROY Port Monitor....................................................................................................6-3
Using the TROY Port Monitor...........................................................................................................6-6
Connection Tab.............................................................................................................................6-6
Encryption Tab.............................................................................................................................6-7
Security Tab ..................................................................................................................................6-8
Section 7 – Using the Printer Control Panel
Introduction .........................................................................................................................................7-1
Security.................................................................................................................................................7-1
Functionality ........................................................................................................................................7-2
Accessing Printer Features ..........................................................................................................7-2
Entering the Administrator Password........................................................................................7-2
Saving Printer Settings.................................................................................................................7-3
TROY Security Printing Solution Menu Map..................................................................................7-4
Using the Exact Positioning Technology ...........................................................................................7-6
Section 8 – Using TROY Fonts
Introduction .........................................................................................................................................8-1
Accessing and Using TROY Fonts .....................................................................................................8-1
Accessing the TROY Fonts Using Windows Applications........................................................8-1
Accessing the TROY Fonts Using Non-Windows Applications ...............................................8-2
Security Printing Solutions User’s Guide -- Document #50-70376-001 Rev. C
TOC-5
Table of Contents
Using TROY MICR Fonts ...........................................................................................................8-2
Using the Convenience Amount Fonts........................................................................................8-2
Using the TROY Security Fonts..................................................................................................8-2
Using the TROY Messaging Fonts..............................................................................................8-2
Using the TROY OCR Fonts .......................................................................................................8-2
Using the Reverse Helvetica Font ...............................................................................................8-2
Using the TROY AutoProtect Font.............................................................................................8-3
Using the TROY Microprint Font ..............................................................................................8-3
Using the POSTNET Font ...........................................................................................................8-3
Using the British Pound and Euro Symbols...............................................................................8-3
Using the Data Capture Fonts .....................................................................................................8-4
Using Printer Fonts and Screen Fonts...............................................................................................8-6
MICR Font Guidelines........................................................................................................................8-7
Priority of Font Locations............................................................................................................8-7
Font Character Mapping ....................................................................................................................8-8
Determining a Character Mapping ............................................................................................8-9
Accessing Unmapped Characters ...............................................................................................8-9
Standard ASCII Character Set .................................................................................................8-10
TROY MICR E-13B 12-Point Font ..........................................................................................8-11
TROY MICR CMC-7 12-Point Font ........................................................................................8-12
TROY Enhanced Convenience Amount (Scalable).................................................................8-12
TROY Large Convenience Amount 18-Point Font .................................................................8-13
TROY Small Convenience Amount 24-Point Font..................................................................8-13
TROY AutoProtect™ Font........................................................................................................8-14
TROY Security Font (Scalable) ................................................................................................8-14
TROY Security Font (Spanish)(Scalable) ................................................................................8-14
Security Printing Solutions User’s Guide -- Document #50-70376-001 Rev. C
TOC-6
Table of Contents
TROY Reverse Helvetica Font ..................................................................................................8-15
TROY OCR-A Font (Scalable)..................................................................................................8-16
TROY OCR-B Font (Scalable)..................................................................................................8-18
TROY UPC-A Barcode..............................................................................................................8-20
TROY UPC-E Barcode ..............................................................................................................8-21
TROY EAN-8 Barcode...............................................................................................................8-22
TROY EAN-13 Barcode.............................................................................................................8-23
TROY BC25 Barcode.................................................................................................................8-24
TROY BC39 Barcode.................................................................................................................8-25
TROY BC128 Barcode...............................................................................................................8-26
TROY POSTNET.......................................................................................................................8-27
TROY POSTNET Reverse (optional).......................................................................................8-28
International Convenience Amount Fonts ......................................................................................8-29
British Large Convenience Amount Font ................................................................................8-29
French Large Convenience Amount Font................................................................................8-29
Italian Large Convenience Amount Font.................................................................................8-29
Spanish Large Convenience Amount Font...............................................................................8-29
British Small Convenience Amount Font.................................................................................8-30
French Small Convenience Amount Font ................................................................................8-30
Italian Small Convenience Amount Font .................................................................................8-30
Spanish Small Convenience Amount Font ...............................................................................8-30
Section 9 – Troubleshooting / Error Messages
Troubleshooting by Symptom ............................................................................................................9-1
Troubleshooting by Printer Control Panel Display Message ........................................................9-10
Security Printing Solutions User’s Guide -- Document #50-70376-001 Rev. C
TOC-7
Section 1
Introduction
Features Overview
Thank you for purchasing your TROY Security Printing Solution. You have chosen the highest quality MICR
(Magnetic Ink Character Recognition) printing solution available today that offers convenience, flexibility,
security, and precision for printing high-quality MICR documents.
This User’s Guide provides information for setting up and using your TROY Security Printing Solution. The
TROY Security Printing Solutions covered in this User’s Guide are available in the product configurations
described below:
•
TROY MICR Font DIMM (Dual Inline Memory Module) – designed for use in selected HewlettPackard LaserJet printers, the TROY MICR Font DIMM features an enhanced collection of MICR, OCR
(Optical Character Recognition), barcode, and security fonts designed for printing financial documents.
None of the operational or security features listed in this guide pertain to this product. This product can
be added to a standard Hewlett Packard printer.
•
TROY MICR Secure DIMM (Dual Inline Memory Module) – designed for use in selected HewlettPackard LaserJet printers, the TROY MICR Secure DIMM features an enhanced collection of MICR,
OCR (Optical Character Recognition), security fonts, and barcode fonts. The TROY MICR Secure
DIMM also includes several convenient, easy-to-use operational and security features, including a flashfile system for storage of public printing resources such as company logos, electronic forms, and custom
fonts. The TROY MICR Secure DIMM automatically configures the printer to create the highest quality
MICR documents possible and prevents inadvertent printing of duplicate checks.
•
TROY MICR Printer – a Hewlett-Packard printer pre-configured with the TROY MICR DIMM, plus
TROY’s MICR toner sensing system, a TROY MICR toner cartridge, and optional input paper tray locks.
This product is designed for printing high-quality MICR documents and utilizes several convenient, easyto-use operational features, including a flash-file system for storage of printing resources such as
company logos, electronic forms, and custom fonts.
•
TROY MICR Secure Printer – a Hewlett-Packard printer pre-configured with the TROY MICR Secure
DIMM (described above), plus TROY’s MICR toner sensing system, a TROY MICR toner cartridge, and
optional input paper tray locks. This product is designed for the secure printing of high-quality MICR
documents and utilizes several convenient, easy-to-use operational and security features, including a
flash-file system for storage of printing resources such as company logos, electronic forms, and custom
fonts.
Security Printing Solutions User’s Guide -- Document #50-70376-001 Rev. C
1-1
Section 1
Introduction
(cont.)
Features Overview
•
TROY MICR Secure EX Printer – a Hewlett-Packard printer pre-configured with the TROY MICR
Secure DIMM (described on the previous page), plus TROY’s MICR toner sensing system, a TROY
MICR toner cartridge, a printer keylock switch, input paper tray locks, and also includes the TROYmark
feature and AutoProtect font. This top-of-the-line product is designed for the secure printing of highquality MICR documents and utilizes several convenient, easy-to-use operational and security features,
including a flash-file system for storage of printing resources such as company logos, electronic forms,
and custom fonts.
This User’s Guide covers all configurations of TROY Security Printing Solutions. Therefore, some of the topics
and/or features described in this manual may not be applicable to your specific TROY Security Printing Solution.
Security Printing Solutions User’s Guide -- Document #50-70376-001 Rev. C
1-2
Section 1
How to Use
this Manual
Features Overview
Before setting up your new TROY Security Printing Solution, it is recommended that you read the first three
sections of this User’s Guide to familiarize yourself with the features available of your TROY Security Printing
Solution, and to develop an implementation plan for setting up and managing your TROY printing environment.
A RECOMMENDED APPROACH FOR USING THIS MANUAL IS AS FOLLOWS:
•
Familiarize Yourself with the Features of Your TROY Security Printing Solution: Begin by reading the
summary of TROY features (listed on the following pages) designated for your TROY Security Printing
Solution. These summaries quickly introduce all of the user-selectable features available in each of the
TROY Security Printing Solutions. Many of these features can be enabled/disabled or configured to meet
the needs of your MICR printing environment. Identify the features specific to your TROY Security
Printing Solution and decide which of these features you wish to implement within your MICR printing
environment.
•
Study the Features You Wish to Implement: Read Section 2 – Understanding TROY’s Features for a
description of the TROY Security Printing Solutions features you wish to implement.
•
Develop an Implementation Plan: Read Section 3 – System Planning and Implementation for suggestions
on developing an implementation plan that will allow you to efficiently setup and manage your MICR
printing system. Planning your MICR printing system configuration in advance will minimize the setup
time and optimize your day-to-day operations.
•
Roll Out the Implementation Plan: Use the procedures in Section 4 – Using the TROY Printer Utility,
Section 6 – Using the TROY Port Monitor, Section 7 – Using the Printer Control Panel, and Section 8 –
Using TROY Fonts to roll out the implementation plan for your TROY Security Printing Solution.
NOTE: If you have any difficulties using your TROY Security Printing Solution, please refer to Section 9 –
Troubleshooting / Error Messages for more information. If you need additional assistance, please call TROY
Technical Support at (800) 332-6427 Monday through Friday, 8:00 AM to 8:00 PM, Eastern Standard Time.
Security Printing Solutions User’s Guide -- Document #50-70376-001 Rev. C
1-3
Section 1
Features
Summary
Features Overview
The TROY features listed below allow you to customize the operation of your TROY Security Printing Solution,
adding flexibility, convenience, and security. Some of these features may not be available for your specific type
of Security Printing Solution. The following table summarizes the TROY product features and availability:
*Product Code
1 = TROY MICR Secure EX Printer
2 = TROY MICR Secure Printer / TROY MICR Secure DIMM Kit
3 = TROY MICR Printer
4 = TROY Font DIMM Kit
Feature
Description
Access
Product
TROY MICR Fonts
Used to print the MICR line at the bottom of the check using the ANSI E-13B
or the ISO CMC-7 MICR font
(Application)
1, 2, 3, 4
TROY Convenience
Fonts
Used to print the check amount information in the Legal Amount field of the
check for increased readability
(Application)
1, 2, 3, 4
TROY Security
Fonts
Used to print the legal amount information on the check for security and
readability (English and Spanish)
(Application)
1, 2, 3, 4
TROY OCR Fonts
Used to print names and address on the check that are to be read by
automated optical readers
(Application)
1, 2, 3, 4
TROY Microprint
Font
Used to print security messages on checks that cannot be reproduced by
photocopying
(Application)
1, 2, 3, 4
TROY Barcode and
POSTNET Fonts
Used to print several types of industry-standard barcodes for a variety of
uses, and also includes a POSTNET font for printing the U.S. postal bar code
that represents the 9-digit zip code printed below the postal address
(Application)
1, 2, 3, 4
British Pound and
Euro Symbols
Used as the British or European currency symbol for the respective country (used in
place of U.S dollar sign). These symbols can be selected to print in the audit reports.
(Application)
1, 2, 3, 4
TROY AutoProtect™
Font
Provides a visual safeguard to identify checks printed without TROY MICR
toner and/or the TROY MICR font
(Application)
1, 2
TROY Invisible Font
Used to add text to that will not print in the main body of the check or check
stub but can be captured for use in the audit report or the TROYmark
background image that is printed diagonally on the face of the check
(Application)
Printer Utility
1, (option
for 2)
TROYmark™
Prints a user-defined repeating background diagonally on the check using
redundant check information to prevent fraud
Port Monitor
1, (option
for 2)
User Names and
Passwords
Provides user-level security for the secure resources (MICR font, signatures,
macros) stored in the printer memory
Port Monitor
Printer Utility
1, 2
Security Printing Solutions User’s Guide -- Document #50-70376-001 Rev. C
1-4
Section 1
Features
Summary
(cont.)
Features Overview
Feature
Description
Access
Product
Control Panel
1, 2, 3
Control Panel
Password
Allows only administrators to access the MICR features from the printer
control panel by using a unique password
Data Encryption /
Decryption
Provides encryption of data sent over a public network to the MICR printer
and decryption of the data at the printer
Port Monitor
1, 2
Audit Reports
Records and prints a selectively detailed report of the MICR printing activity
by capturing user-selected information from each check during a print job
Printer Utility
Control Panel
1, 2
Flash-File System
Uses a non-volatile memory area of the printer DIMM to store
signatures/logos, macros, forms, etc.
(Application)
Printer Utility
1, 2, 3
Flash Memory
Update
Allows administrators to download firmware maintenance or feature updates
into to the TROY MICR flash DIMM
Printer Utility
1, 2, 3
Exact Positioning
Technology
Allows vertical and horizontal repositioning of the MICR line on the check or
repositioning and/or rotation of the entire page
Printer Utility
Control Panel
1, 2, 3
Auto-Rotate
Allows 180-degree rotation of your check image so that the MICR line prints
on the leading edge of the printed page
Printer Utility
Control Panel
1, 2, 3, 4
Paper Tray Remapping
Overrides the printer default paper tray assignment with user tray assignment
preferences (e.g., paper tray #2 reassigned to be used as paper tray #1)
Printer Utility
1, 2, 3
MICR Toner
Cartridge Sensing
Selects either continuous MICR toner cartridge sensing or checks for MICR
toner only when a TROY MICR font is used to prevent the printing of MICR
documents using non-MICR toner
Printer Utility
Control Panel
1, 2, 3
(except
DIMM kit)
3-Position Keylock
Uses a physical key to select the mode of the printer – Printer Locked (no
printing), MICR Locked (print non-MICR documents only), Print MICR (MICR
fonts/secure resources are available)
Printer
1
Soft-Lock
Allows the administrator to set a 4-digit PIN to prevent users from disabling
the Printer Locked mode or the MICR Locked mode
Printer Utility
Control Panel
1, 2
Job Lock
Restricts the printing of a specific print job to users having the PIN (personal
identification number) associated with the print job
Printer Utility
Control Panel
1, 2
Paper Tray Security
Cover
Prevents rear access to the check stock stored inside the printer paper trays
Printer
1, (option
for 2)
Paper Tray Locks
Allows paper trays to be locked to prevent unauthorized access to check
stock stored inside the printer
Printer
1, (option
for 2)
Replaceable Escape
Character
Allows an alternate ASCII character to be used to represent a particular
ASCII escape character used in PCL commands when that escape character
cannot be used in Windows
Port Monitor
Printer Utility
Control Panel
1, 2, 3
Security Printing Solutions User’s Guide -- Document #50-70376-001 Rev. C
1-5
Section 2
Introduction
Understanding TROY’s Features
TROY Security Printing Solutions offer many convenient features for managing and printing high-quality MICR
documents in single or multi-user environments. This section provides detailed descriptions of the features built
into the TROY Security Printing Solutions. For specific operating procedures and guidelines, refer to the
appropriate sections of this guide for using the TROY Printer Utility, TROY Port Monitor, and printer control
panel.
TROY standard security features (described on page 2-7) provide the basic functionality built into each TROY
Security Printing Solution. These features operate automatically and cannot be defeated or re-configured by the
user. TROY user-selectable security features (refer to page 2-12) offer additional configuration flexibility to
selected TROY Security Printing Solutions.
NOTE: This section covers all the features of TROY Secure Printing Solutions. Therefore, some of the topics
and/or features described may not be applicable to your specific TROY Security Printing Solution. Refer to the
features summary in Section 1 of this User’s Guide.
Default and
Temporary
Printer
Settings
Each feature of a TROY Security Printing Solution has a default setting within the printer. These default settings
determine how each printer feature will function when a print job is sent to the printer. The administrator can
change the default settings to meet the needs of a variety of MICR printing environments using the TROY Printer
Utility or the printer control panel.
There are also a number of features that can be varied on a print job by print job basis. Using data encryption and
default paper tray mappings are examples of job-specific features. After each print job completes, all feature
settings return to their default values. Use the TROY Port Monitor to select job-specific features. Refer to
Section 6 – Using the TROY Port Monitor - for more detailed information.
Security Printing Solutions User’s Guide -- Document #50-70376-001 Rev. C
2-1
Section 2
Printer
Security
States
Understanding TROY’s Features
To help maintain a secure MICR printing environment, TROY Security Printing Solutions have security features
that, in combination, create security states. The interdependency of these security states ensures the integrity of
the MICR printing security features, which can be enabled and/or configured to meet your specific security
requirements. These features can be accessed through the TROY Printer Utility or the printer control panel. It is
important that the administrator create a unique administrator password to safeguard the security settings by
preventing unauthorized access to the TROY Printer Utility and the printer control panel.
The MICR functions built into the TROY Security Printing Solutions operate under a pre-defined set of security
states. When a MICR print job is sent to the printer, the TROY printer firmware monitors up to four security
states to determine if the pre-defined set of conditions is correct to allow the MICR job to print.
These four security states, monitored sequentially, are as follows:
•
•
•
•
MICR mode – MICR mode enabled or disabled (software-based feature)
Login status – Valid user name and password entered (optional)
Keylock switch position and/or Softlock setting – MICR Locked, Printer Locked, or Print MICR modes
MICR toner cartridge sensing – TROY MICR toner cartridge installed in printer
NOTE: The printer keylock switch is present on TROY MICR Secure EX printers only. MICR toner cartridge sensing
is present on all TROY printer models. The Softlock feature is present on TROY MICR Secure, MICR Secure EX
printers, and MICR Secure DIMM Kits only.
Security Printing Solutions User’s Guide -- Document #50-70376-001 Rev. C
2-2
Section 2
MICR Mode
Understanding TROY’s Features
TROY Security Printing Solutions can be set to a default MICR mode of either ENABLED or DISABLED to suit the
security requirements of your MICR printing environment. MICR mode must be enabled to allow the printing of
MICR checks and documents. The following table describes the operational characteristics of the MICR mode
enabled and disabled states. Refer to page 2-7 in this section for detailed information.
MICR Mode
Operational Characteristics
MICR ENABLED
A TROY MICR font call will cause the user login, printer keylock switch, Softlock, and MICR toner
cartridge statuses to be checked for MICR printing availability. If the correct conditions exist
(authorized user login, keylock switch set to appropriate setting, Softlock PIN validated, and a MICR
toner cartridge installed), the MICR print job will proceed normally. Sending a MICR DISABLE command
will change the MICR ENABLED mode to MICR DISABLED.
MICR DISABLED
A TROY MICR font call will cause the TROY MICR font to automatically be substituted for an alternate
font using the same font data. The current status of the printer keylock switch, Softlock, or presence of
a MICR toner cartridge will not affect the MICR printing availability. MICR cannot be printed with MICR
mode DISABLED. Sending a MICR ENABLE command will change the MICR DISABLED mode to MICR
ENABLED.
NOTE: The printer keylock switch is present on TROY MICR Secure EX printers only. MICR toner cartridge sensing
is present on all TROY printer models. The Softlock feature is present on TROY MICR Secure, MICR Secure EX
printers, and MICR Secure DIMM Kits only.
Security Printing Solutions User’s Guide -- Document #50-70376-001 Rev. C
2-3
Section 2
Understanding TROY’s Features
User Login Status
If the administrator has implemented user names and passwords, a valid user name and password must be
provided in the TROY Printer Utility or entered at the printer control panel before any of the printer’s secure
resources can be accessed or a MICR print job can be printed. Refer to page 2-13 in this section for detailed
information.
Keylock Switch
The 3-position printer keylock switch allows the printer’s secure resources to be
locked out (allowing only non-MICR documents to print), or the printer can be
completely disabled (no documents can be printed). The printer keylock switch
overrides all MICR mode settings selected in either the TROY Printer Utility or the
TROY Port Monitor. Refer to page 2-24 in this section for detailed information.
Softlock Settings
The Softlock feature prevents unauthorized printing of documents (selectable to lock out either MICR, nonMICR, or all documents) by requiring that a valid 4-digit PIN (Personal Identification Number) be entered at the
printer control panel before a job will print. On TROY MICR Secure EX printers, the Softlock feature works in
conjunction with the physical 3-position printer keylock switch, adding an additional layer of security and
providing an alternate method for controlling access to print jobs. Refer to page 4-10 for detailed information.
MICR Toner
Cartridge Sensing
To prevent the printing of MICR documents with standard (non-MICR) toner, all TROY printers are designed to
detect the presence of a TROY MICR toner cartridge installed inside the printer. A MICR toner cartridge must
be installed in the printer before printing MICR documents. Banks will reject all checks not printed with MICR
toner and you may be charged a manual processing fee for each rejected (machine-unreadable) check. Refer to
page 2-9 in this section for detailed information.
Security Printing Solutions User’s Guide -- Document #50-70376-001 Rev. C
2-4
Section 2
Pre-defined
Security States
Understanding TROY’s Features
The following table describes the general pre-defined security states built into TROY Security Printing Solutions.
) TROY MICR Secure EX Printers Only
Security Printing Solutions Feature
Required Security State
(MICR Printers)
Required Security State
(MICR Secure Printers)
Print TROY E13-B MICR font
MICR mode enabled
MICR mode enabled
Print TROY CMC-7 MICR font
MICR toner cartridge installed
TROY MICR toner cartridge installed
Valid user login (if previously set up)
Valid PIN entered for Softlock (if enabled)
Keylock switch set to Print MICR )
Print TROY Convenience Amount fonts
N/A
Valid user login
Access TROY Auxiliary fonts (Data Capture, OCR,
AutoProtect™, Messaging, Microprint, Security, etc.)
N/A
Valid user login
Access signatures, fonts, logos, forms, and macros
stored in the secure memory area of the printer
N/A
Valid user or administrator login
Access signatures, fonts, logos, forms and macros stored
in the public memory area of the printer
(No security requirements)
(No security requirements)
Use the TROYmark™ feature for the background image
on your checks
N/A
(No security requirements) )
Encrypt MICR print data sent to your MICR printer over a
network
N/A
Encryption and decryption passwords
must be the same
Add or delete a printer user name and password
N/A
Valid administrator login
Print an audit report
N/A
Valid user or administrator login
Security Printing Solutions User’s Guide -- Document #50-70376-001 Rev. C
2-5
Section 2
Pre-defined
Security States
(cont.)
Understanding TROY’s Features
Use Exact Positioning Technology feature to adjust the
MICR line position on your printed checks
Valid administrator login
Valid administrator login
Use the Auto-Rotate Feature
Valid administrator login
Valid administrator login
Re-map the printer paper trays
Valid administrator login
Valid administrator login
Print a list of the printer’s secure resources
Valid administrator login
Valid administrator login
Add or delete secure printer resources in the printer’s
flash-file system
Valid administrator login
Valid administrator login
Update the printer firmware
Valid administrator login
Valid administrator login
Print the MICR Quality Document
MICR mode enabled
MICR mode enabled
MICR toner cartridge installed
TROY MICR toner cartridge installed
Valid user login (if previously set up)
Valid PIN entered for Softlock (if enabled)
Keylock switch set to Print MICR )
Print the Windows Security Font demonstration page
MICR mode enabled
MICR mode enabled
MICR toner cartridge installed
TROY MICR toner cartridge installed
Valid user login
Valid user login
Valid PIN entered for Softlock (if enabled)
Valid PIN entered for Softlock (if enabled)
Keylock switch set to Print MICR )
Print the PCL MICR demonstration page
MICR mode enabled
MICR mode enabled
MICR toner cartridge installed
TROY MICR toner cartridge installed
Valid user login
Keylock switch set to Print MICR )
Print the printer configuration page
(No security requirements)
(No security requirements)
) TROY MICR Secure EX Printers Only
Security Printing Solutions User’s Guide -- Document #50-70376-001 Rev. C
2-6
Section 2
Understanding TROY’s Features
Standard
Printer
Features
In addition to the printing features provided in the Hewlett-Packard LaserJet printers, TROY Security Printing
Solutions include additional functionality specifically designed for printing high-quality MICR documents.
These standard printer features are included in all TROY Security Printing Solutions and function automatically
without user intervention.
MICR Mode
Enabled
To print MICR (Magnetic Ink Character Recognition) on financial documents and checks, TROY printers use a
special MICR mode. With MICR mode enabled (factory default MICR mode is MICR Enabled), specific printer
features are automatically set to the required mode for printing MICR documents. In addition, TROY printers
will check for the presence of a TROY MICR toner cartridge, the state of the Softlock feature, and the position of
the printer keylock switch to determine if the proper security states exist (i.e., TROY MICR toner cartridge
installed, valid PIN entered for Softlock feature, printer keylock switch set to Print MICR) to allow MICR
printing using TROY Security fonts. MICR mode provides the following special features:
•
•
•
•
•
•
Enables access to the TROY Security fonts.
Displays NO MICR TONER on the printer control panel, and will not print MICR documents if a TROY MICR
toner cartridge is not installed when the keylock switch is set to Print MICR.
Disables Jam Recovery feature (does not allow the automatic reprinting of a document after a paper jam).
Automatically sets the Print Density (lightness/darkness of the printed characters) to the necessary value
required for high-quality MICR printing.
Places the printer off-line after a LOW MICR TONER message.
Maintains full PCL (Printer Control Language) functionality.
NOTE: If MICR mode is not enabled and an attempt is made to use the TROY MICR font, an alternate font will
automatically be substituted for the MICR font.
NOTE: The printer keylock switch is present on TROY MICR Secure EX printers only. The Softlock feature is
present on TROY MICR Secure, MICR Secure EX printers, and MICR Secure DIMM Kits only.
Security Printing Solutions User’s Guide -- Document #50-70376-001 Rev. C
2-7
Section 2
MICR Mode
Disabled
Understanding TROY’s Features
With MICR mode disabled, the printer functions as a normal Hewlett-Packard LaserJet printer in standard PCL
(Printer Control Language) mode with all MICR features disabled. In PCL mode, the TROY Security Printing
Solutions provide the following features:
•
•
•
•
Jam Recovery
Disable
Switches Jam Recovery ON (any page that did not properly exit the printer will be automatically
reprinted).
Enables printing with or without a MICR toner cartridge installed.
Blocks access to fonts stored in the secure memory area of the TROY flash-file system but continues to
allow access to the Convenience Amount fonts.
The toner low/off-line function will be set to the user default condition.
A major security concern is the possibility of printing duplicate MICR documents after a paper jam, without the
printer or application software acknowledging the event. With MICR mode disabled, TROY printers will
automatically reprint pages being processed by the printer when a paper jam occurs.
With MICR mode enabled, the Jam Recovery function is disabled to prevent the unwanted reprinting of a
financial document. When a paper jam occurs, all information being processed will be erased from the printer
memory (all image-processed pages that have not reached the output tray will be lost). Up to three pages of data
could be lost. When a paper jam occurs, the software application should provide the necessary jam recovery
options and reprint any documents lost during the jam.
Security Printing Solutions User’s Guide -- Document #50-70376-001 Rev. C
2-8
Section 2
TROY MICR
Toner Cartridge
Detection
Understanding TROY’s Features
TROY printers use a MICR toner cartridge detection sensor designed to detect the presence of a TROY MICR
toner cartridge installed in the printer. If MICR mode is enabled with the Softlock feature disabled (valid PIN
entered) and/or the printer keylock switch set to Print MICR, and a TROY MICR toner cartridge is not installed
when an attempt is made to use a MICR font, the LOAD MICR TONER message will display on the printer control
panel and the MICR features will be disabled. In order to proceed with MICR printing, you must replace the
non-MICR toner cartridge with a TROY MICR toner cartridge, and then press CONTINUE to proceed -- or press
CANCEL to stop the print job.
NOTE: TROY Security Printing Solutions require the use of TROY MICR toner cartridges to print MICR documents.
For information on MICR toner, refer to the TROY MICR Basics Handbook, Section 4 - Selecting Check Paper and
MICR Toner.
NOTE: The printer keylock switch is present on TROY MICR Secure EX printers only. The Softlock feature is
present on TROY MICR Secure, MICR Secure EX printers, and MICR Secure DIMM Kits only.
MICR Toner
Low/Off-Line
Printing when toner is low may cause reader/sorter misreading at the bank due to low MICR signal levels. When
the printer is switched into MICR mode ENABLED and a toner low condition occurs, the printer will go off-line,
and a LOW TONER message will be displayed on the printer control panel. You should replace the used toner
cartridge with a new TROY MICR toner cartridge before you place the printer back on-line.
NOTE: To ensure consistent MICR print quality, always replace the TROY MICR toner cartridge when your TROY
printer first displays a LOW TONER message.
Automatic Print
Density
Each time the printer is switched to MICR mode enabled, the print density is automatically set to a predetermined value required for MICR printing. If the user changes the density setting to accommodate a nonMICR print job, the density will automatically return to the pre-determined MICR value when the printer is
switched back to MICR mode ENABLED.
NOTE: You can change the density setting; however, the printer will ignore the setting and use the pre-determined
MICR setting when printing MICR documents. TROY does not support any density setting other than the predetermined MICR density value.
Security Printing Solutions User’s Guide -- Document #50-70376-001 Rev. C
2-9
Section 2
Understanding TROY’s Features
UserSelectable
Printer
Features
The user-selectable printer features allow you to customize the operation of your TROY Security Printing
Solution, adding flexibility, convenience and security. The TROY Printer Utility is designed to assist the
administrator with the configuration of the printer’s default MICR and security features (refer to Section 4 –
Using the TROY Printer Utility for detailed information). The TROY Port Monitor is designed to allow
authorized users access to the printer’s secured resources and to select print job-specific features (refer to Section
6 – Using the TROY Port Monitor for detailed information). Before making any changes to the factory default
printer settings, the administrator should refer to Section 3 – System Planning and Implementation to obtain
helpful suggestions for setting up and managing your MICR printing system.
Printer Type and
MICR Mode
TROY Security Printing Solutions can be set to one of four pre-defined Printer Types to suit the security
requirements of your MICR printing environment. MICR mode must be enabled to allow the printing of MICR
documents. If a user attempts to print MICR documents with MICR mode disabled, the documents will print;
however, an alternate font will be automatically substituted for the MICR font. The MICR On setting provides
the least level of security, while the MICR Off with Timeout setting provides the highest level of security for
MICR printing.
The Printer Type determines the default MICR mode (either MICR enabled or MICR disabled) for the MICR
printer. The default MICR mode is the default state of the TROY Security Printing Solutions printer (either
MICR enabled or MICR disabled) when the printer is first powered up and/or when the current MICR print job
has finished (depending on the printer type selected). Specific commands written into your check-writing
application will automatically enable and disable MICR mode as needed for your MICR printing environment;
however, the printer will always automatically reset itself to the pre-defined MICR mode when the printer is first
powered up or when the current MICR print job has finished. The table on the next page describes the userselectable Printer Types that can be selected using the TROY Printer Utility.
NOTE: All TROY Security Printing Solutions are shipped from the factory with the default MICR mode set to “MICR
Enabled”.
Security Printing Solutions User’s Guide -- Document #50-70376-001 Rev. C
2-10
Section 2
Printer Type and
MICR Mode
(cont.)
Understanding TROY’s Features
Printer Type
Feature Description
Security
Level
MICR Off
(timeout)
The default MICR mode is DISABLED. The printer will always default to MICR
disabled when powered ON. The printer will automatically reset to MICR disabled
at the end of each print job or after a set amount of time has elapsed after the print
job has finished. When MICR mode is enabled via a software command, the TROY
MICR toner sensor will verify that a TROY MICR toner cartridge is present
whenever a TROY MICR font is used. If MICR mode is disabled and an attempt is
made to use a TROY MICR font, an alternate font will automatically be substituted
for the MICR font.
High
MICR Off
The default MICR mode is DISABLED. The printer will always default to MICR
disabled when powered ON. If MICR mode is disabled and an attempt is made to
use a TROY MICR font, an alternate font will be substituted for the MICR font. If
MICR mode is enabled, the TROY MICR toner sensor will verify that a TROY MICR
toner cartridge is present whenever a TROY MICR font is used. If MICR mode is
set to enabled, the printer will remain in this mode until explicitly changed to MICR
disabled.
Medium-High
MICR Always
The default MICR mode is ENABLED. The printer will always default to MICR
enabled when powered ON and the MICR toner sensor will continuously verify that
a TROY MICR toner cartridge is present in the printer. If MICR mode is disabled
and an attempt is made to use a TROY MICR font, an alternate font will
automatically be substituted for the MICR font. If MICR mode is disabled, the
printer will remain in this mode until explicitly changed to MICR enabled.
Medium-High
MICR On
The default MICR mode is ENABLED. The printer will always default to MICR
enabled when powered ON. The TROY MICR toner sensor will verify that a TROY
MICR toner cartridge is present whenever a TROY MICR font is used. If MICR
mode is disabled and an attempt is made to use a TROY MICR font, an alternate
font will automatically be substituted for the MICR font. If MICR mode is disabled,
the printer will remain in this mode until explicitly changed to MICR enabled.
Medium
The default MICR mode can be set by configuring the hardware switch settings on
the TROY MICR DIMM (Dual Inline Memory Module) installed in the printer. The
hardware settings can be overridden by using the TROY Printer Utility to override
the current printer type to suit the requirements of your MICR printing environment.
The printer is preset at the factory to “MICR On”
(Variable)
(factory default)
Hardware
Settings
NOTE: All TROY Security Printing Solutions are shipped from the factory with the default MICR mode set to “MICR
Enabled”.
Security Printing Solutions User’s Guide -- Document #50-70376-001 Rev. C
2-11
Section 2
Administrator
Name and
Password
Understanding TROY’s Features
TROY Security Printing Solutions use an administrator password to secure the printer features and settings. The
printer uses a permanent default user name (ADMIN) that cannot be deleted or modified; however, the
administrator password can be modified using the TROY Printer Utility or the printer control panel. The
administrator default password is no password (displayed as zero on the printer control panel and as a blank
password field in the TROY Printer Utility); however, administrators are encouraged to setup a unique password
to restrict access to the TROY Security Printing Solution’s features and settings. After an administrator password
is set, all standard Hewlett-Packard printer features normally available through the printer control panel will
remain accessible to anyone without entering a password.
NOTE: The administrator’s password is stored in the printer’s non-volatile flash memory and will remain resident
even when the printer power is turned OFF.
NOTE: It is the administrator’s responsibility to safeguard all name and password information, including printouts
and the electronic name and password lists (UPL files) saved on the administrator’s computer.
Although the administrator password can be set via the printer control panel, TROY strongly recommends using
the TROY Printer Utility to select or modify the administrator password (see note below). The TROY Printer
Utility will automatically update the printer’s administrator password whenever the password is changed in the
printer utility. However, changing the administrator password at the printer control panel will not update the
TROY Printer Utility password (no bi-directional communication). The administrator password stored in the
printer and the TROY Printer Utility must be identical in order to access the printer features using the TROY
Printer Utility.
NOTE: Initially, the default password for the printer is blank (no password). To maintain printer security, it is
strongly recommended that the administrator change the password to prevent unauthorized access to the printer
control panel.
NOTE: If you plan to use the TROY Printer Utility exclusively to set or enter the administrator password
(recommended), then both letters and numbers may be used for the administrator password.
Security Printing Solutions User’s Guide -- Document #50-70376-001 Rev. C
2-12
Section 2
User Names and
Passwords
Understanding TROY’s Features
The user names and passwords feature allows the administrator to set up to 20 user names and passwords (one
administrator and 19 users) to prevent unauthorized access of the TROY Security Printing Solution’s secure
resources and other security features. All names and passwords are stored in the secure memory area of the
TROY flash-file system and can be assigned and/or modified by the administrator using the TROY Printer
Utility. The administrator can print a list of active user names and passwords using the TROY Printer Utility or
printer control panel.
If the administrator configures a TROY printer with one or more user names and passwords, the following list of
features will only be accessible to print jobs or user requests at the control panel when a valid user name and
password is used to login to the printer.
Secure features available in selected TROY Security Printing Solutions when a user is logged in:
•
•
•
•
•
•
Access to the TROY Security fonts.
Access to resources stored in the secure memory area of the printer’s flash-file system
Changes to the MICR mode
Disabling the paper tray mapping set by an administrator
Print audit reports and delete audit records
Print sample reports containing MICR characters (Windows Demo and PCL Demo pages).
User names will be automatically recorded in the audit data for each print job initiated by a user. The system
default user password is blank (no password) and not entering a user password when assigning a new user will
allow that user to access the TROY printer’s secure resources without using a password. Attempts to add
duplicate users will be ignored. If you choose not to set up any user names and passwords, TROY strongly
recommends that administrators set up an administrator password to prevent unauthorized access to the TROY
printer features and settings from the TROY Printer Utility, the TROY Port Monitor, or the printer control panel.
Security Printing Solutions User’s Guide -- Document #50-70376-001 Rev. C
2-13
Section 2
Understanding TROY’s Features
Flash-File System
TROY Security Printing Solutions contain a non-volatile flash-file system that can be used to store printing
resources (company logos, forms, macros, etc.). TROY MICR Secure printers, MICR Secure EX printers, and
MICR Secure DIMM Kits have a flash-file system that is divided into a secure and public memory area.
Digitized signatures, logos, and other proprietary printer resources are typically stored in the secure area of the
flash-file system to prevent unauthorized access to these resources. If user names and passwords are set up by the
administrator, each user must log in to the printer using a valid user name and password to obtain access to these
secure resources.
Public resources, such as commonly used company logos, forms, macros, or other non-proprietary printer
resources, can be stored in the public memory area of the flash-file system for access by all users without
requiring valid user login. All TROY Security Printing Solutions (except the MICR Font DIMM Kit) contain a
public flash-file system.
By entering a valid administrator password, the administrator can use the TROY Printer Utility to add or delete
these resources from the secure and/or public memory areas of the flash-file system.
NOTE: Resources stored in the printer’s flash-file system will remain resident even when the printer power is
switched OFF.
NOTE: Only “clean” PCL macros can be saved and executed from the flash-file system. The macro cannot contain
any PJL (Printer Job Language) or Esc E (reset) commands. If a macro was created in Windows by printing to a
file using a PCL 5e printer driver, then you must open the macro file in a Hex editor and manually remove all PJL
and Esc E commands before the macro can be used with the printer. Please refer to the Hewlett-Packard PCL
manual for additional information.
Security Printing Solutions User’s Guide -- Document #50-70376-001 Rev. C
2-14
Section 2
TROYmark™
Understanding TROY’s Features
To discourage fraudulent alteration of the check, TROY MICR Secure EX printers (available as an option for
TROY MICR Secure printers and TROY MICR Secure DIMM Kits) can produce a background watermark
(printed as a diagonally repeating pattern across the face of the check) using user-defined information taken
directly from the check data (i.e., convenience amount, payee name, etc.). For example, by capturing the
convenience amount or payee name fields of the check, the anti-tampering watermark will be specific to each
check, adding to the security of the printed document (see the example on the next page).
The special TROY fonts, used to generate the check information in the background image, must be defined for
each available check field in order to capture the desired check data for use in TROYmark™ (refer to Section 4 –
Using the TROY Printer Utility). Once the TROYmark™ feature is enabled in the TROY Port Monitor (refer to
Section 6 – Using the TROY Port Monitor), TROYmark™ will remain active for the duration of the print job.
TROYmark™ can be selected to print at one of three pre-set density levels: light (approximately a 7% gray),
medium (approximately an 11% gray), and dark (approximately a 15% gray). The administrator can also define
three custom gray levels using the TROY Printer Utility. The background density is selected based upon the
initial check design to ensure readability of the printed information on the check.
Once the desired check fields are selected for use in the background image, the inclusion and exclusion rectangles
must then be defined (see page 6-9 for details). The inclusion rectangle (one area only) will contain the userdefined TROYmark™ image and the exclusion rectangle (one or more selected areas) will remain void of any
TROYmark™ image to ensure compliance with the ANSI X/9B check specifications. At a minimum, the
exclusion rectangle must include an area surrounding the convenience amount. The TROY Messaging font can
also be used to define data that can be included in the TROYmark™ image that will not actually appear elsewhere
on the check (refer to the Section 8 – Using TROY Fonts).
Security Printing Solutions User’s Guide -- Document #50-70376-001 Rev. C
2-15
Section 2
Understanding TROY’s Features
TROYmark™
(cont.)
(EXAMPLE OF THE TROYMARK™ BACKGROUND IMAGE INCORPORATED INTO A CHECK)
Security Printing Solutions User’s Guide -- Document #50-70376-001 Rev. C
2-16
Section 2
Encryption /
Decryption
Understanding TROY’s Features
TROY MICR Secure printers, MICR Secure EX printers, and the MICR Secure DIMM Kits provide encryption
algorithms to protect MICR documents and other documents containing sensitive or private information. Use
this feature to prevent fraudulent interception of your MICR check data being sent over a public network. In
particular, electronic data containing MICR fonts or digitized signatures needs to be protected against duplication
and fraudulent use.
By selecting one of the three available encryption/decryption algorithms, Triple-DES (DES3), TwoFish, or AES,
the user can encrypt the data being sent from the host computer to a TROY printer over a public network. Using
the same algorithm used to encrypt the data, the TROY printer will automatically decrypt, format, and then print
the incoming electronic data. Anyone attempting to capture the encrypted data being sent to the printer over a
public network will be unsuccessful in obtaining any useable information. The encryption feature can be set to
one of two modes: job-by-job (prints all encrypted and non-encrypted jobs) or always (prints only encrypted PCL
5 jobs – non-encrypted PCL 5 jobs will be purged).
Currently, the DES3 168-bit encryption method is widely used by the banking industry; however, the AES 128bit encryption method was recently approved for use by the American Banking Association. The TwoFish 128bit encryption method processes data faster than DES3 168-bit encryption method. All three encryption methods
offer a similar level of security and use a symmetrical key in which both the sender and receiver of the data use
the same key kept secure by the use of internal password phrases (pass-phrases). The same key must be used at
the host computer and printer to allow the electronic information to be decrypted by the printer.
The TROY Port Monitor includes these three encryption methods and all three are, likewise, built into all TROY
MICR Secure printers, MICR Secure EX printers, and MICR Secure DIMM Kits. No extra software is needed to
take advantage of this feature.
NOTE: Do not use encryption when sending data over a direct parallel port connection. Encryption is not
necessary for local connections and may slow the printing process.
Security Printing Solutions User’s Guide -- Document #50-70376-001 Rev. C
2-17
Section 2
Audit Reports
Understanding TROY’s Features
Use this feature to record, store, and print a report of the check printing activity sent to your TROY printer.
When enabled, the audit report feature automatically records the MICR line information (transit/routing number,
bank number and check number) each time the TROY MICR font is accessed (default mode). The print order is
also stored for each check. Additionally, the audit report can be programmed to capture the any one or more of
the following data from a check:
•
•
•
•
•
Payee name
Convenience amount
Check date
User name (the person logged in while printing the checks)
Up to three additional custom (user-defined) fields from the check
To capture the user-selected fields from the check for use in the audit report, special PCL commands must be
inserted into the PCL 5 data stream (the data sent to the printer) to mark the selected check data for recording in
the audit report. These PCL markers are placed in the printer data stream by selecting one of the designated fonts
for each desired check field, and then creating a custom PCM file (generated automatically by the PCM file
generator included in the TROY Printer Utility), and then installing the PCM file on the host computer (refer to
Section 5 – Installing the TROY Support Files). A maximum of 128 characters can be stored for each audit
record in the flash-file system.
Two versions of the audit report can be selected for printing:
•
Recent – prints only the audit data recorded since the last Recent or complete audit report was printed.
•
All – prints All recorded audit data stored in the printer’s flash memory.
NOTE: Canceling a Recent report before the report finishes printing will cause the audit information marked for
this report to be reprinted along with any subsequently recorded data when the next Recent audit report is printed.
The Recent or All records of the audit report can be selected to print in one of two formats:
•
Summary Report – prints only the number of checks printed.
•
Detailed Report – prints all audit record data and the summary line.
The audit report can be sorted in one of two sort orders using either the MICR line or print order:
•
Ascending – prints the audit data in ascending order (default).
•
Descending – prints the audit data in descending order.
Security Printing Solutions User’s Guide -- Document #50-70376-001 Rev. C
2-18
Section 2
Audit Reports
(cont.)
Understanding TROY’s Features
The TROY Messaging font can also be used to insert data into the audit record that the user does not want to
actually print on the check (refer to Section 8 – Using TROY Fonts for detailed information).
NOTE: The printer fonts are resident in the printer’s flash-file system. The screen fonts are available on the TROY
Security Printing Solutions CD supplied with your TROY Security Printing Solution.
The audit report feature can be set to automatically run at the conclusion of each print job containing MICR data
using the Auto-Report feature. Likewise, the auto-delete feature can be used to automatically delete audit records
at the conclusion of printing an automatic or manual report using the Auto-Delete feature. Most users do not
want audit reports to print on expensive check paper. Therefore, the paper tray-mapping feature can
automatically configure audit reports to print using paper from a specified paper tray.
The TROY non-volatile flash-file system can store approximately 10,000 records (one record = one MICR line).
The audit data stored in the TROY non-volatile flash-file memory can be deleted via the TROY Printer Utility or
the printer control panel. To prevent unauthorized users from changing the audit report format, a valid user name
and password is required to access these settings using the TROY Printer Utility or the printer control panel.
Audit reports will always print in portrait format.
NOTE: Use the TROY Printer Utility to change the audit report features and settings.
Security Printing Solutions User’s Guide -- Document #50-70376-001 Rev. C
2-19
Section 2
TROY Security
Fonts
Understanding TROY’s Features
Your TROY Security Printing Solution includes a collection of high-quality MICR fonts (E13-B, CMC-7) and
other security fonts programmed into the TROY firmware (MICR DIMM). See Section 8 – Using TROY Fonts
for more information. The TROY Security font collection includes the following fonts:
TROY Font
Description
E13-B MICR Font
Used to print the MICR line at the bottom of the check (United States and selected other
countries)
CMC-7 MICR Font
Used to print the MICR line at the bottom of the check (if your bank of deposit requires this font)
Enhanced Convenience Font
Used to print the convenience amount information on the check (this font is scalable)
Large Convenience Font
Used to print the convenience amount information on the check (this font is non-scalable)
Small Convenience Font
Used to print the convenience amount information on the check (this font is non-scalable)
TROY Reverse Helvetica Font
Used to print names and addresses on the back of transparent envelope windows for use in
pressure-seal machines
British Pound and Euro Symbols
Used as the British or European currency symbol for the respective country (replaces the U.S
dollar sign). These symbols can be selected to print in the audit reports.
TROY Microprint Font
Used to print security messages on checks that cannot be reproduced by photocopying
TROY Barcode and POSTNET Fonts
Used to print several types of industry-standard barcodes for a variety of uses, and also
includes a POSTNET font for printing the U.S. postal bar code that represents the 9-digit zip
code printed below the postal address
TROY AutoProtect™ Font
Used to print a user-defined word or phrase (e.g. VOID, NON-NEGOTIABLE) across the face of
checks printed on non-TROY MICR printing solutions (this font is scalable)
TROY Security Font
Used to print the amount information on the check (English / Spanish) (this font is scalable)
TROY OCR Font (type A and B)
Used to print any information (names, addresses, amounts) that is to be read by automated
readers using optical character recognition (this font is scalable)
TROY Messaging Font
Used to capture the user-defined data for the Enhanced Audit report or the TROYmark™
background image on the check (does not print)
Data Capture Fonts
Used to select specific check data for use in the audit reports or TROYmark™ background image
on the check
International Convenience Fonts
Used to print the convenience amount on the check in any one of five languages (available on
the TROY Security Printing Solutions CD supplied with your TROY printer)
Security Printing Solutions User’s Guide -- Document #50-70376-001 Rev. C
2-20
Section 2
Understanding TROY’s Features
Firmware Update
Capability
This feature allows administrators to easily upgrade the TROY Security Printing Solutions firmware (TROY’s
proprietary program code) as new features become available from TROY. The printer firmware update file is
available from the TROY web site or may be supplied by TROY on removable media. After completing a
firmware update, your TROY Security Printing Solutions printer must be rebooted (printer power cycled OFF
and ON) in order for the update to take effect.
Exact Positioning
Technology
The ANSI X/9B specifications for the placement of the MICR line relative to the bottom and right edges of a
check document are tightly controlled in order to provide accurate reading by the high-speed banking system
check readers. The paper feeding and image placement accuracy between printers (even similar model printers)
can vary enough to cause the MICR line to print out of tolerance, according to the ANSI X/9B specification,
resulting in rejected checks by the banking system check readers.
If the MICR line on your checks does not meet
the ANSI X/9B specification for MICR line
placement, use this feature to make small
vertical, horizontal, or rotational positioning
adjustments to the MICR line and/or page
image. Use the TROY MICR document
template to verify correct placement of the
MICR line on your checks after performing an
adjustment (refer to Section 3 – MICR Quality
Control in the TROY MICR Basics Handbook
for instructions on using the TROY MICR
document template). If adjustments are made
simultaneously to the MICR line and the page
image positions using positive numbers, then
the sum of the two numbers will be used as the
offset value for the MICR line.
NOTE: The MICR line adjustments are preset at the factory. TROY recommends that you do not alter these
settings unless your bank of deposit notifies you of MICR line positioning errors on your deposited checks.
Security Printing Solutions User’s Guide -- Document #50-70376-001 Rev. C
2-21
Section 2
Understanding TROY’s Features
Auto-Rotate
Feature
Due to minor variations in registration (the precise alignment of text and images on the printed page) that exists
with most printers, it is recommended that the MICR line on your checks be positioned to print on the leading
edge of the printed page (the edge of the page that exits the printer first). MICR lines positioned on the trailing
edge of the page may be subject to small variations in the vertical placement of the MICR line, which may cause
the MICR line position to fall outside of the MICR line specification. If the MICR line is located on the trailing
edge of the page, use the Auto-Rotate feature to automatically rotate your check image 180-degrees on the page.
Paper Tray
Mapping
Use this feature to enhance MICR printing security by blocking access to printer paper trays containing check
paper and divert non-MICR jobs to paper trays containing plain paper. If you have implemented user names and
passwords, then only approved users will be able to disable the tray re-mapping and access check paper.
Tray Mapping
For example, with all of your paper trays remapped to pull only from paper tray #1, the check
paper stored in paper tray #2 will not be available,
regardless of the paper tray selected. You can remap the printer paper trays using the TROY
Printer Utility. The TROY Port Monitor or a PCL
command can be used to temporarily ignore
(override) the tray re-mapping configuration and
use the factory defaults if the user has provided a
valid user name and password.
File
Help
Note: The tray ID numbers may not represent the physical tray numbers.
Tray Map
Tray Map
Tray Map
Tray Map
1
6
11
16
21
2
7
12
17
22
3
8
13
18
23
4
9
14
19
24
5
10
15
20
25
Tray Map
You can also use this feature if you are using an
application that has a printer driver designed to
Update Printer
communicate with an older laser printer (i.e., HP
LaserJet III or earlier). The tray calling sequence
for these earlier printers with a dual tray system is reversed from present day standards (i.e., LaserJet III printer
tray #1 is called as paper tray #2 on the newer printers). Using tray mapping will enable users to match legacy
applications without extensive reprogramming of their software applications.
Security Printing Solutions User’s Guide -- Document #50-70376-001 Rev. C
2-22
Section 2
Understanding TROY’s Features
Replaceable
Escape Character
When writing program code in a Windows environment, it is very difficult for an application programmer to
insert the ASCII escape character (ASCII character 27) into the PCL data stream. The ASCII escape character is
required before each PCL command in the programmer’s command string in order to enable the printer features
described in this user’s guide. Therefore, the replaceable escape character is designed so that the application
programmer can choose another ASCII character (any ASCII character from 0 to 255) to represent the ASCII
escape character in the PCL data stream. When the PCL data stream is sent to the printer, the MICR printer
firmware will automatically replace the alternate ASCII character with the required ASCII character 27 (escape
character).
NOTE: This feature is necessary only in rare cases for compatibility with some mainframe systems. Refer to the
TROY Programmer’s Reference Guide for more information on using this feature.
Language
Support
TROY Security Printing Solutions can be set to accept all types of print jobs (PCL, PostScript, etc.) or can be
limited to PCL 5 print jobs only. If the printer is set to accept PCL 5 print jobs only, then all non-PCL 5 print
jobs will be ignored. This feature can be set using the TROY Printer Utility.
Decryption Mode
The decryption feature (TROY MICR Secure printers, MICR Secure EX printers, and MICR Secure DIMM Kits)
can be set to one of two modes: job-by-job (prints all encrypted and non-encrypted jobs) or always (prints only
encrypted PCL 5 jobs – non-encrypted PCL 5 jobs will be purged).
Security Printing Solutions User’s Guide -- Document #50-70376-001 Rev. C
2-23
Section 2
Understanding TROY’s Features
HardwareBased
Security
Features
To prevent the fraudulent use of your TROY Security Printing Solutions printer or printer resources, TROY has
provided additional hardware-based security features to reduce the risk of unauthorized personnel using your
TROY printer or accessing the check stock stored inside the printer paper tray. These features are standard on
TROY Secure EX printers and are also available as options on TROY Secure printers.
Printer Keylock
The 3-position printer keylock switch provides controlled access to your
TROY MICR Secure EX printer. By using the keylock, the printer’s secure
resources can be locked out (allowing only non-MICR documents to print) or
the printer can be completely disabled (no documents can be printed). If a
print job is initiated when the keylock is in the Printer Locked position, the
printer control panel will display the message PRINTER LOCKED. The user may
unlock the printer (move the keylock to either of the other two positions)
after a print job has been sent to the printer and then press the GO button to
proceed with the print job without any loss of data.
NOTE: The printer keylock switch setting overrides all MICR mode and
Softlock settings selected in the TROY Printer Utility or TROY Port Monitor.
Keylock Mode
Functionality
MICR Locked
MICR documents will not print. Non-MICR documents will print normally.
Printer Locked
No documents can be printed. All printer-generated information and test pages are
locked out. The printer is completely disabled.
Print MICR
Both MICR and non-MICR documents can be printed. A TROY MICR toner cartridge
must be installed to print MICR documents.
NOTE: Your TROY MICR Secure EX printer is shipped with two keys for the printer keylock switch. TROY strongly
recommends storing the spare key in a secured location.
Security Printing Solutions User’s Guide -- Document #50-70376-001 Rev. C
2-24
Section 2
Paper Tray Locks
Understanding TROY’s Features
TROY MICR Secure EX printers (available as an option on TROY
MICR and MICR Secure printers) have a lock installed on each of
the paper trays to prevent unauthorized access to the blank check
stock stored inside the printer. As a convenience, all the locks are
keyed alike on your printer so that one key can be used to unlock
any of the paper trays.
NOTE: Your TROY printer is shipped with two keys for each paper
tray lock. TROY strongly recommends storing the spare key in a
secured location.
Paper Tray
Security Cover
TROY MICR Secure EX printers (available as an option on TROY
MICR and MICR Secure printers) utilize a security cover that is
installed onto the rear of the printer to prevent unauthorized access
to the blank check stock stored inside the printer paper trays (an
example security cover shown in the photo). With the paper trays
locked at the front of the printer, the security cover prevents rear
access to the paper tray. By unlocking and removing the paper
tray from the printer, the paper tray security cover can be easily
removed to install the duplexer option.
Security Printing Solutions User’s Guide -- Document #50-70376-001 Rev. C
2-25
Section 3
System Planning and Implementation
Introduction
Before setting up and installing your TROY Security Printing Solution, TROY highly recommends that you
invest some time to plan the implementation and configuration of your security printing system. Some advance
planning will save you time during the setup process and will help to optimize the day-to-day operation of your
security printing system. Use the following implementation steps as a guide in developing your specific
implementation strategy.
Maintaining
MICR
Security
In addition to the standard printing features of the Hewlett-Packard LaserJet printers, TROY Security Printing
Solutions provide many additional security enhancements. These features prevent unauthorized access to your
proprietary printer resources (security fonts, digitized signatures, logos, macros, etc.), settings, passwords, audit
data and/or unauthorized printing of your MICR documents. TROY strongly recommends that you take proper
precautions to prevent fraud, forgery, and accidental error, both inside and outside your organization. Some basic
precautions include the following:
•
•
•
•
Controlling access to your printer’s security features (keys, network access, PINs, and passwords).
Reconciling bank statements promptly to detect errors or misuse.
Employing software-based security measures (user names and passwords).
Using TROY MICR security paper with a preprinted security background, or using the printer’s builtin TROYmark™ feature to automatically print a security background design on your checks, making
check duplication or alternation difficult.
NOTE: It is the administrator’s responsibility to ensure proper procedures and safeguards are in place to provide
the necessary security for your MICR printing environment.
Security Printing Solutions User’s Guide -- Document #50-70376-001 Rev. C
3-1
Section 3
System Planning and Implementation
Implementing
the TROY
Security
Printing
Solution
Use the following steps to assist you with the planning and implementation of your TROY Security Printing
Solution. After you have established an implementation plan, see Section 5 – Installing the TROY Support Files
for information on installing the required TROY MICR printer drivers, security fonts, and software utilities. The
MICR printer drivers designed for your printer model are provided on the TROY Security Printing Solutions CD
supplied in your printer startup package. Use the worksheet provided at the end of this section to record and
summarize your implementation plan. Some of these steps may not apply to your TROY Security Printing
Solution.
Step 1: Select one person in your organization to be the administrator of the TROY Security Printing Solutions
printer(s). The administrator should have the responsibility and authority to manage PINs, passwords, handle
secure check paper after printing, and possess some general laser printer experience. The administrator should
also be experienced with the Microsoft Windows operating system and be comfortable installing printer drivers
and other types of Microsoft Windows software.
Step 2: Identify the signatories for your company checks. Many companies choose to have digital signatures
created for each signatory to enhance check-producing efficiency. If you decide to use digitized signatures, it is
beneficial to have these proprietary electronic files created before printer installation begins. In addition to
digitized signatures, your company logo can also be digitized, adding efficiency and convenience to your MICR
printing process. Please contact your TROY printer representative for digitizing information and pricing.
Step 3: Determine how many different check styles will be used (refer to the TROY MICR Basics Handbook for
information on check design). Your TROY Security Printing Solutions printer does not require pre-printed check
paper, saving money by eliminating the costs of ordering and maintaining pre-printed check paper. TROY
Security Printing Solutions printers can store digitized signatures, logos, form overlays, fonts and printer macros
that can be used to print different types of checks on blank, generic security check paper.
Storing your proprietary check design and signature resources in the printer will also eliminate the need to change
the check paper in the printer for different check jobs, help prevent fraudulent use of pre-printed check paper, and
increase your overall check-printing efficiency. Please contact your TROY printer representative for more
information and pricing on blank security check paper and digitizing services.
Step 4: Select a high-quality, high-security check paper. Refer to the TROY MICR Basics Handbook (provided
as a PDF file on the TROY Security Printing Solutions CD) for information on check paper specifications before
purchasing your check stock, or call your TROY printer representative for more information, suggestions, and
pricing.
Security Printing Solutions User’s Guide -- Document #50-70376-001 Rev. C
3-2
Section 3
System Planning and Implementation
Implementing
the TROY
Security
Printing
Solution
(cont.)
Step 5: Determine who in the organization should have access to blank check paper, to printed checks, and to
the software that prints checks. To avoid fraud, the number of personnel who have access to these items should
be kept to a minimum. The first two individuals on your list should be given the keys to the locking printer trays
(if applicable). The latter individuals should be given a key to the printer keylock switch (TROY MICR Secure
EX printers only). All key recipients should be advised of their security obligations and responsibilities. If you
are installing a TROY MICR printer (not a TROY Security Printing Solution), skip to Step 9.
Step 6: Determine how check data will be sent to the printer, either locally over a direct parallel connection, or
over a network connection. If check data is going to be transmitted across public networks (e.g., across the
Internet), encryption is strongly recommended (TROY MICR Secure EX printers only) so that print data cannot
be “tapped into” and used to commit check fraud. Encryption can also be used on internal networks (intranets) if
internal security is a concern. Encryption is not recommended or required for direct (non-networked)
connections between a workstation and a TROY Security Printing Solution. If you use encryption, you must
select a password (or pass phrase) of up to 128 characters in length for use in the encryption/decryption process.
Step 7: Determine who will have access rights to the TROY printer to print MICR documents. Because selected
TROY solutions provide user-level security, your TROY printer can be a shared device for printing both MICR
and non-MICR documents. If this level of security is required in a shared environment, the administrator should
prepare a list from 1 to 19 user names and passwords (each not to exceed eight characters in length in the range of
A-Z and 0-9) and assign PINs for the Softlock and Joblock features (if applicable). All users, with the exception
of the administrator, have the same access privileges to secure resources stored in the printer. Therefore, it is
advantageous to use multiple user names. User names are also logged automatically in audit data records.
Step 8: Decide if either the TROYmark™ and/or the TROY auditing feature will be used as security measures.
If so, the administrator must decide which fonts are to be used to capture the appropriate check data for these
features. A special TROY Messaging font can also be used to insert data into TROYmark™ or audit data records
using non-check data. Data capture fonts must be printer-resident and unified across all check types. Refer to
Section 2 – Understanding TROY’s Features.
Step 9: Determine the paper tray mapping assignment requirements for your TROY printer. Use this feature to
enhance MICR printing security by blocking access to paper trays containing check paper and divert non-MICR
jobs to paper trays containing plain paper. If using this feature, determine the paper tray to be mapped for
unsecured print requests (the paper tray loaded with standard white paper).
Step 10: Identify the workstation PCs that will be used to print checks. Verify that these PCs are adequately
equipped with sufficient memory (RAM) and are running Windows 95, 98, NT 4.0, 2000, or ME. Login security
should be enabled on each PC.
Security Printing Solutions User’s Guide -- Document #50-70376-001 Rev. C
3-3
Section 3
Planning
Worksheet
System Planning and Implementation
Print out the following pages, and use this worksheet as a quick reference guide to ensure that you have covered
all the available options for implementing your TROY Security Printing Solution.
TROY MICR Secure Implementation Worksheet
Select a system administrator – manages user names, passwords, and PINs, sets printing system
configuration, handles check stock before and after printing, and installs printer drivers and other Windows
software as needed.
System Administrator __________________________________________
Identify signatories for company checks – consider digitizing the signatures for increased security and
printing efficiency. Customer digital images of signatures must be prepared at TROY before your printer
installation begins.
Signatory __________________________________ Signatory __________________________________
Signatory __________________________________ Signatory __________________________________
Determine the number of check styles needed – if more than two check styles, consider having TROY
provide custom digital images of your company logo and check designs to allow use of blank check paper for
all check printing jobs.
Check Styles Needed: ___________________________________________________________________
Select a high-quality security check stock – refer to the TROY MICR Basics Handbook for specifications.
Call your TROY representative for more information, suggestions, and pricing on preferred check stock.
Check Stock Brand _____________________________________ Part Number _____________________
Determine who will have access to blank/printed check paper and printing software – distribute printer
security keys appropriately in accordance with your internal security guidelines. Store the second set of keys
in a secure location.
Backup key storage location _______________________________________________________________
Paper Tray Key Person _________________________ Printer Keylock Person ______________________
Determine how check data will be sent to the TROY printer – if using the Internet or a public intranet, we
strongly recommend using encryption (TROY MICR Secure EX printers only) to prevent unauthorized access
and/or fraudulent use of the check data sent to the printer.
Use Encryption? Yes ____ No ____ Decryption Password ______________________________________
Security Printing Solutions User’s Guide -- Document #50-70376-001 Rev. C
3-4
Section 3
Planning
Worksheet
(cont.)
System Planning and Implementation
Determine who will have access rights to the TROY printer – consider assigning individual user names,
and passwords to enhance MICR printing security and to allow audit tracking for each assigned user.
User Name ____________________________________________ Password _______________________
User Name ____________________________________________ Password _______________________
User Name ____________________________________________ Password _______________________
User Name ____________________________________________ Password_____ __________________
User Name ____________________________________________ Password _______________________
User Name ____________________________________________ Password _______________________
User Name ____________________________________________ Password _______________________
Decide if the TROYmark™ and/or the TROY auditing features will be used – if so, the administrator must
choose the font styles used for capturing the check data for use in the TROYmark™ background image and/or
the audit report.
Check Date Font ____________________________ Payee Name Font ____________________________
Convenience Amount Font ____________________________ Custom1 ____________________________
Custom 2 __________________________________ Custom 3 ___________________________________
Determine the paper tray mapping assignment requirements – decide if requests for check paper from
any printer paper trays are to be disallowed unless the user provides a valid name and password. If so,
determine the paper tray to be mapped for non-compliant print requests (the paper tray containing standard
white paper).
Security Printing Solutions User’s Guide -- Document #50-70376-001 Rev. C
3-5
Section 3
Planning
Worksheet
(cont.)
System Planning and Implementation
Identify the workstation PCs that will be used to print checks – verify that these PCs are running
Windows 98, NT 4.0, 2000, ME, or XP. Login security should be enabled on each PC.
PC Name _______________ Operating System _______ User Name _____________________________
PC Name _______________ Operating System _______ User Name _____________________________
PC Name _______________ Operating System _______ User Name _____________________________
PC Name _______________ Operating System _______ User Name _____________________________
PC Name _______________ Operating System _______ User Name _____________________________
PC Name _______________ Operating System _______ User Name _____________________________
PC Name _______________ Operating System _______ User Name _____________________________
Determine if the Softlock feature will be used – consider assigning PINs to further enhance your printing
security. PINs can be up to four digits in length using numbers between 1 and 9999.
Printer PIN ______________ (all print jobs will require a valid PIN before the job can be printed)
MICR PIN ______________ (only MICR print jobs will require a valid PIN before the job can be printed)
Use the TROY Printer Utility to assign a PIN and a job name to a specific print job:
Job Name __________________________________________ PIN _______________
Job Name __________________________________________ PIN _______________
Job Name __________________________________________ PIN _______________
Job Name __________________________________________ PIN _______________
Ensure that all TROY printer installation hardware and software is available – verify that the TROY
Security Printing Solutions CD, Hewlett-Packard CDs and manuals, TROY Quick-Start Guide, power/data
cables, and this checklist is available for use.
1 TROY Security Printing Solutions CD 1 TROY Quick-Start Guide
1 TROY MICR Toner Cartridge
1 TROY MICR Document Template
1 Hewlett-Packard CDs
1 HP Getting Started Guide
1 Printer Power Cable
1 Printer Data Cable (if using a parallel connection)
NOTE: If you have any questions regarding the implementation or setup of your TROY Security Printing Solution,
please call TROY Technical Support at (800) 332-6427, Monday through Friday, 8:00 AM to 8:00 PM, Eastern
Standard Time.
Security Printing Solutions User’s Guide -- Document #50-70376-001 Rev. C
3-6
Section 4
Introduction
Using the TROY Printer Utility
The TROY Printer Utility is an easy-to-use Microsoft Windows-based utility designed to assist the administrator
with the configuration and management of a TROY Security Printing Solution. The TROY Printer Utility allows
the system administrator to perform the following functions:
•
•
•
•
•
•
•
•
•
•
•
Manage audit reports
Set names, passwords, and PINs
Set printer security options
Manage printer resources
Re-map printer paper trays
View system information
Enable/disable printer type
Check MICR print quality
Print MICR / PCL demo pages
Obtain technical assistance
Access the TROY Web site for printer
firmware updates, drivers, and product
information.
The TROY Printer Utility is intended for use by system administrators and should be installed only on the
administrator’s computer. All printer settings including names, passwords, and PINs (Personal Identification
Numbers) selected with the TROY Printer Utility will remain unchanged until modified by the administrator,
even if the printer power is cycled or the printer electronics are reset. For a detailed description of the TROY
Security Printing Solutions features, refer to Section 2 – Understanding TROY’s Features. The TROY Printer
Utility is included on the TROY Security Printing Solutions CD supplied with your TROY Security Printing
Solution. Follow the instructions in the TROY Quick-Start Guide to install the TROY Printer Utility.
NOTE: The TROY Printer Utility sets the printer defaults for all users; however, individual users can use the TROY
Port Monitor to temporarily override some of the printer default settings on a job-by-job basis.
Security Printing Solutions User’s Guide -- Document #50-70376-001 Rev. C
4-1
Section 4
Menu
Structure
Using the TROY Printer Utility
The user-friendly features of the TROY Printer Utility are conveniently grouped under four pull-down menus as
shown below. An arrow (!) next to the menu selection indicates that additional selections are available for that
menu item. It is suggested that you print out this page for use as a convenient reference when using the TROY
Printer Utility.
TROY Printer Utility Menu Tree
FILE
SETTINGS
RESOURCES
HELP
Audit
Names and Passwords
Install New Resources
TROY Printer Utility Help F1
Print Audit Report
Delete Audit Data
Security Options
Tray Mapping
Print
Data Capture Fonts
Quality Document (E-13B)
TROYmark Pattern
Quality Document (CMC-7)
ExPT Offsets
Configuration Page
Windows Security Font Demo
Audit Options
Windows Barcode Font Demo
PCL Security/Barcode Font Demo
Fonts
Macros/Forms
TROY on the Web
Technical Support
Print Current Resources
System Information
Delete Current Resources
Firmware Update
About
Download File
Exit
Security Printing Solutions User’s Guide -- Document #50-70376-001 Rev. C
4-2
Section 4
Basic Printer
Utility
Operations
Using the TROY Printer Utility
TO ACCESS THE TROY PRINTER UTILITY:
1. Click on the Microsoft
Windows Start button, select
Programs, MICR by TROY,
and then click on the TROY
Printer Utility icon.
The
Printer Utility main window
will appear.
TROY Printer Utility
File Settings
Resources
Help
Select the printer to configure from the following list:
TROY MICR Secure EX Printer
Selected printer location (port):
LPT1:
2. Click on the Security Printing
Solution you wish to manage.
3. If an administrator password
has been previously set up,
type in the administrator
password in the password box
at the bottom of the Main
Window screen.
If an
administrator password has not
been previously setup, then
leave the password box blank.
Selected Printer Information
Admin Password
12345678
TROY Security Printing Solution
MICR Secure EX Printer
Windows Printer Driver
HPBF4110
4. Select the TROY Security Printing Solution. For convenience, this setting is saved when you exit the TROY
Printer Utility. This option simplifies the TROY Printer Utility interface by allowing access to features that
are only available within your product type.
Security Printing Solutions User’s Guide -- Document #50-70376-001 Rev. C
4-3
Section 4
Basic Printer
Utility
Operations
(cont.)
Using the TROY Printer Utility
TO SAVE AND RETRIEVE PRINTER UTILITY SETTINGS:
Many of the TROY Printer Utility user-defined settings can be saved in a file for future reference or retrieved
from a previously saved file. The features that have the ability to be saved and retrieved will have a pull-down
menu within the feature screen of the TROY Printer Utility.
•
•
Saving Printer Settings - After configuring a
TROY Security Printing Solution feature
using the TROY Printer Utility, the program
will automatically prompt you to save the
configuration file for future use. To save the
current feature settings, click on Yes, type in
a name for the file, and then click on Save.
The data file will be automatically saved in
the default UserData folder.
Save File
Save in:
UserData
Retrieving Printer Settings – To retrieve a File name:
Save
previously saved printer configuration file,
Cancel
access the TROY Printer Utility screen Save as type: Printer Security File (*.psf)
displaying the printer settings you wish to
Open as read-only
retrieve, click on File and Open from within
that feature screen. Click on the desired configuration file name, and then click on Open to automatically
retrieve the file for use in the TROY Printer Utility.
NOTE: For increased security, some of the Printer Utility saved files are encrypted; however, it is the
administrator’s responsibility to safeguard all saved information.
Security Printing Solutions User’s Guide -- Document #50-70376-001 Rev. C
4-4
Section 4
Managing
System
Security
Using the TROY Printer Utility
Your TROY Security Printing Solution provides many convenient features for managing MICR printer security
in a single or multi-user environment. The TROY MICR Secure printer, MICR Secure EX printer, and MICR
Secure DIMM Kit offer additional software and hardware-based security features designed to safeguard your
proprietary printer resources (digital images of signatures, logos, macros, MICR fonts, etc.), restrict access to
check stock stored inside the printer paper trays, and restrict access to the MICR features and settings available
from the printer control panel. Refer to Section 1 – Features Overview for a list of features applicable to your
TROY Security Printing Solution.
The strength and effectiveness of your MICR printing system security will depend largely on the TROY security
features you choose to implement. For users of the TROY MICR Secure printer, MICR Secure EX printer, and
MICR Secure DIMM Kit, TROY highly recommends that administrators implement the use of individual user
names and passwords, data encryption, PINs (Personal Identification Numbers), paper tray locks, and
TROYmark™ (MICR Secure EX printers only) to maximize the security of their MICR printing environment.
Setting the
Administrator
Password
Although the use of an administrator password is not required to operate your TROY Security Printing Solution,
TROY highly recommends setting an administrator password to restrict access to the printer settings from either
the TROY Printer Utility or the printer control panel. The administrator (ADMIN) default password is blank (no
password).
Although the administrator password can be set via the printer control panel, TROY strongly recommends using
the TROY Printer Utility to set or modify the password. After the password is selected, the TROY Printer Utility
will automatically update the password file in the printer’s flash file system.
NOTE: If you plan to use the Printer Utility exclusively to set or enter the administrator password (recommended),
then letters or numbers may be used for the administrator password.
Security Printing Solutions User’s Guide -- Document #50-70376-001 Rev. C
4-5
Section 4
Setting the
Administrator
Password (cont.)
Using the TROY Printer Utility
TO SET OR MODIFY THE ADMINISTRATOR PASSWORD:
1. From the Main Window, click on Settings, and
then click on Names and Passwords.
2. Click on ADMIN in the left-hand box and then
type in the desired password in the Password box.
If you are changing an existing administrator
password to no password, you must first click
inside the Password box, but then leave the
Password box blank. A blank (no password) will
be recorded. The ADMIN name cannot be
modified or deleted.
3. Click on Add /Update to add
administrator password to the list.
the
Names & Passwords
File
Help
ADMIN
ADMIN
Add / Update
Delete
Clear
new
4. Click on Update Printer to send the new
password information to the printer. The system
will ask you to verify the new ADMIN password
by retyping the new password in the Verification
Window.
Type in the new administrator
password, and then click on OK. A notification
screen will appear stating that the password
information was sent to the selected printer. Click
on OK to proceed.
All previous password
information in the printer will be overwritten.
Update Printer
Verification
Administrator Password has been changed.
Please verify the NEW Administrator
Password entered.
OK
Cancel
Enter New Password:
NOTE: TROY Security Printers do not send data back to the Printer Utility. Therefore, if an incorrect administrator
password is entered in the main window, none of the password information settings will be accepted by the
printer, and the TROY Printer Utility will not provide notification of the error.
Security Printing Solutions User’s Guide -- Document #50-70376-001 Rev. C
4-6
Section 4
Assigning User
Names and
Passwords
Using the TROY Printer Utility
Up to twenty user names and passwords (one administrator and 19 users) can be set up to prevent unauthorized
users from accessing the printer’s secure resources (digital images of signatures, logos, macros, MICR fonts, etc.)
and other MICR features. Although the use of user names and passwords is not required to operate TROY
Security Printing Solution, TROY highly recommends using user names and passwords to increase peer-to-peer
security, and to maintain a higher level of accountability of the users in your MICR printing network.
The system default password is blank (no password), and not entering a password when assigning a new user will
allow that user to access the printer’s secure resources without using a password. Attempts to add duplicate users
will be ignored. If you choose not to set up user names and passwords, TROY encourages administrators to at
least set up an administrator password to prevent unauthorized access to TROY Security Printing Solutions
settings from either the TROY Printer Utility or the printer control panel.
After providing a valid user name and password in the TROY Port Monitor, users are allowed to modify the
printer configuration settings and access the printer’s secures resources for the duration of the print job,
regardless of the number of pages being printed. When the print job is finished, the user-defined printer
configuration settings will automatically return to the default printer settings, and access to the printer’s features
and settings will be discontinued for that user. Only one instance of the same user name can have access to the
printer features and settings through the TROY Port Monitor. Refer to Section 6 – Using the TROY Port Monitor
for more information.
Security Printing Solutions User’s Guide -- Document #50-70376-001 Rev. C
4-7
Section 4
Using the TROY Printer Utility
Assigning User
Names and
Passwords (cont.)
To verify or review all user names and passwords setup by the administrator, the current printer-resident
password list can be printed out using the TROY Printer Utility. Print this list to ensure that all users have been
entered into the system or to verify that all past users have been deleted from the system. It is the administrator’s
responsibility to safeguard the information on this list.
TO PRINT THE USER NAME AND PASSWORD LIST:
From the Main Window, click on Settings, Names and Passwords. From the Names and Passwords screen,
click on File, Print Names and Passwords – Printer Resident List. Be sure to safely store or destroy the
password list after use.
NOTE: The user name and password list can be printed from either the TROY Printer Utility or directly from the
printer control panel. Because there is no bi-directional communication between the TROY Printer Utility and the
printer, the TROY Printer Utility printout will not show any user names and passwords entered via the printer
control panel instead of the TROY Printer Utility. TROY recommends using the TROY Printer Utility for entering all
user names and passwords.
Printer Utility Names & Passwords
Name
Password
ADMIN
JOHN
MARY
JACK
STEVE
STAN
NICK
STARSHIP
ANGEL
APPLE
EVILDAWG
PEACE
LEXUS
Security Printing Solutions User’s Guide -- Document #50-70376-001 Rev. C
4-8
Section 4
Assigning User
Names and
Passwords (cont.)
Using the TROY Printer Utility
TO SET OR MODIFY USER NAMES AND PASSWORDS:
1. From the Main Window, click on Settings, and then click on Names and Passwords. If you have a previous
name and password list saved on your computer (*.upl file), click on File, Open, click on the password list
file name (the default folder is UserData), and then click on Open to retrieve the file. Print the user name and
password list to verify all current users.
2. To add a new user, click inside the Name box
and type in the desired user name. To assign
a password for that user, click inside the
Password box, and type in the desired
password. If a password has not previously
been set, you must first click inside the
Password box, but then leave the Password
box blank. A blank (no password) will be
recorded. To modify or delete a user name or
password, click on the user name in the user
list box, and then click on Clear or Delete to
remove the user and associated password.
Names & Passwords
File
3. Click on Add /Update to add the new user and
password to the user list box. Repeat this
process for each new user you wish to add to
the system.
Help
ADMIN
JOHN
KATHY
Name:
Password:
MARY
STARSHIP
Add / Update
Delete
Clear
Update Printer
4. Click on Update Printer to send the new password information to the printer’s flash-file system. A
notification screen will appear stating that the password information was sent to the selected printer. Click on
OK to proceed. All previous password information in the printer will be overwritten.
NOTE: TROY Security Printers do not send data back to the Printer Utility. Therefore, if an incorrect administrator
password is entered, none of the user password information will be accepted by the printer, and the TROY Printer
Utility will not provide notification of the error.
Security Printing Solutions User’s Guide -- Document #50-70376-001 Rev. C
4-9
Section 4
Using the TROY Printer Utility
Selecting Security
Options
TROY Security Printing Solutions allow convenient enabling or disabling of the built-in security options to suit
your MICR printing needs. After entering the current administrator’s (ADMIN) password in the TROY Printer
Utility Main Window, the security options specific to your TROY Security Printing Solution can be individually
enabled or disabled (refer to the table below for a summary of these features).
In addition, you can also choose an alternate ASCII escape character and enter a decryption password (MICR
Secure printers, MICR Secure EX printers, and MICR Secure DIMM Kits only) using the Security Options
screen. Do NOT use the alternate escape character unless instructed by your system programmer or TROY
Technical Support. The following table summarizes these configurable security options:
OPTION
FUNCTIONALITY
Printer Type
Allows you to select the default MICR mode of the printer (MICR Off, MICR Off with timeout, MICR On,
MICR Always, and hardware settings). Refer to the table on page 4-12 for a description of each mode.
Tray Mapping
ENABLED - uses the tray mapping assignment set in the TROY Printer Utility.
DISABLED - uses the printer’s factory default tray map settings.
Alt. Escape
Character
ASCII NUMBER SELECTED – uses the selected alternate ASCII character as a substitute for the ASCII
escape character (ASCII 27).
NO CHANGE - uses the standard ASCII escape character (ASCII 27) required in all PCL (Page Control
Language) commands sent to the printer.
Decryption
Mode )
JOB-BY-JOB – (default) prints all encrypted and non-encrypted jobs. The decryption feature will be
invoked as needed on a job-by-job basis when an encrypted print job is detected.
ALWAYS – all PCL 5 jobs must be encrypted. Non-encrypted PCL 5 jobs will be purged.
Language
Supported
Printer Lock
PIN )
ALL – (default) printer accepts all types of print jobs (PCL, PostScript, etc.).
PCL 5 – printer accepts PCL 5 print jobs only. All non-PCL 5 print jobs will be ignored.
Enable – Enter a PIN (Personal Identification Number) between 1 – 9999 to restrict all print jobs from
printing until the user enters a valid PIN at the printer control panel.
Disable – Enter a zero in the PIN field, and then click on Update Printer to save the changes.
MICR Lock
PIN )
Enable – Enter a PIN (Personal Identification Number) between 1 – 9999 to restrict MICR jobs from
printing until the user enters a valid PIN at the printer control panel.
Disable – Enter a zero in the PIN field, and then click on Update Printer to save the changes.
Security Printing Solutions User’s Guide -- Document #50-70376-001 Rev. C
4-10
Section 4
Selecting Security
Options (cont.)
Using the TROY Printer Utility
Toner Sensor
Response
HALT – (default) stops all MICR print jobs. The printer control panel will display the message “LOAD
MICR TONER or six more continues will cancel job”. No MICR documents will print.
WARN – pauses all MICR print jobs. The printer control panel will display the message “Non-MICR
Toner, ‘<’ to cancel”. The user must press ‘<’ to cancel or ‘Go’ to continue. If the user cancels the job,
a page will print with the message “This MICR job could not be printed because MICR toner was not
loaded in the printer – JOB PURGED”.
IGNORE – allows all MICR jobs to print, regardless if MICR or non-MICR toner is installed in the printer.
FLUSH – purges the MICR print job from the printer memory and prints a page with the message “This
MICR job could not be printed because MICR toner was not loaded in the printer – JOB PURGED”.
Alt Command
Set
An optional feature that translates the %& command set into standard PCL (Page Control Language).
Do not enable this feature unless instructed to do so by TROY Technical Support.
Decryption
Password )
To support encryption, a decryption password must be entered that matches the encryption password.
If decryption is not going to be used, leave the decryption password field blank.
) TROY MICR Secure Printers, MICR Secure EX Printers, and MICR Secure DIMM Kits Only
Security Printing Solutions User’s Guide -- Document #50-70376-001 Rev. C
4-11
Section 4
Selecting Security
Options (cont.)
Using the TROY Printer Utility
TO ENABLE/DISABLE PRINTER SECURITY OPTIONS:
1. From the Main Window, click on Settings, and
then click on Security Options.
2. Click on the down-arrow at the right of each
selection box to choose the desired security
option.
If you are planning to use the
encryption/decryption feature, you must enter a
decryption password (or pass phrase) in order
for the printer to decrypt the encrypted data sent
from the host computer. The same password
must be used in the TROY Port Monitor.
NOTE: To maximize the security of the encrypted data, avoid using common words (i.e., starship, zebra,
wallflower, etc.) or common groups of words or phrases (i.e., My dog spot, My favorite printer, The red car was
fast, etc.) for the decryption password. TROY recommends using complex or unusual groups of words (i.e., Stars
fall never for color blue down out of sky, or Grass greener hillsides bestow graces of charm, etc.) or if using a
single password, select a unique set of alternating numbers and letters (i.e., x23y4a2, or 6x2kyzb8a).
3. After security options are set, click on Update Printer to send the new settings to the printer. All previous
configuration settings in the printer will be overwritten. Click on OK to proceed.
NOTE: TROY Security Printers do not send data back to the Printer Utility. Therefore, if an incorrect administrator
password is entered, none of the security options will be accepted by the printer, and the TROY Printer Utility will
not provide notification of the error.
Printer Type
Description
MICR Off
Printer will always default to MICR Off mode, regardless of any previous MICR settings.
MICR Off (timeout)
Printer will switch to MICR Off mode after a set time if no MICR Off command is received.
MICR On
Printer will switch to MICR On mode when a MICR job is received.
MICR Always
Printer will always default to MICR On mode, regardless of any previous MICR settings.
Hardware Settings
Printer will conform to one of the four Printer Types as configured at the factory by setting the
hardware switches on the TROY DIMM (refer to page 2-11 for detailed information).
Security Printing Solutions User’s Guide -- Document #50-70376-001 Rev. C
4-12
Section 4
Re-Mapping
Printer Paper
Trays
Using the TROY Printer Utility
This feature can be used to enhance MICR printing security by redirecting software access to printer paper trays
containing check stock to a paper tray containing plain paper. If you have implemented user names and
passwords, then only approved users will be able to disable the tray re-mapping configuration and access blank
check paper.
For example, with all of your paper trays re-mapped to pull only from paper tray #1, the check stock stored in
paper tray #2 will not be available for any other software program, regardless of the paper tray selected by the
software program. You can also use this feature if you are using an application that has a printer driver designed
to communicate with an older laser printer (i.e., HP LaserJet III or earlier). The tray calling sequence for these
earlier printers with a dual tray system is reversed from present day standards (i.e., LaserJet III printer tray #1 is
called as paper tray #2 on the newer printers). Refer to the next page for common tray map numbers.
TO MODIFY THE PRINTER TRAY MAPPING:
1. From the Main Window, click on Settings, and
then click on Tray Mapping.
2. Click in the appropriate Tray Map box
corresponding to each printer paper tray you
wish to re-map. After all desired paper tray remapping values have been entered, click on
Update Printer to send the new settings to the
printer. Click on OK to proceed. All previous
paper tray map settings in the printer will be
overwritten.
Tray Mapping
File
Help
Note: The tray ID numbers may not represent the physical tray numbers.
Tray Map
Tray Map
Tray Map
Tray Map
Tray Map
1
6
11
16
21
2
7
12
17
22
3
8
13
18
23
4
9
14
19
24
5
10
15
20
25
Update Printer
NOTE: The tray map settings will take effect only if this option was enabled in the Security Options screen. If this
option is disabled, the factory default tray map settings will be active. The tray ID numbers shown in the Tray
Mapping screen may not represent the actual tray numbers of your printer. Refer to the Hewlett-Packard Printer
User’s Guide for the default paper tray-mapping configuration.
Security Printing Solutions User’s Guide -- Document #50-70376-001 Rev. C
4-13
Section 4
Re-Mapping
Printer Paper
Trays (cont.)
Using the TROY Printer Utility
The following table contains common tray mapping numbers for TROY printers. Due to the Hewlett-Packard
tray assignment scheme, the actual tray number embossed on the paper tray(s) of your TROY printer may not
correspond with the factory tray assignment numbers listed in the table below (e.g., physical tray #2 has a factory
tray assignment number of 3, etc.). Always use the factory tray assignment numbers (listed in the table below)
when re-mapping your printer paper trays using the TROY Printer Utility.
Physical Paper Source (Media)
Factory Tray Assignment
Numbers
2300
Printer
4200
Printer
4300
Printer
Paper Tray 1 (manual feed)
4
4
4
Paper Tray 2
1
1
1
Paper Tray 3 (standard on “T” model printers)
5
5
5
N/A
8
8
Paper Tray 4 (Optional item for all printers)
Security Printing Solutions User’s Guide -- Document #50-70376-001 Rev. C
4-14
Section 4
Selecting Data
Capture Fonts for
Audit Reports
and TROYmark™
Using the TROY Printer Utility
To discourage fraudulent alteration of your printed checks, a user-defined background image (TROYmark™) can
be generated using specified information from the check (i.e., check date, convenience amount, payee name,
etc.). By capturing one or more of the check fields for use in the TROYmark™, the resulting background image
will be specific to each check, adding to the security of the printed document. Check data can also be captured
for use in the TROY audit report, which can include the check date, payee name, convenience amount, and up to
three additional user-defined check fields.
The special TROY metrics fonts used to generate the desired check information for the background image and/or
audit report must be specified for each desired check field in order to be captured. Once the TROYmark™ and/or
audit reporting feature is enabled in the TROY Port Monitor (refer to Section 6 – Using the TROY Port Monitor),
the selected features will remain in effect for the duration of the print job. When the print job has finished, these
features will automatically be disabled.
Security Printing Solutions User’s Guide -- Document #50-70376-001 Rev. C
4-15
Section 4
Selecting Data
Capture Fonts for
Audit Reports
and TROYmark™
(cont.)
Using the TROY Printer Utility
TO SELECT THE DATA CAPTURE FONTS:
1. From the Main Window, click on Settings, and
then click on Data Capture Fonts.
Data Capture Fonts
2. Click on one of the designated check fields you
wish to capture for use in the TROYmark™
and/or TROY audit report.
3. Click on the down-arrow of the Select Font to
Print box to select the font to be printed for the
check field selected in the previous step.
4. Click in one or both of the check boxes to use
the captured data from the selected check field
in either the TROYmark™ background image
and/or the TROY audit report. Repeat steps
two through four for each desired check field.
Select Field to Define Settings
Check Date
Custom 1
Payee Name
Custom 2
Convenience Amount
Custom 3
Settings for Check Date
Select Font to Print
Arial
Windows Font Name
Troy - Date
Include in Audit Report
Include in TROYmark
Create Metrics
NOTE: The same font selected to print may be selected for each defined field.
Security Printing Solutions User’s Guide -- Document #50-70376-001 Rev. C
4-16
Section 4
Selecting Data
Capture Fonts for
Audit Reports
and TROYmark™
(cont.)
Using the TROY Printer Utility
5. After all the desired check fields have been
defined, click on Create Metrics. Type in
the desired file name or use TROY (default)
for the data capture metrics file in the File
Name box, and then click on Save. You
may create as many data capture font set
configurations (metrics files) as needed for
your check printing requirements. The
system will automatically generate the
metrics file required to capture the selected
check data for the TROYmark™ background
image or the TROY audit report.
6. After the data capture metrics file is created
by the TROY Printer Utility, see Section 5 –
Installing the TROY Support Files, and
follow the steps for installing the metrics
file on the host computer.
Save File
Save in:
File name:
UserData
TROY
Save as type: Printer Cartridge Metrics (*.pcm)
Save
Cancel
Open as read-only
NOTE: If more than one data capture metrics file is installed, the previously installed metrics file will automatically
be overwritten. TROY recommends using only one data capture metrics file for each computer in your MICR
printing network.
Security Printing Solutions User’s Guide -- Document #50-70376-001 Rev. C
4-17
Section 4
Generating the
TROYmark™
Background
Pattern
Using the TROY Printer Utility
To discourage fraudulent alteration of the check, a background watermark (printed as a diagonally repeating
pattern across the face of the check) can be generated using user-defined information taken directly from the
check data (i.e., convenience amount, payee name, etc.). The special TROY fonts used to generate the desired
check information in the background image must be defined for each available check field in order to capture the
check data for use in the TROYmark™ feature.
The TROYmark™ background image can be selected to print at one of three pre-set density levels: light
(approximately a 7% gray), medium (approximately an 11% gray), and dark (approximately a 15% gray). The
administrator can also define up to three custom gray levels to ensure readability of the printed information on
custom pre-printed check stock (refer to the example on the next page).
Once the desired check fields are selected for use in the background image, the inclusion and exclusion rectangles
must then be defined. The inclusion rectangle (one area only) will contain the user-defined TROYmark™ image
and the exclusion rectangle (one or more selected areas, but not to exceed ten) will remain void of any
TROYmark™ image to ensure compliance with the ANSI X/9B check specifications. At a minimum, the
exclusion rectangle must include an area surrounding the convenience amount.
The TROY Messaging font can also be used to define data that can be included in the TROYmark™ image that
will not actually appear elsewhere on the check.
Security Printing Solutions User’s Guide -- Document #50-70376-001 Rev. C
4-18
Section 4
Generating the
TROYmark™
Background
Pattern (cont.)
Using the TROY Printer Utility
TO CUSTOMIZE A TROYMARK BACKGROUND PATTERN:
1. From the Main Window, click on Settings, and
then click on TROYmark Pattern.
2. Click on Options. Choose a basic density level
(light or dark), then select the density
percentage. The pixels in the preview screen
can be clicked ON (black square) or OFF (white
square) to customize the density level of the
background pattern. Up to three user-defined
density level patterns can be saved using
Custom 1 (default), Custom 2, or Custom 3.
TROYmark Pattern
File
Options
Help
Thumbnail
Pattern
Custom 1
Custom 2
Custom 3
3. Click on Update Printer to send these settings
to the printer’s flash-file memory.
4. To verify the correct density level, click on Yes
to print a test page. Click on OK to continue.
Security Printing Solutions User’s Guide -- Document #50-70376-001 Rev. C
Update Printer
4-19
Section 4
Managing
Audit Reports
Using the TROY Printer Utility
Use this feature to record, store, and print a report of the check printing activity sent to your TROY printer.
When enabled, the audit report feature automatically records the MICR line information (transit/routing number,
bank number and check number) each time the TROY MICR font is accessed (default mode). The print order is
also stored for each check. Additionally, the audit report can be programmed to capture the any one or more of
the following data from a check:
•
•
•
•
•
Payee name
Convenience amount
Check date
User name (the person logged in while printing the checks)
Up to three additional custom (user-defined) fields from the check
To capture the user-selected fields from the check for use in the audit report, special PCL commands must be
inserted into the PCL 5 data stream (the data sent from the computer to the printer) to mark the selected check
data for recording in the audit report. These PCL markers are placed in the print data stream by selecting one of
the designated fonts for each desired check field, creating a custom PCM file (automatically generated by the
PCM file generator included in the TROY Printer Utility), and then installing the PCM file on the host computer
(refer to Section 5 – Installing the TROY Support Files). A maximum of 128 characters can be stored for each
audit record in the flash-file system.
Two versions of the audit report can be selected for printing:
•
Recent – prints only the audit data recorded since the last Recent or complete audit report was printed.
•
All – prints All recorded audit data stored in the printer’s flash memory.
NOTE: Canceling a Recent report before the report finishes printing will cause the audit information marked for
this report to be reprinted along with any subsequently recorded data when the next Recent audit report is printed.
The Recent or All records of the audit report can be selected to print in one of two formats:
•
Summary Report – prints only the number of checks printed.
•
Detailed Report – prints all audit record data and the summary line.
The audit report can be sorted in one of two sort orders using either the MICR line or print order:
•
Ascending – prints the audit data in ascending order (default).
•
Descending – prints the audit data in descending order.
Security Printing Solutions User’s Guide -- Document #50-70376-001 Rev. C
4-20
Section 4
Managing
Audit Reports
(cont.)
Using the TROY Printer Utility
The TROY Messaging font can also be used to insert data into the audit record that the user does not want to
actually print on the check. Refer to Section 8 – Using TROY Fonts for detailed information.
NOTE: The printer fonts are resident in the printer’s flash-file system. The screen fonts are available on the TROY
Security Printing Solutions CD supplied with your TROY Security Printing Solution.
The audit report feature can be set to automatically run at the conclusion of each print job containing MICR data
using the Auto-Report feature. Likewise, the auto-delete feature can be used to automatically delete audit records
at the conclusion of printing an automatic or manual report using the Auto-Delete feature. Most users do not
want audit reports to print on expensive check paper. Therefore, the paper tray-mapping feature can
automatically configure audit reports to print using paper from a specified paper tray.
The TROY non-volatile flash-file system can store approximately 10,000 records (one record = one MICR line).
The audit data stored in the TROY non-volatile flash-file memory can be deleted via the TROY Printer Utility or
the printer control panel. To prevent unauthorized users from changing the audit report format, a valid user name
and password is required to access these settings using the TROY Printer Utility or the printer control panel.
Audit reports will always print in portrait format.
NOTE: Use the TROY Printer Utility to change the audit report features and settings.
Security Printing Solutions User’s Guide -- Document #50-70376-001 Rev. C
4-21
Section 4
Managing
Audit Reports
(cont.)
Using the TROY Printer Utility
TROY audit reports can be selected to print in one of two sort orders:
•
TROY Primary Sort Order – prints the audit data in ascending order (default).
•
TROY Secondary Sort Order – prints the audit data in descending order.
TROY Detailed Audit Report
Record MICR
Amount*
Payee Name Date
Custom
00013 C1234567890c A123456789A 12345D67890C $
2,673.00 John Q. Public 10/05/2000 999-99-9999 QFG382M
MICR Line
(automatically captured)
TROY Amount
TROY Payee
TROY Date
Custom 1
Custom 2
TO SELECT AUDIT OPTIONS:
1. From the Main Window, click on Settings, and then
click on Audit Options.
2. Click on the down-arrow of each selection box to
choose the desired audit option.
3. Click on Update Printer.
The system will
automatically update the printer’s flash-file memory.
4. Click on OK to continue.
Security Printing Solutions User’s Guide -- Document #50-70376-001 Rev. C
4-22
Section 4
Managing
Audit Reports
(cont.)
Using the TROY Printer Utility
TO PRINT AUDIT REPORTS:
From the Main Window, click on File, Audit, and then click on Print Audit Report. The printer will
automatically print the audit report according to the user-defined configuration set in the Audit Options window.
NOTE: If the Auto-Delete feature is enabled, the audit data will automatically be deleted when the audit report has
finished printing.
TO DELETE AUDIT DATA:
1. From the Main Window, click on File, Audit, and then click on Delete Audit Data.
2. The system will prompt you for confirmation. If you wish to continue, click on OK to permanently delete all
audit data, then click on OK to continue.
Notification
Confirm
Are you sure you want to delete Audit Data?
Yes
No
Security Printing Solutions User’s Guide -- Document #50-70376-001 Rev. C
The Delete Audit Data request has been sent to the
selected printer.
OK
4-23
Section 4
Using the TROY Printer Utility
Adjusting the
MICR Line
and/or Page
Image
Positioning
The ANSI X/9B specifications for the placement of the MICR line relative to the bottom and right edges of a
check document are tightly controlled in order to provide accurate reading by the high-speed banking system
check readers. If the MICR line on your checks does not meet the ANS X/9B specification for MICR line
placement, use this feature to make small vertical and/or horizontal positioning adjustments to the MICR line
and/or page image. If necessary, the entire page image placement can be moved. If adjustments are made
simultaneously to the MICR line and the page image positions using positive numbers, then the sum of the two
numbers will be used as the offset value for the MICR line.
Use the TROY MICR document template to verify correct placement of the MICR line on your checks after
performing an adjustment (refer to Section 3 – MICR Quality Control in the TROY MICR Basics Handbook for
instructions on using the TROY MICR document template). If adjustments are made simultaneously to the
MICR line and page image positions using positive numbers, then the sum of the two numbers will be used as the
offset value for the MICR line.
NOTE: The MICR line adjustments are preset at the factory. TROY recommends that you do not alter these
settings unless your bank of deposit notifies you of MICR line positioning errors on your checks.
Security Printing Solutions User’s Guide -- Document #50-70376-001 Rev. C
4-24
Section 4
Adjusting the
MICR Line
and/or Page
Image
Positioning
(cont.)
Using the TROY Printer Utility
TO ADJUST THE MICR LINE POSITIONING:
1. From the Main Window, click on Settings, and
then click on ExPT Offsets.
2. Enter the vertical and offset values for the MICR
line and/or image in the appropriate boxes.
These values are represented in decipoints
(1/720 of an inch). The valid offset range is –
720 to 720 (equals plus/minus one inch).
3. After all values have been entered, click on
Update Printer to send the new settings to the
printer. All previous MICR line and image offset
values in the printer will be overwritten. The
system will prompt you with “Print Quality
Document to verify adjustments?” Click on Yes
to print the quality document, or click on No to
proceed without printing the quality document.
4. When closing the ExPT
Offsets window, the
system will prompt you
with “Do you want to
save changes to ExPT
Offset values?” Click
on Yes to save the new
offset values in a usernamed file for future
use (e.g., Acme print
job offset values.ops),
or click on No to
continue without saving
the new offset values.
Security Printing Solutions User’s Guide -- Document #50-70376-001 Rev. C
4-25
Section 4
Using the
Auto-Rotate
Feature
Using the TROY Printer Utility
Due to minor variations in registration (the precise alignment of text and images on the printed page) that exists
with most printers, it is recommended that the MICR line on your checks be positioned to print on the leading
edge of the printed page (the edge of the page that exits the printer first). MICR lines positioned on the trailing
edge of the page may be subject to small variations in the vertical placement of the MICR line, which may cause
the MICR line position to fall outside of the MICR line specifications. If the MICR line is located on the trailing
edge of the page, use the Auto-Rotate feature to automatically rotate your check image 180-degrees on the page.
TO ROTATE THE CHECK IMAGE:
1. From the Main Window, click on Settings, and
then click on ExPT Offsets.
2. Click on the Image Rotate drop-down box and
select Enable.
3. After all desired values have been entered, click
on Update Printer to send the new settings to the
printer. All previous MICR line and image offset
values in the printer will be overwritten. The
system will prompt you with “Print Quality
Document to verify adjustments?” Click on Yes
to print the quality document, or click on No to
proceed without printing the quality document.
4. When closing the ExPT Offsets window, the
system will prompt you with “Do you want to
save changes to ExPT Offset values?” Click on Yes to save the new offset values in a user-named file for
future use (e.g., Acme print job offset values.ops), or click on No to continue without saving the new offset
values.
Security Printing Solutions User’s Guide -- Document #50-70376-001 Rev. C
4-26
Section 4
Using the TROY Printer Utility
Managing
Printer
Resources
The TROY MICR DIMM (Dual In-line Memory Module) installed inside your TROY printer contains a rewriteable flash-file system that can be conveniently updated by the administrator. It is important to safeguard the
proprietary resources (digital images of signatures, company logos, macros, etc.) stored in your printer’s flash-file
system by implementing the security features provided with your TROY Security Printing Solution. The
administrator can to add or delete printer resources, or upgrade the TROY printer firmware (TROY’s proprietary
MICR program code) as new features become available from TROY. Use the TROY Printer Utility to install,
print, or delete printer resources.
Updating the
Printer Firmware
Firmware maintenance or feature upgrades developed by TROY Systems can be downloaded and installed using
the TROY Printer Utility. Update files are available from the TROY Web site or may be supplied by TROY on
removable media. After completing a firmware update, your TROY printer must be rebooted (printer power
switched OFF and ON) in order for the update to take effect.
TO UPDATE THE PRINTER FIRMWARE:
1. From the Main Window, click on Help, and
then click on Firmware Update.
Open File
Look in:
2. Enter the path and file name of the update file
you wish to load in the File Name box. If you
are not sure of the file name or location, click
on the folder icon located at the right of the
File Name box to search for the update file.
After locating the update file, click on the
update file name, and then click on Open. The
Firmware Update screen will appear with the
update file name in the File Name box.
My Documents
TROY 4200EX.tfw
File name: TROY 4200EX.tfw
Open
Files of type: Firmware Files (*.tfw)
Cancel
Open as read-only
Security Printing Solutions User’s Guide -- Document #50-70376-001 Rev. C
4-27
Section 4
Updating the
Printer Firmware
(cont.)
Using the TROY Printer Utility
3. Click on Update Printer to send the update
file to the printer. Click on OK to proceed
with the firmware update, and then click on
OK again to finish the update process.
Firmware Update
File Help
4. After the firmware update is complete, the
printer will automatically reboot (re-initialize).
After the printer has finished rebooting, the
control panel will display the message
“READY”. If your printer does not reboot
automatically or the control panel displays the
message “49.4C18 Service Error”, cycle the
printer power (switch the printer OFF and ON
again). The printer power must be cycled in
order for the update to take effect.
Adding / Deleting
Printer Resources
File Name:
C:\My Documents\TROY4200EX.tfw
Warning!
This feature must be used with caution! Before proceeding with
updating the printer’s firmware, make sure the correct printer and
firmware file is selected. If unsure, please contact the TROY
Technical Support Department for assistance.
Update Printer
The administrator can add and/or delete any portion of the public and/or secure printer resources contained in the
TROY printer’s flash-file system using the TROY Printer Utility. Typically, the secure memory area contains
proprietary printer resources (MICR fonts, digitized signatures, etc.). The public memory area usually contains
non-proprietary resources (company logos, macros, forms, etc.) that are available to anyone using the printer.
Individual printer resource files can be deleted by printing a list of the printer’s resources to view the currently
loaded resources and then selecting the desired printer resource file using the file ID number (displayed to the left
of each resource file). The amount of resources (file size) that can be downloaded to the printer memory depends
on the amount of free memory space available in the TROY DIMM. Printing a list of the printer resources will
display the currently available free memory space in the TROY DIMM (designated as bytes).
Security Printing Solutions User’s Guide -- Document #50-70376-001 Rev. C
4-28
Section 4
Adding / Deleting
Printer Resources
(cont.)
Using the TROY Printer Utility
TO PRINT A LIST OF PRINTER RESOURCES:
1. From the Main Window, click on Resources, and then click on Print Current Resources. The selected
printer will automatically print a list of the currently installed printer resources contained in the flash-file
system (see the example below). It is recommended that you print out a list of the current printer resources
before deleting or adding new resources.
2. Click on OK to continue.
TROY 4200 EX Series Printer Download Area Summary
Directory List
/
F26375.fnt
F30754.fnt
M01220.mac
M03891.mac
:
224 bytes
: 14713 bytes
: 5719 bytes
:
56 bytes
:
56 bytes
Total bytes used: 27136
Available
Free Space
free: 879104
Font List (* indicates secure):
* 26375 - <esc>(0U<esc>(s0p1,66h54.01v0s0b200T
30754 - <esc>(4C<esc>(s0p3h12v0s0b103T
Macro List (* indicates secure):
*
1220 - <esc>&f1220Y
3891 - <esc>&f3891Y
3892 - <esc>&f3892Y
Security Printing Solutions User’s Guide -- Document #50-70376-001 Rev. C
4-29
Section 4
Adding / Deleting
Printer Resources
(cont.)
Using the TROY Printer Utility
TO ADD PRINTER RESOURCES:
1. From the Main Window, click on Resources, and
then click on Install New Resources. Select either
Fonts or Macros/Forms.
2. Click on the desired font or macro/form file(s), and
then click on Open. The selected file(s) will be
displayed in the installation screen. Choose either
Secure File System or Public File System to load the
selected file(s) in the desired memory area of the
flash-file system. A Starting ID Number will be
automatically generated for each file loaded into the
flash-file memory.
3. Click on Update Printer to send the printer resource
file(s) to the printer. Click on OK to finish.
Open File
Look in:
My Documents
Arabian.sfp
File name: Arabian.sfp
Open
Files of type: Font Files (*.sfp, *sfl)
Cancel
Open as read-only
Install Fonts
File Help
C:\Resources\
Arabian.sfp
Secure File System
Public File System
Temporary Memory
Starting ID Number
19580
Update Printer
Security Printing Solutions User’s Guide -- Document #50-70376-001 Rev. C
4-30
Section 4
Adding / Deleting
Printer Resources
(cont.)
Using the TROY Printer Utility
TO DELETE PRINTER RESOURCES:
1. Print a list of the currently installed printer resources (see page 4-29) by clicking on Resources, and then
clicking on Print Current Resources. Use this printout to determine which resources you wish to delete from
the flash-file system.
2. From the Main Window, click on Resources, and then
click on Delete Current Resources.
3. Select the general group of printer Fonts or Macros/Forms
you wish to delete, and then click on Update Printer. To
delete a specific resource file or group of resources files,
enter the starting and ending ID numbers of the resource
files you wish to delete (refer to your printed list of
currently installed printer resources to obtain the file ID
numbers), and then click on Update Printer.
4. Click on Yes to confirm your file selection marked for
deletion. Click on OK to finish.
Security Printing Solutions User’s Guide -- Document #50-70376-001 Rev. C
Delete Current Resources
File Help
Fonts
Macros/Forms
None
None
All Secure and Public
All Secure and Public
All Secure
All Secure
All Public
All Public
Range
Range
Update Printer
4-31
Section 4
Using the TROY Printer Utility
Printing Test
and Demo
Pages
The TROY Printer Utility provides the ability to generate a Windows Security Font, Windows Barcode Font, and
PCL Security/Barcode Font demonstration page. Use the Windows Security Font demonstration page if you are
using a Windows-based printing application, or use the PCL Security/Barcode Font demonstration page if you
are using a non-Windows-based printing application. The TROY MICR Quality Document and printer
configuration pages are resident in the TROY DIMM, and can be printed at any time from the printer control
panel or through the TROY Printer Utility. Use these test and demonstration pages to verify your printer’s
configuration, functionality, and MICR print quality.
Verifying MICR
Print Quality
Maintaining high-quality MICR printing is vital to error-free reader/sorter processing of your checks at the bank.
TROY’s Security Printing Solutions have been consistently shown to have the lowest bank reject rates in the
industry. Poor MICR print quality will cause your checks to be rejected by the bank’s automatic MICR readers,
and therefore, you may incur significant manual processing fees from your bank for each rejected check. The
TROY MICR Quality Document is resident in the firmware of your TROY printer and can be printed out at any
time using the TROY Printer Utility or printer control panel. Use the TROY MICR Quality Document as a
reference to evaluate the general print quality of your TROY Security Printing Solution.
TO PRINT THE TROY MICR QUALITY DOCUMENT:
NOTE: TROY MICR Secure EX printers must have the printer keylock switch set to
“Print MICR” to enable printing of the MICR Quality Document.
1. From the Main Window, click on the printer you wish to manage.
2. From the Main Window, click on File, Print, and then click on Print.
3. Click on the Quality Document. Choose either the E-13B or CMC-7 version of this document. The printer
will automatically print the TROY MICR Quality Document (refer to the E-13B example on the next page).
Security Printing Solutions User’s Guide -- Document #50-70376-001 Rev. C
4-32
Section 4
Identifying Print
Defects
Using the TROY Printer Utility
Continuous streaks and voids that may
appear on the TROY MICR Quality
Document are usually the result of a
low toner condition. A scratch or
other contamination on the surface of
the optical drum inside the toner
cartridge can also cause streaking and
other print quality defects.
To ensure optimum MICR print
quality, always use a genuine TROY
MICR toner cartridge with your
TROY Security Printing Solution.
Always replace the TROY MICR
toner cartridge with a new TROY
MICR toner cartridge when the TONER
LOW message appears on the printer
control panel.
MICR documents
printed after a low toner condition
may not meet MICR specifications
and cause your printed checks to be
rejected, thereby incurring significant
manual processing fees to you by your
bank.
NOTE: If your TROY Security Printing
Solution develops a noticeable print
quality defect that cannot be corrected
by replacing the MICR toner cartridge,
the MICR Quality Document can be
sent to TROY for evaluation. Do not
continue to print MICR documents if
print defects are present.
Security Printing Solutions User’s Guide -- Document #50-70376-001 Rev. C
4-33
Section 4
Using the TROY Printer Utility
Accessing TROY
Fonts Using NonWindows
Applications
If you are using a non-Windows application to print MICR documents, the escape sequence for each font must be
programmed into the application in order to “call” each of the selected fonts. The <Esc> character is ASCII
character number 27 (hexadecimal number 1B). Refer to Section 8 – Using TROY Fonts for the specific escape
sequence (displayed above each character map) used to call each of the TROY fonts.
Verifying
Windows Font
Support
To verify the TROY Windows font support files were properly installed on your system, demonstration
documents are provided through the TROY Printer Utility in Windows that can be printed out to visually identify
all security and/or barcode fonts downloaded to the TROY Security Printing Solution. Make sure your TROY
printer is properly setup, powered ON, and is online before printing the Windows Security Font or Windows
Barcode Font Demonstration page(s).
TO PRINT THE WINDOWS SECURITY (MICR) FONT DEMONSTRATION PAGE:
NOTE: TROY MICR Secure EX printers must have the printer keylock switch set to
“Print MICR” to enable printing of the Windows Security Font Demonstration page.
1. From the Main Window, click on the printer you wish to manage.
2. Type in the current administrator password in the password box at the bottom of
the Main Window. If a password is not set, then leave the password box blank.
3. From the Main Window, click on File, Print, and then click on Windows Security (MICR) Font Demo. The
printer will automatically print the Windows Security Font Demonstration page (see example on next page).
4. Compare the actual TROY security fonts (the actual fonts generated by your printing system) shown in the
right-hand column with the facsimile image of these fonts printed in the center column (a digitized image
designed to look exactly like the actual fonts generated by your system – see example on the next page).
If the support files were properly installed, the actual TROY security and/or barcode fonts displayed in the
right-hand column should appear identical to the facsimile fonts displayed in the center column. If the actual
fonts do not match the facsimile fonts printed on the demonstration document (fonts not printed correctly or
fonts missing on the printout), review the installation steps in this document. If further assistance is required,
contact TROY Technical Support.
Security Printing Solutions User’s Guide -- Document #50-70376-001 Rev. C
4-34
Section 4
Using the TROY Printer Utility
Verifying
Windows Font
Support (cont.)
Security Printing Solutions User’s Guide -- Document #50-70376-001 Rev. C
4-35
Section 4
Using the TROY Printer Utility
Verifying PCL 5e
Communication
The PCL Security/Barcode Font Demonstration pages can be used to verify PCL 5e communication between the
host computer and TROY printer. If the PCL 5e communication between the host computer and TROY printer is
successful, then the demonstration page should print out exactly as shown in the example on the next page.
TO PRINT THE PCL SECURITY/BARCODE FONT
DEMONSTRATION PAGE:
NOTE: TROY MICR Secure EX printers must have the printer keylock switch set to
“Print MICR” to enable printing of the PCL Security/Barcode Demonstration pages.
1. From the Main Window, click on the printer you wish to access.
2. Type in the current administrator password in the password box at the bottom of
the Main Window. If a password is not set, then leave the password box blank.
3. From the Main Window, click on File, Print, and then click on PCL Security/Barcode Font Demo. The
printer will automatically print the PCL 5e Security/Barcode Font Demonstration pages (refer to the example
on the next page).
Security Printing Solutions User’s Guide -- Document #50-70376-001 Rev. C
4-36
Section 4
Using the TROY Printer Utility
Verifying PCL 5e
Communication
(cont.)
Security Printing Solutions User’s Guide -- Document #50-70376-001 Rev. C
4-37
Section 4
Using the TROY Printer Utility
Verifying PCL 5e
Communication
(cont.)
Security Printing Solutions User’s Guide -- Document #50-70376-001 Rev. C
4-38
Section 4
Verifying Printer
Configuration
Using the TROY Printer Utility
TO PRINT THE TROY CONFIGURATION PAGE:
NOTE: TROY MICR Secure EX printers must have the printer keylock switch set to
“Print MICR” to enable printing of the TROY Configuration page.
1. From the Main Window, click on the printer you wish to manage.
2. Type in the current administrator
password in the password box at
the bottom of the Main Window.
If a password is not set, then leave
the password box blank.
3. From the Main Window, click on
File, Print, and then click on
Configuration Page. The printer
will automatically print the TROY
configuration page (see example
shown to the right ").
Security Printing Solutions User’s Guide -- Document #50-70376-001 Rev. C
4-39
Section 4
Using the TROY Printer Utility
Downloading
Files to the
Printer
The TROY Printer Utility provides the ability to download any PCL or text file directly to the printer without
embedding additional information. Three download options are provided to enhance the download file (see the
Download File window for the specific options). To include an advanced option to the download, place a
checkmark next to the corresponding option(s) you wish to use. The advanced download options are provided
for advanced users only.
TO DOWNLOAD A FILE TO THE PRINTER:
1. From the Main Window, click on the printer you wish to manage.
2. Type in the current administrator password in the
password box at the bottom of the Main Window. If a
password is not set, then leave the password box blank.
Download File
File Help
File Name:
3. From the Main Window, click on File, and click on
Download File.
4. Enter the file name or click on Browse to locate the
desired file.
5. For advanced users: Place a checkmark next to the
corresponding option(s) your wish to include with the
download file. For normal use, it is recommended that
all three checkboxes be left blank.
Include Administrator and Password data to file
Include NVRAM download enter and exit data to file
Include job initialize and job exit data to file
Download
6. Click on Download to send the file to the printer’s
flash-file memory. Click on OK to finish.
7. Click on OK to continue.
Security Printing Solutions User’s Guide -- Document #50-70376-001 Rev. C
4-40
Section 4
Obtaining
Technical
Assistance
Using the TROY Printer Utility
The TROY Printer Utility provides several help screens to guide you through the features and functions of a
TROY Security Printing Solution. TROY technical support is available to assist you with any questions
concerning the setup, operation and maintenance of your TROY Security Printing Solution. Specific system
information about your MICR printer configuration is also available through the TROY Printer Utility. You are
also encouraged to visit the TROY Web site for latest FAQs (Frequently Asked Questions), information on the
latest TROY products, and for ordering MICR toner and other printing supplies.
TO VIEW TECHNICAL SUPPORT INFORMATION:
From the Main Window, click on Help, and then click on Technical Support to view the TROY Technical
Support HTML page for telephone numbers and hours of business.
TO VIEW INFORMATION ON THE TROY WEB SITE:
From the Main Window, click on Help, and then click on TROY on the Web to access the TROY web site. Click
on the Services and Support button at the top of the web page to view the available topics. You can access the
TROY Web site directly at http://www.troygroup.com.
TO VIEW ON-SCREEN HELP FOR THE TROY PRINTER UTILITY:
From the Main Window, click on Help, and then click on TROY Printer Utility Help F1 to view the Printer
Utility help documents. You can press the F1 key at any time while using the TROY Printer Utility to access the
help screens.
TO VIEW INFORMATION ABOUT THE PRINTER UTILITY:
From the Main Window, click on Help, and then click on About to view the version level and other information
about the TROY Printer Utility.
TO VIEW SYSTEM INFORMATION:
From the Main Window, click on Help, and then click on System Information to view the version level and other
information about your computer and printer's hardware and software environment.
Security Printing Solutions User’s Guide -- Document #50-70376-001 Rev. C
4-41
Section 5
Introduction
Installing the TROY Support Files
Your TROY Security Printing Solution offers valueadded functionality and the flexibility to integrate
smoothly with your check-printing system. Use the
TROY Security Printing Solutions CD to install the
necessary Hewlett-Packard LaserJet printer drivers and
support files.
To ensure successful software
installation, perform the following steps in sequential
order.
The documentation and installation files
contained on the TROY Security Printing Solutions
CD will be needed in the event that your TROY
Security Printer is reinstalled in a new location or after
service has been performed.
NOTE: Use only the TROY Security Printing Solutions
CD to install the Hewlett-Packard PCL 5e printer driver
designated for your TROY Security Printing Solution.
Do NOT use the Hewlett-Packard CD to install the printer
software for this installation process. In some cases,
certain HP PCL 5e printer drivers do not support TROY
features; therefore, the printer driver you are instructed
to install may not correspond to your printer model.
STEP 1:
1. Close all applications before installing the HP PCL 5e printer driver.
Install the HP
PCL 5e
Printer Driver
for Windows™
2. Insert the TROY Security Printing Solutions CD into the CD-ROM drive of your
computer.
3. Before beginning the installation process, you will need to know the operating
system you are using on your computer. If you already know the operating
system you are using, proceed to step #4. If you are not sure, right-click on My
Computer (located on the Windows desktop), and then left-click on Properties to
view the type of operating system installed on your computer.
4. From the Start menu, click on Settings, and then click on Printers.
5. Double-click on Add Printer, click on Next, choose Local Printer, and then click
on Next. If you are using Windows 2000/XP, skip down to Step 11, and then
proceed with Steps 6 through 10.
Security Printing Solutions User’s Guide -- Document #50-70376-001 Rev. C
5-1
Section 5
Installing the TROY Support Files
STEP 1:
6. From the Add Printer Wizard window, click on Have Disk.
Install the HP
PCL 5e
Printer Driver
for Windows™
(cont.)
7. From the Install From Disk window, click on Browse.
8. From the Open window, click on the down-arrow in the Drives box to select the CD-ROM drive on your
computer.
9. Double-click on the appropriate folder for the operating system you are using (Win98, etc.).
10. Double-click on the appropriate subfolder for the model printer you are using (e.g., 4200, 4300, etc.). If
applicable for your model of printer, be sure to select either the USB or standard parallel (LPT1) printer.
Click on OK to close the Open window, click on OK to close the Install From Disk window, and then click
on Next to continue the driver installation. You will be given the choice to either replace or keep the existing
driver. Is recommended that you always replace the existing driver.
NOTE: There are two versions of the 2300 printer driver (2300 and 2300L). Choose the 2300L printer driver
if you are installing the TROY MICR 2300 printer, or choose the 2300 printer driver if you are installing
either the TROY MICR 2300 Secure or the TROY 2300 MICR Secure EX printer.
11. Select the appropriate printer port from the displayed list (usually LPT1), and then click on Next. The printer
name will be highlighted. For easy printer identification, it is recommended that you change the highlighted
Hewlett-Packard printer name to the name of the TROY Security Printer you are installing (e.g., TROY
MICR 4200 Secure EX Printer) by typing over the highlighted printer name. If you are using Windows
2000/XP, choose to either share or not share your printer over the network.
12. Click on YES to print a test page to verify that your printer driver was installed correctly, and then click on
Next to continue.
13. Click on Finish to complete the installation. The printer driver installation will proceed automatically and
add the printer icon to the printer folder.
Security Printing Solutions User’s Guide -- Document #50-70376-001 Rev. C
5-2
Section 5
STEP 2:
Install the
TROY
Support Files
for Windows™
Installing the TROY Support Files
NOTE: The Hewlett-Packard PCL 5e printer driver must be installed on the host computer prior to loading the
TROY support files.
The TROY metrics file contains the required escape sequences that are used to “call” the TROY security and
barcode fonts installed in the TROY Security Printing Solution (via the TROY MICR DIMM). When properly
installed, the TROY metrics file will be associated with the PCL 5e printer driver used by your TROY Security
Printing Solution to enable printing of the actual fonts installed in the printer. By associating the metrics file with
the printer driver, the TROY TrueType screen fonts will be automatically replaced with the actual TROY fonts at
print time. If the TROY metrics file is not properly installed, then the TROY TrueType screen fonts will print
instead of the actual TROY installed printer fonts.
Install the TROY Metrics File for Windows™ 98, ME, 2000/NT4.0, XP
1. Close all applications before installing the TROY Font support files.
2. Insert the TROY Security Printing Solutions CD into your computer CD-ROM drive.
3. From the Microsoft Windows Start menu, click on Settings and then click on Printers.
4. Right-click on your TROY Security Printing Solution icon, and then click on Properties from the pull-down
menu. If multiple printers are installed, make sure the correct printer icon is selected that corresponds to your
TROY Security Printing Solution.
5. Click on the Configure tab located at the top of the Properties window.
6. Within the Other Options category, click on the More button. Some printer driver versions may not display
the Other Options category. If this is the case, simply skip to the next step.
7. Within the Fonts category, place a check mark in the Font DIMMs check-box, and then click on the
Configure button (with some printer driver software versions, the Configure button may already be
“clicked”). A new window will open labeled Configure Font DIMMs.
8. Click on the Add button to open the Add Font DIMM window.
9. Click on the Browse button to open a Windows Explorer-style window. Click on the down-arrow in the
Drives box to select the CD-ROM drive on your computer. Double-click on the top folder (root directory)
from the list of folders. For international products, double-click on the Intl folder on the TROY Security
Printing Solutions CD.
Security Printing Solutions User’s Guide -- Document #50-70376-001 Rev. C
5-3
Section 5
STEP 2:
Install the
TROY
Support Files
for Windows™
(cont.)
Installing the TROY Support Files
10. Click on the file (located in the left-hand window) named TroySEC.hpd or TroySECINTL.hpd (for
International customers), and then click on Open or OK (the displayed window may vary depending on the
operating system being used). With some printer drivers, the Add Font DIMM window will appear. If this
window appears, click on OK to close the window.
11. Within the Configure Font DIMMs window, verify the installation by clicking on the Font DIMM Name:
TROY Security Font Collection or TROY International Security Font Collection listed under Installed
DIMMs. Within the Fonts on DIMM list, the TROY E-13B (enabled) along with other TROY fonts will be
displayed.
12. Repeat Steps 9 through 11 to install the barcode fonts. Double-click on the barcode folder on the CD, and
select the TroyBAR.hpd file. Verify the installation by clicking on the Font DIMM Name: TROY Barcode
Font Collection listed under Installed DIMMs. Within the Fonts on DIMM list, the TROY barcode fonts
will be displayed.
13. Close all remaining open windows. Please refer to Section 8 – Using TROY Fonts before using the installed
fonts.
Security Printing Solutions User’s Guide -- Document #50-70376-001 Rev. C
5-4
Section 5
STEP 2:
Install the
TROY
Support Files
for Windows™
(cont.)
Installing the TROY Support Files
Install the TROY Screen Fonts for Windows™ 98, ME, 2000/NT4.0, XP
In addition to the TROY printer fonts that are permanently programmed into your TROY Security Printing
Solution, the TROY screen fonts have been developed for display use only as a visual reference and for making
positional adjustments to the MICR line. The TROY screen fonts display differently than the actual printer fonts
to prevent unauthorized printing using the MICR screen fonts on other Windows-installed printers.
If the E-13B MICR screen font is used for printing, the inversely printed (white characters on black background)
MICR screen font will not be readable by the bank reader/sorter machines. The uniquely displayed screen fonts
ensure that the MICR font printed on your MICR documents is generated from a TROY Security Printing
Solution and not from the Windows TrueType™ screen font. The TROY screen fonts are provided on the TROY
Security Printing Solutions CD supplied with your TROY Security Printing Solution.
1. Close all applications before installing the TROY support files.
2. Insert the TROY Security Printing Solutions CD into your computer CD-ROM drive.
3. From the Start menu, click on Settings, and then click on Control Panel.
4. Double-click on the Fonts folder icon.
5. Click on File, and then click on Install New Font… A new window labeled Add Fonts will open and then a
Windows Explorer-style window will open.
6. Click on the down-arrow in the Drives box to select the CD-ROM drive on your computer. Double-click on
the top folder (root directory) from the list of folders. For international products, double-click on the Intl
folder on the TROY Security Printing Solutions CD.
7. A list of TROY fonts will be listed within the List of Fonts section. Click on Select All to highlight all
available fonts, and then click on OK. A processing window may appear while the installation process
proceeds. Individual fonts may be selected if all the fonts are not needed.
8. Repeat Steps 5 through 7 to install the barcode screen fonts. Double-click on the barcode folder on the CD.
Within the List of Fonts section, click on Select All to highlight all available barcode fonts, and then click on
OK. A processing window may appear while the installation process proceeds.
9. Close all remaining open windows. The TROY screen fonts are now installed.
NOTE: For International customers, the International numeric fonts are not resident on the TROY DIMM. These
fonts are located on the TROY Security Printing Solutions CD in the “\Intl\Fonts” folder and can be
added to the TROY DIMM using the TROY Printer Utility – Download Soft Fonts Option. These fonts are
designed as non-scalable bitmapped fonts.
Security Printing Solutions User’s Guide -- Document #50-70376-001 Rev. C
5-5
Section 5
Installing the TROY Support Files
STEP 3:
Install the TROY Printer Utility for Windows™ 98, ME, 2000/NT4.0, XP
Install the
TROY
Software for
Windows™
The TROY Printer Utility provides useful functions for testing and managing your TROY Security Printing
Solution through Microsoft® Windows™. This utility takes advantage of the Windows-installed printer
collection, allowing access to any printer installed in the Windows environment. The printer connection may be
local, network, or direct network connected. The TROY Printer Utility should be installed on the administrator’s
computer only. Some of the features of the TROY Printer Utility are provided for special applications and are
not intended for general use. Refer to Section 4 – Using the TROY Printer Utility for more information.
1. Close all applications before installing the TROY Printer Utility application.
2. Insert the TROY Security Printing Solutions CD into your CD-ROM drive.
3. From the Start menu, click on Run and then click on Browse.
4. Click on the down-arrow in the Look In box at the top of the window, and then click on the drive letter
designated for the CD-ROM drive on your computer.
5. Double-click on the TROY Printer Utility folder.
6. Click on the file named setup.exe, click on Open, and then click on OK to start the installation process.
Follow the screen prompts to complete the installation.
Security Printing Solutions User’s Guide -- Document #50-70376-001 Rev. C
5-6
Section 5
STEP 3:
Install the
TROY
Software for
Windows™
(cont.)
Installing the TROY Support Files
Install the TROY Port Monitor for Windows™ 98, ME, 2000/NT4.0, XP
The TROY Port Monitor allows each user to embed additional user-defined data and/or print commands (data
encryption and TROY security commands) into the print data stream generated by their Windows application
before it is sent to the printer. Once a port monitor is set up on the host computer, all this functionality takes
place in the background without the need for user intervention.
Using the TROY Port Monitor or custom applications designed to print to TROY Security Printers, certain
printer feature settings can be temporarily changed during a print job. When the print job has finished, the EX
printer will automatically return to the original default feature configuration set by the administrator. Refer to
Section 6 – Using the TROY Port Monitor for more information.
NOTE: To maintain MICR printing security and to allow users the ability to configure their MICR print jobs, the
TROY Port Monitor must be installed on each host computer that will be used to print MICR documents on
the TROY Security Printer.
1. Close all applications before installing the TROY Port Monitor.
2. Place the TROY Security Printing Solutions CD into your CD-ROM drive.
3. From the Start menu, click on Run, and then click on Browse.
4. Click on the down-arrow in the Look In box at the top of the window, and then click on the drive letter
designated for the CD-ROM drive on your computer.
5. Double-click on the TROY Port Monitor folder.
6. Click on the file named setup.exe, click on Open, and then click on OK to start the installation process.
Follow the screen prompts to complete the installation.
NOTE: The TROY Port Monitor can be uninstalled using the uninstall procedures located at the end of this
section.
Security Printing Solutions User’s Guide -- Document #50-70376-001 Rev. C
5-7
Section 5
STEP 3:
Install the
TROY
Software for
Windows™
(cont.)
Installing the TROY Support Files
Create a TROY Port Monitor Port on Your Host Computer for Windows™ 2000/XP
1. From the Start menu, click on Settings, Printers, click on the desired printer, and then click on Printer,
Properties.
2. Select the Ports tab, and then click on the Add Port button.
3. Select TROY Port Monitor in the Printer Ports window, and then click on the New Port button. The TROY
Port Monitor screen will appear.
4. Specify a TROY Port Monitor port name in the Port Name textbox. At this point, the TROY Port Monitor
port is configured with the following default settings: port type is LPT1, encryption OFF, no User or
Password account specified, no MICR/Printer PIN specified, no Job Name and Job PIN specified, default
paper tray mapping selected, MICR mode enabled, and wallpaper disabled. These default settings can be
changed at any time.
5. If you choose not to configure the TROY Port Monitor port at this time, click on the OK button to close the
TROY Port Monitor window, which will automatically create the new TROY Port Monitor port.
6. Click on the Close button to close the Printer Ports window.
7. Click on the Apply button from the Port tab to select the TROY Port Monitor port as the default printing port.
8. Click on the OK button to close Printer Properties window.
Security Printing Solutions User’s Guide -- Document #50-70376-001 Rev. C
5-8
Section 5
STEP 3:
Install the
TROY
Software for
Windows™
(cont.)
Installing the TROY Support Files
Create a TROY Port Monitor Port on Your Host Computer for Windows™ 98/ME
1. From the Start menu, click on Settings, Printers, click on the desired printer, and then click on Printer,
Properties.
2. Select the Details tab, and then click on the Add Port button.
3. Select the Other radio button.
4. Select TROY Port Monitor from the list, and then click on the OK button. The TROY Port Monitor screen
will appear.
5. Specify a TROY Port Monitor port name in the Port Name textbox. At this point, the TROY Port Monitor
port is configured with the following default settings: port type is LPT1, encryption OFF, no User or
Password account specified, no MICR/Printer PIN specified, no Job Name and Job PIN specified, default
paper tray mapping selected, MICR mode enabled, and wallpaper disabled. These default settings can be
changed at any time.
6. If you choose not to configure the TROY Port Monitor port at this time, click on the OK button to close the
TROY Port Monitor window, which will automatically create the new TROY Port Monitor port.
7. Click on the Apply button from the Details tab to select the TROY Port Monitor port as the default printing
port.
8. Click on the OK button to close the Printer Properties window.
Security Printing Solutions User’s Guide -- Document #50-70376-001 Rev. C
5-9
Section 5
STEP 4:
Test the
TROY Font
Support for
Windows™
Installing the TROY Support Files
To verify that the TROY Windows font support files were properly installed on your system, demonstration
documents are provided through the TROY Printer Utility in Windows that can be printed out to visually identify
all security and barcode fonts downloaded to the printer. Make sure your TROY Security Printer is properly
setup, powered ON, and is online before printing out the Windows Security Font or Barcode Font Demonstration
pages.
TO PRINT THE WINDOWS SECURITY AND BARCODE DEMONSTRATION PAGE(S):
NOTE: TROY MICR Secure EX printers must have the printer keylock switch set to
“Print MICR” to enable printing of the Windows Security Font Demonstration pages.
1. From the TROY Printer Utility Main Window screen, click on the printer you wish to access.
2. Type in the current administrator password in the password box at the bottom of the Main Window. If a
password is not set, then leave the password box blank.
3. From the Main Window, click on File, Print, and then click on Windows Security (MICR) Font Demo. The
printer will automatically print out the Windows Security Font Demonstration pages.
4. Compare the actual TROY security fonts (the actual fonts generated by your printing system) shown in the
right-hand column with the facsimile image of these fonts printed in the center column (a digitized image
designed to look exactly like the actual fonts correctly generated by your system – refer to the example shown
on the next page).
If the support files were properly installed, the actual TROY security and barcode fonts displayed in the righthand column should appear identical to the facsimile fonts displayed in the center column. If the actual fonts
do not match the facsimile fonts printed on the demonstration document (fonts not printed correctly or fonts
missing on the printout), review the installation steps in this document. If further assistance is required,
contact TROY Technical Support.
Accessing TROY
Fonts Using NonWindows
Applications
If you are using a non-Windows application to print MICR documents, the escape sequence for each font must be
programmed into the application in order to “call” each of the selected fonts. The <Esc> character is ASCII
character number 27 (hexadecimal number 1B). Refer to Section 8 – Using TROY Fonts for the specific escape
sequence (displayed above each character map) used to call each of the TROY fonts.
Security Printing Solutions User’s Guide -- Document #50-70376-001 Rev. C
5-10
Section 5
STEP 4:
Installing the TROY Support Files
TROY SECURITY FONT DEMONSTRATION PAGE EXAMPLE (NOT TO SCALE)
Test the
TROY Font
Support
Windows™
(cont.)
Security Printing Solutions User’s Guide -- Document #50-70376-001 Rev. C
5-11
Section 5
STEP 5:
Check the
MICR Print
Quality
Installing the TROY Support Files
Maintaining high-quality MICR printing is vital to error-free reader/sorter processing of your checks at the bank.
TROY’s Security Printing Solutions have been consistently shown to have the lowest bank reject rates in the
industry. Poor MICR print quality will cause your checks to be rejected by the bank’s automatic MICR readers,
and therefore, you may incur significant manual processing fees from your bank for each rejected check. The
TROY MICR Quality Document is resident in your TROY Security Printer and can be printed out at any time
using the TROY Printer Utility or printer control panel. Use the TROY MICR Quality Document as a reference
to evaluate the general print quality of your TROY Security Printing Solutions product.
TO PRINT THE TROY PRINT QUALITY DOCUMENT:
NOTE: TROY MICR
Secure EX printers must
have the printer keylock
switch set to “Print MICR”
to enable printing of the
MICR Quality Document.
1. From the Main Window, click on the printer
you wish to manage.
2. If you have already set an administrator or user
password, type the password into the password
box at the bottom of the Main Window. If a
password is not set, then leave the password box
blank.
3. From the Main Window, click on File, Print,
and then click on Print.
4. Click on the Quality Document. Choose either
the E-13B or CMC-7 version of this document.
The printer will automatically print the TROY
MICR Quality Document.
Security Printing Solutions User’s Guide -- Document #50-70376-001 Rev. C
5-12
Section 5
Installing the TROY Support Files
Identifying Print
Defects
Continuous streaks and voids that may appear on the MICR Quality Document are usually the result of a low
toner condition. A scratch or other contamination on the surface of the optical drum inside the toner cartridge can
also cause streaking and other print quality defects.
To ensure optimum MICR print quality, always use a genuine TROY MICR toner cartridge with your TROY
Security Printing Solutions printer. Always replace the TROY MICR toner cartridge with a new TROY MICR
toner cartridge when the TONER LOW message appears on the printer control panel display. MICR documents
printed after a low toner condition may not meet MICR specifications and cause your printed checks to be
rejected, thereby incurring significant manual processing fees to you by your bank.
NOTE: If your TROY printer develops a noticeable print quality defect that cannot be corrected by replacing the
MICR toner cartridge, the MICR Quality Document can be sent to TROY for evaluation. Do not continue to print
MICR documents if print defects are present.
Software
Uninstall
Procedures
Uninstall the TROY Screen Fonts
In the event you wish to reinstall or permanently remove the TROY Security Printing Solution support files and
utilities, use the following procedures to properly uninstall (remove) all TROY software from your computer.
1. Close all applications before uninstalling the TROY screen fonts.
2. From the Start menu, click on Settings, and then click on Control Panel.
3. Double-click on the Fonts folder icon. Locate the TROY screen font installed (refer to the MICR font
facsimile example on the previous page for font names).
4. Right-click on the TROY screen font to be uninstalled, and then click on Delete from the pull-down menu. A
confirmation window will appear with the prompt, “Are you sure you want to delete these fonts?”. Click on
YES to confirm the deletion. The TrueType™ MICR screen font will be removed.
5. Repeat steps two and three for each TROY screen font to be uninstalled.
6. Close the Fonts Folder and Control Panel.
7.
If removing all the TROY support files, proceed to the next section for removing all the TROY support files
for Microsoft® Windows™.
NOTE: The TROY screen fonts must be uninstalled before uninstalling the TROY support files described on the
next page.
Security Printing Solutions User’s Guide -- Document #50-70376-001 Rev. C
5-13
Section 5
Software
Uninstall
Procedures
(cont.)
Installing the TROY Support Files
Uninstall the TROY Support Files
1. Close all applications before uninstalling the TROY support files.
2. From the Start menu, click on Settings, and then click on Printers.
3. Right-click on the Hewlett Packard LaserJet PCL 5e (or renamed TROY printer) printer icon, and then
click on Properties from the pull-down menu.
4. Click on the Configure tab located at the top of the Properties window.
5. Click on the More button located within the Other Options category.
6. Click on the Configure… button located within the Fonts category.
7. Within the Configure Font DIMMs window, locate the section labeled Installed DIMMs. Click on TROY
Security Font Collection listed under Installed DIMMs (TROY International Security Font Collection for
international support). Click on Remove to uninstall the TROY support files. The entry will be deleted from
the Installed DIMMs list.
8. Close all remaining open windows. All the TROY support files have been removed.
Uninstall the TROY Printer Utility
1. Close all applications before uninstalling the TROY Printer Utility files.
2. From the START menu, click on Settings, and then click on Control Panel.
3. Click on Add/Remove Programs.
4. Locate the TROY Printer Utility from the listing.
5. Click on Add/Remove.
6. Follow the screen prompts.
7. Close all remaining open windows. The TROY Printer Utility files have been removed.
Security Printing Solutions User’s Guide -- Document #50-70376-001 Rev. C
5-14
Section 5
Software
Uninstall
Procedures
(cont.)
Installing the TROY Support Files
Uninstall the TROY Port Monitor
1. Close all applications before uninstalling the TROY Port Monitor files.
2. From the Start menu, click on Settings, and then click on Control Panel.
3. Click on Add/Remove Programs.
4. Locate the TROY Port Monitor from the listing.
5. Click on Add/Remove.
6. Follow the screen prompts.
7. Close all remaining open windows. The TROY Port Monitor files have been removed.
Security Printing Solutions User’s Guide -- Document #50-70376-001 Rev. C
5-15
Section 6
Introduction
Using the TROY Port Monitor
What is a TROY Port Monitor? The TROY Port Monitor is a Windows-based application that manages and
configures all print data sent from your Windows application to your TROY Security Printing Solution.
Essentially, when you initiate a print job from your Windows application, the raw print data is formatted to fit the
printing parameters of the selected TROY printer using the corresponding MICR printer driver installed on the
host computer. The formatted print data is then sent to the Windows print spooler, a temporary holding area
where all print jobs reside until all previous print jobs have been completed. The TROY Port Monitor receives
the formatted print data from the Windows print spooler (before the print job is sent to the printer), manipulates
the print data as needed (via preset and/or user-defined commands), and then sends the modified print data on to
your TROY printer. In this way, the TROY Port Monitor allows you to embed additional user-defined data
and/or print commands (data encryption and TROY security commands) into the print data stream generated by
your Windows application before it is sent to your TROY printer. Once the TROY Port Monitor is set up and
configured on the host computer, all this functionality takes place in the background without the need for any
additional user intervention.
By using the TROY Port Monitor to print to a TROY Security Printing Solution, certain printer feature settings
can be temporarily changed during a print job. Features that offer this job-by-job configuration flexibility are
known as job-related features. When the print job has finished, the TROY printer will automatically return to the
original default feature configuration set by the administrator.
Application
Graphical
User
Interface
Printer Driver
Print
Spooler
TROY Port Monitor
TROY MICR
Printer
Security Printing Solutions User’s Guide -- Document #50-70376-001 Rev. C
6-1
Section 6
Introduction
(cont.)
Using the TROY Port Monitor
More than one port monitor can be configured on a Windows-based PC. Multiple port monitors addressed to the
same printer can be configured differently, allowing simple point-and-click selection of TROY security features.
Multiple port monitors can also be associated with different printers, providing effortless configuration across
even the most complex network environments. The only requirement is that each port monitor configured per PC
be assigned a unique name.
Configuration settings within the TROY Port Monitor affect only the print job data being sent and do not affect
the default configuration of the TROY printer. To change the default configuration of the TROY printer, please
see Section 4 – Using the TROY Printer Utility for more information. Some of the TROY Port Monitor features
may not be available for your TROY Security Printing Solution.
The TROY Port Monitor can be configured to print to a local port (LPT1), a network port (IP address or UNC
path), or to a file for archival purposes.
The TROY Port Monitor allows users to perform the following actions within a single print job:
•
•
•
•
•
•
•
•
Encrypt the print data being sent to the printer using a secure encryption algorithm
Enter a user name and password to enable established privileges
Enable/Disable the TROY MICR mode
Enable/Disable and configure the TROYmark™ background image )
Enable factory default mapping for the printer’s paper trays
Assign a PIN (Personal Identification Number) to restrict the printing of a personal print job
Assign an alternate escape sequence (for legacy application compatibility)
Rotate the page image 180 degrees when printing (to print MICR line on leading edge of page)
* TROY MICR Secure EX Printers Only
Security Printing Solutions User’s Guide -- Document #50-70376-001 Rev. C
6-2
Section 6
Using the TROY Port Monitor
Installing the
TROY Port
Monitor
To install the TROY Port Monitor, ensure that the appropriate printer drivers are installed first, and then install
the port monitor (follow the instructions described in Section 5 – Installing the TROY Support Files). The TROY
Port Monitor software is located on the TROY Security Printing Solutions CD supplied with your TROY
Security Printing Solution.
Accessing
the TROY
Port Monitor
The screens required to access the TROY Port Monitor differ slightly between the Windows operating systems
supported by the TROY Port Monitor (Microsoft Windows 95/98, ME, 2000/NT4.0, and XP). Once the TROY
Port Monitor is accessed, the screens within the TROY Port Monitor will appear identical across all Windows
operating systems.
TO ACCESS THE TROY PORT MONITOR IN WINDOWS 95:
1. Click on Start, Settings, and then
Printers.
2. Right-click on the desired TROY
printer icon, and then left-click
on Properties.
3. Click on the Details tab. Select
the desired printer driver and
port that corresponds to the
TROY printer being used, and
then click on Port Settings to
access the TROY Port Monitor.
Security Printing Solutions User’s Guide -- Document #50-70376-001 Rev. C
6-3
Section 6
Accessing
the TROY
Port Monitor
(cont.)
Using the TROY Port Monitor
TO ACCESS THE TROY PORT MONITOR IN WINDOWS 98 OR WINDOWS ME:
1. Click on Start, Settings, and then
Printers.
2. Right-click on the desired TROY
printer icon, and then left-click on
Properties.
3. Click on the Details tab. Select
the desired printer driver and port
that corresponds to the TROY
printer being used, and then click
on Port Settings to access the
TROY Port Monitor.
Security Printing Solutions User’s Guide -- Document #50-70376-001 Rev. C
6-4
Section 6
Accessing
the TROY
Port Monitor
(cont.)
Using the TROY Port Monitor
TO ACCESS THE TROY PORT MONITOR IN WINDOWS 2000/NT4.0 OR XP:
1. Click on Start, Settings, and then Printers.
2. Right-click on the desired TROY printer
icon and then left-click on Properties.
3. Click on the Ports tab. Select the desired
port that corresponds to the TROY printer
being used, and then click on Configure
Port Settings to access the TROY Port
Monitor.
Security Printing Solutions User’s Guide -- Document #50-70376-001 Rev. C
6-5
Section 6
Using the TROY Port Monitor
Using the
TROY Port
Monitor
Port monitor settings for the selected TROY Security Printing Solution and associated port will remain in effect
until changed by the user. If the administrator has set up user names and passwords, the user must enter a valid
user name and password before any port monitor security settings will affect the MICR print job initiated by that
user. For non-MICR print jobs, a user name and password is not required, and none of the TROY Port Monitor
security settings will affect the print job.
Connection Tab
The Connection tab is used to select the type of port
(local or network) you are using to send print data to
the TROY printer.
TCP/IP – select this port if you are sending print data
from your computer to a TROY printer over a public
(Internet) or private (intranet) network. You must
specify a TCP/IP address and port number. The
TROY port monitor also supports UNC (universal
naming convention) paths.
File – select this port if you want to save your print
data in a file for archiving or for printing the job at a
later time.
LPT (1-4) – select this port (LPT1 through LPT4) if
you are sending print data from your computer to a
local printer connected directly to the parallel port of
your computer.
USB (Universal Serial Bus) – select this port if you
are sending print data from your computer to a
TROY printer connected to the USB port of your
computer.
Security Printing Solutions User’s Guide -- Document #50-70376-001 Rev. C
6-6
Section 6
Encryption Tab
(MICR Secure EX
Printers Only)
Using the TROY Port Monitor
The Encryption tab is used to enable/disable data encryption. Use this feature to prevent fraudulent interception
(eves-dropping) of your proprietary MICR check data being sent over a public network.
Encryption Mode – select None for no data
encryption, or select Job Data Only to encrypt the
data being sent from your computer to the TROY
printer.
Encryption Method – select the desired encryption
method.
The Triple-DES (DES3) 168-bit
encryption method has been widely used by banking
institutions; however, it is now being replaced by
the A.E.S. (American Encryption Standard) 128-bit
encryption method (formerly known as Rijndael).
The TwoFish 128-bit encryption method offers fast
encryption processing performance. All encryption
methods provide similar data encryption security.
Encryption Password – enter the encryption
password (up to 128 characters in length) that
matches the TROY printer’s current decryption
password (pass phrase) set by the system
administrator in the Printer Utility.
Security Printing Solutions User’s Guide -- Document #50-70376-001 Rev. C
6-7
Section 6
Security Tab
Using the TROY Port Monitor
The Security tab is used to enable the port monitor security features for printing MICR documents. If the
administrator has implemented PINs or user names and passwords in the TROY printer, matching PINs or a valid
user name and password must be entered in the Port Monitor fields under the Security tab in order for MICR jobs
to print correctly. Non-MICR print jobs do not require a user name and password, and none of the TROY Port
Monitor security settings will affect the print job.
Account User and Password – enter your user name
and password as assigned by the system administrator.
If the administrator has not assigned you a user name
and password, leave the user name and password
fields blank.
Personal Identification Number (PIN) – enter a valid
4-digit PIN (0001-9999) to enable printing of the
current print job.
Printer PIN: enter a valid 4-digit PIN to enable
printing of either a non-MICR or MICR print job.
Entering an invalid PIN will cause the print job to be
purged, and the software will not provide the user
with notification of this action.
MICR PIN: enter a valid 4-digit PIN to enable
printing of a MICR print job. Entering an invalid PIN
will cause the print job to be purged, and the software
will not provide the user with notification of this
action. The printer keylock switch must be set to the
“Print MICR” position.
Job Name/Job PIN: enter the desired job name and 4digit PIN (0001-9999) to protect your print job. Your
print job will only print after the correct job name and
PIN is entered at the printer control panel. Entering
four zeros (pressing the Select button four times) will cancel the print job.
Default Paper Tray Mapping – place a check in this box to use the factory default (standard Hewlett-Packard)
paper tray mapping designated for your model of TROY printer. If the administrator has implemented custom
tray mapping, then leave this box unchecked to use the custom tray map settings.
Security Printing Solutions User’s Guide -- Document #50-70376-001 Rev. C
6-8
Section 6
Security Tab
(cont.)
Using the TROY Port Monitor
Alternate Escape Sequence – (used only for legacy application compatibility) enter the alternate ASCII character
number (0-255) to use as a replacement for the ASCII character 27 (escape character) in the PCL 5 data stream
sent to the printer. Press the Alt key and enter the ASCII character number.
Enable MICR Mode – check this box to enable MICR mode when printing MICR documents.
HP Job Password – (used only for legacy TROY
printers) enter the password (0-65535) that
matches the job password (PJL command) set in
the TROY printer by the administrator.
Automatic Page Rotation – when printing checks
with the MICR line at the bottom of the check
paper, check this box to rotate the page image 180
degrees to print the MICR line at the top of the
page, ensuring accurate MICR line placement.
TROYmark™ – select Disable for no background
image on the check or select either Light,
Medium, or Dark to use a pre-defined density
level for the background image, or select Custom
to use a custom density level that best suits the
design of your check.
Inclusion and Exclusion Regions – enter the
appropriate “X” (horizontal) and “Y” (vertical)
offset numerical values to define the top-left
starting point of the inclusion region and the
exclusion region(s), and then enter the width and
height numerical values to define the bottom-right
ending point of the inclusion and the exclusion
region(s) for placement of the TROYmark™
background image and exclusion areas. Click on
Test to print a sample page to verify the
inclusion/exclusion region placement on the
check. Make adjustments to the numerical values
as needed. Each increment in the numeric value equals 1/600th of an inch.
Security Printing Solutions User’s Guide -- Document #50-70376-001 Rev. C
6-9
Section 7
Using the Printer Control Panel
Introduction
Many of the TROY printer features provided in the TROY Printer Utility can be configured through the printer
control panel as a secondary point of control. For security purposes, an administrator password is required before
access to the TROY printer features is allowed. Refer to the menu maps shown on the following pages to select,
setup, or configure the TROY features available through the printer control panel.
Security
An administrator password is used within the TROY Security Printing Solutions to secure the TROY printer
features and settings. The printer uses a permanent default user name (ADMIN) that cannot be deleted or
modified; however, the administrator password can be modified using the TROY Printer Utility or the printer
control panel. The administrator default password is blank (no password); however, administrators are
encouraged to setup a unique password to restrict access to the TROY printer’s features and settings. After an
administrator password is set, all standard Hewlett-Packard printer features normally available through the printer
control panel will remain accessible to anyone without entering a password.
Although the administrator password can be set via the printer control panel, TROY strongly recommends using
the TROY Printer Utility to select or modify the administrator password. The TROY Printer Utility will
automatically update the printer’s administrator password whenever the password is changed in the printer utility.
However, changing the administrator password at the printer control panel will not update the TROY Printer
Utility password in the host computer (no bi-directional communication). The printer’s administrator password
and the TROY Printer Utility password in the host computer must be identical in order to access the printer
features through the TROY Printer Utility.
NOTE: If you plan to use the TROY Printer Utility exclusively to set or enter the administrator password
(recommended), then both letters and/or numbers may be used for the administrator password.
Security Printing Solutions User’s Guide -- Document #50-70376-001 Rev. C
7-1
Section 7
Using the Printer Control Panel
Functionality
The control panel button sequence required
to select a printer feature is identical for the
2300, 4200, and 4300 printer models. To
differentiate between a Hewlett-Packard
and a TROY printer feature, all TROY
printer features will display the word TROY
at the top of each main menu.
Accessing Printer
Features
TO ACCESS PRINTER FEATURES (4200 OR 4300 SERIES PRINTERS):
1. Press the W button until the desired menu selection is displayed, and then press the button. If additional
second-level menu items appear, press the W button to select the desired option, and then press the button.
2. Press the Up/Down button until the desired value is displayed.
3. Press the button to save the desired value. An asterisk will be displayed next to the selected value.
4. Press the Pause/Resume button to place the printer back on line.
Entering the
Administrator
Password
A valid administrator password must be entered at the printer control panel before access is allowed to any of the
TROY security features and settings. If an administrator password has not been previously set, then the default
password is blank (no password).
TO ENTER THE ADMINISTRATOR PASSWORD (4200 AND 4300 SERIES PRINTERS):
1. Press the W button to select TROY MENUS, and then press the button.
2. Press the W button to select SECURITY MENU, and then press the button.
3. Ensure ACTION is highlighted, and then press the button.
4. Press the W button to select LOG IN, and then press the button.
5. Press the W button to select USER ID, and then press the button.
6. Press the W button to select the letter A, and then press the button. Repeat this process until you have
entered the word ADMIN. Press the button three more times to continue.
7. Press the W button to select PASSWORD, and then press the button.
Security Printing Solutions User’s Guide -- Document #50-70376-001 Rev. C
7-2
Section 7
Using the Printer Control Panel
Entering the
Administrator
Password (cont.)
8. Enter your password, and then press the button. If a password has not been set, then press the button
repeatedly to exit this field and continue.
9. Press the Pause/Resume button to refresh the menu options. The menu options must refreshed to ensure that
all available menu selections are displayed on the printer control panel.
10. Press the W button to select the desired menu option, and then press the button to continue.
Saving Printer
Settings
In the event that a cold reset is performed on your TROY printer due to servicing and/or firmware updates, all
TROY-managed variable values will be lost and, therefore, will require re-entry by the user. TROY Security
Printing Solutions provide the ability to save and restore all TROY-managed variable values.
TO SAVE OR RESTORE TROY-MANAGED VARIABLE VALUES:
1. Press the W button to select TROY MENUS, and then press the button.
2. Press the W button to select SECURITY MENU, and then press the button.
3. Ensure ACTION is highlighted, and then press the button.
4. Press the W button to select LOG IN, and then press the button.
5. Press the W button to select USER ID, and then press the button.
6. Press the W button to select the letter A, and then press the button. Repeat this process until you have
entered the word ADMIN. Press the button three more times to continue.
7. Press the W button to select PASSWORD, and then press the button.
Security Printing Solutions User’s Guide -- Document #50-70376-001 Rev. C
7-3
Section 7
TROY
Security
Printing
Solutions
Menu Map
Using the Printer Control Panel
The following sample menu map shows the available TROY features that are built into TROY Security Printing
Solutions. Depending on your type of TROY Security Printing Solution, some of these features may not be
available on your TROY printer (refer to the menu maps on the following pages).
Security Printing Solutions User’s Guide -- Document #50-70376-001 Rev. C
7-4
Section 7
Using the Printer Control Panel
TROY
Security
Printing
Solutions
Menu Map
(cont.)
Security Printing Solutions User’s Guide -- Document #50-70376-001 Rev. C
7-5
Section 7
Using the
Exact
Positioning
Technology
Using the Printer Control Panel
If the MICR line on your checks does not meet the ANSI X/9B specification for MICR line placement, use this
feature to make small vertical, horizontal, or rotational positioning adjustments to the MICR line and/or page
image. Use the TROY MICR Document Template (54-17373-001) to verify the correct placement of the MICR
line on your checks after performing an adjustment (refer to Section 3 – MICR Quality Control in the TROY
MICR Basics Handbook for instructions on using the TROY MICR Document Template). If adjustments are
made simultaneously to the MICR line and the page image positions using positive numbers, then the sum of the
two numbers will be used as the offset value for the MICR line.
NOTE: The MICR line adjustments are preset at the factory. TROY recommends that you do not alter these
settings unless your bank of deposit notifies you of MICR line positioning errors on your deposited checks.
TO EVALUATE THE PLACEMENT OF THE MICR LINE ON YOUR PRINTED CHECKS:
1. Print one page of test checks to use for evaluating the positioning of the E-13B MICR printing at the bottom
of each check (see the example below).
Security Printing Solutions User’s Guide -- Document #50-70376-001 Rev. C
7-6
Section 7
Using the
Exact
Positioning
Technology
(cont.)
Using the Printer Control Panel
2. Use the provided TROY MICR Document Template (see the example below) to evaluate the position of the
printed MICR line on the bottom of the checks. Refer to Section 3 – MICR Quality Control in the TROY
MICR Basics Handbook for instructions on using the TROY MICR Document Template.
Security Printing Solutions User’s Guide -- Document #50-70376-001 Rev. C
7-7
Section 7
Using the
Exact
Positioning
Technology
(cont.)
Using the Printer Control Panel
TO ADJUST THE POSITION OF THE MICR LINE
1. If not already logged into the printer control panel, enter a valid administrator password (see page 7-2).
2. Press the W button to select TROY MENUS, and then press the button.
3. Press the W button to select SETTINGS MENU, and then press the button.
4. Press the W button to select the desired adjustment parameter (MICR ADJUST X DECIPOINTS or MICR ADJUST Y
DECIPOINTS), and then press the button.
5. Enter the desired decipoint offset value (-720 to +720) to reposition the MICR line (X=horizontal and
Y=vertical), and then press the button to save each decipoint value. Each decipoint is equal to 1/720th of
an inch. Repeat this step for each parameter you wish to change.
6. Press the W button to select AUTO ROTATION, and then press the button.
7. Press the W button to select ENABLE or DISABLE, and then press the button to save this setting. If enabled, the
page will print upside down (180-degree rotation) from the currently defined orientation.
8. Print a test page to evaluate the MICR line position adjustment. Repeat the adjustment as necessary. Use the
TROY MICR Document Template to verify all MICR line adjustments.
Security Printing Solutions User’s Guide -- Document #50-70376-001 Rev. C
7-8
Section 7
Using the
Exact
Positioning
Technology
(cont.)
Using the Printer Control Panel
TO ADJUST THE POSITION OF THE PAGE IMAGE:
1. If not already logged into the printer control panel, enter a valid administrator password (see page 7-2).
2. Press the W button to select TROY MENUS, and then press the button.
3. Press the W button to select SETTINGS MENU, and then press the button.
4. Press the W button to select the desired adjustment parameter (PAGE ADJUST X DECIPOINTS or PAGE ADJUST Y
DECIPOINTS), and then press the button.
5. Enter the desired decipoint offset value (-720 to +720) to reposition the page image (X=horizontal and
Y=vertical), and then press the button to save each decipoint value. Each decipoint is equal to 1/720th of
an inch. Repeat this step for each parameter you wish to change.
6. Print a test page to evaluate the MICR line position adjustment. Repeat the adjustment as necessary. Use the
TROY MICR Document Template to verify all MICR line adjustments.
Security Printing Solutions User’s Guide -- Document #50-70376-001 Rev. C
7-9
Section 8
Introduction
Using TROY Fonts
The TROY MICR E-13B and CMC-7 MICR fonts have been specifically engineered for your TROY Security
Printing Solution to ensure the highest quality MICR printing in the industry. The TROY font collection
provides seamless integration and security within your Windows-based check printing application. All TROY
fonts are permanently programmed into the printer memory to ensure consistent high-quality MICR printing and
to prevent unauthorized use of these fonts on another printing system. Your TROY Security Printing Solution
includes the following fonts:
•
•
•
•
•
•
•
•
•
•
•
TROY MICR Font (E-13B and CMC-7)
TROY Security Font (English and Spanish)
TROY Convenience Fonts (Enhanced, Large and Small)
TROY Reverse Helvetica Font
TROY OCR Fonts (type A and B)
TROY Messaging Fonts
TROY AutoProtect™ Font
TROY Data Capture Fonts
TROY Microprint Font
British Pound and Euro symbols
TROY POSTNET and Barcode Fonts
Accessing
and Using
TROY Fonts
The following paragraphs provide some basic information for accessing and using the TROY fonts. It is
important that these fonts are kept secure to prevent unauthorized use and that the fonts remain unaltered to
ensure accurate rendering by the TROY printer. All TROY fonts reside in the secure memory area of the TROY
Security Printing Solution and cannot be directly accessed through the printer control panel or other external
means. Users having the appropriate security rights can access the TROY MICR fonts from any Windows-based
application.
Accessing TROY
Fonts Using
Windows
Applications
To access the TROY fonts in a Windows environment, you must first install the Windows printer driver for the
specific model of TROY Security Printing Solution being installed. Follow the instructions in Section 5 –
Installing the TROY Support Files to install the printer driver and Windows support files, enabling you to select
these fonts from any Windows-based application. To print the TROY E13-B and CMC-7 MICR fonts, your
TROY printer must be set to MICR enabled mode, and a TROY MICR toner cartridge must be installed in the
printer (TROY MICR Secure EX printers must have the keylock switch set to “Print MICR”). Many commercial
MICR check-printing applications are pre-programmed to access the TROY MICR fonts. Refer to the TROY
Programmer’s Reference Guide for more details.
Security Printing Solutions User’s Guide -- Document #50-70376-001 Rev. C
8-1
Section 8
Using TROY Fonts
Accessing TROY
Fonts Using NonWindows
Applications
If you are using a non-Windows application to print MICR documents, the escape sequence for each font must be
programmed into your check-printing application in order to “call” each of the selected fonts. The <Esc>
character is ASCII character number 27 (hexadecimal number 1B). Refer to the end of this section for each
escape sequence (displayed above each character map) used to call each TROY font.
Using TROY
MICR Fonts
The E-13B MICR font (TROY E-13B, TROY CMC-7) can be used for printing the MICR line in many countries,
including the United States. In some European and Latin American countries, the CMC-7 MICR font is used
instead. MICR document processing requires that the MICR characters be precise in size, shape, and spacing.
For this reason, the TROY MICR font is supplied as a TrueType font; it must not be altered by scaling or other
size manipulation. TROY can provide customer support for your MICR applications only if you use the supplied
TROY MICR fonts.
Using the
Convenience
Amount Fonts
Your TROY Security Printing Solution includes a large, small and enhanced convenience amount font (TROY
ECF, TROY LCF, TROY SCF). These fonts consist of numbers with their alphabetic spellings placed directly
below the numerical character. These fonts are designed for use in the Legal Amount field only (located directly
below the Payee field). You can enter alphanumeric symbols representing the amount of the check into this field.
Using the TROY
Security Font
The TROY Security font (TROY SECURITY, TROY SECURITY SPANISH) is designed to prevent fraudulent alteration
to the Amount field on the check. The font consists of numbers with their alphabetic spellings placed directly
below the numerical character with a wavy lined pattern running through each character. These fonts are
designed for use in the Legal Amount field only (located directly below the Payee field on the check). You can
enter numeric symbols representing the amount of the check into this field. During document processing,
convenience amounts may be visually read and encoded on the check by bank personnel. In this case, a large
Security Amount font may best meet your bank’s requirements.
Using the TROY
Messaging Fonts
The TROY Messaging font is designed specifically to capture user-defined non-check data that can be included
in the TROY audit reports and/or the TROYmark™ background image on the check. The messaging font is
visible on the screen as a generic typeface, but will not print.
Using the TROY
OCR Fonts
The TROY OCR fonts (TROY OCR-A AND TROY OCR-B) are used to print any information (names, addresses,
amounts) on the check that is to be read by automated readers using optical character recognition.
Using the Reverse
Helvetica Font
The TROY Reverse Helvetica font is used to print names and addresses on the back of transparent envelope
windows for use in pressure-seal machines.
Security Printing Solutions User’s Guide -- Document #50-70376-001 Rev. C
8-2
Section 8
Using TROY Fonts
Using the TROY
AutoProtect™
Font
To prevent fraudulent production of checks, TROY Security Printing Solutions can automatically print “VOID”,
“DO NOT CASH”, “NON-NEGOTIABLE” or any other user-defined phrase across the face of any check that
was printed on any printer other than a TROY Security Printing Solution. The TROY AutoProtect™ font (TROY
AUTO-PROTECT) provides a visual safeguard to identify checks printed by printers without TROY MICR toner or
the TROY MICR font.
Using the TROY
Microprint Font
The TROY Microprint font is used to print security messages on checks that cannot be copied by photocopying.
Using the
POSTNET Font
The POSTNET (Postal Numeric Encoding Technique) font (TROY POSTNET) is used to represent the nine-digit
postal zip code below the postal address line. Using the POSTNET font on your mailing envelopes and postcards
will significantly decrease postal processing time and reduce the chance of errors when manual data entry is
required at the post office.
Using the British
Pound and Euro
Symbols
The British Pound and European currency symbols are used in place of the U.S. dollar sign for the respective
European country and can be selected to print in the audit reports.
Security Printing Solutions User’s Guide -- Document #50-70376-001 Rev. C
8-3
Section 8
Using the Data
Capture Fonts
Using TROY Fonts
The data capture fonts are designed to capture default and user-defined data from the check for use in the TROY
enhanced audit reports and/or the TROYmark™ background image printed on the check. Several data capture
font styles are provided to allow customization of your check; however, the same data capture font can be used
for capturing all desired check data. Use the TROY Printer Utility to configure your data capture fonts (refer to
Section 4 – Using the TROY Printer Utility. Refer to the example below and the example on the next page.
TROY Detailed Audit Report
Record MICR
Amount*
Payee Name Date
Custom
00013 C1234567890C A123456789A 12345D67890C $
2,673.00 John Q. Public 10/05/2000 999-99-9999 QFG382M
2
MICR Line
(automatically captured)
6
TROY Amount
3
TROY Payee
5
TROY Date
1
TROY Digital Signature (shown on the next page)
2
MICR Line (automatically captured)
3
TROY Payee
4
Custom 3 (user-defined non-check data using the TROY
Messaging font), (shown on the next page)
5
TROY Date
6
TROY Amount
7
Custom 1 (user-defined data contained on the check)
8
Custom 2 (user-defined data contained on the check)
Security Printing Solutions User’s Guide -- Document #50-70376-001 Rev. C
7
Custom 1
8
Custom 2
8-4
Section 8
Using TROY Fonts
Using the Data
Capture Fonts
(cont.)
Security Printing Solutions User’s Guide -- Document #50-70376-001 Rev. C
1
TROY Digital Signature
2
MICR Line (automatically
captured)
3
TROY Payee
4
Custom 3 (user-defined
non-check data using the
TROY Messaging font)
5
TROY Date
6
TROY Amount
7
Custom 1 (user-defined
data contained on the
check)
8
Custom 2 (user-defined
data contained on the
check)
8-5
Section 8
Using Printer
Fonts and
Screen Fonts
Using TROY Fonts
In addition to the TROY printer
fonts that are permanently
programmed into the TROY
Security Printing Solution, the
TROY screen fonts have been
developed for screen display use
only as a visual reference and for
making positional adjustments to
the MICR line. The TROY screen
fonts display differently than the
actual printer fonts in order to
prevent unauthorized printing
using the MICR screen fonts on
other Windows-installed printers.
If the E-13B MICR screen font is
used for printing, the inversely
printed (white characters on a
black background) MICR screen
font will not be readable by the
bank reader/sorter machines. The
uniquely displayed screen fonts
ensure that the MICR font printed
on your MICR documents is
generated by the TROY Security
Printing Solution and not by the
Windows operating system using
the resident TrueType™ font. The
TROY screen fonts are provided
on the TROY Security Printing
Solutions CD supplied with your
TROY Security Printing Solution.
Security Printing Solutions User’s Guide -- Document #50-70376-001 Rev. C
8-6
Section 8
MICR Font
Guidelines
Using TROY Fonts
The TROY E-13B and CMC-7 MICR fonts were developed using strict specifications designed specifically for
high-speed magnetic-read processing. To maintain these strict specifications, the TROY MICR fonts were
designed as non-scalable fonts (fixed fonts) that are fixed in pitch (spacing) and point size (height). Because
Windows TrueType™ technology allows fonts to be scalable by changing the point size, it is imperative to
maintain the 12-point size of the MICR fonts installed in Windows. Selecting a point size other than 12-point for
the MICR font in Windows will not visibly enlarge or reduce the size of the characters; however, the horizontal
spacing will be affected. Any alteration to the spacing of the characters will result in incorrect placement of the
MICR characters in the MICR line at the bottom of your checks, causing your financial documents to be rejected
by the bank.
The Convenience Amount fonts were also designed as non-scalable fonts, but can be changed (increased or
decreased) from the default point size to meet your check printing requirements. Changing the point size of a
fixed font in Windows will only affect the horizontal spacing of the characters and not affect the vertical size of
the characters. The TROY Enhanced Convenience Amount font and TROY Security font were designed as
scalable fonts that can be changed (increased or decreased) from the default point size to meet your check
printing requirements.
NOTE: It is highly recommended that you verify the MICR line at the bottom of your printed checks using the TROY
MICR Document Template (p/n 54-17373-001) to verify the positioning of each character. Refer to the TROY MICR
Basics Handbook for details (provided in PDF format on the TROY Security Printing Solutions CD supplied with
your TROY Security Printing Solution).
Priority of Font
Locations
If the TROY printer is in MICR mode, and a MICR font in another format is resident in the printer, the font
selection will be according to the following priority:
Soft Font (Lowest ID first) Highest
Programmed Firmware Font
MICR System Font
Lowest
Security Printing Solutions User’s Guide -- Document #50-70376-001 Rev. C
8-7
Section 8
Font
Character
Mapping
Using TROY Fonts
Each character or symbol in a font set corresponds to a specific ASCII (American Standard Code for Information
Interchange) number (e.g., the capital letter “A” = ASCII number 65). Pressing a key on your computer
keyboard automatically generates the ASCII number (32 through 127) associated with the character or symbol
displayed on the key. Likewise, any character or symbol not represented on your computer keyboard (ASCII
numbers above 127) can be accessed by manually entering the associated ASCII number using the numeric
keypad.
The fonts provided on the TROY Security Printing Solutions CD have each of the characters and symbols in
each font set (shown on the following pages) “mapped” (associated) to standard computer keyboard characters
using the corresponding ASCII number for each character and symbol on the keyboard.
For example, the transit symbol (one of the industry-standard symbols used in a MICR line at the bottom of a
check) contained in the TROY E-13B MICR character table (shown on page 9) does not exist on a standard
computer keyboard but has been “mapped” to the standard ASCII keyboard capital letter “A”, designated as
ASCII number 65.
Therefore, after loading and then selecting the TROY E-13B MICR Font, typing the capital letter “A” on your
computer keyboard will produce the MICR transit symbol instead of the capital letter “A”. The TROY E-13B
character table (shown on page 8-11) associates the transit symbol with ASCII number 65 (the same ASCII
number used for the capital letter “A” if you had selected a standard ASCII font set instead of the TROY E-13B
MICR font set).
Security Printing Solutions User’s Guide -- Document #50-70376-001 Rev. C
8-8
Section 8
Using TROY Fonts
Determining a
Character
Mapping
To determine which key on your computer keyboard that a TROY character or symbol is “mapped” to, simply
compare the ASCII number of the selected TROY character or symbol to the same ASCII number listed in the
Standard ASCII Character Map (shown on the next page) to determine which keyboard key can be used to
access the selected TROY character or symbol.
Accessing
Unmapped
Characters
Some of the font sets provided on the TROY Security Printing Solutions
CD contain more characters or symbols than can be “mapped” to the
available keys on a standard computer keyboard. In this case, these
characters can be accessed by manually entering the ASCII number (see
example at right) designated for each character (refer to the character
tables on the following pages). The hexadecimal number shown below
the ASCII number is used for programming mainframe computers.
65
0041
A
ASCII Number
Hexadecimal Number
Character or Symbol
To access a character or symbol that is not “mapped” to one of the keys on your Windows computer keyboard,
you can manually enter the ASCII number by holding down the ALT key on your keyboard, entering the associated
ASCII number for the character you wish to access, and then releasing the ALT key.
NOTE: You must use the numerical keypad on your keyboard to enter the ASCII number. The number keys along
the top of the keyboard will not work for this application.
Security Printing Solutions User’s Guide -- Document #50-70376-001 Rev. C
8-9
Section 8
Using TROY Fonts
Standard ASCII
Character Set
(reference only)
Security Printing Solutions User’s Guide -- Document #50-70376-001 Rev. C
8-10
Section 8
TROY MICR E13B 12-Point Font
(Troy E-13B)
Using TROY Fonts
<Esc>(ØQ<Esc>(s1p12vØsØbØT
Security Printing Solutions User’s Guide -- Document #50-70376-001 Rev. C
8-11
Section 8
Using TROY Fonts
TROY MICR
CMC-7 12-Point
Font
(Troy CMC7)
<Esc>(ØQ<Esc>(s1p12vØsØb1T
TROY Enhanced
Convenience
Amount Font
(Troy ECF)
<Esc>(3Q<Esc>(s1pvØsØb1ØT
= desired point size
Security Printing Solutions User’s Guide -- Document #50-70376-001 Rev. C
8-12
Section 8
Using TROY Fonts
NOTE: The TROY Enhanced Convenience Amount font can be used in place of the TROY Convenience Amount
font in the legal amount field of the check. To write the cents amount on the check, type the capital letter that
corresponds to the smaller cent characters shown in the example above (i.e., A=0, B=1, C=2).
TROY Large
Convenience
Amount 18-Point
Font (Troy LCF)
<Esc>(1Q<Esc>(sØp5.Øh16.ØvØsØbØT
TROY Small
Convenience
Amount 24-Point
Font (Troy SCF)
<Esc>(2Q<Esc>(sØp6.ØØh22.ØvØsØbØT
Security Printing Solutions User’s Guide -- Document #50-70376-001 Rev. C
8-13
Section 8
Using TROY Fonts
TROY
AutoProtect™
Font (Troy AutoProtect)
<ESC>(19U<esc>(s1pvØsØb166Ø2T<esc>%m1I
TROY Security
Font (Troy
Security)
<Esc>(4Q<Esc>(s1pvØsØbØT
= desired point size
TROY Security
Font (Spanish)
(Troy Security
Spanish)
<Esc>(4Q<Esc>(s1pvØsØb4T
= desired point size
= desired point size
NOTE: The TROY Security Spanish Font is included in the International Font Collection provided on the TROY
Security Printing Solutions CD.
Security Printing Solutions User’s Guide -- Document #50-70376-001 Rev. C
8-14
Section 8
Using TROY Fonts
TROY Reverse
Helvetica Font
(Troy Helvetica
(Rev))
Security Printing Solutions User’s Guide -- Document #50-70376-001 Rev. C
8-15
Section 8
TROY OCR-A
(Troy OCR-A)
Using TROY Fonts
<Esc>(ØO<Esc>(s1pvØsØb1Ø4T
= desired point size
Security Printing Solutions User’s Guide -- Document #50-70376-001 Rev. C
8-16
Section 8
Using TROY Fonts
TROY OCR-A
(continued)
NOTE: This OCR font must be used at the designated point size to ensure optical readability.
Size I – must use 12-point size (upper and lower case characters can be used)
Size III – must use 16-point size (only upper case characters can be used)
Size IV – must use 20-point size (only upper case characters can be used)
Security Printing Solutions User’s Guide -- Document #50-70376-001 Rev. C
8-17
Section 8
TROY OCR-B
(Troy OCR-B)
Using TROY Fonts
<Esc>(1O<Esc>(s1pvØsØb11ØT
= desired point size
Security Printing Solutions User’s Guide -- Document #50-70376-001 Rev. C
8-18
Section 8
Using TROY Fonts
TROY OCR-B
(continued)
NOTE: This OCR font must be used at the designated point size to ensure optical readability.
Size I – must use 10-point size (upper and lower case characters can be used)
Size III – (not supported)
Size IV – must use 16-point size (upper and lower case characters can be used)
Security Printing Solutions User’s Guide -- Document #50-70376-001 Rev. C
8-19
Section 8
TROY UPC-A
Barcode
Using TROY Fonts
<Esc>(8Y<Esc>(s1pvØsØb246ØØT
Security Printing Solutions User’s Guide -- Document #50-70376-001 Rev. C
= desired height
8-20
Section 8
TROY UPC-E
Barcode
Using TROY Fonts
<Esc>(8Y<Esc>(s1pvØsØb2461ØT
Security Printing Solutions User’s Guide -- Document #50-70376-001 Rev. C
= desired height
8-21
Section 8
TROY EAN-8
Barcode
Using TROY Fonts
<Esc>(8Y<Esc>(s1pvØsØb2462ØT
Security Printing Solutions User’s Guide -- Document #50-70376-001 Rev. C
= desired height
8-22
Section 8
TROY EAN-13
Barcode
Using TROY Fonts
<Esc>(8Y<Esc>(s1pvØsØb2463ØT
Security Printing Solutions User’s Guide -- Document #50-70376-001 Rev. C
= desired height
8-23
Section 8
TROY BC25
Barcode
Using TROY Fonts
<Esc>(4Y<Esc>(s1pvØsØb2464ØT
Security Printing Solutions User’s Guide -- Document #50-70376-001 Rev. C
= desired height
8-24
Section 8
TROY BC39
Barcode
Using TROY Fonts
<Esc>(ØY<Esc>(s1pvØsØb2467ØT
Security Printing Solutions User’s Guide -- Document #50-70376-001 Rev. C
= desired height
8-25
Section 8
TROY BC128
Barcode
Using TROY Fonts
<Esc>(ØY<Esc>(s1pvØsØb247ØØT
Security Printing Solutions User’s Guide -- Document #50-70376-001 Rev. C
= desired height
8-26
Section 8
TROY
POSTNET
Using TROY Fonts
<Esc>(15Y<Esc>(s1pvØsØb2477ØT
Security Printing Solutions User’s Guide -- Document #50-70376-001 Rev. C
= desired height
8-27
Section 8
TROY
POSTNET
Reverse
(optional)
Using TROY Fonts
<Esc>(15Y<Esc>(s1pvØs33b2477ØT
Security Printing Solutions User’s Guide -- Document #50-70376-001 Rev. C
= desired height
8-28
Section 8
Using TROY Fonts
International
Convenience
Amount
Fonts
In addition to the CMC-7 font used for International MICR applications, TROY provides the following
Convenience Amount font sets in a variety of languages (see examples below). These fonts are provided only on
the TROY Security Printing Solutions CD. These fonts can be easily downloaded into the printer’s flash-file
system using the TROY Printer Utility.
The following TROY International fonts are non-scalable (fixed in size) and can be used in the convenience
amount field of the check. The escape sequence used to call each font set in a non-Windows environment is
provided directly above each example. The examples below may not be to scale.
British Large Convenience Amount Font (Troy LCF British)
<Esc>(1Q<Esc>(sØp5.14h16.Ø9vØsØb1T
French Large Convenience Amount Font (Troy LCF French)
<Esc>(1Q<Esc>(sØp5.14h16.Ø9vØsØb2T
Italian Large Convenience Amount Font (Troy LCF Italian)
<Esc>(1Q<Esc>(sØp5.14h16.Ø9vØsØb3T
Spanish Large Convenience Amount Font (Troy LCF Spanish)
<Esc>(1Q<Esc>(sØp5.14h16.Ø9vØsØb4T
Security Printing Solutions User’s Guide -- Document #50-70376-001 Rev. C
8-29
Section 8
International
Convenience
Amount
Fonts (cont.)
Using TROY Fonts
British Small Convenience Amount Font (Troy SCF British)
<Esc>(2Q<Esc>(sØp6h22.68vØsØb1T
French Small Convenience Amount Font (Troy SCF French)
<Esc>(2Q<Esc>(sØp6h22.68vØsØb2T
Italian Small Convenience Amount Font (Troy SCF Italian)
<Esc>(2Q<Esc>(sØp6h22.68vØsØb3T
Spanish Small Convenience Amount Font (Troy SCF Spanish)
<Esc>(2Q<Esc>(sØp6h22.68vØsØb4T
Security Printing Solutions User’s Guide -- Document #50-70376-001 Rev. C
8-30
Section 9
Troubleshooting by
Symptom
Troubleshooting / Error Messages
The following troubleshooting table provides solutions to the most common MICR printing problems. Some of
the messages may not apply to your TROY Security Printing Solution. Visually inspect your MICR documents
using the TROY MICR Document Template where appropriate.
NOTE: This table does not cover all of the ANSI and banking specifications that MICR-encoded documents must
meet. Refer to the TROY MICR Basics Handbook for more information on MICR specifications and check design.
Condition
Possible Cause
Solution
Incorrect data in MICR line (account
#, bank #, etc.).
Error typing in the account #, etc.
Re-enter the correct data.
Incorrect format of fields in MICR line
(according to your bank’s
specifications).
Error typing in the field information.
Re-enter the correct data. Ask your
bank for its specification sheet or copy
the field format from your old checks,
including any spaces.
Vertical streaking or smearing
throughout document.
Problem with TROY MICR printer or
toner cartridge.
Refer to the troubleshooting section in
the printer user’s manual.
Horizontal streaking in MICR clear
band during document processing.
Problem with the reader/sorter
machine.
The reader/sorter machine must be
cleaned and checked or adjusted.
Security Printing Solutions User’s Guide -- Document #50-70376-001 Rev. C
9-1
Section 9
Troubleshooting by
Symptom
(cont.)
Troubleshooting / Error Messages
600 dpi MICR font not used in MICR
line (an incorrect font such as Courier
or Times Roman was used instead).
MICR clear band has magnetically
chargeable printing besides the MICR
line on front or backside of document.
No MICR font installed.
Install the MICR system DIMM and
reprint.
MICR mode disabled and an attempt
was made to use a TROY MICR font.
Consult your software dealer.
Software error.
Enable MICR mode by issuing the
appropriate escape sequence via your
check writing software.
MICR font requested orientation
(portrait or landscape) not installed in
the printer.
Install the correct orientation of MICR
font via system DIMM.
Non-TROY MICR font was used.
Use the TROY MICR font or consult
the non-TROY MICR font
manufacturer for assistance.
Font escape sequence coding error.
Verify the escape sequence accuracy.
Border, signature, or other printing
extends into MICR clear band on front
or back.
Reformat your document design to
ensure nothing besides the MICR line
appears in the MICR clear band.
Laser-printed items extend into MICR
clear band on backside of the check.
Reformat your document design or
other laser-printed items so that there
is no MICR information on the check.
Security Printing Solutions User’s Guide -- Document #50-70376-001 Rev. C
9-2
Section 9
Troubleshooting by
Symptom
(cont.)
Troubleshooting / Error Messages
MICR clear band has extra printing
(such as toner splatter) besides the
MICR line on front or backside of
document.
MICR line is skewed on document.
Printer density setting is too dark.
Use TROY MICR defaults.
Printer fusing unit is contaminated.
Refer to printer user’s manual for
cleaning instructions.
Faulty MICR toner cartridge.
Try another TROY MICR toner
cartridge. If cartridge is faulty, return
to the dealer.
Use on Non-TROY MICR toner
cartridge.
Try another TROY MICR toner
cartridge or consult the non-TROY
manufacturer for assistance.
Your MICR paper was cut or
perforated inaccurately (lower edge of
paper is not perpendicular to the right
and left edges of paper).
Measure your MICR paper and/or
perforation lines to ensure your MICRencoded documents fall within ANSI
specifications for document size. Ask
your paper vendor for correctly sized
MICR paper.
Your MICR paper has changed
properties due to environmental
conditions in storage or handling.
Measure your MICR paper and/or
perforation lines to ensure your MICRencoded documents fall within ANSI
specifications for document size.
Paper incorrectly loaded.
If using MP tray, paper width guide
should lightly touch right side of paper
stack.
Faulty paper transport system in
printer.
Try non-MICR paper to verify the
problem. Contact TROY Technical
Support if problem is verified on nonMICR paper.
Security Printing Solutions User’s Guide -- Document #50-70376-001 Rev. C
9-3
Section 9
Troubleshooting by
Symptom
(cont.)
Troubleshooting / Error Messages
MICR line not positioned correctly on
the document (vertically and
horizontally).
Your MICR paper was cut or
perforated inaccurately (paper is too
short/long or narrow/wide).
Measure your MICR paper and/or
perforation lines to ensure your MICRencoded documents fall within ANSI
specifications for document size. Ask
your paper vendor for correctly sized
MICR paper.
Software registration error (software
is positioning data incorrectly on the
printed page).
Use the TROY ExPT feature to adjust
the positioning of the MICR line on
your printed checks. Individual TROY
printers may vary enough to require a
one-time adjustment of registration via
the ExPT feature or your software
program.
Printer registration discrepancies
(small inconsistencies in positioning
of the image on the printed page)
Small errors in the printer’s registration
can change the position of the MICR
line, which is most noticeable on the
trailing edge of the printed page. If the
MICR line on your checks is positioned
on trailing edge of the page (the edge
of the page that exits the printer last),
try using the TROY printer’s AutoRotate feature to place the MICR line
on the leading edge of the page to
avoid any small registration errors that
would significantly change the position
of the MICR on your printed checks.
Faulty paper transport system in
printer.
Measure your MICR paper. If cut to
correct size, consult your software
vendor for assistance.
Try non-MICR paper to verify the
problem. Consult the printer user’s
manual or TROY Technical support if
problem is verified on non-MICR
paper.
Security Printing Solutions User’s Guide -- Document #50-70376-001 Rev. C
9-4
Section 9
Troubleshooting by
Symptom
(cont.)
Troubleshooting / Error Messages
MICR characters are too thick or too
thin.
Printer density setting is too dark or
too light.
Use TROY MICR defaults.
Your MICR toner cartridge is nearly
empty.
TROY MICR toner cartridge should not
be used if a LOW TONER message
appears on the printer control panel
display. (There should be no visual
fading across the document).
Your MICR paper is out of
specification so that toner does not
adhere properly to the paper.
Refer to TROY MICR paper
specifications elsewhere in this guide
and consult your paper vendor to
ensure you have the correct paper
(including correctly preprinted
background areas). Also, check to
ensure your paper has not altered due
to environmental conditions during
storage and handling.
Faulty MICR toner cartridge.
Try another TROY MICR toner
cartridge. If the cartridge is faulty,
return to dealer.
Use of Non-TROY MICR toner or font.
Try TROY MICR toner or font or
consult non-TROY manufacturer for
assistance.
Security Printing Solutions User’s Guide -- Document #50-70376-001 Rev. C
9-5
Section 9
Troubleshooting by
Symptom
(cont.)
Troubleshooting / Error Messages
MICR characters are broken, there
are voids in characters or toner rubs
off.
Your MICR paper is out of
specification so that toner does not
adhere properly to the paper.
Refer to the TROY MICR paper
specifications and consult your paper
vendor to ensure you have the correct
paper (including correctly preprinted
background areas). Also, check to
ensure your paper has not altered due
to environmental conditions during
storage and handling.
Faulty MICR toner cartridge.
Try another TROY MICR toner
cartridge. If cartridge is faulty, return
to dealer.
Use of Non-TROY MICR toner
cartridge.
Try TROY MICR toner cartridge or
consult non-TROY manufacturer for
assistance.
Printer fusing unit is faulty.
Confirm by verifying with a non-MICR
application. Contact TROY Technical
Support for instructions.
Voids in characters in MICR line or
other text.
Transfer roller wear (check for page
count of greater than 100,000).
Replace transfer roller.
MICR character spacing and
positioning is not correct.
Error in typing MICR line information.
Re-enter correct data. (Do not forget
to enter the correct number of spaces
where required.) If using TROY MICR
fonts in Windows, ensure the point size
is set to 12 pt.
Software placement of characters is
incorrect.
Consult your software dealer.
Security Printing Solutions User’s Guide -- Document #50-70376-001 Rev. C
9-6
Section 9
Troubleshooting by
Symptom
(cont.)
Troubleshooting / Error Messages
Your bank reports a high reject rate
when processing your TROY MICRprinted documents.
A Non-TROY MICR toner was used.
Print test documents using TROY
MICR toner or consult the non-TROY
manufacturer for assistance.
NOTE: This section covers conditions
not addressed above. You should
also investigate all of the items
described above as possible causes
of bank rejects as well as the other
ANSI MICR specifications not
covered in this table.
The bank-of-deposit made a typing or
imprinting error when they encoded
the check AMOUNT onto the right
end of the MICR line.
Ask your bank or one of the document
testing facilities in the list following this
table to determine if the MICR line
error is in the TROY MICR-printed
portion of the bank-encoded portion
(many errors are bank induced).
Your MICR paper is out of
specification so that your documents
tend to jam or tear inside bank
processing equipment.
Observe the condition of your
processed checks. Refer to this guide
for information on TROY and ANSI
MICR paper specifications. Your
paper vendor or bank may also provide
assistance.
Documents were folded, spindled, or
otherwise roughly handled before
they reached the bank-of-deposit.
Consider sturdier MICR paper or
improved check-handling processes
with your regular recipients.
Your bank’s reader/sorter equipment
is out of adjustment.
Ask your bank for assistance in
determining the cause of your rejects.
Security Printing Solutions User’s Guide -- Document #50-70376-001 Rev. C
9-7
Section 9
Troubleshooting by
Symptom
(cont.)
Troubleshooting / Error Messages
MICR characters appear smeared
after processing by a bank.
NO MICR TONER message displayed in
the printer control panel.
A Non-TROY MICR toner was used.
Print test documents using TROY
MICR toner or consult the non-TROY
manufacturer for assistance.
Your MICR paper is out of
specification so that toner does not
adhere properly to the paper.
Refer to TROY MICR paper
specifications and consult your paper
vendor to ensure you have the correct
paper (including correctly preprinted
background areas). Also, check to
ensure your paper has not altered due
to environmental conditions before
printing the checks.
Your bank’s reader/sorter equipment
is out of adjustment.
Ask your bank for assistance in
determining the cause of your rejects.
No TROY MICR toner cartridge
installed.
Install a TROY MICR toner cartridge.
Detect device on TROY MICR toner
cartridge is damaged.
Install a new TROY MICR toner
cartridge.
TROY MICR toner cartridge detect
sensor failed.
Call TROY Technical Support.
TROY MICR DIMM has failed.
Call TROY Technical Support.
Security Printing Solutions User’s Guide -- Document #50-70376-001 Rev. C
9-8
Section 9
Troubleshooting by
Symptom
(cont.)
Troubleshooting / Error Messages
Printer does not respond to a MICR
print request after the administrator
password is entered.
Invalid administrator password was
entered.
Enter the correct administrator
password.
NOTE: If the administrator password
has been lost or forgotten, perform the
following three steps:
1. Print a configuration page using
the printer control panel or TROY
Printer Utility.
2. Do not continue to print MICR
jobs.
3. Call TROY Technical Support for
assistance.
Security Printing Solutions User’s Guide -- Document #50-70376-001 Rev. C
9-9
Section 9
Troubleshooting / Error Messages
Troubleshooting by
Printer
Control Panel
Display
Message
The following table contains the printer control panel display messages generated by TROY Security Printing
Solutions. Some of the messages may not apply to your TROY Security Printing Solution. Refer to the HewlettPackard Printer User’s Manual for other display panel messages.
Message
Description
Action
MICR PRINTER / MICR IS
DISABLED
The printer has returned to non-MICR
mode.
N/A
MICR PRINTER / MICR IS
ENABLED
The printer has entered MICR mode.
N/A
NOT LOGGED IN
An invalid password was entered.
Enter correct password.
PCL PASSWORD
An invalid password was entered.
Enter correct password.
When in MICR mode, the MICR sensor
has determined that no MICR toner
cartridge has been installed.
Install a TROY MICR toner cartridge. You
must return to the MICR language through
your application software.
LOW TONER
The TROY MICR toner cartridge is low on
toner.
Replace the TROY MICR toner cartridge
with a new TROY MICR toner cartridge.
Do not re-install the old cartridge.
ACCESS DENIED
Indicates that the printer manager has
engaged the Control Panel Lock feature.
See your printer administrator if you feel
you must change Control Panel settings.
INSUFFICIENT
AUTHORIZATION. JOB
PURGED.
User attempted to perform an
administrator-level function but was not
logged in as administrator
Correct login name and password in the
file, and resubmit the file to the printer.
INSUFFICIENT MEMORY
TO SORT
The printer does not have enough free
memory to sort the audit records because
too many audit records are stored in the
printer memory.
Delete unwanted audit records, or print the
audit report without sorting (set the sort
order to the default setting of Print Order).
Add more memory (RAM) to the printer.
USER LOGIN COMMAND
FAILED. JOB PURGED.
User attempted to log in with a login name
that was unknown to the printer.
Correct login name and password in the
file, and resubmit the file to the printer.
IN CHANGE MODE. USER
LOGIN COMMAND
IGNORED.
The printer was in the middle of a user
name or password change when the
printer received a job attempting to log in.
Complete the changes to user names and
passwords, and then resubmit the job.
PRESS GO
NO MICR TONER
PRESS GO
MENUS LOCKED
Security Printing Solutions User’s Guide -- Document #50-70376-001 Rev. C
9-10
Section 9
Troubleshooting by
Printer
Control Panel
Display
Message
(cont.)
Troubleshooting / Error Messages
IN CHANGE MODE. USER
LIST COMMAND IGNORED.
The printer was in the middle of a user
name or password change when the
printer received a job attempting to print
the user list.
Complete the changes to user names and
passwords, and then resubmit the job.
IN CHANGE MODE.
SECURITY STATE
COMMAND IGNORED.
The printer was in the middle of a user
name or password change when the
printer received a job attempting to
change the security state of the printer.
Complete the changes to user names and
passwords, and then resubmit the job.
BAD USERNAME. ADD
USER COMMAND
IGNORED.
While attempting to add a user name the
syntax of the user name provided was
invalid.
Resubmit the add user name job with the
proper syntax.
BAD PASSWORD. ADD
USER COMMAND
IGNORED.
While attempting to add a user password
the syntax of the password provided was
invalid.
Resubmit the add user password job with
the proper syntax.
AT MAX USERS. ADD
USER COMMAND
IGNORED.
Trying to add more users to a printer than
the printer can store.
Delete an unwanted user from the printer,
and then resubmit the add user job.
ERROR. ADD USER
COMMAND IGNORED.
Some other error occurred while trying to
add a user to the printer.
Check the job for proper syntax. Delete all
users and add them again. If the problem
persists, call TROY for technical support.
NOT CHANGE MODE. ADD
USER COMMAND
IGNORED.
A job was received that attempted to add
a user without being in the change mode.
Include a change mode command pair in
the job and resubmit it to the printer.
NO SUCH USER. DELETE
USER COMMAND
IGNORED
Trying to delete a user that does not exist
in the printer.
Specify a valid user name and resubmit
the job to the printer.
BAD USERNAME. DELETE
USER COMMAND
IGNORED.
While attempting to delete a user name
the syntax of the user name provided was
invalid.
Resubmit the add user name job with the
proper syntax.
PERMANENT USER.
DELETE USER COMMAND
IGNORED.
The user attempted to delete an
administrator user, which is not allowed.
You cannot delete the administrator
password.
Security Printing Solutions User’s Guide -- Document #50-70376-001 Rev. C
9-11
Section 9
Troubleshooting by
Printer
Control Panel
Display
Message
(cont.)
Troubleshooting / Error Messages
ERROR. DELETE USER
COMMAND IGNORED.
Some other error occurred while trying to
delete a user to the printer.
Check the job for proper syntax. Delete all
users and add them again. If the problem
persists, call TROY for technical support.
NOT CHANGE MODE.
DELETE USER COMMAND
IGNORED.
A job was received that attempted to
delete a user without being in the change
mode.
Include a change mode command pair in
the job, and then resubmit it to the printer.
INSUFFICIENT
AUTHORIZATION. JOB
PURGED.
Trying to change a user password for a
user that does not exist in the printer.
Specify a valid user name, and then
resubmit the job to the printer.
USER LOGIN COMMAND
FAILED. JOB PURGED.
While attempting to change a user
password the syntax of the user name
provided was invalid.
Resubmit the change user password job
with the proper syntax.
NO SUCH USER. CHANGE
USER COMMAND
IGNORED
While attempting to change a user
password the syntax of the password
provided was invalid.
Resubmit the change user password job
with the proper syntax.
BAD USERNAME.
CHANGE USER COMMAND
IGNORED.
Some other error occurred while trying to
change a user password in the printer.
Check the job for proper syntax. Delete all
users and add them again. If the problem
persists, call TROY for technical support.
BAD PASSWORD.
CHANGE USER COMMAND
IGNORED.
A job was received that attempted to
change a user password without being in
the change mode.
Include a change mode command pair in
the job, and then resubmit it to the printer.
ERROR. CHANGE USER
COMMAND IGNORED.
A job was received that attempted to
delete all users without being in the
change mode.
Include a change mode command pair in
the job, and then resubmit it to the printer.
NOT CHANGE MODE.
CHANGE USER
PASSWORD COMMAND
IGNORED.
The audit file is full.
Cycle power, print any audit data you
require, and then delete the audit data.
You will need to restart printing your job at
the point at which the audit file became full.
NOT CHANGE MODE.
DELETE ALL COMMAND
IGNORED
A fatal error has occurred in reading or
writing data to the audit file system.
Cycle power and try again. If the problem
persists, contact TROY Technical Support.
Security Printing Solutions User’s Guide -- Document #50-70376-001 Rev. C
9-12
Section 9
Troubleshooting by
Printer
Control Panel
Display
Message
(cont.)
Troubleshooting / Error Messages
AUDIT FILE FULL. CYCLE
POWER NOW.
There was not enough memory in the
printer to sort the audit data.
Add more memory to the printer, or change
the sort type to Record Number and print
the audit report using this sort key. If the
problem continues, power cycle the printer
and try the audit again. If this does not
resolve the problem, contact TROY
Technical Support.
AUDIT FILE SYSTEM
FAILURE. CYCLE POWER
NOW.
Trying to change a user password for a
user that does not exist in the printer.
Specify a valid user name and resubmit
the job to the printer.
FONT STORE ERROR
An error occurred while trying to store a
downloaded font. The actual error is
shown in the second line of the message.
The second line error message can
appear as part of various different error
messages, and can be found separately
in this message list.
Find the actual error in this message list
and perform the suggested action for that
error.
An error occurred while trying to save a
downloaded macro. The actual error is
shown in the second line of the message.
The second line error message can
appear as part of various different error
messages, and can be found separately
in this message list.
Find the actual error in this message list
and perform the suggested action for that
error.
The TROY firmware contains advanced
internal self-diagnostics checks to ensure
constant data integrity. When the
firmware detects an exception condition
that may result in compromised data
integrity, it halts printer operation. This
message will be followed automatically
with diagnostic information that may
assist TROY engineers in evaluating the
exception condition.
Contact TROY Technical Support.
XXXXXXXXXXXXXXX
MACRO SAVE ERROR
XXXXXXXXXXXXXXX
TROY INTERNAL
RELIANCE MONITOR
Security Printing Solutions User’s Guide -- Document #50-70376-001 Rev. C
9-13
Section 9
Troubleshooting by
Printer
Control Panel
Display
Message
(cont.)
Troubleshooting / Error Messages
FIRMWARE FILE CRC
ERROR
Following the downloading of a new
TROY firmware image, the existing TROY
firmware confirms the validity check upon
the received image before performing the
actual firmware update. This error
message indicates that the image failed
this validity check and that the existing
firmware will not be replaced by the new
(invalid) firmware. This problem usually
occurs as the result of communication
errors between the host computer and the
printer.
Try performing the firmware update again.
If the firmware update fails on the second
attempt, contact TROY Technical Support.
FW UPDATE FAIL!
An error in the Troy firmware update
process has been detected. This error is
usually the result of a communication
error between the host computer and the
printer during the TROY firmware image
transfer.
Try performing the firmware update again.
If the firmware update fails on the second
attempt, contact TROY Technical Support.
XXXXXXXXXXXXX
IMAGE BLOCK ####
OFFSET #######
XXXXXXXXXXXXXXXX is the actual error
that occurred. The two ### fields provide
information that may assist TROY
Technical Support in analyzing the error.
In almost all cases, the error will be
detected before the existing Troy firmware
has started to be replaced by the new
TROY firmware. As a result, the printer
can be power-cycled, and it will continue to
operate using the existing TROY firmware.
FILE NOT FOUND
An expected data file was not found.
Verify the path to the update file is correct,
and then try the operation again. If the
error persists, contact TROY Technical
Support.
DEVICE IS FULL
There is no more room on the printer’s
internal storage device to complete the
operation.
Delete any files, macros, fonts, etc. that
are no longer needed from the printer’s
internal storage in order to reclaim memory
space.
END OF FILE
The end of a data file was encountered
before it was expected.
Try the operation again. If the error
persists, contact TROY Technical Support.
Security Printing Solutions User’s Guide -- Document #50-70376-001 Rev. C
9-14
Section 9
Troubleshooting by
Printer
Control Panel
Display
Message
(cont.)
Troubleshooting / Error Messages
ACCESS DENIED
An attempt was made to access a data
file that the Troy firmware was not
permitted to access. This error should not
occur under normal printer operation
unless the data files on the printer are
being simultaneously accessed by a host
computer via a network file accessing
connection, such as NFS.
If the error persists, contact TROY
Technical Support.
49.4C18 SERVICE ERROR
A firmware update has been uploaded to
the printer. This error message may
appear immediately after the update
process has been completed, indicating
that the printer has registered the new
firmware.
Re-initialize the printer (cycle printer
power), or perform a cold reset. Wait for
the initialization sequence to finish before
continuing to use the printer. The printer
must be re-initialized in order for the
firmware update to take effect.
53.ØX.1Ø ERROR
Your printer detected the presence of a
second system DIMM.
Remove the DIMMs one at a time until the
message is cleared, or contact your
authorized TROY service representative.
61.X SERVICE
Indicates that the TROY MICR DIMM is
improperly installed or has failed.
Re-install the TROY DIMM.
A firmware update has been uploaded to
the printer. This error message may
appear immediately after the update
process has been completed, indicating
that the printer has registered the new
firmware.
Re-initialize the printer (cycle printer
power), or perform a cold reset. Wait for
the initialization sequence to finish before
continuing to use the printer. The printer
must be re-initialized in order for the
firmware update to take effect.
62.X ERROR
68.1 ERROR
Security Printing Solutions User’s Guide -- Document #50-70376-001 Rev. C
9-15
Download PDF
Similar pages