Appendix B Examples; Command Examples - Magtek eDynamo Programmer's Manual

Secure card reader authenticator
Table of Contents

Advertisement

Appendix B - Examples
Appendix B
Examples
This section includes direct command examples and information about using demonstration software. In
addition to the examples here, source code with detailed comments is included with the demo software
and can be used as a guide for custom software development.
The book USB Complete by Jan Axelson is also a good guide for software developers, especially the
chapter "Human Interface Devices: Host Applications."
B.1

Command Examples

This section provides examples of command sequences and cryptographic operations. Each example
shows a sequence as it actually runs, so developers of custom software can check their code against the
examples step-by-step to make sure the software is parsing and computing values correctly.
eDynamo| Secure Card Reader Authenticator | Programmer's Manual (COMMANDS)
Page 188 of 245 (D998200115-17)

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the eDynamo and is the answer not in the manual?

Questions and answers

Subscribe to Our Youtube Channel

Table of Contents