Product Details
Encrypted metal keyboard for password input of kiosk and restaurant
ordering machine
Product name:Metal encryption keyboard
Product model:GZ-B005015-001
Product specification:87.5*91.5mm
1 Overview
This product is a metal password keyboard with 4 PSAM card
functions. With DES and 3DES functions,
Support PSAM card complying with ISO7816, t = 0 and T = 1 protocol
2 performance index
2.1 communication parameters
Standard RS232 serial communication interface. 1 start bit, 1 stop
bit.
Optional communication rate: 9600 bps.
Optional data format: n, 8, 1
2.2 specification and operation speed
In line with the specifications of the people's Bank of China.
Encryption and decryption speed < 1 second.
2.3 electrical performance
Power supply: DC + 5V DC power supply.
Power consumption: below 1W in working state and below 200MW in non
working state.
Power failure key keeping: when the power supply is cut off
instantaneously and for a long time, the memory data will not be
lost.
2.4 mechanical properties
Key life: over 200000 times.
Key pressure: 3N (n).
Key stroke: 0.45mm.
Key material: stainless steel.
Panel material: stainless steel.
Key surface characters: laser lettering and strong paint.
2.5 environmental adaptability
Working temperature: - 10 ℃ ~ + 40 ℃ relative humidity: 40-90%
(under normal conditions).
Storage temperature: - 30 ℃ ~ + 55 ℃ relative humidity: 20-95% (no
condensation).
Atmospheric pressure: 60-106 kPa.
2.6 reliability
MTBF >20000h,MTTR<30min.
3 keyboard commands
Command format: 02h + < ln > + < CMD > + < data >
+ < BCC >
Return format: 02h + < ln > + < st > + < data > +
< BCC >
Ln -- represents the number of bytes of CMD and data or ST and
data.
CMD -- command keyword.
Data -- data information exchanged.
BCC -- byte exclusive or checksum from ln to data.
ST - explain as follows:
04H - command executed successfully
15h - wrong command parameter
80h -- timeout error
A4H -- the command can be executed successfully, but the master key
is invalid
B5h -- invalid command and master key
E0h -- invalid command
FXH - error in self check:
X=0 CPU wrong
X=1 SRAM wrong
X = 2 keyboard has short circuit error
X = 3 serial level error
X = 4 CPU card error
X = 6 master key failure
X = 7 misc. Error
3.1 take the product version number and other parameters.
Command: 02h + 01h + 30h + < BCC >
Return: 02h + < ln > + < st > + < data > + <
BCC >. St may be 04H, 15h, e0h, F0H. F0H indicates that e2rom
chip is not installed.
Description: data = ver + Sn + rechang, where VER is the version
number of 16 bytes (ASCII code), the first 4 bytes (BCD) of Sn is
the production serial number, the last 4 bytes are all "00" (if
there is a cryptographic algorithm chip, it is its number), and
rechang is the charging time of 2 bytes (hardware support
required).
3.2 program reset self check, key not cleared.
Command: 02h + 01h + 31h + < BCC > (02h + 02h + 31h + 38h +
BCC can reinitialize 8 master keys in the keyboard to 38h)
Description: after the keyboard self check, if the master key is
valid (16 master keys are verified by BCC), the buzzer will ring
once, and the self check status is in St.
Return: 02h + 01h + < st > + < BCC >. St may be 04H,
15h, e0h, FXH.
3.3 install the master key (except for Sam card mode).
Command: 02h + 0ah + 32H + < m > + < TMK > + < BCC
>
Description: the master key number m is 1 byte (00-0fh), and the 16
master keys TMK are 8 / 16 / 16 bytes (corresponding to DES, 3DES
and chip modes respectively). If the master key number m is 1 byte
(41-4fh), it needs to be decrypted and saved with the original
master key of the same number.
Return: 02h + 01h + < st > + < BCC >. St may be 04H,
15h, A4H, b5h, C4H, d5h, E0. 04H indicates that the master key has
been loaded.
3.4 install the work key (except for Sam card mode).
Command: 02h + 0Bh + 33H + < m > + < n > + < WP >
+ < BCC > ciphertext WP is 8 bytes
Description: the working key ciphertext WP is 8 / 16 / 24 bytes
(corresponding to DES, 3DES and chip modes respectively).
Return: 02h + 01h + < st > + < BCC >. St may be 04H,
15h, A4H, b5h, C4H, d5h, e0h.
Note: the working key No. n (00-03h) is used to encrypt the working
key WP with the master key No. m (DES / 3DES). After the password
keyboard is decrypted, the WP working key area is saved for the
encryption and decryption command of the following keyboard data.
3.5 card number or account number installed (for anxix9.8
encryption)
Command: 02h + 0dh + 34h + < card-no > + < BCC >
Description: card number or account card-no is a 12 byte ASCII
numeric code.
Return: 02h + 01h + < st > + < BCC >. St may be 04H,
15h, C4H, d5h, e0h.
3.6 start password keyboard encryption
Command: 02h + 06h + 35h + < pin-l + < disp-md > + <
jm-md > + < ts-md > + < timeout > + < BCC >
Description: the following table
Variable | description | optional |
PIN-L | The password length pin-l is 1 byte (1-16, 0 means to resend the
last result). Enter the length of the password pin on the keyboard. | 0~0F |
DISP-MD | Display mode disp-md is 1 byte (1 = display "*", 2 = display clear
text, not supported). | 01/02 |
JM-MD | The encryption mode jm-md is 1 byte (1 = encryption after operation
with card-no, 2 = direct encryption without operation with card-no | 01/02 |
TS-MD | The prompt mode ts-md is 1 byte (0 = no prompt, 1 = LCD display
"please input password", and voice prompt "Hello!" Please enter the
password ". 2 = LCD display "input again", and voice prompt "please
input again") | 00/01/02 |
TIMEOUT | The timeout time is 1 byte (1-255 seconds). If the timeout time
exceeds this time, there is no key to exit. | 00~FF |
Function: turn on the keyboard automatically, and allow key input
after prompt. When input, it is required to judge the length of
input password compared with pin-l, if it is less than pin-l
But if there is a confirmation key, or the pin-l does not need a
confirmation key, it needs to be supplemented with 00 / FFH to an
integer multiple of 8 bytes in length. According to the encryption
mode, whether the operation of card-no and pin's identity
information is needed (according to ansix9.8 or ISO 9564 or ibm3624
during pin block operation), then the password encryption operation
is carried out, and finally the returned data is saved in the
buffer until the password command is obtained. If you exit after
timeout, there will be no ciphertext in the returned state only.
Return: 02h + 01h + < st > + < BCC >. St may be 04H,
15h, A4H, b5h, C4H, d5h, e0h.
3.7 data encryption (except for Sam card mode).
Command: 02h + 09 + 36h + < string > + < BCC >
Description: encrypts the 8-byte plaintext string with the current
working key (DES / 3DES). Perform password encryption and return
ciphertext data.
Return: 02h + 09h + < st > + < ciphertext string > +
< BCC > St may be 04H, 15h, A4H, b5h, C4H, d5h, e0h.
3.8 data decryption (except for Sam card mode).
Command: 02h + 9 + 37h + < ciphertext string > + < BCC
>
Description: decrypts the 8-byte ciphertext string with the current
working key (DES / 3DES). Perform password decryption operation and
return clear text data.
Return: 02h + 09h + < st > + < plain text string > +
< BCC >. St may be 04H, 15h, A4H, b5h, C4H, d5h, e0h.
3.9 take product serial number string
Command: 02h + 01h + 38h + < BCC >
Return: 02h + 09h + < st > + < serial number string > +
< BCC >. St may be 04H, 15h, e0h.
Note: the sequence number string is 8 bytes. There is one byte for
year (two bits for BCD code), one byte for month (two bits for BCD
code), and two bytes for production serial number (four bits for
BCD code). The last four bytes are four 00h when there is no cipher
algorithm chip.
3.10 display string
Command: 02h + < ln > + 39H + < string > + < BCC
>.
Description: not supported.
Return: 02h + 01h + < st > + < BCC >. St may be 04H,
15h, e0h.
Note: the Chinese character code is encoded according to the
password keyboard font, and the character number must be displayed
by the password keyboard. If no string part of the table clears the
display.
3.11 Data Mac operation (except Sam card mode)
Command: 02h + 09h + 41h + < string > + < BCC >
Description: use the current MAC working key (DES / 3DES) to
calculate the 8-byte plaintext string. Returns MAC string data.
Return: 02h + 09h + st + < MAC string > + < BCC > St
may be 04H, 15h, A4H, b5h, C4H, d5h, e0h.
3.12 access the password in the keyboard (except for Sam card mode)
Command: 02h + 01h + 42h + < BCC >
Description: returns the previously encrypted ciphertext in the
buffer, and turns off the password state to restore the original
state.
Return: 02h + 0eh + < st > + < ciphertext > + < CN
> + < Sn > + < BCC >. St may be 04H, 15h, A4H, b5h,
C4H, d5h, e0h.
Note: cn is a 1-byte operation sequence number, with one password
added for each operation. SN is the unique serial number of the
4-byte cipher chip. Pin code only allows 0-9 number keys, delete
key and confirm key. Pin code cannot be used for other function
keys, but the original code will be sent out if the keyboard is
opened before startup.
3.13 activate the work key (except for Sam card mode).
Command: 02h + 03h + 43h + < m > + < n > + < BCC
>
Description: activate master key No. m with work key No. n as the
current work key The current working key is specified for all
password operations in the future. If the master key is used as the
current working key, only the M (00-0fh) parameter is needed, which
has nothing to do with n (00-03h). See B.16 command explanation.
Return: 02h + 01h + < st > + < BCC >. St may be 04H,
15h, A4H, b5h, C4H, d5h, e0h.
3.14 send back character
Command: 02h + 02h + 44h + < Chr > + < BCC >
Description: the password keyboard will immediately return the
received characters.
Return: 02h + 02h + < st > + < Chr > + < BCC >.
St may be 04H, 15h, C4H, d5h, E0. Chr represents an ASCII
character.
3.15 send switch keyboard and key sound
Command: 02h + 02h + 45h + < CTL > + < BCC >
Description: turn on / off password keyboard, turn on / off key
(BZ) sound. When the keyboard is open, once there is a pressure
key, it will actively send out the key value code. If the button
(BZ) sound is also on, it will sound when the button is pressed.
There are also communication parameter settings.
Return: 02h + 01h + < st > + < BCC >. St may be 04H,
15h, C4H, d5h, E0.
Company Profile
Shenzhen Guangzhi Technology Co., Ltd. is a leader in providing
end-of-service input devices for self-service terminals.
Specialized in self-service equipment manufacturers and software
system integrators in various industries. Committed to serving
customers and becoming a center for advanced end-of-line input
product design and production, providing a comprehensive end-of-end
input device solution to meet customer needs. Products are widely
used in financial, communications, military, industrial control,
petrochemical, railway and other high-end self-service equipment.
Founded in 2015, Shenzhen Guangzhi Technology Co., Ltd. is an
independent enterprise that develops and produces independently. In
terms of human resources, the company has a high-quality, creative
team. More than 70% of the company's management personnel have
received college education. The company's first-line production
line employees also have rich industry experience, and the average
age of all employees is less than 27 years old; in production, with
advanced production equipment and testing facilities, has formed an
integrated operation system of design, manufacturing, installation,
commissioning, marketing, after-sales service. Since its
development, the company has integrated electronic design, metal
mold, metal stamping, button etching, assembly and debugging. It
has become one of the few manufacturers in the industry to develop
and produce metal keyboards. In quality management, our quality
policy Yes: quality control, quality service, customer
satisfaction, continuous improvement. The company has passed the
quality management system certification of GB/T 19001-2008/ISO
9001:2008. Through the establishment of an internal orderly
management system, it mobilizes the enthusiasm of all employees,
gathers strength, exerts the greatest potential, and takes
customers as the center to ensure innovation. Design and product
quality, the pursuit of efficient and efficient service,
under-excavation in the work, continuous improvement, continuous
improvement, and ultimately achieve long-term business, customer
satisfaction.