You are on page 1of 46

UIC Confidential

Uniform Industrial Corporation

TS890 USER MANUAL


REV A.2

TS890 User Manual Rev. A.2

UIC Confidential

Revision History
Revision

Date

Remarks

A.1

June 13, 2011

Initial release

A.2

Dec. 16, 2011

Update BootROM usages

Copyright 2011 All rights reserved.

Page 2

TS890 User Manual Rev. A.2

UIC Confidential

Disclaimer
This information could include technical inaccuracies or typographical errors. Changes are periodically
made to the information herein; these changes will be incorporated in new editions of the publication. The
manufacturer may make improvements and/or changes to the product(s) and/or the program(s) described
in this publication at any time without notice.

Terms and conditions


Permission for the use of these publications is granted subject to the following terms and conditions.
Personal Use: You may reproduce these publications for your personal, noncommercial use provided
that all proprietary notices are preserved. You may not distribute, display or make derivative works of
these publications, or any portion thereof, without the express written consent of the manufacturer.
Commercial Use: You may reproduce, distribute and display these publications solely within your
enterprise provided that all proprietary notices are preserved. You may not make derivative works of
these publications, or reproduce, distribute or display these publications or any portion outside your
enterprise, without the express written consent of the manufacturer. Except as expressly granted in this
permission, no other permissions, licenses or rights are granted, either express or implied, to the
publications or any data, software or other intellectual property contained therein. The manufacturer
reserves the right to withdraw the permissions granted herein whenever, in its discretion, the use of the
publications is detrimental to its interest or, as determined by the manufacturer, the above instructions are
not being properly followed. You may not download, export or re-export this information except in full
compliance with all applicable laws and regulations, including all United States export laws, copyright
laws and regulations.
THE MANUFACTURER MAKES NO GUARANTEE REGARDING THE CONTENT OF THESE PUBLICATIONS. THESE
PUBLICATIONS ARE PROVIDED AS-IS AND WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED,
INCLUDING BUT NOT LIMITED TO IMPLIED WARRANTIES OF MERCHANTABILITY, NON-INFRINGEMENT, AND FITNESS FOR
A PARTICULAR PURPOSE.
UNDER NO CIRCUMSTANCES IS THE MANUFACTURER, ITS PROGRAM DEVELOPERS OR SUPPLIERS LIABLE FOR ANY
OF THE FOLLOWING, EVEN IF INFORMED OF THEIR POSSIBILITY:
1.
2.
3.

LOSS OF, OR DAMAGE TO, DATA;


SPECIAL, INCIDENTAL, OR INDIRECT DAMAGES, OR FOR ANY ECONOMIC CONSEQUENTIAL
DAMAGES; OR
LOST PROFITS, BUSINESS, REVENUE, GOODWILL, OR ANTICIPATED SAVINGS. SOME JURISDICTIONS
DO NOT ALLOW THE EXCLUSION OR LIMITATION OF DIRECT, INCIDENTAL, OR CONSEQUENTIAL
DAMAGES, SO SOME OR ALL OF THE ABOVE LIMITATIONS OR EXCLUSIONS MAY NOT APPLY

Copyright 2011 All rights reserved.

Page 3

TS890 User Manual Rev. A.2

UIC Confidential

Table of Contents
Introduction .................................................................................................................................................. 7
General Functions ......................................................................................................................................... 8
TS890 Hardware Specification ...................................................................................................................... 9
Terminal front view................................................................................................................................... 9
Terminal IO port view ............................................................................................................................. 10
TS890 Specifications ................................................................................................................................... 11
System Foundation ..................................................................................................................................... 12
Hardware Block Diagram ........................................................................................................................ 12
Flash Memory Map ................................................................................................................................. 13
Software Architecture ............................................................................................................................. 14
Software and Firmware components ................................................................................................. 15
BootROM: the system manager.................................................................................................................. 16
BootROM Background ............................................................................................................................ 16
RunAppl ................................................................................................................................................... 17
Program................................................................................................................................................... 17
Load..................................................................................................................................................... 18
Remote Sync ....................................................................................................................................... 18
Erase IPP.............................................................................................................................................. 20
Upgrade............................................................................................................................................... 21
USB Disk Setup .................................................................................................................................... 23

Copyright 2011 All rights reserved.

Page 4

TS890 User Manual Rev. A.2

UIC Confidential

Load Dukpt Key ................................................................................................................................... 23


Date & Time ............................................................................................................................................ 25
Setting ..................................................................................................................................................... 26
Version .................................................................................................................................................... 27
Selftest .................................................................................................................................................... 27
File System .............................................................................................................................................. 29
Development Environment......................................................................................................................... 30
System Requirement............................................................................................................................... 30
Linux Host (Virtual Machine) .................................................................................................................. 30
Starting up ........................................................................................................................................... 30
Sharing resources with Windows host................................................................................................ 31
User accounts...................................................................................................................................... 33
Eclipse: the IDE .................................................................................................................................... 33
Important Directories in Linux VM...................................................................................................... 34
Network Services ................................................................................................................................ 35
TS890: the target device ......................................................................................................................... 36
Debug Console .................................................................................................................................... 36
Root file system (RFS) ......................................................................................................................... 37
Mounting NFS from Linux host ........................................................................................................... 38
Updating User Application .................................................................................................................. 39
USB Disk Setup .................................................................................................................................... 40

Copyright 2011 All rights reserved.

Page 5

TS890 User Manual Rev. A.2

UIC Confidential

Security Management ................................................................................................................................. 43


IPP Security ............................................................................................................................................. 43
Key Storage and Protection .................................................................................................................... 43
Tamper detection / response ................................................................................................................. 43
Self-test ................................................................................................................................................... 43
Timeout control ...................................................................................................................................... 44
PIN attack protection .............................................................................................................................. 45
Tamper Recovery .................................................................................................................................... 45
IPP Key Loading ....................................................................................................................................... 45
IPP Key Loading ................................................................................................................................... 45
BootROM Key loading user interface.................................................................................................. 46

Copyright 2011 All rights reserved.

Page 6

TS890 User Manual Rev. A.2

UIC Confidential

Introduction
This document provides operating information of TS890 as well as how to set up a development
environment. It starts with the specification of the terminal. Then it follows a chapter introducing
the terminals hardware and software architecture, and a chapter regarding how to operate the
terminals system manager BootROM. Then there is one whole chapter regarding how to set up
the development environment and how to write, build, and install user applications to TS890.
Finally is a chapter describing the security functions, and including how to inject clear-text
master/session keys or DUKPT keys.
This document is intended for both system integrators and programmers. For more information
about API and SDK, please refer to TS890 Programmers manual.

Copyright 2011 All rights reserved.

Page 7

TS890 User Manual Rev. A.2

UIC Confidential

General Functions
TS890 is ideal for any level of merchant across multiple industries. It is designed for handling
transactions ranging from credit and debit card transactions, smart card transactions to
customer loyalty programs. TS890 is currently at the forefront of POS terminal distribution by
providing an access to the global smart card solutions.
Features

High Performance and High Security


Integrated Magnetic Strip and IC card reader and Printer
Conforms to EMV Level 1 & Level 2 requirement
Conforms to PCI PED online & offline PIN verification
Supports DES/TEDS, MAC, DUKPT or M/S key, RSA, AES, SHA encryption
32 bits fast processor
Tamper Evidence Resistant and Responsive
Privacy Shield
Option GPRS

Copyright 2011 All rights reserved.

Page 8

TS890 User Manual Rev. A.2

UIC Confidential

TS890 Hardware Specification


Terminal front view
Integrated thermal
printer

Graphic LCD display

<Down> in BootROM

<Up> in BootROM

<Menu> in BootROM
Keyboard
Magstripe reader

Smart card reader

Copyright 2011 All rights reserved.

Page 9

TS890 User Manual Rev. A.2

UIC Confidential

Terminal IO port view


USB host port

Modem port

Power input

Ethernet port
USB Host/Device
RS232 ports

SIM socket

SAM Sockets

Copyright 2011 All rights reserved.

Page 10

TS890 User Manual Rev. A.2

UIC Confidential

TS890 Specifications
Processor

32 bits fast processor (ARM9 + ARM7)

Memory System

24M Bytes (8 MB Flash +16 MB SDRAM)

LCD Display

128 x 64 pixels Graphical Display with LED Backlight

Keypad

0~9 Numeric Keys 4 Navigation Keys Enter, Clear and Cancel Keys

Magnetic Card

Reader ISO 1/2/3 Triple Track

Smart Card Reader

1 Full Size with Landing Contacts (EMV Level 1 & 2)

SAM

4 SAM Card Slots (support 5V and 3.3V SAM)

PIN Pad

Built-in with PCI 3.0 Certified for On-line & Off-line PIN

Security

Hardware accelerated 3DES, AES(128bits), RSA(2048bits), MACX9.9,

(option)
(option)

Master/Session and DUKPT key management


PCI PED approved tamper responsive and tamper evident applied for
secure download and application authentication
Printer

Integrated High Speed Thermal Printer, 24 lines/s (ASCII), 75mm/s


(BITMAP)

RTC

Battery backup real time clock

Communication

Two 232 Ports that can run at 115200bps simultaneously. One port
supports hardware flow control. All 2 ports provide 9.0 Vdc power to adapt
any contactless Card Reader/External PIN Pad/ECR easily
Dual USB 2.0 Ports (Host + slave)
Ethernet - 10/100MB Fast Ethernet
GPRS (option)
Modem 14,400bps; Optional up to 56Kbps. Support SDLC, async and PPP

Dimensions

(L)198 x (W) 93 x (H) 76 mm

Power Requirements

AC input 100-240VAC 50/60Hz, DC output 8.5-9.4VDC, 5.0A

Environment

Operation Temperature: 0 C to +55 C;


Storage Temperature: -20 C to +70 C
Relative Humidity, non-condensing: 5% to 90%

Copyright 2011 All rights reserved.

Page 11

TS890 User Manual Rev. A.2

UIC Confidential

System Foundation
Hardware Block Diagram

Copyright 2011 All rights reserved.

Page 12

TS890 User Manual Rev. A.2

UIC Confidential

Flash Memory Map

Copyright 2011 All rights reserved.

Page 13

TS890 User Manual Rev. A.2

UIC Confidential

Software Architecture

TS890 consists of two processors. One is an ARM7-cored security chip, and a non-OS firmware
IPP is running on it. IPP handles all security-related functions. The other processor is an ARM9
SOC with embedded Linux as the operating system. User application is running on this Linux
platform.
Theoretically the user application can control hardware devices and communicate with IPP
directly. However, due to security concerns and the purpose to minimize the development effort,
Copyright 2011 All rights reserved.

Page 14

TS890 User Manual Rev. A.2

UIC Confidential

UIC wraps these hardware details into an API: the oslib. User application statically links to this
library and thus accesses the underlying hardware devices and security functions in a managed
way. Although it is possible for the user application to call standard Linux APIs directly, this is
not encouraged and is even prohibited. The reason is that the Linux kernel and/or the runtime
environment might be changed (e.g., due to some security breach found in the future), and the
direct link between user application and Linux library might be broken then.
Software and Firmware components
There are four major components provided by UIC:

ARM7-IPP firmware: can be updated using bootROM.


ARM9-Linux kernel: seldom needs to be updated.
ARM9-RFS (Root File System): device drivers, Linux system libraries and utilities, and can
be updated using bootROM.
ARM9-oslib: A static library that a user application links with. oslib is released by UIC as
part of the SDK, and is installed to the Linux VM (please refer to Development
Environment chapter).

Copyright 2011 All rights reserved.

Page 15

TS890 User Manual Rev. A.2

UIC Confidential

BootROM: the system manager


BootROM Background
When TS890 Linux boots up, init will invoke the first system mode program called "BootROM."
BootROM is responsible for all the system management such as invoking/downloading
application(s), checking application certificate(s), maintaining all background processes.

) key when the display

To enter BootROM's service menu, it is required to press <CAN> (


show the prompt BootROM Selftest during boot up.

BootROM selftest

In general, BootROM will prompt for the access code.

Enter access code:

* will appear on screen as you enter access code. Enter the BootROM access code (Default is
896345). The following menu will display. Press <Up> and <Down> key to scroll through the
menu.

Copyright 2011 All rights reserved.

Page 16

TS890 User Manual Rev. A.2

UIC Confidential

RunAppl
Press 1 on the keypad to run the user applications (i.e., /home/usr1/appl.out). If the TS890
contains an application when choosing this option, BootROM will check the authenticity of this
user application and run it.
If the application has not been downloaded to TS890, the screen below will display.

The word Production in the message above means this terminal is of Production mode
instead of Development mode. A development mode terminal is a terminal which uses a
temporary certification for authenticating user applications. Such a development mode terminal
is supposed to serve as a development platform only.
If the application signature verification fails, the screen below will display.

IPP=P means this terminal is of Production mode. If this terminal is of Development mode, it
would be IPP=D in the message. The following APP=Error 2 means the user application
does not pass the authentication test and the error code (reason) is 2.

Program
This menu is used for downloading application(s) and updating OS/RootFS. Press 2 on the
keypad to enter Program menu. When selected, the screen will display. Press the up or down
button to switch menus.

Copyright 2011 All rights reserved.

Page 17

TS890 User Manual Rev. A.2

UIC Confidential

The functions in Program menu are listed and described below:


Load
Load function is for the developer to start the application download from the VMWare Linux to
the terminal through the standard TFTP protocol. The TFTP service is running in the
background on the VMWare Linux and is always ready for download requests. The download
directory is set to VMWare Linux's /tftpboot.
Note: Before the application download, the terminal must configure the proper IP values. Refer
to the Setting section for detailed information.
Enter Load Access Code (Default "896345"). The screen prompts for the code once.

Download is complete and TS890 will return to BootROM's main menu.

Note: If an error message appears (see below), in most cases it is because the Linux VMWare
tftp server is not available or the "ServerIP" is not set properly in the TS890. Or, the setting
does not match the server IP.

Remote Sync
Besides using TFTP to download from the developer's VM, the TS890 is equipped with an FTP
client that can retrieve applications from an existing FTP server.
Note 1: The network parameters of TS890 must be properly set up, including "Server IP",
"Gateway", "NetMask" in BootROM's menu 4 - Setting. "Server IP" should be pointed to the FTP
server.
Copyright 2011 All rights reserved.

Page 18

TS890 User Manual Rev. A.2

UIC Confidential

Note 2: It is also necessary to tell the BootROM where to download by setting up "Bank ID",
"Appl ID" and "Version ID" in BootROM's menu 4 Setting.
Input FTP user password or just press <Enter> () to use default password "ts890"

It will immediately start FTP task. In the example below, the server IP is set to 192.168.0.102

If the FTP server can not be reached, the TS890 will display the following.

If the Download is successful t will return to BootROM's main menu.

USB Sync
USB Sync is used for upgrading the developers application by USK disk. Be sure the "Bank ID",
"Appl ID", and "Version ID" have been setup and USB disk has inserted. This function is in
single control and it is needed to input one access codes, the default load access code is
"896345".

Copyright 2011 All rights reserved.

Page 19

TS890 User Manual Rev. A.2

UIC Confidential

Searching for
USB storage
Copying
Completed!!
Erase Appl
Erase Appl is used for erasing all files in the application slot. This function is in single control
and it is needed to input one access code, the default load access code is "896345.

App erased!!

USB Sync IPP


Erase IPP is used for upgrading the IPP firmware. The first step is to erase the IPP and you can
download a new version after the terminal reboot. This function is in dual control and it is
needed to input two access codes. Input default "24652011" and 66085202 for the access
code.

Press "0" if you really want to proceed

Copyright 2011 All rights reserved.

Page 20

TS890 User Manual Rev. A.2

UIC Confidential

Erasing the IPP only takes 2s and you will see this screen very soon. Now you need to reboot
the EDC.

After reboot, you can start the PC side after you see this screen. Contact UIC to get the
download utility at PC side.

Upgrade
Upgrade is used for updating the Linux root file system (ROOTFS), including the /bin /etc /usr
/etc /lib. It is for enhancing the original Linux capability such as adding new Linux tools and
configuration files.
The root file system patch is in the form of a tar ball named "appl.tar.gz" and each is assigned a
version number. The application already loaded will not be erased or impacted by the upgrade.
After the system upgrade, the original application can be executed normally.
To upgrade the root file system, insert a USB Flash drive to plug into the USB host port of
TS890 first. A specific file path of the file system is needed for the system upgrade. Refer to
USB Disk Setup section for more information.
Then input two access codes, Input default "24652011" and 66085202 for the access

code.

Input the ROOTFS version you intend to upgrade, such as "007"


Copyright 2011 All rights reserved.

Page 21

TS890 User Manual Rev. A.2

UIC Confidential

TS890 will now load the USB module and detect the USB Flash drive. This normally takes 5-8
seconds.

If the USB has a problem and cannot be mounted in 15 seconds, screen will display this
message.

If the USB driver mount is successful, the TS890 will prompt to press "0" to proceed.

Writing the ROOTFS may takes 20-30 seconds. Important, please do not power off the
terminal until the update successful message displays.

Done. Reboot the system.

Copyright 2011 All rights reserved.

Page 22

TS890 User Manual Rev. A.2

UIC Confidential

USB Disk Setup


This section describes how to set up a USB Flash drive to be used for system upgrading.

USB must have a directory tree like this: "applpool/SYS/ROOTFS",


All ROOTFS patch files should be inside a subdirectory such as, 006/, 007/ with a fixed
name of appl.tar.gz

[USB driver letter]


applpool
SYS
ROOTFS
004
appl.tar.gz
005
appl.tar.gz
006
appl.tar.gz
007
appl.tar.gz

Load Dukpt Key


This function is for DUKPT key injection purpose. Press 7 will enable the pass-through path to
connect IPP to the key injection equipment via RS232 port A. The user has to enter dual control
password: "24652011" and 66085202.

After the password being accepted, the terminal will erase the key and wait for the new key
loading.
Copyright 2011 All rights reserved.

Page 23

TS890 User Manual Rev. A.2

UIC Confidential

Then start the key injection tool to load the key. If the loading process is successful, the display
will prompt Successful message. Otherwise, it shows failed message. Note. The dual control
to access key loading process is needed in the production version. For the detail operation,
please contact UIC Sales or tech support.

Copyright 2011 All rights reserved.

Page 24

TS890 User Manual Rev. A.2

UIC Confidential

Load M/S Key


This function is for M/S key injection purpose. Press 8 will enable the pass-through path to
connect IPP to the key injection equipment via RS232 port A. The user has to enter dual control
password: "24652011" and 66085202.

After the password being accepted, the terminal will wait for the new key loading.
Loading key
Press CAN to exit
or wait for time out

User can use Key Injection Tool to load M/S Keys to terminal. If user want to exit this function,

) to return, or wait for time out to exit.

please press <Cancel> (

Start Downldr
This function is for firmware purpose. Press 9 will enable download RFS IPP or User APP to
terminal by FTP.
UIC Downloader 1.0
SELECT TYPE
1=RFS
2=IPP
3=User APP

Date & Time


This function is used for changing the systems internal real time clock. Press 3 to enter the
menu. To change the date and time, press 0. Follow the YYMMDDhhmmss format to enter

) to return to main menu without making any changes.

date/time. Or, press <Cancel> (

Copyright 2011 All rights reserved.

Page 25

TS890 User Manual Rev. A.2

UIC Confidential

Setting
This menu is used for setting up system-wide parameters and environmental variables for the
application to read later. When selected, the following screen will display. Use the up or down
buttons to scroll through the menu. The network setup is critical because application downloads
during the development phase rely extensively on TCP/IP.

Press <Enter> (), <Clear> () to enable/disable DHCP or <Up> / <Down> to next setting.

Enter 12 digit number for IP address or <Up> / <Down> to next setting.

Copyright 2011 All rights reserved.

Page 26

TS890 User Manual Rev. A.2

UIC Confidential

Press <Enter> (), <Clear> () to enable/disable Console or <Up> / <Down> to next setting.

Version
This menu is used for displaying application and system modules versions. Also it can display
tamper status and application certification details.

Selftest
This menu is used for system diagnostics. Press <Up> / <Down> to scroll the menu, and press
the corresponding number to perform the test.

Copyright 2011 All rights reserved.

Page 27

TS890 User Manual Rev. A.2

Copyright 2011 All rights reserved.

UIC Confidential

Page 28

TS890 User Manual Rev. A.2

UIC Confidential

Example: ICC diagnostic


This screen shows the ATR status of all the SAM cards. If a SAM is installed, the corresponding
line will show (1, 80, 10). The system detects the presence of SAM during power up.

or
If you insert a card into Reader#1, this screen will show the analysis of ATR. This is useful when
you want to get ATR info from any card. Press the number of the card slot. For example, press
<1> would get this prompt:

Example: Keyboard diagnostic

File System
This screen shows all files under user application's folder - /home/usr1. It provides useful
trouble-shooting for checking file availability and file size in case the application programmer
cannot access the debug console. Here are the function keys:

<Up> / <Down> to navigate files

<Clear> () will delete the file under the cursor

<F1> will delete all files in cfg/. Useful for testing partial downloads.

Copyright 2011 All rights reserved.

Page 29

TS890 User Manual Rev. A.2

UIC Confidential

Development Environment
Usually, to set up a development environment for embedded devices involves installing crosscompile tool chains on a build host and setting up tools for downloading software/firmware to the
target devices. In order to simplify this procedure, UIC decides to leverage the virtual machine
technology. UIC builds a VMWare Linux virtual machine (VM) with cross-compile tool chains
and necessary tools installed. Developers can immediately start programming without installing
a Linux and tools from scratch.

System Requirement

Minimum 2GB RAM


Minimum 30GB free hard disk space
Windows XP or higher
VMWare Player version 3.1.4 for Windows
Linux VM image from UIC

Linux Host (Virtual Machine)


Starting up

First install VMWare Player. Then copy the Linux VM image to the hard disk.
Launch VMWare Player application, click Open a Virtual Machine from the right panel, then
choose the VM image from the file dialog box. Double-click TS890_STD at the left panel of
VMWare Player window.

Copyright 2011 All rights reserved.

Page 30

TS890 User Manual Rev. A.2

UIC Confidential

Sharing resources with Windows host


The best thing of VMWare Player is that it makes it possible to share resources between the host
operating system (i.e. Windows) and the guest operating system (i.e. Linux). The sharable resources
include: shared folders (a folder which can be seen and accessed by both Windows and Linux), network
interfaces, and removable devices (e.g., USB disks).

To share a folder between Windows and Linux, click Virtual Machine then Virtual Machine
Settings on the top menu, then choose the tab page Options, and then Shared Folders item
at the left panel. Configure the shared folder with Add, Remove, and Properties at the right
panel.
In Linux VM, the share folder will be mounted to /mnt/hgfs/share-folder-name

Note: Since Windows does not support file attributes like user/group/others permissions, and since
Windows does not recognize symbolic link either, it is recommended that you only use shared folders to
exchange source codes and zip/tar files.

To share and configure the network interface, click Virtual Machine then Virtual Machine
Settings on the top menu, then choose Hardware tab page, and then click Network Adaptor
item at the left panel.

Copyright 2011 All rights reserved.

Page 31

TS890 User Manual Rev. A.2

UIC Confidential

Note: If your LAN has DHCP server, and if you want to have your PC, Linux VM, and TS890 terminal all in
the same LAN, it is recommended that you choose bridge mode for Linux VM.

To share removable devices, click Virtual Machine then Removable Devices on the top menu.
Then choose the removable device to be shared.

To know more details about using VMWare Player, please refer to the help document of VMware Player,
or visit http://www.vmware.com.
Copyright 2011 All rights reserved.

Page 32

TS890 User Manual Rev. A.2

UIC Confidential

User accounts
There are two user accounts created in TS890 Linux VM:

User ts890, and password 111111.


User root (the super user), and password tong1xun4.

You should always log in and do development as ts890, not as root. The root account is just for you to
do administrative jobs like starting services, change passwords, adding other user accounts, installing or
removing software packages, etc.
Eclipse: the IDE
UIC installs and customizes a version of Eclipse as the IDE (Integrated Development Environment). After
logging into Linux VM as ts890, you would see a icon UIC-Eclipse on the desktop.

Copyright 2011 All rights reserved.

Page 33

TS890 User Manual Rev. A.2

UIC Confidential

Double-click the UIC-Eclipse icon, and click Ok when prompting asking the workspace. A demo
project called CartesParis will be opened.

Now you can edit, build, and clean the project using Eclipse.
Important Directories in Linux VM
Directory and files
/home/ts890
/home/ts890/host_tools
/home/ts890/workspace
/opt/eldk
/usr/share/uicdev-s/
/usr/share/uicdev-s/current
/mnt/hgfs

Copyright 2011 All rights reserved.

Description
The home directory of user ts890.
Containing two script files: instdist to install SDK, and setver to
change to a specific version of SDK.
The default workspace of Eclipse, and contains the demo project
CartesParis.
The cross-compile tool chains, Linux system libraries, and header
files.
Containing UIC SDK (header files and libraries).
A symbolic link pointing to the current effective version of SDK.
VMWare share folder locations.

Page 34

TS890 User Manual Rev. A.2

UIC Confidential

Network Services
Several network services are quite handy or even necessary at the development stage, especially when
downloading programs from Linux VM to TS890.

NFS: TS890 has necessary drivers to mount a nfs share. Developers can transfer files easily via nfs.
TFTP: Download user application to TS890.
FTP: Download user application to TS890.

You can enable these network services from System/Administration/Services.

From the service dialog box, enable the service you need.

Copyright 2011 All rights reserved.

Page 35

TS890 User Manual Rev. A.2

UIC Confidential

TS890: the target device


Debug Console
TS890s console provides very useful features for debugging. You are able to:
1. Monitor all kernel messages during TS890 boot-up.
2. Monitor application's debug messages if it calls the debug APIs.
3. Access the shell to perform some tasks like mounting nfs share, observing current tasks
status, killing a specific task, etc.
To access the console, follow these steps:

Step1: In BootROM 4.Setting, use <Up>()/<Down>() to scroll to this menu

)to exit.

Press <Enter> ( ) to enable, <Clear> () to disable, <Cancel> (

Step2: Connect a download cable to 232B of TS890 with your PC. Run a terminal
emulator program (e.g. teraterm or putty) with the following serial port setting: 115200
bps, 8 data-bit, 1 stop bit, no parity, no hardware handshake.

Copyright 2011 All rights reserved.

Page 36

TS890 User Manual Rev. A.2

UIC Confidential

Step3: Reboot TS890 to make it effective. If you kernel boot message after 8s, you did
correctly in above steps.
Step4: Press [MENU] in BootROM's main menu and you will get the shell. The shell will
not be activated unless you press <Enter> in the console. Enter root in the user name,
and press enter.

Root file system (RFS)


TS890's file system runs on the Flash memory with industrial standard JFFS2 (Journaling Flash
File System Version2). This provides power fail resistance. In case of power failure during a
write, JFFS2 will roll back to the last good journal entry. JFFS2 provides real-time compression
to increase storage size and Flash life.
Flash writes are buffered in 4K size and Linux's command sync() is used to commit write to flash
immediately. JFFS typically have a large overhead for each journal entry (write) thus making
them very inefficient for writing small amounts of data.
TS890 also follows Linux's directory tree structure. The entire tree is placed on flash (JFFS2)
except for /tmp. /tmp runs on volatile RAM which serves as a big file buffer for some
applications, such as remote download.
Directory
/bin

Meaning
Contains executable programs that are required for system repair, for instance, tar, grep, kill,
ps..etc

/dev

Contains device files required for interfacing with hardware.

/etc

The configuration files for the Linux system. Most of these files are text files and can be edited
by hand.

/home

/home/usr1 is where the user application is.

Copyright 2011 All rights reserved.

Page 37

TS890 User Manual Rev. A.2

/lib

/mnt

/proc

/sbin
/sys
/tmp

UIC Confidential

Contains shared object library files that are necessary to boot the system as well as containing
files required by various programs. This directory also contains modules (located in
/lib/modules) which can be loaded into the kernel.
Used for mounting temporary file systems. USB storage will be mounted at /mnt/usb. NFS
share will be mounted at /mnt/nfs.
Provides information about running processes and the kernel. A directory is provided for each
running process. Useful system information such as the amount of memory available on the
system as well as CPU speed can be found within the /proc directory.
Similar to /bin, this directory contains executable programs needed to boot the system,
however the programs within /sbin are executed by the root user. Contains system
maintenance programs, for example, ifconfig
This directory is used for temporary storage space. Files within this directory are often cleaned
out at boot time. By using /tmp directory, the user can be assured the files will be wiped off the
system the next time the machine reboots.
/usr/bin - Executable programs that are not required for booting or repairing the system.

/usr
/usr/local This directory contains files of variable file storage. Files in /var are dynamic and are constantly
being written to or changed. Some directories located within /var include:
/var

/var/log - files containing logging information


/var/run - files containing the process ID's for each current process.

Mounting NFS from Linux host


Suppose you want to share /home/ts890/nfs on the Linux VM with TS890 terminal, and assume
Linux VM has IP 192.168.2.96. First you need to edit (log in as root) /etc/exports to export the
directory.

Copyright 2011 All rights reserved.

Page 38

TS890 User Manual Rev. A.2

UIC Confidential

Then start up NFS service (log in as root).

And finally mount nfs from TS890.

Updating User Application


BootROM/Program/Load
Load function is for the developer to start the application download from the Linux VM to the
terminal through the standard TFTP protocol. The TFTP service is running in the background on

Copyright 2011 All rights reserved.

Page 39

TS890 User Manual Rev. A.2

UIC Confidential

the VM and is always ready for download request. The download directory is set to Linux VM's
/tftpboot.
Every time when an application is built, the resulting executable package appl.tar.gz will be
copied to Linux VMs /tftpboot automatically. If you set the Server IP to Linux VM correctly, you
can operate TS890 BootROM/Programs/Load to update the application.
USB Sync
USB Sync uses TS890's USB HOST to update applications. The application should be in the
form of appl.gar.gz and should be put in a well-structured directory in a USB flash drive. As
each PackageKit is around 200-300K, a 2G USB Flash can hold 5,000+ applications.
USB Disk Setup

Must have a directory called applpool/, in lower capital letters


All application PackageKits should in this filename appl.tar.gz
All applications should be located in following path.

Example: If the flash drive is at F:/. The path mush be F:/applpool/ <Bank ID> / <Appl ID> / <Version ID>
/appl.tar.gz

Note that <BankID>, <ApplID>, <VersionID> should not contain lower case letters

Applpool

CTB
CPC
20051122
appl.tar.gz
20051123
appl.tar.gz
EMV
20080101
CUB
Copyright 2011 All rights reserved.

Page 40

TS890 User Manual Rev. A.2

UIC Confidential

USB Disk download from BootROM


1. Setup "Bank ID", "Appl ID" and "Version ID" in BootROMs 4.Setting (please scroll
up/down to look for them )
2. Plug a USB disk on HOST port
3. Go to 2.Program -> 4.USB Sync. Mounting a USB drive will takes 8s. If no USB is found,
this sync function will timeout and return to main menu in 30s
4. Done.
Remote Sync via FTP
Besides using TFTP to download from the developer's VM, TS890 is equipped with an easy to
use remote download protocol that can retrieve applications from the Application Server (AS)
supporting an existing robust FTP.
Setup of Application Server (AS)
Application Server is a normal FTP server with

FTP user name must be "ts890",


FTP password can be assigned to any string, prefer to use "ts890"
Must have a directory called applpool/, in lower capital letters
All application PackageKit should in this filename appl.tar.gz
All applications should be located in following path.

applpool/ <Bank ID> / <Appl ID> / <Version ID> /appl.tar.gz


Note that <BandID>, <ApplID>, <VersionID> should not contain lower
capital letters

applpool

CTB
CPC
20051122
appl.tar.gz
20051123
Copyright 2011 All rights reserved.

Page 41

TS890 User Manual Rev. A.2

UIC Confidential

appl.tar.gz
EMV
20080101
CUB

Remote download from BootROM

Setup the network including "Server IP", "Gateway", "NetMask" in BootROM's 4.Setting
Setup "Bank ID", "Appl ID" and "Version ID"

Go to 2.Program -> 2.Remote Synch. Input password or just press <Enter> ( ) to use
default password "ts890".
Done.

Copyright 2011 All rights reserved.

Page 42

TS890 User Manual Rev. A.2

UIC Confidential

Security Management
IPP Security
This chapter will describe the operation of the internal PIN Pad.
TS890 has a built in PIN Pad, which runs on a dedicated ARM7 SOC to provide maximum
sensitive data separation and protection. All the security related functions and sensitive data are
located on this SOC and are invoked via remote procedure call.

Key Storage and Protection


The cryptography processor has 16-bytes special registers where it stores a "Key Storage Key".
20 User keys are stored in on-chip EEPROM and are 3DES encrypted with it. User keys are
also protected by a CRC which is verified every time user keys are accessed.
This "Key Storage key" will be erased if:

Wire mesh is shortened or cut


Switches are open
3V backup battery is too low or too high
temperature is out of range
metal layer is tampered
RTC is out of range

The erasure is always activated even when powered down and can not be disabled by software.

Tamper detection / response


System Tampered System Halted will be displayed on screen in the event of tampering.
Moreover, the ARM7 SOC will check the keys integrity at every power-on process. It will treat a
wrong checksum as a tamper action and cause key erasure.

Self-test
The IPP will carry out following the integrity tests:

IPP startup ROM integrity test

At chip reset, the boot loader of ARM7 SOC will check the integrity of the IPP (internal PIN
pad) firmware before activating it. If the integrity check fails, the boot loader will not pass the
control to IPP firmware, and will erase the IPP firmware. In this case, the PED will prompt
"IPP Download Needed" and halt. The PED needs to be returned to the manufacturer for
repair and re-install IPP fimrware.
Copyright 2011 All rights reserved.

Page 43

TS890 User Manual Rev. A.2

UIC Confidential

IPP periodic ROM integrity test

When the IPP is running, it will automatically check the self-integrity every hour. The
checking algorithm is same as that of the boot loader of ARM7 SOC. If the integrity check
fails, the IPP will erase the "Key storage key" and generate a tamper event. The PED will
prompt "System Tampered" "System Halted" immediately and halt. If the PED is restarted,
self-test mentioned in previous paragraph will be executed. The PED needs to be returned
to the manufacturer for repair.

IPP periodic KEY integrity test

When the IPP is running, it will also check key array integrity every hour. If the integrity
check fails, the IPP will erase the "Key storage key" and generate a tamper event. The PED
will prompt "System Tampered (K) System halt" immediately and halt.

IPP on-demand KEY integrity test

Key array integrity check is also performed every time the key array is accessed, such as
during MAC/Pin Block calculation or restore keys. If the integrity check fails, the IPP will
erase the "Key storage key" and generate a tamper event. The PED will prompt "System
Tampered System halted" immediately and halt.

PED BootROM startup test

The BootROM contains a certificate at the end of the whole binary image. The certificate is
the same format as the application certificate which contains BootROMs SHA-1s checksum
and is signed by vendors private key. Any illegal modification of the BootROM content,
either the download image or Flash chip content will cause a mismatch of the SHA1
checksum.

Timeout control
The BootROM implements two types of timeout controls: 1 minute inactive timeout and 10
minute session timeout.
The inactive timeout defaults to 1 minute. If the BootROM is inside any sensitive functions such
as:
"(1) Load application",
"(8) Load File,"
"(3) Load Dukpt Key", and Load M/S Key

Copyright 2011 All rights reserved.

Page 44

TS890 User Manual Rev. A.2

UIC Confidential

Without any data being sent from the PC com port over a period of 1 minute, the inactive timer
will exit the BootROM. System Mode, Access code? will be display on the screen. If the
access code is correct, BootROM will be re-entered.
If the BootROM is inside a non-sensitive function, and is idle 1 minute without any key press, it
will quit the current function and BootROM will go to one upper menu.
There is also a 10 minute session timeout for BootROM. TS890 will deliberately exit the
BootROM and bring the user to the access code entry prompt after this timeout.

PIN attack protection


PIN encryption is limited to once per 30 seconds on average to deter an exhaustive PIN search.
The algorithm is best explained in terms of tokens in a bucket. A PIN encryption request is only
accepted if there is a token in a bucket. A token is placed in the bucket every 30 seconds, with a
maximum of 60 tokens allowed in the bucket. Note: The number of tokens in the bucket is
maintained across power cycles.
Every time a PIN is entered, a token is removed. If there is no token available, the PIN entry
request returns an error. This allows an average of one PIN encryption per 30 seconds, but over
a long period of time.
This control also applies to entering BootROM's access code.

Tamper Recovery
Upon tamper, the terminal is disabled and will not accept any keystroke. All peripherals are
closed. In order to recover it:

Press Cancel key to enter the unlock procedure.


For development mode terminals, enter the 1st access code (default: 1412021528). For
production mode terminals, the terminal will prompt you to enter the 2nd access code
(default: 8816606415).
The terminal is now unlocked and will show the tamper reason. Please keep this
information for further inspection.
Reboot the machine.

IPP Key Loading


IPP Key Loading
BootROM is responsible for key loading. It provides a pass-through connection from the
download port (232A port) to the internal PIN pad. It does not interpret or cache any incoming
data. Every time the Key load function is invoked, all the keys inside IPP are erased. This
means that all keys should be loaded in the same session.

Copyright 2011 All rights reserved.

Page 45

TS890 User Manual Rev. A.2

UIC Confidential

BootROM Key loading user interface


Follow this procedure to load master keys:

1. Enter BootROM by pressing <Cancel> ( ) and entering an access code.


2. Selects (2)Program and (7)LOAD Dukpt Key or (8)Load M/S Key form menu
3. Input dual access code. It is factory defaulted to "24652011" and "66085202". These can
be altered if required. The entry of access code is protected against brute force attack.
4. Keys in IPP are erased and BootROM waits for new keys.
The communication is 9600,8,N,1 without hardware flow control.
Note: The protocol of key loading and detailed key management information is specified in
another document TS890 Key Management. Please contact UIC to get this document.

~ End of the Document ~

Copyright 2011 All rights reserved.

Page 46

You might also like