IDTECH iMag User Manual

IDTECH iMag User Manual

Hide thumbs Also See for iMag:

Advertisement

iMag, iMag Pro (II)
User Manual
80097503-001-Rev. F
26 September 2019
ID TECH
10721 Walker Street, Cypress, CA 90630-4720
Tel: (714) 761-6368 Fax (714) 761-8880
www.idtechproducts.com support@idtechproducts.com

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the iMag and is the answer not in the manual?

Questions and answers

Summary of Contents for IDTECH iMag

  • Page 1 Pro (II) User Manual 80097503-001-Rev. F 26 September 2019 ID TECH 10721 Walker Street, Cypress, CA 90630-4720 Tel: (714) 761-6368 Fax (714) 761-8880 www.idtechproducts.com support@idtechproducts.com...
  • Page 2 Pro (II) User Manual Copyright© 2019, International Technologies and Systems Corporation. All rights reserved. ID TECH 10721 Walker Street Cypress, CA 90630 (714) 761-6368 www.idtechproducts.com This document, as well as the hardware and software it describes, is furnished under license and may only be used in accordance with the terms of such license.
  • Page 3 Pro (II) User Manual FCC Regulatory Compliance Notices Class B Equipment This equipment has been tested and found to comply with the limits for a Class B digital device pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation.
  • Page 4: Table Of Contents

    4.4.1. EncryptionID ..........................................7 4.4.2. Read SecurityLevel ID ......................................8 4.4.3. Get Firmware Version ......................................8 .................................. 9 5.1. iMag/ iMag Pro(II) Unencrypted Data Output Format ....................9 ..................... 9 6. DECRYPTION EXAMPLE ................................12 6.1. Decrypted Data ................................... 14 .............................
  • Page 5: Introduction

    Pro (II) User Manual 1. Introduction ID TECH iMag is a snap-on, magnetic stripe reader designed to work with iPhone and iPod Touch. The iMag Pro works with all Apple mobile devices including the iPad. The reader delivers a superior reading performance because of its ability to encrypt sensitive card data.
  • Page 6: Setting Command

    The Get Firmware Version command returns the firmware version back to the application. Command: <STX><R><FmVerID><ETX><LRC 1> Response: <ACK> <STX><Version String><ETX><LRC 2> <Version String> is in the format of “ID TECH iMag Swipe Reader x.y.z” where x.y.z is the major and minor version number. Page | 6...
  • Page 7: Get Setting

    Pro (II) User Manual 4.3. Get Setting The Get Setting command retrieves the reader’s current settings. Command: <STX> <R> <ReviewID> <ETX> <LRC 1> Response: <ACK> <STX> <FuncID> <Len> <FuncData> <ETX> <LRC 2> <FuncID>, <Len>, and <FuncData> retrieves the reader’s current settings.
  • Page 8: Read Securitylevel Id

    Pro (II) User Manual OUT: 06 02 4C 01 31 03 7D Set AES: CMD: 02 53 4C 01 32 03 2D OUT: 06 Read EncryptionID: CMD: 02 52 4C 03 1F OUT: 06 02 4C 01 32 03 7E 4.4.2.
  • Page 9: Imag/ Imag Pro(Ii) Unencrypted Data Output Format

    A designated character that comes at the end of the last track of data, to separate card reads. The default character is CR (Carriage Return). Example: %B4352378366824999^TFSTEST /THIRTYONE^05102011000088200882000000?;4352378366824999=05102011000088 iMag/ iMag Pro uses ID TECH’s enhanced data encryption format where all data tracks are encrypted. Output Format: <STX><LenL><LenH><Card Data><CheckLRC><CheckSum><ETX> Data Length low byte Data Length high byte...
  • Page 10 Pro (II) User Manual level 4 only, not used here) T1 hashed (20 bytes each) (if encrypted and hash tk1 allowed) T2 hashed (20 bytes each) (if encrypted and hash tk2 allowed) T3 hashed (20 bytes each) (if...
  • Page 11 Pro (II) User Manual Field 8 (clear/mask data sent status) and Field 9 (encrypted/hash data sent status) is sent out in enhanced encryption format, the default of iMag/ iMag Pro output format. Field 8: Clear/masked data sent status byte:...
  • Page 12: Decryption Example

    Pro (II) User Manual 6. Decryption Example The key for all examples is 0123456789ABCDEFFEDCBA9876543210. The following is an example of a decrypted three-track ABA card using enhanced encryption format (recognizable due high bit of the fourth byte underlined 80):...
  • Page 13 Pro (II) User Manual Track 1 Data masked (length 0x48): 252A343236362A2A2A2A2A2A2A2A393939395E42555348204A522F47454F5247452\05 72E4D525E2A2A2A2A2A2A2A2A2A2A2A2A2A2A2A2A2A2A2A2A2A2A2A2A2 A2A2A2A2A2A2A3F2A Track 1masked data in ASCII: %*4266********9999^BUSH JR/GEORGE W.MR^*******************************?* Track 2 data in hex masked (length 0x23): 3B343236362A2A2A2A2A2A2A2A393939393D2A2A2A2A2A2A2A2A2A2A2A2A2 A2A2A3F2A Track 2 Masked data in ASCII: ;4266********9999=***************?*...
  • Page 14: Decrypted Data

    Pro (II) User Manual LCR, check sum, and ETX 06E203 Clear/Masked Data in ASCII: Track 1: %*4266********9999^BUSH JR/GEORGE W.MR^*******************************?* Track 2: ;4266********9999=***************?* Key Value: 1A 99 4C 3E 09 D9 AC EF 3E A9 BD 43 81 EF A3 34...
  • Page 15 Pro (II) User Manual Page | 15...

This manual is also suitable for:

Imag pro iiiImag pro

Table of Contents