CASTLES TECHNOLOGY VEGA3000-UL PIN Pad User Manual VEGA5000 Book 2

CASTLES TECHNOLOGY CO., LTD. PIN Pad VEGA5000 Book 2

Users Manual

Download: CASTLES TECHNOLOGY VEGA3000-UL PIN Pad User Manual VEGA5000 Book 2
Mirror Download [FCC.gov]CASTLES TECHNOLOGY VEGA3000-UL PIN Pad User Manual VEGA5000 Book 2
Document ID3133917
Application ID+KPkmpRzGAUxkM81rL63gQ==
Document DescriptionUsers Manual
Short Term ConfidentialNo
Permanent ConfidentialNo
SupercedeNo
Document TypeUser Manual
Display FormatAdobe Acrobat PDF - pdf
Filesize173.97kB (2174604 bits)
Date Submitted2016-09-14 00:00:00
Date Available2017-03-14 00:00:00
Creation Date2016-08-15 17:14:49
Producing SoftwareMicrosoft® Word 2010
Document Lastmod2016-09-14 09:02:08
Document TitleVEGA5000(S) Book 2 User Manual
Document CreatorMicrosoft® Word 2010
Document Author: Anfernee Lin

CASTLES TECHNOLOGY
VEGA3000UltraLite
Book 2
User Manual
Confidential
Version1.1
Aug 2016
Castles Technology Co., Ltd.
6F, No. 207-5, Sec. 3, Beixin Rd., XindianDistrict,
New Taipei City 23143, Taiwan R.O.C.
http://www.castech.com.tw
WARNING
Information in this document is subject to change without prior notice.
No part of this publication may be reproduced, transmitted, stored in a retrieval
system, nor translated into any human or computer language, in any form or by any
means, electronic, mechanical, magnetic, optical, chemical, manual, or otherwise,
without the prior written permission of Castles Technology Co., Ltd.
All trademarks mentioned are proprietary of their respective owners.
Castles Technology Co., Ltd.
Confidential • All Right Reserved.
Pg. 2
Revision History
Version
Date
Descriptions
1.0
Jul 12, 2016
Initial creation.
1.1
Aug 11,2016
Castles Technology Co., Ltd.
1. Add “2.2. Power Supply”.
2. Add “2.3. Environment”.
Confidential • All Right Reserved.
Pg. 3
Contents
1.
Introduction .................................................................................................................. 6
2.
Hardware Setup............................................................................................................ 7
3.
2.1.
Parts of the Surface ............................................................................................. 7
2.2.
Power Supply ....................................................................................................... 9
2.3.
Environment ......................................................................................................... 9
Basic Operation ......................................................................................................... 10
3.1.
Program Manager .............................................................................................. 10
3.2.
Download AP ..................................................................................................... 11
3.3.
System Info........................................................................................................ 12
3.4.
Memory Status .................................................................................................. 13
3.5.
System Settings ................................................................................................. 14
3.6.
Test Utility .......................................................................................................... 17
3.7.
Factory Reset .................................................................................................... 19
3.8.
Power Off .......................................................................................................... 20
3.9.
Password Manager ............................................................................................ 21
3.10. Share Object Management ................................................................................ 23
3.11. Font Mng ........................................................................................................... 24
3.12. ULD Key Hash ................................................................................................... 25
3.13. Plug-in Mng ....................................................................................................... 26
3.14. Key Injection ...................................................................................................... 27
3.15. HW Detect ......................................................................................................... 28
4.
Secure File Loading ................................................................................................... 29
4.1.
ULD Key System ............................................................................................... 29
4.1.1. ULD Manufacturer Key ........................................................................... 29
4.1.2. ULD User Key ........................................................................................ 31
4.1.3. Key Change ........................................................................................... 31
4.2.
File Signing ........................................................................................................ 32
4.2.1. Signing Kernel Module ........................................................................... 32
4.2.2. Signing User Files .................................................................................. 34
4.3.
File Loading ....................................................................................................... 38
4.3.1. Download by User Loader ...................................................................... 38
4.4.
5.
Changing ULD User Key.................................................................................... 41
Font Management ...................................................................................................... 48
Castles Technology Co., Ltd.
Confidential • All Right Reserved.
Pg. 4
6.
5.1.
Loading New Font.............................................................................................. 48
5.2.
Custom Font ...................................................................................................... 51
5.3.
Using TrueType Font (TTF) ............................................................................... 59
FCC Warning .............................................................................................................. 61
FCC Caution ................................................................................................................ 61
RF Exposure Warning.................................................................................................. 61
7.
NCCWarning............................................................................................................... 62
Castles Technology Co., Ltd.
Confidential • All Right Reserved.
Pg. 5
1. Introduction
This document provides a guideline on operating and configuringCastles
VEGA3000UltraLite.
The scope of this document includes setting up the terminal, basic operation, application
life cycle, and some advance features.
Castles Technology Co., Ltd.
Confidential • All Right Reserved.
Pg. 6
2. Hardware Setup
2.1. Parts of the Surface
Front Side
10
VEGA3000 UltraLite
1. LCD Display (MonoColor)
6. OK /Enter Key
2. Keyboard
7. Up Key
3. Cancel Key
8. Down Key
4. 0 / Funtion Key
9. Clear Key
5. Contactless Card Landing
10. Contactless LED
Zone
Castles Technology Co., Ltd.
Confidential • All Right Reserved.
Pg. 7
Rear Side
11
12
13
14
11. Wiring Slot
12. COM Port
13. Anti-theft Lock
14. SAM Slot (SAM1, SAM2, SAM3, SAM4)
Side
Castles Technology Co., Ltd.
Confidential • All Right Reserved.
Pg. 8
2.2. Power Supply


DC Input: 9V/1A
USB: 5V/1A
2.3. Environment


Operating: 0℃~40℃,5% to 90% non-condensing
Storage: -20℃~70℃
Castles Technology Co., Ltd.
Confidential • All Right Reserved.
Pg. 9
3. Basic Operation
3.1. Program Manager
Upon power on, terminal will enter Program Manager if not default application
selected. All user applications are list in Program Manager. User may select an
application and run the application or view the application info, delete the
application or set to default run upon power on. User may enter System Menu to
configure terminal settings.
Program Manager
Program Manager
-----------01/02
1.App1
2.App2
0:Download

Press[0] button to enter System Menu.

Press [1] button to toggle default application selection.

Press [2] button to delete application.

Press [3] button to view application info.

Press [OK] button to run application.

Press [*] or [#] toup and down for applicationselection.
System Menu
Page 1
System Menu
1.Download AP
2.System Info
3.Memory Status
4.Sys Settings
5.Test Utility
6.Factory Reset
7.Power Off

Press [#] button to page 2.
Castles Technology Co., Ltd.
Confidential • All Right Reserved.
Pg. 10
Page 2
System Menu
1.PWD Change
2.ShareobjMng
3.FontMng4.ULD
KEY HASH
5.Plug-in Mng
6.Key Injection
7.HW Detect

Press [*] button to page1.

Press [#] button to page3.
3.2. Download AP
Download user application or kernel modules firmware.
System Menu
System Menu
1.Download AP
2.System Info
3.Memory Status
4.Sys Settings
5.Test Utility
6.Factory Reset
7.Power Off

Press [1] button to enter Download AP menu.
Download AP Menu
Download EX
1.RS232 or USB
2.USB Disk
3.SD Card
Select DW Source
Select download source:

Press [1] button to select source as RS232 or USB connection and enter ULD
download mode.

Press [2] button to select source as USB disk.
Castles Technology Co., Ltd.
Confidential • All Right Reserved.
Pg. 11

Press [3] button to select source as SD card.
3.3. System Info
View kernel module firmware information.
System Menu
System Menu
1.Download AP
2.System Info
3.Memory Status
4.Sys Settings
5.Test Utility
6.Factory Reset
7.Power Off

Press [2] button to enter System Info menu.
System Info Menu
Page 1
SYSTEM INFO
---Kernel Ver--BIOS:VR0010
SULD
:VRF810
LINUXKNL:VR0019
ROOTFS:VR9201
PEDST
:VR0025

Page 2
SYSTEM INFO
--- KOVer --SECURITY:VR0025
KMS
:VR0024
DRV:VR0039
USB:N/A
CIF:VR9020
SAM
:VR9131
Page 3
SYSTEM INFO
--- KOVer2 --CL:VR0018
SC
:VR0011
Press [#] button to next page.
Page 4
SYSTEM INFO
--- SOVer--UART
:VR0014
USBH
:VR0011
MODEM
:VR0014
ETHERNET:VR0029
FONT
:VR0025
LCD
:VR0034
Page 8 Page9
SYSTEM INFO
--- HWMVer --CRDL/ETHE:ONCHIP
CLM-MP
: N/A
--- APVer --ULDPM
:VR0026
Castles Technology Co., Ltd.
Page 5
SYSTEM INFO
--- SO Ver2 --PRT:VR0020
RTC
:VR0013
ULDPM :VR0022
PPPMODEM:VR0026
KMS:VR0022
FS:VR0015
Page 6
SYSTEM INFO
--- SO Ver3 --GSM:VR0018
BARCODE :VR0013
TMS:VR0013
TLS
:VR0011
CLVW
:VR0018
CTOSAPI :VR9029
Page 10
SYSTEM INFO
HUSBID:0CA6A050
CUSBID:N/A
--Factory S/N--FFFFFFFFFFFFFFFF
CAEMVL2
:VR91
13
CAEMVL2AP :VR00
05
Confidential • All Right Reserved.
SYSTEM INFO
--EXT SO Ver P.1-CACLMDL
:VR0007
CACLENTRY :VR0007
CAMPP
:VR0006
CAVPW
:VR0018
CAAEP
:VR0004
CAJCT
:VR9407
Pg. 12
Page 11
SYSTEM INFO
--EXT SO Ver P.1-CAVAP:VR0002
CACQP:VR6601
CAIFH
:VR0002
CAEMVL2
:VRA016
CAEMVL2AP :VR0009
3.4. Memory Status
View terminal flash memory and RAM information.
System Menu
System Menu
1.Download AP
2.System Info
3.Memory Status
4.Sys Settings
5.Test Utility
6.Factory Reset
7.Power Off

Press [3] button to enter Memory Status menu.
Memory Status Menu
MEMORY STATUS
--FLASH Memory-Total: 130688KB
Used :52404KB
--SDRAM Memory-Total:
65408KB
Used :38004KB
Castles Technology Co., Ltd.
Confidential • All Right Reserved.
Pg. 13
3.5. System Settings
View or change terminal system settings.
Setting
Descriptions
Key Sound
Enable (Y) or disable (N) the beep sound when
pressing any key.
Exec DFLT AP
Enable (Y) or disable (N) execution of default
selected application.
USB CDC Mode
Enable (Y) or disable (N) USB CDC mode.
FunKey PWD
Enable (Y) or disable (N) password protection to
access function key (0, F1, F2, F3) in Program
Manager.
PMEnter PWD
Enable (Y) or disable (N) password protection to
enter Program Manager.
SET USB Host
Enable (Y) or disable (N) USB host mode.
Base USB CDC
Enable (Y) or disable (N) USB CDC mode in base
unit. [Portable model only]
List SHR Lib
Enable (Y) or disable (N) to list all shared libraries
in Program Manager.
Key MNG Mode

BATThreshld
Battery charging threshold value. [Portable model
only]
Null Cradle
Enable (Y) if base is Type Acradle. [Portable model
only]
Debug Mode
Enable (Y) or disable (N) console debug mode.
Debug Port
Serial port for console debug.
Mobil AutoON
Enable (Y) or disable (N) to auto turn on GSM
module after start up the terminal.
Bklit Auto Off
Enable (Y) or disable (N) Auto OffLCDBacklight
Bklit Off Time
Thresholdof Auto Off LCD Backlight
PWR KEY OFF
Powerkeyfunction, power off (Y) or reboot(N)
RTC Time Zone
Set Time Zone of Real Time Clock.
NTP Enable
Enable (Y) or disable (N) Network Time Protocol.
NTP Update Freq
Frequency of Network Time Protocol updating.
BT DIRECT ACCESS
Enable (Y) or disable (N) Bluetooth direct access
mode.
Castles Technology Co., Ltd.
Confidential • All Right Reserved.
Pg. 14
Halt Timeout
Set timeout for AP to back to Program Manager
whenever AP is in halt state.
PWM Auto
Enable (Y) or disable (N) power saving mode.
PWM Mode
Select (STB) standby mode or (SLP) sleep mode
for power saving mode.
PWM Time
Set time period by which to make terminal getting
into power saving mode from idle state.
Auto Reboot
Terminal will reboot in specific time every day.
Reboot Hour
The specific hour of day for Auto Reboot.
Reboot Min
The specific minuteof day for Auto Reboot.
System Menu
System Menu
1.Download AP
2.System Info
3.Memory Status
4.Sys Settings
5.Test Utility
6.Factory Reset
7.Power Off

Press [4] button to enter System Settings menu.
System Settings Menu
Page 1Page 2
SYS SETTINGS
Key Sound
: Y
Exec DFLT AP
: Y
-Default AP Name
USB CDC Mode
: Y
FunKeyPWD:N
PMEnterPWD:N
2: Next Page
Page 3
Page 4
SYS SETTINGS
Debug Mode: N
Debug Port : X
Mobil AutoON: N
Bklit Auto Off
: N
BklitOff Time
: X
PWR KEY OFF :N
1: Prev2: Next
Castles Technology Co., Ltd.
SYS SETTINGS
SET USB Host: N
Base USB CDC: X
List SHR Lib: N
Key MNG Mode: 0
Bat Threshld: X
Null Cradle : X
1: Prev2: Next
SYS SETTINGS
RTC Time Zon:GMT
NTP Enable:N
NTP Update F:X
1: Prev2: Next
Confidential • All Right Reserved.
Pg. 15
Page 5Page 6
SYS SETTINGS
BT DIRECT ACCESS :X
Halt Timeout
:999
PWM Auto
:N
PWM Mode
: X
PWM Time
SYS SETTINGS
Auto Reboot
:Y
Reboot Hour:00
Reboot Min
:00
1: Prev2: Next
1: Prev Page

Press [*] or [#]button to select setting.

Press [OK] button to change the setting value.

Press [] button to toggle Y  N  Y.

Press [1] button to previous page.

Press [2] button to next page.
Castles Technology Co., Ltd.
Confidential • All Right Reserved.
Pg. 16
3.6. Test Utility
Perform terminal hardware components diagnosis.
System Menu
System Menu
1.Download AP
2.System Info
3.Memory Status
4.Sys Settings
5.Test Utility
6.Factory Reset
7.Power Off

Press [5] button to enter Test Utility menu.
Test Utility Menu
Page 1
Main Menu 0023
1.LCD
2.Keyboard
3.Flash
4.Smart Card
5.Backlight
6.MSR
->
1/3

Press [1] and [OK] to diagnose LCD.

Press [2] and [OK] to diagnose keyboard.

Press [3] and [OK] to diagnose flash memory.

Press [4] and [OK] to diagnose smart card module.

Press [5] and [OK] to diagnose backlight.

Press [6] and [OK] to diagnose magnetic stripe card reader.

Press [#] button to page 2.
Page 2
Main Menu 0023
7.LED
8.RTC
9.Printer
10.Font
11.CL Transparent
12.CL Card Test
-> 2/3
Castles Technology Co., Ltd.
Confidential • All Right Reserved.
Pg. 17

Press[7] and [OK] to diagnose LED.

Press [8] and [OK] to diagnose RTC.

Press [9] and [OK] to check Printer.

Press [10] and [OK] to check FONT file in VEGA3000 UltraLite.

Press [11] and [OK] to check CL transparent.

Press [12] and [OK] to test Cantactless Card.

Press [*] button to page 1.

Press [#] button to page 3.
Page 2
Main Menu 0023
13.SD Card Test
14.Wi-Fi Test
15.Power Saving
16.Comm Menu
17.BT Test
->
3/3

Press [13] and [OK] to execute SD Card Test.

Press [14] and [OK] to testfunctionalityofWiFi.

Press [15] and [OK] to test functionality of power saving.

Press [16] and [OK] to test functionality of multiple communication ways.\

Press [17] and [OK] to testfunctionality of Bluetooth.

Press [*] button to page2.
Castles Technology Co., Ltd.
Confidential • All Right Reserved.
Pg. 18
3.7. Factory Reset
Perform factory reset, all user application, fonts and data will be deleted.
System Menu
System Menu
1.Download AP
2.System Info
3.Memory Status
4.Sys Settings
5.Test Utility
6.Factory Reset
7.Power Off

Press [6] button to enter Factory Reset menu.
FacRest Password
Enter Password:
********

Enter password and press [OK].

Enter factory reset password.(Default password: 12345678)
FacRestPassword
New Password:
********
Confirm Password
********

Enter new password.

Enter new password again to confirm.
Factory Reset
OK to reset?
Castles Technology Co., Ltd.
Confidential • All Right Reserved.
Pg. 19

Press [OK] to execute the Factory Reset.
3.8. Power Off
Power offterminal.
System Menu
System Menu
1.Download AP
2.System Info
3.Memory Status
4.Sys Settings
5.Test Utility
6.Factory Reset
7.Power Off

Press [7] button to power off terminal.
Castles Technology Co., Ltd.
Confidential • All Right Reserved.
Pg. 20
3.9. Password Manager
Change thekeysin Password Manager.
System Menu (Page 2)
System Menu
1.PWDManager
2.ShareobjMng
3.FontMng4.ULD
KEY HASH
5.Plug-in Mng
6.Key Injection
7.HW Detect

Press [1] button to enterPasswordManagermenu.
Password Manager
1.Function Key
2.PMEnter Key
3.KeyInject Key
4.Factory Key

Press [1] button to changeFunction Key password.

Press [2] button to change Program Manager Key password.

Press [3] button to change Key Injection Key password.

Press [4] button to change Factory Reset Key password.
Please refer to the procedure of change Function Key password as below.
FunKey Password
Enter Password:
********

Enter current password. (Default password is "84188062")
Castles Technology Co., Ltd.
Confidential • All Right Reserved.
Pg. 21
FunKey Password
New Password:
********
Confirm Password
********

Enter new password.

Enter new password again to confirm.
User must have to change the Default key to user own key at the first time.
The Default Key Value in Password Manager is as below:
Castles Technology Co., Ltd.
Function Key
84188062
PMEnter Key
NA
KeyInject Key
87654321
Factory Key
12345678
Confidential • All Right Reserved.
Pg. 22
3.10.Share Object Management
View share object in terminal.
System Menu (Page 2)
System Menu
1.PWD Change
2.ShareobjMng
3.FontMng4.ULD
KEY HASH
5.Plug-in Mng
6.Key Injection
7.HW Detect

Press [2] button to enter Share Object Management menu.
Share Object Management Menu
Share objMng
1.Share LIB
2.Share File

Press [1] button to view shared library.

Press [2] button to view shared file.
Castles Technology Co., Ltd.
Confidential • All Right Reserved.
Pg. 23
3.11.Font Mng
View Font Management.
System Menu (Page 2)
System Menu
1.PWD Change
2.ShareobjMng
3.FontMng4.ULD
KEY HASH
5.Plug-in Mng
6.Key Injection
7.HW Detect

Press [3] button to view Font Management.
FontManagment
Font Mng
1.FNT File
2.TTF File

Press [1] button to view FNT Font list.

Press [2] button to view TTF Font list.
Castles Technology Co., Ltd.
Confidential • All Right Reserved.
Pg. 24
3.12.ULD Key Hash
View ULD user key hash value.
System Menu (Page 2)
System Menu
1.PWD Change
2.ShareobjMng
3.FontMng4.ULD
KEY HASH
5.Plug-in Mng
6.Key Injection
7.HW Detect

Press [4] button to view hash value.
USER ENV KEY
DA9C91FE668DF4B6D637
CDBCCEC201444AA2C7FF
USER SIGN KEY
D52F36A1B569B5ABBA4F
EAEFB34BEC000101D58C
Castles Technology Co., Ltd.
Confidential • All Right Reserved.
Pg. 25
3.13.Plug-in Mng
View Plug-in Management.
System Menu (Page 2)
System Menu
1.PWD Change
2.ShareobjMng
3.FontMng4.ULD
KEY HASH
5.Plug-in Mng
6.Key Injection
7.HW Detect

Press [5] button to view Plug-in Management.
Plug-in Mng
1.Info 2.Del

Press [*]or[#]button to select item.

Press [1]button to get item information.

Press [2]button to delete item.
Castles Technology Co., Ltd.
Confidential • All Right Reserved.
Pg. 26
3.14.Key Injection
View Key Injection.
System Menu (Page 2)
System Menu
1.PWD Change
2.ShareobjMng
3.FontMng4.ULD
KEY HASH
5.Plug-in Mng
6.Key Injection
7.HW Detect

Press [6] button to view Key Injection.
KeyInjPassword
Enter Password:
********

Enter password and press [OK].

Enter Key Injection password.(Default password: 87654321)
KeyInj Password
New Password:
********
Confirm Password
********

Enter new password.

Enter new password again to confirm.
Key Injection
Waiting for
Command
Castles Technology Co., Ltd.
Confidential • All Right Reserved.
Pg. 27

Please refer to document of Key Injection which is released by Castles
Technology.
3.15.HW Detect
View Key Injection.
HW TYPE
Original
HW-TYPE : C
New
HW-TYPE : C
Please Any Key.

Press any key to go back to Program Manager.
Castles Technology Co., Ltd.
Confidential • All Right Reserved.
Pg. 28
4. Secure File Loading
Castles implemented an interface in terminal named User Loader(ULD) to provide secure file
loading to system memory. Loading of user application, kernel firmware, font and others
must use User Loader.
The loading process is secure by signing the files using ULD Key System.
4.1. ULD Key System
The ULD Key System uses two key sets for securely managing the kernel
updating and application downloading. Each key set contains two RSA key pairs.
One is used for key encryption and the other is used for signature. These two key
sets are specified as below:
ULD Manufacturer Key Set

ULD Manufacturer Key Encryption Key (RSA)

ULD Manufacturer Signature Key (RSA)
ULD User Key Set

ULD User Key Encryption Key (RSA)

ULD User Signature Key (RSA)
For VEGA3000 UltraLite, the RSA key length is 2048bits.
4.1.1. ULD Manufacturer Key
The system consists of several kernel modules. These kernel modules
are provided by the Manufacturer, and released in CAP format file with
encryption and signing via ULD Manufacturer Keys.
The ULD Manufacturer keys are managed and maintained by the
manufacturer. The manufacturer uses these keys to generate kernel
CAP files for updating the system. However, the system is not permitted
to be updated with these kernel CAP files directly generated by the
manufacturer. This is because only the user can have the privilege to
decide whether the system is to be updated. Therefore, before system
Castles Technology Co., Ltd.
Confidential • All Right Reserved.
Pg. 29
updating, the kernel CAP files must be “signed” via ULD User Key to get
the user permission. For simple expression, we call the kernel CAP files
generated by the manufacturer as “unsigned kernel CAP(s)” and call the
kernel CAP files “signed” by the user later as “signed kenel CAP(s)”.
Notes:
1. The kernel modules are encrypted by a random-generated 3DES
key, which is retrieved from the Key Encryption Block of the CAP by
ULD Manufacturer Key Encryption Key, not directly encrypted by ULD
RSA Key.
2. The “sign” action via ULD User Keys actually is done by” the second
encryption”. “The second encryption” is done by using the randomgenerated 3DES key, which is encrypted by ULD User Key Encryption
Key, to perform Triple DES encryption again on the cipher data segment
of the kernel CAP files. This ensures that the system cannot retrieve the
correct data from the kernel CAPs without the user permission.
ULD Manufacturer
Keys
Kernel Module
CAP Generator
Unsigned Kernel
CAPs
ULD User Keys
Unsigned Kernel
CAPs
Castles Technology Co., Ltd.
CAP Signing Tool
Confidential • All Right Reserved.
Signed Kernel CAPs
Pg. 30
4.1.2. ULD User Key
ULD User Key are used to encrypt and sign the user/shared
applications. In addition, they are as goalkeepers to prevent the system
updating without user permission. This is done by the kernel CAPs
which are encrypted and signed by the manufacturer having to perform
the “signed’ action via ULD User Keys.
Notes: Applications are encrypted by a random-generated 3DES key,
which is retrieved from the Key Encryption Block of the CAP by ULD
User Key Encryption Key, not directly encrypted by ULD RSA Key.
ULD User Keys
Application
CAP Generator
Application CAPs
4.1.3. Key Change
The ULD RSA Keys are able to be changed. The system uses a special
CAP file, KEY CAP, for the manufacturer and user to change their own
keys. The KEY CAP contains a new set of ULD keys (Key Encryption
Key and Signature Key). These new keys are encrypted and signed via
the original keys. In other words, if the user would like to change the
ULD User Keys, they have to use their original ULD User Keys with the
new ULD User Keys to generate a KEY CAP.
Original ULD
Manufacturer/User
Keys
New ULD
Manufacturer/User
Keys
Castles Technology Co., Ltd.
Key CAP Generator
Confidential • All Right Reserved.
User KEY CAP
Pg. 31
4.2. File Signing
4.2.1. Signing Kernel Module
Castles will release new version of kernel module in “unsigned” form.
This files required to sign with ULD User Key before it can load to
terminal.
Castles Technology provideds a tool named “CAP Signing Tool” to
perform this task.
The CAP Signing Tool is located at:
C:\Program Files\Castles\VEGA3000UL\tools\Signing Tool

Run CAP Signing Tool
(VEGA3000 UltraLite)

Insert Key Card and select smart card reader
Castles Technology Co., Ltd.
Confidential • All Right Reserved.
Pg. 32

Enter Key Card PIN

CAP Signing Tool is ready, press “Select MCI File” button to browse
the file.

Output file will be located in “signed” folder.
Castles Technology Co., Ltd.
Confidential • All Right Reserved.
Pg. 33
4.2.2. Signing User Files
Following files are required to sign before load to terminal. This is to
ensure the application data and codes confidential and integrity. The
output file will be “CAP” file which is file format defined by Castles.

User application

User application data files

User application library

Font file

Share library

Share files

System setting

Key CAP (Manufacturer ULD Key Set)
Castles Technology provided a tool named “CAP Generator” to perform
this task.
The CAP Generator is located at:
C:\Program Files\Castles\VEGA3000UL\tools\CAPG (KeyCard)

Run CAP Generator
Castles Technology Co., Ltd.
Confidential • All Right Reserved.
Pg. 34

Insert Key Card and select smart card reader

Enter Key Card PIN
Castles Technology Co., Ltd.
Confidential • All Right Reserved.
Pg. 35

CAP Generator is ready, select the correct Type from the list.

Press “Step 1: Select AP Executable File” to select file to sign. This
is valid for all the files to sign.
Castles Technology Co., Ltd.
Confidential • All Right Reserved.
Pg. 36

Enter file details and press “Step 2: Sign Application” to sign the file.
This is valid for all the files to sign.

The output file will be in a set. A “mci” file with one or more “CAP”
files.CAP file contents the signed file binaries, where MCI file
contents the list of CAP files.
App.CAP
App.mci
Note: If user would like to load multiple set of signed file, create a new
file with extension of “mmci”. Then put the mmci file contents with the list
of mci file.
MultiApp.mmci
Castles Technology Co., Ltd.
Confidential • All Right Reserved.
Pg. 37
4.3. File Loading
There are several ways of loading file to VEGA3000 UltraLite.

Download by User Loader

Download by user application

Download by Castles TMS
User Loader is a tool provided by Castles Technology. It’s the formal way to
download file to terminal.
User may implement their own ways of updating application or files using CTOS
API provided, CTOS_UpdateFromMMCI().
Castles TMS (CTMS or CASTLES Terminal Management System) is provided by
Castles Technology. It’s use to perform remote download via Ethernet,
GPRS/UMTS or modem.
4.3.1. Download by User Loader
The User Loader works for VEGA3000 UltraLite.
The Loader is located at:
C:\Program Files\Castles\VEGA3000UL\tools\Loader

Run User Loader
Castles Technology Co., Ltd.
Confidential • All Right Reserved.
Pg. 38

Select COM port

Browse and select mci file or mmci file

Setup terminal to enter download mode

Press [0] button in Program Manager (PM)

Press [1] button to select “1. Download AP“

Press [1] button again to select download via RS232 or USB
Castles Technology Co., Ltd.
Confidential • All Right Reserved.
Pg. 39

Press “Download” button to start.
Note: To download using USB cable, terminal must enable CDC mode.
Set USB CDC Mode to Y.
SYS SETTINGS
Key Sound
: Y
Exec DFLT AP: Y
-AP Name
USB CDC Mode: Y
FunKeyPWD
: N
PMEnterPWD : N
2: Next Page
Castles Technology Co., Ltd.
Confidential • All Right Reserved.
Pg. 40
4.4. Changing ULD User Key
User may change their ULD User Key Set stored in Key Card. Castles
Technology provided a tool named “Secure Key Generator” to perform this task.

Run Secure Key Generator

Insert Key Card and select smart card reader

Enter Key Card PIN, default PIN is “1234”.
Castles Technology Co., Ltd.
Confidential • All Right Reserved.
Pg. 41

To change Key Card PIN, press “Update PIN” button. If not, please skip this
steps.

Enter new PIN, enter new PIN again to confirm, then press [Enter] button
to change PIN in Key Card.
Castles Technology Co., Ltd.
Confidential • All Right Reserved.
Pg. 42

To view current key set hash value, goto “Option” and select key.
Castles Technology Co., Ltd.
Confidential • All Right Reserved.
Pg. 43

To generate new user key set

Please generate the RSA key by yourself,thelengthof the RSA key set
should be 2048 (bits).

Copy RSA key components to RSA Key for Kenc in Secure Key
Generator.
Castles Technology Co., Ltd.
Confidential • All Right Reserved.
Pg. 44

Generate second RSA key set for Signature.
Castles Technology Co., Ltd.
Confidential • All Right Reserved.
Pg. 45

Click [Get Hash] button to calculate the hash value for key sets.

Please copy down all the values into a text file and keep in a safe place.
You will need this if you need to create duplicate Key Card.

To generate the key CAP for the newly generated user key set, press [Make
Key CAP File] button.
Castles Technology Co., Ltd.
Confidential • All Right Reserved.
Pg. 46

The output file will be located in the Secure Key Generator folder.
SecureKeyGenerator
key.mci
key.cap

To update the newly generated key set to Key Card, press [Save to Card]
button to write the key set to Key Card.
Castles Technology Co., Ltd.
Confidential • All Right Reserved.
Pg. 47
5. Font Management
5.1. Loading New Font

Run FontManager.exe
Located at C:\Program Files\Castles\Font Manager

Select font to download
Castles Technology Co., Ltd.
Confidential • All Right Reserved.
Pg. 48

Press [Setting] button to configure terminal type.

Select VEGA5000, press [Save] button to save and return font manager.

Press [Generate] to create the font file.
Castles Technology Co., Ltd.
Confidential • All Right Reserved.
Pg. 49

Output file “Font.FNT” will be located at sub-directory named “Font” in “Font
Manager” folder.
Font Manager
Font
Font.FNT

Sign the file using CAP Generator, the type must set to “11 – Linux Font”.

Lastly, download the signed file (CAP file) to terminal using Loader.
Castles Technology Co., Ltd.
Confidential • All Right Reserved.
Pg. 50
5.2. Custom Font
User may create font they preferred for displaying or printing on terminal.
There are two zone defined:
Zone 0x00 ~ 0x7F – ASCII characters, you may replace with the font type
preferred or your own language character set.
Zone 0x80 ~ 0xFF – Free to use, you may use for symbols.
Following steps demonstrate how to create a 12x24 font.

Run GLCD Font Creator

Select [File]  [New Font]  [Import An Existing System Font]
Castles Technology Co., Ltd.
Confidential • All Right Reserved.
Pg. 51

Select the font needed, simply choose a font size. The final value of font size
should be determine by the minimum pixel width. You may need to repeat this
steps few times to find the best fit font size.

Set the import range from 0 to 127.
Castles Technology Co., Ltd.
Confidential • All Right Reserved.
Pg. 52

Check the minimum pixel width and height.

If the pixel width of the font size is larger than expected, then you have to
repeat the previous steps to import font with smaller size.

Use the following buttons to adjust the font size to match with expected font
size.
Add
columnonrigh
Removecolum
nonleft
Add column
on left
Removecolumn
onright
Add row on
top
Remove row
on bottom
Add row
on bottom
Castles Technology Co., Ltd.
Remove
row on top
Confidential • All Right Reserved.
Pg. 53

After adjust font size, select [File]  [Export for MicroElektronika].

Select output format as [mikroC].
Castles Technology Co., Ltd.
Confidential • All Right Reserved.
Pg. 54

Remove comment “// Code for char
“ from offset 0x00 to 0x1F. Remove
empty line if found. Then click [Save] button to save to file.
Remove
Remove
Remove
Remove

Run Font Manager Tool.

Click [Setting] button
Castles Technology Co., Ltd.
Confidential • All Right Reserved.
Pg. 55

Enter the file name, font id, and select the size.

Click [Create] button, and select the C file previously created using GLCD
Font Generator.
Castles Technology Co., Ltd.
Confidential • All Right Reserved.
Pg. 56

Select [Font Manager] tab and tick the newly createdfont, and press
[Generate] button to export to FNT file.
Castles Technology Co., Ltd.
Confidential • All Right Reserved.
Pg. 57

Use CAP Generator to conver the FNT file to CAP.
Set type to [11 – Linux Font], press [Step 1] button select the FNT file. Then
press [Step 2] to generate CAP file.

Download the font CAP file to terminal.

In terminal application, add following code to display message using the
newly created font.
CTOS_LanguageConfig(0xA000,d_FONT_12x24,0,d_FALSE);
CTOS_LanguageLCDSelectASCII(0xA000);
CTOS_LCDTPrintXY(1, 1, "ABCDEFGH");
Or print message using the newly created font.
CTOS_LanguagePrinterSelectASCII(0xA000);
CTOS_PrinterPutString("ABCDEFGH");
Castles Technology Co., Ltd.
Confidential • All Right Reserved.
Pg. 58
5.3. Using TrueType Font (TTF)
TrueType Font (TTF) is supported in VEGA3000 UltraLite.You may download the
TrueType font preferred to terminal for displaying or printing.
Following steps demonstrate how to use “Cooper Black” TrueType font.

Copy the TTF file needed to a empty folder.
TTF
COOPBL.TTF

Use CAP Generator to conver the TTF file to CAP.
Set type to [11 – Linux Font], press [Step 1] button select the TTF file.
Then press [Step 2] to generate CAP file.

Download the font CAP file to terminal.
Castles Technology Co., Ltd.
Confidential • All Right Reserved.
Pg. 59

In terminal application, add following code to display message using the
newly added font.
CTOS_LCDTTFSelect("COOPBL.TTF", 0);
CTOS_LCDFontSelectMode(d_FONT_TTF_MODE);
CTOS_LCDTSelectFontSize(0x203C); // 32x60
CTOS_LCDTClearDisplay();
CTOS_LCDTPrintXY(1, 1, "Hello World");
Or print message using the newly added font.
CTOS_PrinterTTFSelect("COOPBL.TTF", 0);
CTOS_PrinterFontSelectMode(d_FONT_TTF_MODE);
CTOS_LanguagePrinterFontSize(0x203C, 0, 0); // 32x60
CTOS_PrinterPutString("Hello World");
Castles Technology Co., Ltd.
Confidential • All Right Reserved.
Pg. 60
6. FCC Warning
Federal Communication Commission interference statement.This equipment has been
tested and found to comply with the limits for a Class B digital device, pursuant to part
15 of the FCC rules. These limits are designed to provide reasonable protection against
harmful interference in a residential installation. This equipment generates, uses and
can radiate radio frequency energy and, if not installed and used in accordance with the
instructions, may cause harmful interference to radio communications. However, there is
no guarantee that interference will not occur in a particular installation. If this equipment
does cause harmful interference to radio or television reception, which can be
determined by turning the equipment off and on, the user is encouraged to try to correct
the interference by one or more of the following measures: -Reorient or relocate the
receiving antenna. -Increase the separation between the equipment and receiver. Connect the equipment into an outlet on a circuit different from that to which the receiver
is connected. -Consult the dealer or an experienced radio/TV technician for help.
FCC Caution
This device complies with Part 15 of the FCC Rules. Operation is subject to the
following two conditions:
(1) this device may not cause harmful interference and
(2) this device must accept any interference received, including interference that may
cause undesired operation
RF Exposure Warning
The equipment complies with RF exposure limits set forth for an uncontrolled
environment. The antenna(s) used for this transmitter must not be co-located or
operating in conjunction with any other antenna or transmitter.
You are cautioned that changes or modifications not expressly approved by the party
responsible for compliance could void your authority to operate the equipment.
Castles Technology Co., Ltd.
Confidential • All Right Reserved.
Pg. 61
7.
NCCWarning
根據 NCC 低功率電波輻射性電機管理辦法規定:
第十二條
經型式認證合格之低功率射頻電機,非經許可,公司、商號或使用者均不得
擅自變更頻率、加大功率或變更原設計之特性及功能。
第十四條
低功率射頻電機之使用不得影響飛航安全及干擾合法通信;經發現有干擾現
象時,應立即停用,並改善至無干擾時方得繼續使用。
前項合法通信,指依電信法規定作業之無線電通信。
低功率射頻電機須忍受合法通信或工業、科學及醫療用電波輻射性電機設備
之干擾。

Source Exif Data:
File Type                       : PDF
File Type Extension             : pdf
MIME Type                       : application/pdf
PDF Version                     : 1.6
Linearized                      : Yes
Author                          : Anfernee Lin
Create Date                     : 2016:08:15 17:14:49+08:00
Modify Date                     : 2016:09:14 09:02:08+08:00
Subject                         : VEGA5000(S) Book 2 User Manual
Language                        : zh-TW
Tagged PDF                      : Yes
XMP Toolkit                     : Adobe XMP Core 5.4-c005 78.147326, 2012/08/23-13:03:03
Creator Tool                    : Microsoft® Word 2010
Metadata Date                   : 2016:09:14 09:02:08+08:00
Format                          : application/pdf
Description                     : VEGA5000(S) Book 2 User Manual
Creator                         : Anfernee Lin
Title                           : VEGA5000(S) Book 2 User Manual
Producer                        : Microsoft® Word 2010
Document ID                     : uuid:407b3a41-aefb-4e4a-a5ea-5bededaffc0f
Instance ID                     : uuid:0255655d-cc6e-4944-b5cb-e8f45860a469
Page Count                      : 62
EXIF Metadata provided by EXIF.tools
FCC ID Filing: WIYVEGA3000-UL

Navigation menu