For use with hewlett-packard laserjet 4014, 4015, and 4515 series printers (58 pages)
Summary of Contents for TROY Group MICR 3005
Page 1
Security Printing Solutions User’s Guide (For use with TROY MICR / IRD 3005 Security Printing Solutions) This User’s Guide is for TROY Security Printing Solutions Printer users only. If you purchased a TROY Font Memory Card Kit, please refer to the TROY Font Memory Card Kit User’s Guide provided on the TROY Security Printing Solutions CD.
Page 2
Information and descriptions contained herein are the property of TROY Group, Inc. Such information and descriptions may not be copied, disseminated, or distributed without the express written consent of TROY Group, Inc. This publication is subject to change without notice.
Page 3
Table of Contents Preface This manual is designed and formatted for use as an online document (viewed on your computer screen). The document can also be printed; however, it is recommended that you print only the pages applicable to your security printing solution.
Table of Contents Section 1 – Features Overview Introduction ............................1-1 How to Use This Manual........................1-3 Features Summary ..........................1-4 Section 2 – Understanding TROY’s Features Introduction ............................2-1 Default and Temporary Printer Settings .....................2-1 Printer Security States ...........................2-2 MICR Mode .............................2-3 User Login Status ..........................2-4 Keylock Switch..........................2-4 Softlock Settings..........................2-4 MICR Toner Cartridge Sensing.....................2-4...
Page 5
Table of Contents Secure Seal Technology.........................2-17 Encryption / Decryption........................2-18 Audit Reports..........................2-19 TROY Security Fonts........................2-21 Firmware Update Capability......................2-22 Exact Positioning Technology ......................2-22 Auto-Rotate Feature........................2-23 Paper Tray Mapping........................2-23 Replaceable Escape Character.....................2-24 Language Support .........................2-24 Decryption Mode ...........................2-24 Hardware-Based Security Features ....................2-25 Printer Keylock..........................2-25 Paper Tray Locks ..........................2-26 Paper Tray Security Cover......................2-26 Section 3 –...
Page 6
Table of Contents Assigning User Names and Passwords ..................4-7 Selecting Security Options ......................4-10 Re-Mapping Printer Paper Trays....................4-13 Setting Regional Options ......................4-14 Selecting Data Capture Fonts for Audit Reports and TROYmark™ ........4-15 Identifying Your Installed Printer Driver Type .................4-16 Generating the TROYmark™ Background Pattern..............4-17 Implementing the Secure Seal Feature..................4-19 Using the Pattern Processor ........................4-22 Printing the Pattern Processor Report ..................4-23...
Page 7
Table of Contents Section 5 – Using the TROY Port Monitor Introduction ............................5-1 Installing the TROY Port Monitor .......................5-3 Accessing the TROY Port Monitor.......................5-3 Using the TROY Port Monitor......................5-5 Connection Tab..........................5-5 Encryption Tab..........................5-6 Security Tab .............................5-7 Section 6 – Using the Printer Control Panel Introduction ............................6-1 Security..............................6-1 Functionality ............................6-1...
Page 8
Table of Contents Using the Reverse Helvetica Font ....................7-2 Using the TROY AutoProtect Font....................7-3 Using the TROY Microprint Font ....................7-3 Using the POSTNET Font ......................7-3 Using the British Pound and Euro Symbols..................7-3 Using the Data Capture Fonts ......................7-4 Using Printer Fonts and Screen Fonts....................7-6 MICR Font Guidelines...........................7-7 Priority of Font Locations.......................7-7 Font Character Mapping ........................7-8...
Page 9
Table of Contents TROY EAN-13 Barcode........................7-23 TROY BC25 Barcode........................7-24 TROY BC39 Barcode........................7-25 TROY BC128 Barcode........................7-26 TROY POSTNET..........................7-27 TROY POSTNET Reverse (optional)..................7-28 International Convenience Amount Fonts ..................7-29 British Large Convenience Amount Font ...................7-29 French Large Convenience Amount Font...................7-29 Italian Large Convenience Amount Font..................7-29 Spanish Large Convenience Amount Font..................7-29 British Small Convenience Amount Font..................7-30 French Small Convenience Amount Font ...................7-30...
Section 1 Features Overview Introduction Thank you for purchasing your TROY Security Printing Solution. You have chosen the highest quality MICR (Magnetic Ink Character Recognition) printing solution available today that offers convenience, flexibility, security, and precision for printing high-quality MICR documents. This User’s Guide provides information for setting up and using your TROY Security Printing Solution.
Page 11
Section 1 Features Overview Introduction • TROY MICR Secure EX Printer – a Hewlett-Packard printer pre-configured with the TROY MICR (cont.) Secure Memory Card (described on the previous page), plus TROY’s MICR toner sensing system, a TROY MICR toner cartridge, a printer keylock switch, input paper tray locks, and also includes the TROYmark feature, AutoProtect font, and Secure Seal technology.
Section 1 Features Overview How to Use Before setting up your new TROY Security Printing Solution, it is recommended that you read the first three sections of this User’s Guide to familiarize yourself with the features available of your TROY Security Printing this Manual Solution, and to develop an implementation plan for setting up and managing your TROY printing environment.
Section 1 Features Overview Features The TROY features listed below allow you to customize the operation of your TROY Security Printing Solution, Summary adding flexibility, convenience, and security. Some of these features may not be available for your specific type of Security Printing Solution.
Page 14
Section 1 Features Overview Features Feature Description Access Product Summary Control Panel Allows only administrators to access the MICR features from the printer Control Panel 1, 2, 3 Password control panel by using a unique password (cont.) Data Encryption / Provides encryption of data sent over a public network to the MICR printer Port Monitor 1, 2...
Section 2 Understanding TROY’s Features Introduction TROY Security Printing Solutions offer many convenient features for managing and printing high-quality MICR documents in single or multi-user environments. This section provides detailed descriptions of the features built into the TROY Security Printing Solutions. For specific operating procedures and guidelines, refer to the appropriate sections of this guide for using the TROY Printer Utility, TROY Port Monitor, and printer control panel.
Section 2 Understanding TROY’s Features Printer To help maintain a secure MICR printing environment, TROY Security Printing Solutions have security features that, in combination, create security states. The interdependency of these security states ensures the integrity of Security the MICR printing security features, which can be enabled and/or configured to meet your specific security States requirements.
Section 2 Understanding TROY’s Features MICR Mode TROY Security Printing Solutions can be set to a default MICR mode of either to suit the ENABLED DISABLED security requirements of your MICR printing environment. MICR mode must be enabled to allow the printing of MICR checks and documents.
Section 2 Understanding TROY’s Features User Login Status If the administrator has implemented user names and passwords, a valid user name and password must be provided in the TROY Printer Utility or entered at the printer control panel before any of the printer’s secure resources can be accessed or a MICR print job can be printed.
Page 19
Section 2 Understanding TROY’s Features Pre-defined The following table describes the general pre-defined security states built into TROY Security Printing Solutions. Security States Φ TROY MICR / IRD Secure EX Printers Only Security Printing Solutions Feature Required Security State Required Security State (MICR Printers) (MICR Secure Printers) Print TROY E13-B MICR font...
Section 2 Understanding TROY’s Features Pre-defined Use Exact Positioning Technology feature to adjust the Valid administrator login Valid administrator login Security States MICR line position on your printed checks (cont.) Use the Auto-Rotate Feature Valid administrator login Valid administrator login Re-map the printer paper trays Valid administrator login Valid administrator login...
Section 2 Understanding TROY’s Features Standard In addition to the printing features provided in the Hewlett-Packard LaserJet printers, TROY Security Printing Solutions include additional functionality specifically designed for printing high-quality MICR documents. Printer These standard printer features are included in all TROY Security Printing Solutions and function automatically Features without user intervention.
Section 2 Understanding TROY’s Features MICR Mode With MICR mode disabled, the printer functions as a normal Hewlett-Packard LaserJet printer in standard PCL Disabled (Printer Control Language) mode with all MICR features disabled. In PCL mode, the TROY Security Printing Solutions provide the following features: •...
Section 2 Understanding TROY’s Features TROY MICR TROY printers use a MICR toner cartridge detection sensor designed to detect the presence of a TROY MICR Toner Cartridge toner cartridge installed in the printer. If MICR mode is enabled with the Softlock feature disabled (valid PIN Detection entered) and/or the printer keylock switch set to Print MICR, and a TROY MICR toner cartridge is not installed LOAD MICR TONER...
Section 2 Understanding TROY’s Features User- The user-selectable printer features allow you to customize the operation of your TROY Security Printing Selectable Solution, adding flexibility, convenience and security. The TROY Printer Utility is designed to assist the administrator with the configuration of the printer’s default MICR and security features (refer to Section 4 – Printer Using the TROY Printer Utility for detailed information).
Page 25
Section 2 Understanding TROY’s Features Printer Type and Printer Type Feature Description Security MICR Mode Level (cont.) The default MICR mode is DISABLED. The printer will always default to MICR High MICR Off disabled when powered ON. The printer will automatically reset to MICR disabled (timeout) at the end of each print job or after a set amount of time has elapsed after the print job has finished.
Page 26
Section 2 Understanding TROY’s Features Administrator TROY Security Printing Solutions use an administrator password to secure the printer features and settings. The Name and printer uses a permanent default user name (ADMIN) that cannot be deleted or modified; however, the Password administrator password can be modified using the TROY Printer Utility or the printer control panel.
Section 2 Understanding TROY’s Features User Names and The user names and passwords feature allows the administrator to set up to 20 user names and passwords (one Passwords administrator and 19 users) to prevent unauthorized access of the TROY Security Printing Solution’s secure resources and other security features.
Section 2 Understanding TROY’s Features Flash-File System TROY Security Printing Solutions contain a non-volatile flash-file system that can be used to store printing resources (company logos, forms, macros, etc.). TROY MICR Secure printers, MICR Secure EX printers, and MICR Secure Memory Card Kits have a flash-file system that is divided into a secure and public memory area. Digitized signatures, logos, and other proprietary printer resources are typically stored in the secure area of the flash-file system to prevent unauthorized access to these resources.
Section 2 Understanding TROY’s Features ™ TROYmark To discourage fraudulent alteration of the check, TROY MICR / IRD Secure EX printers (available as an option for TROY MICR Secure printers and TROY MICR Secure Memory Card Kits) can produce a background watermark (printed as a diagonally repeating pattern across the face of the check) using user-defined information taken directly from the check data (i.e., convenience amount, payee name, etc.).
Page 30
Section 2 Understanding TROY’s Features ™ TROYmark (cont.) ™ TROY EXAMPLE OF THE MARK BACKGROUND IMAGE INCORPORATED INTO A CHECK 2-16 Security Printing Solutions User’s Guide -- 50-70410-002 Rev. A...
Section 2 Understanding TROY’s Features Secure Seal Secure Seal technology prevents unauthorized alterations to your printed checks by incorporating encoded user- Technology selected check information (e.g., payee, amount, account #, bank #, date, transaction #, check #, etc.) into a seal (bit-mapped image) that is printed on the face of the check.
Section 2 Understanding TROY’s Features Encryption / TROY MICR Secure printers, MICR / IRD Secure EX printers, and the MICR Secure Memory Card Kits provide Decryption encryption algorithms to protect MICR documents and other documents containing sensitive or private information. Use this feature to prevent fraudulent interception of your MICR check data being sent over a public network.
Section 2 Understanding TROY’s Features Audit Reports Use this feature to record, store, and print a report of the check printing activity sent to your TROY printer. When enabled, the audit report feature automatically records the MICR line information (transit/routing number, bank number and check number) each time the TROY MICR font is accessed (default mode).
Page 34
Section 2 Understanding TROY’s Features Audit Reports The TROY Messaging font can also be used to insert data into the audit record that the user does not want to (cont.) actually print on the check (refer to Section 7 – Using TROY Fonts for detailed information).
Section 2 Understanding TROY’s Features TROY Security Your TROY Security Printing Solution includes a collection of high-quality MICR fonts (E13-B, CMC-7) and Fonts other security fonts programmed into the TROY firmware (memory card). See Section 7 – Using TROY Fonts for more information.
Section 2 Understanding TROY’s Features Firmware Update This feature allows administrators to easily upgrade the TROY Security Printing Solutions firmware (TROY’s Capability proprietary program code) as new features become available from TROY. The printer firmware update file is available from the TROY web site or may be supplied by TROY on removable media. After completing a firmware update, your TROY Security Printing Solutions printer must be rebooted (printer power cycled OFF and ON) in order for the update to take effect.
Section 2 Understanding TROY’s Features Auto-Rotate Due to minor variations in registration (the precise alignment of text and images on the printed page) that exists Feature with most printers, it is recommended that the MICR line on your checks be positioned to print on the leading edge of the printed page (the edge of the page that exits the printer first).
Section 2 Understanding TROY’s Features Replaceable When writing program code in a Windows environment, it is very difficult for an application programmer to Escape Character insert the ASCII escape character (ASCII character 27) into the PCL data stream. The ASCII escape character is required before each PCL command in the programmer’s command string in order to enable the printer features described in this user’s guide.
Section 2 Understanding TROY’s Features Hardware- To prevent the fraudulent use of your TROY Security Printing Solutions printer or printer resources, TROY has provided additional hardware-based security features to reduce the risk of unauthorized personnel using your Based TROY printer or accessing the check stock stored inside the printer paper tray. These features are standard on Security TROY Secure EX printers and are also available as options on TROY Secure printers.
Section 2 Understanding TROY’s Features Paper Tray Locks TROY MICR Secure EX printers (available as an option on TROY MICR and MICR Secure printers) have a lock installed on each of the paper trays to prevent unauthorized access to the blank check stock stored inside the printer.
Section 3 System Planning and Implementation Introduction Before setting up and installing your TROY Security Printing Solution, TROY highly recommends that you invest some time to plan the implementation and configuration of your security printing system. Some advance planning will save you time during the setup process and will help to optimize the day-to-day operation of your security printing system.
Page 42
Section 3 System Planning and Implementation Implementing Use the following steps to assist you with the planning and implementation of your TROY Security Printing Solution. After you have established an implementation plan, see the TROY Quick-Start Guide for information the TROY on installing the required TROY MICR printer drivers, security fonts, and software utilities.
Section 3 System Planning and Implementation Implementing Step 5: Determine who in the organization should have access to blank check paper, to printed checks, and to the TROY the software that prints checks. To avoid fraud, the number of personnel who have access to these items should be kept to a minimum.
Section 3 System Planning and Implementation Planning Print out the following pages, and use this worksheet as a quick reference guide to ensure that you have covered all the available options for implementing your TROY Security Printing Solution. Worksheet TROY MICR Secure Implementation Worksheet Select a system administrator –...
Page 45
Section 3 System Planning and Implementation Planning Determine who will have access rights to the TROY printer – consider assigning individual user names, Worksheet and passwords to enhance MICR printing security and to allow audit tracking for each assigned user. (cont.) User Name ____________________________________________ Password _______________________ User Name ____________________________________________ Password _______________________...
Page 46
Section 3 System Planning and Implementation Planning Worksheet Identify the workstation PCs that will be used to print checks – verify that these PCs are running Windows 98SE, NT 4.0, 2000, ME, or XP. Login security should be enabled on each PC. (cont.) PC Name _______________ Operating System _______ User Name _____________________________ PC Name _______________ Operating System _______ User Name _____________________________...
Section 4 Using the TROY Printer Utility Introduction The TROY Printer Utility is an easy-to-use Microsoft Windows-based utility designed to assist the administrator with the configuration and management of a TROY Security Printing Solution. The TROY Printer Utility allows the system administrator to perform the following functions: •...
Page 48
Section 4 Using the TROY Printer Utility Menu The user-friendly features of the TROY Printer Utility are conveniently grouped under four pull-down menus as Structure shown below. An arrow (>) next to the menu selection indicates that additional selections are available for that menu item.
Section 4 Using the TROY Printer Utility Basic Printer TROY P O ACCESS THE RINTER TILITY Utility 1. Click Microsoft TROY Printer Utility Operations Windows Start button, select File Settings Resources Help Programs, MICR by TROY, and then click on the TROY Select the printer to configure from the following list: Selected printer location (port): Printer Utility icon.
Page 50
Section 4 Using the TROY Printer Utility Basic Printer AVE AND RETRIEVE RINTER TILITY SETTINGS Utility Many of the TROY Printer Utility user-defined settings can be saved in a file for future reference or retrieved Operations from a previously saved file. The features that have the ability to be saved and retrieved will have a pull-down (cont.) menu within the feature screen of the TROY Printer Utility.
Section 4 Using the TROY Printer Utility Managing Your TROY Security Printing Solution provides many convenient features for managing MICR printer security in a single or multi-user environment. The TROY MICR Secure printer, MICR / IRD Secure EX printer, and System MICR Secure Memory Card Kit offer additional software and hardware-based security features designed to Security...
Page 52
Section 4 Using the TROY Printer Utility Setting the O SET OR MODIFY THE ADMINISTRATOR PASSWORD Administrator 1. From the Main Window, click on Settings, and Password (cont.) Names & Passwords then click on Names and Passwords. File Help 2. Click on ADMIN in the left-hand box and then ADMIN type in the desired password in the Password box.
Section 4 Using the TROY Printer Utility Assigning User Up to twenty user names and passwords (one administrator and 19 users) can be set up to prevent unauthorized Names and users from accessing the printer’s secure resources (digital images of signatures, logos, macros, MICR fonts, etc.) Passwords and other MICR features.
Page 54
Section 4 Using the TROY Printer Utility Assigning User To verify or review all user names and passwords setup by the administrator, the current printer-resident Names and password list can be printed out using the TROY Printer Utility. Print this list to ensure that all users have been Passwords (cont.) entered into the system or to verify that all past users have been deleted from the system.
Page 55
Section 4 Using the TROY Printer Utility Assigning User O SET OR MODIFY USER NAMES AND PASSWORDS Names and 1. From the Main Window, click on Settings, and then click on Names and Passwords. If you have a previous Passwords (cont.) name and password list saved on your computer (*.upl file), click on File, Open, click on the password list file name (the default folder is UserData), and then click on Open to retrieve the file.
Section 4 Using the TROY Printer Utility Selecting Security TROY Security Printing Solutions allow convenient enabling or disabling of the built-in security options to suit Options your MICR printing needs. After entering the current administrator’s (ADMIN) password in the TROY Printer Utility Main Window, the security options specific to your TROY Security Printing Solution can be individually enabled or disabled (refer to the table below for a summary of these features).
Page 57
Section 4 Using the TROY Printer Utility Selecting Security Toner Sensor – (default) stops all MICR print jobs. The printer control panel will display the message “LOAD Options (cont.) Response MICR TONER or six more continues will cancel job”. No MICR documents will print. –...
Page 58
Section 4 Using the TROY Printer Utility Selecting Security O ENABLE DISABLE PRINTER SECURITY OPTIONS Options (cont.) 1. From the Main Window, click on Settings, and then click on Security Options. 2. Click on the down-arrow at the right of each selection box to choose the desired security option.
Section 4 Using the TROY Printer Utility Re-Mapping Tray mapping can be used to enhance MICR printing security by redirecting software access to printer paper Printer Paper trays containing check stock to a paper tray containing plain paper. If you have implemented user names and Trays passwords, then only approved users will be able to disable the tray re-mapping configuration and access blank check paper.
Section 4 Using the TROY Printer Utility Re-Mapping The following table contains common tray mapping numbers for TROY printers. Due to the Hewlett-Packard Printer Paper tray assignment scheme, the actual tray number embossed on the paper tray(s) of your TROY printer may not Trays (cont.) correspond with the factory tray assignment numbers listed in the table below (e.g., physical tray #2 has a factory tray assignment number of 3, etc.).
Page 61
Section 4 Using the TROY Printer Utility ™ Selecting Data To discourage fraudulent alteration of your printed checks, a user-defined background image (TROYmark ) can Capture Fonts for be generated using specified information from the check (i.e., check date, convenience amount, payee name, ™...
Section 4 Using the TROY Printer Utility Selecting Data 5. If you are using a “legacy” printer driver Save File Capture Fonts for (typically used for Windows 95, 98SE, and Save in: UserData Audit Reports ME operating systems), place a checkmark ™...
Section 4 Using the TROY Printer Utility Generating the To discourage fraudulent alteration of the check, a background watermark (printed as a diagonally repeating ™ TROYmark pattern across the face of the check) can be generated using user-defined information taken directly from the Background check data (i.e., convenience amount, payee name, etc.).
Page 64
Section 4 Using the TROY Printer Utility Generating the TROY O CUSTOMIZE A MARK BACKGROUND PATTERN ™ TROYmark 1. From the Main Window, click on Settings, and TROYmark Pattern Background then click on TROYmark Pattern. File Options Help Pattern (cont.) 2.
Section 4 Using the TROY Printer Utility Implementing the Secure Seal technology is designed to help check processors easily identify unauthorized alterations to your Secure Seal printed checks. The printed seal consists of a visible company logo or other unique design along with encoded Feature user-defined check information that is incorporated into the seal as a bit-mapped, machine-readable background pattern surrounding the logo.
Page 66
Section 4 Using the TROY Printer Utility Implementing the O SETUP THE ECURE EAL OPTIONS Secure Seal 1. From the Main Window, click on Settings, Feature (cont.) and then click on Secure Seal. 2. Click in the desired field and enter the corresponding seal information (see the table below for field limits/descriptions).
Page 67
Section 4 Using the TROY Printer Utility Implementing the The following additional seal options can be enabled or disabled to suit the requirements of the print job. Secure Seal Feature (cont.) Seal Option Enabled (checked) Disabled (unchecked) Use Metadata Seal data will use the available metadata Seal data will use only the defaults (Printer tags and data, which are overlaid on top of Utility settings) and data specified.
Section 4 Using the TROY Printer Utility Using the The pattern processor enables the TROY printer firmware to search the incoming print data stream for a specified string(s) of characters and then substitute the matching data string(s) with an alternate user-defined data string(s), Pattern allowing a PCL (Printer Command Language)-based printer to accept an otherwise non-compatible print job Processor...
Section 4 Using the TROY Printer Utility NOTE: To enter a control character (nonprinting character) in a string, use the syntax “<0xhh>”, where “hh” is the hexadecimal value of the desired character (e.g., to enter an escape character, use the syntax “<ox1b>”). Printing the O PRINT THE ATTERN...
Section 4 Using the TROY Printer Utility Managing Use this feature to record, store, and print a report of the check printing activity sent to your TROY printer. When enabled, the audit report feature automatically records the MICR line information (transit/routing number, Audit Reports bank number and check number) each time the TROY MICR font is accessed (default mode).
Section 4 Using the TROY Printer Utility Managing The TROY Messaging font can also be used to insert data into the audit record that the user does not want to actually print on the check. Refer to Section 7 – Using TROY Fonts for detailed information.
Page 72
Section 4 Using the TROY Printer Utility Managing TROY audit reports can be selected to print in one of two sort orders: Audit Reports • TROY Primary Sort Order – prints the audit data in ascending order (default). (cont.) • TROY Secondary Sort Order – prints the audit data in descending order. TROY Detailed Audit Report Record MICR Amount*...
Page 73
Section 4 Using the TROY Printer Utility Managing O PRINT AUDIT REPORTS Audit Reports From the Main Window, click on File, Audit, and then click on Print Audit Report. The printer will (cont.) automatically print the audit report according to the user-defined configuration set in the Audit Options window. NOTE: If the Auto-Delete feature is enabled, the audit data will automatically be deleted when the audit report has finished printing.
Section 4 Using the TROY Printer Utility Adjusting the The ANSI X/9B specifications for the placement of the MICR line relative to the bottom and right edges of a check document are tightly controlled in order to provide accurate reading by the high-speed banking system MICR Line check readers.
Page 75
Section 4 Using the TROY Printer Utility Adjusting the MICR O ADJUST THE LINE POSITIONING MICR Line 1. From the Main Window, click on Settings, and and/or Page then click on ExPT Offsets. Image 2. Enter the vertical and offset values for the MICR Positioning line and/or image in the appropriate boxes.
Section 4 Using the TROY Printer Utility Using the Due to minor variations in registration (the precise alignment of text and images on the printed page) that exists with most printers, it is recommended that the MICR line on your checks be positioned to print on the leading Auto-Rotate edge of the printed page (the edge of the page that exits the printer first).
Section 4 Using the TROY Printer Utility Managing The TROY Memory Card installed inside your TROY printer contains a re-writeable flash-file system, allowing Printer the administrator to conveniently install, print, or delete printer resources. The flash-file system’s download area supports the storage of three types of resources: soft fonts, macros/forms, and data files. The most common type Resources of data file stored in the TROY Memory Card is the Secure Seal template file (template.dat).
Section 4 Using the TROY Printer Utility Adding Printer O ADD PRINTER RESOURCES Open File Resources 1. From the Main Window, click on Resources, and Look in: My Documents then click on Install New Resources. Select either Arabian.sfp Soft Fonts, Data Files, or Macros/Forms. 2.
Section 4 Using the TROY Printer Utility Deleting Printer O DELETE PRINTER RESOURCES Resources 1. Print a list of the currently installed printer resources (see Page 4-31) by clicking on Resources, and then clicking on Print Current Resources. Use this printout to determine which resources you wish to delete from the flash-file system.
Section 4 Using the TROY Printer Utility Updating the The TROY Memory Card installed inside your TROY printer contains a re-writeable flash-file system that can be Printer conveniently updated by the administrator. The administrator can upgrade the TROY printer firmware (TROY’s proprietary MICR program code) as new features become available from TROY Firmware maintenance or Firmware feature upgrades developed by TROY Systems can be downloaded and installed using the TROY Printer Utility.
Section 4 Using the TROY Printer Utility Printing Test The TROY Printer Utility provides the ability to generate a Windows Security Font, Windows Barcode Font, and and Demo PCL Security/Barcode Font demonstration page. Use the Windows Security Font demonstration page if you are using a Windows-based printing application, or use the PCL Security/Barcode Font demonstration page if you Pages are using a non-Windows-based printing application.
Section 4 Using the TROY Printer Utility Identifying Print Continuous streaks and voids that Defects may appear on the TROY MICR Quality Document are usually the result of a low toner condition. A scratch or other contamination on the surface of the optical drum inside the toner cartridge can also cause streaking and other print quality defects.
Section 4 Using the TROY Printer Utility Accessing TROY If you are using a non-Windows application to print MICR documents, the escape sequence for each font must be Fonts Using Non- programmed into the application in order to “call” each of the selected fonts. The <Esc> character is ASCII Windows character number 27 (hexadecimal number 1B).
Page 84
Section 4 Using the TROY Printer Utility Verifying Windows Font Support (cont.) 4-38 Security Printing Solutions User’s Guide -- 50-70410-002 Rev. A...
Section 4 Using the TROY Printer Utility Verifying PCL 5e The PCL Security/Barcode Font Demonstration pages can be used to verify PCL 5e communication between the Communication host computer and TROY printer. If the PCL 5e communication between the host computer and TROY printer is successful, then the demonstration page should print out exactly as shown in the example on the next page.
Page 86
Section 4 Using the TROY Printer Utility Verifying PCL 5e Communication (cont.) 4-40 Security Printing Solutions User’s Guide -- 50-70410-002 Rev. A...
Page 87
Section 4 Using the TROY Printer Utility Verifying PCL 5e Communication (cont.) 4-41 Security Printing Solutions User’s Guide -- 50-70410-002 Rev. A...
Section 4 Using the TROY Printer Utility Verifying Printer TROY O PRINT THE CONFIGURATION PAGE Configuration NOTE: TROY Secure EX series printers must have the printer keylock switch set to “Print MICR” to enable printing of the TROY Configuration page. NOTE: TROY IRD 9050 1 series printers must have the 100-sheet multipurpose tray installed to use standard-size forms for printing test and demonstration pages.
Section 4 Using the TROY Printer Utility Downloading The TROY Printer Utility provides the ability to download any PCL or text file directly to the printer without embedding additional information. Three download options are provided to enhance the download file (see the Files to the Download File window for the specific options).
Section 4 Using the TROY Printer Utility Obtaining The TROY Printer Utility provides several help screens to guide you through the features and functions of a TROY Security Printing Solution. TROY technical support is available to assist you with any questions Technical concerning the setup, operation and maintenance of your TROY Security Printing Solution.
Section 5 Using the TROY Port Monitor Introduction What is a TROY Port Monitor? The TROY Port Monitor is a Windows-based application that manages and configures all print data sent from your Windows application to your TROY Security Printing Solution. Essentially, when you initiate a print job from your Windows application, the raw print data is formatted to fit the printing parameters of the selected TROY printer using the corresponding MICR printer driver installed on the host computer.
Page 92
Section 5 Using the TROY Port Monitor Introduction More than one port monitor can be configured on a Windows-based PC. Multiple port monitors addressed to the (cont.) same printer can be configured differently, allowing simple point-and-click selection of TROY security features. Multiple port monitors can also be associated with different printers, providing effortless configuration across even the most complex network environments.
Section 5 Using the TROY Port Monitor Installing the To install the TROY Port Monitor, ensure that the appropriate printer drivers are installed first, and then install TROY Port the port monitor (follow the instructions described in the TROY Quick-Start Guide). The TROY Port Monitor software is located on the TROY Security Printing Solutions CD supplied with your TROY Security Printing Monitor Solution.
Section 5 Using the TROY Port Monitor Accessing TROY 2000/NT4.0 O ACCESS THE PORT MONITOR IN INDOWS the TROY 1. Click on Start, Settings, and then Printers. Port Monitor 2. Right-click on the desired TROY printer (cont.) icon and then left-click on Properties. 3.
Section 5 Using the TROY Port Monitor Using the Port monitor settings for the selected TROY Security Printing Solution and associated port will remain in effect TROY Port until changed by the user. If the administrator has set up user names and passwords, the user must enter a valid user name and password before any port monitor security settings will affect the MICR print job initiated by that Monitor user.
Section 5 Using the TROY Port Monitor Encryption Tab The Encryption tab is used to enable/disable data encryption. Use this feature to prevent fraudulent interception (eves-dropping) of your proprietary MICR check data being sent over a public network. (MICR Secure EX Printers Only) Encryption Mode –...
Section 5 Using the TROY Port Monitor Security Tab The Security tab is used to enable the port monitor security features for printing MICR documents. If the administrator has implemented PINs or user names and passwords in the TROY printer, matching PINs or a valid user name and password must be entered in the Port Monitor fields under the Security tab in order for MICR jobs to print correctly.
Page 98
Section 5 Using the TROY Port Monitor Security Tab Alternate Escape Sequence – (used only for legacy application compatibility) enter the alternate ASCII character (cont.) number (0-255) to use as a replacement for the ASCII character 27 (escape character) in the PCL 5 data stream sent to the printer.
Section 6 Using the Printer Control Panel Introduction Many of the TROY printer features provided in the TROY Printer Utility can be configured through the printer control panel as a secondary point of control. For security purposes, an administrator password is required before access to the TROY printer features is allowed.
Section 6 Using the Printer Control Panel Accessing Printer O ACCESS PRINTER FEATURES ALL PRINTER MODELS Features 1. Press the button until the desired menu selection is displayed, and then press the button. If additional second-level menu items appear, press the button to select the desired option, and then press the button.
Section 6 Using the Printer Control Panel Entering the (9050 S O ENTER THE ADMINISTRATOR PASSWORD ERIES RINTERS Administrator TROY MENUS 1. Press the button until Password (9050 appears, and then press the button. Series Printers) SECURITY MENU 2. Press the button until appears, and then press the button.
Page 102
Section 6 Using the Printer Control Panel TROY The following sample menu map shows the available TROY features that are built into TROY Security Printing Security Solutions. Depending on your type of TROY Security Printing Solution, some of these features may not be available on your TROY printer (refer to the menu maps on the following pages).
Page 103
Section 6 Using the Printer Control Panel TROY Security Printing Solutions Menu Map (cont.) Security Printing Solutions User’s Guide -- 50-70410-002 Rev. A...
Section 6 Using the Printer Control Panel Using the If the MICR line on your checks does not meet the ANSI X/9B specification for MICR line placement, use this Exact feature to make small vertical, horizontal, or rotational positioning adjustments to the MICR line and/or page image.
Page 105
Section 6 Using the Printer Control Panel Using the 2. Use the provided TROY MICR Document Template (see the example below) to evaluate the position of the Exact printed MICR line on the bottom of your checks. Refer to Section 3 – MICR Quality Control in the TROY MICR Basics Handbook (provided on the TROY Security Printing Solutions CD) for instructions on using Positioning the TROY MICR Document Template.
Page 106
Section 6 Using the Printer Control Panel Using the MICR O ADJUST THE POSITION OF THE LINE Exact 1. If not already logged into the printer control panel, enter a valid administrator password (see page 6-2). Positioning TROY MENUS 2. Press the button to select , and then press the button.
Page 107
Section 6 Using the Printer Control Panel Using the O ADJUST THE POSITION OF THE PAGE IMAGE Exact 1. If not already logged into the printer control panel, enter a valid administrator password (see page 6-2). Positioning TROY MENUS 2. Press the button to select , and then press the button.
Section 7 Using TROY Fonts Introduction The TROY MICR E-13B and CMC-7 MICR fonts have been specifically engineered for your TROY Security Printing Solution to ensure the highest quality MICR printing in the industry. The TROY font collection provides seamless integration and security within your Windows-based check printing application. All TROY fonts are permanently programmed into the TROY memory card to ensure consistent high-quality MICR printing and to prevent unauthorized use of these fonts on another printing system.
Section 7 Using TROY Fonts Accessing TROY If you are using a non-Windows application to print MICR documents, the escape sequence for each font must be Fonts Using Non- programmed into your check-printing application in order to “call” each of the selected fonts. The <Esc> Windows character is ASCII character number 27 (hexadecimal number 1B).
Section 7 Using TROY Fonts Using the TROY To prevent fraudulent production of checks, TROY Security Printing Solutions can automatically print “VOID”, ™ AutoProtect “DO NOT CASH”, “NON-NEGOTIABLE” or any other user-defined phrase across the face of any check that ™...
Section 7 Using TROY Fonts Using the Data The data capture fonts are designed to capture default and user-defined data from the check for use in the TROY ™ Capture Fonts enhanced audit reports and/or the TROYmark background image printed on the check. Several data capture font styles are provided to allow customization of your check;...
Page 112
Section 7 Using TROY Fonts Using the Data Capture Fonts (cont.) TROY Digital Signature MICR Line (automatically captured) TROY Payee Custom 3 (user-defined non-check data using the TROY Messaging font) TROY Date TROY Amount Custom 1 (user-defined data contained on the check) Custom 2 (user-defined data contained on the...
Section 7 Using TROY Fonts Using Printer In addition to the TROY printer Fonts and fonts that permanently programmed into TROY Screen Fonts Security Printing Solution, the TROY screen fonts have been developed for screen display use only as a visual reference and for making positional adjustments to the MICR line.
Section 7 Using TROY Fonts MICR Font The TROY E-13B and CMC-7 MICR fonts were developed using strict specifications designed specifically for Guidelines high-speed magnetic-read processing. To maintain these strict specifications, the TROY MICR fonts were designed as non-scalable fonts (fixed fonts) that are fixed in pitch (spacing) and point size (height). Because ™...
Section 7 Using TROY Fonts Font Each character or symbol in a font set corresponds to a specific ASCII (American Standard Code for Information Interchange) number (e.g., the capital letter “A” = ASCII number 65). Pressing a key on your computer Character keyboard automatically generates the ASCII number (32 through 127) associated with the character or symbol Mapping...
Section 7 Using TROY Fonts Determining a To determine which key on your computer keyboard that a TROY character or symbol is “mapped” to, simply Character compare the ASCII number of the selected TROY character or symbol to the same ASCII number listed in the Mapping Standard ASCII Character Map (shown on the next page) to determine which keyboard key can be used to access the selected TROY character or symbol.
Page 119
Section 7 Using TROY Fonts TROY MICR <Esc>(ØQ<Esc>(s1p12vØsØb1T CMC-7 12-Point Font (Troy CMC7) <Esc>(3Q<Esc>(s1p vØsØb1ØT = desired point size TROY Enhanced Convenience Amount Font (Troy ECF) 7-12 Security Printing Solutions User’s Guide -- 50-70410-002 Rev. A...
Page 120
Section 7 Using TROY Fonts NOTE: The TROY Enhanced Convenience Amount font can be used in place of the TROY Convenience Amount font in the legal amount field of the check. To write the cents amount on the check, type the capital letter that corresponds to the smaller cent characters shown in the example above (i.e., A=0, B=1, C=2).
Section 7 Using TROY Fonts TROY <ESC>(19U<esc>(s1p vØsØb166Ø2T<esc>%m1I ™ AutoProtect = desired point size Font (Troy Auto- Protect) TROY Security <Esc>(4Q<Esc>(s1p vØsØbØT = desired point size Font (Troy Security) <Esc>(4Q<Esc>(s1p vØsØb4T = desired point size TROY Security Font (Spanish) (Troy Security Spanish) NOTE: The TROY Security Spanish Font is included in the International Font Collection provided on the TROY Security Printing Solutions CD.
Page 124
Section 7 Using TROY Fonts TROY OCR-A (continued) NOTE: This OCR font must be used at the designated point size to ensure optical readability. Size I – must use 12-point size (upper and lower case characters can be used) Size III – must use 16-point size (only upper case characters can be used) Size IV –...
Page 126
Section 7 Using TROY Fonts TROY OCR-B (continued) NOTE: This OCR font must be used at the designated point size to ensure optical readability. Size I – must use 10-point size (upper and lower case characters can be used) Size III – (not supported) Size IV –...
Section 7 Using TROY Fonts International In addition to the CMC-7 font used for International MICR applications, TROY provides the following Convenience Amount font sets in a variety of languages (see examples below). These fonts are provided only on Convenience the TROY Security Printing Solutions CD.
Section 7 Using TROY Fonts International British Small Convenience Amount Font (Troy SCF British) Convenience <Esc>(2Q<Esc>(sØp6h22.68vØsØb1T Amount Fonts (cont.) French Small Convenience Amount Font (Troy SCF French) <Esc>(2Q<Esc>(sØp6h22.68vØsØb2T Italian Small Convenience Amount Font (Troy SCF Italian) <Esc>(2Q<Esc>(sØp6h22.68vØsØb3T Spanish Small Convenience Amount Font (Troy SCF Spanish) <Esc>(2Q<Esc>(sØp6h22.68vØsØb4T 7-30 Security Printing Solutions User’s Guide -- 50-70410-002 Rev.
Section 8 Troubleshooting / Error Messages Trouble- The following troubleshooting table provides solutions to the most common MICR printing problems. Some of shooting by the messages may not apply to your TROY Security Printing Solution. Visually inspect your MICR documents using the TROY MICR Document Template where appropriate.
Page 139
Section 8 Troubleshooting / Error Messages Trouble- shooting by 600 dpi MICR font not used in MICR No MICR font installed. Install the TROY Memory Card and line (an incorrect font such as Courier reprint. Symptom or Times Roman was used instead). (cont.) MICR mode disabled and an attempt Consult your software dealer.
Page 140
Section 8 Troubleshooting / Error Messages Trouble- shooting by MICR clear band has extra printing Printer density setting is too dark. Use TROY MICR defaults. (such as toner splatter) besides the Symptom MICR line on front or backside of Printer fusing unit is contaminated. Refer to printer user’s manual for (cont.) document.
Page 141
Section 8 Troubleshooting / Error Messages Trouble- shooting by MICR line not positioned correctly on Your MICR paper was cut or Measure your MICR paper and/or the document (vertically and perforated inaccurately (paper is too perforation lines to ensure your MICR- Symptom horizontally).
Page 142
Section 8 Troubleshooting / Error Messages Trouble- shooting by MICR characters are too thick or too Printer density setting is too dark or Use TROY MICR defaults. thin. too light. Symptom (cont.) Your MICR toner cartridge is nearly TROY MICR toner cartridge should not be used if a LOW TONER message empty.
Page 143
Section 8 Troubleshooting / Error Messages Trouble- shooting by MICR characters are broken, there Your MICR paper is out of Refer to the TROY MICR paper are voids in characters or toner rubs specification so that toner does not specifications and consult your paper Symptom off.
Page 144
Section 8 Troubleshooting / Error Messages Trouble- shooting by Your bank reports a high reject rate A Non-TROY MICR toner was used. Print test documents using TROY when processing your TROY MICR- MICR toner or consult the non-TROY Symptom printed documents. manufacturer for assistance.
Page 145
Section 8 Troubleshooting / Error Messages Trouble- shooting by MICR characters appear smeared A Non-TROY MICR toner was used. Print test documents using TROY after processing by a bank. MICR toner or consult the non-TROY Symptom manufacturer for assistance. (cont.) Your MICR paper is out of Refer to TROY MICR paper specification so that toner does not...
Page 146
Section 8 Troubleshooting / Error Messages Trouble- shooting by Printer does not respond to a MICR Invalid administrator password was Enter the correct administrator print request after the administrator entered. password. Symptom password is entered. (cont.) NOTE: If the administrator password has been lost or forgotten, perform the following three steps: 1.
Section 8 Troubleshooting / Error Messages Trouble- The following table contains the printer control panel display messages generated by TROY Security Printing Solutions. Some of the messages may not apply to your TROY Security Printing Solution. Refer to the Hewlett- shooting by Packard Printer User’s Manual for other display panel messages.
Page 148
Section 8 Troubleshooting / Error Messages Trouble- IN CHANGE MODE. USER The printer was in the middle of a user Complete the changes to user names and shooting by LIST COMMAND IGNORED. name or password change when the passwords, and then resubmit the job. printer received a job attempting to print Printer the user list.
Page 149
Section 8 Troubleshooting / Error Messages Trouble- ERROR. DELETE USER Some other error occurred while trying to Check the job for proper syntax. Delete all shooting by COMMAND IGNORED. delete a user to the printer. users and add them again. If the problem persists, call TROY for technical support.
Section 8 Troubleshooting / Error Messages Trouble- AUDIT FILE FULL. CYCLE There was not enough memory in the Add more memory to the printer, or change shooting by POWER NOW. printer to sort the audit data. the sort type to Record Number and print the audit report using this sort key.
Page 151
Section 8 Troubleshooting / Error Messages Trouble- FIRMWARE FILE CRC Following the downloading of a new Try performing the firmware update again. shooting by ERROR TROY firmware image, the existing TROY If the firmware update fails on the second firmware confirms the validity check upon attempt, contact TROY Technical Support.
Section 8 Troubleshooting / Error Messages Trouble- ACCESS DENIED An attempt was made to access a data If the error persists, contact TROY shooting by file that the Troy firmware was not Technical Support. permitted to access. This error should not Printer occur under normal printer operation Control Panel...
Section 8 Troubleshooting / Error Messages Software In the event you wish to reinstall or permanently remove the TROY Security Printing Solution support files and utilities, use the following procedures to properly uninstall (remove) all TROY software from your computer. Uninstall Procedures Close all applications before uninstalling the TROY screen fonts.
Page 154
Section 8 Troubleshooting / Error Messages Uninstall the Close all applications before uninstalling the TROY Printer Utility files. TROY Printer From the START menu, click on Settings, and then click on Control Panel. Utility Click on Add/Remove Programs. Locate the TROY Printer Utility from the listing. Click on Add/Remove.
Appendix IRD 9050 1 Printer Setup Guidelines Introduction Thank you for purchasing your TROY IRD 9050 1 series printing solution. You have chosen the highest quality IRD (Image Replacement Document) printing solution available today that offers convenience, flexibility, security, and precision for printing high-quality IRD forms. The TROY IRD 9050 1 series printers consist of a TROY MICR 9050 series printer combined with a specially redesigned TROY IRD duplexer and two TROY IRD paper trays designed to accommodate both forward and return single IRD forms.
Appendix IRD 9050 1 Printer Setup Guidelines Configuring 1. Ensure the tray selection lever is in the down (custom) position before proceeding (Figure 1 and Figure 2). the TROY IRD 9050 1 Printer for IRD Forms (cont.) Verify that the tray selection lever is in the down position.
Page 157
Appendix IRD 9050 1 Printer Setup Guidelines Configuring 8. Use the UP/DOWN arrow buttons to select the desired paper tray (2 of 3) type, and then press the button. PLAIN the TROY IRD If both paper trays are loaded with identical paper stock, then set the paper type to (default) for both paper trays.
Page 158
Appendix IRD 9050 1 Printer Setup Guidelines Loading IRD IRD forms must be loaded into the printer with the bottom edge of the document (the edge where the MICR line Paper Stock is printed) oriented toward the front of the printer paper tray (Figure 3 and Figure 4). Failure to load the return IRDs as described will cause the IRD forms to jam in the printer.
Appendix IRD 9050 1 Printer Setup Guidelines Printing The TROY IRD 9050 1 printer is capable of printing 1-up forward IRD size forms, 1-up return IRD size forms, as well as standard size forms. However, forms other than 1-up IRD forward and return size forms cannot be Standard-Size duplexed.
Appendix IRD 9050 1 Printer Setup Guidelines Writing Host TROY publishes a separate TROY IRD 9050 1 Series Developer’s Kit that includes technical information to help application developers implement support for the TROY IRD 9050 1 series printers. Application Applications developers are encouraged to contact TROY technical support for additional information about the TROY IRD for the TROY 9050 1...
Need help?
Do you have a question about the MICR 3005 and is the answer not in the manual?
Questions and answers