Invenco Group G7UPC Payment terminal with RF Card Reader User Manual Manuals

Invenco Group Ltd Payment terminal with RF Card Reader Manuals

Manuals

G7OPT Integrator ManualDWI-00175 S1 R15Dec 05, 2016S1 Security Level GuideContains sensitive information.Do not supply to any party outside of Invenco without authority from the management team.Document must only be distributed under Non-Disclosure Agreement (NDA).
Contents1 Introduction 11.1ImportantRelatedDocuments .................................. 11.2 Important Information on Radio Frequency Components . . . . . . . . . . . . . . . . . . . 11.2.1FCCComplianceStatements .............................. 11.2.2 Industry Canada Compliance Statements . . . . . . . . . . . . . . . . . . . . . . . 22 Shipment Verification 32.1Introduction ............................................ 32.2ShipmentChecks ......................................... 42.2.1BulkPackagingCheck.................................. 42.2.2Serial-numberCheck................................... 42.2.3IndividualBoxChecks .................................. 42.3IntegrityVerification........................................ 62.3.1InitialPower-onCheck .................................. 62.3.1.1TamperIndications ............................... 62.3.2 Hardware Certification Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72.4VersionVerification ........................................ 92.4.1 Hardware Certification Revision . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 92.4.2SoftwareVersionNumbers ............................... 102.5Communications.......................................... 122.5.1ReceiptVerification.................................... 122.5.2ExceptionEscalation................................... 123 Tampers 133.1Background–TamperTypes................................... 133.1.1TamperIndications.................................... 133.2RemovalTampers......................................... 143.2.1 Installation with Removal-Tamper Sensors . . . . . . . . . . . . . . . . . . . . . . . 153.2.2 Removal-Tamper Clearing and Promotion to Normal Operation . . . . . . . . . . . 153.3 Retrieving logs and exporting parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . 174 Key Injection 194.1Background ............................................ 194.2Terminology ............................................ 194.3Installation ............................................. 194.4Swap-outs ............................................. 195 Appendices 205.1G7SDCInstallationGuide .................................... 205.1.1Introduction ........................................ 205.1.2Installation......................................... 215.1.2.1Environment................................... 215.1.2.2Tools....................................... 21DWI-00175 S1 R15 i
5.1.2.3Method...................................... 215.1.3Connection ........................................ 235.1.4BasicMaintenance.................................... 245.1.4.1Cleaning..................................... 245.1.4.2SecurityChecks................................. 245.1.4.2.1 Signs of Tampering . . . . . . . . . . . . . . . . . . . . . . . . . . 245.1.4.2.2 Attached Devices and/or Overlays . . . . . . . . . . . . . . . . . . 255.1.4.3BatteryReplacement.............................. 255.1.4.3.1 Battery Type and Precautions . . . . . . . . . . . . . . . . . . . . 255.1.4.3.2Procedure ............................... 255.1.5Drawings ......................................... 275.2G7UPCInstallationGuide .................................... 295.2.1Introduction ........................................ 295.2.2NFCAntennaInstallation ................................ 305.2.2.1 Antenna Kit Description . . . . . . . . . . . . . . . . . . . . . . . . . . . . 305.2.2.2AntennaCutouts ................................ 305.2.2.3InstallationSequence.............................. 315.2.3 UPC Installation - Invenco Housing Option . . . . . . . . . . . . . . . . . . . . . . . 325.2.3.1Environment................................... 325.2.3.2Tools....................................... 335.2.3.3Method...................................... 335.2.3.4Connection ................................... 365.2.4BasicMaintenance.................................... 385.2.4.1Cleaning..................................... 385.2.4.2SecurityChecks................................. 385.2.4.2.1 Signs of Tampering . . . . . . . . . . . . . . . . . . . . . . . . . . 385.2.4.2.2 Attached Devices and/or Overlays . . . . . . . . . . . . . . . . . . 395.2.4.3BatteryReplacement.............................. 395.2.4.3.1 Battery Type and Precautions . . . . . . . . . . . . . . . . . . . . 395.2.4.3.2Procedure ............................... 395.2.5Drawings ......................................... 416 References 447 Document History 45DWI-00175 S1 R15 ii
CHAPTER 1IntroductionThis document describes instructions, policies and procedures, for integrators of Invenco Group’ssecurity products into larger systems (e.g. into payment terminals for petrol station forecourts). Itssecurity classification reflects that it is available only to parties approved by Invenco; anyone inpossession of it is responsible for maintaining confidentiality of the manual itself and all informationcontained herein.1.1 Important Related DocumentsInvenco’s security products manage sensitive information. Accordingly the company imposes certainstrictures which apply even while Invenco does not have custody of its products. These stricturesmust be adhered to by integrators (and their agents such as service technicians – Invenco makes nodistinction for the purpose of responsibility). They are compiled separately into [G7INTSEC] which isavailable publicly; they are not the focus of this document.Similarly this document is not a developer manual: it does not duplicate information essential toprogrammers writing software to work with Invenco’s products. Software development is a challengingtask for integrators; Invenco provides extensive support for it. Integrators should approach the companyfor resources and assistance.1.2 Important Information on Radio Frequency ComponentsThis section applies to the G7UPC which includes a Near Field Communication (NFC) module andantenna for use with contactless cards.1.2.1 FCC Compliance StatementsTHIS DEVICE COMPLIES WITH PART 15 OF THE FCC RULES. OPERATION IS SUBJECT TO THEFOLLOWING TWO CONDITIONS:1. THIS DEVICE MAY NOT CAUSE HARMFUL INTERFERENCE, AND2. THIS DEVICE MUST ACCEPT ANY INTERFERENCE RECEIVED, INCLUDINGINTERFERENCE THAT MAY CAUSE UNDESIRED OPERATION.THE GRANTEE IS NOT RESPONSIBLE FOR ANY CHANGES OR MODIFICATIONS NOTEXPRESSLY APPROVED BY THE PARTY RESPONSIBLE FOR COMPLIANCE. SUCHMODIFICATIONS COULD VOID THE USER’S AUTHORITY TO OPERATE THE EQUIPMENT.Note: This equipment has been tested and found to comply with the limits for a Class B digital device,pursuant to part 15 of the FCC Rules. These limits are designed to provide reasonable protectionagainst harmful interference in a residential installation. This equipment generates uses and can radiateradio frequency energy and, if not installed and used in accordance with the instructions, may causeDWI-00175 S1 R15 1
G7OPT Integrator Manual, DWI-00175 S1 R15harmful interference to radio communications. However, there is no guarantee that interference will notoccur in a particular installation. If this equipment does cause harmful interference to radio or televisionreception, which can be determined by turning the equipment off and on, the user is encouraged to tryto correct the interference by one or more of the following measures:• Reorient or relocate the receiving antenna.• Increase the separation between the equipment and receiver.This device has been designed to operate with the G7UPC NFC module antenna only. A picture of thisantenna is shown in §5.2.2.1 Antenna Kit Description. The use of other antennas with this device isstrictly prohibited.1.2.2 Industry Canada Compliance StatementsThis device complies with Industry Canada’s license-exempt RSSs. Operation is subject to the followingtwo conditions:1. This device may not cause interference; and2. This device must accept any interference, including interference that may cause undesiredoperation of the device.Le présent appareil est conforme aux CNR d’Industrie Canada applicables aux appareils radio exemptsde licence.L’exploitation est autorisée aux deux conditions suivantes :1. l’appareil ne doit pas produire de brouillage, et2. l’utilisateur de l’appareil doit accepter tout brouillage radioélectrique subi, même si le brouillageest susceptible d’en compromettre le fonctionnement.Chapter 1. Introduction 2
CHAPTER 2Shipment Verification2.1 IntroductionThis chapter provides a guide to the security verification of the G7OPT/SDC/UPC on receipt.It is necessary that, before the units are deployed, their integrity is verified and there is no evidence ofthem having been compromised or altered during shipping.It is also essential that full asset-tracking of units takes place during shipping, to ensure earlyidentification of stolen units.Finally it must be verified that the version of each unit is as expected and as required for deployment.The processes described outline the verification steps that should be taken, and the appropriateescalation process to follow when relevant.DWI-00175 S1 R15 3
G7OPT Integrator Manual, DWI-00175 S1 R152.2 Shipment ChecksUnpacking and package-checking of the shipment must include the following checks as a minimum:• validation of correct delivery• validation of bulk packing is intact• validation of correct quantity and serial numbers• validation of individual box tamper-seals.2.2.1 Bulk Packaging CheckBefore the individual items are removed from the bulk package, the bulk package must be inspectedfor damage or tampering. If evidence of damage or tampering is found, the following steps should betaken:• take photographic evidence of the damage/tampering• raise an exception report including the photographic evidence; see §2.5.2 Exception Escalation.2.2.2 Serial-number CheckIt is important not only that quantities are validated but also that the serial numbers of the expecteditems correspond to the packing-slip.Each box must contain the serial number of the enclosed product, which must be checked off againstthe packing-slip.Should the contents of an individual box not be validated as correct at this stage, a check for the correctserial number must be performed at the time of opening the box.Should a serial number be missing or unrecorded on the packing-slip an exception must be raised asdefined in §2.5.2 Exception Escalation.2.2.3 Individual Box ChecksEnsuring the packaging of the individual item is intact is essential and must be performed on all itemsreceived.The following process is to be used to ensure each item has been received with integrity intact:• check that the tamper-seals (top and bottom), as shown in picture below, are correct by inspectingthem for the following signs of tampering:–the seal is as per the image below–the seal does not show the words VOID–the seal has not been cut–there are not multiple seals overlaid–the seal has not been covered by clear tape–there is only one seal on the top and bottom of the box• check that the packaging has not been opened or cut in any way• check that the box is not damaged.Chapter 2. Shipment Verification 4
G7OPT Integrator Manual, DWI-00175 S1 R15Fig. 2.1: Good tamper sealFig. 2.2: Bad tamper sealChapter 2. Shipment Verification 5
G7OPT Integrator Manual, DWI-00175 S1 R152.3 Integrity VerificationEnsuring that the unit is secure and has not been tampered must be performed at staging before thedevice is deployed to site.If the device is found to be in a compromised state the escalation process below must be followed.To check the integrity of the unit the following two processes must be followed:2.3.1 Initial Power-on CheckWhen the unit is powered on, it determines whether an exception occurred during its power-on self-testor any tampers were triggered while it was powered down. In either case the device will place itself in arestricted mode, with distinctive indications given according to whether it was Destructive Secure Resetor removal-tampered.2.3.1.1 Tamper IndicationsA DSR is a dramatic response to what a unit interprets as an integrity violation: the device shuts downinstantly, wiping its security keys and other sensitive information. The device is not ruined but it is“bricked”: it cannot operate in any capacity and can be disassembled, repaired and reinitialized onlyby Invenco – a return-to-base procedure. Returning a destructive-tampered unit to Invenco requires anauditable process with formal changes of custody, probably including packaging, transport and staging.The G7SDC will display a “DT event” screen; the G7UPC will display a fast (twice a second) red keypadLED indication:Fig. 2.3: SDC Destructive Tamper (DT) event screenIn contrast, the removal tamper response is intentionally less drastic. Removal tamper sensors protecta unit that is intact: it may have been removed – even maliciously – from a system in which it wasintegrated, but the unit’s integrity has not been violated and it is still operational (albeit in a restrictedmode). Significantly its cryptographic keys have not been erased, although it remains incapable offinancial transactions until restored to normal operation from the removal-tampered state. If necessarythe unit can still perform a DSR.The G7SDC will display a “RT event” screen; the G7UPC will display a slow (once a second) red keypadLED indication:Chapter 2. Shipment Verification 6
G7OPT Integrator Manual, DWI-00175 S1 R15Fig. 2.4: SDC Removal Tamper (RT) event screenIf this occurs, follow the exception escalation process defined in §2.5.2 Exception Escalation.2.3.2 Hardware Certification StatusThe second test – assuming the device has booted successfully – is to check that its certificates areloaded and intact.This test requires the use of TMSlite to query the key-store status using the following steps:1. Connect the terminal to the workstation that is running TMSlite, with an intermediate protocolconverter such as Invenco’s external application-software controller.2. (First time only) Click Add, enter the terminal connection details, then click OK.3. Select the terminal from the left-hand list, click Connect, then select “UPC” from the filter drop-down list.4. Scroll down the list and make sure the properties upc.certificate.housekeeping andupc.certificate.module are present and not empty. If either property is missing, follow theexception escalation process defined in §2.5.2 Exception Escalation.5. Repeat for the SDC by selecting “SDC” from the filter drop-down list, and make sure the propertiessdc.certificate.housekeeping and sdc.certificate.module are present and non-empty.Fig. 2.5: TMSlite – UPC certificate entries (red text example only)Chapter 2. Shipment Verification 7
G7OPT Integrator Manual, DWI-00175 S1 R15Note: For more details on using TMSlite, please refer to the TMSlite manual.Chapter 2. Shipment Verification 8
G7OPT Integrator Manual, DWI-00175 S1 R152.4 Version VerificationBefore a unit is deployed into a production environment, version information should be validated toensure it is correct.Use the following process to verify the hardware certification revision and software version information.2.4.1 Hardware Certification RevisionIdeally, a hardware certification revision number check can be done at the same time as verifying theserial number.On the back of each unit is a product information sticker which contains, amongst other information, aserial number and the hardware certification revision number.Inspect this sticker and confirm the certification revision is correct.Fig. 2.6: G7SDC serial number and hardware certification revision numberChapter 2. Shipment Verification 9
G7OPT Integrator Manual, DWI-00175 S1 R15Fig. 2.7: G7UPC serial number and hardware certification revision numberNote: The red content in the above images is for illustrative purposes for this document and must notexist on actual product labels.2.4.2 Software Version NumbersTo obtain the core security modules’ version information, the terminal management interface will needto be interrogated.Using TMSlite or an in-house proprietary terminal management tool, retrieve the version informationand validate the information tags below.Note: The paramount firmware-versions have the tags "upc.root.ver" and "sdc.root.ver" for theirrespective devices. These versions are controlled by the build system which ensures that all firmwarecomponents – including the Boot Monitor, Root Filesystem and Tamper Monitor – are built and versionedat the same time.• Unified PIN pad and Card-Reader: "upc.*.ver", where *is one of:–hw–bootmonitor–init–kernel–root–safekernel–saferoot–emvl1• Secure Display Unit: "sdc.*.ver", where *is one of:Chapter 2. Shipment Verification 10
G7OPT Integrator Manual, DWI-00175 S1 R15–hw–bootmonitor–init–kernel–root–safekernel–saferoot–softkey–touchscreenfrmChapter 2. Shipment Verification 11
G7OPT Integrator Manual, DWI-00175 S1 R152.5 Communications2.5.1 Receipt VerificationInvenco requests confirmation that the shipment has been received in full. This should be sent toorders@invenco.com.This communication must confirm the following:• Expected quantity has been received.• All packages/boxes are in good order and security seals intact.• All serial numbers are accounted for.2.5.2 Exception EscalationShould any of the checks detailed in §2.2 Shipment Checks identify that the delivery has beencompromised, or if the checks detailed in §2.3 Integrity Verification and §2.4 Version Verification arenot correct, the following escalation process must be followed:• Send an email to orders@invenco.com detailing the exception, including all the evidence outlinedin the verification processes above.• If possible, follow through with a phone call to Invenco using the contact details provided on thecontact page of the Invenco website: http://www.invenco.com/contact• Notify the shipping/courier of this exception if applicable.Chapter 2. Shipment Verification 12
CHAPTER 3Tampers3.1 Background – Tamper TypesMany Invenco products support two types of tamper protection; in increasing order of security they are:• removal tamper• destructive tamper, also known as “Destructive Secure Reset” (DSR).3.1.1 Tamper IndicationsA DSR is a dramatic response to what a unit interprets as an integrity violation: the device shuts downinstantly, wiping its security keys and other sensitive information. The device is not ruined but it is“bricked”: it cannot operate in any capacity and can be disassembled, repaired and reinitialized onlyby Invenco – a return-to-base procedure. Returning a destructive-tampered unit to Invenco requires anauditable process with formal changes of custody, probably including packaging, transport and staging.The G7SDC will display a “DT event” screen; the G7UPC will display a fast (twice a second) red keypadLED indication:Fig. 3.1: SDC Destructive Tamper (DT) event screenIn contrast, the removal tamper response is intentionally less drastic. Removal tamper sensors protecta unit that is intact: it may have been removed – even maliciously – from a system in which it wasintegrated, but the unit’s integrity has not been violated and it is still operational (albeit in a restrictedmode). Significantly its cryptographic keys have not been erased, although it remains incapable offinancial transactions until restored to normal operation from the removal-tampered state. If necessarythe unit can still perform a DSR.DWI-00175 S1 R15 13
G7OPT Integrator Manual, DWI-00175 S1 R15The G7SDC will display a “RT event” screen; the G7UPC will display a slow (once a second) red keypadLED indication:Fig. 3.2: SDC Removal Tamper (RT) event screen3.2 Removal TampersRemoval tampers are designed with integrators and their agents in mind; they maintain financial securitywhile allowing legitimate operations, such as installation or swap-out by service staff. While in theremoval-tamper state, the following operations are possible using TMSlite:• clearing removal tampers• installing packages• retrieving logsThe following sections describe the steps for:• connecting an Invenco product to external tamper sensors that will protect it within an integratedsystem• clearing the removal-tamper state and promoting the unit to normal operation.The reverse steps, for removing a unit, need no explanation; they should be straightforward and largelymechanical. In contrast with installing a device and clearing its removal-tampered state, cryptographicauthentication is unnecessary. The main security considerations when removing a unit are to avoid anaccidental DSR in the process and not to lose it afterwards.Note: It is strongly recommended to retrieve all logs before unit removal, for problem-solving androot-cause analysis.Chapter 3. Tampers 14
G7OPT Integrator Manual, DWI-00175 S1 R153.2.1 Installation with Removal-Tamper Sensors1. Obtain access to where the unit will be integrated into its system, paying attention to authorisationby accredited staff.2. Obtain custody of the unit and any documentation, cables and other ancillary products.Adhere to the requirements for custody change, unpacking, etc. in [G7INTSEC] as appropriate.3. Mount the unit, and others which it will be connected to, in accordance with the integrator’sinstructions and those of Invenco.See §5.1 G7SDC Installation Guide or §5.2 G7UPC Installation Guide for details. If instructionsconflict, Invenco’s must take precedence; failure to observe this may compromise the unit’ssecurity and/or void its standards certification.4. Connect the unit to all others that it is being integrated with.Tamper connections will vary according to whether the Invenco unit is integrated standalone or inan Invenco housing. Both methods are described in the appended installation guides. Removaltampers are likely to have been connected already in the course of mounting the unit; additionalconnections for tampers should be unnecessary.3.2.2 Removal-Tamper Clearing and Promotion to Normal Operation1. The unit is now integrated into the system; it is in the removal-tampered state. Power it up andverify that restricted-mode operation is possible.In removal tampered state:• the UPC will display a slow (once a second) red flashing LED• the SDC will display a “removal tamper” error message2. To clear the removal-tampered state and enable the unit for normal operation requires acryptographically authenticated challenge and response between it and an authorisation device.This transaction is performed under dual control, the two parties being a field engineer and acontrol-centre operator.(a) The field engineer must first request a challenge token from the integrated unit. This isachieved by:i. Connect the terminal to the workstation running TMSlite.ii. (First time only) Click Add, enter the terminal connection details, then click OK.Fig. 3.3: Terminal connection details.iii. Select the terminal from the left-hand list, then click Connect.Chapter 3. Tampers 15
G7OPT Integrator Manual, DWI-00175 S1 R15iv. Selecting the menu option Tools > Tamper Clear.Fig. 3.4: TMSlite “Tamper Clear” menu optionv. Choosing either “UPC Tamper Clear” or “SDC Tamper Clear” from the dialog box drop-down menu.Fig. 3.5: TMSlite “Tamper Clear” dialog boxvi. Clicking “Challenge” to display the required challenge token.(b) Next, the field engineer must log in to the control centre and post the token and the device’sserial number into an installation authorisation request.(c) The control-centre operator must now approve the request (if they deem it valid), thengenerate an authorisation token and return it to the field engineer.(d) The field engineer submits the authorisation token to the device by keying it in manually andclicking “Apply”.Note:• The display unit (SDU/SDC) and keypad (UPC) must be connected together throughout thisprocess.• The challenge / response operation must be completed within 30 minutes; if not, a new challengetoken must be generated and the process repeated.The unit itself is now in normal mode and ready for operation. Devices that it is integrated with mayrequire additional steps; consult product manuals.Chapter 3. Tampers 16
G7OPT Integrator Manual, DWI-00175 S1 R153.3 Retrieving logs and exporting parametersIt is strongly recommended to retrieve all logs before unit removal, for problem-solving and root-causeanalysis.1. Select menu item Tools > Retrieve Logs:Fig. 3.6: Menu item Tools > Retrieve Logs2. Select the desired subsystem (e.g. UPC) and the number of log files to retrieve, then click OK.Fig. 3.7: Specify logs to retrieve3. Specify the location to save the retrieved log files, then click Open.Fig. 3.8: Specify save locationChapter 3. Tampers 17
G7OPT Integrator Manual, DWI-00175 S1 R154. The Task list will display “Get Logs Finished” when operation is complete and the log files havebeen saved to the specified location.Fig. 3.9: Task list: “Get Logs Finished”5. Select menu item Tools > Export Parameters:Fig. 3.10: Menu item Tools > Export Parameters6. Specify the location to save the exported parameter file, then click Save.Fig. 3.11: Specify save location7. The exported parameters will be saved in the specified location as a comma-separated-value(CSV) file.Chapter 3. Tampers 18
CHAPTER 4Key Injection4.1 BackgroundIn order to perform financial operations, each terminal must be injected with a cryptographic key at timeof installation. Keys are injected using Invenco Cloud Solutions (ICS), a secure web-service for remotelymanaging and monitoring Invenco terminals; this process is known as Remote Key Injection (RKI).4.2 TerminologyA terminal is associated with a site. A site is associated with a customer ; a customer is associated withboth a key group and a vendor, from whom the terminals have been purchased.4.3 InstallationCompleting installation requires a terminal to be registered with a specific customer within ICS, and“moved” to the associated site. This initiates an automatic RKI request, which must be approved by twoseparate authorised customer personnel, within the web-interface.Once the RKI request has been processed, a job is scheduled within ICS to perform key injection.This occurs when the terminal is connected and powered-up for the first time via an available internetconnection, either on-site, or at an appropriate staging area.Once key injection has occurred, the terminal is ready to perform financial operations, e.g. accept creditcard payments.4.4 Swap-outsSwapping out a terminal requires the old terminal to be moved within ICS, from the customer site toa designated repair site. A replacement terminal is then installed as normal, following the proceduredescribed for §4.3 Installation.DWI-00175 S1 R15 19
CHAPTER 5Appendices5.1 G7SDC Installation Guide5.1.1 IntroductionThe G7SDC (Secure Display Controller) is a device for presenting both secured and open information,and for receiving customer selections during transaction processing. Its design is intended to complywith applicable security certification requirements of the Payment Card Industry (PCI). The G7SDC isintended to operate in conjunction with the G7UPC (Unified PIN pad / Card-reader) and an externalapplication host.The SDC is a highly secure device. However, some of its security features are reliant on the method ofinstallation; therefore please pay careful attention to the requirements outlined in this document.DWI-00175 S1 R15 20
G7OPT Integrator Manual, DWI-00175 S1 R155.1.2 Installation5.1.2.1 Environment• The SDC must be mounted in some form of cabinet that provides adequate protection of theSDC’s rear from the environment.• The cabinet must restrict access to the rear of the SDC by unauthorized persons.• The mounting surface must be vertical and flat.• The mounting surface should not be in the direct line-of-sight of any video camera, unless theuser’s body will provide adequate blocking of that view of the SDC in use.• The SDC can be mounted at any height that is suitable for the majority of users; this would typicallybe above the mounted height of the associated UPC.• Although the SDC is weather-resistant, the cabinet should be sheltered from rain, or shouldprovide a canopy.5.1.2.2 ToolsFor this guide, we assume that the cabinet has been prepared with the appropriate cut-out prior toinstallation. Please see §5 Cutout for details.The only tool required for installation is a 3mm hex (Allen) key. The shaft of the key should be at least100mm long for ease of use.5.1.2.3 Method1. Check that the cabinet cut-out is free of burrs and ripples and that all the mounting holes are clear.2. Check the SDC packaging for signs of tampering. If the factory seals are not intact DO NOT installthe SDC.3. Unpack the SDC carefully. Again check for signs of tampering, both with the SDC and with itsrubber gasket.4. Check that the rubber gasket is placed the correct way up on the SDC. It must be seated flat onthe SDC case:Fig. 5.1: Gasket Upside-downChapter 5. Appendices 21
G7OPT Integrator Manual, DWI-00175 S1 R15Fig. 5.2: Gasket Right Way Up5. Place the SDC from the outside of the cabinet into the cut-out. Check that the SDC sits flat againstthe cabinet and that the gasket is not rippled or folded anywhere.Fig. 5.3: Mounting Holes6. Insert the sixteen mounting screws around the SDC but do not tighten them.7. Ensure the SDC is aligned nicely in the cutout, then tighten all sixteen mounting screws.8. Discard the SDC packaging in accordance with local regulations.Chapter 5. Appendices 22
G7OPT Integrator Manual, DWI-00175 S1 R155.1.3 ConnectionThis document assumes that the SDC will be installed at the same time as both a G7UPC and a G7APC.Fig. 5.4: ConnectionsThere are at least seven connections to be made to the SDC:1. Connect a DC power cable between the “APC PWR” socket and the “PWR OUT-L” socket on theAPC.2. Connect a USB A-B cable between the “APC USB” port and a “USB-L” port on the APC.3. Connect an HDMI cable between the “APC VIDEO” socket and the “LCD-L” socket on the APC.4. Connect a DC power cable between the “UPC PWR” socket and the “PWR” socket on the UPC.5. Connect a USB A-B cable between the “UPC USB” port and the “USB” port on the UPC.6. Connect an audio cable between the “UPC AUDIO” socket and the “AUD” socket on the UPC.7. Connect a USB A-B cable between the “BAR CODE” socket and the “BARCODE USB” port onthe UPC.Chapter 5. Appendices 23
G7OPT Integrator Manual, DWI-00175 S1 R155.1.4 Basic Maintenance5.1.4.1 CleaningThe G7 modules are intended for use in the harsh environment of a fuelling station forecourt. As suchthey need little maintenance to keep them looking good.• Use a soft cloth dampened with water for daily cleaning.• If grime builds up, use a diluted mild detergent on a soft cloth.•Take extra care when cleaning the display window:–Use only a diluted, mild, liquid soap or detergent and a soft, clean cloth.–Rinse the detergent off carefully, using minimal pressure, before drying the display with aclean, dry, lint-free or microfibre cloth.– CAUTION Do NOT rub the display if it is dry. Accumulated dust may scratch the surface anddegrade the barcode reading function.•CAUTION Do NOT use petroleum-based solvent cleaners. They may damage surfaces, makingthe unit much harder to clean, and shorten the life of the parts.•CAUTION Do NOT use a high-pressure hose to clean the SDC.5.1.4.2 Security ChecksThe module is a transaction-processing device; it will come to the attention of fraudsters. It must beinspected daily:• for signs of tampering; and• for any unauthorised devices that may have been attached or overlaid onto the module.If there are any signs of tampering of any kind:1. immediately stop the normal operation of the G7 system2. log a security issue with the support agent’s helpdesk3. take photos of any unauthorised devices or modifications4. record details of anyone subsequently interfering with the G7 system.Where destructive or malicious tampering has occurred or is suspected, the affected module/s mustbe returned to Invenco for inspection, validation and possibly repair and reinitialization. Procedures forsecure removal, shipping and changes of custody must be followed throughout by all parties involved.If there are no signs of tampering but it is known or suspected that security keys have beencompromised, the keys must be replaced with new ones.5.1.4.2.1 Signs of TamperingCheck for the following:• damage to, or apparent discoloration of any of the plastic parts• any visible wires anywhere on the module• on a UPC: shims, scratches or filed surfaces anywhere around or in the mouth of the card reader• holes in any surface of the plastic parts (particularly above the keypad area on a UPC).• functional indications that the module is in removal-tampered mode:–On a G7SDC:Chapter 5. Appendices 24
G7OPT Integrator Manual, DWI-00175 S1 R15*a secure prompt will be shown, overwriting any other display, which indicates clearly thatthe module is in removal-tampered mode; and*the module and its companion UPC will no longer perform transactions normally – forexample, touchscreen functions will all be disabled.–On a G7UPC:*the module’s LEDs will flash red, alternating between on and off every half-second*the module and its companion SDC will no longer perform transactions normally – forexample, PIN entry will be disabled.• functional indications that the module has been destructively tampered:–On a G7SDC:*a secure prompt will be shown, overwriting any other display, which indicates clearly thatthe module is in destructive-tampered mode; and*the module and its companion UPC will no longer perform transactions normally.–On a G7UPC:*the module’s LEDs will flash red, alternating between on and off every quarter-second*the module and its companion SDC will no longer perform transactions normally.5.1.4.2.2 Attached Devices and/or OverlaysCheck whether:• the surfaces of the module’s various plastic parts do not line up as they should• there are foreign devices attached to the module, including inside the cabinet• you have a haunting feeling the module doesn’t look quite like as should.5.1.4.3 Battery Replacement5.1.4.3.1 Battery Type and PrecautionsThe backup battery is a 3.6V, 2400mAh, non-rechargable one. It must be replaced by a trainedtechnician only.The battery employs lithium thionyl chloride technology; its contents are toxic.CAUTION: THERE IS A RISK OF EXPLOSION IF THE BATTERY IS REPLACED BY AN INCORRECTTYPE. DISPOSE OF USED BATTERIES ACCORDING TO THE INSTRUCTIONS.The battery must not be recharged, short-circuited or disassembled; hazardous-waste precautions mustbe observed when disposing of it.5.1.4.3.2 ProcedureThe G7SDC includes a supercap which can provide power for long enough only to perform a gracefulshutdown when all other supplies are lost. If the external DC supply is disconnected, the supercaphas insufficient capacity to maintain power for long enough to replace the battery. During batteryreplacement, therefore, the module’s DC supply should remain connected and turned on; otherwisethe backup supply will droop far enough to cause a destructive tamper.During battery replacement it is not necessary to remove or even disconnect the module from the systemit is integrated with. This includes removal-tamper sensors; they can remain connected. One or moreexternal, analogue removal-tamper sensors will probably be triggered in the process but this is normalwhen opening a system cabinet containing a G7 secure module. (Removal-tampering the G7SDC willChapter 5. Appendices 25
G7OPT Integrator Manual, DWI-00175 S1 R15suspend normal operation of the module and of the system as a whole – in particular it will temporarilyprevent any financial transactions.)The battery compartment is enclosed within the SDC’s plastic housing. It is accessed from the rear ofthe module, by undoing a captive Philips #2 screw then removing the lid of the compartment. The batteryis secured within the compartment by a Velcro strip. After removing the compartment lid, carefully“unstick” the strip, disconnect the battery and remove it.The battery connector is keyed; it cannot be plugged in with incorrect polarity. Fit a replacement battery,plug in its connector and resecure the compartment lid. Check that no connections to the G7SDC havebeen displaced then close and secure the system cabinet.Follow the instructions under §3 Tampers to clear the removal-tampered state and restore the moduleand overall system to normal operation.Ensure that details of the battery change are recorded correctly.Chapter 5. Appendices 26
G7OPT Integrator Manual, DWI-00175 S1 R155.1.5 DrawingsFig. 5.5: General ArrangementChapter 5. Appendices 27
G7OPT Integrator Manual, DWI-00175 S1 R15Dimensions are in millimetresDo Not ScaleFig. 5.6: CutoutChapter 5. Appendices 28
G7OPT Integrator Manual, DWI-00175 S1 R155.2 G7UPC Installation Guide5.2.1 IntroductionThe G7UPC (Unified PIN pad / Card Reader) is a PCI-compliant device for the secure reading of cardsand entry of numeric data. It is intended to operate in conjunction with the G7SDC (Secure DisplayController).The UPC is a highly secure device. However, some of its security features are reliant on the method ofinstallation; therefore please pay careful attention to the requirements outlined in this document.To cater for the requirements of system integrators, Invenco supplies the UPC in a rigid, plastic housingdesigned for the purpose. This configuration is the focus of these installation instructions.The removal-tamper sensors on the UPC’s keypad fascia have been armed already, in the process offitting the module into the housing; they will be activated if it is removed. Additional removal-tamperconnections are supplied for use by integrators:• two clusters, of four tamper pills each, at the lower corners on the back of the plastic housing.(See §5 Housing Removal-tampers.) These will be armed when the housing is installed (from thefront) into the integrator’s cabinet.• two external, analogue current-loops. One of these is used with a flexible printed circuit to protectagainst removal of the UPC from its plastic housing. The other is available for connection to asensor supplied by the integrator.Chapter 5. Appendices 29
G7OPT Integrator Manual, DWI-00175 S1 R155.2.2 NFC Antenna InstallationThe G7UPC supports a Near-field Communication contactless card-reader for:• presenting both secured and open information• receiving customer selections during transaction processing.5.2.2.1 Antenna Kit DescriptionThe contactless card-reader requires an external antenna. The antenna is supplied in a plasticenclosure with two cables attached:• an antenna cable terminated with a subminiature MCX plug• a LED-power and -signal cable terminated with a Molex Micro-Fit 3.0 six-way plug.A large, flanged nut is included, for securing the antenna against the system panel.Also supplied is a gasket to prevent ingress of moisture and dust.Fig. 5.7: NFC Antenna Kit5.2.2.2 Antenna CutoutsFig. 5.8: Antenna WireframeChapter 5. Appendices 30
G7OPT Integrator Manual, DWI-00175 S1 R151. For the antenna to function correctly the following must be observed:• There must be at least 2cm clearance around the top, bottom and sides of the antenna.• The system panel must not be electrically conductive within the above clearance region –for example, it must not be metallic. (Panels supplied by Invenco are non-conductive andpre-drilled.)• There must be at least 4cm clearance in front of the antenna.2. The following holes in the panel are required – see §5 Antenna Wireframe. (Note that no drillingis allowed on a fuel-outlet forecourt. As mentioned above, panels supplied by Invenco are pre-drilled.)• A 34mm round hole, concentric with the 76mm-square antenna enclosure.• Centred 28mm above it, a 4mm round hole to accept the orientation pin on the antenna.5.2.2.3 Installation SequenceWhile not necessary, it may simplify connecting the cables if the NFC antenna is mounted into the panelbefore the G7UPC.1. Unscrew the large, flanged securing nut from the rear of the antenna. Carefully pull the cablesthrough the nut to remove it. Set the nut aside.2. Pull the gasket back along the cables, far enough to gain access to the backing that covers itsadhesive face. Peel off then tear the backing to remove it, then discard it.3. Align the small hole in the gasket with the orientation pin on the antenna. Seat the gasket into theantenna, with the pin protruding. Align the gasket so it will lie flat, entirely within the lip aroundthe edge of the antenna. Press down over the rear surface of the gasket to stick it securely to theantenna.4. From the front of the panel, feed the cables through the large mounting hole. (Note that if Invenco’sAmericans with Disabilities Act-compliant keypad is installed the antenna is mounted above it.)5. At the rear of the panel, feed the cables through the nut from its flanged side.6. From the front of the panel, turn the antenna so the pin aligns with the orientation hole in the panelthen carefully insert the antenna into the panel. (The weight of the cables will hold it in placetemporarily.)7. Carefully tighten the nut onto the threaded portion of the antenna. When the nut reaches finger-tightness, a final check from the front of the panel will help to ensure the antenna is “squared”neatly and the gasket is not misaligned.8. Finish tightening the nut. (Avoid overtightening it; this will ensure the gasket functions correctly.)Chapter 5. Appendices 31
G7OPT Integrator Manual, DWI-00175 S1 R15Fig. 5.9: NFC Nut, Tightened, Rear ViewThere is no need to connect the cables to the G7UPC immediately but remember to do so beforefinishing the installation.5.2.3 UPC Installation - Invenco Housing Option5.2.3.1 Environment• In this configuration the UPC is supplied in a housing that provides adequate protection of theUPC’s rear from the environment.Invenco’s housing is designed specially for the UPC, with attention to security, standardscompliance and usability. It is made of rigid plastic, coloured black for aesthetic and securityreasons. (Attempts at tampering show up against a black-gloss background.) When mountedagainst a flat, vertical surface as described here, the housing presents the keypad at the optimumangle for access and privacy.• The housing restricts access to the rear of the UPC by unauthorized persons. In turn, theintegrator’s system cabinet will restrict access to the rear of the housing and its cables.• The mounting surface for the housing, with the UPC inside it, must be vertical and flat.• The mounting surface should not be in the direct line-of-sight of any video camera, unless theuser’s body will provide adequate blocking of that view of the UPC in use.• The housing should be mounted in the cabinet so that the UPC is at a height suitable for mostusers. (Invenco recommends a height of 1200mm for the ‘5’ key.)Chapter 5. Appendices 32
G7OPT Integrator Manual, DWI-00175 S1 R15• Although the UPC is weather-resistant, the housing and UPC should be sheltered from rain or acanopy should be provided.5.2.3.2 ToolsFor this guide, we assume that the cabinet has been prepared with the appropriate cut-out prior toinstallation. Please see §5 UPC Cutout for details.The only tool required for installation is a 3mm hex (Allen) key. The shaft of the key should be at least100mm long for ease of use.5.2.3.3 Method1. Check that the cabinet cut-out is free of burrs and ripples and that all the mounting holes are clear.2. Check the UPC packaging for signs of tampering. If the factory seals are not intact DO NOT installthe UPC.3. Unpack the UPC carefully. Again check for signs of tampering, both with the UPC and with itsrubber gasket.4. Check that the rubber gasket is placed the correct way up, flat against the rear of the housing:Fig. 5.10: Gasket Upside-downFig. 5.11: Gasket Right Way Up5. Place the housing containing the UPC from the outside of the cabinet into the cabinet cut-out.Check that the housing sits flat against the cabinet and that the gasket is not rippled or foldedanywhere.Chapter 5. Appendices 33
G7OPT Integrator Manual, DWI-00175 S1 R15Fig. 5.12: Mounting Holes6. Insert mounting screws in the top and bottom centre holes of the UPC but do not tighten them.7. Insert the remaining six screws, three along each side.8. Ensure the housing is aligned neatly in the cutout, then tighten all eight mounting screws.This will arm the eight removal-tamper sensors (coloured red in the figure, see §5 HousingRemoval-tampers). These tampers will become active when the UPC is promoted from itsremoval-tampered state to normal operating mode.Chapter 5. Appendices 34
G7OPT Integrator Manual, DWI-00175 S1 R15Fig. 5.13: Housing Removal-tampers9. Discard packaging in accordance with local regulations.Chapter 5. Appendices 35
G7OPT Integrator Manual, DWI-00175 S1 R155.2.3.4 ConnectionThis section assumes that the UPC will be installed at the same time as a G7SDC, NFC antenna andADA keypad.While not necessary, it may simplify connecting the UPC if it is mounted on the system panel after theNFC antenna and ADA keypad.Fig. 5.14: UPC ConnectionsCarefully make the following connections to the UPC:1. connect a DC power cable between the UPC’s PWR socket and the UPC PWR socket on the SDC2. connect a USB A-B cable between the UPC’s USB port and the UPC USB port on the SDC3. connect the audio cable between the UPC’s AUD socket and the UPC AUDIO socket on the SDC4. connect a USB A-B cable between the UPC’s BARCODE USB socket and the BAR CODE porton the SDC5. connect the ADA keypad’s plug to the ADA socket on the UPC6. connect the NFC antenna’s LED-power and -signal plug to the LED socket on the UPC7. connect the NFC antenna’s coaxial plug to the ANT socket on the UPC.Chapter 5. Appendices 36
G7OPT Integrator Manual, DWI-00175 S1 R15Fig. 5.15: NFC Antenna ConnectionsChapter 5. Appendices 37
G7OPT Integrator Manual, DWI-00175 S1 R155.2.4 Basic Maintenance5.2.4.1 CleaningThe G7 modules are intended for use in the harsh environment of a fuelling station forecourt. As suchthey need little maintenance to keep them looking good.• Use a soft cloth dampened with water for daily cleaning.• If grime builds up, use a diluted mild detergent on a soft cloth.•Take extra care when cleaning the barcode reader window:–Use only a diluted, mild, liquid soap or detergent and a soft, clean cloth.–Rinse the detergent off carefully, using minimal pressure, before drying the display with aclean, dry, lint-free or microfibre cloth.– CAUTION Do NOT rub the display if it is dry. Accumulated dust may scratch the surface anddegrade the barcode reading function.•CAUTION Do NOT use petroleum-based solvent cleaners. They may damage surfaces, makingthe terminal much harder to clean, and shorten the life of the parts.•CAUTION Do NOT use a high-pressure hose to clean the UPC. The card-reader opening will fillwith water which may damage the device.5.2.4.2 Security ChecksThe module is a transaction-processing device; it will come to the attention of fraudsters. It must beinspected daily:• for signs of tampering; and• for any unauthorised devices that may have been attached or overlaid onto the module.If there are any signs of tampering of any kind:1. immediately stop the normal operation of the G7 system2. log a security issue with the support agent’s helpdesk3. take photos of any unauthorised devices or modifications4. record details of anyone subsequently interfering with the G7 system.Where destructive or malicious tampering has occurred or is suspected, the affected module/s mustbe returned to Invenco for inspection, validation and possibly repair and reinitialization. Procedures forsecure removal, shipping and changes of custody must be followed throughout by all parties involved.If there are no signs of tampering but it is known or suspected that security keys have beencompromised, the keys must be replaced with new ones.5.2.4.2.1 Signs of TamperingCheck for the following:• damage to, or apparent discoloration of any of the plastic parts• any visible wires anywhere on the module• on a UPC: shims, scratches or filed surfaces anywhere around or in the mouth of the card reader• holes in any surface of the plastic parts (particularly above the keypad area on a UPC).• functional indications that the module is in removal-tampered mode:–On a G7SDC:Chapter 5. Appendices 38
G7OPT Integrator Manual, DWI-00175 S1 R15*a secure prompt will be shown, overwriting any other display, which indicates clearly thatthe module is in removal-tampered mode; and*the module and its companion UPC will no longer perform transactions normally – forexample, touchscreen functions will all be disabled.–On a G7UPC:*the module’s LEDs will flash red, alternating between on and off every half-second*the module and its companion SDC will no longer perform transactions normally – forexample, PIN entry will be disabled.• functional indications that the module has been destructively tampered:–On a G7SDC:*a secure prompt will be shown, overwriting any other display, which indicates clearly thatthe module is in destructive-tampered mode; and*the module and its companion UPC will no longer perform transactions normally.–On a G7UPC:*the module’s LEDs will flash red, alternating between on and off every quarter-second*the module and its companion SDC will no longer perform transactions normally.5.2.4.2.2 Attached Devices and/or OverlaysCheck whether:• the surfaces of the module’s various plastic parts do not line up as they should• there are foreign devices attached to the module, including inside the cabinet• you have a haunting feeling the module doesn’t look quite like as should.5.2.4.3 Battery Replacement5.2.4.3.1 Battery Type and PrecautionsThe backup battery is a 3.6V, 2400mAh, non-rechargable one. It must be replaced by a trainedtechnician only.The battery employs lithium thionyl chloride technology; its contents are toxic.CAUTION: THERE IS A RISK OF EXPLOSION IF THE BATTERY IS REPLACED BY AN INCORRECTTYPE. DISPOSE OF USED BATTERIES ACCORDING TO THE INSTRUCTIONS.The battery must not be recharged, short-circuited or disassembled; hazardous-waste precautions mustbe observed when disposing of it.5.2.4.3.2 ProcedureThe G7UPC includes a supercap which can provide power for long enough only to perform a gracefulshutdown when all other supplies are lost. If the external DC supply is disconnected, the supercaphas insufficient capacity to maintain power for long enough to replace the battery. During batteryreplacement, therefore, the module’s DC supply should remain connected and turned on; otherwisethe backup supply will droop far enough to cause a destructive tamper.During battery replacement it is not necessary to remove or even disconnect the module from the systemit is integrated with. This includes removal-tamper sensors; they can remain connected. One or moreexternal, analogue removal-tamper sensors will probably be triggered in the process but this is normalwhen opening a system cabinet containing a G7 secure module. (Removal-tampering the G7UPC willChapter 5. Appendices 39
G7OPT Integrator Manual, DWI-00175 S1 R15suspend normal operation of the module and of the system as a whole – in particular it will temporarilyprevent any financial transactions.)The battery compartment is enclosed within the UPC’s plastic housing. It is accessed from the rear ofthe module, by undoing a captive Philips #2 screw then removing the lid of the compartment. The batteryis secured within the compartment by a Velcro strip. After removing the compartment lid, carefully“unstick” the strip, disconnect the battery and remove it.The battery connector is keyed; it cannot be plugged in with incorrect polarity. Fit a replacement battery,plug in its connector and resecure the compartment lid. Check that no connections to the G7UPC havebeen displaced then close and secure the system cabinet.Follow the instructions under §3 Tampers to clear the removal-tampered state and restore the moduleand overall system to normal operation.Ensure that details of the battery change are recorded correctly.Chapter 5. Appendices 40
G7OPT Integrator Manual, DWI-00175 S1 R155.2.5 DrawingsFig. 5.16: General ArrangementChapter 5. Appendices 41
G7OPT Integrator Manual, DWI-00175 S1 R15Dimensions are in millimetresDo Not ScaleFig. 5.17: UPC CutoutChapter 5. Appendices 42
G7OPT Integrator Manual, DWI-00175 S1 R15Fig. 5.18: NFC Antenna Rear ViewChapter 5. Appendices 43
CHAPTER 6ReferencesReference Source DocumentG7INTSEC “G7OPT Integrator Security Policy”, (DQS-00087)DWI-00175 S1 R15 44
CHAPTER 7Document HistoryRevision 15, 2016-12-02• Edit FCC and Industry Canada to include antenna gain information in Introduction.Revision 14, 2016-12-01• Add FCC and Industry Canada compliance-related statements to Introduction.Revision 13, 2016-11-28• Clarify battery-replacement instructions for SDC and UPC wrt leaving external DC supplyconnected.• Refactor SDC cutout and tamper indications into reST sources common to this doc andIntegrator Security Policy.• Add SDC label images.• Pull in Word version of NFC-antenna standalone installation guide.Revision 12, 2016-11-09• Clarify UPC slow / fast red LED indications for removal / destructive tamper events.Revision 11, 2016-11-07• Add Battery Replacement section under Basic Maintenance, to Installation Guide appendicesfor SDC and UPC. Include warning compliant with UL 60950-1.Revision 10, 2016-11-03• Add log retrieval procedure using TMSlite.Revision 09, 2016-11-02• Update SDC rear-panel views now that audio line-level connectors not fitted.Revision 08, 2016-10-26• Add section on installation of UPC NFC antenna.Revision 07, 2016-10-25• Note primacy of upc.init.ver and sdc.init.ver as firmware version-codes, and that productionbuilds of all firmware components are performed and versioned atomically.• Change use of upc.init.ver and sdc.init.ver to upc.root.ver and sdc.root.ver respectively asprimary firmware build keys.Revision 06, 2016-10-21• Updated product information sticker to match new design.Revision 05, 2016-10-20• Refactored UPC cutout drawing into common section outside document.DWI-00175 S1 R15 45
G7OPT Integrator Manual, DWI-00175 S1 R15Revision 04, 2016-10-17• Removed explicit reference to [G7NI]; integration should focus on the higher-level SDK andSocketTAL.• Update “Shipment Verification” chapter.• Update “Tampers” chapter.• Add “Key Injection” chapter.Revision 03, 2016-07-15• Corrected “Attached Devices and/or Overlays” heading depth in installation guides.• Move document history to back.Revision 02, 2016-06-24• Restructured, moving installation guides into appendices.• Incorporated former standalone G7OPT Shipment Verification doc as a chapter.Revision 01, 2016-05-30• Renamed to G7OPT Integrator Manual, split into one file per chapter.• Captured drafts of UPC Installation Guide and SDC Installation Guide into reST andincorporated.Revision 00, 2016-02-29• Initial release; imported into reST from G7OPT Integrators Implementation Guide.Chapter 7. Document History 46
NEW ZEALANDLevel 2, 7-11 Kawana StNorthcoteAuckland 0627New ZealandPh: +64 9 369 2935ASIAUnit 2B-1-1, Level 1Block 2B, Plaza SentralJalan Stesen Sentral 550470 Kuala LumpurMalaysiaPh: +60 3 2785 1888NORTH AMERICABuilding 100, Windward Chase1235 Old Alpharetta Road, Suite 130AlpharettaGeorgia 30005USAPh: +1 470 253 7568©2016, Invenco Group Ltd. All rights reserved.No part of this document may be copied or reproduced in any form without the prior written consent ofInvenco Group Ltd.The information in this document is subject to change without notice and should not be construed as acommitment by Invenco Group Ltd. Invenco Group Ltd has taken great effort to verify the accuracy ofthis document but assumes no responsibility for any technical inaccuracies or typographical errors.
 ToBeDetermined REV 00 S2  Manual- G7 UPC Installation Guide    Page 1                       Doc Number: ToBeDetermined Doc Revision: 00 Security Rating: S2 Last Saved Date: 10 June 2016 Manual G7 UPC Installation Guide
 ToBeDetermined REV 00 S2  Manual- G7 UPC Installation Guide    Page 2 Table of Contents Release History ............................................................................................... 3 1 Introduction ............................................................................................ 4 2 Installation .............................................................................................. 4 2.1 Environment ............................................................................... 4 2.2 Tools........................................................................................... 4 2.3 Method ....................................................................................... 4 3 Connection ............................................................................................. 5 4 Basic Maintenance ................................................................................. 6 4.1 Cleaning ..................................................................................... 6 4.2 Security Checks ......................................................................... 6 4.2.1 Signs of Tampering ....................................................................... 6 4.2.2 Attached Devices and/or Overlays ................................................. 6 5 Drawings ................................................................................................ 7 5.1 General arrangement ................................................................. 7 5.2 Cutout Drawing (do not scale) .................................................... 8 6 Typical Wiring ......................................................................................... 9
 ToBeDetermined REV 00 S2  Manual- G7 UPC Installation Guide    Page 3 Release History Doc Version Prepared by Date Change description 00 SAM X. 01-Jan-2016 New document 01
 ToBeDetermined REV 00 S2  Manual- G7 UPC Installation Guide    Page 4 1  Introduction The G7 UPC (Unified PIN pad / Card Reader) is a PCI-compliant device for the secure reading of cards and entry of numeric data. It is intended to operate in conjunction with the G7  SDC (Secure Display Controller). The  G7  UPC  is  a  highly  secure  device,  however  some  of  its  security  features  are  reliant  on  the method  of  installation,  therefore  please  pay  careful  attention  to  the  requirements  outlined  in  this document. 2  Installation 2.1  Environment 1.  The UPC must be mounted in some form of cabinet that provides adequate protection of the UPC’s rear from the environment. 2.  The cabinet must restrict access to the rear of the UPC from unauthorized persons. 3.  The Mounting Surface must be vertical and flat. 4.  The Mounting Surface should not be in the direct line-of-sight of any video camera, unless the user’s body will provide adequate blocking of that view of the UPC in use. 5.  The UPC should be mounted at a height that  is suitable for the majority of users (Invenco recommends a height of 1200mm for the ‘5’ key) 6.  Although the UPC is weather-resistant, the cabinet should be sheltered from rain, or should provide a canopy. 2.2  Tools For this guide, we assume that the cabinet has been prepared with the appropriate cut-out prior to installation. Please see §4 for cut-out details. The only tool required for installation is a 3mm Hex (Allen) key. The shaft of the key should be at least 100mm long for ease of use. 2.3  Method 1.  Check that the cabinet cut-out is free of burrs and ripples and that all the mounting holes are clear. 2.  Check the UPC packaging for signs of tampering. If the factory seals are not intact DO NOT install the UPC. 3.  Unpack the UPC carefully. Again, check for signs of tampering, both with the UPC and with its rubber gasket. 4.  Check that the rubber gasket is placed the correct way up on the UPC:
 ToBeDetermined REV 00 S2  Manual- G7 UPC Installation Guide    Page 5 It must be seated flat on the UPC case.  5. Place  the  UPC  from  the  outside  of  the  cabinet  into  the cut-out. Check that the UPC sits flat against the cabinet and that the gasket is not rippled or folded anywhere. 6.  Insert mounting screws in the top and bottom centre holes of the UPC but do not tighten them. 7.  Insert the remaining six screws, three along each side. 8.  Ensure  the  UPC  is  aligned  nicely  in  the  cutout,  then tighten all eight mounting screws. 9.  Discard  the  UPC  packaging  in  accordance  with  local regulations.   3  Connection This document assumes that the UPC will be installed at the same time as a G7 SDC.  There are four connections to be made to the UPC. 1. Connect  a  DC  power  cable  between  the  “PWR” socket and the “UPC PWR” socket on the SDC. 2.  Connect a USB A-B cable  between the “USB”  port and the “UPC USB” port on the SDC. 3. Connect an audio cable between the “AUD” socket and the “UPC AUDIO” socket on the SDC. 4.  Connect a USB A-B cable between the “BARCODE USB” socket and the “BAR CODE” port on the SDC.
 ToBeDetermined REV 00 S2  Manual- G7 UPC Installation Guide    Page 6 4  Basic Maintenance The G7 modules are intended for use in the harsh environment of a fuelling station forecourt. As such they need little maintenance to keep them looking good. 4.1  Cleaning   Use a soft cloth dampened with water for daily cleaning.   If grime builds up, use a diluted mild detergent on a soft cloth.  Take extra care when cleaning the barcode reader window:  o  Use only a diluted mild liquid soap or detergent and a soft clean cloth. o  Rinse the detergent off carefully using minimal pressure before drying the display with a clean, dry lint-free or microfiber cloth. o CAUTION – DO NOT rub the display if it is dry – accumulated dust may scratch the surface and degrade the barcode reading function.  CAUTION – Do NOT use petroleum-based solvent cleaners – they may damage surfaces making the terminal much harder to clean, and shorten the life of the parts.  CAUTION – Do NOT use a high-pressure hose to clean the UPC. The card reader opening will fill with water which may damage the device. 4.2  Security Checks The UPC is a transaction-processing device, and will come to the attention of fraudsters. The UPC must be inspected daily -  for signs of tampering, and -  for any unauthorised devices that may have been attached or overlaid onto the UPC. If there are any signs of tampering of any kind: 1.  Immediately stop the normal operation of the G7 system 2. Log a security issue with the support agent’s helpdesk. 3.  Take photos of any unauthorised devices or modifications 4.  Record details of anyone subsequently interfering with the G7 system 4.2.1 Signs of Tampering Check for the following: -  Damage to, or apparent discoloration of any of the plastic parts -  Any visible wires anywhere on the UPC -  Scratches or filed surfaces anywhere around or in the mouth of the card reader -  Holes in any surface of the plastic parts, particularly above the keypad area 4.2.2  Attached Devices and/or Overlays Check for the following: -  If the surfaces of the UPC’s various plastic parts do not line up as they should -  If there are foreign devices attached  to the UPC, including inside the cabinet -  If you have a haunting feeling the UPC doesn’t look quite like it should.
 ToBeDetermined REV 00 S2  Manual- G7 UPC Installation Guide    Page 7 5  Drawings 5.1  General arrangement
 ToBeDetermined REV 00 S2  Manual- G7 UPC Installation Guide    Page 8 5.2  Cutout Drawing (do not scale) Dimensions are in millimetres
 ToBeDetermined REV 00 S2  Manual- G7 UPC Installation Guide    Page 9  6  Typical Wiring   Place holder for details                                                       © 2016 Invenco Group Ltd. All rights reserved. No part of this document may be copied or reproduced in any form without prior written consent of Invenco Group Ltd.  The information in this document is subject to change without notice and should not be construed as a commitment by Invenco Group Ltd. Invenco Group Ltd has taken great effort to verify the accuracy of this document but assumes no responsibility for any technical inaccuracies or typographical errors.  NEW ZEALAND Level 2, 7-11 Kawana St Northcote Auckland 1145  New Zealand Ph: + 64 9 369 2935  ASIA Unit 2B-1-1, Level 1 Block 2B, Plaza Sentral Jalan Stesen Sentral 5 50470 Kuala Lumpur Malaysia Ph: +60 3 2785 1888
 ToBeDetermined REV 00 S2  Manual- OPTIC 12 NFC Installation Guide    Page 1                         Doc Number: ToBeDetermined Doc Revision: 00 Security Rating: S2 Last Saved Date: 12 August 2016 Manual OPTIC 12 NFC Installation Guide
 ToBeDetermined REV 00 S2  Manual- OPTIC 12 NFC Installation Guide    Page 2 Table of Contents Release History ............................................................................................... 3 1 Introduction ............................................................................................ 4 2 Installation .............................................................................................. 4 2.1 Environment ............................................................................... 4 2.2 Tools........................................................................................... 4 2.3 Method ....................................................................................... 4 3 Connection ............................................................................................. 5 4 Basic Maintenance ................................................................................. 6 4.1 Cleaning ..................................................................................... 6 4.2 Security Checks ......................................................................... 6 4.2.1 Signs of Tampering ....................................................................... 6 4.2.2 Attached Devices and/or Overlays ................................................. 6 5 Drawings ................................................................................................ 7 5.1 General arrangement ................................................................. 7 5.2 Cutout Drawing (do not scale) .................................................... 8 6 Typical Wiring .......................................... Error! Bookmark not defined.
 ToBeDetermined REV 00 S2  Manual- OPTIC 12 NFC Installation Guide    Page 3 Release History Doc Version Prepared by Date Change description 00 Andy Hemus 12-Aug-16 New document 01
 ToBeDetermined REV 00 S2  Manual- OPTIC 12 NFC Installation Guide    Page 4 1  Introduction The OPTIC 12 NFC (Near Field Controler) is a PCI-compliant device for presenting both secured and open information, and receiving customer selections during transaction processing. It is intended to operate in conjunction with the OPTIC 12 UPC (Unified PIN pad / Card Reader) and the OPTIC 12 APC (Application Process Controller).  The  OPTIC  12  NFC  is  a  secure  device,  however  some  of  its  security features  are  reliant  on the method  of  installation,  therefore  please  pay  careful  attention  to  the  requirements  outlined  in  this document. 2  Installation 2.1  Environment 1.  The NFC must be mounted in some form of cabinet that provides adequate protection of the NFC’s rear from the environment. 2.  The cabinet must restrict access to the rear of the UPC from unauthorized persons. 3.  The Mounting Surface should be vertical and must be flat. 4. The NFC can be mounted at any height that is suitable for the majority of users; this would typically be above the mounted height of the associated UPC. 5.  Although the NFC is highly weather-resistant, the cabinet should be sheltered from rain, or should provide a canopy. 2.2  Tools For this guide, we assume that the cabinet has been prepared with the appropriate cut-out prior to installation. Please see 5.2 for details. The only tool required for installation is a 36mm spanner or an adjustable spanner.  2.3  Method 1.  Check that the cabinet cut-out is free of burrs and ripples and that all the mounting holes are clear. 2.  Check the NFC packaging for signs of tampering. If the factory seals are not intact DO NOT install the NFC. 3.  Unpack the NFC carefully. Again, check for signs of tampering, both with the NFC and with its foam gasket. 4.  Check that the foam gasket is placed the correct way up on the NFC.              The gasket  must be seated flat on the NFC case. 5.  Place the NFC from the outside of the cabinet into the cut-out. Check that the NFC sits flat against the cabinet and that the gasket is not rippled or folded anywhere. 6.  Screw the hex nut onto the back of the ADA but do not tighten it.  7.  Ensure  the  NFC  is  aligned  nicely  with  any  surrounding  cabinet  features,  then  tighten  the mounting nut. (Torque to be decided). 8.  Discard the NFC packaging in accordance with local regulations.
 ToBeDetermined REV 00 S2  Manual- OPTIC 12 NFC Installation Guide    Page 5  3  Connection This document assumes that the NFC will be installed at the same time as both a OPTIC 12 UPC, OPTIC 12 SDC and a OPTIC 12 APC.  There are two connections to be made from the NFC to the UPC module 1.  Insert  the 6 way connector, to the socket labled NFC LED. 2.  Connect the RF connector to the labled socket NFC ANT.
 ToBeDetermined REV 00 S2  Manual- OPTIC 12 NFC Installation Guide    Page 6 4  Basic Maintenance The OPTIC 12 modules are intended for use in the harsh environment of a fuelling station forecourt. As such they need little maintenance to keep them looking good. 4.1  Cleaning   Use a soft cloth dampened with water for daily cleaning.   If grime builds up, use a diluted mild detergent on a soft cloth.  Take extra care when cleaning the display window:  o  Use only a diluted mild liquid soap or detergent and a soft clean cloth. o  Rinse the detergent off carefully using minimal pressure before drying the display with a clean, dry lint-free or microfiber cloth. o CAUTION – DO NOT rub the display if it is dry – accumulated dust may scratch the anti-reflective coating.  CAUTION – Do NOT use petroleum-based solvent cleaners – they may damage surfaces making the terminal much harder to clean, and shorten the life of the parts.  CAUTION – Do NOT use a high-pressure hose to clean the NFC. The pressure may force water past seals and that may damage the device. 4.2  Security Checks The NFC is a transaction-processing device, and will come to the attention of fraudsters. The  NFC must be inspected daily -  for signs of tampering, and -  for any unauthorised devices that may have been attached or overlaid onto the NFC. If there are any signs of tampering of any kind: 1.  Immediately stop the normal operation of the OPTIC 12 system 2.  Log a security issue with the support agent’s helpdesk. 3.  Take photos of any unauthorised devices or modifications 4.  Record details of anyone subsequently interfering with the OPTIC 12 system 4.2.1 Signs of Tampering Check for the following: -  Damage to, or apparent discoloration of any of the plastic parts -  Any visible wires anywhere on the NFC -  Holes in any surface of the plastic parts. 4.2.2  Attached Devices and/or Overlays Check for the following: -  If the surfaces of the NFC’s various plastic parts do not line up as they should -  If there are foreign devices attached  to the NFC, including inside the cabinet -  If you have a haunting feeling the NFC doesn’t look quite like it should.
 ToBeDetermined REV 00 S2  Manual- OPTIC 12 NFC Installation Guide    Page 7 5  Drawings 5.1  General arrangement
 ToBeDetermined REV 00 S2  Manual- OPTIC 12 NFC Installation Guide    Page 8 5.2  Cutout Drawing (do not scale) Dimensions are in millimetres                                                               © 2016 Invenco Group Ltd. All rights reserved. No part of this document may be copied or reproduced in any form without prior written consent of Invenco Group Ltd.  The information in this document is subject to change without notice and should not be construed as a commitment by Invenco Group Ltd. Invenco Group Ltd has taken great effort to verify the accuracy of this document but assumes no responsibility for any technical inaccuracies or typographical errors.  NEW ZEALAND Level 2, 7-11 Kawana St Northcote Auckland 1145  New Zealand Ph: + 64 9 369 2935  ASIA Unit 2B-1-1, Level 1 Block 2B, Plaza Sentral Jalan Stesen Sentral 5 50470 Kuala Lumpur Malaysia Ph: +60 3 2785 1888

Navigation menu