Power supply arrangement for fault-tolerant operation in a microcomputer-based encryption system

ABSTRACT

An improved fault-tolerant arrangement for use in a multichannel data encryption unit is disclosed. In accordance with the teachings of this invention, a data encryption system includes a plurality of data encryption devices and a host computer and display system wherein a data bus which couples the host computer and data encryption devices includes first and second power supply lines. Each of the respective data encryption devices includes means for automatically deriving power from either of the first or second power supply lines based on the presence of power thereon. Accordingly, fault-tolerant operation is provided wherein the respective data encryption devices continue operating even in the event of the failure of the host computer.

FIELD OF THE INVENTION

This invention relates to the field of electronic transactionprocessing, and more specifically, to a power supply arrangement forfault-tolerant operation.

BACKGROUND OF THE INVENTION

Electronic fund transfer processing systems are widely used forcommunicating financial transaction information between banks and remoteterminals, such as point of sale terminals (POS) and automated tellermachines (ATM).

In today's systems, information is transmitted between respective nodesover telecommunication lines which may be intercepted by an adversary.Though the intercepted electronic data is not immediately readable, itcan be made readable through the use of a typical home computer. Withthis data and readily available hardware, counterfeit plastic cards canbe produced and used to fraudulently withdraw funds from legitimatecustomer accounts.

Since the information transmitted over these systems must be maintainedunder intense security, and the interception of messages cannotrealistically be prevented, the information or data is typically encodedor encrypted prior to transmission over the system.

Data encryption is the coding of data to render it unreadable to anyonewho does not possess the proper decoding information. In an ATMtransaction, a customers personal identification number (PIN) istransmitted along with a transaction request to allow the customer'sfinancial institution to verify that the person making the request isauthorized to do so. If the customer's PIN is not encrypted beforetransmission, it is readily available to an eavesdropper for use withcounterfeit or stolen cards.

However, if the PIN is encrypted before it is transmitted, this type oftheft can be prevented. Even if the encrypted PIN is intercepted, theencrypted PIN would be unintelligible. Without a usable PIN, acounterfeit card would be useless. While many financial transactionstravel directly from a remote terminal to a financial institution oversecure telecommunication lines, the trend today is toward large, sharednetworks in which transaction requests entered on a remote terminal arerelayed through several network nodes before they arrive at thecustomer's financial institution.

The first link in a typical network arrangement, after the remoteterminal, is the financial institution which has contracted to acquiretransactions from the terminal. This institution is called the"acquirer." The acquirer forwards the request to a regional switch whichreceives transactions from many acquirers. The switch then forwards therequest to an institution which verifies the PIN and authorizes orrejects the transaction. This institution may be the institution whichissued the card or it may be an agent of the card issuer.

The use of data encryption to protect PINs in this environment requiresthat each remote terminal have the ability to encrypt PINs beforetransmitting them in a transaction request, and that each card issuerhave the information necessary to decrypt the PINs upon receiving themfor verification.

This would be a relatively simple matter if all PINs were encryptedunder the same encryption method. If such were the case, PINs encryptedat remote terminals would remain encrypted until they arrived at thecard issuer for verification. The card issuer could decrypt all PINs,regardless of which terminal they came from, because all remoteterminals would use the same PIN-encrypting method.

However, this scenario is too simplistic to be effective. Whileproviding a slightly higher level of security than if the PINs were notencrypted at all, there would be a huge security risk in that literallyhundreds of thousands of PINs would be encrypted under the same methodand each transaction acquirer and card issuer in the network would needto have knowledge of the method in order to perform their function inthe transaction process. Such widespread knowledge of an encryptionmethod would expose such a large number of PINs as to present anunacceptable level of network security risk. For this reason, theencryption method used today is necessarily more complex. In cases wherethe information or data is transmitted through one or more institutions,the information or data is typically decrypted at each institution andre-encrypted prior to transmission to the next institution.

While a variety of encryption methods are in use today, the most commonencryption method is referred to as the "Data Encryption Standard (DES)algorithm." The DES algorithm has been recommended by the AmericanNational Standards Institute (ANSI) as the encryption standard forfinancial institutions.

The DES algorithm encrypts electronic data, such as a PIN entered at aremote terminal keypad or an account number taken from the magneticstrip on the back of a plastic debit card, by performing a complexseries of processes which transform the original data into a completelyunrecognizable string of characters.

What makes it possible to use only one encryption method industry-wideand still maintain data security is the fact that the DES algorithmincorporates encryption "keys" which enable users to customize orpersonalize the algorithm for their own application. Decrypting datawhich has undergone DES encryption under a specific key requiresknowledge of both the algorithm and the key. Attempting to decrypt thedata with a different key or with no key at all would produce unreadablegibberish. Therefore, even though the whole network possesses theencryption algorithm, only those parties which possess the specificencryption key are able to decrypt the data.

In a process which will be further discussed below, the customer's PINis encrypted at the remote terminal under a key which is used encryptpINs for transmission to the transaction acquirer. The encrypted PIN isthen sent to the acquirer, where it is translated for delivery to theswitch. PIN translation at the acquirer involves decrypting the PINunder the remote terminal key, then re-encrypting it under a key whichis used exclusively to encrypt PINs for transmission to the switch.

From the transaction acquirer, the PIN is transmitted to the switch,where a similar process is used to translate the PIN for delivery to thecard issuer. Finally, at the card issuer, the PIN is translated forverification. Therefore, for each of these translations, a reliable dataencryption/decryption device must be employed to convert the PINinformation into a form which can be understood by the next link in thesystem.

Another threat to message security comes in the form of messagetampering, such as the alteration of existing messages or thesubstitution of counterfeit messages for authentic messages.

For example, in an EFT message, a sophisticated eavesdropping orwiretapping organization could replace various elements in the messageto redirect funds or fraudulently authorize transactions.

Therefore, just as data encryption protects against PIN theft, so doesmessage authentication protect against message tampering. With messageauthentication, selected segments of a message are passed through theDES algorithm under a special authentication key. Rather than encryptingthe data though, the algorithm calculates a code value from the data andappends this value to the end of the message. The receiver of themessage runs the message through the algorithm under the same key usedby the sender and arrives at a code value. The receiver then comparesthe just-calculated value against the value that was appended to themessage by the sender. If the message has been tampered with, the twovalues will not be the same. If, on the other hand, the code values areequal, the message is authentic.

This would effectively foil a message-tampering scheme because the ATM,upon arriving at a message authentication value for the return message,would automatically deny the transaction, in spite of the authorizationcode. This would happen because the substitution of the authorizationsegment to the denial segment would cause the authentication value tochange. The ATM would sense the disparity between the two values andwould refuse to dispense the cash. The perpetrator could not effectivelyalter the authentication value because he would not have the proper keyused by the sender and the receiver to arrive at the value.

While the DES algorithm and the message authentication scheme describedabove provide a large measure of security, the security of the system istotally dependent upon the security of the DES keys under which data isencrypted or authenticated. If an adversary were to come into possessionof the key used between two links in the network, that adversary wouldhave free access to all the transaction data which passed between links.For example, if he knew the key used by an ATM to encrypt PINs, he wouldbe able to decrypt the PIN of every customer who used the ATM. If hepossessed the key used to authenticate messages between any two links inthe network, he could freely substitute messages or parts of messages tofraudulently redirect funds.

Therefore, in this type of system, good key management practices areessential in maintaining the security of the system. One element ofmaintaining the security of key information is to perform all keyoperations, such as key entry, key storage, encryption, and translation,within a physically and logically secure module. Since, at variouspoints in the encryption process, keys may exist in the clear, it wouldbe possible for an adversary to penetrate the network link's softwareand extract encryption keys. Maintaining the circuity which processesthis information in secrecy prevents system security breaches.

Present data encryption devices for use with secure networks are knownto have many limitations. For example, in present encryption devices,key management is cumbersome. In one widely used encryption system,secure data is retained in a security module which cannot be modified orreprogrammed externally. In order to modify key data retained within thesecurity module, the security module must be physically removed from theencryption device and reprogrammed with a dedicated programming unit. Asa consequence, the encryption unit must be taken out of service whileany key modification is performed. Since effective system securityrequires that key information is changed regularly, the above techniqueresults in inefficient utilization of the system. Current dataencryption devices do not provide an easy and efficient means ofupdating secure information without physically disturbing the dataencryption device or removing the data encryption device from thesystem.

Furthermore, current systems rely on a dedicated encryption device foreach data communication channel. In systems which require fault-tolerantoperation, a plurality of discrete devices are required, each under thecontrol of a remote processor. With this type of system, a hostprocessor communicates with each encryption device individually. Iffault-tolerant operation is required, duplicate encryption devices arecoupled to parallel channels of the host processor. The host processorthen monitors the operation of the primary encryption device, and ifcommunications with that device are lost, the host processor initiatescommunication with the secondary encryption device. Systems which employthis configuration are subject to the loss of data in transit when onecommunication channel fails. Any data transmitted to a failed unitbefore the detection of a failure by a host must be retransmitted to asecondary device for reprocessing, thus degrading the performance of thesystem. No data encryption device is known which provides afault-tolerant data encryption channel which requires only a single datacommunication channel and provides fault-tolerant operation without theneed for monitoring by a host processor. Furthermore, no data encryptiondevice is known which provides for automatic recovery from hardwarefailures.

In yet another aspect of present system configurations, the operatingstatistics of an encryption unit are unknown to the operator of asystem. For example, a large number of denied transactions may beattributable to a failing encryption unit. If such statistics were ofinterest to a system operator, the main processing computer of thesystem would have to compile them, thus increasing the processingoverhead and the overall cost of the system. Present data encryptiondevices are not provided with any means by which a user can visuallymonitor the operating status of the device, thereby allowing a user todetect a problem before a catastrophic failure occurs.

Finally, present systems are increasingly required to communicate with avariety of communication protocols and key verification techniques.Currently, dedicated encryption devices are required for implementingeach type of encryption scheme. No device is known which supports dataencryption using a variety of communications protocols.

SUMMARY OF THE INVENTION

Briefly described, the present invention contemplates a fault-tolerantpower supply arrangement for use with a multichannel data encryptionsystem wherein the encryption system includes a host computer whichcommunicates with data encryption devices over data encryption channelsand a display and control processor which communicates with the dataencryption devices through a data bus. In accordance with the presentinvention, system power is derived from two independent power sourceswhich are distributed over first and second data bus lines. The systemincludes a plurality of data encryption devices having parallel andserial ports and first and second power supply inputs coupled to saidfirst and second power supply lines of the data bus, respectively. Themonitor and display system communicates with the data encryption devicesthrough the data bus, and displays operating statistics of the dataencryption boards wherein said monitor and display system includes apower supply input coupled to the first power supply line of the databus. Under normal operation, the data encryption devices derive powerfrom the power source coupled to the second bus line. However, if thesecond power source fails, the data encryption devices instantly switchover to the first power supply, thus providing fault-tolerant operation.In another aspect of the present invention, the first power supply maybe turned off for servicing without disturbing the operation of the dataencryption devices.

Accordingly, it is an object of the present invention to provide amultichannel encryption unit compatible with a plurality of encryptionschemes.

It is another object of the present invention to provide afault-tolerant device for use with data processing systems.

It is another object of the present invention to provide afault-tolerant encryption device for use in an electronic fund transfersystem.

It is another object of the present invention to provide afault-tolerant processor arrangement.

It is another object of the present invention to provide a multichannelprocessor arrangement which is resistant to power supply failures.

It is another object of the present invention to provide an encryptiondevice protocol which may be used universally with all known encryptionschemes.

It is another object of the present invention to provide a tokenizedcommunication protocol for communicating with a plurality of processingunits.

It is another object of the present invention to provide an efficientand user-friendly means of entering and updating key information in adata encryption unit.

It is another object of the present invention to provide an efficient,secure and user-friendly means of entering and updating key informationin a data encryption unit.

It is another object of the present invention to provide a menu-drivencontroller for use with a multichannel data encryption device.

It is another object of the present invention to substantially reducethe cost of a data encryption device.

It is another object of the present invention to provide improvedsecurity in a data encryption device while improving the ease of entryof key information.

It is another object of the present invention to provide a displaydevice for use with a multichannel encryption unit.

It is another object of the present invention to provide a method andmeans for recording and displaying operating statistics in a dataencryption unit.

It is another object of the present invention to provide a method ofaltering the software of a data encryption device display and controlunit without disturbing the operation of associated data encryptiondevices.

It is another object of the present invention to provide a method ofupdating the control software in a data encryption device withoutphysically disturbing the data encryption unit.

It is another object of the present invention to provide an improvedmeans for updating software in a multiprocessor computer system.

It is another object of the present invention to provide a user-friendlyfront end control unit which controls access to data encryption devices.

It is another object of the present invention to provide an efficientand effective means of providing password protection in data encryptiondevices.

It is another object of the present invention to provide afault-tolerant microcomputer arrangement.

It is another object of the present invention to provide a menu-drivenkey management interface for use data encryption devices.

BRIEF DESCRIPTION OF THE DRAWINGS

These and other objects will be fully appreciated through thedescription below and the accompanying Figures of drawing in which:

FIG. 1 is a block diagram showing a typical shared network for anelectronic fund transfer system.

FIG. 2A is a block diagram of a prior art encryption device andmainframe computer arrangement.

FIG. 2B is a block diagram of the encryption device and mainframecomputer arrangement of the present invention.

FIG. 3A is a block diagram of the basic configuration of themultichannel, microcomputer-based encryption system of the presentinvention.

FIG. 3B is a block diagram of an embodiment of the multichannel,microcomputer-based encryption system of the present invention having afault-tolerant encryption or processing device arrangement.

FIG. 3C is a block diagram of an embodiment of the multichannel,microcomputer-based encryption system of the present invention having afault-tolerant power supply arrangement.

FIG. 3D is a block diagram of an embodiment of the multichannel,microcomputer-based encryption system of the present invention having afault-tolerant encryption or processing device arrangement and afault-tolerant power supply arrangement.

FIG. 4A is schematic diagram of an encryption device adapted for usewith the system of FIG. 3A or 3C.

FIG. 4B is schematic diagram of an encryption device arrangement adaptedfor use with the system of FIG. 3B or 3D.

FIGS. 5A through 13 are flow diagrams detailing the operation of themonitor software portion for each of the encryption devices used inconjunction with the present invention, wherein:

FIG. 5A is a flow diagram of the encryption device power-oninitialization routine.

FIG. 5B is a continuation of the flow diagram of FIG. 5A.

FIG. 6 is a flow diagram detailing the operation of the "F₋₋ INIT"subroutine called by the routine of FIG. 5A.

FIG. 7 is a flow diagram detailing the operation of the "F₋₋ INIT2"subroutine called by the routine of FIG. 7.

FIG. 8A is a flow diagram of the encryption device serial interruptroutine.

FIG. 8B is a memory map of the serial input and output buffers.

FIG. 9 is a flow diagram of the encryption device bus interrupt routine.

FIG. 10A is a flow diagram of the "F₋₋ LOADAPP" subroutine called by thesubroutine of FIG. 9.

FIG. 10B is a continuation of the flow diagram of FIG. 10A.

FIG. 11 is a flow diagram of the encryption device "POWERFAIL₋₋INTERRUPT" subroutine.

FIG. 12 is a flow diagram of the encryption tamper switch interruptroutine.

FIG. 13 is a flow diagram of the encryption device F₋₋ WATCHDOGsubroutine.

FIGS. 14 through 50 are flow diagrams detailing the operation of theapplication software portion for each of the encryption devices used inconjunction with the present invention, wherein:

FIGS. 14A and 14B are flow diagrams of the encryption device "START₋₋APPLICATION" routine.

FIG. 15 is a continuation of the routine of FIG. 14.

FIGS. 16A and 16B are continuations of the routine of FIG. 15.

FIGS. 17A through 17C are flow diagrams of token input routines.

FIG. 18A is a jump table layout used by the routines of FIG. 17A.

FIG. 18B is a jump table layout used by the error routine of FIG. 50.

FIG. 19 is a flow diagram of the "STAT" routine branched to by theroutine of FIG. 17A.

FIG. 20A is a flow diagram of the routine for processing the "ZA" tokenand is branched to by the routine of FIG. 17A.

FIG. 20B is a flow diagram of the routine for processing the "ZB" tokenand is branched to by the routine of FIG. 17B.

FIG. 20C is a flow diagram of the routine for processing the "ZC" tokenand is branched to by the routine of FIG. 17C.

FIG. 20D is a flow diagram of the routine for processing the "ZD"through "ZP" tokens and is branched to by the routine of FIG. 17C.

FIG. 21 is a flow diagram of the "PROCESS" message routine jumped tofrom the routine of FIG. 16.

FIG. 22 is a flow diagram of the "CATC" message routine jumped to fromthe routine of FIG. 21.

FIG. 23 is a flow diagram of the "CKTA" message routine called by theroutine of FIG. 21.

FIG. 24 is a flow diagram of the "CLWA" message routine called by theroutine of FIG. 21.

FIG. 25 is a flow diagram of the "CRYP" message routine called by theroutine of FIG. 21.

FIG. 26 is a flow diagram of the "CWKS" message routine called by theroutine of FIG. 21.

FIG. 27 is a flow diagram of the "DDAT" message routine called by theroutine of FIG. 21.

FIG. 28 is a flow diagram of the "DES" message routine called by theroutine of FIG. 21.

FIG. 29 is a flow diagram of the "DKTE" message routine called by theroutine of FIG. 21.

FIG. 30 is a flow diagram of the "ECHO" message routine called by theroutine of FIG. 21.

FIG. 31 is a flow diagram of the "EDAT" message routine called by theroutine of FIG. 21.

FIG. 32 is a flow diagram of the "EFIT" message routine called by theroutine of FIG. 21.

FIG. 33 is a flow diagram of the "EPIN" message routine called by theroutine of FIG. 21.

FIG. 34 is a flow diagram of the "GWKS" message routine called by theroutine of FIG. 21.

FIG. 35 is a flow diagram of the "IKEY" message routine called by theroutine of FIG. 21.

FIG. 36 is a flow diagram of the "LATM" message routine called by theroutine of FIG. 21.

FIG. 37 is a flow diagram of the "LCDT" message routine called by theroutine of FIG. 21.

FIG. 38 is a flow diagram of the "LENT" message routine called by theroutine of FIG. 21.

FIGS. 39A and 39B are flow diagrams of the "LMKT" message routine calledby the routine of FIG. 21.

FIG. 40 is a flow diagram of the "LKEY" message routine called by theroutine of FIG. 21.

FIG. 41 is a flow diagram of the "RKEY" message routine called by theroutine of FIG. 21.

FIG. 42 is a flow diagram of the "SKEY" message routine called by theroutine of FIG. 21.

FIG. 43 is a flow diagram of the "TDLY" message routine called by theroutine of 21.

FIG. 44 is a flow diagram of the "TPIN" message routine called by theroutine of FIG. 21.

FIG. 45 is a flow diagram of the "TWKD" message routine called by theroutine of FIG. 21.

FIG. 46 is a flow diagram of the "F₋₋ DELAY" message routine called byvarious subroutines of the present invention.

FIG. 47 is a flow diagram of the "TWKL" message routine called by theroutine of FIG. 21.

FIG. 48 is a flow diagram of the "VKTE" message routine called by theroutine of FIG. 21.

FIG. 49A is a flow diagram of the "VPIN" message routine called by theroutine of FIG. 21.

FIG. 49B is a continuation of the routine of FIG. 49A.

FIG. 50 is a flow diagram of the "ERROR" routine called by the routineof FIG. 16.

FIGS. 51 through 97 are diagrams of screen displays of the menu-driven,user-friendly interface of the present invention, wherein:

FIG. 51 is a diagram of the opening status screen displayed to the userupon system power-up.

FIG. 52 is a representative sample of the opening help screen displayedto the user when activated from a preselected function.

FIG. 53 is a diagram of the master status screen displayed to the userwhen the status display mode is selected.

FIG. 54 is a diagram of the status screen displayed to the user whenresetting board statistics.

FIG. 55 is a diagram of the status screen displayed to the user under analarm condition.

FIG. 56 is a diagram of the master "OPTIONS₋₋ MENU" displayed to theuser when the options mode is selected.

FIG. 57 is a diagram of the screen displayed to the user when option"Status Interval" is selected.

FIG. 58 is a diagram of the screen displayed to the user when option"Sample Interval" is selected.

FIG. 59 is a diagram of the screen displayed to the user when option"Threshold Values" is selected.

FIG. 60 is a diagram of the screen displayed to the user when option"New Password" is selected.

FIG. 61 is a diagram of the screen displayed to the user when option"Configure" is selected.

FIG. 62 is a diagram of the screen displayed to the user when option"Configure" is selected at a first level, and a particular board isselected at a second level.

FIG. 63 is a diagram of the screen displayed to the user when option"Configure" is selected at a first level, a particular board is selectedat a second level, and the "Board Description" menu is selected at athird level.

FIG. 64 is a diagram of the screen displayed to the user when option"Configure" is selected at a first level, a particular board is selectedat a second level, and the Board Description menu is selected at a thirdlevel.

FIG. 65 is a diagram of the screen displayed to the user when option"Configure" is selected at a first level, a particular board is selectedat a second level, and the "Group" menu is selected at a third level.

FIG. 66 is a diagram of the screen displayed to the user when option"Configure" is selected at a first level, a particular board is selectedat a second level, and the "Mode" menu is selected at a third level.

FIG. 67 is a diagram of the screen displayed to the user when option"Configure" is selected at a first level, a particular board is selectedat a second level, and the "Communications" menu is selected at a thirdlevel.

FIG. 68 is a diagram of the screen displayed to the user when option"Configure" is selected at a first level, a particular board is selectedat a second level, the "Communications" menu is selected at a thirdlevel, and "Baud Rate" is selected at the fourth level.

FIG. 69 is a diagram of the screen displayed to the user when option"Configure" is selected at a first level, a particular board is selectedat a second level, the "Communications" menu is selected at a thirdlevel, and "Parity" is selected at the fourth level.

FIG. 70 is a diagram of the screen displayed to the user when option"Configure" is selected at a first level, a particular board is selectedat a second level, the "Communications" menu is selected at a thirdlevel, and "Data Bits" is selected at the fourth level.

FIG. 71 is a diagram of the screen displayed to the user when option"Configure" is selected at a first level, a particular board is selectedat a second level, the "Communications" menu is selected at a thirdlevel, and "Frame Timer" is selected at the fourth level.

FIG. 72 is a diagram of the screen displayed to the user when option"Configure" is selected at a first level, a particular board is selectedat a second level, and "Serial Support" is selected at a third level.

FIG. 73 is a diagram of the master screen displayed to the user when"Keys" is selected on the menu bar.

FIG. 74 is a diagram of the screen displayed to the user when Key menuitem "Load MFK" is selected at a first level and "ENTER₋₋ KEY Part 1" isdisplayed at a second level.

FIG. 75 is a diagram of the screen displayed to the user when Key menuitem "Load MFK" is selected at a first level, "ENTER₋₋ KEY Part 1" isselected at a second level, a key part has been entered, and the systemis requesting verification of the key part.

FIG. 76 is a diagram of the screen displayed to the user when Key menuitem "Load MFK" is selected at a first level, all key parts have beenentered, and the system is requesting acceptance of the key parts.

FIG. 77 is a diagram of the screen displayed to the user when Key menuitem "generate PVK cryptogram" is selected at a first level, the keyparts are entered at the second level, and the key parts were acceptedat a third level.

FIG. 78 is a diagram of the screen displayed when a user has instructedthe system to load a cryptogram.

FIG. 79 is a diagram of the screen displayed when a user has instructedthe system to load a cryptogram and the system is prompting a user toenter a table position.

FIG. 80 is a diagram of the screen displayed when a key table positionhas been entered and the system is requesting verification of theentered value.

FIG. 81 is a diagram of the screen displayed when the entered key tableposition value has been verified by the user and the key table positionhas been loaded in the system.

FIG. 82 is a diagram of the screen displayed when the menu option"Random Key generation" is selected by the user.

FIG. 83 is a diagram of the opening screen displayed to the user whenthe Key menu item "LOAD₋₋ DIEBOLD₋₋ TABLE" is selected.

FIG. 84 is a diagram of the screen displayed to the user when the Keymenu item "LOAD₋₋ DIEBOLD₋₋ TABLE" is selected and the user editing modeis active.

FIG. 85 is a flow diagram of the screen displayed when the user hasselected the menu item "LOAD₋₋ DIEBOLD₋₋ TABLE" is selected, a table hasbeen entered and the "F3" key has been pressed and the system isprompting the user to accept or cancel the table or return to the tableediting mode.

FIG. 86 is a diagram of the screen displayed to when the Key menu item"LOAD₋₋ DIEBOLD₋₋ TABLE" is selected and the Diebold table has beenaccepted.

FIG. 87 is a diagram of the screen displayed to the user when the Keymenu "LOAD₁₃ DIEBOLD₁₃ TABLE" is selected, the Diebold table has beenaccepted, a table position has been entered, and a duplicate table valuehas been entered.

FIG. 88 is a diagram of the master screen displayed to the user when"Utils" is selected on the menu bar.

FIG. 89 is a diagram of the screen displayed to the user when "Utils" isselected on the menu bar, "Backup" has been selected under the "Utils"menu, and a board has been selected to Backup.

FIG. 90 is a diagram of the screen displayed to the user when "Utils" isselected on the menu bar, "Backup" has been selected under the "Utils"menu, and the system is prompting the user to insert a diskette in thesystem.

FIG. 91 is a diagram of the screen displayed to the user when "Utils" isselected on the menu bar, "Backup" has been selected under the "Utils"menu, a board has been selected to Backup, and the backup drive was notready.

FIG. 92 is a diagram of the screen displayed to the user when "Utils" isselected on the menu bar, "Backup" has been selected under the "Utils"menu, a board has been selected to Backup, the backup has beencompleted, and the backup description is displayed.

FIG. 93 is a diagram of the screen displayed to the user when "Utils" isselected on the menu bar and "Restore" has been selected under the"Utils" menu.

FIG. 94 is a diagram of the screen displayed to the user when "Utils" isselected on the menu bar, "Restore" has been selected under the "Utils"menu, and a restore file is loaded in the system.

FIG. 95 is a diagram of the screen displayed to the user when "Utils" isselected on the menu bar, "Restore" has been selected under the "Utils"menu, a restore file is loaded in the system, and a restore file hasbeen selected.

FIG. 96 is a diagram of the screen displayed to the user when "Utils" isselected on the menu bar and "Clear Board Statistics" has been selectedunder the "Utils" menu.

FIG. 97 is a diagram of the master screen displayed to the user when"Quit" is selected on the menu bar.

FIGS. 98 through 160 are a series of flow diagrams detailing theoperation of the monitor control processor for controlling theuser-friendly interface and for communicating with the above-describedencryption devices, wherein:

FIG. 99 is a flow diagram of the startup routine of the display controlprocessor.

FIG. 100A is a flow diagram of the main menu subroutine called by theroutine of FIG. 100A.

FIG. 100B is a continuation of the flow diagram of FIG. 100A.

FIG. 100C is a continuation of the flow diagram of FIG. 100B.

FIG. 100D is a continuation of the flow diagram of FIG. 100C.

FIG. 101 is a flow diagram of the "INIT" subroutine called by theroutine of FIG. 99.

FIG. 102A is a flow diagram of the "OPEN₋₋ DEBS" subroutine called bynumerous subroutines of the present invention.

FIG. 102B is a continuation of the flow diagram of FIG. 102A.

FIG. 103 is a flow diagram of the "CLOSE₋₋ DEBS" subroutine called bynumerous subroutines of the present invention.

FIG. 104A is a flow diagram of the "SYSTEM₋₋ STATUS" subroutine calledby the subroutine of FIG. 100B.

FIG. 104B is a continuation of the subroutine of FIG. 104A.

FIG. 104C is a continuation of the flow diagram of FIG. 100B.

FIG. 105 is a flow diagram of the "STATUS3" subroutine called by theroutine of FIG. 104B.

FIG. 106 is a flow diagram of the "WRITE₋₋ FREEZE" subroutine called bythe subroutine of FIG. 104B.

FIG. 107 is a flow diagram of the "NEXT₋₋ BOARD" subroutine called bythe subroutine of FIG. 104B.

FIG. 108 is a flow diagram of the "PREV₋₋ BOARD" subroutine called bythe subroutine of FIG. 104B.

FIG. 109A is a flow diagram of the "DISPSTAT" subroutine called by thesubroutine of FIG. 105.

FIG. 109B is a continuation of the flow diagram of FIG. 109A.

FIG. 109C is a continuation of the flow diagram of FIG. 109B.

FIG. 110 is a flow diagram of the "DRAWALARM" subroutine called by thesubroutine of FIGS. 109A-109C.

FIG. 111 is a flow diagram of the "GETVER" subroutine called by varioussubroutines of the present invention.

FIG. 112A is a flow diagram of the "OPTIONS₋₋ MENU" subroutine called bythe subroutine of FIG. 100B.

FIG. 112B is a continuation of the subroutine of FIG. 112A.

FIG. 112C is a continuation of the subroutine of FIG. 112B.

FIG. 113 is a flow diagram of the "SET₋₋ STATUS₋₋ INTERVAL" subroutinecalled by the subroutine of FIG. 112.

FIG. 114 is a flow diagram of the "SET₋₋ SAMPLE₋₋ INTERVAL" subroutinecalled by the subroutine of FIG. 112.

FIG. 115 is a flow diagram of the "SET₋₋ THRESHOLDS" subroutine calledby the subroutine of FIG. 112.

FIG. 116 is a flow diagram of the "SET₋₋ IDLE₋₋ TIMEOUT" subroutinecalled by the subroutine of FIG. 112.

FIG. 117 is a flow diagram of the "SET₋₋ CHECK₋₋ DIGIT₋₋ LENGTH"subroutine called by the subroutine of FIG. 112.

FIG. 118 is a flow diagram of the "SET₋₋ KEY₋₋ PARTS" subroutine calledby the subroutine of FIG. 112.

FIG. 119 is a flow diagram of the "SET₋₋ TABLE₋₋ PARTS" subroutinecalled by the subroutine of FIG. 112.

FIG. 120 is a flow diagram of the "ENABLE/DISABLE₋₋ PASSWORDS"subroutine called by the subroutine of FIG. 112.

FIG. 121 is a flow diagram of the "SET₋₋ PASSWORDS" subroutine called bythe subroutine of FIG. 112.

FIG. 122 is a flow diagram of the "GET₋₋ LEVEL" subroutine called by thesubroutine of FIG. 121.

FIG. 123A is a flow diagram of the "GET₋₋ PASSWORD" subroutine called bythe subroutine of FIG. 121.

FIG. 123B is a continuation of the flow diagram of FIG. 124B.

FIG. 124A is a flow diagram of the "PUT₋₋ OPTIONS" subroutine called bythe subroutine of FIG. 99.

FIG. 124B is a memory map showing the file structure of the executiveportion and options portion of the control software of the monitor andcontrol processor of the present invention.

FIG. 125A is a flow diagram of the FIG. 101.

FIG. 125B is a continuation of the flow diagram of FIG. 125A.

FIG. 126 is a flow diagram of the "CONFIG₋₋ MENU" subroutine called bythe subroutine of FIG. 112.

FIG. 127 is a flow diagram of the "CONFIG₋₋ BOARD" subroutine called bythe subroutine of FIG. 126.

FIG. 128 is a flow diagram of subroutine "A" called by the subroutine ofFIG. 127.

FIG. 129 is a flow diagram of subroutine "B" called by the subroutine ofFIG. 127.

FIG. 130 is a flow diagram of subroutine "C" called by the subroutine ofFIG. 127.

FIG. 131 is a flow diagram of subroutine "D" called by the subroutine ofFIG. 127.

FIG. 132 is a flow diagram of subroutine "E" called by the subroutine ofFIG. 127.

FIG. 133A is a flow diagram of the "COMM₋₋ PARMS" subroutine called bythe subroutine of FIG. 131.

FIG. 133B is a continuation of the flow diagram of FIG. 133A.

FIG. 134 is a flow diagram of the "BAUD₋₋ RATE" subroutine called by thesubroutine of FIG. 133.

FIG. 135A is a flow diagram of the "PARITY₋₋ PARAM" subroutine called bythe subroutine of FIG. 133.

FIG. 135B is a flow diagram of the "DATA₋₋ BITS" subroutine called bythe subroutine of FIG. 133.

FIG. 136 is a flow diagram of the "STOP₋₋ BITS" subroutine called by thesubroutine of FIG. 133.

FIG. 137 is a flow diagram of the "TRANSMIT₋₋ DELAY" subroutine calledby the subroutine of FIG. 133.

FIG. 138 is a flow diagram of the "FRAME₋₋ TIMER" subroutine called bythe subroutine of FIG. 133.

FIG. 139 is a flow diagram of the "HARDWARE₋₋ FLOW₋₋ CONTROL" subroutinecalled by the subroutine of FIG. 133.

FIG. 140A is a flow diagram of the "SERIAL₋₋ SUPPORT" subroutine calledby the subroutine of FIG. 132.

FIG. 140B is a continuation of the flow diagram of FIG. 140A.

FIG. 141 is a flow diagram of the "FIRST₋₋ CONFIG" subroutine called byvarious subroutines of the present invention.

FIG. 142 is a flow diagram of the "NEXT₋₋ CONFIG" subroutine called byvarious subroutine of the present invention.

FIG. 143A is a flow diagram of the "KEYS₋₋ MENU" subroutine called bythe subroutine of FIG. 100.

FIG. 143B is a continuation of the flow diagram of FIG. 143A.

FIG. 143C is a continuation of the flow diagram of 143B.

FIG. 144 is a flow diagram of the "WARN₋₋ NOBOARDS" subroutine called byvarious subroutines of the present invention.

FIG. 145A is a flow diagram of the "GET₋₋ KEY" subroutine called by thesubroutine of FIG. 206.

FIG. 145B is a continuation of the flow diagram of FIG. 145A.

FIG. 145C is a continuation of the flow diagram of FIG. 145B.

FIG. 146 is a continuation of the flow diagram of FIG. 145C.

FIG. 147A is a flow diagram of the "LOAD₋₋ KEYTABLE" subroutine calledby the subroutine of FIG. 203.

FIG. 147B is a continuation of the flow diagram of FIG. 147A.

FIG. 147C is a continuation of the flow diagram of FIG. 147B.

FIG. 147D is a continuation of the flow diagram of FIG. 147C.

FIG. 148 is a flow diagram of the "ACCEPT₋₋ KEY" subroutine called bythe subroutine of FIG. 206.

FIG. 149 is a flow diagram of the "ENTER₋₋ KEY" subroutine called by thesubroutine of FIG. 145C.

FIG. 150 is a flow diagram of the "ENTER₋₋ CRYPTOGRAM" subroutine calledby the subroutines of FIG. 147.

FIG. 151A is a flow diagram of the "LOAD₁₃ DIEBOLD₁₃ TABLE" subroutinecalled by the subroutine of FIG. 204.

FIG. 151B is a continuation of the flow diagram of FIG. 151A.

FIG. 151C is a continuation of the flow diagram of FIG. 151B.

FIG. 152 is a flow diagram of subroutine "C" called by the subroutine ofFIG. 151.

FIG. 153 is a flow diagram of subroutine "D" called by the subroutine ofFIG. 151.

FIG. 154 is a flow diagram of subroutine "E" called by the subroutine ofFIG. 151.

FIG. 155 is a flow diagram of subroutine "F" called by the subroutine ofFIG. 151.

FIG. 156 is a flow diagram of subroutine "G" called by the subroutine ofFIG. 151.

FIG. 157 is a flow diagram of subroutine "H" called by the subroutine ofFIG. 151.

FIG. 158 is a flow diagram of subroutine "I" called by the subroutine ofFIG. 151.

FIG. 159 is a flow diagram of subroutine "J" called by the subroutine ofFIG. 151.

FIG. 160A is a flow diagram of the CHECK₋₋ DT₋₋ DUP subroutine called bythe subroutine of FIG. 158.

FIG. 160B is a continuation of the flow diagram of FIG. 160A.

FIG. 161 is a flow diagram of the "STORE₋₋ DIEBOLD" flow diagram calledby the subroutine of FIG. 159.

FIG. 162A is a flow diagram of subroutine "A" called by the subroutineof FIG. 161.

FIG. 162B is a continuation of the flow diagram of FIG. 162A.

FIG. 163 is a flow diagram of subroutine "B" called by the subroutine ofFIG. 161.

FIG. 164 is a flow diagram of the "VALID₋₋ DIEBOLD₋₋ TABLE" called bythe subroutine of FIG. 162A.

FIG. 165 is a flow diagram of the "INIT₋₋ DIEBOLD₋₋ TABLE" called by thesubroutine of FIG. 156.

FIG. 166A is a flow diagram of the "GEN₋₋ RANDOM₋₋ DIEBOLD₋₋ TABLE"subroutine called by the subroutine of FIG. 155.

FIG. 166B is a continuation of the flow diagram of FIG. 166A.

FIG. 167 is a flow diagram of the "NIX" subroutine called by thesubroutine of FIG. 166B.

FIGS. 168A and 168B are flow diagrams of the "UTILS₋₋ MENU" subroutinecalled by the subroutine of FIG. 100.

FIG. 169A is a flow diagram of the "BACKUP" subroutine called by thesubroutine of FIG. 168.

FIG. 169B is a continuation of the flow diagram of FIG. 169A.

FIG. 169C is a continuation of the flow diagram of FIG. 169B.

FIG. 169D is a continuation of the flow diagram of FIG. 169C.

FIG. 170A is a flow diagram of the "RESTORE" subroutine called by thesubroutine of FIG. 160A.

FIG. 170B is a continuation of the flow diagram of FIG. 170A.

FIG. 170C is a continuation of the flow diagram of FIG. 170B.

FIG. 170D is a continuation of the flow diagram of FIG. 170C.

FIG. 170E is a continuation of the flow diagram of FFIG. 170D.

FIG. 171 is a flow diagram of the "PROMPT₋₋ DISKETTE" subroutine calledby the subroutines of FIGS. 169A and 170A.

FIG. 172 is a flow diagram of the "SELECT₋₋ BOARD" subroutine called bythe subroutines of FIGS. 169A and 170E.

FIG. 173 is a flow diagram of the "ERASE₋₋ BOARD" subroutine called bythe subroutine of FIG. 168.

FIG. 174 is a flow diagram of the "DO₋₋ CWKS" subroutine called byvarious subroutines of the invention.

FIG. 175 is a flow diagram of the "DO₋₋ DESE" subroutine called byvarious subroutines of the present invention.

FIG. 176 is a flow diagram of the "DO₋₋ IKEY" called by varioussubroutines of the present invention.

FIG. 177 is a flow diagram of the "DO₋₋ LCDT" subroutine called byvarious subroutines of the present invention.

FIG. 178 is a flow diagram of the "DO₋₋ LENT" subroutine called byvarious subroutines of the present invention.

FIG. 179 is a flow diagram of the "DO₋₋ LKEY" subroutine called byvarious subroutines of the present invention.

FIG. 180 is a flow diagram of the "DO₋₋ LMKT" subroutine called byvarious subroutines of the present invention.

FIG. 181 is a flow diagram of the "DO₋₋ RESET" subroutine called byvarious subroutines of the present invention.

FIG. 182 is a flow diagram of the "DO₋₋ RKEY" subroutine called byvarious subroutines of the present invention.

FIG. 183 is a flow diagram of the "DO₋₋ SKEY" subroutine called byvarious subroutines of the present invention.

FIG. 184A is a flow diagram of the "DO₋₋ STAT" subroutine called byvarious subroutines of the present invention.

FIG. 184B is a continuation of the subroutine of FIG. 184A.

FIG. 184C is a continuation of the subroutine of the flow diagram ofFIG. 184B.

FIG. 184D is a continuation of the flow diagram of FIG. 184C.

FIG. 184E is a continuation of the flow diagram FIG. 184D.

FIG. 184F is a continuation of the flow diagram of FIG. 184D.

FIG. 185 is a flow diagram of the "PRO₋₋ DEB" subroutine called byvarious subroutines of of the present invention.

FIG. 186 is a flow diagram of the "CHKERR" subroutine called by thesubroutine of FIG. 185.

FIG. 187 is a flow diagram of the "FIND₋₋ TOK" subroutine called by thevarious subroutines of the present invention.

FIG. 188 is a flow diagram of the "NEXT₋₋ TOK" subroutine called by thesubroutine of FIG. 187.

FIG. 189 is a flow diagram of the "OPEN₋₋ WINDOW" subroutine called byvarious subroutines of the present invention.

FIG. 190 is a flow diagram of the "CLOSE₋₋ WINDOW" subroutine called byvarious subroutines of the present invention.

FIG. 191 is a flow diagram of the "CLOSE₋₋ WINDOWS" subroutine called byvarious subroutines of the present invention.

FIG. 192 is a flow diagram of the "SHOW₋₋ MODE" subroutine called byvarious subroutines of the present invention.

FIG. 193 is a flow diagram of the "CHANGE₋₋ MODES" subroutine called bythe subroutine of FIG. 194E.

FIG. 194A is a flow diagram of the "GETKEY" subroutine called by varioussubroutines of the present invention.

FIG. 194B is a continuation of the flow diagram of FIG. 194A.

FIG. 194C is a continuation of the flow diagram of FIG. 194B.

FIG. 194D is a continuation of the flow diagram of FIG. 194C.

FIG. 194E is a continuation of the flow diagram of FIG. 194D.

FIG. 195 is a flow diagram of subroutine "D" called by the subroutine ofFIG. 143.

FIG. 196 is a flow diagram of subroutine "E" called by the subroutine ofFIG. 143.

FIG. 197 is a flow diagram of subroutine "F" called by the subroutine ofFIG. 143.

FIG. 198 is a flow diagram of subroutine "G" called by the subroutine ofFIG. 143.

FIG. 199 is a flow diagram of subroutine "H" called by the subroutine ofFIG. 143.

FIG. 200 is a flow diagram of subroutine "I" called by the subroutine ofFIG. 143.

FIG. 201 is a flow diagram of subroutine "J" called by the subroutine ofFIG. 143.

FIG. 202 is a flow diagram of subroutine "K" called by the subroutine ofFIG. 143.

FIG. 203 is a flow diagram of subroutine "L" called by the subroutine ofFIG. 143.

FIG. 204 is a flow diagram of subroutine "M" called by the subroutine ofFIG. 143.

FIG. 205 is a flow diagram of subroutine "M" called by the subroutine ofFIG. 143.

FIG. 206 is a flow diagram of subroutine "O" called by the subroutine ofFIG. 143.

DETAILED DESCRIPTION OF THE INVENTION

Modern electronic fund transfer systems are increasingly configured asshared networks wherein a number of financial institutions are networkedto a number of POS or ATM terminals through a network switch. A typicalshared network using the DES encryption scheme is shown in FIG. 1. TheDES algorithm encrypts electronic data, such as PIN information enteredon a keypad or account number information taken from a magnetic strip onthe back of a plastic card, by performing a complex series of processeswhich transform the original data into a completely unrecognizablestring of characters.

The DES algorithm allows a large number of users to use a shared networkby incorporating "Keys" which enable users to customize or personalizethe algorithm for their own application. Decrypting data which hasundergone DES algorithm requires knowledge of both the algorithm and thekey. Attempting to decrypt the data with a different key or with no keyat all would generate useless data. Only those parties having thespecific encryption key are able to decrypt the data.

In a shared network using the DES algorithm, a card holder inserts aplastic card having magnetically encoded account information into aremote ATM terminal 02. The ATM terminal 102 reads the PIN informationand the user enters a transaction request into the ATM terminal. Thisinformation is encrypted under the ATM terminal's encryption key by anassociated encryption device 104 using key information unique to theencryption device 104. The encrypted PIN and transaction request is thentransmitted to an acquiring institution 106 where the encrypted PIN andtransaction request is translated by the encryption device 108. Thetranslation process involves decrypting the PIN and transaction requestusing the PIN encryption key of the ATM and re-encrypting the PIN andtransaction request under a network switch key. The translated PIN andtransaction request is then transmitted to the network switch 110. Thenetwork switch 110 receives the transmission from the acquirer andtranslates the PIN and transaction request by decrypting the PIN andtransaction request under the acquirer key and re-encrypting the keyunder the card issuer key with the encryption device 112. The translatedPIN and transaction request is then sent to the issuer which receivesthe transmission from the switch and decrypts the PIN and transactionrequest with the encryption device 116 for verification. Once the PINand transaction request is verified, the card issuer generates averification message which is encrypted and re-routed through thenetwork in the reverse direction.

Each of the encryption devices of the present invention employ asecurity module which retains all sensitive key information as well asthe DES algorithm (along with any other encryption algorithm supportedby the system). The following information is securely stored in theencryption devices of the present invention:

(1) DES Algorithm: The DES algorithm is a well-known algorithm which iswidely used in the data processing industry. The DES algorithm is usedin conjunction with various DES keys to encrypt and decrypt data, suchas customer's PINs or working keys, and to generate messageauthentication codes.

(2) The Master File Key (MFK): This key is used to encrypt all keys thatare to be stored locally outside the security module. When an externallystored key (cryptogram) is required during PIN processing, it isretrieved from its storage area, decrypted under the security module'sMFK, and injected into the DES algorithm along with the data which isbeing processed.

(3) The Key Storage Table: All of the various keys that a network linkuses to encrypt or decrypt data (except MFK), perform the messageauthentication process and communicate keys to other network links maybe stored on the Key Storage Table. Alternatively, a network link maychoose to store its keys outside the security module. In this case, thekeys are encrypted under the security module's Master File Key andstored as cryptograms.

The following DES keys are stored on the Key Storage File:

Key Exchange Key (KEK): Key Exchange Keys are used to encrypt workingkeys that are to be transmitted to another link in the network. Forexample, a switch may need to change a key that a transaction acquireruses to encrypt PINs for transmission to the network switch 110. Thenetwork switch 110 normally would create the new key and inject it toits Key storage Table or immediately encrypt it under its MFK.

However, if the switch 110 sent the key to the transaction acquirerencrypted under the network switches MFK, the acquirer would requireknowledge of the switch's MFK in order to translate the new key toencryption under its own MFK. As a general rule, the MFK is neverdivulged outside the particular network link because of its importanceto a link's overall data security.

Therefore, a separate key is required to encrypt working keys fortransmission between EFT network lines. This key is referred to as theKey Exchange Key. KEKs are held jointly by the two links between whichDES keys are transmitted and are used solely for transmission of workingkeys. A network link may have a separate KEK for each type of workingkey, and will have a separate set of KEKs for each network link withwhich it has direct communication.

Pin Encryption Key (PEK): The Pin Encryption Key (PEK) is used toencrypt a PIN for transmission between links in the network. The PIN isencrypted initially at the ATM or POS terminal for transmission to thetransaction acquirer. The acquirer uses another PEK to transmit the PINto the network switch. The switch uses yet another PEK to transmit thePIN to the card issuer. PEKs are changed regularly, either automaticallyor manually to prevent the system from being compromised.

Pin Verification Key(PVK): There are various methods for generatingcustomer PINs. One method involves running the customer's PersonalAccount Number (PAN) through the DES algorithm under a key referred toas the Pin Verification Key, and then paring the resultant number downto four or twelve digits to arrive at the customer PIN. When this methodis used to generate the PIN, the same method is used to verify the PINwhen it arrives in a transaction request. The PIN verifying institutiondecrypts the customer-entered PIN that arrived in the transactionrequest (PIN 1). Then it compares this PIN against the one created byrunning the PAN (also received in the transaction request) through theDES algorithm under the PVK (PIN2). If the two PINs match, thetransaction request is valid.

Data Encryption Key (DEK): Some types of EFT transactions require bothPIN information and other types of message data to be encrypted. TheData Encryption Key is used to encrypt data other than the PIN oranother working key. The Data Encryption Key, like the PIN EncryptionKey, must be held jointly by the two links in the network between whichthe encrypted data is to be transmitted.

Message Authentication Key (MAK): The Message authentication key is usedto create a message authentication Code which is appended to the end ofa message to enable the message receiver to verify that the messagecontent has not been altered in any way between the message originatorand the receiver.

The MAK can also be used to guard against other tampering schemes suchas intercepting and removing messages between network links, injectingmessages at some point between the terminal and the transactionauthorizing institution, and recording and replaying previously approvedtransactions.

The present invention provides a user-friendly menu-driven front end forthe selection of DES keys, periodic DES key changes as well as providingfor the display of the operational status of the data encryption devicesof the present invention. Since the knowledge of entire keys allow anindividual access to the EFT network, the present invention provides forthe split entry of keys wherein only parts of keys are known by any oneindividual. The present invention also allows the user to define thenumber of keyparts used and the random generation of keyparts.

A typical prior art transaction processor and data encryption devicearrangement is shown in FIG. 2A. This arrangement is typical of an EFTprocessing node wherein a plurality of data encryption channels aresupported. In the system 200, a host transaction processor 202communicates with a plurality of discrete encryption devices 204, 206,208, 210 through serial interfaces 212, 214, 216 and 218, respectively.Each of the encryption devices functions independent of the others.Therefore, if fault-tolerant operation is desired, control software forfault-tolerant operation must be resident on the EFT transactionprocessor. In operation, the transaction processor monitors each of theserial interfaces 212, 214, 216 and 218, and if one of the encryptiondevices fails, the transaction processor routes messages to an alternateencryption device. Therefore, any "in flight" transaction must bereprocessed by another device. Furthermore, since the transactionprocessor must monitor each encryption device for proper operation,processing overhead is increased and system performance is degraded.

FIG. 2B is a block diagram of an improved electronic fund transfersystem 250B constructed in accordance with the teachings of the presentinvention. The present invention provides a multichannel encryptiondevice which may be operated in a fault-tolerant mode. For example,encryption devices 254B and 256B may be coupled as fault-tolerantdevices while encryption devices 258B and 260B may operateindependently. Each of the encryption devices of the present inventionmay be operated either in a fault-tolerant mode or may be configured asa solo device.

In operation, fault tolerant encryption devices 254B and 256Bcommunicate with transaction processor 252B over a single communicationchannel or serial interface 264B. The encryption devices 254B, 256B aregrouped in a master/slave relationship wherein each encryption device isadapted to receive processing requests from the transaction processorand each encryption device processes the request in its entirety. Undernormal operation the master encryption device will respond to theprocessing request from the transaction processor. However, if masterdevice does not respond to the host within a predetermined period oftime, the slave encryption device responds, thus preventing any loss ofcritical information. The fault-tolerant operation of encryption devices254B and 256B operate in a fault-tolerant manner which is totallytransparent to the transaction processor 252B. Therefore, fault-tolerantdata encryption device operation is provided without adding anyprocessing overhead to the transaction processor while preventing theloss of "in-flight" data. Solo encryption devices 258B and 260Bcommunicate with the transaction processor 252B through serialinterfaces 266B, 268B in a manner which is similar to the operation ofthe discrete encryption devices of FIG. 2A. However, in one aspect ofthe present invention, the respective encryption devices are disposed ina single unit coupled by a bus to a display and control processor 262B.The display and control processor 262B provides access to each of theencryption devices 254B, 256B, 258B or 260B, etc., for entering andupdating key information in the respective devices.

The present invention provides means for entering data in each of theencryption devices either individually or in groups. While the system ofFIG. 2B is shown with four encryption devices, the present invention isadapted to support virtually any number of encryption devices.

In another aspect of the present invention, means are provided forlocally displaying statistical data on the operation of each encryptiondevice in the system. The encryption devices of the present inventionare provided with a means of recording the number of failedtransactions, verifications and other statistics over predefinedintervals to provide information regarding system reliability, andperformance. The display and control processor 262B periodicallyretrieves this information from each respective encryption device in thesystem and displays the statistical information from each encryptiondevice to a user. If a particular encryption device exceedspredetermined statistical thresholds, a visual alarm is displayed to theuser.

In another aspect of the present invention, communications between thetransaction processor 252B and the display and control processor 262Bare supported by a unique communications protocol particularly adaptedfor communicating in an EFT network. The communications protocol of thepresent invention provides for the transfer of key information among aplurality of data encryption devices over parallel or serial interfaces,as well as providing for the transfer of system operatingcharacteristics to a display and control processor.

In yet another aspect of the present invention, a fault-tolerant, powersupply arrangement is provided, as shown in FIG. 2C. This system isidentical to the system 250B with the addition of a fault-tolerant,power supply arrangement. In this aspect of the present invention, eachof the elements of the system 250C are powered by a main power supply272C. Additionally, an auxiliary power supply 274C is coupled to each ofthe respective encryption devices. Both power supplies are always activewherein the data encrypting devices normally receive power from theauxiliary power supply. However, if the auxiliary power supply fails,the data encryption boards derive power from the main power supply.Therefore, in cases where the auxiliary power supply fails, criticalencryption functions are not affected. This feature also allows theDisplay and Control processor to be turned-off for servicing withoutaffecting critical encryption functions.

FIG. 3A is a block diagram of a first embodiment of the data encryptionsystem of the present invention. In the system 300A, encryption devices302, 304, 306 and 308, communicate with a transaction processor throughserial interfaces 310, 312, 314, and 316, respectively. In this aspectof the present invention, each of the encryption devices is adapted tooperate independently of the other devices when communicating with atransaction processor.

The encryption devices 302, 304, 306 and 308 are further coupled to aparallel bus 320, which is also coupled between CPU 322, RAM 324, ROM326, display 328, disk drive 330 and a proprietary parallel portinterface 334. A keyboard 332 provides a means of entering alphanumericor keyboard function data into CPU 332. In this embodiment of thepresent invention, a power supply 340 provides power to all devices inthe system. The display and control processor may suitably comprise an8085 microprocessor available from Intel. The RAM 324, ROM 326, display,328 and disk drive 330 may be any of a number of well-known devicesadapted for use with the 8085 microprocessor.

The operation of the system 300 is similar to most general purposecomputers with the exception of the messages communicated between theCPU 332 and the encryption devices 302, 304, 306, and 308. The controlsoftware of the CPU 322 and the respective encryption devices of thepresent invention are discussed in detail below. In addition, thevarious keyboard and display functions provided by the present inventionare discussed in detail below. The CPU 322, display 328 and keyboard 332provide an efficient and user-friendly means of interfacing user inputsto the various encryption devices in the system. In addition, the systemof the present invention provides a means of recording and displayingthe operating statistics of the encryption devices as will be discussedin detail below.

The disk drive 330A and/or proprietary port 334 provide a means ofbacking up system software as well as providing an external source ofdata for updating system software. Those skilled in the art willappreciate that the disk drive may be omitted in systems offering aparallel port interface or vice versa.

Referring now to FIG. 3B, an alternate embodiment of the presentinvention is shown. The system 300B incorporates all of the elements ofthe system 300A. However, in this aspect of the present invention,encryption devices 302B and 304B are coupled in a fault-tolerantarrangement wherein encryption device 302B functions as a master andencryption device 304B functions as a slave. In this aspect of thepresent invention, encryption devices 302B and 304B communicate througha single serial interface 310B with an associated transaction processor.In this configuration, encryption devices 302B and 304B receiveprocessing requests from a transaction processor and each encryptiondevice processes the request in its entirety. The slave encryptiondevice then determines whether the master encryption device 302Bresponds within a predetermined period of time and if the masterencryption device does not respond, the slave encryption device 304Bresponds to the transaction processor. The present invention providesthe capability of supporting a number of master/slave pairs and furthersupports encryption devices operating in a solo mode along withmaster/slave pairs in the same system.

FIG. 3C is an alternate embodiment of the encryption system of FIG. 3A.The system 300C is similar to the system 300A. However, in this aspectof the present invention, an auxiliary power supply 342 is provided. Inthe system 300C, the main power supply provides power to all thecomponents in the system. In addition, an auxiliary power supply 342 iscoupled to the respective encryption devices 302, 304, 306 and 308. Innormal operation, the display6 and control circuitry derive power frommain power supply and the data encryption devices derive power from theauxiliary power supply. However, if the auxiliary power supply fails,the respective encryption devices derive power from the main powersupply. Therefore, the encryption devices remain operational, thuspreserving critical encryption functions. This feature is also usefulwhen maintenance of the display or input system is required, as the mainpower supply may be shut off for servicing without disturbing theoperation of the encryption devices.

FIG. 3D is a block diagram of an alternate embodiment of the system ofFIG. 3B. The system 300D is similar to the system 300B. However, in thesystem 300D, fault-tolerant encryption devices 302B and 304D areprovided as well as the fault-tolerant power supply arrangement providedby power supplies 340 and 342. The other function aspects of the system300D are identical to the system configurations described above.

FIG. 4A is a schematic diagram of the encryption device of the presentinvention. The data encryption device 400 is adapted for implementationon a single printed circuit board and a fully configured encryptiondevice board is herein below referred to as a data encryption board(DEB). The data encryption device 400 is implemented on themicrocomputer 402, which is preferably a DS5000 microcomputer availablefrom Dallas Semiconductor. The DS5000 microcomputer is provided withon-board ROM and RAM as well as being provided with battery backed-upRAM for nonvolatile storage of data. The DS5000 microcomputer is furtherprovided with on-board data encryption functions. While the discussionbelow refers to a specific implementation of a data encryption deviceusing the DS5000 microcomputer, those skilled in the art will appreciatethat other microprocessor-based systems could be substituted thereforwithout departing from the teachings of the present invention.

Power is provided to the data encryption device 400 through lines 404and 406 which are coupled to the main power supply 340 and the auxiliarypower supply 342, respectively. Power supply terminal 404 is coupled tothe positive voltage input terminal of voltage doubler 408 through diode410. Power supply terminal 406 is coupled to the positive voltage inputterminal of voltage doubler 408 through diode 412. The ground terminalof voltage doubler 408 is coupled to terminal 414. Under normaloperation, diode 412 is reverse-biased and power for the voltage doubler408 is derived through terminal 404. However, if power is removed fromterminal 404, diode 412 becomes forward-biased and power is derivedthrough terminal 406. The voltage doubler 408 may suitably comprise aMAX680 available from MAXIM. The microcomputer 402 is coupled to thevoltage doubler 408 in accordance with the manufacturer's specificationfor these components.

The data encryption device 400 communicates with an associatedtransaction processor through the RS232 connector 416 wherein the "RX"RS-232 signal is coupled to terminal 418, the "CTS" RS-232 signal iscoupled to terminal 420, the "TX" RS-232 signal is coupled to terminal422, and the "RTS" RS-232 signal is coupled to terminal 424. Terminals418 and 420 are coupled to pins 10 and 8 of the DS5000 through RS232receivers 426 and 428, respectively. Pin 11 of the DS5000 is coupled toterminal 422 through inverter 430. Pins 7 and 4 of the DS5000 arecoupled to the inputs of a two-input NAND gate 432 wherein the output ofNAND gate 424 is coupled to terminal 424.

The data encryption device 400 is further provided with a fault-tolerantinterface connector 434 wherein terminals 436 and 438 are coupled toterminals 418 and 422, respectively; terminal 443 is coupled to pin 5 ofthe DS5000; terminal 442 is coupled to pin 15 of the DS5000; andterminal 444 is coupled to pin 14 of the DS5000, wherein terminal 442 iscoupled to a master watchdog signal and terminal 444 is coupled to aslave watchdog signal. The master/slave device designation is and 5 ofthe DS5000. Master and slave devices and the master and slave watchdogsignals are discussed in further detail below.

The address lines 440 of microcomputer 402 are coupled to the bus 320through address decoder 442 which comprises a comparator 444 and latch446 coupled in a well-known configuration. The switches 51-56 are usedto control the address of the DEB. For example, if switch 2 is closed,the board designation is board 2. In operation, the DEB first reads theswitch to determine board number. The DEB monitor program then writesthe DEB address to latch 446 and latches the data in latch 446 bystrobing pin 2 of the DS5000. The address lines are then pulled high bythe DS5000.

The data encryption device 400 is provided with a tamper switch 448which is coupled between pins 13 and 21 of the DS5000 wherein pin 21 ofthe DS5000 corresponds to an address input as well as a tamper switchoutput of the DS5000. The tamper switch 438 provides a method ofdetecting whether an adversary is trying to gain access to the securitymodule of the data encryption device 400 and, if so, the tamper switch438 is activated and the contents of the memory in the DS5000 areautomatically erased. In operation, the tamper switch is normallyclosed, thus holding the INIT1 input of the DS5000 high and if thetamper switch opens, INIT1 goes low and the DS5000 erases the datastored therein.

The data lines 441 of microcomputer 402 are coupled to bus 320 through abidirectional first-in/first-out (BIFIFO) buffer 442. The BIFIFO 450 isof the type 67C4701 available from Advanced Micro Devices. The BIFIFO isa bidirectional first-in/first-out 512 byte buffer, which is coupled tothe DS5000 in accordance with the manufacturer's instructions.

Data flow in and out of the DEB 400 is controlled by the I/O₋₋ R/W logic452, which comprises OR gates 454, 458, 456, and 462 and exclusive-ORgate 462. One input of OR gate 454 is coupled to the address enable lineof bus 320. The least significant bit of the bus (line A0) is coupled toone input of exclusive-OR gate 462. The other input of exclusive-OR iscoupled to pin 6 of the DS5000 which controls whether the BIFIFOresponds to the bit A0 or is enabled to read a slave device. One inputof OR gate 458 is coupled to the bus I/O write signal. The other inputof OR gate 458 is coupled to the output of OR gate 454. One input of ORgate 456 is coupled to the bus I/O read signal. The other input of ORgate 456 is coupled to the output of OR gate 454. The inputs of OR gate460 are coupled to the output of OR gate 456 and exclusive-OR gate 462,respectively. The output of OR gate 458 is coupled to the write/enableinput of BIFIFO 450. The output of OR gate of the read enable input ofBIFIFO 450. This arrangement allows for asyncronous reading and writingfrom the BIFIFO without DS5000 interaction.

The clock signal of the DS5000 is generated internally and the frequencyof the clock signal is controlled by crystal 470, which is coupled topins 18 and 19 of the DS5000.

Referring now to FIG. 4B, the fault-tolerant data encryption devicearrangement of the present invention is shown in schematic form. Thisaspect of the present invention incorporates two identical dataencryption devices 400M and 400S wherein the master/slave switch 436M ofdata encryption device 400M is set in a closed position to indicate theencryption device 400M is a master and wherein the master/slave switchof data encryption device 400S is set in an open position to indicatethe encryption device 400S is a slave. In addition, the fault-tolerantconnectors 434M and 434S are coupled in parallel. The RS232 connector416M is coupled to the serial interface of an associated transactionprocessor and the RS232 connector 416S may be coupled to an associateddevice.

In operation, the master and slave watchdog timer signals are generatedinternally in the microcomputers 402M and 402S. The respective watchdogtimer signals are periodic signals which reset an internal timer in themicrocomputers 402M and 402S to indicate that the system is functioningnormally. The loss of either the master watchdog timer signal or theslave watchdog timer signal indicates that the respective master orslave microcomputer 402M or 402S has failed. The signal present onterminals 440M and 440S determines whether the master data encryptiondevice 402M or slave encryption device 402S responds to a processingrequest from the associated transaction processor. When the outputselect signal is "high", the output of microcomputer 402M is enabledthrough transmitter 432M. The microcomputer 402S is continuallymonitoring the master watchdog reset signal present on terminal 442M. Ifthe slave microcomputer 402B determines the master has failed, the slavemicrocomputer 402S disables the master's output by forcing the OSEsignal low, thus turning off transmitters 430 and 432.

FIGS. 5-50 are flow diagrams which describe the operation of thesoftware that controls the operation of the data encryption devices(DEBS) of the present invention. The data encryption device controlsoftware is divided into two sections: the monitor program and theapplication program.

The Monitor is a program that provides many application programdependent services. These services include system initialization,interrupt servicing, application program loading, and watchdog timing.Moreover, the Monitor program is designed to operate in a fault-tolerantmode.

In the fault-tolerant mode, two DEBs operate in parallel. One DEB isdesignated as the master and the other DEB is designated as a slave bysetting a switch on the respective DEBs. Both DEBs have the same busaddress so that they receive the same data input through the BIFIFO.Similarly, both DEBs receive the same serial input from an associatedtransaction processor. Both DEBs are loaded with the same Monitor andApplication programs.

While operating in a fault tolerant mode, the programs on both DEBsprocess all input data. The Monitor on the slave DEB, however, inhibitsits BIFIFO and serial output unless the slave detects that the master ismalfunctioning.

The slave DEB detects a malfunction in the master DEB as follows. TheDEBs periodically send a watchdog reset signal to each other. Thetransmit interrupt routines of the slave Monitor program checks whetherthe master DEB has sent a signal since the last transmit interruptoccurred. If the master has not signaled, then the Monitor program onthe slave DEB enables its outputs. Similarly, if the program monitorprogram of the master DEB determines that it is malfunctioning then themaster DEB shuts down.

The Monitor and the Application programs are designed to detect theoccurrence of certain hardware or software malfunctions. To ensure theintegrity of its processing, the DEB shuts down when a program detects aproblem. The Monitor and Application programs use the Watchdog Timer ofthe DS5000 to accomplish this detection. Upon initialization, theMonitor sets the Watchdog Timer. Both the Monitor and Applicationprograms are designed to reset the Watchdog Timer periodically toprevent a timeout. If the Watchdog Timer does timeout because not resetwithin a prescribed period (e.g., the Application program in an infiniteloop), then the DS5000 performs a reset. Upon reset, the DS5000 jumps toa predefined program location in the Monitor. If the master Monitorprogram determines that reset was due to problems in the software orhardware, then the Monitor invokes the stop mode of the DS5000 to effecta master DEB shutdown.

In application loading, the Monitor receives a signal from the BIFIFO,through the mailbox interrupt of the DS5000, indicating that a newApplication program is to be downloaded. The Monitor clears the Appl₋₋Present flag, to indicate that no Application program is in memory. TheMonitor program prepares to receive the new Application program throughthe BIFIFO. The Monitor loads the Application program into theapplication area of DEB memory. When the Monitor has received the entireapplication program, the Monitor program sets the Appl₋₋ Present flagand jumps to the Appl Start location.

The Monitor comprises several major routines. These routines include theInitial Program Load (IPL), the serial port interrupt routine, theBIFIFO (parallel port) interrupt routine, the power fail interruptroutine, the tamper switch interrupt routine, the load applicationroutine, and the Watchdog Timer routine.

FIGS. 5A and 5B are flow diagrams of the Monitor program that areexecuted when the DS5000 resets. The Monitor program determines whetherthe reset was due to a power on condition, or a Watchdog, Timer timeout.If the reset is due to a power on condition, then the Monitor programperforms a cold boot, otherwise it performs a warm boot. During a coldboot, the Monitor program performs diagnostics and initializes the I/Odevices, the timers, and the interrupt routines. During a warm boot,power has not been lost since the last cold boot. Therefore, thedevices, timers, and routines are already initialized.

Item 504 represents the DS5000 reset entry point. As indicated by entrypoints 500 and 502, the reset occurs at power up or when the WatchdogTimer times out. The DS5000 resets by starting executing at locationmemory 0000H.

In subroutine block 508, the Monitor calls the F₋₋ INIT1 subroutine,which is explained in detail below. Decision 512 then determines if theDS5000 reset was caused by a power on reset as indicated by the PowerControl Register. If so, the Monitor program calls subroutine 532.Otherwise, the Monitor continues at item 506.

Referring now to FIG. 5B, subroutine 532 comprises the cold bootinitialization routine, F₋₋ INIT2. When completed, item 534 performsdiagnostic tests, such as a memory check, to ensure that the hardware isfunctioning properly. During the diagnostic tests of item 534, theMonitor calls the watchdog subroutine, F₋₋ WATCHDOG, which resets theWatchdog Timer and sends reset signals to the parallel master or slaveDEB. The F₋₋ WATCHDOG subroutine is described in more detail below.Decision 536 determines whether the diagnostics indicate that thehardware is functioning correctly. If so, Decision 536 determineswhether the Appl₋₋ Present flag is set. Otherwise, the Monitor Decisionloops to subroutine 532.

If decision 538 determines that the Appl₋₋ Present flag is set, anApplication program is in memory and the Monitor program jumps to theAppl₋₋ Start routine of FIG. 14A. Otherwise, the Monitor loops to item534 Monitor thus performs diagnostics until an Application program isloaded.

When invoked, the Appl₋₋ Start routine executes the application at theAppl₋₋ Start address. Preferably, the Monitor program resides in amemory location less than memory location 0800H, the Application programresides in memory locations 0800H through 7FFFH, and the Data resides inmemory locations 8000H and above. The Appl₋₋ Start address is suitably0802H.

Referring again to FIG. 5A, in item 506 the Monitor sets the Reset₋₋Flag. The Reset₋₋ Flag indicates that a Watchdog Timer timeout occurred.Decision 518 determines whether the Timeout Register is set. If so, theMonitor was in the process of waiting for a message when the WatchdogTimer timeout occurred, which reset the DS5000, and the Monitorcontinues to decision 538 in FIG. 5B. Otherwise, there is a software orhardware problem and the Monitor continues at item 522.

In item 522, the Monitor increments the AOW counter. The AOW counterkeeps count of the number of software or hardware errors that aredetected as a result of the Watchdog Timer timeout. Decision 528determines whether the Master₋₋ Flag is set, which is a diagnosticswitch on the data encryption board. If so, then the Monitor programcauses the DS5000 to enter the stop mode to effect a shutdown.Otherwise, the Monitor program is operating as a slave and the Monitorprogram loops to item 504.

The Monitor includes several subroutines and interrupt routines, whichare described hereinbelow.

FIG. 6 is a flow diagram of the F₋₋ INIT1 subroutine, which performswarm boot initialization of the DEB. This subroutine initializes the busaddress for the BIFIFO and internal pointers and timers. Wheninitialized, item 602 initializes the stack pointer of the DS5000. Item604 then enables the DEB Watchdog Timer. In item 606, the Monitorprogram reads the bus address of the parallel port as indicated by theswitches coupled to the DEB address decoder circuitry 442. Item 608 thenenables the address register associated with the DS5000. This latchesthe bus address into the address register. The BIFIFO is thereby setupto respond to the bus address stored in the user programmable switches.Subroutine F₋₋ INIT1 then returns.

FIG. 7 is a flow diagram of the F₋₋ INIT2 subroutine, which performscold boot initialization of a DEB. This subroutine initializes timers,I/O ports, and interrupt routines. When invoked, item 702 sets a randomkey generation timer for use by the Application program, and the baudrate timer. Item 704 then sets the timer for miscellaneous functions.Program control then passes to item 706, which initializes the serialI/O buffers by setting the head and tail buffer pointers for the I/Oring buffers. The operation of the serial I/O and the use of ringbuffers is explained further below.

Item 708 initializes the DEB serial port communications parameters.These parameters include the baud rate, stop bits, and parity for theDEB serial port. Item 710 initializes the BIFIFO to receive data in aFIFO mode. Item 712, then transmits a message to the BIFIFO to indicatethat the DEB is ready for communication with an associated transactionprocessor. When complete, item 714 sets the interrupt vector for thetamper switch to point to the DEB tamper switch interrupt routine. Thetamper switch interrupt routine is described in more detail below.Program control then passes to item 716, which enables the Power FailWarning interrupt so that an interrupt will occur at the start of apower failure. This interrupt allows the Monitor enough time perform anorderly shutdown and transmit a message indicating a power failshutdown. The Power Fail interrupt routine is described in furtherdetail below. The F₋₋ INIT2 subroutine then returns.

FIG. 8A is a flow diagram of the SERIAL₋₋ INTERRUPT routine, which isinvoked whenever data is received by a DEB. The DS5000 is provided withan on-chip full duplex serial I/O port, which functions like a universalasynchronous transmitter/receiver (UART). The Monitor program providesan interrupt routine for processing serial I/O interrupts. The

Monitor and Application programs transmit data to, and receive datafrom, the SERIAL₋₋ INTERRUPT routine through communications buffers ofthe respective DEBS of the present invention.

The Monitor program maintains two serial I/O buffers: one for inputs andthe other for outputs (see FIG. 8B). The SERIAL₋₋ INTERRUPT routinestores the data it receives in a serial input buffer, and retrieves thedata it transmits from a serial output buffer. Analogously, the Monitorand Application programs retrieve data from serial input buffers, andstore data in serial output buffers.

The SERIAL₋₋ INTERRUPT routine is entered at decision 802 when a serialI/O port interrupt occurs. A serial interrupt occurs whenever data isreceived at a serial port of a DEB. In other words, Serial I/O portinterrupts occur when the port completes the reception of a byte of data(receive interrupt) or when the port completes the transmission of abyte of data (transmit interrupt). When a serial interrupt occurs,decision 802 determines whether the serial interrupt is a transmitinterrupt. If so, then the routine continues to decision 804. Otherwisethe routine proceeds to item 816.

Flow diagram elements 804 through 814 represent the processing of atransmit interrupt. If the Monitor is in slave mode (Master₋₋ Flag isclear), then the routine will not actually transmit the data unless themaster DEB is malfunctioning. If the serial interrupt routine of theslave DEB determines that the T0 counter of the DS5000 is zero, then theserial interrupt of the slave routine assumes the master DEB ismalfunctioning and thus enables the slave's DEB output. If decision 804determines the DEB is in master mode, the routine continues to decision812. Otherwise the routine continues to decision 806.

If decision 806 determines that the T0 counter is greater than zero,then the master DEB is functioning and the routine continues to item808. Otherwise the routine continues to item 810. Item 808 resets the T0counter so that a subsequent signal from the master DEB will make themaster counter nonzero.

In item 810, the SERIAL₋₋ INTERRUPT routine in slave mode with amalfunctioning master DEB enables its output to effect fault-tolerantoperation.

If the result of decision 802 is negative, the SERIAL₋₋ INTERRUPTroutine retrieves the next byte to be transmitted from the serial outputbuffer and updates the buffer pointers. The strings stored in the serialoutput buffer are delimited by an end of string character (e.g., a nullcharacter). If decision 812 determines that the next byte is the end ofstring character, then the entire string has to be transmitted and theroutine proceeds to retire 822. Otherwise the routine continues withitem 814. Item 814 outputs the next byte to the serial I/O port andproceeds to item 822.

Items 816 through 820 represent the processing of receive interrupt,which involve the storing of the received byte in the serial inputbuffer. Item 816 reads a byte from the serial I/O port. Item 818 storesthe byte in the DEB serial input buffer. Program control then passes toitem 820, which sets the Serial₋₋ Flag, which indicates to the Monitoror Application programs that data has been received and has been loadedin the serial input buffer. The routine continues to return 822.

In block 822, the routine completes the interrupt processing and returnsfrom the interrupt.

FIGS. 9, 10A and 10B are a flow diagrams of the PARALLEL₋₋ BUS₋₋INTERRUPT routine of the present invention. The respective DEBs of thepresent invention utilize bi-directional FIFO devices (BIFIFOs). ABIFIFO provides parallel communications with a predefined bus interface.In accordance with the teachings of the present invention, a BIFIFOsends an interrupt request to the DS5000 whenever the status of theBIFIFO changes. In particular, the BIFIFO generates an interrupt whendata is received from the predefined bus or is transmitted to thepredefined bus. The Monitor and Application programs transmit datadirectly to and receive data directly from the BIFIFO and do not usecommunications buffers in the DS5000 memory. The FIFOs of the BIFIFOfunction directly as communication buffers.

The PARALLEL₋₋ BUS₋₋ INTERRUPT routine also supports the downloading ofan Application program from the bus. This routine enters a specialprocessing mode while a new application is being downloaded. The Displayand Control Processor initiates a download through the 8-bit mailbox ofthe DS5000 supported through the BIFIFO. The DS5000 goes into thespecial processing mode when it receives a mailbox message. In thisspecial processing mode, the routine without using interrupts retrievesthe application program from the DEB BIFIFO as it is transmitted by theDisplay and Control Processor. The routine stores the application in theData Memory of the DS5000. When the transmission is complete, theroutine partitions memory so that the downloaded program is part ofProgram Memory. The routine then effects a warm boot by preferablyjumping to location 0000H.

This interrupt routine is typically entered at decision 902 when aparallel I/O port interrupt occurs. Parallel I/O port interrupts occurwhen the port completes the reception of a byte of data (receiveinterrupt) and when the port completes the transmission of a byte ofdata (transmit interrupt). Decision 902 determines whether the interruptis a transmit interrupt. If so, the routine continues to decision 906.Otherwise the routine continues to decision 920.

Decisions 906 and 908 and items 912 and 914 represent the processing ofa bus transmit interrupt. The processing in these blocks is analogous tothe processing that is represented by decisions 804 and 806 and items808 and 810 of the SERIAL₋₋ INTERRUPT routine of FIG. 8A. Because thecommunications buffers are located on the BIFIFO, this interrupt routinedoes not actually send transmit data to the BIFIFO because the Monitorand the Application programs place the data directly in the BIFIFO.

Decision 920 and items 924-926 represent the processing of a receiveinterrupt. The routine 900 first determines whether a mailbox interrupthas occurred. A mailbox interrupt indicates that a new applicationprogram is to be downloaded. If decision 920 interrupt is a mailboxinterrupt, then a new application program is to be downloaded and theroutine continues at block 926, otherwise the routine continues at block924.

In item 926, the routine enters the special processing mode by clearingthe Appl₋₋ Present flag and jumping to the load application routine, F₋₋LOADAPP, shown in FIGS. 10A and 10B. The Appl₋₋ Present flag indicateswhether or not an application is present in Program Memory. The F₋₋LOADAPP routine does not perform a typical subroutine return. Rather,the subroutine effects a warm boot after it downloads the program.

The routine process a non-mailbox interrupt in item 924. In item 924,the routine sets the Parallel₋₋ Flag, which indicates that the data isavailable in the BIFIFO.

In item 916, the routine completes the interrupt processing by returningfrom the BUS₋₋ INTERRUPT.

FIGS. 10A and 10B represent the F LOADAPP routine. This routinedownloads an application program from the bus through the BIFIFO. TheDS5000 cannot write to Program Memory. Consequently, this routine storesthe program in Data Memory. Upon completion of the download, the routinepartitions memory so that the downloaded program resides in ProgramMemory.

This routine calculates a checksum of the downloaded program. Thechecksum is a byte which represents the Exclusive-OR of each byte in theprogram. Upon completion of the download, the routine transmits thechecksum value to the bus. If the system that sent the programdetermines that the checksum value is incorrect, then an error occurredin transmission and the system would typically retransmit theapplication program.

Referring to FIG. 10A, in block 1002, the routine partitions the DataMemory space to include the area in which the Application program is tobe loaded. This partitioning is necessary because the DS5000 prohibitswriting to Program Memory. In item 1004, the routine sets the Load₋₋Pointer to point to the location, within the Data Memory space, at whichthe application program is to be loaded. In item 1006, the routineclears the checksum value in preparation of calculating the checksum ofthe downloaded program.

Referring FIG. 10B, the display and control processor 322 signifies thatthe download is complete by sending a message to the BIFIFO mailbox. Theroutine loops checking whether the input FIFO is empty. If the inputFIFO is empty and if a mailbox message is present, then the download iscomplete. Otherwise, the routine loops retrieving data from the BIFIFOand storing the data in memory.

In process 1051, the routine calls F₋₋ WATCHDOG to signal the parallelDEB that the DEB performing the download is not malfunctioning. Decision1052 determines whether input data is available at the BIFIFO. If so,the routine downloads the data by continuing at item 1054. Otherwise thedownload may be complete and the routine continues at item 1062.

In item 1054, the routine reads a byte from the BIFIFO. In item 1056,the routine sets the checksum value to the exclusive-OR of the checksumvalue and the byte. In item 1058, the routine stores the byte at thelocation pointed to by the Load₋₋ Pointer. In item 1060, the routineincrements the Load Pointer and loops to process 1051 to retrieve thenext byte in the program. Item 1008 then reads the BIFIFO statusregister.

In decision 1064, the routine determines if the download is complete. Ifthe mailbox flag is set, then the application program download iscomplete and the routine continues at block 1066. Otherwise the routinecontinues at process 1051 to retrieve the next byte in the program.

In items 1066 through 1074, the routine completes the downloadprocessing by partitioning memory, sending the checksum to the bus, andeffecting a warm boot. In item 1066, the routine reads the mailbox toclear the mailbox. In item 1068, the routine partitions memory so thatthe Application program is in Program Memory. In item 1070, the routinesets the Appl₋₋ Present flag to indicate that an application is in theDS5000 memory. In item 1072, the routine transmits the checksum value tothe bus through the BIFIFO mailbox. In block 1074, the routine hascompleted the download and effects a warm boot by jumping to 0000H.

FIG. 11 is a flow diagram of the POWERFAIL₋₋ INTERRUPT routine. TheDS5000 detects when its input voltage drops below a threshold value andgenerates a Power Fail Warning interrupt. The POWERFAIL₋₋ INTERRUPTroutine processes this interrupt.

This routine sends a message out the serial I/O port and sets the DS5000to stop mode. In item 1102, the routine disables all interrupts. I/Ostep 1104, then outputs the power fail message to the serial I/O port.In block 1106, the routine puts the DS5000 in the stop mode.

FIG. 12 is a flow diagram of the TAMPER₋₋ SWITCH₋₋ INTERRUPT routine.The DS5000 generates an interrupt when the contents of its RAM are beingtampered with, as when the encapsulation module has been broken. Whenthis occurs, the tamper switch 436 opens and interrupts the DS5000. Thisinterrupt is referred to as the tamper switch interrupt. The TAMPER₋₋SWITCH₋₋ INTERRUPT routine processes such an interrupt. When the tamperswitch interrupt occurs, the routine zeros out the application programand data portions of memory. In item 1202, the routine partitions DataMemory to include the portion of memory that contains the Applicationprogram. In block item 1204, the routine sets a pointer to the firstlocation to be filled with zeros. In item 1206, the routine writes azero to the location indicated by the pointer. Decision 1208 determineswhether the pointer is equal to FFFFH. If so, the routine has filled theentire Application program and data portions with zeros and the routinecontinues at 1212. Otherwise the routine continues at item 1210. In item1210, the routine increments the pointer and loops to item 1206. Inblock 1212, the routine puts the DS5000 in stop mode to effect ashutdown.

FIG. 13 is a flow diagram of the F₋₋ WATCHDOG subroutine. The F₁₃WATCHDOG subroutine performs two functions. First, the subroutine resetsthe Watchdog Timer to prevent a timeout. Second, the subroutine outputsa signal to signify that the DEB is functioning properly. In thefault-tolerant mode, the signal triggers a counter in the slave DEB. Ifthe slave DEB determines that the master DEB is not signaling, that is,malfunctioning, then the slave DEB enables its outputs to effect faulttolerance. The Monitor and Application programs call this subroutinethroughout their processing.

Referring to FIG. 13, in items 1302, 1304, and 1306, the subroutineresets the Watchdog Timer. The resetting of the Watchdog Timer occursthrough the Timed Access Register of the DS5000. In item 1304, thesubroutine loads the Timed Access Register with AAH. In item 1306, thesubroutine loads the Timed Access Register with 55H. In item 1306, thesubroutine sets the Reset Watch-Timer bit of the Interrupt PriorityRegister to effect the reset.

Decision 1310 and item 1312 through 1320 represent the signaling to theslave DEB. If the DEB is a master, then the subroutine outputs itssignal on the T0 line of microcomputer 402, which is coupled to terminal442. If the DEB is a slave, then the subroutine outputs its signal onthe T1 line of microcomputer 402 which is coupled to terminal 404. Indecision 1310, if the DEB is in master mode (Master₋₋ Flag is set), thenthe subroutine continues at item 1312. Otherwise the subroutinecontinues at item 1316.

In items 1312 and 1314, the subroutine sets the T0 line and then clearsthe T0 line. This effects the sending of signal to the slave. Thesubroutine then continues at block 1320.

In items 1316 and 1318, the subroutine sets the T1 line and then clearsthe T1 line. This effects the sending of a signal to the master DEB. Thesubroutine then continues at block 1320.

In block 1320, the resetting of the Watchdog Timer and the signaling ofthe parallel DEB is complete and the subroutine returns.

The Application receives messages from either the parallel or serialports. The Application reads in an entire message and then processes themessage. (The Application processes a message containing the STATfunction differently.)

FIGS. 14A and 14B are flow diagrams of the main processing loop of theApplication. The Application loops waiting for data input from eitherthe parallel or the serial I/O ports. When data is received, theApplication then proceeds to process the data. In decision 1404, if theReset₋₋ Flag is set, then a Watchdog Timer reset caused the Applicationto be restarted and the Application continues at item 1406, else theApplication continues at subroutine 1418.

In item 1406, the Application increments ZP₋₋ Value[3..6], whichcontains the number of timeout errors. In I/O block 1408, theApplication outputs an error message to the serial I/O port andcontinues at subroutine 1416.

In subroutine 1418, the Application calls PCHKSUM, which calculates thechecksum of the Application Program and stores the result in ZC₋₋ Value,which contains the program checksum. PCHKSUM calls F₁₃ WATCHDOG. Theapplication continues at subroutine 1416.

In subroutine 1416, the Application calls the F₁₃ WATCHDOG subroutine.In decision 1414, if the Parallel₋₋ Flag is set, then data has beenreceived from the parallel port and the Application processes the databy continuing at item 1508, otherwise the Application continues todecision 1412. In decision 1412, if the Serial₋₋ Flag is set, then datahas been received from the serial port and the Application processes thedata by continuing at item 1518, otherwise no data has been received andthe Application loops to subroutine 1416.

The Main₋₋ Loop entry point at item 1420 represents the point to whichthe Application returns upon completing the processing of a message.Blocks 1420 through 1426, reset flags and pointers. Item 1420 clears theStatus₋₋ Flag. In decision 1422, if the Activity₋₋ Flag is set, thenitem 1424 restores the pointers to the parallel, otherwise item 1426restores the pointers to the serial buffer. The Application thencontinues at subroutine 1416.

FIG. 15 and FIGS. 16A and 16B are flow diagrams of the loop thatreceives a message and prepares the Application data structures forprocessing the message. The Application processes an entire message fromthe interrupting port, serial or parallel, before servicing any messageson the other port. The Application initializes the input data pointersbased upon the interrupting port. Items 1518 through 1522 represent thesetup when the serial port interrupts, and items 1508 through 1512represent the setup when the parallel port interrupts. The Input₋₋Pointer and Output₋₋ Pointer variables are initialized. Each time theapplication inputs or outputs data during message processing it usesthese pointers, which point to the serial or parallel port buffers. Initem 1513, the Application enables the Timer Interrupt based upon thevalue in BW₋₋ Value.

FIGS. 16A and 16B are flow diagrams of the token processing loop. Insubroutine 1602, the Application calls F₋₋ READ, which returns onecharacter from the input buffer. In decision 1604, if the character isequal to "[", then the start of a message is encountered and theApplication continues at item 1608, else the Application continues inblock 1606 to report an error at FIG. 50. In item 1608, the Applicationclears the Error₋₋ Flag. In item 1610, the Application increments ZD₋₋Value[3..6], which contains the total number of message requests.

The tokenized message format of the present invention is shown in moredetail in Appendix 1. Appendix 1 lists the various combinations oftokens which are utilized by the present invention along with the datafields associated with the tokens.

In blocks 1612 through 1620, the Application reads in a single token andstores the data in TOK[0] for processing when the end of messagecharacter ("]") is detected. The Application contains a token inputroutine for each token. These routines are logically grouped based uponthe first character in the token (A, B, or Z).

FIG. 18A represents the grouping of the routines for tokens beginningwith an "A." The Application contains a table for each of three tokengroupings, "A", "B", and "Z." Referring to FIG. 17A, when theApplication identifies an "A" token, the Application continues at item1702. In item 1702, the Application reads in the second character of thetoken and stores it in Tok[1]. The Application uses this secondcharacter as an index into the A₋₋ Table, FIG. 18A. The A₋₋ Tablecontains a series of jump instructions to token routines. For example,the A₋₋ Table contains as its first entry a jump to the routine namedSELAA, which is the AA-token routine. The second entry contains a jumpto the routine named ERROR, which is an error processing routine--noAB-token is valid. The Application processes the "B" and "Z" tokens in asimilar manner. Each of the token input routines jump to the Token₋₋Loop entry point of FIG. 16 when complete.

The Token Input Table shows the length of each token input and theallowable character type. The type "0-F" means any hexadecimal characteris valid. The type "0-9" means any decimal character is valid. The type"x" means any character is valid. The type "BDIII" means the token isfollowed by the characters "BD" and one to three decimal digits.

The token input routines store the token input data as shown in theToken Storage Table. The description field indicates the processing thatthe token input routine performs before the value is stored in theTable. For example, the AA-Token input routine decrypts the AA-Inputusing the MFK with a modifier of 1. The term AA₋₋ Input refers to thedata that is input with the AA-Token. The routine stores the result inAA₋₋ Value. The AD-token input routine store the input value in AD₋₋Value without decrypting the value.

The token input routines also support the Key₋₋ Table processing. TheApplication maintains a table of keys, called Key₋₋ Table. Many of thetoken inputs are keys, which are 16 hexadecimal digits. Alternatively,the token inputs can be three to five digits. The input "BD" followed byup to three decimal digits indicates that a key value is to be retrievedfrom the Key₋₋ Table indexed by the decimal digits. This retrieved keyis stored in the corresponding token value. For example, the AK-tokencan transmit either a 16-digit key or a "BD" followed by a 3-digit indexinto the Key₋₋ Table. If the AK-token input routine detects a "BD", thenit uses the next three digits as in index into the Key₋₋ Table. Theroutine stores that Key₋₋ Table entry at AK₋₋ Value.

In a preferred embodiment, the data is stored in the Token Storage Tablein packed format. The input data is received in ASCII format. However,the ASCII characters generally represent hexadecimal digits In packedformat, each two hexadecimal digits are stored in each byte.Analogously, the packed data is unpacked and converted to ASCII formatbefore the data is output.

The Application processes the input for the AO-token specially, when thefunction "STAT" is received The STAT function means that the Applicationis to transmit status information.

Referring to FIG. 19, in item 1902, the routine increments ZK₋₋Value[3..6], which contains a count of control functions. The bracketsindicate that bytes 3 through 6 of the value is used. In subroutine1904, the routine calls F₋₋ START₋₋ MSG, which outputs the "[AOxxxx;"string. The routine then continues at Token₋₋ Loop to process the nexttoken.

Each of the tokens following the AO-token with the STAT function areZ-tokens. The Z-tokens indicate the status information the Applicationis to output. Referring to FIG. 20A, in item 2002, the ZA-token inputroutine outputs "ZA0". Throughout the description of the Application,the I/O blocks that contain the "Output" command implicitly append a";", a token delimiter at the end of the output string. The routine thencontinues at Token₋₋ Loop.

Referring to FIG. 20B, in item 2004, the ZB-token input routinecalculates the checksum of the Data Area and stores the result in ZB₋₋Value. The Data Area includes the MFK, KEK, MFK₋₋ Flag, KEK₋₋ Flag,Key₋₋ Table, and the Diebold₋₋ Table. In I/O block 2006, the routineoutputs "ZB" and ZB₋₋ Value. The routine continues at Token₋₋ Loop

Referring to FIG. 20C, in I/O block 2008 the ZC-token input routineoutputs "ZP" and ZC₋₋ Value. The routine continues at Token₋₋ Loop.

FIG. 20D is a flow diagram of the token input routines for tokens ZDthrough ZN. These routines are identical except that each routine usesthe corresponding Z₋₋ Value. In decision 2010, if the input is only onecharacter, then the routine continues at item 2012 to zero thecorresponding Z₋₋ Value, else the routine continues at I/O block 2014.In I/O block 2014, the routine outputs "Z?" and Z?₋₋ Value, where the"?" corresponds to the second character of the token. The routinecontinues at Token₋₋ Loop.

    ______________________________________                                        TOKEN INPUT TABLE                                                                        Length    Character Type                                           ______________________________________                                        AA           16          0-F                                                  AC           16          0-F                                                  AD           1           4-C                                                  AF           4-12        0-9                                                  AG           1-255       x                                                    AH           16          0-F                                                  AI           5           BDIII                                                             16          0-F                                                  AJ           16          0-F                                                  AK           5           BDIII                                                             16          0-F                                                  AL           16          0-F                                                  AO           4           x                                                    AP           5           BDIII                                                             16          0-F                                                  AQ           5           BDIII                                                             16          0-F                                                  AS           2           0-F                                                  AT           1           A-F                                                  AV           1-20        0-F                                                  AW           1           1-5                                                  AX           5           BDIII                                                             16          0-F                                                  AY           16          0-F                                                  AZ           16          0-F                                                  BA           3           1-9                                                  BB           256         x                                                    BD           3           1-9                                                  BE           4-16        0-9                                                  BF           1           2,5                                                  BG           5           BDIII                                                             16          0-F                                                  BH           5           BDIII                                                             16          0-F                                                  BJ           1           0-9                                                  BK           5           BDIII                                                             16          0-F                                                  BL           8           0-F                                                  BO           1-1024      x                                                    BR           1-3         0-9                                                  BS           5           BDIII                                                             16          0-F                                                  BT           5           BDIII                                                             16          0-F                                                  BU           2           0-9                                                  BW           1-2         0-9                                                  ZA           1           x                                                    ZB           0-1         x                                                    ZC           0-1         x                                                    ZD           1           x                                                                 8           0-F                                                  ZE           1           x                                                                 8           0-F                                                  ZF           1           x                                                                 8           0-F                                                  ZG           1           x                                                                 8           0-F                                                  ZH           1           x                                                                 8           0-F                                                  ZI           1           x                                                                 8           0-F                                                  ZJ           1           x                                                                 8           0-F                                                  ZK           1           x                                                                 8           0-F                                                  ZL           1           x                                                                 8           0-F                                                  ZM           1           x                                                                 8           0-F                                                  ZN           1           x                                                                 8           0-F                                                  ZO           1           x                                                                 8           0-F                                                  ZP           1           x                                                                 8           0-F                                                  ______________________________________                                    

    ______________________________________                                        TOKEN STORAGE TABLE                                                           Variable   Description                                                        ______________________________________                                        AA.sub.-- Value                                                                          Decrypted AA.sub.-- Input using Mod(MFK,1)                         AC.sub.-- Value                                                                          Decrypted AC.sub.-- Input using Mod(MFK,4)                         AD.sub.-- Value                                                                          AD.sub.-- Input                                                    AF.sub.-- Value                                                                          AF.sub.-- Input                                                    AG.sub.-- Value                                                                          AG.sub.-- Input                                                    AH.sub.-- Value                                                                          AH.sub.-- Input                                                    AI.sub.-- Value                                                                          Decrypted AI.sub.-- Input using Mod(MFK,2) or                                 Key.sub.-- Table[AI.sub.-- Input]                                  AJ.sub.-- Value                                                                          Decrypted AJ.sub.-- Input using                                    Mod(MFK,AS.sub.-- Value[0])                                                   AK.sub.-- Value                                                                          AK.sub.-- Input or                                                            Key.sub.-- Table[AK.sub.-- Input]                                  AL.sub.-- Value                                                                          AL.sub.-- Input                                                    AO.sub.-- Value                                                                          AO.sub.-- Input                                                    AP.sub.-- Value                                                                          Decrypted AP.sub.-- Input using MFK or                                        Key.sub.-- Table[AP.sub.-- Input]                                  AQ.sub.-- Value                                                                          Decrypted AQ.sub.-- Input using                                    Mod(MFK,AS.sub.-- Value[1])                                                              Key.sub.-- Table[AQ.sub.-- Value]                                  AS.sub.-- Value                                                                          Modifier AS.sub.-- Input[0]                                        AT.sub.-- Value                                                                          AT.sub.-- Input                                                    AV.sub.-- Value                                                                          AV.sub.-- Input                                                    AW.sub.-- Value                                                                          Mod(AW.sub.-- Input,30H)                                           AX.sub.-- Value                                                                          AX.sub.-- Input or                                                            Key.sub.-- Table[AX.sub.-- Input]                                  AY.sub.-- Value                                                                          AY.sub.-- Input                                                    AZ.sub.-- Value                                                                          Decrypted AZ.sub.-- Input using Mod(MFK,4)                         BA.sub.-- Value                                                                          BA.sub.-- Input                                                    BB.sub.-- Value                                                                          BB.sub.-- Input                                                    BD.sub.-- Value                                                                          BD.sub.-- Input                                                    BE.sub.-- Value                                                                          BE.sub.-- Input                                                    BE.sub.-- Len                                                                            Length of BE.sub.-- Input                                          BF.sub.-- Value                                                                          Mod(Bf.sub.-- Input,30H) or                                                   Key.sub.-- Table[BF.sub.-- Input]                                  BG.sub.-- Value                                                                          Decrypted BG.sub.-- Input using                                    Mod(MFK,AS.sub.-- Value[0])    Key.sub.-- Table[BG.sub.-- Input]              BH.sub.-- Value                                                                          Decrypted BH.sub.-- Input using                                    Mod(KEK,AS.sub.-- Value[0])                                                              Key.sub.-- Table[BH.sub.-- Input]                                  BJ.sub.-- Value                                                                          BJ.sub.-- Input                                                    BK.sub.-- Value                                                                          Decrypted BK.sub.-- Input using Mod(MFK,2) or                                 Key.sub.-- Table[BK.sub.-- Input]                                  BL.sub.-- Value                                                                          BL.sub.-- Input                                                    BO.sub.-- Value                                                                          BO.sub.-- Input                                                    BR.sub.-- Value                                                                          BR.sub.-- Input                                                    BS.sub.-- Value                                                                          BS.sub.-- Input or                                                            Key.sub.-- Table[BS.sub.-- Input]                                  BT.sub.-- Value                                                                          Decrypt BT.sub.-- Input using Mod(MFK,1) or                                   Key.sub.-- Table[BT.sub.-- Input]                                  BU.sub.-- Value                                                                          BU.sub.-- Input                                                    BW.sub.-- Value                                                                          BW.sub.-- Input                                                    ______________________________________                                    

FIG. 21 is a flow diagram of the message processing loop. TheApplication jumps to decision 2102 from decision 1620 of FIG. 16B whenthe end of message character is input, "]". In decision 2102, if theAO₋₋ Value equals "STAT", then a STAT function was received in themessage. Since the STAT function is processed specially as describedabove, the Application calls F₋₋ END₋₋ MSG to complete the responseSubroutine F₋₋ END₋₋ MSG is called by each token processing routine andis described below When the subroutine returns, the Applicationcontinues at the Main₋₋ Loop to input and process the next message.

In decision 2102, if the AO₋₋ Value is not equal to "STAT", then theApplication jumps to one of several function processing routines TheApplication contains one function processing routine for each function,which are shown in FIGS. 22 through 49. In item 2106, the Applicationperforms a series of "if-tests" to determine which processing routine tojump to. In a preferred embodiment, these "if-tests" are orderedaccording to the frequency at which a particular function is requested.Upon completion of each routine the Application continues at Main₋₋ Loopto input and process the next message.

The subroutine F₋₋ END₋₋ MSG (not diagrammed), which is called at thecompletion of each function processing routine, performs two servicesFirst the subroutine outputs the message "AG" and AG₋₋ Value, if anAG-token was received in the input message. Second, the subroutineoutputs a "]", the end of message character and returns.

FIG. 50 is a flow diagram of the error routine. Several of the tokenprocessing routines jump to this routine when the routine detects anerror. This routine outputs an error message and continues at the Main₋₋Loop to process the next message. In decision 5006, if Error₋₋ Flag isset, then an error message has already been output for this inputmessage and the routine continues at Main1₋₋ Loop on FIG. 14, otherwisethe routine continues to item 5010. In item 5010, the routine setsError₋₋ Flag. In item 5012, the routine increments ZL₋₋ Value, whichcontains a count of the errors. In item 5014, the routine delays beforesending the error message. In I/O block 5016, the routine outputs thestring "[AOERRO;". In item 5016, the routine uses the Error₋₋ Table,shown in FIG. 18B, to jump to an error message sending routine. Beforethe error routine is entered, the invoking routine sets Error₋₋ Numberto indicate the error message to send. The routine uses the Error-Numberas an index into the Error₋₋ Table. The routine jumps to the indexedlocation, which contains a jump to a routine to output the selectedmessage. Each of these routines, upon completion, jumps to the Main₋₋Loop.

Several of the token processing routines call the subroutines F₋₋ DESand F₋₋ DESE, which are the decryption and encryption routines. Adescription of algorithm is contained in the "Financial InstitutionMessage Authentication X9.9" developed by the American NationalStandards Committee on Financial Services, published by the X9Secretariat, American Bankers, Association, 1120 Connecticut Avenue,N.W., Washington, D.C. 20036, which is hereby incorporated by reference.

FUNCTIONS CATC

FIG. 22 is a flow chart of the CATC routine. This routine performs theCATC function. The routine encrypts the ATM Communications Key fordownloading to a Diebold ATM or an IBM 3624 ATM.

In decision 2201, if the BJ-value is equal to a 1, then the Diebold ATMis specified and the routine continues at subroutine 2202, otherwise theIBM ATM is specified and the routine continues at subroutine 2220.

In blocks 2202 through 2216, the routine processes the Diebold ATMrequest In subroutine 2202, the routine calls F₋₋ DESE, the encryptionsubroutine, with AX₋₋ Value as data and AJ₋₋ Value as key and thesubroutine return the encrypted value in Des₋₋ Return In subroutine2204, the routine calls F₋₋ START₋₋ MSG to output the start of theoutput message In I/O block 2206 the routine outputs "BJ" and the BJ₋₋Value In I/O block 2208, the routine outputs "BK" and Des₋₋ Return. Insubroutine 2210, the routine calls F₋₋ DESE the encryption subroutine,with zero as data and AX₋₋ Value as key and the subroutine returns theencrypted value in Des₋₋ Return. In I/O block, 2212 the routine outputs"AE" and Des₋₋ Return[0..1]. In subroutine 2216 the routine calls F₋₋END₋₋ MSG to output the end of the output message. The routine thencontinues at the Main₋₋ Loop to process the next message.

In blocks 2220 through 2234, the routine processes the IBM ATM requestby using the IBM double encryption algorithm. In subroutine 2220 theroutine calls the F₋₋ DESE, the encryption subroutine, with the AI₋₋Value as data and the AK₋₋ Value as key and the subroutine returns theencrypted value in Des₋₋ Return1. In items 2222 and 2224, the routinesets Des₋₋ Input[0..3]to BL₋₋ Value and Des₋₋ Input[4..7]to Des₋₋Return1[0 3]. In subroutine 2226, the routine calls F₋₋ DESE, theencryption subroutine, with Des Input as the data and BK₋₋ Value as thekey and the subroutine returns the encrypted value in Des₋₋ Return2. Insubroutine 2228, the routine calls the F₋₋ START₋₋ MSG routine to outputthe start of the output message. In I/O block 2230, the routine outputs"BJ" and BJ₋₋ Value. In I/O block 2232, the routine outputs "BK", DesReturn2[0..7], and Des₋₋ Returnl[4..7 ]. In subroutine 2234, the routinecalls F₋₋ END₋₋ MSG to output the end of the output message. The routinethen continues at the Main₋₋ Loop to process the next message.

CKTA

FIG. 23 is a flow chart of the CKTA routine. This routine performs theCKTA function. The routine zeros out Key₋₋ Table.

In item 2302, the routine increments the ZI₋₋ Value[3..6], whichcontains a count of the Key₋₋ Table functions. In item 2304, the routinesets BQ_(--Value) to the number of entries in Key₋₋ Table. BQ_(--Value)contains a count of the number of empty entries in Key₋₋ Table. Insubroutine 2206, the routine calls F₋₋ START₋₋ MSG to output the startof the output message. In I/O block 2308, the routine outputs "BBOK". Insubroutine 2310, the routine calls F₋₋ END₋₋ MSG to output the end ofthe output message. In item 2312, the routine places zeros throughoutthe Key₋₋ Table. The routine then continues at the Main₋₋ Loop toprocess the next message.

CLWA

FIG. 24 is a flow chart of the CLWA routine. This routine performs aCLWA function. The routine clears the Master File Key (MFK), the KeyExchange Key (KEK), or both depending on the setting of BJ₋₋ Value.

In subroutine 2402, the routine calls F₋₋ START₋₋ MSG to output thestart of the output message. In I/O block 2404, the routine outputs "BJ"and BJ₋₋ Value. In decision 2406, if BJ₋₋ Value is equal to a 1, thenMFK is selected and the routine continues at item 2408, otherwise theroutine continues at decision 2410. In item 2408, the routine clearsMFK₋₋ Flag. In decision 2410, if BJ₋₋ Value equals 2, then clear KEK₋₋Flag is selected and the routine continues at block 2412, otherwise theroutine continues at item 2414. In item 2412, the routine clears theKEK₋₋ Flag. In item 2414, the routine clears both the MFK₋₋ Flag and theKEK₋₋ Flag. In subroutine 2416, the routine calls F₋₋ END₋₋ MSG tooutput the end of the output message. The routine then continues at theMain₋₋ Loop to process the next message.

CRYP

FIG. 25 is a flow chart of the CRYP routine. This routine performs theCRYP function The routine outputs a cryptogram of the last key injected.

In decision 2502, if the MFK₋₋ Flag is clear, then a cryptogram cannotbe formed and the routine processes an error, else the routine continuesat subroutine 2504. In subroutine 2504, the routine calls F₋₋ START₋₋MSG to output the start of the output message. In subroutine 2506, theroutine calls F₋₋ DESE, the encryption subroutine, with IKEY as data andMFK as key and the subroutine returns the encrypted value in Des₋₋Return. In I/O block 2508, the routine outputs "AH" and Des₋₋ Return. InI/O block 2510, the routine outputs "AK" and IKEY[8..12]. In subroutine2512, the routine calls F₋₋ END₋₋ MSG to output the end of the outputmessage. The routine then continues at the Main₋₋ Loop to process thenext message.

CWKS

FIG. 26 is a flow chart of the CWKS routine. This routine performs aCWKS function The routine outputs the encrypted key under a specifiedmodifier.

In subroutine 2602, the routine calls F₋₋ DESE, the encryptionsubroutine, with IKEY as data and MFK modified AS₋₋ Value[0]as key andthe subroutine returns the encrypted value in Des₋₋ Return. Insubroutine 2604, the routine calls F₋₋ START₋₋ MSG to output the startof the output message. In output block 2606, the routine outputs "AH"and Des₋₋ Return In subroutine 2608, the routine calls F₋₋ END₋₋ MSG tooutput the end of the output message. The routine then continues at theMain₋₋ Loop to process the next message.

DDAT

FIG. 27 is a flow chart of the DDAT routine. This routine performs theDDAT function. The routine decrypts data stored in the AK₋₋ Value.

In subroutine 2702, the routine calls F₋₋ DESD, the decryptionsubroutine, with AK₋₋ Value as data and AI₋₋ Value as key and thesubroutine returns the decrypted data in Des₋₋ Return. In subroutine2704, the routine calls F₋₋ START₋₋ MSG to output the start of theoutput message. In I/O block 2706, the routine outputs "AK" and Des₋₋Return. In subroutine 2708, the routine calls F₋₋ END₋₋ MSG to outputthe end of the message. The routine then continue's at the Main₋₋ Loopto process the next message.

DESD and DESE

FIG. 28 is a flow chart of the DESD and DESE routines. These routinesperform the DESD and DESE functions. This routine decrypts or encryptsthe AK₋₋ Value depending upon whether encryption or decryption isselected

In decision 2802, if AO₋₋ Value equals DESE, then encryption is selectedand the routine continues to subroutine 2804, otherwise decryption isselected and the routine continues to subroutine 2806.

In subroutine 2804, the routine calls F₋₋ DESE, the encryptionsubroutine, with AK₋₋ Value as data and BS₋₋ Value as key and thesubroutine returns the encrypted value in Des₋₋ Return. The routine thencontinues to subroutine 2808.

In subroutine 2806, the routine calls F₋₋ DESD, the decryptionsubroutine, with AK₋₋ Value as data and BS₋₋ Value as key and thesubroutine returns the decrypted data in Des₋₋ Return. The routine thencontinues at subroutine 2808.

In subroutine 2808, the routine calls F₋₋ START₋₋ MSG to output thestart of the output message. In I/O block 2810, the routine outputs "BS"and BS₋₋ Value. In I/O block 2812, the routine outputs "AK" and Des₋₋Return. In subroutine 2814, the routine calls F₋₋ END₋₋ MSG to outputthe end of the output message. The routine then continues at the Main₋₋Loop to process the next message.

DKTE

FIG. 29 is a flow chart of the DKTE routine. This routine performs theDKTE function. This routine deletes an entry from the Key₋₋ Tableindicated by the index stored in BD₋₋ Value[4..6].

In item 2902, the routine increments ZI₋₋ Value[3..6], which containsthe number of Key₋₋ Table functions. In decision 2904, if the Key₋₋Table entry at BD₋₋ Value[4..6]equals zero, then the table entry isempty and the routine continues at subroutine 2910, else the subroutinecontinues at item 2906. In item 2906, the routine zeros out the Key₋₋Table entry specified by BD₋₋ Value[4..6]. In item 2908, the routineincrements BQ_(--Value), which indicates the number of empty entries inKey₋₋ Table. In subroutine 2910, the routine calls F₋₋ START₋₋ MSG tooutput the start of the output message. In I/O block 2912, the routineoutputs "BQ" and BQ_(--Value). In subroutine 2914, the routine calls F₋₋END₋₋ MSG to output the end of the output message. The routine thencontinues at the Main₋₋ Loop to process the next message.

ECHO

FIG. 30 is a flow chart of the ECHO routine. This routine performs theECHO function. The routine outputs the BC₋₋ Value.

In subroutine 3002, the routine calls F₁₃ WATCHDOG. In subroutine 3004,the routine calls F₋₋ START₋₋ MSG to output the start of the outputmessage. In I/O block 3006, the routine outputs "BC" and BC Valuewherein BC₋₋ Value is the version number of the software. In subroutine3008, the routine calls F₋₋ END₋₋ MSG to output the end of the outputmessage. The routine then continues at the Main₋₋ Loop to process thenext message.

EDAT

FIG. 31 is a flow chart of the EDAT routine. This routine performs theEDAT function The routine encrypts the AK₋₋ Value.

In subroutine 3102, the routine calls F₋₋ DESE, the encryptionsubroutine, with AK₋₋ Value as data and AI₋₋ Value as key and thesubroutine returns the encrypted value in Des₋₋ Return. In subroutine3104, the routine calls F₋₋ START₋₋ MSG to output the start of theoutput message. In I/O block 3108, the routine outputs "AK" and Des₋₋Return. In subroutine 3110, the routine calls F₋₋ END₋₋ MSG to outputthe end of the output message. The routine then continues at the Main₋₋Loop to process the next message.

EFIT

FIG. 32 is a flow chart of the EFIT routine. This routine performs theEFIT function. The routine encrypts the AC₋₋ Value and outputs thatvalue and corresponding check digit.

In subroutine 3202, the routine calls F₋₋ DESE, the encryptionsubroutine, with AC₋₋ Value as data and AX₋₋ Value as key and thesubroutine returns the encrypted value in Des₋₋ Return. In subroutine3204, the routine calls F₋₋ START₋₋ MSG to output the start of theoutput message. In I/O block: 3206, the routine outputs "BJ" and "3". InI/O block 3208, the routine outputs "AK" and Des₋₋ Return. In subroutine3210, the routine calls F₋₋ DESE, the encryption subroutine, with zeroas data and AC₋₋ Value as key and the subroutine returns the encryptedvalue in Des₋₋ Return. In I/O block 3212, the routine outputs "AE" andDes₋₋ Return[0..1] check digit. In subroutine 3214, the routine callsF₋₋ END₋₋ MSG to output the end of the output message. The routine thencontinues at the Main₋₋ Loop to process the next message.

EPIN

FIG. 33 is a flow chart of the EPIN routine. This routine performs theEPIN function The routine encrypts a PIN.

In item 3302, the routine increments ZE₋₋ Value[3..6], which contains acount of the number of PIN encryptions. In items 3304 and 3306, theroutine initializes a variable Des₋₋ In1 as the data parameter of theencryption subroutine. In item 3304, the routine sets Des₋₋ In1[0..1]equal to AF₋₋ Value[0..1]. In item 3306, the routine sets Des₋₋In1[2..7] equal to the exclusive-OR of AF₋₋ Value[2..7] and AV₋₋Value[0..5]. In subroutine 3308, the routine calls F₋₋ DESE, theencryption subroutine, with Des₋₋ In1 as data and AX₋₋ Value as key andthe subroutine returns the encrypted value in Des₋₋ Return. Insubroutine 3310, the routine calls F₋₋ START₋₋ MSG to output the startof the output message. In I/O block 3312, the routine outputs "AL" andDes₋₋ Return. In subroutine 3314, the routine calls F₋₋ END₋₋ MSG tooutput the end of the output message. The routine then continues at theMain₋₋ Loop to process the next message.

GWKS

FIG. 34 is a flow chart of the GWKS routine This routine performs theGWKS function. The routine generates a random key and outputs it incryptogram form.

In subroutine 3402, the routine calls for F₋₋ RANDOM, the random numbergeneration routine which returns a random number in the variable Random.In subroutine 3404, the routine calls F₋₋ DESE, the encryptionsubroutine, with Random as the data and MFK modified by AS₋₋ Value[0] askey and the subroutine returns the encrypted value in Des₋₋ Return. Insubroutine 3406, the routine calls F₋₋ START₋₋ MSG to output the startof the output message. In I/O block 3408 the routine outputs "BG" andDes₋₋ Return. In subroutine 3410, the routine calls F₋₋ DESE, theencryption subroutine, with Random as data and AP₋₋ Value modified byA₋₋ Value[0] as key and the subroutine returns the encrypted value inDes₋₋ Return. In I/O block 3412 the routine outputs "BH" and Des₋₋Return. In subroutine 3414, the routine calls F₋₋ DESE, the encryptionsubroutine, with zero as data and Random as key, and the subroutinereturns the encrypted value in Des₋₋ Return. In I/O block 3416, theroutine outputs "AE" and Des₋₋ Return[0..1], the check digits. Insubroutine 3418, the routine calls F₋₋ END₋₋ MSG to output the end ofthe output message. The routine then continues at the Main₋₋ Loop toprocess the next message.

IKEY

FIG. 35 is a flow chart of the IKEY routine. This routine performs theIKEY function. This routine takes the injected key value and stores iteither in the MFK or the KEK, depending on the value in BJ₋₋ Value.

In item 3502, the routine sets stat 1.1, the Data₋₋ Checksum₋₋ Flag toindicate the data Checksum needs to be recalculated. In item 3504, theroutine sets IKEY[8..12] equal to AK₋₋ Value. In decision 3506, if BJ₋₋Value equals 1, then the MF Key is to be injected and the routinecontinues to subroutine 3516 otherWise the KEK is to be injected and theroutine continues to decision 3508.

In decision 3508, if MFK₋₋ Flag is clear, then the routine processes anerror because there is no MFK to encrypt with, else the routinecontinues at subroutine 3510. In subroutine 3510, the routine calls F₋₋START₋₋ MSG to output the start of the output message. In item 3512, theroutine sets KEK equal to IKEY to inject the key. In item 3512, thesubroutine sets KEK₋₋ Flag to indicate that the KEK is valid.

In subroutine 3516, the routine calls F₋₋ START₋₋ MSG to output &:hestart of the output message. In item 3518, the routine sets MFK equal toIKEY to inject the key. In item 3520, the routine sets MFK₋₋ Flag toindicate that the MFK is valid.

In I/O block 3522, the routine outputs "BJ" and BJ₋₋ Value. Insubroutine 3524, the routine calls F₋₋ DESE, the encryption subroutine,with IKEY as data and MFK as key, and the subroutine returns theencrypted value in Des₋₋ Return. In I/O Block 3526, the routine outputs"AH" and Des₋₋ Return. In I/O block 3528, the routine outputs "AK" andAK₋₋ Value. In subroutine 330, the routine calls F₋₋ END₋₋ MSG to outputthe end of the output message. The routine then continues at the Main₋₋Loop to process the next message.

LATM

FIG. 36 is a flow chart of the LATM routine. This routine performs theLATM function which loads the ATM with a master key. The routineencrypts a master key for the Diebold or IBM formats depending on thevalue in BJ₋₋ Value.

In subroutine 3602, the routine calls F₋₋ START₋₋ MSG to output thestart of the output message. In decision 3604, if BJ₋₋ Value equals 1,then Diebold format is requested and the routine continues to subroutine3606, otherwise the IBM format is requested and the routine continues tosubroutine 3616.

In subroutine 3606, the routine calls F₋₋ DESE, the encryptionsubroutine, with AQ₋₋ Value as data and AK₋₋ Value as key and thesubroutine returns the encrypted value in Des₋₋ Return. In I/O block3608, the routine outputs "BJ" and "0". In I/O block 3610, the routineoutputs "AC" and Des₋₋ Return. In subroutine 3612, the routine calls F₋₋DESE, the encryption subroutine with zero as data and AQ₋₋ Value as keyand the routine returns the encrypted value in Des₋₋ Return In I/O block3614, the routine outputs "AE" and Des₋₋ Return[0..1], the check digits.The routine then continues to subroutine 3628.

In subroutine 3616, the routine calls F₋₋ DESE, the encryptionsubroutine, with AC Value as data and AA₋₋ Value as key, and thesubroutine returns the encrypted value in Des₋₋ Return1. In items 3618and 3620, the routine initializes Des₋₋ In as input into the encryptionsubroutine. In item 3618, the routine sets Des₋₋ [0..3] equal to BL₋₋Value[0..3]. In item 3620, the routine sets Des₋₋ In[4..7] equal toDes₋₋ Return1[0..3]. In subroutine 3622, the routine calls F₋₋ DESE, theencryption subroutine, with Des₋₋ In as data and BK₋₋ Value as key, andthe subroutine returns the encrypted value in Des₋₋ Return2. In I/Oblock 3624, the routine outputs "BJ" and "1". In I/O block 3626, theroutine outputs "AC" and Des₋₋ Return2 and Des₋₋ Return1[4..7]. Theroutine then continues to block 3628.

In block 3638, the routine calls F₋₋ END₋₋ MSG to output the end of theoutput message. The routine then continues at the Main₋₋ Loop to processthe next message.

LCDT

FIG. 37 is a flow chart of the LCDT routine. This routine performs theLCDT function. This routine loads the Diebold Table indexed by the BR₋₋Value with data from BO₋₋ Value. The Diebold₋₋ Table contains 32 entriesof 8 values each. Each value is a 2-digit hexadecimal number

In item 3702, the routine sets the Data-Checksum-Flag to indicate thedata checksum needs to be recalculated. In items 3704 and 3706, theroutine initializes DT₋₋ Index, which is an index into the Diebold₋₋Table, and BO₋₋ Index, which is an index into BO₋₋ Value. In blocks 3708through 3718, the routine performs a loop which loads the Diebold₋₋Table entry with 16 hexadecimal digits at a time. In subroutine 3708,the routine calls F₁₃ WATCHDOG. In item 3714, the routine loads theDiebold₋₋ Table with the value from BO₋₋ Value indexed by BO₋₋ Index. Initem 3716, the routine increments DT₋₋ Index and BO₋₋ Index. In decision3718, if DT₋₋ Index equals 32, then the Diebold₋₋ Table entry has beenloaded and the routine continues at subroutine 3720, else the routineloops to subroutine 3708. In subroutine 3720, the routine calls F₋₋START₋₋ MSG to output the start of the output message. In I/O block3722, the routine outputs "BR" and BR₋₋ Value[0]. In subroutine 3724,the routine calls F₋₋ END₋₋ MSG to output the end of the output message.The routine then continues at the Main₋₋ Loop to process the nextmessage.

LENT

FIG. 38 is a flow chart of the LENT routine. This routine performs theLENT function The routine loads the DieboldTable indexed by the BR₋₋Value with data from BO₋₋ Value. This routine is similar to the LCDTroutine except that this routine decrypts the BO₋₋ Value before storingit in the Diebold₋₋ Table.

In item 3802, the routine sets the Data₋₋ Checksum₋₋ Flag to indicatethe data checksum needs to be recalculated. In items 3804 and 3806, theroutine initializes DT₋₋ Index, which is an index into the Diebold₋₋Table, and BO₋₋ Index, which is an index into the BO₋₋ Value. In blocks3808 through 3818, the routine performs a loop which loads the decryptedBO₋₋ Value into the Diebold-Table entry with 16 hexadecimal digits at atime. In subroutine 3808, the routine calls F₁₃ WATCHDOG. In subroutine3810, the routine calls F₋₋ DESD, the decryption subroutine, with BO₋₋Value indexed by BO₋₋ Index as data and AP₋₋ Value as key, and thesubroutine returns the decrypted data in Des₋₋ Return. In item 3814, theroutine moves Des₋₋ Return into the Diebold₋₋ Table. In item 3816, theroutine increments DT₋₋ Index and BO₋₋ Index. In decision 3818, if DT₋₋Index equals 32, then the Diebold₋₋ Table entry has been loaded and theroutine continues at subroutine 3820, else the routine loops tosubroutine 3808.

In subroutine 3820, the routine calls F₋₋ START₋₋ MSG to output thestart of the output message. In I/O block 3822, the routine outputs "BR"and BR₋₋ Value[0]. In subroutine 3824, the routine calls F₋₋ END₋₋ MSGto output the end of the output message. The routine then continues atthe Main₋₋ Loop to process the next message.

LMKT

FIG. 39 is a flow chart of the LMKT routine. This routine performs theLMKT function. The routine loads the KeyTable indexed by BD₋₋Value[4..6]with the BG₋₋ Value.

In decision 3902, if BG Value equals zero, then the routine processes anerror, else the routine continues to item 3904. In item 3904, theroutine increments ZI₋₋ Value[3..6], which contains the number of Key₋₋Table functions. In decision 3906, if Key₋₋ Table indexed by BD₋₋Value[4..6] equals zero, then a new entry is being made into the KeyTable and the routine decrements BQ₋₋ Value in item 3908. In item 3910,the routine sets KeyTable indexed by BD₋₋ Value[4..6] equal to BG₋₋Value. In subroutine 3912, the routine calls F₋₋ START₋₋ MSG to outputthe start of the output message. In I/O block 3914, the routine outputs"BD" and BD₋₋ Value. In I/O block 3916, the routine outputs "BQ" andBQ_(--Value). In subroutine 3918, the routine calls F₋₋ DESE, theencryption subroutine, with zero as data and BG₋₋ Value as key, and thesubroutine returns the encrypted value in Des₋₋ Return. In I/O block3920, the routine outputs "AE" and Des₋₋ Return[0..1], the check digits.In subroutine 3922, the routine calls F₋₋ END₋₋ MSG to output the end ofthe output message. The routine then continues at the Main₋₋ Loop toprocess the next message.

LKEY

FIG. 40 is a flow chart of the LKEY routine This routine performs theLKEY function. The routine loads IKEY with AK₋₋ Value or AK₋₋ Valueexclusive-ORed with IKEY depending on BJ₋₋ Value.

In subroutine 4002, the routine calls F₋₋ START₋₋ MSG to output thestart of the output message. In I/O block 4004, the routine outputs "BJ"and BJ₋₋ Value. In decision 4006, if BJ₋₋ Value equals 1, then theroutine continues at item 4010, otherwise the routine continues at item4008. In item 4008, the routine sets IKEY equal to AK₋₋ Valueexclusive-ORed with the current value of IKEY. The routine thencontinues at subroutine 4012. In block 4010, the routine sets IKEY equalto AK₋₋ Value. The routine then continues to subroutine 4012.

In subroutine 4012, the routine calls F₋₋ DESE, the encryptionsubroutine, with zero as data and IKEY as key, and the subroutinereturns the encrypted value in Des₋₋ Return. In I/O block 4014, theroutine outputs "AE" and Des₋₋ Return[0..1], the check digits. Insubroutine 4016, the routine calls F₋₋ END₋₋ MSG to output the end ofthe output message. The routine then continues at the Main₋₋ Loop toprocess the next message.

RKEY

FIG. 41 is a flow chart of the RKEY routine. This routine performs theRKEY function The RKEY routine outputs a random number.

In subroutine 4102, the routine calls F₋₋ RANDOM, which generates arandom number and returns it in Random. In subroutine 4104, the routinecalls F₋₋ START₋₋ MSG to output the start of the output message. In I/Oblock 4106, the routine outputs "AK" and Random. In subroutine 4108, theroutine calls F₋₋ END₋₋ MSG to output the end of the output message. Theroutine then continues at the Main₋₋ Loop to process the next message

SKEY

FIG. 42 is a flow chart of the SKEY routine. This routine performs theSKEY function The routine outputs status of the MFK and KEK.

In item 4202, the routine increments ZK₋₋ Value[3..6], which contains acount of the control functions. In subroutine 4204, the routine callsF₋₋ START₋₋ MSG to output the start of the output message. In decision4206, if MFK₋₋ Flag and KEK₋₋ Flag are cleared, then the routinecontinues at I/O block 4208, else the routine continues at decision4210. In I/O block 4208, the routine outputs "AK" and 0. The routinethen continues to subroutine 4238.

In decision 4210, if MFK₋₋ Flag is set and KEK₋₋ Flag is clear, then theroutine continues at item 4212, otherwise the routine continues atdecision 4218. In item 4212, the routine outputs "AK" and 1. Insubroutine 4214, the routine calls F₋₋ DESE, the encryption subroutine,with zero as data and MFK as key, and the subroutine returns theencrypted data in Des₋₋ Return. In I/O block 4216, the routine outputs"AE" and Des₋₋ Return[0..1], the check digits. The routine thencontinues to subroutine 4238.

In decision 4218, if KEK₋₋ Flag is set and MFK₋₋ Flag is clear, then theroutine continues at I/O block 4220, otherwise the routine continues atdecision 4226. In I/O block 4220, the routine outputs "AK" and 2. Insubroutine 4222, the routine calls F₋₋ DESE, the encryption routine,with zero as data and KEK as key, and the subroutine returns Des₋₋Return. In I/O block 4224, the routine outputs "AE" and Des₋₋Return[0..1], the check digits. The routine then continues at subroutine4238.

In decision 4226, if KEK₋₋ Flag and MFK₋₋ Flag are set, then the routinecontinues at I/O block 4228, otherwise the routine processes an error.In I/O block 4228, the routine outputs "AK" and 3. In subroutine 4230,the routine calls F₋₋ DESE, the encryption subroutine, with zero as dataand MFK as key and the subroutine returns the encrypted value Des₋₋Return1. In subroutine 4232, the routine calls F₋₋ DESE, the encryptionsubroutine, with zero as data and KEK as key and the subroutine returnsthe encrypted value Des₋₋ Return2. In I/O block 4234, the routineoutputs "AE" and Des₋₋ Return1[0..1] and Des₋₋ Return2[0..1], the checkdigits.

In subroutine 4238, the routine calls F₋₋ END₋₋ MSG to output the end ofthe output message. The routine then continues at the Main₋₋ Loop toprocess the next message.

TDLY

FIG. 43 is a flow chart of the TDLY routine. This routine performs theTDLY function which causes all outputs to be delayed a specified period.The routine outputs the BA₋₋ Value.

In subroutine 4302, the routine calls F₋₋ START₋₋ MSG to output thestart of the output message. In I/O block 4304, the routine outputs "BA"and BA₋₋ Value In subroutine 4306, the routine calls F₋₋ END₋₋ MSG tooutput the end of the output message. The routine then continues at theMain₋₋ Loop to process the next message.

TPIN

FIG. 44 is a flow chart of the TPIN routine This routine performs theTPIN function. The routine translates PINs from one encryption key toanother encryption key and optionally from one PIN format to ANSIformat.

In item 4402, the routine increments ZF₋₋ Value[3..6], which containsthe number of PIN translates. In subroutine 4404, the routine calls F₋₋DESD, the decryption subroutine, with AL₋₋ Value as data and AX₋₋ Valueas key and the subroutine returns the decrypted value in Des₋₋ Return1.In decision 4406, if AW₋₋ Value equals 3, then the data is in PIN PADformat, and the routine continues at subroutine 4408, otherwise the datais in ANSI format, and the routine continues at subroutine 4412. Insubroutine 4408, the routine calls F₋₋ Validate₋₋ PIN₋₋ PAD (notdescribed herein) to validate the format of the PIN in ANSI PIN PADformat, and the subroutine returns the status. In item 4410, the routineconverts the PIN PAD format to the ANSI format. The routine thencontinues at subroutine 4414.

In subroutine 4412, the routine calls F₋₋ VALIDATE₋₋ ANSI (not describedherein) to validate the format of the PIN in ANSI format, and thesubroutine returns the status.

In subroutine 4414, the routine calls F₋₋ DESE, the encryptionsubroutine, with Des₋₋ Return1 as data and BT₋₋ Value as key, and thesubroutine returns the encrypted value in Des₋₋ Return2. In decision4416, if the status is okay, then the routine continues at subroutine4420, else the routine continues at item 4418. In item 4418, the routineincrements ZM₋₋ Value[3..6], which contains a count of PIN formaterrors. The routine then continues at subroutine 4420.

In subroutine 4420, the routine calls F₋₋ START₋₋ MSG to output thestart of the output message. In I/O block 4420, the routine outputs "AL"and Des₋₋ Return2. In output block 4424, the routine outputs "BB" andstatus. In subroutine 4426, the routine calls F₋₋ END₋₋ MSG up at theend of the output message. The routine then continues at the Main₋₋ Loopto process the next message.

TWKD

FIG. 45 is a flow chart of the TWKD routine. This routine performs, theTWKD function The routine that translates working key for distribution.

In subroutine 4502, the routine calls F₋₋ START₋₋ MSG to output thestart of the output message. In subroutine 4504, the routine calls F₋₋DESE, the encryption subroutine, with BG₋₋ Value as data and AP₋₋ Valuemodified by AS₋₋ Value[0] as key, and the subroutine returns theencrypted value in Des₋₋ Return. In I/O block 4506, the routine callsoutputs "BH" and Des₋₋ Return. In subroutine 4508, the routine calls F₋₋DESE, the encryption subroutine, with zero as data and BG₋₋ Value askey, and the subroutine returns the encrypted value in Des₋₋ Return. InI/O block 4510, the routine outputs "AE" and Des₋₋ Return[0..1], thecheck digits. In subroutine 4512, the routine calls F₋₋ END₋₋ MSG tooutput the end of the output message. The routine then continues at theMain₋₋ Loop to process the next message.

F₋₋ DELAY

FIG. 46 is a flow chart of the F₋₋ DELAY routine. This routine performsthe F₋₋ DELAY function The routine generates a delay for 20 cycles.

In item 4602, the program delays for 20 cycles and then returns toMAIN₋₋ LOOP.

TWKL

FIG. 47 is a flow chart of the TWKL routine. This routine performs theTWKL function The TWKL routine translates the working key for localstorage.

In subroutine 4702, the routine calls F₋₋ START₋₋ MSG to output thestart of the output message. In subroutine 4704, the routine calls F₋₋DESE, the encryption subroutine, with BH₋₋ Value as data and MFKmodified by one as key, and the subroutine returns the encrypted valuein Des₋₋ Return. In I/O block 4706, the routine outputs "BG" and Des₋₋Return. In subroutine 4708, the routine calls F₋₋ DESE, the encryptionsubroutine, with zero as data and DH₋₋ Value as key, and the subroutinereturns the encrypted value in Des₋₋ Return. In I/O block 4710, theroutine outputs "AE" and Des₋₋ Return[0..1], the check digits. Insubroutine 4712, the routine calls F₋₋ END₋₋ MSG to output the end ofthe output message. The routine then continues at the Main₋₋ Loop toprocess the next message.

VKTE

FIG. 22 is a flow chart of the VKTE routine. This routine performs theVKTE function. The routine outputs the check digit of the Key Tableentry indexed by DB₋₋ Value[4..6].

In item 4802, the routine increments ZI₋₋ Value[3..6], which containsthe number of Key-Table functions. In item 4804, the routine sets thevariable entry equal to Key₋₋ Table indexed by BD₋₋ Value[4..6]. Insubroutine 4806, the routine calls F₋₋ DESE, the encryption subroutine,with zero as data and entry as key, and the subroutine returns theencrypted value in Des₋₋ Return. In subroutine 4808, the routine callsF₋₋ START₋₋ MSG to output the start of the output message. In I/O block4810, the routine outputs "BQ" and BQ_(--Value). In I/O block 4812, theroutine outputs "AE" and Des Return[ 0..1], the check digits. Insubroutine 4814, the routine calls F₋₋ END₋₋ MSG to output the end ofthe output message. The routine then continues at the Main₋₋ Loop toprocess the next message.

VPIN

FIG. 49 is a flow chart of the VPIN routine. This routine performs theVPIN function. The routine validates a PIN in ANSI format or PIN PADformat depending upon the AW₋₋ Value and performs either the Diebold orthe IBM PIN verification based on the BF₋₋ Value.

In decision 4902, if BF Value equals 2 or 5, then the routine continuesat item 4904, otherwise the routine processes an error. In item 4904,the routine increments ZG₋₋ Value[3..6], which contains a count of thePIN verifications. In decision 4906, if AW₋₋ Value equals 1 or 3, thenthe routine continues at subroutine 4908, otherwise the routineprocesses an error. In subroutine 4908, the routine calls F₋₋ DESD, thedecryption subroutine, with AL₋₋ Value as data and AX₋₋ Value as key,and the subroutine returns the decrypted value in Des₋₋ Return. Indecision 4910, if AW₋₋ Value equals 3, then the routine performs an ANSIvalidation by continuing at subroutine 4914, otherwise the routineperforms a PIN PAD validation by continuing at subroutine 4912. Insubroutine 4912, the routine calls F₋₋ VALIDATE₋₋ PIN₋₋ PAD whichreturns the PIN PAD status. The routine then continues at decision 4916.In subroutine 4914, the routine calls F₋₋ VALIDATE₋₋ ANSI, and theroutine returns the PIN PAD status. The routine then continues atdecision 4916.

In decision 4916, if the PIN status is okay, then the routine continuesat decision 4920, otherwise the routine continues at item 4918. In item4918, the routine increments ZM₋₋ Value[3..6], which contains the countof the PIN format errors.

In decision 4920, if BF₋₋ Value equals 2, then the routine performs anIBM verification by continuing at subroutine 4922, otherwise the routineperforms the Diebold verification by continuing at subroutine 4924. Insubroutine 4922, the routine calls F₋₋ IBM₋₋ 3624 (not described herein)which verifies the PIN and returns a Verify₋₋ Flag and then continues atsubroutine 4926. In subroutine 4924, the routine calls F₋₋ Diebold (notdescribed herein) which returns a Verify₋₋ Flag and then continues atsubroutine 4926.

In subroutine 4926, the routine calls F₋₋ START₋₋ MSG to output thestart of the output message. In I/O block 4928, the routine outputs "BB"and the Verify₋₋ Flag or the status. In subroutine 4930, the routinecalls F₋₋ END₋₋ MSG to output the end of the output message. The routinethen continues at Main₋₋ Loop to process the next message.

The present invention incorporates a sophisticated, user-friendly,menu-driven interface for communicating with a user and providing acontrol structure for entering and modifying system controlcharacteristics and key values. As exemplary examples of the userinterface of the present invention, diagrams of the following screendisplays are provided. The low-level routines of this aspect of thepresent invention are based on a readily available package, such as"Window Boss," which provides "pop-up" menu drivers in "C" source code.

FIG. 51 is a diagram of the opening status screen displayed to the userupon system power-up. From this opening menu, the user selects desiredfunctions by moving the cursor left or right. The selected command isthen highlighted. Once a particular menu is selected, commands withinthat command may be activated by cursor control or by entering thecapital letter associated with each command.

FIG. 52 is a representative sample of the opening help screen displayedto the user when activated from a preselected function. The presentinvention is provided with a context-sensitive help function so thatwhenever the user depresses the F1 function key provided with thesystem, the current screen is replaced with a help screen related to thefunction which was active when F1 was depressed. This function isachieved through a global variable known as the "help key word," whichcontains the subject to be brought up when help is selected. The "helpkey word" is continuously updated by the menu routine for each menuitem. Therefore, the global "help key word" always contains a stringrelated to the menu item currently selected.

FIG. 53 is a diagram of the master status screen displayed to the userwhen the status display mode is selected. The Status Window displayspertinent information about the Data Encryption Boards, so the user canverify that each one is on line and working properly. It also enablesthe user to see detailed statistics about each board, such as: (1) thetotal number of transactions handled, (2) the subtotal of PINstranslated, (3) the subtotal of PINs verified, (4) the subtotal of PINsrejected as incorrectly entered, (5) the subtotal of PINs that failed topass routine formatting checks, and (6) the last time the transactioncounter for a given board was reset. This screen is activaed from themain menu when a user enters an "S" from the keyboard or enters "return"from the keyboard while the cursor is over the status menu item. Themain status screen contains several fields, wherein the main fielddescribes which encryption device is currently selected, and wherein theupper portion of the screen displays all board positions available andfurther displays which encryption device of the system is selected. Thecolumn labeled "BD." describes the encryption devices accessible to theuser. The column labeled "GR." describes a logical group numberassociated with each particular encryption device wherein group numbersare assigned under the "Config" or configure menu discussed in furtherdetail below. Each description is up to a 20-character description,which allows a user to identify a particular encryption device which isidentified to the switch processing computer under a definednomenclature. In accordance with the present invention, encryptiondevices can be configured in several ways. "Empty" signifies that adesignated encryption device location is empty. "Solo" indicates thatthe encryption device is operating in a non-fault-tolerant, stand-alonemode. "Master" and "Slave" indicate that the encryption device isoperating in a paired configuration with another board. In one aspect ofthe present invention, when the system is operated with a color displaY,if a particular encryption device is malfunctioning, the portion of thedisplay corresponding to the description field for the device flashes ina predefined color, preferably red. In monochrome displays, thedescription field simply flashes.

"Count" indicates the number of messages of any type sent to eachencryption device, either through the parallel or serial port. "DSUM" isa checksum of the data area of a encryption device and includes variouskeys and keytables. This statistic allows a user to determine whetheridentical key information has been loaded in individual encryptiondevices. "PSUM" is the program checksum and is used to indicate whethersystem firmware has been corrupted or tampered with. The "KEK" and "MFK"fields contain a 4- to 8-digit checksum related to the respective keysand may be used to verify key information loaded in the system.

In the lower portion of the display, the heading displays whichencryption device is selected. In the preferred practice of the presentinvention, fields may be selected by using cursor control. In addition,fields are also selected periodically in rotation. The fields EPIN,TRANSLATE, PINVER, SUCCESS, FAILURE, and FORMAT ERROR are cumulativetotals which represent totals since the encryption device totals werelast reset to zero, which may be the first day the encryption device wasput into service or when the encryption device was last reset manually.The field "TOTAL" represents 100% of the transactions since theencryption device was put into service and functions as a verificationof proper system operation. "EPIN" is the number of PIN encryptionfunctions performed. "XLATE" or translate shows the number of PINtranslation functions performed. "PINVER" shows the number of PINverification functions performed. "OTHER" represents all other functionsperformed by the encryption device. On the other side of the display,"SUCCESS", "FAILURE", and "FMTERR" are subtotals of the PIN verify andPIN translate functions. The lower portion of the totals on the rightportion of the display are a statistical sample of the volume oftransactions performed by the encryption device and are reset to zeroevery time the status display is selected. If the status screen remainsselected, it is reset to zero once every interval wherein the intervalis user-definable and may typically be in the range of one hour. Thisallows the network switch to display encryption devices to determinewhether a particular device is denying an abnormal number of PINs.Therefore, a relatively short interval period is desirable so thatdeviations in system performance are more readily apparent. Each of thefields "SUCCESS", "FAILURE" and "FMTERR" blinks and/or changes colorwhenever the number displayed in the field exceeds a user-definedthreshold limit. In addition, the word "ALARM" is displayed when auser-defined threshold is exceeded, as shown in FIG. 55.

In one aspect of the present invention, the display is provided with ablue background, the text is blue on white, and cyan is used as a cursorto highlight selected functions.

On the lower left-hand portion of the display the fields "ERRORS" and"RESETS" are provided. "ERRORS" represents the number of messagesreceived by an encryption device that did not conform to the messageformat of the present invention, which may indicate a problem withcommunication lines or may indicate tampering with the encryptiondevice. "RESETS" indicates the number of Watchdog Timer resets, whichmay indicate a malfunctioning processor associated with each encryptiondevice or may indicate that incomplete messages are being received bythe encryption device. The fields "CUR/SEC" and "MAX/SEC" indicate therate at which messages are being received by an encryption device."CUR/SEC" indicates the average rate per second of transactions over thelast status interval. "MAX/SEC" indicates the maximum value of "CUR/SEC"over a predefined period and may be used as an indication of overloadingan encryption device or may be used to ensure that the system is evenlyloaded (in a system having a number of encryption devices).

The totals "LAST BACKUP, "TOTALS LAST CLEARED" and "LAST RESTORE" aretime stamps which indicate when each of the functions last took place.For each of the above fields, depressing the F4 function key resets theSuccess, Fail and Format ERROR total fields in the lower right-handcorner of the screen independent of the status interval reset. When theF4 function key is depressed, the display shown in FIG. 54 is displayed.For each of the screen displays, the escape key causes the system torevert to the prior display screen, which was active when the currentdisplay was activated. The status screen under an alarm condition isshown in FIG. 55. In cases when an alarm threshold is exceeded and thevalue of concern returns to a value below threshold, the alarm displayedon the screen is removed when the value of concern drops belowthreshold; however, fields will not automatically be reset while analarm condition exists. The F4 key can be used to reset total during anyalarm condition.

FIG. 56 is a diagram of the master OPTIONS₋₋ MENU displayed to the userwhen the options mode is selected. Using the Options Menu commands, theuser can alter certain aspects of the way the user operates the system.Some of the commands set operating parameters, and the others enhancethe security of the system itself. This menu enables the user to: (1)configure board descriptions, groupings, and modes; (2) set the numberof seconds to elapse before Exclude automatically checks and displaysboard statuses; (3) define how many characters comprise a check digit;(4) establish how many component key parts make one complete key; (5)protect supervisory functions by requiring a password; (6) define thepassword required to access supervisory functions; and (7) preventunauthorized users from exiting Exclude and entering the authorizeduser's operating system. This display is activated from the main menu byselecting options with the cursor control keys.

When selected, the options sub-menu displays each option available tothe user, and the right-hand portion of the display shows the currentlyentered value for each option. The menu option "Ability To Quit" allowsthe user to quit: the application and return to the operating system indisk-based systems and may be deleted in ROM-based systems. The menufunction "Configure" activates another sub-menu discussed further below.The menu function "Status Interval" controls the number of secondsbetween display updates. The menu function "Sample Interval" controlsthe number of hours between updating the total fields for thresholdchecking. The menu function "Threshold Values" controls percentagevalues for activating an alarm. The menu function "Idle Timeout"controls a time, set in minutes, for controlling the amount of time thekeyboard is idle before the system reverts to the main status screen andresetting the user level to level zero. This feature prevents anunattended unit from remaining at a high user level, thus providingaccess to sensitive key information. The menu function "Check DigitLength" controls the number of check digits to verify, thus providingcompatibility with a number of alternate system configurations. The menufunction "Key Parts" controls the number of key segments prompted forduring key entry and can be any value from one to nine. The menufunction "Table Parts" controls the number of parts entered in a Dieboldtable entry sequence. The menu function "New Password" allows the userto specify passwords for each user level. The menu function "PasswordProtect" allows users to override the system password protection schemefor servicing and may be deleted in secure systems.

FIG. 57 is a diagram of the screen displayed to the user when option"Status Interval" is selected. In this mode, a second window isdisplayed for the entry of new Status Interval information. This screendisplay is exemplary of screen displays wherein simple values are beingentered.

FIG. 58 is a diagram of the screen displayed to the user when option"Sample Interval" is selected. As above, in this mode, a second windowis displayed for the entry of new Sample Interval information.

FIG. 59 is a diagram of the screen displayed to the user when option"Threshold Values" is selected. For each of the fields displayed at thislevel, a value between zero and one hundred may be entered by the user.

FIG. 60 is a diagram of the screen displayed to the user when option"New Password" is selected. At this level, the user is prompted to entera user level to specify which password to modify. A user must be loggedon the system at a user level at least as high as the user levelselected in order to modify the user password for that level. In thepreferred practice of the present invention, level four has two distinctpasswords associated with it which will presumably be maintained byseparate individuals. User level four must be activated to change keyinformation. Level one is used for relatively low priority tasks, suchas modifying alarm thresholds and status intervals, etc. Any task of asecurity nature is done at a high user level.

FIG. 61 is a diagram of the screen displayed to the user when option"Configure" is selected. When "Configure" is selected, the first windowdisplayed shows each encryption device available to the system and alsoshows the basic settings for the encryption devices. To select aparticular encryption device, a user enters one through six or mayselect boards under cursor control.

FIG. 62 is a diagram of the screen displayed to the user when option"Configure" is selected at a first level and a particular board isselected at a second level. In this mode, the board identifiers, such asdescription, group, mode: either master, slave or solo, communicationparameters and serial supported functions may be modified by selectingthe appropriate menu selection. FIG. 63 is a diagram of the screendisplayed to the user when option "Configure" is selected at a firstlevel, a particular board is selected at a second level, and"Description" is selected at a third level. In this mode, the user isprompted to enter a string of characters corresponding to the new boarddescription.

FIG. 64 is a diagram of the screen displayed to the user when option"Configure" is selected at a first level, a particular board is selectedat a second level, and "Description" is selected at a third level. Inthis mode, the user is prompted to enter a string of characterscorresponding to the new board description.

FIG. 65 is a diagram of the screen displayed to the user when option"Configure" is selected at a first level, a particular board is selectedat a second level, and "Group" is selected at a third level. In thismode, the user enters a value of between one and six corresponding tothe designated group for the selected board.

FIG. 66 is a diagram of the screen displayed to the user when option"Configure" is selected at a first level, a particular board is selectedat a second level, and "Mode" is selected at a third level. In thismode, a window is displayed which allows the mode of the encryptiondevice to be switched between master, slave, or solo. In addition, anencryption device may be removed from the system by designating thedevice as empty. One feature of the present invention ensures thatencryption devices are logically grouped. For example, slave devicesalways follow master devices, and the mode of a master device cannot bechanged to slave if a slave device is associated with it. In thepreferred practice of the present invention, active windows aresurrounded with a double bar and inactive windows are surrounded by asingle bar. Higher level windows are closed when a lower level window isselected.

FIG. 67 is a diagram of the screen displayed to the user when option"Configure" is selected at a first level, a particular board is selectedat a second level, and "Communication Parameters" is selected at a thirdlevel. The communication parameters displayed correspond to thecommunication parameters used by individual encryption devices forcommunicating with an associated host computer through its associatedserial port. The communication parameters include BAUD₋₋ RATE, PARITY₋₋PARAM, DATA₋₋ BITS, STOP₋₋ BITS, TRANSMIT₋₋ DELAY, Frame Timer andHARDWARE₋₋ FLOW₋₋ CONTROL support. The BAUD₋₋ RATE, PARITY₋₋ PARAM,DATA₋₋ BITS, and STOP₋₋ BITS parameters are well-known communicationparameters. TRANSMIT₋₋ DELAY is the amount of time an encryption devicewaits from the last byte of a request message before responding to therequesting computer. The frame timer is a BAUD₋₋ RATE-dependent valuebetween 1 and 99, which indicates the amount of time allowed between thebeginning and end of a message. HARDWARE₋₋ FLOW₋₋ CONTROL refers toconventional RS-232 hardware handshake controls.

FIG. 68 is a diagram of the screen displayed to the user when option"Configure" is selected at a first level, a particular board is selectedat a second level, "Communication Parameters" is selected at a thirdlevel, and "BAUD₋₋ RATE" is selected at the fourth level. In this mode,an additional window is displayed showing the BAUD₋₋ RATE optionsavailable to the system. A new BAUD₋₋ RATE is selected by entering anumber 1-7 corresponding to a desired BAUD₋₋ RATE or by selecting theBAUD₋₋ RATE with cursor control and depressing the return key.

FIG. 69 is a diagram of the screen displayed to the user when option"Configure" is selected at a first level, a particular board is selectedat a second level, "Communication Parameters" is selected at a thirdlevel, and "PARITY₋₋ PARAM" is selected at the fourth level. In thismode, the PARITY₋₋ PARAM options of none, odd and even are displayed tothe user and a new choice is entered by selecting an option with cursorcontrol or by pressing N,O or E and depressing the return key.

FIG. 70 is a diagram of the screen displayed to the user when option"Configure" is selected at a first level, a particular board is selectedat a second level, "Communication Parameters" is selected at a thirdlevel, and "DATA₋₋ BITS" is selected at the fourth level. In this mode,the options of 7 or 8 DATA₋₋ BITS are displayed to the user and a newsetting is selected in the manner described above.

FIG. 71 is a diagram of the screen displayed to the user when option"Configure" is selected at a first level, a particular board is selectedat a second level, "Communication Parameters" is selected at a thirdlevel, and "Frame Timer" is selected at the fourth level. In this mode,a Frame Timer window is displayed and a new value is entered directly inthis window. The HARDWARE₋₋ FLOW₋₋ CONTROL variable is entered in anidentical manner; however, instead of entering a value, the systemtoggles this function on or off.

FIG. 72 is a diagram of the screen displayed to the user when option"Configure" is selected at a first level, a particular board is selectedat a second level, "Communication Parameters" is selected at a thirdlevel, and "SERIAL₋₋ SUPPORT" is selected at the fourth level. In thismode, all serial support functions supported by the system are displayedto the user, wherein functions are enabled by selecting a particularfunction with the cursor and entering lower case "y" in the appropriatefield. Similarly, a function is disabled by entering lower case "n" inthe appropriate field. Pressing the Enter Key toggles the state of anentry between Y and N. As shown in FIG. 72, all serial functions may beenabled or disabled by entering capital "Y" or "N" without anyindividual serial function selected. As will be discussed in more detailbelow, each of the serial functions shown in FIG. 72 corresponds to afunction controlled by the function select token incorporated in thesignaling protocol of the present invention. Utilizing this feature,individual encryption devices may be programmed to accept only certaincommands supported by the system since the serial port is not inherentlysecure, and it lacks password protection. Therefore, in someenvironments it is desirable to restrict access to critical devicefunctions. Furthermore, in many applications, only certain functions areprovided. Therefore, it is desirable to limit the functions availablethrough the serial port to ensure unauthorized users cannot access orcontrol the encryption device.

FIG. 73 is a diagram of the master screen displayed to the user when"Keys" is selected on the menu bar. The Keys Menu allows the user toinject a Master File Key (MFK) and a Key Encryption Key (KEK) into thesecurity board.. Once injected, the MFK and KEK can never again emergeas clear text. The Keys Menu enables the user to: (1) set which board(or board group) the user loads keys into, (2) generate cryptograms forvarious kinds of keys, (3) securely store keys that the user uses tocommunicate with other businesses, (4) randomly generate Diebold tables,(5) securely store a Diebold table, and (6) randomly generate keyswhether created by the user or by Exclude. At this level, all keyfunctions are displayed with the top line displaying the currentlyactive board group, and the left column displays the "Hot Keys" forselecting each option. Each board group is selected at the top line ofthe display. When performing key functions, boards may be assigned tological encryption device groups such that encryption devices within agroup are modified simultaneously.

FIG. 74 is a diagram of the screen displayed to the user when "Load MFK"is selected at a first level and "ENTER₋₋ KEY Part #1" is displayed at asecond level. In the preferred practice of the present invention, eachkey may be divided into several parts. When ENTER₋₋ KEY part isselected, each key part is requested sequentially. Each key partcomprises a 16-character field. The entry field starts as blank, and an"*" asterisk is displayed for each key position entered. A space isinserted after every four "*"s for ease of viewing. Once the completekey part is entered and the user enters "return", the check digit forthe key part is displayed along with a window requesting key partverification as shown in FIG. 75. The key part check digit is typicallystored in a secure location, such as a vault, and used at a later timefor reviewing stored key data. The check digit may also be used whenentering a key part for the first time wherein a key part is enteredtwice; if identical check digits are returned, the user is assured thatthe key part was correctly entered. Once a key part is accepted, awindow requesting the next key part is displayed and an identicalprocedure is performed until all key parts are entered. When the finalkey part is entered, check digits for the overall key parts aregenerated, and the user is prompted to accept that the key parts arecorrect.

FIG. 76 is a diagram of the screen displayed to the user when "Load MFK"is selected at a first level, all key parts have been selected at asecond level, all key parts have been entered, and the system isrequesting acceptance of the key parts. Once the key part has beenaccepted, the system reverts to the main KEYS₋₋ MENU and an identicalprocedure may be used to load the KEK, PVK, PEK, MAK and DEK, whereineach of these keys comprises a 16-digit number.

FIG. 77 is a diagram of the screen displayed to the user when "GeneratePVK Cryptogram" is selected at a first level. In this mode, a window isdisplayed indicating the cryptogram generated by the system. When a userdepresses any key on the keyboard, another window is displayed,prompting the user to select a type of cryptogram to load, as shown inFIG. 78. At this level, the user can select numerals 1 through 5corresponding to the keys of the KEK, PVK, PEP, MAK and DEK,respectively. This window also contains a field which displays the lastcryptogram generated under the "Generate PVK Cryptogram" option. To loadthis cryptogram into a selected board, the user simply types "L" fromthe keyboard. Once the user has instructed the system to load thecryptogram into the Key Table, the display of FIG. 79 is generated,prompting the user to enter a Key Table index value of between 1 and1,000. The Key Table Index value indicates the location in the Key Tablewhere a particular cryptogram is stored. For example, in the displayshown in FIG. 79, the cryptogram will be entered in slot 231 of the KeyTable. The Key Table Index values are typically configured by theoperator of the system wherein certain numbers or blocks of numbers maybe reserved for certain institutions or certain types of keys. Thus, theKey Table Index could be stored in a separate location and any timecommunications with a particular institution are desired, thisinformation could be sent to the encryption device to access thecryptogram for that institution. In prior systems, the Key Tablemanagement is handled automatically by the host computer system and theuser has no control over the locations in which the Key Table individualcryptograms are stored. The present invention allows the user to definespecific Key Table locations such that when multiple encryption devicesare incorporated in the same unit, the user can ensure that eachencryption device has identical cryptograms. Once a Key Table Indexvalue is entered, the display of FIG. 80 is generated to prompt the userto verify the entered Key Table position value. Once the Key Tableposition value is verified by the user, the display of FIG. 81 isgenerated to indicate that the cryptogram has been loaded into therequested Key Table position of the encryption device.

FIG. 82 is a diagram of the screen displayed when the menu option"RANDOM KEY" is selected by the user. In this mode, the system accessesa designated encryption device which is provided with a random keygenerator. Once the encryption device generates a random key, this valueis returned and displayed to the user. This random key can then be usedas a key part to create any of the cryptograms used in the system.

FIG. 83 is a diagram of the opening screen displayed to the user whenthe Keys Menu option "LOAD₋₋ DIEBOLD₋₋ TABLE" is selected. The Dieboldnumber table is a table of numbers used for encrypting data under theDiebold data encryption scheme. When this menu option is selected, thevalues for the Diebold number table may be entered manually by usingcursor control keys to move between table positions or may be generatedautomatically. To automatically generate a Diebold number table, theuser presses "R" on the keyboard, and the system will automaticallyinsert random numbers in each of the table positions, as shown in FIG.84. When the table editing is complete, the user depresses the "F3"function key, and the screen of FIG. 85 is displayed, which prompts theuser to either accept or cancel the table or return to the edit mode. Inthe preferred practice of the present invention, each encryption deviceis provided with a plurality of table positions wherein alternateDiebold number tables may be stored. Therefore, once the user hasaccepted the table from the display of FIG. 85, the display of FIG. 86is generated to prompt the user to enter a Diebold table positionnumber. The Diebold table may be loaded into any one of ten predefinedtable positions. Since the present invention is designed to communicatewith a variety of encryption schemes, encryption keys and Diebold numbertables are stored in distinct portions of the memory of the encryptiondevice. Once the Diebold table position has been entered and verified bythe user, the display of FIG. 87 is generated, showing the values of theDiebold number table along with a warning field indicating whether anyduplicate values exist within the table.

FIG. 88 is a diagram of the master screen displayed to the user when"Utils" is selected on the menu bar. The first three options under theUtils menu, backup, restore, and erase MFK and KEK from a board, areoptions which would be used in a disk-based system. In ROM-basedsystems, these menu items would not be displayed to the user. The option"Clear Board Statistics" is used whenever a user wishes to reset thestatistics displayed under the status menu. The "Zero A Board" option isused to erase all of the information retained in a particular encryptiondevice and would be typically used if a particular encryption devicewere to be removed from a system and transported to a remote locationfor servicing. The "Install Update" menu option is used to perform fieldupgrades of system software, and may be used in either disk-based orROM-based systems.

Referring now to FIG. 89, when the "Backup" option has been selected,the system generates a window prompting the user to select a board to bebacked up. As above, the individual encryption devices may be selectedby cursor control or by entering the digit in the left-hand column ofthe window corresponding to the individual board description. Thiswindow also displays the group number associated with particularencryption devices and the mode in which each encryption device isoperating. Once a particular encryption device has been selected to backup, the display of FIG. 90 is generated, prompting the user to insert abackup diskette in the associated disk drive unit. In ROM-based systems,the prompt would be changed to place backup ROM in port. Once theappropriate ROM or diskette has been inserted in the system, the userselects "Continue" or "Abort." If the "Continue" option is selected, thesystem will transfer the data from the selected board onto the disketteor other backup device. FIG. 91 is a display generated by the systemwhenever the "Continue" option is selected under "Backup" and theappropriate disk drive unit has not been loaded with a backup diskette.Once the system backup has been performed, the system prompts the userto enter a backup description, as shown in FIG. 92. This backupdescription can be any type of text entry and would typically be usedfor documentation purposes.

FIG. 93 is a diagram of the display generated by the system when the"Restore" option is selected under the "Utils" menu. Under the "Restore"option, data is transferred from either a diskette or a ROM cartridge toupdate the system software. When "Restore" is selected, the systemprompts the user to insert a diskette or ROM in the appropriate device,as shown in FIG. 93. Once the appropriate ROM or diskette has beeninserted in the system, the user proceeds by selecting "Continue" andentering a carriage return. Once "Continue" has been selected, thedisplay of FIG. 94 is generated, prompting the user to select a file torestore. Once a file has been selected by the user, the display of FIG.95 is generated, prompting the user to select a particular encryptiondevice to be restored. Once the particular encryption device has beenrestored, the system returns to the main "Utils" menu. One importantfeature of the present invention incorporates the use of the backup andrestore functions wherein when a new encryption device is added to thesystem, the user simply backs up an existing board and restores theinformation recovered from the existing board to the new encryptiondevice, thereby allowing the new encryption device to become operationalwithout the manual entry of program and key data.

FIG. 96 is a diagram of the display generated when the "Clear BoardStatistics" menu option has been selected by the user under the "Utils"menu. When the "Clear Board Statistics" option has been selected, theuser is prompted to select either "All Statistics", "Errors and Resets",or "Max Message Rate." These individual items may be selected by cursorcontrol or by entering the first letter of each option. Once theappropriate option has been selected and the user enters this optionwith a carriage return, the system returns to the main "Utils" menu.

Referring now to FIG. 97, systems that are provided with a disk drivehave an operating system typically incorporated along with the softwareof the present invention. In these types of systems, the "Quit" optionon the menu bar allows the user to exit the application software of thepresent invention and return to the disk operating system.

The system of the present invention is provided with a plurality ofencryption devices which communicate with a host computer via a serialport and which communicate with a control and display unit via aparallel bus configuration. The operation of the encryption devices isindependent of the control and display unit wherein the control anddisplay unit provides an interface between the user and variousencryption devices, as well as gathering statistics on the operation ofencryption devices and displaying those statistics to the user. FIGS.99-206 are a plurality of flow diagrams which detail the operation ofthe control and display unit of the present invention.

FIG. 99 is a flow diagram of the executive function logic portion of thecontrol and display device of the present invention. Upon systempower-up, the routine of FIG. 99 enters item 9902 to save the name ofthe program for use by the options logic. Under the program structure ofthe present invention, options are not stored as a separate file, butrather, are appended to the executable portion of the software of thepresent invention. Therefore, it is essential to know the location ofthe executable file upon start-up, and this function is provided by item9902. Process control then passes to item 9904 to save the contents ofthe entry screen, refresh the display, and set the video mode for thesystem. Process control then passes to item 9906, which installs thecritical error handling function in the system. The critical errorhandler controls what happens in the system whenever a component in thesystem was addressed but was not present or did not respond. In thisstate, the critical error handler controls which system messages arepassed to the user to indicate this condition. Process control thenpasses to process 9908, INIT, which performs various housekeepingchores, such as initializing the video attributes, initializing the helpfunction, and other functions which will be described in further detailin conjunction with FIG. 99. Once the INIT or initialization routine iscomplete, process control passes to 9910, OPEN₋₋ DEBS, which opens thedate encryption devices so that the system can read and write to thedevices. Once the data encryption devices are open, process controlpasses to process 9912, MAIN₋₋ MENU, which is a routine which controlsthe menus displayed to the user and displays the system for user input.Whenever process 9912 is exited, process control passes to process 9914,CLOSE₋₋ DEBS, which closes the data encryption devices. Once the dataencryption devices are closed, process control passes to process 9916,PUT₋₋ OPTIONS, which stores the options modified during the lastinterval. These options may include the status interval or sampleinterval or any of the variables which are modified by the user. Onceprocess 9916 is complete, process controls passes to item 9918, whichrestores video to the state it was in prior to being modified by thesystem software of the present invention. Once the video has beenrestored by item 9918, process control returns to the operating systemlevel.

Referring now to FIG. 100A, the main menu routine 9912 is shown indetail. The function of the main menu routine is to display user inputs,to update the user interface displays, and to send user-generatedcommands to the appropriate portions of the system. The main menuroutine begins with I/O block 10002, which outputs the main menu to thedisplay. It should be noted that several aspects of the presentinvention are implemented in the "C" computer language, and many of theprocess steps disclosed below are unique to that language. Once the mainmenu has been displayed, process control passes to item 10004, whichsaves the state of the machine in a buffer designated JB₋₋ MAIN₋₋ MENUby setting the value SJ="set jump." This step is necessary to performwhat is known in C programming as a "long jump," which enables processcontrol to go to a specific portion of the program. The SJ variablecorresponds to the value returned by set jump, and the value stored inthe buffer corresponds to the address of the program currently beingexecuted. The long jump feature enables the present process to displayfor entry of so-called "hot keys" wherein pressing a specific functionkey or single alphanumeric key causes the menu to advance to apredefined location. It is therefore desirable that the program controlbe able to interpret each of the hot keys and then return to thatportion of the program that was executing when the hot key was firstdepressed. When executed, item 10004 causes a set jump to return a valuewhich is evaluated in decision 10006. If set jump is not equal to zero,process control passes to item 10008. If set jump is not equal to zero,this point is arrived at as a result of a long jump call wherein setjump contains the desired menu option. Therefore, item 10008 sets thereturn value equal to set jump and highlights the main menu itemcorresponding to the value of set jump. If set jump is equal to zero,process 10010 is selected. If SJ is equal to zero, this state indicatesthat a function key was not depressed since the last cycle and theroutine is continuing through a normal flow and therefore item 10010sets the return value equal to the previously set options values. RV isa local variable used to hold current option values. Once RV has beenupdated by either item 10008 or 10010, decision 10012, in FIG. 100B,determines whether the options structure has changed. If the optionsstructure has changed, process control passes to item 10014 to close thedata encryption devices, to open the data encryption devices, to storethe options to disk, and to copy the option structure into a temporarystorage location designated "temptopt." In ROM-based systems, instead ofcopying the options to disk, the options would be copied to batterybacked-up RAM. Process control then passes to item 10016, which sets thevalue stored in the variable last RV equal to the current RV.

Referring now to FIG. 100C, once item 10016 has set, process controlflows to decision 10018, which tests rv to determine whether itindicates the user has entered the "quit" option. If "quit" was entered,process control passes to item 10020, which prompts the user todetermine whether the "quit" option was properly entered. Decision 10022tests the user response; if the "quit" option is verified, programcontrol passes to item 10024, which closes the main menu and returnsprogram control to the operating system, if an operating system is used.In ROM-based systems, the "quit" option is not offered. If the "quit"option is not verified, process control returns to item 10004. If the"quit" option was not detected by decision 10018, program control passesto decision 10026, which determines whether rv indicates the "status"option has been selected. If the "status" option has been selected,program control passes to the SYSTEM₋₋ STATUS process 10028, whichprocesses the system status request and returns to the main loop at10004. If the "status" option is not indicated in rv program controlpasses to decision 10029, which tests rv to determine whether the"options" option was selected from the menu. If so, program controlpasses to OPTIONS₋₋ MENU process 10030. If rv does not indicate the"options" option, program control passes to decision 10032 to determinewhether the "keys" option has been selected. If so, program controlpasses to keys menu process 10034. If rv does not indicate the "keys"option has been selected, program control passes to decision 10036 todetermine whether the "Utils" option option has been selected, programcontrol returns to decision 10004.

FIG. 101 is a flow diagram of the "INIT" subroutine 9908 called by theroutine of FIG. 99. The "INIT" subroutine performs several basic"housekeeping" tasks, many of which are provided under the DOSenvironment. Whenever "INIT" is activated, process control passes toprocess 10102, which initializes the screen display, sets videoattributes such as EGA, CGA, monochrome, etc., and creates the properwindows for display based on the window library used in accordance withthe present invention. Program control then passes to process 10104,which gets options from disk in a disk-based system. For example,options include key parts, table parts, current check digit length, andactive group. These options are recalled from disk since upon programstartup, rather than requiring the user to reenter the configuration ofthe encryption devices. Program control then passes to process I0106,which initializes the help file and loads the help key word into memory.Program control then passes to I/O step 10108, which displays theFunction key legend at the bottom of the screen, and program controlpasses to item 10110, which copies the options structure to the tempoptstructure in memory. Program control then returns to the routine of FIG.99.

FIG. 102A is a flow diagram of the "OPEN₋₋ DEBS" subroutine called bynumerous subroutines of the present invention. The "OPEN₋₋ DEBS" or opendata encryption device subroutine opens the data encryption devices andenables reading and writing to the devices, as well as maintaining modesettings for individual boards (devices). When invoked, item 10202initializes the board count variable equal to zero and the variable i tozero, which is an index into the board file description structure. Theboard count variable is used as an indicator of the number of currentlyopen data encryption devices. Item 10204 then sets the device filedescription fd indexed by i to -1 to indicate that the device is notopen. Item 10206 then attempts to open the device using a standard "C"routine. If the board open is successful, the device file description isset to the file handle returned from DOS. Program control then passes todecision 10208, which examines the device file description to determinewhether the device was successfully opened. If the device wassuccessfully opened, item 10210 increments the board count. If thedevice was not successfully opened, decision 10212 tests the device todetermine whether the device is configured as empty. If the device isconfigured as empty, decision 10214 tests the device file description todetermine whether it is greater than zero, thus indicating that a deviceis present. If a device is present, item 10216 changes the configurationof the board to solo. Program control then passes to I/O step 10218,which displays the message "Slot # marked empty but containsboard--Board added to list." Program control then flows to decision10238. If a board was not opened and was not configured as empty,decision 10228 tests the board file description to determine whether theboard is configured as a slave. If the board is configured as a slave,item 10230 modifies the file description to be the same as that for theboard preceding it.

If the board was not configured as a slave, decision 10232 determineswhether the board is configured as a master. If the board is configuredas a master or solo, decision 10234 determines whether the filedescription is less than zero. If so, the board is not functioning anditem 10236 marks the board down by setting the down bit of the boardparameters description to remove it from the system. Once item 10236 iscomplete or if decision 10234 determines that the file description isnot less than 1, program control passes to 10238.

Decision 10238 tests the board to determine whether it was properlyopened. If the board was properly opened, decision 10238 passes programcontrol to process 10242 to send a message to the board, to get theversion of software installed on the board, and to send options, such ascommunication parameters, and any other options which need to be sent toa board. Once process 10242 is complete, or if the board was notproperly opened, item 10240 increments variable i to access the nextboard. Decision 10244 then tests variable i to determine whether all theboards in the system have been tested, and program control returns tothe routine of FIG. 99. If all the boards have not been tested, programcontrol returns to the calling routine.

FIG. 103 is a flow diagram of the "CLOSE₋₋ DEBS" subroutine called bynumerous subroutines of the present invention. The "CLOSE₋₋ DEBS" orclose data encryption devices subroutine is a simple loop for closingall open boards in a system. When invoked, item 10302 initializes thevariable i counter to zero. Decision 10304 then determines whether thecurrently selected board or board[i] is open. If the currently selectedboard is open, item 10306 closes the board with the standard "C"function close(). If the currently selected board is not open, item10308 increments the variable i to point to the next board. Decision10310 then tests the variable i to determine whether the value equalsthe maximum number of boards (MAXBOARDS) in the system. If MAXBOARDS hasnot been reached, program control passes to decision 10304. Otherwise,program control returns to the calling routine. The opening of a boardprovides a "handle" for communicating with the device handler of thesystem. Since the configuration of the present invention only allows 20handles to be open at any one time, it is desirable to close anyunneeded devices, providing room for further devices.

FIG. 104A is a flow diagram of the "SYSTEM₋₋ STATUS" subroutine calledby the subroutine of FIG. 100B and is activated from the main menu byselecting status on the menu bar. This subroutine generates and displaysthe SYSTEM₋₋ STATUS screens described in conjunction with FIGS. 55through 56. When invoked, item 10402 sets all screen statistics andvariables to zero. Item 10404 then enables the function key F4 flag andredisplays the FKEY legend on the screen so that the screen onlydisplays the function keys which are valid for this screen. When theFKEY legend has been redisplayed, item 10406 initializes a number ofvariables wherein K is a variable used to retain values of depressedkeys and is set to zero, First is a variable used to indicate whether itis the first time the subroutine completed its loop and is set to 1,OLD₋₋ DET (old detail) is a variable that indicates the previous boarddetail was retained on and is set to -1, and RETRY₋₋ TIME is a timestamp variable that specifies the last time communications wereattempted with a particular board. In the normal operation of thesystem, occasionally a board will not be available to the system. TheRETRY₋₋ TIME value is used to indicate a predetermined interval in whichto reattempt communications with the board which did not respondearlier. STATUS₋₋ TIME is a variable that contains the last time statusinformation was received for a board and is set to zero, and IN₋₋ STATUSis a flag set to 1 to let other portions of the system know that thesystem is currently in the status mode.

Once these variables are initialized, process control passes to process10408, which calls subroutine NEXT₋₋ BOARD, with a parameter of -1, toscan the boards and to find the first open board in the system. Item10410 then opens the status display windows. Once the status windows areopen, item 10412 sets the variable Now equal to the current time of daywith a standard time function so that the current time can be displayedon the status window and time-sensitive functions can be enabled.Process 10414 then calls RESETS₋₋ STATS (statistics) with a parameter ofzero, which sets all statistics to zero if the current time is greaterthan the starting time of the last sample interval plus the sampleinterval. This, in effect, causes the statistics to be reset once everysample interval. If the RESETS₋₋ STATS process 10414 is called with aparameter of one, all statistics are reset unconditionally.

When process 10414 is complete, program control passes to decision10416, which determines whether the status interval has elapsed; and ifso, subroutine 10418 calls STATUS3 to get current statistics and displaythem on the screen. If the status interval has not elapsed, decision10419 determines whether a key has been pressed. If a key has been notbeen pressed, program control loops to item 10412. If a key has beenpressed, I/O step 10421 the value of the key that was pressed. Decision10423 then determines whether the F4 function key was pressed. If the F4function key was pressed, indicating that a user wants to clearstatistics, decision 10424 confirms whether the user wants to clearsample interval statistics. If decision 10424 confirms that the userwants to clear sample interval statistics, item 10426 sets the intervaltime equal to the current time and calls RESET₋₋ STATS with a parameterof to reset all statistics. If the user indicates statistics are not tobe cleared, decision 10424 passes program control to item 10412.

If decision 10423 determines that the F4 function key was not pressed,program control passes to decision 10430, which determines whether theescape key has been pressed. The escape key causes the system to revertto the previous menu when pressed. Therefore, program control passes toitem 10432 to set IN₋₋ STATUS equal to zero, to close the status window,and to copy the option structure to the tempopt structure. Programcontrol then returns.

If decision 10430 determines the escape key was not depressed, programcontrol passes to decision 10434 to determine whether the space bar waspressed. From the status screen, pressing the spacebar freezes thedisplay if the screen is active or reactivates the screen if the screenis frozen. Therefore, if decision 10434 determines the spacebar has beenpressed, program control passes to item 10436 to toggle the Freezevariable and to call the function WRITE₋₋ FREEZE, which is furtherdescribed below. When item 10436 has finished, program control loops toitem 10412. If decision 10434 determines the spacebar was not pressed,program control passes to decision 10438 to determine whether the downarrow has been pressed. If so, program control passes to item 10440 tomove the board cursor to the next board location on the screen and toset STATUS₋₋ TIME equal to zero, and program control loops to 10412. Ifdecision 10438 determines a down arrow was not pressed, program controlpasses to decision 10442 to determine whether an up arrow was pressed.If so, program control passes to item 10444 to move the board cursor tothe previous board location on the screen and to set STATUS₋₋ TIME equalto zero. If decision 10442 determines a up arrow was not pressed,program control loops to item 10412.

When the STATUS3 subroutine 10418 returns, program control passes todecision 10420 to determine whether the retry interval has elapsed. Ifnot, program control passes to decision 10419. If the retry interval haselapsed, program control passes to item 10422, which attempts tocommunicate with any board which has been marked down using the GET₋₋VERSION function. Program control then passes to decision 10419.

FIG. 105 is a flow diagram of the STATUS3 subroutine called by theroutine of FIG. 104B. When invoked, item 10502 copies the current boardstatistics to the last board statistics data structure. Decision 10504then checks the board statistics to determine whether the Freezevariable is set. If Freeze is not set, item 10506 sets OLD₋₋ DETAILequal to DETAIL₋₋ BOARD and sets DETAIL₋₋ BOARD equal to NEXT₋₋ ACTIVEBOARD.

When item 10506 is complete or if decision 10504 determines that Freezeis set, item 10508 converts the value of Now to an ASCII string anddisplays the time at the top of the screen. The Now variable iscontinually updated by the SYSTEM₋₋ STATUS subroutine. Process controlthen passes to the DISPLAY₋₋ STATS subroutine 10510, which is furtherdiscussed below. Program control then returns.

FIG. 106 is a flow diagram of the WRITE₋₋ FREEZE subroutine called initem 10436. When the WRITE₋₋ FREEZE subroutine is invoked, decision10602 checks to determine whether the alarm status is set. If the alarmstatus is set, the subroutine returns immediately because Freeze iseffected under an alarm condition. If the alarm status is not set,decision 10604 determines whether Freeze is set. If Freeze is not set,I/O step 10610 clears the freeze window. Program control then returns tothe calling routine. If Freeze is set, item 10606 formats the freezemessage in a temporary buffer, I/O step 10608 displays the freezemessage in the freeze window, and program control returns to the callingroutine.

FIG. 107 is a flow diagram of the NEXT₋₋ BOARD subroutine. The NEXT₋₋BOARD subroutine determines the next board to scroll, eitherautomatically or under cursor control. When invoked, item 10702 setsvariable i equal to zero. Program control then passes to item 10704,which sets Cur equal to Cur+1, unless current already contains thenumber of maximum boards in the system, in which case Cur is set tozero. Decision 10706 then determines whether variable i is equal toMAXBOARDS. If variable i is equal to MAXBOARDS, program control returnswith -1 to indicate there is no next board. Otherwise, item 10708 isselected to increment variable i. Decision 10710 then determines whetherthe current board is empty. If so, program control loops to item 10704.If not, program control loops to decision 10712 to determine whether thecurrent board is open. If not, program control loops to item 10704. Ifdecision 10714 determines that the current board is open, programcontrol passes to decision 10714 to determine whether the current boardis down. If so, program control loops to item 10704. If not, thesubroutine returns the variable Cur, which shows the next board which isopen and marked up.

FIG. 108 is a flow diagram of the PREV₋₋ BOARD subroutine called by thesubroutine of FIG. 104A, as well as other subroutines of the presentinvention. The PREV₋₋ BOARD subroutine determines the previous board toscroll to, either automatically or under cursor control. When invoked,item 10802 initializes variable i equal to zero. Program control thenpasses to item 10804, which sets the value in Cur equal to the Cur-1,unless current already contains zero, in which case current is set toMAXBOARDS minus one. Decision 10806 then determines whether variable iis equal to MAXBOARDS. If variable i is equal to MAXBOARDS, programcontrol returns with a -1 to indicate there is no previous board.Otherwise, item 10808 is selected to increment variable i. Decision10810 then determines whether the current board is empty. If so, programcontrol loops to item 10804. If not, program control passes to decision10812 to determine whether the current board is open. If not, programcontrol loops to item 10804. If decision 10812 determines the currentboard is open, program control passes to decision 10814 to determinewhether the current board is down. If so, program control loops to item10804. If not, the subroutine returns the variable Cur, which shows theprevious board which is open and marked up.

FIG. 109A is a flow diagram of the DISPLAY₋₋ STAT or display statisticssubroutine called by the subroutine of FIG. 105. When invoked, I/O step10902 displays board status headings. Item 10904 sets ALARM₋₋ STATUSequal to zero and variable i equal to zero. Program control then passesto process 10906 to get the statistics for the board [i]. When complete,item 10908 adds the board statistics to the current sample intervalstatistics being accumulated by adding the difference between thecurrent sample and the previous sample. Program control then passes todecision 10910, which In determines whether board[i] is marked down. Ifnot, item 10912 formats board[i] summary line in a temporary buffer. Ifboard[i] is marked down, item 10914 formats an abbreviated status linefor board[i] in a temporary buffer. After either item 10912 or 10914 iscomplete, decision 10915 determines whether board is equal to thevariable Detail₋₋ Board. If so, decision 10916 determines whether FreezeBit is set. If so, item 10918 sets the video attribute equal to Sts₋₋Fdata₋₋ Video, which is a value which indicates a particular videoattribute such as color to highlight the cursor line wherein each cursorline may be one of several colors in a color system and the currentlyselected board is highlighted in a different color than the remaininglines. If Freeze is set, then board[i] is highlighted in yet anothercolor. Normally, the system checks currently selected boards todetermine whether they are frozen or highlighted. For other boards, thesystem displays a third color. The cursor lines are then displayed basedon the assigned video values. Therefore, if decision 10915 determinesthe current board[i] is not a detail board item 10922 sets the videovariable equal to sts₋₋ data₋₋ video. If decision 10916 determines thefreeze bit is not set, item 10920 sets the video variable equal to sts₋₋hdata₋₋ video. Once the video variable is set, I/O step 10924 displaysthe contents of the temporary buffer with video attributes indicated bythe video variable.

Referring now to FIG. 109C, once I/O step 10924 displays the contents ofthe temporary buffer, program control passes to decision 10926 todetermine whether board[i] is currently marked down. If so, item 10928increments Alarm Status and sets the video attributes to red, bold andblinking in color systems. In monochrome systems, the video attributemay be set to bold and blinking. I/O step 10930 displays the boardstatus, i.e., solo, slave, etc., using the new video attributes.

If decision 10926 determines board[i] is not currently marked down,program control passes to process 10932 to check the alarm status anddraw the alarm display, if necessary. When process 10932 is complete,program control passes to decision 10934 to determine whether Detail₋₋Board variable is equal to If so, decision 10936 determines whether thevariable Old₋₋ Detail₋₋ Board also equals -1, which indicates there areno boards in the system. If decision 10936 determines variable Old₋₋Detail₋₋ Board also equals -1, I/O step 10940 displays the message, "NoBoards Operational". If decision 10936 determines Old₋₋ Detail₋₋ Boarddid not equal -1, I/O step 10938 clears the status detail window and I/Ostep 10940 displays the message "No Boards Operational". When I/O step10940 is complete, process control returns to process 10510.

Referring now to FIG. 109D, if decision 10934 determines Det₋₋ Boarddoes not equal -1, program control passes to decision 10942 to determinewhether the variable Old₋₋ Det₋₋ Board equals Det₋₋ Board. If not, I/Ostep 10944 displays the detail statistics window header. When I/O step10944 is complete, or if decision 10942 indicates that Old₋₋ Det₋₋ Boarddoes not equal Det₋₋ Board, program control passes to I/O step 10946 todisplay the detail window data headings. I/O step 10948 then displaysthe statistics for board[Det₋₋ Board]. I/O step 10950 then displays thelast backup, restore, and clear board times. When I/O step 10950 iscomplete, program control then passes to draw alarm process 10952, whichis identical to draw alarm process 10932. Program control then passes toprocess 10510.

FIG. 110 is a flow diagram of the "DRAWALARM" subroutine called by thesubroutine of FIG. 109B and FIG. 109C. When invoked, decision 11002determines whether Alarm₋₋ Status equals Last₋₋ Alarm₋₋ Status, whichindicates that nothing has changed since the last alarm cycle. If so,the subroutine immediately returns to the calling subroutine. If Alarm₋₋Status does not equal Last₋₋ Alarm₋₋ Bit, program control passes todecision 11004 to determine whether Alarm₋₋ Status is not equal to zero.If not, the WRITE₋₋ FREEZE process 11006 is invoked. WRITE₋₋ FREEZEprocess 11006 is identical to WRITE₋₋ FREEZE process 10436. If theAlarm₋₋ Status is equal to zero, I/O step 11008 is invoked to clear theFreeze window. Program control then passes to I/O step 11010 to displaythe alarm banner on the screen in blinking red video. Item 11012 thensets Last₋₋ Alarm equal to Alarm₋₋ Status. Program control then passesto the calling subroutine.

FIG. 111 is a flow diagram of the "GETVER" subroutine called by severalsubroutines of the present invention. The "GETVER" subroutine gets thecurrent software version number of the various boards with the presentinvention wherein this version number is displayed in the SYSTEM₋₋STATUS window. When invoked, item 1102 formats an echo message andstores the message in a temporary variable buffer. Item 11104 then marksthe board up. If the message fails, the critical error handler will markthe board down. Process 11106 then sends an echo message to the board bycalling WRITE₋₋ DEB while passing the parameters Board, Buf, andStrlen(Buf) wherein Board is the board messages are sent to, Buf is apointer to the buffer to write out to, and Strlen(Buf) is a functionthat returns the number of bytes to be written out. Program control thenpasses to process 11108, which calls the process prodeb, which writesthe result in variable rc. Program control then passes to decision11110, which determines whether the variable rc is equal to zero. If so,program control returns to the calling subroutine. If the variable rc isnot equal to zero, program control passes to process 1112 to look forthe BC-token in the response. This is done with the subroutine FIND₋₋TOKEN, which returns the token that was found, along with a pointerwhich points to the position where data starts, and is described infurther detail below. The format of messages incorporating the BC-tokenis shown in the Appendix. Program control then passes to decision 11114to determine whether the BC-token was found. If so, item 1118 copies thedata associated with the BC-token to the Board₋₋ Version variable. Whencomplete, program controls returns to the subroutine which calledGETVER. If decision 11114 determines that the BC-token is not present,item 11116 copies "???" to the Board-Version variable to indicate theBC-token is not present and program control passes to the subroutinewhich called GETVER.

FIG. 112A is a flow diagram of the OPTIONS₋₋ MENU subroutine called bythe subroutine of FIG. 100B. The OPTIONS MENU subroutine controls thesystem display when options is selected from the main menu Thissubroutine allows a user to scroll through the OPTIONS₋₋ MENU andreturns the value of the menu item when one is selected. When invoked,I/O step 11202 displays the options available under the OPTIONS₋₋ MENU.I/O step 11204 then displays the current setting of options in the menu.Program control then passes to process 11206 to get the next menu itemand set rv equal to the next menu item selected. Program control thenpasses to decision 11208, which tests rv to determine whether itcontains the value 99, which corresponds to the escape key. If so,program control passes to I/O step 11210 to close the OPTIONS₋₋ MENU.Program control then returns to the subroutine of FIG. 100B. If decision11208 determines that the escape key was not pressed, program controlpasses to decision 11212 to determine whether the rv equals 1. If so,program control passes to the configure menu process 11214. If decision11212 determines that rv does not equal 1, decision 11216 determineswhether the rv equals 2. If rv equals 2, program control passes toprocess 11218 to set the status interval. If rv does not equal 2,program control passes to decision 11220 to determine whether rv equals3. If so, program control passes to process 11222 to set the sampleinterval. When processes 11214, 11218 or 11222 are complete programcontrol passes to I/O step 11204. If decision 11220 determines that rvdoes not equal 3, program control passes to decision 11224 to determinewhether rv equals 4. If so, program control passes to process 11226 toset threshold limits. If decision 11224 determines that rv does notequal 4, program control passes to decision 11228 which determineswhether rv equals 5. If rv equals 5, program control passes to process11230 to SET₋₋ IDLE₋₋ TIMEOUT. If decision 11228 determines that rv doesnot equal 5, program control passes to decision 11232 to determinewhether rv equals 6. If so, program control passes to process 11234 toSET₋₋ CHECK₋₋ DIGIT₋₋ LENGTH. If decision 11232 determines that rv doesnot equal 6, program control passes to decision 11236 which determineswhether rv equals 7. If so, program control passes to process 11238 toset the number of key parts. At the completion of processes 11226,11230, 11234, and 11238, program control returns to I/O step 11204. Ifdecision 11236 determines that rv does not equal 7, program controlpasses to decision 11240 which determines whether rv equals 8. If so,program control passes to process 11242 to set the number of Dieboldtable parts. If decision 11240 determines that rv does not equal 8,program control passes to decision 11244, which determines whether rvequals 9. If so, program control passes to process 11246 to togglepassword protection. If decision 11244 determines that rv does not equal9, program control passes to decision 11248, which determines whether rvequals 10. If so, program control passes to process 11250 to changepasswords. If decision 11248 determines that rv does not equal 10,program control passes to decision 11252, which determines whether rvequals 11. If so, program control passes to process 11254 to toggleability to quit. At the completion of processes 11242, 11246, 11250, or11254, or if decision 11248 determines that rv does not equal 10,program control returns to I/O step 11204.

FIG. 113 is a flow diagram of the SET₋₋ STATUS INTERVAL subroutinecalled by the subroutine of FIG. 112A. In some system configurations,where the status interval option may be deleted, the SET₋₋ STATUS₋₋INTERVAL subroutine is not required. When invoked, process 11302 setsvariable i equal to the value returned by function GET₋₋ VALUE. FunctionGET₋₋ VALUE displays a prompt supplied by the calling routine to theuser and returns the entered value. Program control then passes todecision 11304, which determines whether all boards are marked down bychecking whether the Board₋₋ Count variable from the OPEN₋₋ DEBSsubroutine is greater than zero. If decision 11304 is yes, then item11306 sets sts₋₋ interval=1 and returns to the subroutine that invokedset₋₋ status₋₋ interval. If not, decision 11308 determines whethervariable i times Board₋₋ Count is greater than the minimum cycleinterval. If it is, item 11306 sets Status₋₋ Interval equal to variablei and program control returns to the subroutine which called SET₋₋STATUS INTERVAL. If decision 11308 determines that variable i timesBoard₋₋ Count is not greater than the minimum cycle interval, item 11310sets variable i equal to the minimum cycle interval divided by Board₋₋Count. Process control then passes to decision 11312 to determinewhether variable i times Board₋₋ Count is less than the minimum cycleinterval. If so, item 11314 increments variable i. When item 11314 iscomplete or when decision 11312 determines that variable i times Board₋₋Count is not less than the minimum cycle interval, program controlpasses to I/O step 11316, which displays the message "The statusinterval must be at least (i) seconds." Program control then returns tothe subroutine which invoked SET₋₋ STATUS₋₋ INTERVAL.

FIG. 114 is a flow diagram of the SET₋₋ SAMPLE₋₋ INTERVAL"" subroutinecalled by the subroutine of FIG. 112A. When invoked, process 11402 setsSample₋₋ Interval equal to the value returned by function GET₋₋ VALUE.Program control then returns to the subroutine which called SET₋₋SAMPLE₋₋ INTERVAL.

FIG. 115 is a flow diagram of the SET₋₋ THRESHOLDS subroutine. Wheninvoked, process 11502 opens the threshold windows and process 11504displays the threshold titles on the window. Item 11506 then formats thethreshold items based on the current threshold settings. When complete,process 11508 sets rv equal to the value returned by function GET₋₋MENU₋₋ OPTION to check the value of the menu option entered by the user.When process 11508 is complete, decision 11510 determines whether rvequals 1. If rv equals 1, program control passes to process 11512 to setthe baud rate. If rv does not equal 1, program control passes todecision 11514. If rv equals 2, program control passes to process 11516to set Minimum₋₋ Pin₋₋ Ok equal to the value returned by GET₋₋ VALUE. Ifrv does not equal 2, program control passes to decision 11518 todetermine whether rv equals 3. If so, program control passes to process11520 to set Maximum₋₋ Pin₋₋ Fail equal to the value returned by GET₋₋VALUE. If rv does not equal 3, program control passes to decision 11522to determine whether rv equals 99 or escape. If so, program controlpasses to process 11524 to close the threshold window and return programcontrol to the subroutine which called the SET₋₋ THRESHOLDS subroutine.If not, program control loops to 11506.

FIG. 116 is a flow diagram of the SET₋₋ IDLE₋₋ TIMEOUT subroutine calledby the subroutine of FIG. 112A. When invoked, item 11602 sets thevariable

i equal to the value returned by the function GET₋₋ VALUE. Programcontrol then passes to decision 11604 to determine whether the valuevariable i is greater than zero. If so, item 11606 sets Idle₋₋ Timeoutequal to variable i. If Idle₋₋ Timeout is not set equal to variable i orif decision 11604 determines that variable i is not greater than zero,program control returns to the calling subroutine.

FIG. 117 is a flow diagram of the SET₋₋ CHECK₋₋ DIGIT₋₋ LENGTHsubroutine called subroutine of FIG. 112A. This subroutine inputs acheck digit length from the user and displays a message if not in therange of 4 through 8. When invoked 11702 sets variable i equal to thevalue returned by function GET₋₋ VALUE. Program control then passes todecision 11704 to determine whether variable i is equal to or greaterthan 4. If so, program control passes to decision 11706 to determinewhether variable i is less than or equal to 8. If so, item 11708 setsCheck₋₋ Digit₋₋ Length equal to variable i. If decision 11704 determinesthat variable i is not greater than or equal to 4 or if decision 11706determines that variable i is not less than or equal to 8, programcontrol passes to I/O step 11710 to display the message "Invalid checkdigit length specified." Once I/O step 11710 or item 11718 are complete,process control returns to the subroutine which called the callingsubroutine.

FIG. 118 is a flow diagram of the SET₋₋ KEY₋₋ PARTS subroutine. Thissubroutine inputs key parts from the user and displays a message if notin the range of zero through 10. When invoked, item 11802 sets variablei equal to the value returned by function GET₋₋ VALUE. Program controlthen passes to decision 11804 to determine whether variable i is equalto or greater than 10. If so, program control passes to decision 11806to determine whether variable i is less than or equal to 10. If so, item11808 sets Key Parts equal to variable i. If decision 11804 determinesthat variable i is not greater than or equal to zero or if decision11808 determines that variable i is not less than 10, program controlpasses to I/O step 11810 to display the message "Invalid Key PartsSpecified." Once I/O step or item 11808 are complete, process controlreturns to the calling subroutine.

FIG. 119 is a flow diagram of the SET₋₋ TABLE PARTS subroutine called bythe subroutine of FIG. 112A. This subroutine inputs the table partsnumber from the user and displays a message if not not in the range of 1through 9. When invoked, item 11902 sets the variable i equal to thevalue returned by function GET₋₋ VALUE. Program control then passes todecision 11904 to determine whether variable i is greater than zero. Ifso, program control passes to decision 11906 to determine whethervariable i is less than 10. If so, item 11908 sets Table₋₋ Parts equalto variable i. If decision 11904 determines that variable i is notgreater than zero or if decision 11906 determines that variable i is notless than 10, program control passes to I/O step 11910 to display themessage "Invalid Table parts # specified." Once I/O step 11910 or item11908 are complete, process control returns to the calling subroutine.

FIG. 120 is a flow diagram of the ENABLE₋₋ PASSWORDS subroutine calledby the subroutine of FIG. 112C. When invoked, item 12002 toggles thepassword protection by performing an Exclusive-Or on the passwordprotection bit. Program control then returns to the calling subroutine.

FIG. 121 is a flow diagram of the SET₋₋ PASSWORDS subroutine called bythe subroutine of FIG. 112A. When invoked, process 12102 sets thevariable level equal to the value returned by the GET₋₋ LEVELsubroutine. Decision 12104 then determines whether the Level is greaterthan zero. If so, program control passes to the change passwordsubroutine 12106, which is passed the variable Level as a parameter. Ifdecision 12104 determines that Level is not greater than zero or whenprocess 12106 completes, program control returns to the callingsubroutine. The CHANGE₋₋ PASSWORD subroutine and the GET₋₋ LEVELsubroutine are discussed in more detail below.

FIG. 122 is a flow diagram of the GET₋₋ LEVEL subroutine called by thesubroutine of FIG. 122. When invoked, process 12202 opens the user levelscreen display. Process 12204 then titles the window and process 12206sets the variable rv equal to the value returned by GET₋₋ MENU₋₋ OPTION.Decision 12208 then sets rv is less than 1. If so, item 12210 sets rvequal to zero. If not, decision 12212 determines whether rv is greaterthan the maximum number of user levels (which is four in the preferredpractice of the present invention). If so, item 12214 sets rv equal tozero. Once items 12210 or 12214 have set rv equal to zero, or ifdecision 12212 determines that rv is not greater than the maximum numberof user values, program control passes to subroutine 12216 to close theuser levels window. The subroutine then returns rv (which now containsthe current user level) to the subroutine of FIG. 121.

FIGS. 123A and 123B are a flow diagram of the GET₋₋ PASSWORD subroutinecalled by the subroutine of FIG. 121. This subroutine is passed the userlevel variable returned by the subroutine of FIG. 122. When invoked,subroutine 12302 sets the variable Password1 equal to the text returnedby the GET₋₋ TEXT subroutine The GET₋₋ TEXT subroutine prompts the userto enter a text string corresponding to the new password and stores thistext in a string buffer. Decision 12304 then determines whether thelength of Password1 is greater than zero. If not, the subroutineimmediately returns to the subroutine of FIG. 121. If so, decision 12306determines whether the length of Password1 is less than 8 characters. Ifso, item 12308 forms a loop with decision 12306 to concatenate spacesonto the end of Password1 until it equals 8 characters in length. OncePassword1 equals 8 characters, program control passes to subroutine12310, which sets the variable Password2 equal to the text valuereturned by the GET₋₋ TEXT subroutine. Decision 12312 then determineswhether the length of Password2 is greater than 0 characters. If not,the subroutine immediately returns to the subroutine of FIG. 121. If so,decision 12314 determines whether the length of Password1 is less than 8characters. If so, item 12316 forms a loop with decision 12314 toconcatenate spaces on to the end of Password2 until it equals 8characters in length. Once Password2 equals 8 characters, programcontrol passes to decision 12318 to determine whether Password1 equalsPassword2. This is done because, in the practice of the presentinvention, the user must correctly enter his password twice. IfPassword1 is not the same as Password2, I/O block 12320 displays themessage "Password must be entered the same both times" and loops tosubroutine 12302. If the password was correctly entered both times,subroutine 12322 encrypts the password for this level using a predefinedencryption algorithm. Passwords are stored in the system in an encryptedform to prevent an adversary from discovering the password andcompromising the system. The encrypted password is then stored andprogram control returns to the subroutine of FIG. 121.

FIG. 124A is a flow diagram of the PUT₋₋ OPTIONS subroutine, whichstores the options on disk when the OPTIONS₋₋ MENU is exited. In somesystem configurations, a disk is not included with the system, and thesystem software is stored in nonvolatile memory. In these systems, theoptions may be stored in an EEPROM or battery backed-up RAM. Indisk-based systems, the options are appended at the end of theexecutable file which contains the system software followed by achecksum variable. A normal DOS executable file has a checksum loaded inthe file which the executable loader verifies. Since the options areappended to the executable file, the normal executable file checksumwould be altered. Therefore, the present invention generates a negativechecksum to cancel the effect of the options file on the checksum of thefile. This file structure is shown in FIG. 124B. When invoked, item12402 sets the Checksum variable equal to zero. Item 12404 then sets aninteger pointer p to the address of the beginning of the optionsstructure. Item 12406 sets variable i equal to the value equal toone-half the size of the options structure to determine the number ofinteger values in the options structure wherein integer values are 2bytes long. The loop formed by item 12408, item 12410, and decision12412 then sets Checksum equal to the value of Checksum minus the valueof the item pointed by pointer p for all integers in the optionsstructure. In other words, whatever pointer p points to is subtractedfrom Checksum. Once variable i has been decremented to zero, decision12414 determines whether the checksum in the options structure is equalto the newly generated Checksum. If so, program control returns to themenu control subroutine. If not, item 12416 sets the options checksumequal to the newly generated checksum. I/O block 12418 then opens theoptions file on disk and I/O block 12420 seeks backwards from the end ofthe file by the length of the options segment and I/O block 12422 writesthe options file to disk. I/O block 12424 then closes the options fileand program control returns to the calling routine.

FIG. 125 is a flow diagram of the GET₋₋ OPTIONS subroutine which iscalled whenever a system backup is performed, whenever the system isfirst initialized, or whenever called by the main menu subroutine. Wheninvoked, I/O blocked 12502 opens the options file and decision 12504determines whether the options file was opened successfully. If not, I/Oblock 12506 displays the message "Error opening options" and thesubroutine returns. If the options file was opened successfully, I/Oblock 12508 reads the options segment by seeking from the end of file bythe size of the options structure. The first part contains an identifierwhich indicates the option structure is present. Decision 12510 teststhe option file to locate the identifier. If the identifier is notfound, I/O block 12512 displays the message "Options missing" and thesubroutine returns. If the identifier is found, decision 12514determines whether the identifier is correct. If not, I/O block 12516displays the message "Options version invalid" and the subroutinereturns. If the options file identifier is correct, I/O block 12518closes the options file and the subroutine returns. The PUT₋₋ OPTIONSand GET.sub. -- OPTIONS subroutines both assume the options structure isalready present on disk. The options structure is initially created by aseparate utility used when configurating a new system.

FIG. 126 is a flow diagram of the CONFIGURE₋₋ MENU subroutine called bythe subroutine of FIG. 112A. When invoked, item 12602 opens theconfigure window and I/O block 12604 writes the configure menu headinginto the window. Item 12606 then sets the variable i equal to zero. Theloop formed by items 12608 and 12610 and decision 12612 then formats themenu option with the particular information associated with each boardand displays each boards respective information until variable i equalsthe maximum number of boards in the system. When each board in thesystem has been formatted, subroutine 12614 sets the variable rv equalto the value returned by subroutine GET₋₋ MENU₋₋ OPTION. Decision 12616determines whether rv equals 99 or escape. If not, the CONFIGURE₋₋ BOARDsubroutine 12618 is invoked to configure the selected board. TheConfigure Board subroutine is passed the value of rv. If rv equals 99,subroutine 12620 closes the options window. CLOSE₋₋ DEBS subroutine12622 is then called to save new configuration data and OPEN₋₋ DEBSsubroutine 12624 reopens the boards for later access. If the result ofdecision 12616 is negative, subroutine 16226 CONFIG₋₋ BOARD is calledpassing it the value in rv, which is the number of the board toconfigure. The CONFIGURE₋₋ MENU subroutine then returns.

FIG. 127 is a flow diagram of the CONFIGURE₋₋ BOARD subroutine called bythe subroutine of FIG. 126. The CONFIGURE BOARD subroutine is passed thevariable bd which indicates board number by the subroutine of FIG. 125.When invoked, subroutine 12702 opens the configure board menu and I/Oblock 12704 displays the window title. Item 12706 then formats thewindow items for the selected board and subroutine 12708 sets thevariable rv equal to the value returned by the GET₋₋ MENU₋₋ OPTIONsubroutine. Decision 12710 determines whether rv equals one. If so,program control exits to subroutine A. If not, decision 12714 determineswhether rv is equal to 2. If so, program control exits to subroutine B.If not, decision 12718 determines whether rv is equal to 3. If so,program control exits to subroutine C. If not, decision 12722 determineswhether rv is equal to 4. If so, program control exits to subroutine D.If not, decision 12726 determines whether rv is equal to 5. If so,program control exits to subroutine E. If not, decision 12730 determineswhether rv is equal to 99. If so, program control program control passesto subroutine 12732 to close the menu window and the subroutine returns.If not, or when subroutines A, B, C, D or E return, program controlloops to item 12706 to format the display window.

FIG. 128 is a flow diagram of subroutine A called by the subroutine ofFIG. 127. This subroutine is invoked to modify the board description.When invoked, decision 12802 determines whether the user mode is greaterthan or equal to 2. If not, the subroutine returns because a user with auser level lower than 2 cannot change the board description. If the usermode is greater than or equal to 2, item 12804 gets the descriptionstring entered by the user using the GET₋₋ TEXT subroutine describedabove. Item 12806 then pads the board description to 20 characters usingspaces and the subroutine returns.

FIG. 129 is a flow diagram of subroutine B called by the subroutine ofFIG. 127. This subroutine is invoked to modify the board group. Wheninvoked, decision 12902 determines whether the user mode is greater thanor equal to 2. If not, the subroutine returns because a user with a userlevel lower than 2 cannot change the board group. If the user mode isgreater than or equal to 2, item 12904 gets the board group entered bythe user using the GET₋₋ TEXT subroutine described above. Decision 12906determines whether the group value is greater than zero and less than 9.The upper limit of board groups is limited by the number of boardssupported by the system, and this number may increase if additionalboards are added to the system. If a valid board group value was notentered, I/O block 12908 displays the message "Invalid Board GroupSpecified" and the subroutine returns. If a valid board group wasentered, item 12910 stores the new value in the board options file andthe subroutine returns.

FIG. 130 is a flow diagram of subroutine C called by the subroutine ofFIG. 127. This subroutine is invoked to modify the board mode. Wheninvoked, decision 13002 determines whether the user mode is greater thanor equal to 2. If not, the subroutine returns because a user with a userlevel lower than 2 cannot change the board mode. If the user level isgreater than or equal to 2, subroutine 13004 sets the variable i equalto board mode. The present invention includes a means of ensuring thatboard modes are correctly entered. For example, a slave board cannot beconnected to another slave board. Furthermore, every slave board musthave a master. Decision 13006 determines whether variable i indicatesthe selected board is configured as a slave and the board number equals1 or if the selected board is configured as a slave and the previousboard is not configured as a master. If so, I/O block 13008 displays themessage "SLAVE Boards must be preceded by a MASTER board." If the resultof decision 13006 is negative, decision 13010 determines whether theselected board is configured as a master and the board number equals themaximum number of boards in the system. If so, I/O block 13012 displaysthe message "Last board should not be configured as MASTER." If theresult of decision 13010 is negative, decision 13014 determines whetherthe selected board is configured as a master and the board number isless than the maximum number of boards in the system and theconfiguration mode for the next board (bd+1) indicates slave. If so, I/Oblock 13016 displays the message "MASTER board must precede a SLAVEboard." If the result of decision 13014 is negative, decision 13018determines whether rv equals 99 or escape. If so, the subroutinereturns. If not, item 13020 sets the configuration mode for the selectedboard equal to the value indicated by variable i.

FIG. 131 is a flow diagram of subroutine D called by the subroutine ofFIG. 127. When invoked, subroutine 13102 updates the communicationparameters for the board indicated by the variable bd. Subroutine 13102then returns.

FIG. 132 is a flow diagram of subroutine E called by the subroutine ofFIG. 127. When invoked, subroutine 13202 updates the SERIAL₋₋ SUPPORTparameters for the board indicated by the variable bd. Subroutine 13202then returns.

FIG. 133 is a flow diagram of the COMMUNICATION₋₋ PARAMETERS subroutinecalled by the subroutine of FIG. 131. When invoked, subroutine 13302opens the COMMUNICATION₋₋ PARAMETERS Item 13304 then formats the menuitems for the board indicated by the variable bd. Subroutine 13306 thensets rv equal to the value returned by the GET₋₋ MENU₋₋ ITEM subroutine.Decision 13308 then determines whether rv is equal to 99 or escape. Ifso, subroutine 13310 closes the menu window and the subroutine returns.If the result of decision 13308 is negative, decision 13312 determineswhether rv is equal to 1. If so, program control passes to BAUD RATEsubroutine 13314. If not, decision 13316 determines whether rv is equalto 2. If so, program control passes to PARITY₋₋ PARAMETER subroutine13318. If not, decision 13320 determines whether rv is equal to 3. Ifso, program control passes to DATA₋₋ BITS subroutine 13322 If notdecision 13324 determines whether rv is equal to 4. If so, programcontrol passes to STOP₋₋ BITS subroutine 13328. If not decision 13330determines whether rv is equal to 5. If so, program control passes toTRANSMIT₋₋ DELAY subroutine 13332. If not, decision 13334 determineswhether rv is equal to 6. If so, program control passes to FRAME₋₋ TIMERsubroutine 13336. If not, decision 13338 determines whether rv is equalto 7. If so, program control passes to HARDWARE₋₋ FLOW₋₋ CONTROLsubroutine 13340. If not, the subroutine returns. When subroutines13314, 13318, 13322, 13326, 13332, 13336, or 13340 return, programcontrol returns to subroutine 13306.

FIG. 134 is a flow diagram of the BAUD₋₋ RATE subroutine, which iscalled to update the BAUD₋₋ RATE communication parameters. When invoked,subroutine 10 13402 opens the BAUD₋₋ RATE window. Subroutine 13404 setsthe variable rv equal to the value returned by the GET₋₋ MENU₋₋ OPTIONsubroutine. Subroutine 13406 then closes the BAUD₋₋ RATE window and thesubroutine returns the variable rv.

FIG. 135A is a flow diagram of the PARITY₋₋ PARAMETER subroutine, whichis called to update the parity communications parameters. When invoked,subroutine 13502 opens the PARITY₋₋ PARAMETER window. Subroutine 13504then sets the variable rv equal the value returned by the GET₋₋ MENU₋₋OPTION subroutine. Subroutine 13506 then closes the PARITY₋₋ PARAMETERwindow and the subroutine returns the variable rv.

FIG. 135B is a flow diagram of the DATA₋₋ BITS subroutine, which iscalled to update the DATA₋₋ BITS communications parameters. Wheninvoked, subroutine 13508 opens the DATA₋₋ BITS window. Subroutine 13510then sets the variable rv equal the value returned by the GET₋₋ MENU₋₋OPTION subroutine. Subroutine 13512 then closes the PARITY₋₋ PARAMETERwindow and the subroutine returns the variable rv.

FIG. 136 is a flow diagram of the STOP₋₋ BITS subroutine, which iscalled to update the STOP₋₋ BITS communications parameters. Wheninvoked, subroutine 13602 opens the STOP₋₋ BITS window. Subroutine 13604then sets the variable rv equal to the value returned by the GET₋₋MENU₋₋ OPTION subroutine. Subroutine 13606 then closes the STOP₋₋ BITSwindow and the subroutine returns the variable rv.

FIG. 137 is a flow diagram of the TRANSMIT₋₋ DELAY subroutine 13322which is called to update the TRANSMIT₋₋ DELAY communications parameter.When invoked subroutine 13702 opens the STOP₋₋ BITS window. Subroutine13704 then sets the variable rv equal to the value returned by the GetMenu Option subroutine. Subroutine 13706 then closes the TRANSMIT₋₋DELAY window and the subroutine returns the variable rv.

FIG. 138 is a flow diagram of the FRAME₋₋ TIMER subroutine, which iscalled to update the frame timer communications value. When invoked,subroutine 13802 sets the variable equal to the value returned by theGET₋₋ MENU₋₋ OPTION subroutine. The subroutine then returns.

FIG. 139 is a flow diagram of the HARDWARE₋₋ FLOW₋₋ CONTROL subroutine,which is called to enable or disable hardware flow control. Wheninvoked, item 13902 toggles the flow control bit between zero and one.The Hardware control subroutine then returns.

FIG. 140A is a flow diagram of the SERIAL₋₋ SUPPORT subroutine called bythe subroutine of FIG. 132. The serial supported functions are displayedon the SERIAL₋₋ SUPPORT window and are enabled or disabled under cursorcontrol. When invoked, subroutine 14002 opens the SERIAL₋₋ SUPPORTwindow. I/O block 14004 then outputs a title on the window. I/O block14006 outputs a legend to the bottom of the displayed window. Oncedisplayed, item 14008 sets the integer variable Cursor equal to zerowherein zero corresponds to the first position displayed in the table.I/O step 14010 then displays the serial function names in the windowwherein the serial functions are maintained in list form in the functiontable. When complete, item 14012 highlights the cursor selected item onthe display. Subroutine 14014 then sets the variable k equal to thevalue returned by the GET₋₋ KEY subroutine. Decision 14016 determineswhether the value of k equals escape. If so, subroutine 14018 closes theSERIAL₋₋ SUPPORT window and the subroutine returns. the result ofdecision 14016 is negative, decision 14020 determines whether variable kequals the value of the return key. The return key is used to toggle theuser input from yes to no on the SERIAL₋₋ SUPPORT display. If the returnkey was entered, item 14022 calculates the table entry to toggle. In thecontext of the present invention, each table value is a 32-bit entry.Serial mask is a 32-bit value. Therefore item 14022 processes a 32-bitvalue and divides it by 32 to determine which 32-bit value to toggle.The bit value for the location is determined by taking the value of theentry in the position and left shifting it by the modulo or remainder ofit and performing an Exclusive-Or on the value of the mask whichcorresponds to the respective serial functions displayed. The cursor isthen set to the next value. If the capitl "Y" key is entered, all tablevalues are set to one. If the capital "N" key is entered, all tablevalues are set to zero. When complete, program control returns to I/Ostep 14010.

If the result of decision 14020 is negative, decision 14024 determineswhether variable k equals "N". If so, item 14026 sets all serial maskbits to zero. If not, decision 14028 determines whether variable kequals "Y". If so, item 14030 sets all serial mask bits to 1. If not,decision 14032 determines whether variable k equals "HOME". If so, item14034 sets Cursor to zero to move it to the top of the list. If not,decision 14036 determines whether variable k equals "END". If so, item14038 sets Cursor equal to the number of items on the list minus one tomove the cursor to the last item on the list. If not, decision 14044determines whether variable k equals "DOWN ARROW". If so, item 14042sets the cursor to the next item in the column. If not, decision 14045determines whether variable k equals "UP ARROW". If so, item 14046 setsCursor to the previous item in the column. If not, decision 14048determines whether variable k equals "RIGHT ARROW". If so, item 14050sets Cursor to the next item in the row. If not, decision 14052determines whether variable k equals "LEFT ARROW". If so, item 14054sets Cursor to the previous item in the row. If not, program controlreturns to I/O step 14010. Program control also returns to I/O step14010 whenever items 14026, 14030, 14034, 14038, 14042, 14046, 14050, or14054 are completed.

FIG. 141 is a flow diagram of the FIRST₋₋ CONFIG subroutine, which iscalled to locate the first board of a particular group. The FIRST₋₋CONFIG subroutine is passed an integer (gp) corresponding to a desiredboard group. The FIRST₋₋ CONFIG subroutine then returns the board numberof the first board in the group. When invoked, item 14102 sets avariable i equal to zero. Decision 14104 then determines whethervariable i is less than MAXBOARDS. If not, the subroutine returns thevalue -1, indicating the subroutine did not locate a board. If variablei is less than MAXBOARDS, decision 14106 determines whether the boardpointed to by variable i is in the group of interest. If not, item 14108increments variable i and program control returns to decision 14104. Ifso, decision 14110 determines whether the board indexed by variable i isempty. If so, item 14108 increments variable i and program controlreturns to decision 14104. If not, decision 14112 determines whether theboard indexed by variable i is marked down. If so, item 14108 incrementsvariable i and program control returns to decision 14104. If not, thesubroutine returns variable i, which is the integer value of the firstboard in the group.

FIG. 142 is a flow diagram of the NEXT₋₋ CONFIG subroutine. Once thecurrent board in a group is known, the NEXT₋₋ CONFIG subroutine findsthe next board in the group. Therefore, when called, the NEXT₋₋ CONFIGsubroutine is passed the value of the current board in the group invariable bd. When invoked, item 14202 sets the variable i equal tovariable bd+1. Decision 14204 then determines whether variable i is lessthan MAXBOARDS. If not, the subroutine returns the value -1, indicatingthe subroutine did not locate another board in the group. If variable iis less than MAXBOARDS, decision 14206 determines whether the boardpointed to by variable i is in the group of interest. If not, item 14208increments variable i and program control returns to decision 14204. Ifso, decision 14210 determines whether the board indexed by variable i isempty. If so, item 14208 increments variable i and program controlreturns to decision 14204. If not, decision 14212 determines whether theboard indexed by variable i is marked down. If so, item 14208 incrementsvariable i and program control returns to decision 14204. If not, thesubroutine returns the variable i, which is the integer value of thenext board in the group.

FIG. 143A is a flow diagram of the KEYS₋₋ MENU routine, which is calledfrom the main menu when KEYS is selected on the menu bar. When invoked,subroutine 14302 opens the main menu and subroutine 14304 sets rv equalto the value returned, by the Get Menu Option subroutine. Decision 14306then tests rv to determine whether rv equals 1. If so, program controlpasses to the "D" subroutine. If not, decision 14308 determines whetherrv equals two. If so, program control passes to the "E" subroutine. Ifnot, decision 14310 determines whether rv equals three. If so, programcontrol passes, to the "F" subroutine. If not, decision 14312 determineswhether rv equals four. If so, program control passes to the "G"subroutine. If not, decision 14314 determines whether rv equals five, asshown in FIG. 143B. If so, program control passes to the "H" subroutine.If not, decision 14316 determines whether rv equals six. If so, programcontrol passes to the "I" subroutine. If not, decision 14318 determineswhether rv equals seven. If so, program control passes to the "J"subroutine 14334. If not, decision 14320 determines whether rv equalseight. If so, program control passes to the "K" subroutine. If not,decision 14322 determines whether rv equals nine. If so, program controlpasses to the "L" subroutine. If not, decision 14324 determines whetherrv equals ten, as shown in FIG. 143C. If so, program control passes tothe "M" subroutine If not, decision 14326 determines whether rv equalseleven. If so, program control passes to the "N" subroutine. If not,decision 14328 determines whether rv=99. If not, program control returnsto subroutine 14304. If so, subroutine 14330 closes the Keys window andthe subroutine returns.

FIG. 144 is a flow diagram of the WARN₋₋ NOBOARDS subroutine, which is autility called in several subroutines below to warn the user that anactive group has no boards assigned to it. When invoked, subroutine14402 calls the FIRST₋₋ CONFIG subroutine to set rv equal to thecurrently active group. Decision 14404 then determines whether rv equalminus one. If not, the subroutine returns zero. If so, I/O step 14406displays the message "No boards available in active group", and thesubroutine returns one.

FIG. 145A is a flow diagram of the GET₋₋ KEY subroutine, which is calledfor getting DES keyparts entry from a user. When invoked, subroutine14502 opens the key entry window. Item 14504 then sets the variable kmapequal to zeros. The variable keymap is a variable of up to nine digitsand it is used to keep track of which keyparts have been entered. Item14506 then sets the variable i equal to zero wherein variable i is usedas a counter. Decision 14508 tests variable i to determine whether itless than the number of keyparts designated under the configurefunction. If variable i is not less than the number of keyparts, processcontrol passes to item 14518 of FIG. 145B. If variable i is less thanthe number of keyparts, decision 14510 determines whether kmap bitvariable i is greater than zero. If so, item 14512 formats the menu itemshowing the check digits for the keypart. If not, item 14514 formats themenu item showing "ENTER₋₋ KEY part #i". When items 14512 or 14514 arecompleted and 14516 increments variable i. Program control then returnsto decision 14508, and the loop continues until variable i is greaterthan or equal to the number of keyparts indicating that all keypartshave been entered.

When the result of decision 14508 is negative, item 14518 sets variablei equal to zero. Decision 14520 then determines whether variable i isless than the number of keyparts. If so, decision 14522 determineswhether keymap bit variable i is greater than zero. If so, Item 14524increments variable i and program control passes to decision 14520. Ifthe result of either decision 14520 or 14522 is negative, decision 14526determines whether variable i is equal to the value of keyparts. If not,program control passes subroutine 14548. Otherwise, I/O step 14528displays the message "ACCEPT, CANCEL, RETRY". Subroutine 1450 then setsrv equal to the value returned by the Get₋₋ Menu. Option subroutine.Decision 14532 then determines whether rv is equal to one. If so,subroutine 14534 closes the keypart menu and the subroutine returns"ACCEPT₋₋ KEY". If not, decision 14536 determines whether rv equal two.If so, subroutine 14538 closes the keypart menu and the subroutinereturns "CANCEL₋₋ KEY". If not, decision 14540 determines whether rvequal three. If so, subroutine 14542 closes the keypart menu and theprogram control passes to subroutine 14502 through kloop. If not, I/Ostep 14546 displays the message "You must select one of the menuoptions" and program control passes to subroutine 14530.

If the result of decision 14526 is negative, program control passes tosubroutine 14548 which sets rv equal to the value returned by the GET₋₋KEY part Menu Option subroutine. Decision 14550 then determines whetherrv equals 99. If so, subroutine 14552 closes the key part window andreturns a value indicating CANCEL₋₋ KEY. If not, decision 14554determines whether kmap [rv-1] equals zero to determine whether the keypart has been entered. If not, program control passes to item 14506through Top of Do loop. If so, subroutine 14556 loads a bufferdesignated with the string returned by the ENTER₋₋ KEY subroutine.Decision 14558 then determines whether the length of the string inkeybuf is greater than zero. If not, program control returns tosubroutine 14552.

If Keybof contains a valid key part, then it is necessary to load thekey part into each board in the group. In the preferred practice of thepresent invention, subsequent key parts are Exclusive-Ored with previouskey parts entered in the boards. Therefore, the system tracks whetherthe key part is the first keypart entered, in which case previous keyinformation is erased, or whether the key part is a subsequent key partwhich is Exclusive-Ored with the key parts in the system. In practice,subroutine 14560 sets the variable bd equal to the value returned by theFIRST₋₋ CONFIG subroutine to locate the first board in the active group.Decision 14562 then determines whether bd is not equal to minus one,which indicates there are no boards. If bd does not equal -1, indicatingthat the last board in the group has not been found, subroutine 14564loads the key into the board and subroutine 14566 calls the NEXT₋₋CONFIG subroutine to find the next board in the group. Program controlthen returns to decision 14562 and the loop continues until all boardsin the group have been loaded with the key part. When the last board inthe group has been loaded with the keypart, I/O step 14558 displays the"ACCEPT₋₋ KEY part" window. Decision 14560 then determines whether theuser entered "Yes" or "No". If the user entered yes, item 14562 sets thebit in kmap corresponding to the key part to indicate the key part isloaded and the variable current parts is incremented. Program controlthen passes to item 14506 through Top of Do loop. If the result ofdecision 14560 is negative, program control passes to subroutine 14564,in FIG. 146, to set bd equal to the value returned by FIRST₋₋ CONFIG toinitialize the loop which will cancel key part if the user indicates thekey part was not accepted. A key part is canceled by Exclusive-Oring itwith itself. When the loop is entered, decision 14566 tests bd todetermine whether it is equal to minus one. If so, the control passes toitem 14506. If the result of decision 14566 is negative, subroutine14568 calls the Load. Key subroutine to load the same key part into thecurrent board. Subroutine 14570 then sets bd equal to the value returnedby the NEXT₋₋ CONFIG subroutine. Program control then returns todecision 14566 and the loop continues until all boards in the group havebeen processed.

FIG. 147A-147D is a flow diagram of the Load Keytable subroutine whichis called to inject a cryptogram in a board and store the cryptogram inthe keytable of the board. When invoked, subroutine 14702 opens the loadkeytable window, subroutine 14704 titles the window and item 14706formats the first menu item with the last cryptogram created which isstored as a global variable. Subroutine 14708 then sets rv equal to thevalue returned by the Get Menu Option subroutine. Decision 14710 testsrv to determine whether it is equal to 99. If so, subroutine 14712closes the Load Keytable window and the subroutine returns rv. If not,decision 14714 determines whether rv equals 1, which indicates 14714determine the user would like to use the last cryptogram created by thesystem. Keytype is a global variable which indicates the type ofcryptogram stored in the last cryptogram global variable. If rv equals1, decision 14716 determines whether the keytype equals zero. If so, I/Ostep 14718 displays the message "Last cryptogram does not exist." Ifnot, program control passes to subroutine 14752. If the result ofdecision 14714 is negative, decision 14720 determines whether rv equals2. If so, item 14722 sets keytype equal to a value indicating KEYTYPEKEK and subroutine 14724 calls the ENTER₋₋ CRYPTOGRAM subroutine andsets the variable rc equal to the value returned by the ENTER₋₋CRYPTOGRAM subroutine. If not, decision 14720 determines whether rvequals 3. If so, item 14728 sets keytype equal to a value indicating avalue indicating KEYTYPE₋₋ PVK and subroutine 14730 calls the ENTER₋₋CRYPTOGRAM subroutine and sets the variable rc equal to the valuereturned by the ENTER₋₋ CRYPTOGRAM subroutine. If not, decision 14732determines whether rv equals 4. If so, item 14734 sets keytype equal toa value indicating KEYTYPE₋₋ PEK and subroutine 14736 calls the ENTER₋₋CRYPTOGRAM subroutine and sets the variable rc equal to the valuereturned by the ENTER₋₋ CRYPTOGRAM subroutine. If not, decision 14738determines whether rv equals 5. If so, item 14740 sets keytype equal toa value indicating KEYTYPE₋₋ MAK and subroutine 14742 calls the ENTER₋₋CRYPTOGRAM subroutine and sets the variable rc equal to the valuereturned by the ENTER₋₋ CRYPTOGRAM subroutine. If not, decision 14744determines whether rv equals 6. If so, item 14746 sets keytype equal toa value indicating KEYTYPE₋₋ DEK and subroutine 14748 calls the ENTER₋₋CRYPTOGRAM subroutine and sets the variable rc equal to the valuereturned by the ENTER₋₋ CRYPTOGRAM subroutine. When subroutines 14724,14730, 14736, 14742, or 14748 return, decision 14750 determines whetherrc equals zero. If so, the subroutine returns rv. If not, programcontrol passes to subroutine 14752, which calls the subroutine GET₋₋INT, which prompts the user for the key table index and returns thevalue in the variable idx. Decision 14754 determines whether thevariable idx equals minus one. If so, program control passes tosubroutine 147I2. Otherwise, decision 14756 determines whether idx isbetween 1 and 4000. If not, I/O step 14758 displays the message "Indexmust be between 1 and 4000." Otherwise, I/O step 14760 displays themessage "Load X cryptogram x..x into table position 0?" Subroutine 14762then gets the user's response, either yes or no. If the user respondsno, program control passes to decision 14712. If the user responds yes,program control passes to decision 14766, which determines whether thekeytype variable equals a value indicating KEYTYPE₋₋ KEK. If so, item14768 sets the variable modifier equal to zero. If not, decision 14770determines whether the keytype variable equals a value indicatingKEYTYPE₋₋ PVK. If so, item 14777 sets the variable modifier equal to 4.If not, decision 14774 determines whether the keytype variable equals avalue indicating KEYTYPE₋₋ PEK. If so, item 14776 sets the variablemodifier equal to 1. If not, decision 14778 determines whether thekeytype variable equals a value indicating KEYTYPE₋₋ MAK. If so, item14780 sets the variable modifier equal to 3. If not, decision 14782determines whether the keytype variable equals a value indicatingKEYTYPE₋₋ DEK. If so, item 14784 sets the variable modifier equal to 2.The the result of decision 14782 is negative or when items 14768, 14772,14776, 14780, or 14784 are completed, program control passes to process14784, Which calls the FIRST₋₋ CONFIG subroutine and sets the value bdequal to the value returned. Decision 14786 then tests bd to determinewhether the last board in the group has been loaded. If not, subroutine14788 loads the key into the current board and subroutine 14790 callsthe NEXT₋₋ CONFIG subroutine and sets bd equal to the value returned.Program control then passes to decision 14786 and the loop continuesuntil all boards in the group have been loaded. When all boards havebeen loaded, I/O block 14792 displays the message "XXX cryptogram xxx...loaded into keytable position 0." Program control then returns toprocess 14712.

FIG. 148 is a flow diagram of the ACCEPT KEY subroutine called by thesubroutine of FIG. 145A. This subroutine returns the check digits for aloaded key. When invoked, subroutine 14802 opens the ACCEPT₋₋ KEYwindow. Subroutine 14804 then calls the FIRST₋₋ CONFIG and Load Keysubroutine to locate the key for the first board in the group. I/O block14806 opens then displays the message "Check Digits=XXXX". Once themessage is displayed, subroutine 14808 sets rv equal to the valuereturned by the Get Menu Option subroutine and subroutine 14810 closesthe window. The subroutine then returns rv.

FIG. 149 is a flow diagram of the ENTER₋₋ KEY subroutine which is calledby the subroutine of FIG. 145A. When invoked, process 14902 opens theENTER₋₋ KEY window and subroutine 14904 titles the window. Subroutine14906 then sets the variable buf equal to the text returned by the GetText subroutine. Subroutine 14908 then closes the window and decision14910 determines whether the string length in buf is greater than zero.If not, the subroutine returns. If so, subroutine 14912 upshifts thecontents of buf and the subroutine returns.

FIG. 150 is a flow diagram of the ENTER₋₋ CRYPTOGRAM subroutine which iscalled by the subroutine of FIG. 145A. When invoked, item 15002 moves"ENTER₋₋ CRYPTOGRAM" into the help keywword to support the contextsensitive help function of the present invention. Subroutine 15004 thenopens the ENTER₋₋ CRYPTOGRAM window and subroutine 15006 titles thewindow. Subroutine 15008 then sets the variable buf equal to the textreturned by the Get Text subroutine. Subroutine 15010 then closes thewindow and decision 15012 determines whether the string length in buf isgreater than zero. If not, the subroutine returns. If so, subroutine15014 copies the contents of buf into the cryptogram global variable andthe subroutine returns the entered cryptogram.

FIG. 151A is a flow diagram of the LOAD₋₋ DIEBOLD₋₋ TABLE subroutinecalled from the main KEYS₋₋ MENU. When invoked, subroutine 15102 opensthe Diebold table window and I/O block displays special or function keytext at the bottom of the screen. Item 15106 moves "Diebold" into thehelp keyword. I/O block 15108 then displays the contents of table DT. DTis a global variable which is an array. Item 15110 then sets thevariables dr and dc equal to zero wherein dr indicates row and dcindicates column. Item 15112 sets the cursor equal to zero and thenotdone flag equal to true. I/O step 15114 then highlights the tableitem at position dr,dc and I/O step 15116 displays the current row andcolumn at the bottom of the screen. Subroutine 15118 then sets thevariable key equal to the value returned by the GET₋₋ KEY subroutine.Decision 15120 determines whether the key variable equals a cursorcontrol character. If so, item 15122 adjusts dr and dc to reflect cursormovement. If not, decision 15124 determines whether the key variable isequal to the insert key. If so, program control exits to "B". If not,decision 15128 determines whether the key variable is equal to thedelete key. If so, program Control exits to "C". If not, decision 15132determines whether the key variable is equal to the space key. If so,program control exits to "D". If not, decision 15136 determines whetherthe key variable is equal to the F3 function key. If so, program controlexits to "E". If not, decision 15138 determines whether the key variableis equal to the "R" key which indicates random key generation. If so,program control exits to "F". If not, decision 15142 determines whetherthe key variable is equal to the "Z" key. If so, program control exitsto "G". If not, decision 15146 determines whether the key variable isequal to the escape key. If so, program control exits to "H". If not,decision 15150 determines whether the key variable is equal to aHexadecimal digit key. If so, program control exits to "I". If not,decision 15154 determines whether the notdone variable is equal to avalue indicating "TRUE". If so, program control exits to I/O step 15114.If not, program control exits to "J".

FIG. 151C is a continuation of the flow diagram of FIGS. 151A and 151Band indicates program flow when the subroutine branches to "B". Thissubroutine is used whenever the insert key was pressed in the Dieboldtable mode. When invoked, item 15102 sets the variable spos equal to avalue equivalent to (dr*16)+dc to locate a position in a table. 15104then sets the Pos variable equal to 254. Decision 15106 then determineswhether Pos is greater than or equal to spos. If so, subroutine 15108sets DT[Pos+1] equal to DT[Pos] to copy the table location into theadjacent location. Item 15110 then decrements Pos and program controlreturns to decision 15106. If the result of decision 15106 is negative,subroutine 15112 writes "₋₋ " into the position to create a tableposition. Position is then set equal to zero by item 15114 and decision15116 determines whether Pos is less than 255. If so, I/O block 15118displays the table entry at the position and item 15120 increments Pos.Program control then returns to decision 15116 and the loop continuesuntil Pos is incremented to 255. The subroutine then returns.

FIG. 152 is a continuation of the flow diagram of FIGS. 151A and 151Band indicates program flow when the subroutine branches to "C". Thisoccurs when the delete key is pressed when in the Diebold table mode.When invoked, item 15202 sets the Spos variable equal to the value of(dr*16)+dc and item 15204 sets the variable Pos equal to the variableSpos. Decision 15206 then determines whether Pos is less than 255. Ifso, subroutine 15208 sets DT[Pos] equal to DT[POS+1] to copy the tableposition into the next table position. Item 15210 increments thevariable Pos and program control returns to decision 15206. The loopcontinues until Pos equals 255. When the loop is complete, subroutine15212 writes into table position DT[255]. I/O block 15214 then displaysall table positions and the subroutine returns.

FIG. 153 is a continuation of the flow diagram of FIGS. 151A and 151Band indicates program flow when the subroutine branches to "D", whichoccurs when the user enters a spacebar to open a position in the table.When invoked, subroutine 15302 writes "₋₋ " into the position selectedon the table. Item 15304 then sets the cursor equal to zero and thesubroutine returns.

FIG. 154 is a continuation of the flow diagram of FIGS. 151A and 151Band indicates program flow when the subroutine branches to "E", whichoccurs when the user enters accept. When invoked, item 15402 sets theflag notdone to false and the subroutine returns.

FIG. 155 is a continuation of the flow diagram of FIGS. 151A and 151Band indicates program flow when the subroutine branches to "F" togenerate a random table. When invoked, I/O block displays the message"Overwrite Table?" The present invention allows a user to overwrite anentire table or generate random values for specific table entries.Therefore, subroutine 15504 sets the variable rv equal to the valueentered by the user: either yes, no or abort. Decision 15506 thendetermines whether the user entered yes and if so, subroutine 15508generates a random diebold table. When subroutine 15508 returns or ifthe result of decision 15506 is negative, the subroutine returns.

FIG. 156 is a continuation of the flow diagram of FIGS. 151A and 151Band indicates program flow when the subroutine branches to "G" whichoccurs when the user presses "Z". When invoked, I/O block 15602 displaysthe message "Clear Diebold Table" and subroutine 15604 sets the variablerv equal to the value entered by the user: either yes or no. Decision15606 then determines whether rv equals yes. If not, the subroutinereturns. If so, subroutine 15608 initializes the Diebold table and I/Oblock 15610 redisplays the Diebold table. Item 15612 then sets dr and dcto zero and reinitializes the cursor to zero. The subroutine thenreturns.

FIG. 157 is a continuation of the flow diagram of FIGS. 151A and 151Band indicates program flow when the subroutine branches to "H" whichoccurs whenever a user presses the escape key in the Diebold table mode.When invoked, item 15702 sets the variable notdone equal to false andthe subroutine routine returns.

FIG. 158 is a continuation of the flow diagram of FIGS. 151A and 151Band indicates program flow when the subroutine branches to "I" whichoccurs when a hexadecimal digit is entered. When invoked item 15802calculates the current position in the table by setting the [cur] valueof DT[(dr*16)+dc]. Cur is then incremented. Decision 15804 thendetermines whether cur equals 1. If so, item 15806 forces the otherposition in the table entry to display the symbol "₋₋ ". This forces theuser to enter two new digits each time he modifies a table position. Ifnot, subroutine 15808 invokes CHECK₋₋ DT₋₋ DUP() to determine whetherthe two-digit value just entered is a duplicate of another entry in theDiebold table. Decision 16910 determines whether a duplicate entryexists. If so, item 15812 sets DT](dr*16)+dc] equal to "₋₋ " and setscur equal to zero. This affects the display two underscores to indicatethat a duplicate entry has been made. The subroutine then returns. Ifnot, item 16914 sets key equal to the Return Key and jumps and branchesto kloop.

FIG. 159 is a continuation of the flow diagram of FIGS. 151A and 151Band indicates program flow when the subroutine branches to "J". Decision16902 determines whether key equals F3. If so, then the subroutinecontinues at subroutine 15904. If not, then the subroutine continues atsubroutine 15908. Subroutine 15904 calls STORE₋₋ DIEBOLD, which returnsa value in rc. Decision 15906 determines whether the value in rc is a 2or a 3. If so, the subroutine branches to either. If not, the subroutinebranches to subroutine 15908. Subroutine 15908 calls CLOSE₋₋ WINDOW. Thesubroutine then returns.

FIGS. 160A and 160B are flow diagrams of the CHECK₋₋ DT₋₋ DUPsubroutine. This subroutine determines whether there is a duplicateentry in the Diebold table. This subroutine is passed an index into thetable, parameter Pos, which indicates the Diebold entry to check forduplication, a passed parameter Silent to indicate whether or not tobeep. FIG. 160A is a flow diagram of the code that checks the entries inthe Diebold table below Pos. FIG. 160B is a flow diagram of the codethat checks the entries in the Diebold table above Pos. Item 16002 setsvariable i equal to zero. Variable i is an index used for steppingthrough the Diebold table. Decision 16004 determines whether variable iis less than Pos. If so, the routine continues at item 16006. If not,the routine continues at item 16020. Item 16006 compares DT[i](which isthe i-th entry in the Diebold table) with DT[Pos]. Decision 16008determines whether these values are the same. If not, then item 16010increments variable i and continues at decision 16004. If so, item 16012formats a duplicate entry warning message and places it into a buffer.Decision 16016 determines whether parameter Silent is greater than zero.If so, I/O block 16014 displays the message in the buffer without a beepand the subroutine returns a value of 1. If not, I/O block 16018displays the message in the buffer with a beep and the subroutinereturns a value of 1.

FIG. 160B a continuation of the description of subroutine CHECK₋₋ DT₋₋DUP. Item 16020 sets variable i equal to 255. Decision 16022 determineswhether variable i is greater than Pos. If not, the subroutine returns avalue zero to indicate that there are no duplicates in the table. If so,item 16024 compares DT[i] with DT[Pos]. Decision 16026 determineswhether the entries are the same. If not, item 16028 decrements variablei and continues at decision 16022. If so, then item 16030 places amessage indicating a duplicate entry into a buffer. Decision 16032determines whether the passed parameter Silent is greater than zero. Ifso, I/O block 16034 displays the message in the buffer without a beepand the subroutine returns a value of 1. If not, I/O block 16036displays the message in the buffer with a beep and the subroutinereturns a value of 1.

FIGS. 161, 162A, 162B, and 163 are flow diagrams of the STORE₋₋ DIEBOLDsubroutine. This subroutine prompts the user for determination ofwhether to accept, cancel, or redo the Diebold table entry and processesthe request. Subroutine 16102 calls the OPEN₋₋ WINDOW subroutine.Subroutine 4 calls GET₋₋ MENU₋₋ OPTION, which returns the option in rv.Decision 16106 determines whether rv equals 1. If so, the subroutinecontinues at 16202. If not, decision 16108 determines whether rv equals2. If so, then the subroutine continues at 16302. If not, decision 16110determines whether rv equals 3. If not, item 16112 sets rv equal to 3.Subroutine 16114 calls subroutine CLOSE₋₋ WINDOW. The subroutine thenreturns the value rv.

FIG. 162A is a flow diagram of the routine that is executed when theuser indicates that the Diebold table is to be accepted. Subroutine16202 calls subroutine VALID₋₋ DIEBOLD₋₋ TABLE, which returns a value ofzero in rc if valid. Decision 16204 determines whether rc is greaterthan zero. If not, item 16224 set rv equal to 3 and the subroutinecontinues at subroutine 16114. If so, subroutine 16206 calls subroutineGET₋₋ INT, which sets the variable idx. Decision 16208 determineswhether variable idx equals 1. If so, the subroutine branches to 16114.If not, decision 16210 determines whether variable idx is less than 1 oris greater than 10. If so, I/O block 16212 outputs the message "Indexvalue must be between 1 and 10" and branches to subroutine 16206. Ifnot, I/O block 16214 outputs the message "LOAD₋₋ DIEBOLD₋₋ TABLE intoposition idx." Subroutine 16216 calls subroutine ASK₋₋ YES₋₋ NO, inputsa yes or no response, and returns a value in variable rc. Decision 16218determines whether rc equals yes. If so, item 16222 places all theDiebold table entries into a single a buffer and the subroutinecontinues at item 16232. If not, item 16220 sets rv equal to 3 and thesubroutine continues at 16114.

FIG. 162B is a flow diagram of a routine which loads the Diebold tableinto the encryption boards. Item 16232 sets variable bd equal to thefirst configured board of the active group. Decision 16232 determineswhether variable bd equals a -1. If so, output 16240 displays themessage that the Diebold table is loaded and the routine continues atsubroutine 16114. If not, subroutine 16236 calls subroutine DO₋₋ LCDT.Subroutine 16238 then calls subroutine NEXT₋₋ CONFIG and returns a valuein variable bd, and the subroutine continues at decision 16234 until allboards have been configured.

FIG. 163 is a flow diagram of the routine which initializes the Dieboldtable when the cancel option has been specified. Subroutine 16302 callssubroutine INIT₋₋ DIEBOLD₋₋ TABLE. The subroutine continues atsubroutine 16114.

FIG. 164 is a flow diagram of the subroutine VALID₋₋ DIEBOLD₋₋ TABLE.This subroutine validates the contents of the Diebold table and returnsa zero if an error is detected and a 1 if no error is detected. Item16402 converts the first entry in the Diebold table into a binary value.Decision 16404 determines if the entry is greater than 192 and less than207. If not, I/O block 16406 displays the message "first table entrymust be between C0 and CF," and the subroutine returns the value zero.If so, blocks 16408 through 16414 initialize the Map array to contain an"N" in each of its 256 positions. Item 16408 sets variable i equal tozero. Decision 16410 determines whether variable i is less than 256. Ifso, item 16412 sets Map[i] equal to "N" and item 16414 incrementsvariable i and loops to decision 16410. If not, then blocks 16416through 16422 loop through the Diebold table, retrieving values andusing the values as indexes into the Map array. the entries in the Maparray are set to "Y". Item 16416 sets variable i equal to zero, decision16418 determines whether variable i is less than 256. If so, item 16420sets map[DT[i]] equal to "Y" and item 16422 increments variable i andloops to decision 16418. If not, blocks 16424 through 16432 determinewhether each of the entries in the Map array contain a "Y". If there isan "N" present in the array, then a duplicate entry has been made in theDiebold table. Item 16424 sets variable i equal to zero; decision 16426determines whether variable i is less than 256. If not, then thesubroutine returns with a value of 1. If so, decision 16428 determineswhether Map[i] is equal to "N". If so, a duplicate entry is detected andI/O block 16430 outputs the message "incomplete table detected" andreturns a value zero. If not, then item 16432 increments variable i andloops to decision 16426.

FIG. 165 is a flow diagram of the INIT₋₋ DIEBOLD₋₋ TABLE subroutine.This subroutine places two underscores in each Diebold table entry. Item16502 sets variable i equal to zero. Decision 16504 determines ifvariable i is less than 256. If not, the subroutine returns. If so,subroutine 16506 sets entry DT[i] equal to "₋₋ ". Item 16508 incrementsvariable i and loops to decision 16504.

FIGS. 166A and 166B are a flow diagram of the GEN₋₋ RANDOM₋₋ DIEBOLD₋₋TABLE subroutine. This subroutine generates a Diebold table filled in arandom set of values. This subroutine is passed the parameter Fill,which indicates whether INIT₋₋ DIEBOLD₋₋ TABLE is called. By definition,the Diebold table has 256 unique entries. The present inventiongenerates these 256 unique random values in a particularly efficientmanner. The invention uses the Choices array and the NIX subroutine.Recall that the Choices array initially was filed with sequentialvalues. When a random number is generated, the invention uses thatnumber as an index into the Choices array. The invention retrieves thevalue at that index and stores it in the Diebold table. The subroutineNIX then removes that value from the Choices table by shifting allentries at higher indexes one entry position lower. This removalguarantees the uniqueness of the Diebold table entries. The randomnumber generator, when called, generates a number less than or equal tothe number of entries left in Choices to ensure proper indexing. Item16602 sets Count equal to 256. Decision 16604 determines if Fill isgreater than zero. If so, subroutine 16606 calls INIT₋₋ DIEBOLD₋₋ TABLEand continues at subroutine 16607. If not, the subroutine continues atsubroutine 16607. Blocks 16608 through 16614 initialize the Choicesarray, which is 256 entries long. The array is initialized so that entry1 of the array equals 1, entry 2 of the array equals 2, etc. Item 16608sets variable i equal to zero. Decision 16610 determines whethervariable i is less than 256. If so, 16612 sets Choices[i] equal tovariable i and item 16614 increments variable i and loops to decision16610. If not, blocks 16616 through 16626 initialize the first entry inthe table, which must be between C0 and CF. Item 16616 sets variable xequal to a random number modulo 16. Item 16618 sets variable x equal tovariable x plus 192. Decision 16620 determines whether the first entryin the Diebold table is equal to "₋₋ ". If not, the subroutine continuesat item 16628. If so, subroutine 16622 calls subroutine NIX. Item 16624places the variable x into DT[0]. I/O block 16626 displays the variablex and continues at item 16628. Blocks 16628 through 16636 initialize theremainder of the Diebold table with random numbers. Item 16628 setsvariable i equal to one. Decision 16630 determines if variable i is lessthan 256. If not, the subroutine returns. If so, item 16632 setsvariable x equal to a random number between 1 and Count. Item 16634 setsDT[i] equal to Choices[x]. Subroutine 16636 calls subroutine NIX. I/Oblock 16638 displays the value of DT[i]. Item 16640 increments variablei and loops to decision 16630.

FIG. 167 is a flow diagram of the NIX subroutine. This subroutine ispassed parameters: Array, Element, and Count. This subroutine searchesfor the Array entry that equals Element and then removes that entry byeach entry at a higher entry location to the next lower location.Parameter Count contains the number of entries in the Array. In analternate embodiment, this subroutine removes the entry at that Index,rather than search for the entry equal to Element. Item 16702 setsvariable i equal to zero. Decision 16704 determines whether variable iis greater than Count. If not, the subroutine returns. If so, decision16706 determines whether Array[i] equals Element. If not, then item16708 increments variable i and loops to item 16704. If so, then item16710 decrements Count and decision 16712 determines whether Countequals variable i. If not, then subroutine 16714 shifts the Arrayentries above the i-index down one entry location and continues at item16708. If not, the routine continues at 16708.

FIGS. 168A and 168B are a flow diagram of the Utilities Menu routine.This routine displays the Utility Menu items, inputs the user selectionand calls the appropriate utility function. Subroutine 16802 callsOPEN₋₋ UTILS₋₋ MENU₋₋ WINDOW to open the Utility window. Subroutine16804 calls subroutine GET₋₋ MENU₋₋ OPTION and returns the option in rv.Decision 16806 determines whether rv is equal to 99. If so, subroutine16808 calls subroutine CLOSE MENU WINDOW and the subroutine returns. Ifnot, decision 16812 determines whether rv is equal to 1. If not, thesubroutine continues at decision 16822. If so, decision 16814 determineswhether the user level is greater than or equal to 1. If so, subroutine16816 calls BACKUP and continues at subroutine 16804. If not, thesubroutine continues at 16804.

Decision 16822 determines whether rv equals 2. If not, the subroutinecontinues at decision 16832. If so, decision 16824 determines whetherthe user level is greater than or equal to 3. If so, subroutine 16826calls RESTORE and continues at subroutine 16804. If not, the subroutinecontinues at subroutine 16804.

Decision 16832 determines if rv equals 3. If not, the subroutinecontinues at 16842. If so, decision 16834 determines whether the userlevel is greater than or equal to 4. If so, subroutine 16836 callsERASE₋₋ BOARD and continues at subroutine 16804. If not, the subroutinecontinues at 16804.

Decision 16842 determines whether rv is equal to 4. If not, thesubroutine continues at decision 16852. If so, decision 16844 determineswhether the user level is greater than or equal to 1. if so, subroutine16846 calls CLEAR₋₋ BOARD and continues at subroutine 16804. If not, thesubroutine continues at subroutine 16804.

Decision 16852 determines whether rv is equal to 5. If not, thesubroutine continues at decision 16862. If so, decision 16854 determineswhether the user level is greater than or equal to 4. If so, subroutine16856 calls ZERO₋₋ BOARD and continues at subroutine 16804. If not, thesubroutine continues at 16804.

Decision 16862 determines whether rv is equal to 6. If not, thesubroutine continues at subroutine 16804. If so, decision 16864determines whether the user level is greater than or equal to 4. If so,subroutine 16866 calls INSTALL UPDATE and continues at 16804. If not,the subroutine continues at 16804.

FIG. 169A, 169B, 169C and 169D are a flow diagram of the BACKUPsubroutine. The subroutine prompts the user for the number of the boardto backup and then proceeds to backup the board to a disk file.Subroutine 16902 calls subroutine SELECT₋₋ BOARD, which returns a boardnumber in bd. Decision 16904 determines whether bd is equal to 99. Ifso, the subroutine returns. If not, subroutine 16906 calls PROMPT₋₋DISKETTE, which prompts the user to insert a diskette and returns avalue in rc. Decision 16908 determines whether rc is equal to 99. If so,output 16914 displays "backup aborted by user" and returns. If not,subroutine 16910 calls subroutine CHDIR to determine whether thediskette has been inserted and CHDIR returns a value in rc. Decision16912 determines whether rc is greater than zero. If so, the subroutineloops to subroutine 16906. If not, the subroutine continues at item16916 on FIG. 169B.

In blocks 16916 through 16930, the subroutine generates a file name forthe backup file that is unique. The file name is an eight-characterhexadecimal representation of the current system time. The file is givenan extension of ".BKP". Item 16916 sets the variable Tries equal tozero. Decision 16918 determines whether Tries is greater than 10. If so,I/O block 16920 displays the message "cannot create backup file; backupaborted" and returns. If not, item 16922 increments Tries. Item 16924creates a file name using the current time. Block 16926 is a built-inone-second delay. Subroutine 16928 calls subroutine ACCESS, whichattempts to access a file with the newly created name and ACCESS returnsa value in errno. Decision 16930 determines whether the file exists. Ifthe file exists, the subroutine loops to decision 16918. If the filedoes not exist, the subroutine continues at subroutine 16932 on FIG.169C.

In blocks 16932 through 16948, the subroutine opens the file and writesout a header. Subroutine 16932 calls FOPEN, which opens the file andreturns a value in variable fp. Decision 16936 determines whether theopen was successful. If not, I/O block 16938 displays an error messageand returns. In blocks 16942 through 16946, the subroutine initializesthe header for the file. Item 16940 sets the header to indicate that itis a backup-type file. Subroutine 16942 calls GET₋₋ TEXT, which returnsa description from the user and puts in into the header. Subroutine16944 calls the TIME subroutine and stores that time in the header. Item16946 stores the board number in the header. I/O block 16948 writes theheader to the file. The routine then continues to subroutine 16950 onFIG. 169D.

In blocks 16950 through 16958, the subroutine retrieves the backupinformation from the selected board. The subroutine DO₋₋ BACK is calledsuccessively to return portions of the backup information, which is thenwritten to disk. Subroutine 16950 calls DO₋₋ BACK, which returns a valuein bno. Decision 16952 determines whether bno is greater than zero. Ifnot, the subroutine continues at item 16960. If so, I/O block 16954writes the buffer returned by DO₋₋ BACK to disk. Subroutine 16956 callsDO BACK, which returns a value in bno. I/O block 16958 displays amessage and loops to decision 16952. Item 16960 retrieves the currenttime to be stored in the file when closed. I/O block 16962 closes thefile. I/O block 16968 displays a backup complete message and returns.

FIGS. 170A, 170B, 170C, 170D and 170E are a flow diagram of the RESTOREsubroutine. This subroutine retrieves a backup file from the disketteand restores the data on that file onto the selected board. Subroutine17002 calls PROMPT₋₋ DISKETTE, which prompts the user to enter adiskette and returns a value in rc. Decision 170904 determines whetherrc equals 99. If so, I/O block 17006 displays a message indicating thatthe restore has been aborted and returns. If not, subroutine 17008 callssubroutine CHDIR, which checks the directory of the diskette and returnsa value in rc. Decision 17010 determines whether rc equals zero, thatis, whether any backup-type files are on the diskette. If not, thesubroutine loops to subroutine 17002. If so, the subroutine continues at17012 on FIG. 170B.

In blocks 17012 through 17022, the subroutine calculates the number ofbackup files on the diskette and allocates an appropriate amount ofmemory to hold the header of each file. Subroutine 17012 calls DOS₋₋FINDFIRST, which finds the first backup file on the diskette, and DOS₋₋FINDFIRST returns a value in rc indicating whether a backup-type fileexists. Item 17014 sets Fcount equal to zero; Fcount will contain thecount of the number of backup files on the diskette. Decision 17016determines whether rc equals zero. If so, item 17018 increments Fcountand subroutine 17020 calls DOS₋₋ FINDNEXT, which finds the next backupfile on the diskette and returns a value in rc, and the subroutine loopsto decision 17016. If not, subroutine 17021 calls MALLOC, whichallocates memory for the header of each file. The subroutine thencontinues to item 17022 on FIG. 170C.

In blocks 17022 through 17034, the subroutine loads the header of eachbackup file on the diskette into memory. Item 17022 sets Fcount equal tozero. Subroutine 17024 calls DOS₋₋ FINDFIRST, which returns a value inrc. Decision 17026 determines whether rc is equal to zero. If not, thesubroutine continues at decision 17036 on FIG. 170D. If so, subroutine17028 calls OPENFILE, to open the backup file. I/O block 17030 reads inthe header from the open file. I/O block 17031 closes the open file.Item 17032 increments Fcount. Subroutine 17034 calls DOS₋₋ FINDNEXT,which returns a value in rc, and the subroutine loops to decision 17026.

In blocks 17036 through 17072, the subroutine displays the list ofbackup files on the screen to allow the selection of the backup file torestore. Decision 17036 determines whether Fcount equals zero. If so,I/O block 17038 displays a message that no backup files were found onthe diskette and returns. If not, subroutine 17040 calls OPEN₋₋RESTORE₋₋ WINDOW. I/O block 17042 displays the list of the files on thescreen. Subroutine 17044 calls GET₋₋ KEY, which returns the key invariable k. Decision 17046 determines whether the key is a cursorcontrol key. If so, item 17060 adjusts the cursor on the screen andloops to I/O block 17042. If not, decision 17062 determines whether theEscape Key was entered. If so, subroutine 17066 calls CLOSE₋₋ WINDOW andI/O block 17068 displays a message that the restore was aborted andreturns. If not, decision 17070 determines whether the Return Key wasentered. If not, the subroutine loops to I/O block 17042. If so,subroutine 17072 calls CLOSE₋₋ WINDOW and continues at subroutine 17074on FIG. 170E.

In blocks 17074 through 17010, the subroutine inputs the board number ofthe board to be restored and actually restores the information to theboard. Subroutine 17074 calls SELECT₋₋ BOARD, which returns selectedboard in bd. Decision 17076 determines whether bd equals 99. If so, I/Oblock 17078 displays a message that the restore has been aborted andsubroutine 17088 calls FREE to free-up the allocated memory and returns.If not, I/O block 17090 opens the restore file. I/O block 17092 reads ina record from the restore file. Decision 17098 determines whether theend of the file has been reached. If not, subroutine 170100 calls DO₋₋REST, which restores the record to the selected and I/O block 170102displays a restore in progress message and loops to I/O block 17092. Ifso, item 170194 updates the restore time value in the board statistics.I/O block 170106 closes the restore file. I/O block 170108 displays arestore message. Subroutine 17110 calls FREE, which frees the allocatedmemory and returns.

FIG. 171 is a flow diagram of the PROMPT₋₋ DISKETTE subroutine. Thissubroutine displays a message on the screen to the effect that the usershould insert a diskette. Subroutine 17152 calls OPEN₋₋ WINDOW.Subroutine 17154 calls TITLE₋₋ WINDOW. Subroutine 17160 calls GET₋₋MENU₋₋ OPTION, which returns the option in rv. Subroutine 17162 callsCLOSE₋₋ WINDOW. The subroutine then returns the value of rV.

FIG. 172 is a flow diagram of subroutine SELECT₋₋ BOARD. The subroutinedisplays a window and inputs a board number from the user. Subroutine17202 calls OPEN₋₋ WINDOW. Subroutine 17204 calls TITLE₋₋ WINDOW.Subroutine 17206 calls GET₋₋ MENU₋₋ OPTION, which inputs the boardnumber and returns it in rv. Subroutine 17208 calls CLOSE₋₋ WINDOW. Thesubroutine then returns the board number in rv.

FIG. 173 is a flow diagram of the ERASE₋₋ BOARD subroutine. Thesubroutine inputs a board number from the user and erases the MFK andthe KEK from that board. Subroutine 17302 calls GET₋₋ BOARD, whichreturns the board number in bd. Decision 17304 determines whether bdequals zero. If so, the subroutine returns. If not, subroutine 17306calls ARE₋₋ YOU₋₋ SURE, which double-checks with the user to ensure thecorrectness of the board number and returns a value in rv. Decision17308 determines whether rv equals 99. If so, the subroutine returns. Ifnot, subroutine 17310 calls DO₋₋ RESET to reset the keys selected board.I/O block 17312 displays a message that the MFK and the KEK have beenerased from the selected board and the subroutine returns.

FIG. 174 is a flow diagram of subroutine DO₋₋ CWKS. This subroutineperforms the CWKS function. The input parameters are board number andkey type; the output parameter is cryptogram. Item 17402 formats theCWKS message into a buffer. Subroutine 17404 calls WRITE₋₋ DEB, whichoutputs the buffer to the selected board. The subroutine 17406 callsPRO₋₋ DEB, which inputs the response from the selected board. Decision17408 determines whether an error occurred in the response from theboard. If so, the subroutine returns. If not, subroutine 17410 copiesthe AH-token into cryptogram. The subroutine returns the cryptogram.

FIG. 175 is a flow diagram of subroutine DO₋₋ DESE. This subroutineperforms the DESE function. The input parameter is board number, key,and data, and the subroutine returns the encrypted result. Item 17502formats the DESE message into a buffer. Subroutine 17504 calls WRITE₋₋DEB, which outputs the buffer to the selected board. Subroutine 17506calls PRO₋₋ DEB, which inputs the response from the selected board.Decision 17508 determines whether an error occurred in the response fromthe board. If so, the subroutine returns. If not, subroutine 17510copies the AK-token to variable Result. The subroutine returns Result.

FIG. 176 is a flow diagram of subroutine DO₋₋ IKEY. This subroutineperforms the IKEY function. The input parameters are board number andkey type; the output parameter is cryptogram. Item 17602 formats theIKEY message into a buffer. Subroutine 17604 calls WRITE₋₋ DEB, whichoutputs the buffer to the selected board. Subroutine 17606 calls PRODEB, which inputs the response from the selected board. Decision 17608determines whether an error occurred in the response from the board. Ifso, the subroutine returns. If not, subroutine 17610 copies the AH-tokeninto the variable Cryptogram. The subroutine returns Cryptogram.

FIG. 177 is a flow diagram of subroutine DO₋₋ LCDT. This subroutineperforms the LCDT function. The input parameters are board number andindex number; the output parameter is table. Item 17702 formats the LCDTmessage into a buffer. Subroutine 17704 calls WRITE₋₋ DEB, which outputsthe buffer to the selected board. Item 17708 delays two seconds.Subroutine 17710 calls PRO₋₋ DEB, which inputs the response from theselected board. Decision 17712 determines whether an error occurred inthe response from the board. If so, the subroutine returns a value of 1.If not, the subroutine returns.

FIG. 178 is a flow diagram of subroutine DO₋₋ LENT. This subroutineperforms the LENT function. The input parameters are board number, indexnumber, key and table. Item 17802 formats the LENT message into abuffer. In blocks 17804 through 17812, the subroutine outputs thebuffer, 50 bytes at a time, to the board. Item 17804 initializes thepointer p to point to the buffer and the variable i equal to 1. Item17806 sets Wlen equal to the maximum of either 50 or the number of bytesleft in the buffer. Subroutine 17808 calls WRITE₋₋ DEB to output thenumber of bytes specified by Wlen to the board. Item 17810 increases thepointer p by Wlen. Decision 17812 determines whether the pointer ppoints to a null character, which indicates the end of the message. Ifnot, the subroutine continues to item 17806. If so, item 17814 delaysfor three seconds to allow the write to the board to complete.Subroutine 17816 calls PRO₋₋ DEB, which inputs the response from theselected board. Decision 17818 determines whether an error occured inthe response from the board. If so, the subroutine returns a 1. If not,the subroutine returns a zero.

FIG. 179 is a flow diagram of subroutine DO₋₋ LKEY. This subroutineperforms the LKEY function. The input parameters are board number, partnumber and the data to be loaded; the output parameter is the checkdigits. Item 17902 formats the LKEY message into a buffer. Subroutine17904 calls WRITE₋₋ DEB, which outputs the buffer to the selected board.Subroutine 17906 calls PRO₋₋ DEB, which inputs the response from theselected board. Decision 17908 determines whether an error occurred inthe response from the board. If so, the subroutine returns. If not,subroutine 17910 copies the AE token into the variable Check₋₋ Digits.The subroutine returns Check₋₋ Digits.

FIG. 180 is a flow diagram of subroutine DO₋₋ LMKT. This subroutineperforms the LMKT function. The input parameters are board number, indexnumber, modifier, and cryptogram. Item 18002 formats the LMKT messageinto a buffer. Subroutine 18004 calls WRITE₋₋ DEB, which outputs thebuffer to the selected board. Subroutine 18006 calls PRO₋₋ DEB, whichinputs the response from the selected board. Decision 18008 determineswhether an error occurred in the response from the board. If so, thesubroutine returns a 1. If not, the subroutine returns a zero.

FIG. 181 is a flow diagram of subroutine DO₋₋ RESET. This subroutineperforms the reset of the MFK and KEK. The input parameter is the boardnumber. Item 18102 formats a CLWA message into a buffer and sets theBJ-token data equal to a 3 to clear the MFK and KEK. Subroutine 18104calls WRITE₋₋ DEB, which outputs the buffer to the selected board. Item18108 delays two seconds to allow the board to complete the clearing ofthe MFK and KEK. Subroutine 18110 calls PRO₋₋ DEB, which inputs theresponse from the selected board. Decision 18112 determines whether anerror occurred in response from the board. If so, the subroutine returnsa 1. If not, the subroutine returns a zero.

FIG. 182 is a flow diagram of subroutine DO₋₋ RKEY. This subroutineperforms the RKEY function. The input parameter is board number; theoutput parameter is RKEY. Item 18202 formats the RKEY message into abuffer. Subroutine 18204 calls WRITE-DEB, which outputs the buffer tothe selected board. Subroutine 18206 calls PRO₋₋ DEB, which inputs theresponse from the selected board. Subroutine 18208 finds whether theAK-token is in the response message. Decision 18210 determines whetherthe token exists. If so, item 18212 copies the AK-token data into RKEYand returns. If not, the subroutine returns.

FIG. 183 is a flow diagram of subroutine DO₋₋ SKEY. This subroutineperforms the SKEY function. The input parameter is board number. Item18302 formats the SKEY message into a buffer. Subroutine 18304 callsWRITE₋₋ DEB, which outputs the buffer to the selected board. Item 18306sets the MFK and KEK check digits to a null value. Subroutine 18308calls PRO₋₋ DEB, which inputs the response from the board. Subroutine18310 finds the AK-token in the response message. Decision 18312determines whether such a token exists. If not, the subroutine returns avalue zero. If so, subroutine 18314 determines whether an AE-tokenexists in the response message. Decision 18316 determines whether such atoken exists. If not, the subroutine returns a value zero. If so,decision 18318 determines whether the AK-TOKEN data is a 3. If so, item18320 copies the MFK and the KEK check digits from the AE-TOKEN data andreturns a value zero. If not, decision 18322 determines whether theAK-TOKEN data is equal to a 2. If so, item 18324 copies the KEK checkdigit from the AE-token data and returns a value zero. If not, decision18326 determines whether the AK-TOKEN data is equal to a 1. If so, item18328 copies the MFK check digit from the AE-TOKEN data and returns aValue of zero. If not, decision 18330 determines whether the AK-TOKENdata is zero. If so, it returns a zero. If not, it returns a zero.

FIGS. 184A, 184B, 184C, 184D, 184D, 184E, and 184F are a flow diagram ofthe subroutine DO₋₋ STAT. This subroutine performs the STAT function.The input parameters are board numbers and reset flag. Decision 18402determines whether the board is up and running. If not, the subroutinereturns. If so, item 18404 sets all the board statistics to zero. Item18406 sets the board type based on the configuration. Decision 18408determines whether the variable Reset equals 1. If so, 18410 formats aSTAT message with all tokens set to zero and continues at subroutine18418. If not, decision 18412 determines whether Reset is equal to a 2.If so, item 18414 formats a STAT message with just the ZL-token andZP-token and continues at subroutine 18418. If not, item 18416 formats aSTAT message with all tokens present and none set to zero. Subroutine18418 calls WRITE₋₋ DEB, which outputs the buffer to the selected boardand continues at subroutine 18420 in FIG. 184B.

Subroutine 18420 calls PRO₋₋ DEB, which inputs the response from theselected board. Decision 18424 determines whether an error occurred inthe response from the board. If so, the subroutine returns. If not,subroutine 18426 finds the ZA-token. Decision 18428 determines whetherthe ZA-token exists. If so, the subroutine continues at 184120 on FIG.184H. If not, subroutine 18430 finds the ZB-token. Decision 18432determines whether the ZB-token exists. If so, item 18434 sets the datachecksum value to the ZB-token data. If not, subroutine 18436 finds theZC-token. Decision 18438 determines whether the ZC-token exists. If so,item 18440 sets the program checksum to the ZC-token data. Subroutine18442 finds the ZK-token. Decision 18444 determines whether the ZK-tokenexists. If so, item 18446 sets the control function count to theZK-token data. The subroutine continues at subroutine 18448 on FIG.184C.

Subroutine 18448 finds the ZD-token. Decision 18450 determines whetherthe ZD-token exists. If so, item 18452 sets the total transaction countto a ZD-token data. Subroutine 18454 finds the ZE-token. Decision 18456determines whether the ZE-token exists. If so, item 18458 sets the PINencrypt total to the ZE-token data. Subroutine 18460 finds the ZF-token.Decision 18462 determines whether the ZF-token exists. If so, item 18464sets the PIN translate count to a ZF-token data. Subroutine 18466 findsthe ZG-token. Decision 18468 determines whether the ZG-token exists. Ifso, item 18470 sets the PIN verify count to the ZG value. Subroutine18472 finds the ZH-token. Decision 18474 determines whether the ZH-tokenexists. If so, item 18476 sets the data function count to the ZH-tokendata.

Subroutine 18478 finds the ZI-token. Decision 18480 determines whetherthe ZI-token exists. If so, item 18482 sets the Key Table function countto the ZI-token data. Subroutine 18484 finds the ZJ-token. Decision18486 determines whether the ZJ-token exists. If so, item 18488 sets theWorking Key function count to the ZJ-token data. Subroutine 18490 findsthe ZL-token. Decision 18492 determines whether the ZL-token exists. Ifso, item 18494 sets the error totals to the ZL-token data. Subroutine18496 finds the ZM-token. Decision 18498 determines whether the ZM-tokenexists. If so, item 184100 sets the PIN format error count to theZM-token data. Subroutine 184102 finds the ZN-token. Decision 184104determines whether the ZN-token exists. If so, item 184106 sets the PINverifies "Y" count to the ZN-token data. The subroutine then continuesto subroutine 184108 on FIG. 184E.

Subroutine 184108 finds the ZO-token. Decision 184110 determines whetherthe ZO-token exists. If so, item 184112 sets the PIN verifies "N" countto the ZO-token data. Subroutine 184114 finds the ZP-token. Decision184116 determines whether the ZP-token exists. If so, item 184118 setsthe time out error count to the ZP-token data. The subroutine thenreturns.

Referring to FIG. 184H, decision 184120 determines whether the ZA-tokendata equals zero. If so, item 184122 sets the current mode to solo andreturns. If not, decision 184124 determines whether the ZA-token data isequal to 1. If so, item 184126 sets the current mode to master andreturns. If not, decision 184128 determines whether the ZA-token data isequal to 2. If so, item 184130 sets the current mode to slave andreturns.

FIG. 185 is a flow diagram of subroutine PRO₋₋ DEB. This subroutineinputs data from a board. Item 18502 sets variable i equal to zero.Decision 18504 determines whether the board is up. If not, thesubroutine returns a zero value. If so, item 18506 sets the board to up.I/O block 18508 reads a character from the board and stores it into abuffer. Decision 18510 determines whether the character just read is the"]". If not, item 18516 increments variable i and loops to I/O block18508. If so, item 18512 checks to see if an error has occurred.Decision 18514 determines whether an error occurred. If so, thesubroutine returns a value zero. If not, the subroutine returns a valueof 1.

FIG. 186 is a flow diagram of subroutine CHKERR. This subroutinedetermines whether an AO-token has been received indicating an error.Item 18602 sets DEB₋₋ Error₋₋ Code equal to zero. Subroutine 18606 callsFIND₋₋ TOKEN to find the AO-token. Decision 18608 determines whether theAO-token exists. If not, the subroutine returns a value of 1. If so,decision 18610 determines whether the AO-token data is equal to "ERRO".If not, t subroutine returns a zero value. If so, function 18612 callssubroutine FIND₋₋ TOKEN to find the AM-token, and sets DEB₋₋ Error₋₋Code to the return value. Subroutine 18614 calls FIND₋₋ TOKEN to findthe AN-token and sets DEB₋₋ Error₋₋ Tok to the return value. Subroutine18618 calls FIND₋₋ TOKEN to find the BB-token and sets DEB₋₋ ERROR₋₋ MSGto the return value. I/O block 18616 displays an error messageindicating that the error-token has been received and returns a value of1.

FIG. 187 is a flow diagram of subroutine of FIND₋₋ TOKEN. Thissubroutine finds a particular token in the input message. The inputparameter is the token to find. Item 18702 sets the pointer to thebeginning of the input message buffer. Item 18704 retrieves the firstcharacter from the input message. Decision 18706 determines whether thefirst character is a "[". If not, the subroutine returns a value of 1.If so, subroutine 18708 calls NEXT₋₋ TOKEN to retrieve the next token inthe input string. Item 18710 compares t hat next token with the tokenpassed as a parameter to find. Decision 18712 determines whether thosetokens are the same. If so, the subroutine continues at decision 18716.If not, decision 18614 determines whether the next-token is a non-nullcharacter; if so, the subroutine loops to subroutine 18708; if not thesubroutine continues at decision 18716. Decision 18716 determineswhether the next-token is a non-null character. If so, the subroutinereturns a value of 1. If not, the subroutine returns a value of zero.

FIG. 188 is a flow diagram of subroutine NEXT₋₋ TOKEN. This subroutinelocates the next-token in the input message. The input parameter is apointer to the input message buffer. Decision 19902 determines whetherthe pointer points a null value. If so, the subroutine returns a nullvalue. If not, Decision 18804 determines whether the pointer points to a"]". If so, the subroutine returns a null value. If not, item 18806 setsglobal variable, which points at current token T₋₋ STR, equal to thepointer. Item 18808 sets T₋₋ DATA, a global variable which points attoken data equal to a pointer plus 2. Item 18810 sets T₋₋ LEN, a globalinteger variable is set to the length of token data equal to zero.Decision 18812 determines whether the pointer points to a ";". If not,item 18814 increments the pointer and T₋₋ LEN and loops to decision18812. If so, the subroutine returns the pointer plus 1.

FIGS. 189, 190 and 191 are flow diagrams of the window managementsubroutines. The subroutines invoke the utility routines of the "WindowBoss" system by Star Guidance Consulting. Referring to FIG. 189,subroutine 18902 calls WN OPEN, which is a Window Boss routine thatopens a window and returns the pointer to the window in WN. Decision18904 determines whether WN is equal to null. If so, the subroutinereturns with the value WN. If not, decision 18906 determines if windowcount is greater than zero. Window count indicates the number of windowscurrently open. Window count is also an index into an array named Open₋₋Windows. Open₋₋ Windows contains the pointer to each window that iscurrently open in the system. The subroutine uses Open₋₋ Windows as astack. If the result of decision 18906 is yes, subroutine 18908 callsWN₋₋ SINGLE₋₋ BORDER, pointing to the top window in the stack. This is awindow boss subroutine which puts a single border around the window.Subroutine 18910 calls WN₋₋ RETITLE, pointing to the top window in thestack, which is a window boss subroutine which retitles the window andsubroutine continues at item 18912. If the result of decision 18906 isno, item 18912 pushes the pointer to the newly opened window onto thestack. Subroutine 18914 calls WN₋₋ DOUBLE₋₋ BORDER, with the pointerpointing to the newly opened window. This is a Window Boss subroutinewhich puts a double border around the window. Item 18916 increments thewindow count and returns with the value of the WN.

FIG. 190 is a flow diagram of subroutine CLOSE₋₋ WINDOW. This subroutinecloses the last open window. The input parameter is the pointer to thelast open window. Decision 19002 determines whether WINDOW₋₋ COUNT isequal to zero. If so, an internal error has occurred and I/O block 19004outputs a message and exits the program. If not, decision 19006determines whether the passed window pointer is equal to the windowpointer at the top of the stack. If not, there is an internal error andI/O block 19004 outputs the message and exits the program. If so,subroutine 19008 calls WN₋₋ CLOSE, which is a Window Boss routine toclose the window. Item 19010 decrements WINDOW₋₋ COUNT. Decision 19012determines whether the WINDOW₋₋ COUNT is greater than zero. If not, thesubroutine returns. If so, subroutine 19014 calls DOUBLE₋₋ BORDER withthe pointer of the top window in the stack. This is a Window Bosssubroutine which puts a double border on the window. Subroutine 19016calls RETITLE₋₋ WINDOW pointing to the top window in the stack. This isa Window Boss routine which retitles the window. The subroutine thenreturns.

FIG. 191 is a flow diagram of subroutine CLOSE₋₋ WINDOWS. Thissubroutine closes all the windows that are currently open. Item 19102sets the variable In₋₋ Help to false. Decision 19104 determines whetherWINDOW₋₋ COUNT is greater than zero. If not, the subroutine returns. Ifso, subroutine 19106 calls WN₋₋ CLOSE, with a parameter pointing to thetop window in the stack. Item 19108 decrements WINDOW COUNT and loops todecision 19104.

FIG. 192 is a flow diagram of subroutine SHOW₋₋ MODE. This subroutinedisplays the user level on the screen. Item 19202 formats a message withthe user level in it. I/O block 19204 outputs the buffer to the screenand returns.

FIG. 193 is a flow diagram of subroutine CHANGE₋₋ MODES. This subroutineallows the user to change the user level. 19302 determines if thecurrent user level is greater than zero. If so, item 19304 sets userlevel equal to zero and subroutine 19308 calls SHOW₋₋ MODE and returns.If not, item 19310 sets variable Nohot equal to 1. Item 19312 copies thestring "Login" to the Help Key word. I/O block 19314 displays a messageto please enter the password. Subroutine 19316 calls GET₋₋ TEXT to inputthe password. Decision 19118 determines whether the password has alength equal to zero. If so, the subroutine continues at item 19346. Ifnot, item 19320 pads the password with blank spaces Subroutine 19322calls an encryption routine to encrypt the password. Item 19323 setsvariable i equal to the maximum number of user levels. Decision 19326determines whether the encrypted password is equal to the encryptedpassword for variable i minus 1. If so, the subroutine continues at item19342. If not, item 19328 decrements variable i. Decision 19330determines whether variable i is greater than zero. If so, thesubroutine loops to decision 19326. If not, I/O block 19332 outputs aninvalid pass Item 19334 increments Bad₋₋ Tries. Decision 19346determines whether Bad₋₋ Tries is greater than 2. If so, I/O block 19338outputs a message indicating that there will be a delay due to repeatedinvalid password entries and item 19340 delays for 30 seconds beforelooping back to subroutine 19316. If not, the subroutine loops back to19316.

Item 19342 sets user level equal to Variable i. Item 19344 sets Bad₋₋Tries equal to zero. Item 19346 sets Nohot equal to zero. I/O block19348 clears the description at the bottom of the screen. Subroutine19350 calls SHOW₋₋ MODE and returns.

FIGS. 194A, 194B, 194C, 194D and 194E are a flow diagram of subroutineGETKEY. This subroutine inputs a key from the keyboard and returns thekey. This subroutine determines whether the key was a special functionkey and takes appropriate action. This subroutine is passed a wait flagas an input parameter. The wait flag indicates that this subroutineshould not wait for a key to be depressed, should wait a brief periodfor a key to be depressed, or should wait a long period for a key to bedepressed. Decision 19402 determines whether a key has been pressed. Ifso, the routine continues at subroutine 19406. If not, decision 19404determines whether the wait flag indicates no wait. If so, thesubroutine returns a value zero. If not, the subroutine continues atsubroutine 19406. Subroutine 19406 sets the variable Now equal to thecurrent time. Decision 19408 determines whether a key has been pressed.If so, the subroutine continues at subroutine 19418 on FIG. 194B. Ifnot, decision 19410 determines whether the wait flag indicates a briefwait. If not, the subroutine continues at decision 19414. If so,decision 19412 determines whether 10 seconds have elapsed since thesubroutine was entered. If so, the subroutine returns a value of zero.If not, the subroutine continues at decision 19414. Decision 19414determines whether the subroutine has been waiting for a key to bepressed that is longer than the system idle time-out parameter. If not,the subroutine continues at decision 19408. If so, the subroutine jumpsto the Status Option of the Main Menu.

Referring now to FIG. 194B, subroutine 19418 reads the key into thevariable Key. Subroutine 19420 reads a keyboard modifier into the Key₋₋Mode variable Item 19422 sets Alt₋₋ Flag to the status of the Alt₋₋ Key.Decision 19424 determines if In₋₋ Help equals zero and In₋₋ Statusequals zero. If so, item 19426 calls CLEAR₋₋ STS. Item 19428 sets theScan Code variable to the scan code of the key pressed and continues atdecision 19430 of FIG. 194C.

Referring to FIG. 194C, decision 19430 determines whether the Alt₋₋ Flagis greater than zero. If not, the subroutine continues at 19464 on FIG.194D. If so, decision 19432 determines whether Nohot equals 1. If so,the subroutine loops to decision 19408 on FIG. 194A. If not, decision19434 determines whether the scan code indicates a "K". If so,subroutine 19436 calls CLOSE₋₋ WINDOWS and subroutine 19438 jumps to theKeys section of the Main Menu. If not, decision 19440 determines whetherthe scan code indicates a zero was pressed. If so, 19442 calls CLOSE₋₋WINDOWS, and subroutine 19444 jumps to the Options section of the MainMenu. If not, 19446 determines whether the scan code indicates a "U" waspressed. If so, subroutine 19448 calls CLOSE₋₋ WINDOWS and subroutine19450 jumps to the Utilities section of the Main Menu. If not, decision19452 determines whether the scan code indicates that an "S" waspressed. If so, subroutine 19454 calls CLOSE₋₋ WINDOWS and subroutine19456 jumps to the Status section of the Main Menu. If not, decision19458 determines whether the scan code indicates a "Q" was pressed. Ifso, subroutine 19460 calls CLOSE₋₋ WINDOWS and subroutine 19462 jumps tothe Quit section of the Main Menu. If not, the subroutine continues atdecision 19464 on FIG. 194D.

Referring to FIG. 194D, decision 19464 determines whether scan codeindicates the F1-key was pressed. If not, the subroutine continues atdecision 19478. If so, decision 19466 determines whether In₋₋ Help isgreater than zero. If so, the subroutine jumps to decision 19408 on FIG.194A. If not, item 19468 sets In₋₋ Help equal to 1. Item 19470initializes the help buffer. Subroutine 19472 calls HELP. I/O block19474 empties the keyboard buffer. Item 19476 sets In Help equal to zeroand loops to decision 19408 on FIG. 194A. Decision 19478 determineswhether the scan code indicates the F2 key was pressed. If not, thesubroutine continues at decision 19488 on FIG. 194E. If so, decision19480 determines whether In₋₋ Info is greater than zero. If so, thesubroutine loops to decision 19408 on FIG. 194A. If not, item 19482 setsIn₋₋ Info equal to 1. Subroutine 19484 calls subroutine INFO. Item 19486sets In₋₋ Info equal to zero and continues at decision 19488 on FIG.194E.

Referring to FIG. 194E, decision 19488 determines whether the scan codeindicates that the F9-key was pressed. If not, the subroutine continuesat decision 19498. If so, decision 19490 determines whether In₋₋Changemode is greater than zero. If so, the subroutine loops to decision19408 on FIG. 194A. If not, item 19492 sets In₋₋ Changemode equal to 1.Subroutine 19494 calls CHANGE₋₋ MODES. Item 19496 sets In₋₋ Changemodeequal to zero and loops to decision 19408 on FIG. 194A. Decision 19498determines whether the scan code indicates that the FIO-key was pressed.If so, subroutine 194100 calls CLOSE₋₋ WINDOWS and subroutine 194102jumps to the Main Menu. If not, decision 194104 determines whetherShift₋₋ Flag is equal to a 1. If so, subroutine I94106 calls TOLOWER todownshifts the key and returns the key. If not, decision 194108determines whether Shift₋₋ Flag equals 2. If so, subroutine 194110 callsTOUPPER to upshift the key. If not, the subroutine returns the key.

FIGS. 143A, 143B, 143C and 195 through 206 are a flow diagram of theKEYSMENU subroutine. This subroutine inputs the Keys Option and performsthat option. FIGS. 143A, 143B and 143C are a flow diagram of the portionof the subroutine which decodes the option selected. Referring to FIG.143A, subroutine 14302 calls OPEN₋₋ MENU₋₋ WINDOW. Subroutine 14304calls GET₋₋ MENU₋₋ OPTION, which returns the user input in rv. Decision14306 determines whether rv equals 1. If so, the subroutine continues atdecision 19502 of FIG. 195. If not, decision 14308 determines whether rvequals 2. If so, the subroutine continues at decision 19602 on FIG. 192.If not, decision 14310 determines whether rv equals 3. If so, thesubroutine continues at decision 19702 on FIG. 19702. If not, decision14212 determines whether rv equals 4. If so, the subroutine continues atdecision 19802 on FIG. 198. If not, the subroutine continues at decision14314 of FIG. 143B.

Referring to FIG. 143B, decision 14314 determines whether rv equals 5.If so, the subroutine jumps to decision 19202 on FIG. 199. If not,decision 14316 determines whether rv equals 6. If so, the subroutinejumps to decision 20002 on FIG. 200. If not, decision 14318 determineswhether rv equals 7. If so, the subroutine jumps to decision 20102 onFIG. 201. If not, decision 14320 determines whether rv equals 8. If so,the subroutine jumps to decision 20202 on FIG. 202. If not, decision14322 determines whether rv equals 9. If so, the subroutine jumps tosubroutine 20302 on FIG. 203. If not, the subroutine continues atdecision 14324 on FIG. 143C.

Referring to FIG. 143, decision 14324 determines whether rv equals 10.If so, the subroutine jumps to subroutine 20402 on FIG. 204. If not,decision 14326 determines whether rv equals 11. If so, the subroutinejumps to subroutine 20502 on FIG. 205. If not, the subroutine determineswhether rv equals 99. If not, the subroutine jumps to subroutine 14304on FIG. 143A. If so, subroutine 14330 calls CLOSE₋₋ WINDOW and returns.

Referring now to FIG. 195, decision 19502 determines whether user levelis less than 1. If so, subroutine 19504 calls CLOSE₋₋ WINDOW and thesubroutine returns. If not, subroutine 19506 calls a subroutine toprompt the user for the active group and returns the value in variablei. Decision 19508 determines whether the active group is less than 1 orgreater than the maximum number of boards. If so, I/O block 19510displays an invalid group message and the subroutine returns. If not,item 19512 sets variable j equal to zero. Decision 19514 determineswhether variable j is less than MAX₋₋ BOARDS. If not, the subroutinecontinues at decision 19522. If so, decision 19516 determines whetherthe board indicated by variable j is in the group indicated by variablei. If not, item 14518 increments variable j and loops to decision 19514.If so, item 19520 sets Active₋₋ Group equal to variable i and setsvariable i equal to zero. Decision 19522 determines whether variable iis greater than zero. If so, I/O block 19524 displays a messageindicating that there are no boards configured for the specified groupand the subroutine returns. If not, the subroutine returns.

Referring now to FIGS. 196 through 202, these routines work in a similarmanner, except that there is one routine for each key type.Specifically, the routine of FIG. 196 processes MFK; the routine of FIG.199 processes KEK; the routine of FIG. 198 processes PVK; the routine ofFIG. 199 processes KEK; the routine of FIG. 200 processes PEK; theroutine of FIG. 201 processes MAK; the routine of FIG. 202 processesDEK. Referring to FIG. 196, decision 19602 determines whether the userlevel is less than 4. If so, subroutine 19604 calls CLOSE₋₋ WINDOW andthe subroutine returns. If not, subroutine 19606 calls WARN₋₋ NOBOARDS.Decision 19608 determines whether any boards are up. If not, subroutine19604 calls CLOSE₋₋ WINDOW and the subroutine returns. If so, item 19610sets key type equal to MFK and the routine continues at subroutine 20602in FIG. 206.

Referring now to FIG. 203, subroutine 20302 calls WARN₋₋ NOBOARDS.Decision 20304 determines whether any boards are up. If so, subroutine20406 calls LOAD₋₋ KEYTABLE. The subroutine then continues at subroutine14304 on FIG. 143A.

Referring now to FIG. 204, subroutine 20402 calls WARN₋₋ NOBOARDS.Decision 20404 determines whether any boards are up. If so, subroutine20406 calls LOAD₋₋ DIEBOLD₋₋ TABLE₋₋. The subroutine then continues atsubroutine 14304 in FIG. 143A.

Referring now to FIG. 205, subroutine 20502 calls WARN₋₋ NOBOARDS.Decision 20504 determines whether any boards are up. If so, subroutine20506 calls DO₋₋ RKEY and I/O block 20508 displays the resulting randomvalue. The subroutine then continues at subroutine 14304 on FIG. 143A.

Referring now to FIG. 206, subroutine 20602 calls GET₋₋ KEY, whichreturns the key in rc. Decision 20604 determines whether rc indicatesthe Accept Key. If not, the subroutine continues at subroutine 14304 onFIG. 143A. If so, decision 20606 determines whether rv equals 2. If not,the subroutine continues at decision 20610. If so, subroutine 20608calls DO₋₋ IKEY for each board in the active group. I/O block 20616 thendisplays the resulting cryptogram and the subroutine loops to subroutine14304 on FIG. 143A. Decision 20610 determines whether rv equals 3. Ifnot, subroutine 20614 calls DO₋₋ CWKS for each active board in the groupand I/O block 20616 displays the resulting cryptogram and loops tosubroutine 14304 in FIG. 143A. If so, subroutine 20612 calls DO₋₋ IKEYwith key type equal to each active board in the group and I/O block20616 displays the results of the encryptogram and loops to subroutine14304 in FIG. 143A.

In summary, an improved multi-channel, fault-tolerant data encryptiondevice having a menu-driven, user-friendly interface and improvedtokenized message format has been described. Accordingly, other uses andmodifications will be apparent to a person of ordinary skill in the artand all of such uses and modifications are intended to fall within thescope of the appended claims.

APPENDIX 1 CONTROL FUNCTIONS ECHO-Echo Test

This command performs an echo test to verify that the Data EncryptionBoard's communication lines are functioning. When the board is workingproperly, ECHO messages you send to the board are returned intact, witha version number appended to the end.

    ______________________________________                                        Token   Length     Char     Definition                                        ______________________________________                                        REQUEST FORMAT                                                                AO      4          ECHO     Function number                                   AG      variable   xx       Message to be echoed                              RESPONSE FORMAT                                                               AO      4          ECHO     Response ID                                       BC      4          xx       Revision number                                                               (e.g., "v1.0")                                    AG      variable   xx       Message echoed                                    ______________________________________                                    

Syntax

REQUEST: [AOECHO;AGMESSAGE TEST;]

REPLY: [AOECHO;BCvx.x;AGMESSAGE TEST;]

EXAMPLES

[AOECHO;AGThis message is testing the ECHO function;][AOECHO;BCV2.0;AGThis message is testing the ECHO function]

Comments

A maximum of 255 characters allowed for token AG.

All characters allowed except for delimiter (semicolon).

TDLY-Transmit Delay

The Data Encryption Board can usually respond to a host computer fasterthan the host can receive information. Because of this, when the hostreceives messages from the board it can lose characters. This commandsets a fixed delay before messages are transmitted from the DataEncryption Board to the host computer, assuring that the host can keepup with the messages. Since the best delay time for your system must befound by trial and error, the ECHO function is a useful tool forexperimenting with delay times.

    ______________________________________                                        Token   Length       Char     Definition                                      ______________________________________                                        REQUEST FORMAT                                                                AO      4            TDLY     Function number                                 BA      3            0-9      Delay time in                                                                 milliseconds.                                   RESPONSE FORMAT                                                               AO      4            TDLY     Response ID                                     BA      3            0-9      Delay time in                                                                 milliseconds.                                   ______________________________________                                    

Syntax

REQUEST: [AOTDLY;BAxxx;]

REPLY: [AOTDLY;Baxxx;]

REQUEST: [AOTDLY;BAxxx;AGConext Field;]

REPLY: [AOTDLY;BAxxx;AGContext Field;]

Comments

Delay time remains in effect until changes, and stays in memory during apower down.

The default delay time is 1 millisecond.

The maximum delay time is 255 milliseconds.

CCDL-Change Check Digit Length

This command changes the number of check digits returned in the checkdigit field of the response message. You can set the check digit lengthto any number of characters from 1 to 8.

    ______________________________________                                        Token   Length       Char     Definition                                      ______________________________________                                        REQUEST FORMAT                                                                AO      4            CCDL     Function                                        AD      3            1-8      Check digit length                              RESPONSE FORMAT                                                               AO      4            CCDL     Function                                        AD      3            1-8      Check digit length                              ______________________________________                                    

Syntax

REQUEST: [AOCCDL;ADx;]

REPLY: [AOCCDL;ADx;]

REQUEST:[AOCCDL;ADx;AGContext Field;]

REPLY: [AOCCDL;ADx;AGContext Field;]

Comments

Check digit length defaults to 4.

CLWA-Clear MFK or KEK Work Area

If you ever need to send your encryption board out of a secureenvironment (for example, if it needs servicing) you should not leaveimportant keys in the board. This function clears the MFK and/or KEKkeys in the Data Encryption Board.

    ______________________________________                                        Token   Length        Char       Definition                                   ______________________________________                                        REQUEST FORMAT                                                                AO      4             CLWA       Function                                     BJ      1             1-3        MFK = 1                                                                       KEK = 2                                                                       Both = 3                                     RESPONSE FORMAT                                                               AO      4             CLWA       Function                                     BJ      1             1-3        MFK = 1                                                                       KEK = 2                                                                       Both = 3                                     ______________________________________                                    

Syntax

REQUEST: [AOCLWA;BJx;]

REPLY: [AOCLWA;BJx;]

Examples

[AOCLWA;BJ3]

[AOCLWA;BJ3;]

Comments

This function only works with the KIS software.

IKEY-INJET MFK or KEK

This function injects the MFK or KEK into the DATa Encryption Board. Itloads the entire key, unlike LKEY, the function that loads key partsinto the board.

    ______________________________________                                        Token   Length       Char      Definition                                     ______________________________________                                        REQUEST FORMAT                                                                AO      4            IKEY      Function                                       BJ      1            1,2       MFK = 1                                                                       KEK = 2                                        AK      10           0-9       Date                                           RESPONSE FORMAT                                                               AO      4            IKEY      Function                                       BJ      1            1,2       MFK = 1                                                                       KEK = 2                                        AH      16           0-F       Cryptogram of                                                                 injected Key                                   AK      10           0-9       Date                                           ______________________________________                                    

Syntax

REQUEST: [AOIKEY;BJx;Akxxxxxxxxxx;]

REPLY: [AOIKEY;BJx;AHxxxxxxxxxxxxxxxx;AKxxxxxxxxxx;]

Examples

[AOIKEY;BJ1; AK0525881122;]

[AOIKEY;BJ1AH36A124F0EC665866; AK1115881122;]

AOIKEY;BJ2;AK0525881122;]

[AOIKEY;BJ2;AHBE85067E9AE4C049;AK1129881122;]

Comments

This function only works with KIS software.

SKEY-Status of MFK and KEK

This function returns the status of the MFK and KEK, so that You candetermine whether they are in the board or if they have been changed.

    ______________________________________                                        Token Length      Char     Definition                                         ______________________________________                                        REQUEST FORMAT                                                                AO    4           SKEY     Function                                           RESPONSE FORMAT                                                               AO    4           IKEY     Function                                           AK    1           0-3      0 = MFK and KEK cleared                                                       1 = MFK present                                                               2 = KEK present                                                               3 = MFK & KEK present                              AE    4-8         0-F      Check digits of MFK                                                           and/or KEK if present                              ______________________________________                                    

Syntax

REQUEST: [AOSKEY;]

REPLY: [AOSKEY;AKx;AExxxxxxxx;]

Examples

[AOSKEY;]

[AOSKEY;AK3;AE0C7FC133;]

RKEY-Random Key Generation

This function creates pseudo-random data.

    ______________________________________                                        Token    Length       Char      Definition                                    ______________________________________                                        REQUEST FORMAT                                                                AO       4            RKEY      Function                                      RESPONSE FORMAT                                                               AO       4            RKEY      Function                                      AK       16           0-F       Random data                                   ______________________________________                                    

Syntax

REQUEST: [AORKEY;]

REPLY: [AORKEY;AKxxxxxxxxxxxxxxxx;]

Examples

[AORKEY;]

[AORKEY;AK26C1A3206BBA6AF2;]

DESE-DES Encryption

This function encrypts data under the Data Encryption Standard (DES)data algorithm. Results from a DESE function can be reversed by usingDESD, the decrypt function.

    ______________________________________                                        Token   Length     Char     Definition                                        ______________________________________                                        REQUEST FORMAT                                                                AO      4          DESE     Function                                          BS      16         0-F      Encryption Key                                    AK      6          0-F      Data to be encrypted                              RESPONSE FORMAT                                                               AO       4         DESE     Function                                          BS      16         0-F      Encryption Key                                    AK      16         0-F      Encrypted data                                    ______________________________________                                    

Syntax

REQUEST: [AODESE;BSxxxxxxxxxxxxxxxx;AKxxxxxxxxxxxxxxxx;]

REPLY: [AODESE;BSxxxxxxxxxxxxxxxx;AKxxxxxxxxxxxxxxxx;]

Examples

[AODESE;BSD768C70F203C8D01;AKBF967CF18C518527;]

[AODESE;BSD768Cb 70F203C8D01;AK16858891B8D7AA57;]

Comments

You can also use DESE to verify that a board is properly executing theDES algorithm. Using prepared test data available from the NationalBureau of Standards, compare test results to predicted results toanalyze board performance.

DESD-DES Decryption

This function decrypts data under the `DES ` data algorithm. Resultsfrom the encrypt function, DESE, sent through the DESD function shouldyield the original clear test.

    ______________________________________                                        Token   Length     Char     Definition                                        ______________________________________                                        REQUEST FORMAT                                                                AO       4         DESD     Function                                          BS      16         0-F      Decryption Key                                    AK      16         0-F      Data to be decrypted                              RESPONSE FORMAT                                                               AO       4         DESD     Function                                          BS      16         0-F      Decryption Key                                    AK      16         0-F      Decrypted data                                    ______________________________________                                    

Syntax

REQUEST: [AODESD;BSxxxxxxxxxxxxxxxx;AKxxxxxxxxxxxxxxxx;]

REPLY: [AODESD;BSxxxxxxxxxxxxxxxx;AKxxxxxxxxxxxxxxxx;]

Examples

[AODESD;BSBF967CF18C518527;AKD768C70F203C8D01;]

[AODESD;BSBF967CF18C518527;AK4BB4B5B0D9F8CBD1]

LKEY-Load Key

This function loads key parts into the Data Encryption Board.

    ______________________________________                                        Token   Length       Char      Definition                                     ______________________________________                                        REQUEST FORMAT                                                                AO      4            LKEY      Function                                       BJ      1            1-9       Part number                                    AK      16           0-F       Data to be loaded                              RESPONSE FORMAT                                                               AO      4            LKEY      Function                                       BJ      1            0-F       Part number                                    AE      4            0-F       Check digits                                   ______________________________________                                    

Syntax

REQUEST: [AOLKEY;BJx;AKxxxxxxxxxxxxxxxx;]

REPLY: [AOLKEY;BJx;AExxxx;]

Examples

[ALKEY;BJ1;AK1111AAAA1111AAAA;]

[AOLKEY;BJ1AE0C7F;]

[AOLKEY;BJ1;AK2222BBBB2222BBBB;]

[AOLKEY;BJ1;AEC133;]

Comments

This function works only with the KIS software.

A BJ of 1 (defining keys as only having one part) initializes the LKEYarea.

A BJ of 2-9 exclusive/OR's the LKEY area.

CWKS-Create Working Keys

This function creates working keys (such as the KPE, KC, and KMAC).

    ______________________________________                                        Token   Length       Char      Definition                                     ______________________________________                                        REQUEST FORMAT                                                                AO      4            CWKS      Function                                       AS      1            0-F       Specified Modifier                                                            0 = KEK                                                                       1 = KPE                                                                       2 = KC                                                                        3 = KMAC                                                                      4 = KPV                                                                       5 = ATM                                        RESPONSE FORMAT                                                               AO       4           CWKS      Function                                       AH      16           0-F       Cryptogram                                     ______________________________________                                    

Syntax

REQUEST: [AOCWKS;ASx;]

REPLY: [AOCWKS;AHxxxxxxxxxxxxxxxx;9 0

Examples

[AOCWKS;AS4;]

[AOCWKS;AH2D048A8DE0CFFDAE;]

Comments

Before you can execute a CWKS, you must first load the working area bydoing the LKEY function.

This function works only with the KIS software.

STAT-Status of Data Encryption Board

This function returns the status of different parameters in the DEB.

    ______________________________________                                        Token Length      Char     Definition                                         ______________________________________                                        REQUEST FORMAT                                                                AO    4           STAT     Function                                           ZA**  1           0-2      DEB type                                                                      0 = Alone                                                                     1 = Master                                                                    2 = Slave                                          RESPONSE FORMAT                                                               AO    4           STAT     Function                                           ZA    1           0-2      DEB type                                                                      0 = Alone                                                                     1 = Master                                                                    2 = Slave                                          ZB    4           0-F      2 byte checksum data                                                          area,MFK,KEK,Index,                                                           Diebold                                            ZC    4           0-F      2 byte checksum program                                                       area                                               ZD    8           0-F      Total number of Requests                           ZE    8           0-F      PIN encrypts                                       ZF    8           0-F      PIN translate                                      ZG    8           0-F      PIN verification                                   ZH    8           0-F      Data Functions                                     ZI    8           0-F      Key Table Functions                                ZJ    8           0-F      Working Key Functions                              ZK    8           0-F      Control Functions                                  ZL    8           0-F      Error Totals                                       ZM    8           0-F      IN Sanity Errors                                   ZN    8           0-F      presently not defined                              ZO    8           0-F      PIN `N`                                            ZP    8           0-F      Timeout Errors                                     ______________________________________                                         **Optional                                                               

Syntax

REQUEST: [AOSTAT;ZA;ZD;ZB;]

REPLY: [AOSTAT;ZA0;ZDxxxxxxxx;ZBxxxx;]

Examples

[AOSTAT;ZA;ZB;ZC;ZD;ZE;ZF;ZG;ZH;ZI;ZJ;ZK;ZL;ZM;ZN;ZO;ZP;]

[AOSTAT;ZA0;ZB6E44;ZC3321;ZD94123;ZE5602;ZG1A026;

ZH0;ZI0;ZJ0;ZKC;ZL456;ZMC0E;ZN0;ZOFCB;ZP0;]

CRYP-Cryptogram of Last Key

This function gives you the cryptogram of the last key injected. CRYPproves especially useful if you haven't loaded any keys in a while andare unsure of what key is in the board now. It also helps you verifythat no one else has been trying to load key parts.

    ______________________________________                                        Token   Length      Char      Definition                                      ______________________________________                                        REQUEST FORMAT                                                                AO       4          CRYP      Function                                        RESPONSE FORMAT                                                               AO       4          CRYP      Function                                        AH      16          0-F       Cryptogram of last                                                            key injected                                    AK      10          0-9       Date                                            ______________________________________                                    

Syntax

REQUEST: [AOCRYP;]

REPLY: [AOCRYP;AHxxxxxxxxxxxxxxxx;AKxxxxxxxxxx;]

Examples

[AOCRYP;]

[AOCRYP;AHBE85067E9AE4C049;AK0525881122;]

Comments

This function works only with the KIS software.

LCDT-Load Clear Diebold Number Table

    ______________________________________                                        Token   Length    Char     Definition                                         ______________________________________                                        REQUEST FORMAT                                                                AO       4        LCDT     Function                                           BR      1-3       0-F      Table Index                                        AK      512       0-F      Diebold Number Table                               RESPONSE FORMAT                                                               AO       4        86       Response ID                                        BR      1-3       0-9      Last Internal Table                                                           Index used for the                                                            Diebold Number Table                               ______________________________________                                    

Syntax

REQUEST: [AOLCDT;BRxxx;AKxxxx....xxxx;]

REPLY: [AOLCDT;BRxxx;]

REQUEST: [AOLCDT;BRxxx;AKxxxx....xxxx;]-Table Index

REPLY: [AOLCDT;BRxxx;]

REQUEST: [AOLCDT;BRxxx;AKxxxx....xxxx;AGContext Field;]

REPLY: [AOLCDT;BRxxx;AGContext Field;]

Examples

    __________________________________________________________________________    [AOLCDT;BR1;BOCB2A218EFAA6975311D6BE732647BCF04E2D89EE62F4B                   85FDDD0AB3564EB9A0B3A6DC933AD41FBD87987385714A967FF5A28DB24                   05DFC4C0EA3E037B0994CC4618759BB44AC8AF4200F6A2E2398DB088783                   6DC8659A7F95C1681A0FD319F7008E8CF56931AC7E499CAA41CE6C36AD4                   B585E396451FCB190DE19206B6F73284803F729D1DDE22B16E2F5DBBE0E                   FF1837D8B90C148B22CAE2002F337A32555ECAC6C98430AD5AA4CBA44D7                   3C8FBF491227A568F2652E9CD3BD63507EF560B730E99E7754DAC51034D                   97FEDA1661EB9D117C23DF8C682E50E404F1571FE91230151E72BA8077C                   586B3BCE6F4D8DFCD27A5E29951352CD76046169B31B5B740C8A0F;]                      [AOLCDT;BR01;]                                                                [AOLCDT;BR5;BOCB2A218EFAA6975311D6BE732647BCF04E2D89EE62F4B                   85FDDD0AB3564EB9A0B3A6DC933AD41FBD87987385714A967FF5A28DB24                   05DFC4C0EA3E037B0994CC4618759BB44AC8AF4200F6A2E2398DB088783                   6DC8659A7F95C1681A0FD319F7008E8CF56931AC7E499CAA41CE6C36AD4                   B585E396451FCB190DE19206B6F73284803F729D1DDE22B16E2F5DBBE0E                   FF1837D8B90C148B22CAE2002F337A32555ECAC6C98430AD5AA4CBA44D7                   3C8FBF491227A568F2652E9CD3BD63507EF560B730E99E7754DAC51034D                   97FEDA1661EB9D117C23DF8C682E50E404F1571FE91230151E72BA8077C                   586B3BCE6F4D8DFCD27A5E29951352CD76046169B31B5B740C8A0F;]                      [AOLCDT;BR05;]                                                                [AOLCDT;BR09;BOCB2A218EFAA6975311D6BE732647BCF04E2D89EE62F4                   B85FDDDOAB3564EB9A0B3A6DC933AD41FBD87987385714A967FF5A28DB2                   405DFC4C0EA3E037B0994CC4618759BB44AC8AF4200F6A2E2398DB08878                   36DC8659A7F95C1681A0FD319F7008E8CF56931AC7E499CAA41CE6C36AD                   4B585E396451FCB190DE19206B6F73284803F729D1DDE22B16E2F5DBBE0                   EFF1837D8B90C148B22CAE2002F337A32555ECAC6C98430AD5AA4CBA44D                   73C8FBF491227A568F2652E9CD3BD63507EF560B730E99E7754DAC51034                   D97FEDA1661EB9D117C23DF8C682E50E404F1571FE91230151E72BA8077                   C586B3BCE6F4D8DFCD27A5E29951352CD76046169B31B5B740C8A0F;AG                    Authorized by Carrington;]                                                    [AOLCDT;BR09;AGAuthorized by Carrington;]                                     __________________________________________________________________________

WORKING KEY FUNCTIONS GWKS-Generate Working Keys

GWKS generates a random key, then presents it in cryptogram form.

    ______________________________________                                        Token Length      Char     Definition                                         ______________________________________                                        REQUEST FORMAT                                                                AO    4           GWKS     Function                                           AS    1           0-F      The modifier of the MFK                                                       and KEK to use.                                    AP    *16         0-F      The KEK of the network                                                        node which has been                                                           encrypted under modi-                                                         fier 0 of the MFK.                                 RESPONSE FORMAT                                                               AO    6           GWKS     Function                                           B     16          0-F      The created working key                                                       encrypted under speci-                                                        fied modifier of MFK.                              BH    16          0-F      The created working key                                                       encrypted under speci-                                                        fied modifier of KEK.                              AE    4           0-F      Check digits                                       ______________________________________                                    

Syntax

REQUEST: [AOGWKS;ASx;APxxxxxxxxxxxxxxxx;]

REPLY: [AOGWKS;BGxxxxxxxxxxxx|xxxx;BHxxxxxxxxxxxxxxxx; AExxxx;]

REQUEST: [AOGWKS;ASx;APBDxxx;]

REPLY: [AOGWKS;BGxxxxxxxxxxxxxxxx;BHxxxxxxxxxxxxxxxx; AExxxx;]

REQUEST: [AOGWKS;ASx;APxxxxxxxxxxxxxxxx;AGContext Field;]

REPLY: [AOGKS;BGxxxxxxxxxxxxxxxx;BHxxxxxxxxxxxxxxxx; AExxxx;AGContextField;]

Examples

[AOGWKS;AS1;APD768C70F203C8D01;]

[AOGWKS;BG7F3B6B93B09DAAA5;BH36E5C4DA9A2E7EFB;AEBA8C;]

Comments

Token AS must precede token AP in all uses of GWKS, since the DEB boardshould know what modifier to use before it encrypts the key you pass it.For maximum security, keys should be separated according to theirintended use. Therefore, each type of key is encrypted under a differentmodifier of the MFK or KEK, fixed as follows: No modifier =MFK; 0=KeyExchange Key (KEK); 1=PIN Encryption Key (PEK); 2=Data Encryption Key(DEK); 3=Message Authentication Key (MAK); 4=PIN Verification Key (PVK);and 5=ATM Key.

TWKD-Translate Working Key for Distribution

By changing the modifier under which a key is encrypted, this commandtranslates a working key from encryption under the MFK to encryptionunder a KEK for transmission to another network.

    ______________________________________                                        Token Length     Char      Definition                                         ______________________________________                                        REQUEST FORMAT                                                                AO    4          TWKD      Function                                           AS    1          0-F       The modifier of the MFK                                                       and KEK to use.                                    AP    *16        0-F       The KEK of the network                                                        node which has been                                                           encrypted under modi-                                                         fier 0 of the MFK.                                 BG    *16        0-F       Working key encrypted                                                         under specified modi-                                                         fier of the MFK.                                   RESPONSE FORMAT                                                               AO    6          TWKD      Function                                           BH    16         0-F       The created working key                                                       encrypted under speci-                                                        fied modifier of KEK.                              AE    4          0-F       Check digits                                       ______________________________________                                    

Syntax

REQUEST: [AOTWKD;ASx;APxxxxxxxxxxxxxxxx; BGxxxxxxxxxxxxxxxx;]

REPLY: [AOTWKD;BHxxxxxxxxxxxxxxxx;AExxxx;]

REQUEST: [AOTWKD;ASx;APBDxxxx;BGBDxxxx;]-Table Index

REPLY: [AOTWKD;BHxxxxxxxxxxxxxxxx;AExxxx;]

REQUEST: [AOTWKD;ASx;APxxxxxxxxxxxxxxxx; BGxxxxxxxxxxxxxxxx;AGContextField;]

REPLY: [AOTWKD;BHxxxxxxxxxxxxxxxx;AExxxx; AGContext Field;]

Examples

[AOTWKD;AS5;AP5B039B70514113C6; BGC7F3674F3ED10D00;]

[AOTWKD;BHCEE9CD2EB6CFEE34;AE61C9;]

Comments

Token AS must precede token AP, since the DEB board should know whatmodifier to use before encrypting the key you pass it. For maximumsecurity, each type of key is encrypted under a different modifier ofthe MFK or KEK, fixed as follows: No modifier =MFK; 0=Key Exchange Key(KEK); 1=PIN Encryption Key (PEK); 2=Data Encryption Key (DEK);3=Message Authentication Key (MAK); 4=PIN Verification Key (PVK); and5=ATM Key.

TWKL-Translate Working Key for Local Storage

Translates a working key from encryption under the KEK stored in theData Encryption Board to encryption under the MFK. TWKL is similar toTWKD, but has some difference in message length.

    ______________________________________                                        Token   Length    Char      Definition                                        ______________________________________                                        REQUEST FORMAT                                                                AO      4         TWKL      Function                                          AS      1         0-F       The specified modifier                                                        to use.                                           BH      *16       0-F       The working key                                                               encrypted under                                                               specified modifier                                                            of the KEK.                                       RESPONSE FORMAT                                                               AO      4         TWKL      Function                                          BG      16        0-F       The working key                                                               encrypted under                                                               specified modifier                                                            of MFK.                                           AE      4         0-F       Check digits                                      ______________________________________                                    

Syntax

REQUEST: [AOTWKL;ASx;BHxxxxxxxxxxxxxxxx;]

REPLY: [AOTWKL;BGxxxxxxxxxxxxxxxx;AExxxx;]

REQUEST: [AOTWKL;ASx;BHBDxxxx;]-Table Index

REPLY: [AOTWKL;BGxxxxxxxxxxxxxxxx;AExxxx;]

REQUEST: [AOTWKL;ASx;BHxxxxxxxxxxxxxxxx;AGContext Field;]

REPLY: [AOTWKL;BGxxxxxxxxxxxxxxxx;AExxxx;AGContext Field;]

Examples

AOTWKL;AS3;BHBC8767E0C48B5507;]

AOTWKL;BGC7F3674F3ED10D00;AEDAA0;]

Comments

Token AS must precede token AP, since the DEB board should know whatmodifier to use before encrypting the key you pass it. For maximumsecurity, each type of key is encrypted under a different modifier ofthe MFK or KEK, fixed as follows: No modifier =MFK; 0=Key Exchange Key(KEK); 1=PIN Encryption Key (PEK); 2=Data Encryption Key (DEK);3=Message Authentication Key (MAK); 4=PIN Verification Key (PVK); and5=ATM Key.

TWKS--Translate Working Key for Local Storage--(Switch to Switch)

This function translates a working key from encryption under any KEK toencryption under the MFK for local storage, or for transmission to aremote location using the same MFK.

    ______________________________________                                        Token   Length    Char      Definition                                        ______________________________________                                        REQUEST FORMAT                                                                AO      4         TWKS      Function                                          AS      1         0-F       The specified modifier                                                        to use.                                           AP      *16       0-F       The KEK encrypted under                                                       under modifier 0 of                                                           the MFK.                                          BH      *16       0-F       The working key                                                               encrypted under                                                               specified modifier                                                            of KEK.                                           RESPONSE FORMAT                                                               AO      4         TWKS      Function                                          BG      16        0-F       The working key                                                               encrypted under                                                               specified modifier                                                            of MFK.                                           AE      4         0-F       Check digits                                      ______________________________________                                    

Syntax

REQUEST: [AOTWKS;ASx;APxxxxxxxxxxxxxxxx; BHxxxxxxxxxxxxxxxx;]

REPLY: [AOTWKS;BGxxxxxxxxxxxxxxxx;AExxxx;]

REQUEST: [AOTWKS;ASx;APBDxxx;BHBDxxx;]-Table Index

REPLY: [AOTWKS;BGxxxxxxxxxxxxxxxx;AExxxx;]

REQUEST: [AOTWKS;ASx;APxxxxxxxxxxxxxxxx; BHxxxxxxxxxxxxxxxx;AGContextField;]

REPLY: [AOTWKS;BGxxxxxxxxxxxxxxxx;AExxxx;AGContext Field;]

LATM-Load ATM Master Key (Diebold)

This function encrypts the master key your ATM uses to verify PINs sothat you can download the PIN to a Diebold ATM.

    ______________________________________                                        Token   Length    Char     Definition                                         ______________________________________                                        REQUEST FORMAT                                                                AO      4         LATM     Function                                           BJ      1         1        The ATM type                                       AS      2         0-F      The specified modifier                                                        to use.                                            AQ      *16       0-F      The Master Key                                                                encrypted under speci-                                                        fied modifier.                                     AK      *16       0-F      Cryptogram representing                                                       the key under which                                                           Master Key is to be                                                           encrypted under                                                               appropriate modifier.                              RESPONSE FORMAT                                                               AO      4         LATM     Function                                           BJ      1         0-F      ATM type                                           AC      16        0-F      The ATM Master Key                                                            encrypted under speci-                                                        fied modifier.                                     AE      4         0-F      Check digits                                       ______________________________________                                    

Syntax

REQUEST: [AOLATM;BJx;ASxx;AQxxxxxxxxxxxxxxxx; AKxxxxxxxxxxxxxxxx;]

REPLY: [AOLATM;BJx;ACxxxxxxxxxxxxxxxx;AExxxx;]

REQUEST: [AOLATM;BJx;ASxx;AQBDxxx;AKBDxxx;]-Table IndexAKxxxxxxxxxxxxxxxx;AGContext Field;]

REPLY: [AOLATM;BJx;ACxxxxxxxxxxxxxxxx;AExxxx;AGContext Field;]

Examples

AOLATM;BJ1;AS2;AQ9521A6FEE29AFA22;AKD1528482395C18F6;]

AOLATM;BJ1;ACb 60A53E441F515D9B;AE466A;]

LATM-Load ATM Master Key (IBM 3624)

This function encrypts and prepares a new IBM Master Key for downloadingto the IBM ATM. Unlike the Diebold version of LATM, the IBM format usestwo keys and makes a double encryption.

    ______________________________________                                        Token Length    Char     Definition                                           ______________________________________                                        REQUEST FORMAT                                                                AO    4         LATM     Function                                             BJ    1         3        The ATM type                                         AC    *16       0-F      The ATM Master Key                                                            encrypted under modi-                                                         fier 5 of the MFK.                                   AA    *16       0-F      The ATM A Key encrypted                                                       under modifier 1 of                                                           the MFK.                                             BK    *16       0-F      The ATM C Key encrypted                                                       under modifier 2 of                                                           the MFK.                                             BL    8         0-F      Bytes 5-8 in the IBM                                                          3624 Request Message.                                RESPONSE FORMAT                                                               AO    4         LATM     Function                                             BJ    1         0-F      ATM type                                             AC    24        0-F      The ATM Master Key                                                            encrypted under speci-                                                        fied modifier.                                       ______________________________________                                    

Syntax

REQUEST: [AOLATM;BJx;ACxxxxxxxxxxxxxxxx;AAxxxxxxxxxxxxxxxx;BKxxxxxxxxxxxxxxxx;BLxxxxxxxx]

REPLY [AOLATM;BJx;ACxxxxxxxxxxxxxxxxxxxxxxxx;]

REQUEST: [AOLATM;BJx;ACBDxxx;AABDxxx;BKBDxxx;BLxxxxxxxx]

REPLY: [AOLATM;BJx;ACxxxxxxxxxxxxxxxxxxxxxxxx;] ##STR1##

Examples

[AOLATM;BJ3;AC92B038D02E0AFDB0;AAEE4C4FB19FB2CE6D;BKFFCC4B3425BAD0C;BLC4FB19FB;]

[AOLATM;BJ3;ACEBE0Cb 450B8DDEBD214C0DBF3;]

[AOLATM;BJ3;AC90231E949CF1676A;AAEF77AD7865D41B01;BK77BE72A243794F0F;BL7AD7865D;AGFri Nov. 18, 1988 15:32:47;]

[AOLATM;BJ3;AC8757B618F7745F4-970C06BF;AGFri Nov. 18, 1988 15:32:47;]

CATC-Change ATM Comm Key (Diebold)

This function encrypts the ATM Communication Key for downloading to aDiebold ATM.

    ______________________________________                                        Token   Length    Char     Definition                                         ______________________________________                                        REQUEST FORMAT                                                                AO      4         CATC     Function                                           BJ      1         0-F      The ATM type                                       AS      1         0-F      The specified modifier                                                        to use.                                            AX      16*       0-F      The Comm Key encrypted                                                        under modifier 5 of                                                           the MFK.                                           AJ      16*       0-F      The Data Encryption Key.                           RESPONSE FORMAT                                                               AO      4         CATC     Function                                           BJ      1         0-F      ATM type                                           BK      16        0-F      The ATM Comm Key                                                              encrypted under the                                                           encryption key.                                    AE      4         0-F      Check digits                                       ______________________________________                                    

Syntax

REQUEST: [AOCATC;BJ1;ASxx;Axxxxxxxxxxxxxxxxx; AJxxxxxxxxxxxxxxxx;]

REPLY: [AOCATC;BJ1;BKxxxxxxxxxxxxxxxx;AExxx;]

REQUEST: [AOCATC;BJ1;ASxx;AXBDxxx;AJBDxxx;]-Table Index

REPLY: [AOCATC;BJ1;BKxxxxxxxxxxxxxxxx;AExxx;]

REQUEST: [AOCATC;BJ1;ASxx;AXxxxxxxxxxxxxxxxx;AJxxxxxxxxxxxxxxxx;AGContext Field;]

REPLY: [AOCATC;BJ1;BKxxxxxxxxxxxxxxxx;AExxx; AGContext Field;]

Examples

[AOCATC;BJ1;AS3;AX834CB0303170A396;AJE93F5B68C5794D84;]

[AOCATC;BJ1;BK2F431A8E86B98F43;AEA5BE;]

[AOCATC;BJ1;AS3;AX834CB0303170A396;AJE93F5B68C5794D84;] AGEffective12:01am Dec. 1, 1988;]

[AOCATC;BJ1;BK2F431A8E86B98F43;AEA5BE;AGEffective 12:01am Dec. 1, 1988;]

CATC-Change ATM Comm Key (IBM 3624)

CATC encrypts the ATM Communication Key for downloading to an IBM 3624ATM. The 24-character replies in the syntax represent the Dat and Padfields of the 3624 Request Message.

    ______________________________________                                        Token Length    Char     Definition                                           ______________________________________                                        REQUEST FORMAT                                                                AO    4         CATC     Function number                                      BJ    1         0-F      The ATM type                                         AI    *16       0-F      The Comm Key encrypted                                                        under modifier 2 of                                                           the MFK.                                             AK    *16       0-F      The ATM Master Key                                                            encrypted under speci-                                                        fied modifier.                                       BK    *16       0-F      Current Communication                                                         Key encrypted under                                                           modifier 2 of MFK                                    BL    8         0-F      IBM Request Message                                                           bytes 5-8                                            AS    1         1,2      Specified Modifier                                   RESPONSE FORMAT                                                               AO    4         CATC     Response ID                                          BJ    1         0-F      ATM type                                             BK    24        0-F      ATM Comm Key encrypted                                                        under the partial                                                             double encryption                                                             method.                                              ______________________________________                                    

Syntax ##STR2## REQUEST: [AOCATC;BJ3;AIBDxxx;AKBDxxx;BKBDxxx;BLxxxxxxxx;ASx;]-Table Index REPLY: [AOCATC;BJ3;BKxxxxxxxxxxxxxxxxxxxxxxxx;]##STR3## Examples

[AOCATC;BJ3AI2AF6B038FA70ACE6;AKE63F7C68C8A94D84;BK80D5C173317AE5E2;BL9FB859D4;AS2;]

[AOCATC;BJ3;BKFE4380A65E943D3BD8BD4F5A;]

    ______________________________________                                        [AOCATC;BJ3;AI2AF6B038FA70ACE6;                                               AKE63F7C68C8A94D84;BK80D5C173317AE5E2;BL9FB859D4;                             AS2;]                                                                         [AOCATC;BJ3;BKFE4380A65E943D3BD8BD4F5A;]                                      [AOCATC;BJ3;AI2AF6B038FA70ACE6;                                               AKE63F7C68C8A94D84;                                                           BK80D5C173317AE5E2;BL9FB859D4;AS2;AGEffective 12:01am                         Dec. 1, 1988;]                                                                [AOCATC;BJ3;BKFE4380A65E943D3BD8BD4F5A;AGEffective                            12:01am Dec. 1, 1988;]                                                        ______________________________________                                    

TWKN-Translate Working Key for Network Transfer

This functions translates a working key from encryption under the MFK toencryption under the KEK resident in the Data Encryption Board.

    ______________________________________                                        Token    Length   Char      Definition                                        ______________________________________                                        REQUEST FORMAT                                                                AO       4        TWKN      Function number                                   AS       1        0-F       Specified Modifier                                BG       *16      0-F       Working key encrypted                                                         under specified modi-                                                         fier of the MFK                                   RESPONSE FORMAT                                                               AO       4        TWKN      Response ID                                       BH       16       0-F       Working Key encrypted                                                         under specified                                                               modifier of KEK                                   AE       4        0-F       Check digits                                      ______________________________________                                    

Syntax

REQUEST: [AOTWKN;ASx;BGxxxxxxxxxxxxxxxx;]

REPLY: [AOTWKN;BHxxxxxxxxxxxxxxxx;AExxxx;]

REQUEST: [AOTWKN;ASx;BGBDxxx;]-Table Index

REPLY: [AOTWKN;BHxxxxxxxxxxxxxxxx;AExxxx;]

REQUEST: [AOTWKN;ASx;BGxxxxxxxxxxxxxxxx;AGContext Field;]

REPLY: [AOTWKN;BHxxxxxxxxxxxxxxxx;AExxxx;AGContext Field;]

GVWK-Generate Visa Working Key

This function generates a pseudo-random DES key for use in the VISANetwork.

    ______________________________________                                        Token   Length    Char      Definition                                        ______________________________________                                        REQUEST FORMAT                                                                AO      4         GVWK      Function number                                   BM      *16       0-F       VISA Zone Control                                                             Master Key                                        RESPONSE FORMAT                                                               AO      4         GVWK      Response ID                                       BI      16        0-F       Working Key encrypted                                                         under Zone Control                                                            Master Key                                        AX      16        0-F       Working Key encrypted                                                         under modifier 1 of                                                           MFK                                               AE      4         0-F       Check digits                                      ______________________________________                                    

Syntax

REQUEST: [AOGVWK;BMxxxxxxxxxxxxxxxx;]

REPLY: [AOGVWK;BIxxxxxxxxxxxxxxxx;AXxxxxxxxxxxxxxxxx; AExxxx;]

REQUEST: [AOGVWK;BMBDxxx;]-Table Index

REPLY: [AOGVWK;BIxxxxxxxxxxxxxxxx;AXxxxxxxxxxxxxxxxx; AExxxx;]

REQUEST: [AOGVWK;BMxxxxxxxxxxxxxxxx;AGContext Field;]

REPLY: [AOGVWK;BIxxxxxxxxxxxxxxxx;AXxxxxxxxxxxxxxxxx; AExxxx;AGContextField;]

PIN FUNCTIONS EPIN-PIN Encrypt

This functions encrypts a clear PIN for Transmission to the network.

    ______________________________________                                        Token   Length    Char     Definition                                         ______________________________________                                        REQUEST FORMAT                                                                AO       4        EPIN     Function                                           AX      *16       0-F      PIN Encryption Key                                                            encrypted under modi-                                                         fier 1 of the MFK                                  AF      4-12      0-9      Clear PIN to be                                                               encrypted                                          AV      12        0-F      12 Rightmost PAN digits                            RESPOSE FORMAT                                                                AO       4        EPIN     Response ID                                        AL      16        0-F      PIN block encrypted                                                           under the KPE                                      ______________________________________                                    

Syntax

REQUEST: [AOEPIN;AXxxxxxxxxxxxxxxxx; AFxxxxxxxxxxxx;AVxxxxxxxxxxxx; ]

REPLY: [AOEPIN;ALxxxxxxxxxxxxxxxx;]

REQUEST: [AOEPIN;AXBDxxx;AFxxxxxxxxxxxx; AVxxxxxxxxxxxx;]-Table Index

REPLY: [AOEPIN;ALxxxxxxxxxxxxxxxx;]

REQUEST: [AOEPIN;AXxxxxxxxxxxxxxxxx;AFxxxxxxxxxxxx;AVxxxxxxxxxxxx;AGContext Field;]

REPLY: [AOEPIN;ALxxxxxxxxxxxxxxxx;AGContext Field;]

Examples

[AOEPIN;AX8C87F909F35D1EAC;AF7425;AV756505312216;]

[AOEPIN;ALAFBC3932D7A2A02A;]

[AOEPIN;AX8C87F909F35D1EAC;AF7425;AV756505312216; AGEffective 12:01amDec. 1, 1988;]

[AOEPIN;ALAFBC3932D7A2A02A;AGEffective 12:01am Dec. 1, 1988;]

TPIN-PIN Translate

This function translates PINs from one encryption key to anotherencryption key and optionally from one PIN block format to ANSIalternate format.

    ______________________________________                                        Token   Length    Char     Definition                                         ______________________________________                                        REQUEST FORMAT                                                                AO      4         TPIN     Function number                                    AW      l         1-5      Input PIN block                                                               1 = ANSI                                                                      2 = IBM 3624                                                                  3 = PIN Pad                                                                   4 = IBM Encrypting                                                            PIN Pad format                                                                5 = Burroughs format                               AX      *16       0-F      PIN Encryption Key                                                            (Incoming)                                         BT      *16       0-F      PIN Encryption Key                                                            (Outgoing)                                         AL      16-18     0-F      Encrypted PIN                                      AK      var       0-F      Additional PIN                                                                block data                                         AG      1         0        Alternate Format 1                                                   A-F      Output PAD character                               RESPONSE FORMAT                                                               AO      4         TPIN     Response ID                                        AL      16        0-F      PIN block encrypted                                                           under the outgoing KPE                             BB      1         Y,N      Indicator whether PIN                                                         block format is valid                              AG      1         0        Alternate format                                           1         0-F      Output PAD character                               ______________________________________                                    

Syntax ##STR4## [REQUEST:[AOPIN;AWx;AXBDxxx;BTBDxxx;ALxxxxxxxxxxxxxxxxxx;AKxxxx....xxxx;AG0x;[-Table Index

REPLY: [AOTPIN;ALxxxxxxxxxxxxxxxx;BBY;AG;0x;]

Examples

[AOTPIN;AW1;AX2DD4F011AF743C15;BT545E2DA629656371;ALA248E10FA1047A8C;AK505413713492;]

[AOTPIN;AL9ECBB9BB9B16BB4F578;BBY;]

[AOTPIN;AW1;AX98ED248067056577;BT1F104EF0B9CCE4A4;AL9219115CCE7B4129;AK013986960105;AG0B;]

[AOTPIN;Al737A70C7C4705DE0;BBY;AG0B;]

    __________________________________________________________________________    [AOTPIN;AW3;AXAF013560ED422A98;BT5FBAD3A5FDFB722E;                            AL3A0F685D45293213;                                                           AKC;184498103394;AGOC;]                                                       [AOTPIN;AL8926B4F9A7316AFD;BBY;AG0C;]                                         __________________________________________________________________________

[AOTPIN;AW3;AX2C704A2A54B8C4BE;BT5008D16FE18641F4;ALC23C2A66897C9AEC;976470135455;]

[AOTPIN;AL6AE3CCB83F63AF0A;BBY;]

Comments

In TPIN token AG, normally a context field, determines what alternateANSI format is used for the PIN block. AG requires 0 (zero) as the firstcharacter in order to interpret subsequent characters as formattinginstructions, rather than interpreting them as a context message ordescription. You can use AG for message text as long as your messagedoes not begin with a zero.

If you want to use AG both to express a format and to add a contextfield, you can do so by inserting a delimiter. In this case, the syntaxis: AG0;F; tag field message.

VPIN-PIN Verification-IBM 3614

VPIN decrypts and verifies incoming PIN blocks, using the IBM 3624 PINverification algorithm.

    ______________________________________                                        Token    Length  Char      Definition                                         ______________________________________                                        REQUEST FORMAT                                                                AO        4      VPIN      Function                                           BF        1      2         Verification Method                                AW        1      1-5       Input PIN block type                                                          1 = ANSI                                                                      2 = IBM 3624                                                                  3 = PIN Pad                                                                   4 = IBM Encrypting PIN                                                        Pad format                                                                    5 = Burroughs Format                               AL       16-18   0-F       Encrypted PIN (PIN                                                            Block)                                             AX       *16     0-F       PIN Encryption Key                                                            (Incoming)                                         BS       *16     0-F       Decimalization table                                                          mapping                                            AY        4-16   0-9       Offset applied to                                                             generated PIN                                      BE        4-16   0-9       Validation Data                                    AT        1      A-F       Pad character for the                                                         PAN or incoming PIN                                                           PIN block                                          AD        1      4-C       Check Length                                       AZ       *16     0-F       PIN verification Key                               AK       var     0-F       Additional PIN Block                                                          Data                                               RESPONSE FORMAT                                                               AO        4      VPIN      Response ID                                        BB        1      Y,N,S     Indicator whether                                                             PIN is verified                                                               Y = verified                                                                  N = not verified                                                              S = sanity (formatting)                                                       error.                                             ______________________________________                                    

Syntax ##STR5## VPIN 3624 Examples

    __________________________________________________________________________    [AOVPIN;BF2;AW1;ALE3413D41CE1D2A8C;AXE332CA365425C276;                        BS5684666775032955;AY7909;BE9458;ATA;AD4;                                     AZ8D148B4C0E6D975D;AK023369824723;]                                           [AOVPIN;BBY;]                                                                 [AOVPIN;BF2;AW1;ALE3413D41CE1D2A8C;AXE332CA365425C276;                        BS5684666775032955;AY7909;BE9458;ATA;AD4;                                     AZ8D148B4C0E6D975D;AK023369824723;                                            AGFriday, November 25, 1988 14:35:58;]                                        [AOVPIN;BBY;AGFriday, November 25, 1988 14:35:58;]                            __________________________________________________________________________

VPIN-PIN Verification-DIEBOLD

    ______________________________________                                        Token    Length  Char      Definition                                         ______________________________________                                        REQUEST FORMAT                                                                AO        4      VPIN      Function                                           BF        1      5         Verification Method                                AW        1      1-5       Input PIN block type                                                          1 = ANSI,                                                                     2 = IBM 3624                                                                  3 = PIN Pad                                                                   4 = IBM Encrypting PIN                                                        Pad format                                                                    5 = Burroughs format                               AL        16     0-F       Encrypted PIN (PIN                                                            Block)                                             AX       *16     0-F       PIN Encryption Key                                                            (Incoming)                                         AV       4-16    0-F       account number                                     AY       4-16    0-9       Offset applied to                                                             generated PIN                                      BU        2      0-9       Diebold algorithm                                  BR        2      0-9       Diebold Table Index                                                           number                                             AK       var     0-F       Additional PIN Block                                                          Data                                               RESPONSE FORMAT                                                               AO        4      VPIN      Response ID                                        BB        1      Y,N,S     Indicator whether PIN                                                         is verified                                                                   Y = verified                                                                  N =  not verified                                                             S = sanity error.                                  ______________________________________                                    

Syntax ##STR6## VPIN Diebold Examples

    __________________________________________________________________________    [AOVPIN;BF2;AW3;ALB401536D423A5179;AXAA34613DB1507BCC;                        BS2571307377290783;AY6702;BE4411680595014110;ATA;AD4;                         AZ402BBF5E97495925;AKA;000000000000;]                                         [AOVPIN;BBY;]                                                                 [AOVPIN;BF2;AW3;ALB401536D423A5179;AXAA34613DB1507BCC;                        BS2571307377290783;AY6702;BE4411680595014110;ATA;AD4;                         AZ402BBF5E97495925;AKA;000000000000;AGFriday, November 25,                    1988 14:36:00;]                                                               [AOVPIN;BBY;AGFriday, November 25, 1988 14:36:00;]                            __________________________________________________________________________

DATA FUNCTIONS EDAT-Encrypt Data

This function encrypts data for subsequent secure transmission.

    ______________________________________                                        Token    Length  Char      Definition                                         ______________________________________                                        REQUEST FORMAT                                                                AO        4      EDAT      Function                                           AI       *16     0-F       KC encrypted under                                                            modifier 2 of the MFK                              AK        16     0-F       Data to be encrypted                               RESPONSE FORMAT                                                               AO        4      EDAT      Response ID                                        AK        16     0-F       Encrypted data                                     ______________________________________                                    

Syntax

AOEDAT;AIxxxxxxxxxxxxxxxx;AKxxxxxxxxxxxxxxxx;]

REPLY: AOEDAT;AKxxxxxxxxxxxxxxxx;]

REQUEST: [AOEDAT;AIBDxxx;AKxxxxxxxxxxxxxxxx;]-Table Index

REPLY: [AOEDAT;AKxxxxxxxxxxxxxxxx;]

REQUEST: [AOEDAT;AIxxxxxxxxxxxxxxxx;AKxxxxxxxxxxxxxxxx; AGContextField;]

REPLY: [AOEDAT;AKxxxxxxxxxxxxxxxx;AGContext Field;]

Examples

[AOEDAT;AI54CB448FCF15ADB6;AKEE858EC8BF75F7E2;]

[AOEDAT;AK404C429076E70E5B;]

[AOEDAT;AI54CB448FCF15ADB6;AKEA44B2934F72325B;AGReplacement for Januarykey;]

[AOEDAT;AKBA37546A729A30DB;AGReplacement for January key;]

DDAT-Decrypt Data

This function decrypts data.

    ______________________________________                                        Token   Length    Char     Definition                                         ______________________________________                                        RESPONSE FORMAT                                                               AO       4        DDAT     Function                                           AI      *16       0-F      KC encrypted under                                                            modifier 2 of the MFK                              AK      16        0-F      Data to be decrypted                               RESPONSE FORMAT                                                               AO       4        DDAT     Response ID                                        AK      16        0-F      Decrypted data                                     ______________________________________                                    

Syntax

REQUEST: [AODDAT;AIxxxxxxxxxxxxxxxx;AKxxxxxxxxxxxxxxxx;]

REPLY: [AODDAT;AKxxxxxxxxxxxxxxxx;]

REQUEST: [AODDAT;AIBDxxx,AKxxxxxxxxxxxxxxxx;]-Table Index

REPLY: [AODDAT;AKxxxxxxxxxxxxxxxx;]

REQUEST: [AODDAT;AIxxxxxxxxxxxxxxxx;AKxxxxxxxxxxxxxxxx; AGContextField;]

REPLY: [AODDAT;AKxxxxxxxxxxxxxxxx;AGContext Field;]

Examples

]AODDAT;AI54CB448FCF15ADB6;AK89AD95F1544BAEA3;]

[AODDAT;AKFB2DAD0B926CE736;]

DTRA-DATA Translate

This function translates data from encryption under KCI to encryptionunder KCJ.

    ______________________________________                                        Token    Length  Char      Definition                                         ______________________________________                                        REQUEST FORMAT                                                                AO        4      DTRA      Function number                                    AI       *16     0-F       KC encrypted under                                                            modifier 2 of the MFK                                                         (Incoming)                                         AJ       *16     0-F       KC encrypted under                                                            modifier 2 of the MFK                                                         (Outgoing)                                         AK        16     0-F       Data encrypted under KCI                           RESPONSE FORMAT                                                               AO        4      DTRA      Response ID                                        AK        16     0-F       Encrypted data under new                                                      key                                                ______________________________________                                    

Syntax

REQUEST: [AODTRA;AIxxxxxxxxxxxxxxxx;AJxxxxxxxxxxxxxxxx;AKxxxxxxxxxxxxxxxx;]

REPLY: [AODTRA;AKxxxxxxxxxxxxxxxx;]

REQUEST: [AODTRA;AIBDxxx;AJBDxxx;AKxxxxxxxxxxxxxxxx;]-Table Index

REPLY: [AODTRA;AKxxxxxxxxxxxxxxxx;]

REQUEST: [AODTRA;AIxxxxxxxxxxxxxxxx;AJxxxxxxxxxxxxxxxx;AKxxxxxxxxxxxxxxxx;AGContext Field;]

REPLY: [AODTRA;AKxxxxxxxxxxxxxxxx;AGContext Field;]

GMAC-Generate MAC

This function generates a Message Authentication Code (MAC), for theentered message.

    ______________________________________                                        Token    Length  Char       Definition                                        ______________________________________                                        REQUEST FORMAT                                                                AO       4       GMAC       Function                                          BN       1       0,1        Continuation flag = 1                             AR       *16     0-F        KMAC encrypted under                                                          modifier 3 of the MFK                             BO       1-1024  A-Z        Data for Authentication                                            0-9                                                                           comma                                                                         period                                                                        space                                                        RESPONSE FORMAT                                                               AO       4       GMAC       Response ID                                       BP       8       0-F        MAC or `CONTINUE`                                 AE       4       0-F        Check digits of KMAC                              ______________________________________                                    

Syntax

REQUEST: [AOGMAC;BNx;ARxxxxxxxxxxxxxxxx;BOxxx....xxxx;]

REPLY: [AOGMAC;BPxxxxxxxx;AExxxx;]

REQUEST: [AOGMAC;BNx;ARBDxxx;BOxxx....xxxx;]

REPLY: [AOGMAC;BPxxxxxxxx;AExxxx;]

REQUEST: [AOGMAC;BNx;ARxxxxxxxxxxxxxxxx;BOxxx....xxx; AGContext Field;]

REPLY: [AOGMAC;BPxxxxxxxx;AExxxx;AGContext Field;]

Comments

Do not use any semicolons in your messages, since semicolons signifydelimiters.

If your message is longer than 1.024 characters, enabling token BN'scontinuation flag (BN1) alerts the system that there is more messagecoming in the text transaction.

GMAC-Generate MAC Continuation

This function generates a Message Authentication Code (MAC) for messagesgreater than 1024 characters.

    ______________________________________                                        Token    Length  Char       Definition                                        ______________________________________                                        REQUEST FORMAT                                                                AO       4       GMAC       Function                                          BO       1-1024  A-Z        Data for Authentication                                            0-9                                                                           comma                                                                         period                                                                        space                                                        BN       1       0,1        Continuation flag = 1                             RESPONSE FORMAT                                                               AO       2       GMAC       Response ID                                       BP       8       0-F        MAC or `CONTINUE`                                 AE       4       0-F        Check digits of KMAC                              ______________________________________                                    

Syntax

REQUEST: [AOGMAC;BOxxx....xxxx;BNx;]

REPLY: [AOGMAC;BPxxxxxxxx;AExxxx;]

REQUEST: [AOGMAC;BOxxx....xxxx;BNx;AGContext Field;]

REPLY: [AOGMAC;BPxxxxxxxx;AExxxx;AGContext Field;]

VMAC-Verify MAC

This function generates a Message Authentication Code (MAC) for amessage you enter, and compares it against the entered MAC.

    ______________________________________                                        Token    Length  Char       Definition                                        ______________________________________                                        REQUEST FORMAT                                                                AO       4       VMAC       Function number                                   BN       1       0,1        Continuation flag = 1                             AR       *16     0-F        KMAC encrypted under                                                          modifier 3 of the MFK                             BO       1-1024  A-Z        Data for authentication                                            0-9                                                                           comma                                                                         period                                                                        space                                                        BP       0,8     0-F        MAC to be verified                                RESPONSE FORMAT                                                               AO       4       VMAC       Response ID                                       AE       4       0-F        Check digits of KMAC                              BB       0,1     Y,N        Indicator if MAC is                                                           authenticated                                     ______________________________________                                    

Syntax

REQUEST: [AOVMAC;BNx;ARxxxxxxxxxxxxxxxx;BOxxx....xxxx; BPxxxxxxxx;]

REPLY: [AOVMAC;AExxxx;BBx;]

REQUEST: [AOVMAC;BNx;ARBDxxx;BOxxx....xxxx;]-Index Table

REPLY: [AOVMAC;AExxxx;BBx;]

REQUEST: [AOVMAC;BNx;ARxxxxxxxxxxxxxxxx;BOxxx....xxxx; AGContext Field;]

REPLY: [AOVMAC;Aexxxx;BBx;AGContext Field;]

VMAC-Verify MAC Continuation

This function accepts additional message data following the Verify MACCommand.

    ______________________________________                                        Token    Length  Char       Definition                                        ______________________________________                                        REQUEST FORMAT                                                                AO       4       VMAC       Function                                          BO       1-1024  A-Z        Data for Authentication                                            0-9                                                                           comma                                                                         period                                                                        space                                                        BN       1       0,1        Continuation flag = 1                             RESPONSE FORMAT                                                               AO       4       VMAC       Response ID                                       AE       4       0-F        Check digits of KMAC                              BB       0,1     Y,N        Indicator if MAC is                                                           authenticated                                     ______________________________________                                    

Syntax

REQUEST: [AOVMAC;BOxxx....xxxx;BNx]

REPLY: [AOVMAC;AExxxx;BBX;]

REQUEST: [AOVMAC;BOxxx....xxxx;BNx;AGContext Field;]

REPLY: [AOVMAC;AExxxx;BBx;AGContext Field;]

APPENDIXES Alphabetic List of Tokens

    __________________________________________________________________________    APPENDIXES                                                                    Alphabetic List of Tokens                                                     Tkn                                                                              Valid in These Functions                                                                          Meaning     Length                                     __________________________________________________________________________    AA LATM                ATM manually                                                                              16                                                                loaded `A` key                                         AC LATM                ATM Master Key                                                                            16-24                                      AD CCDL, VPIN          Check digit length                                                                        1                                          AE CATC, GMAC, GVWK, GWKS,                                                                           Check digits                                                                              4-8                                           LATM, LKEY, LMKT, SKEY,                                                       TWKD, TWKL, TWKN, TWKS,                                                       VKTE, VMAC                                                                 AF EPIN                Clear PIN    4-12                                      AG ECHO, TPIN          Context field or                                                                           1-255                                                            description                                            AH CRYP, IKEY          Cryptogram  16                                         AI DDAT, DTRA, EDAT, EDNT,                                                                           Data Encrypting Key                                                                       16                                            LENT                Incoming (KCI)                                         AJ CATC, DTRA          Data Encrypting Key                                                                       16                                                                Outgoing (KCJ)                                         AK CRYP, DDAT, DESD, DESE,                                                                           General use; often                                                                         10-512                                       DTRA, EDAT, EDNT, IKEY,                                                                           stands for data                                           LATM, LDNT, LENT, LKEY,                                                                           to be encrypted,                                          RKEY, SKEY, TPIN, VPIN                                                                            including PINs,                                                               messages, or                                                                  Diebold tables                                         AL EPIN, TPIN, VPIN    Encrypted PIN                                                                             16-18                                      AM ERRO                Error code (used in                                                                       2                                                                 error messages)                                        AN ERRO                Field number (used in                                                                     2-4                                                               error messages)                                        AO Valid in all functions                                                                            Function    4                                          AP GWKS, LDNT, TWKD, TWKS                                                                            Key Exchange Key                                                                          16                                                                (KEK)                                                  AQ LATM                Master File Key                                                                           16                                                                (MFK)                                                  AR GMAC, VMAC          Message Authenti-                                                                         16                                                                cation Key (KMAC)                                      AS CATC, GWKS, LATM, LMKT,                                                                           Modifier    1                                             TWKD, TWKL, TWKN, TWKS                                                     AT VPIN                Pad character for                                                                         1                                                                 incoming PIN block                                     AU                     Pad character for                                                                         1                                                                 outgoing PIN block                                     AV EPIN                PAN digits  12                                         AW TPIN, VPIN          PIN block type                                                                            1                                          AX CATC, EPIN, GVWK, TPIN,                                                                           PIN Encrypting Key                                                                        16                                            VPIN,               (KPE)                                                  AY VPIN                PIN offset   4-16                                      AZ VPIN                PIN Verification                                                                          16                                                                Key                                                    BA TDLY                Pre-transmit delay                                                                        3                                          BB CKTA, TPIN, VMAC, VPIN                                                                            Response literal                                                                          1-2                                        BC ECHO                Revision number                                                                           4                                          BD CATC, DDAT, DKTE, DTRA,                                                                           Table Index number                                                                        1-3                                           EDAT, EDNT, EPIN, GMAC,                                                       GVWK, GWKS, LATM, LENT,                                                       LMKT, TPIN, TWKD, TWKL,                                                       TWKN, TWKS, VKTE, VMAC, VPIN                                               BE VPIN                Verification data                                                                          4-16                                      BF VPIN                Verification                                                                              1                                                                 technique                                              BG GWKS, LMKT, TWKD, TWKL,                                                                           Working Key EMFK.J                                                                        16                                            TWKN, TWKS                                                                 BH GWKS, TWKD, TWKL, TWKN,                                                                           Working Key EKEK.J                                                                        16                                            TWKS                                                                       BI GVWK                Zone Control Working                                                                      16                                                                Key                                                    BJ CATC, CLWA, IKEY, LATM,                                                                           ATM type, or key                                                                          1                                             LKEY                part                                                   BK CATC, LATM, ATM     Comm key    16                                         BL LATM                IBM request message                                                                       8                                          BM GVWK                Zone Control Master                                                                       16                                                                Key                                                    BN GMAC, VMAC          Data continuation                                                                         1                                                                 flag                                                   BO GMAC, VMAC          Character data                                                                              1-1024                                                          MAC                                                    BP GMAC, VMAC          Message Authenti-                                                                         8                                                                 cation Code                                            BQ LMKT                Table Index 1-3                                                               location                                               BR LDNT, LENT          Diebold Table Index                                                                       1-3                                        BS DESD, DESE, VPIN    Working key in clear                                                                      16                                         BT TPIN                PIN Encryption Key                                                                        16                                                                outgoing (KPE)                                         ZA STAT                Data Encryption                                                                           1                                                                 Board mode                                             ZB STAT                Checksum data area                                                                        4                                          ZC STAT                Checksum program area                                                                     4                                          ZD STAT                Total number of                                                                           8                                                                 requests                                               ZF STAT                PIN translate                                                                             8                                          ZG STAT                PIN verification                                                                          8                                          ZH STAT                Data functions                                                                            8                                          ZI STAT                Key Table functions                                                                       8                                          ZJ STAT                Working Key functions                                                                     8                                          ZK STAT                Control functions                                                                         8                                          ZL STAT                Error totals                                                                              8                                          ZM STAT                IN sanity errors                                                                          8                                          ZN STAT                (presently not                                                                            8                                                                 defined)                                               ZO STAT                PIN `N`     8                                          ZP STAT                Timeout errors                                                                            8                                          __________________________________________________________________________

    ______________________________________                                        Alphabetic List of Functions                                                  Funct. Meaning           Valid Tokens                                         ______________________________________                                        CATC   Change ATM Comm Key                                                                             AE, AJ, AO, AS, AX,                                         (Diebold)         BD, BJ, BK                                           CCDL   Change Check Digit Length                                                                       AD, AO                                               CKTA   Clear Key Table   AO, BB                                               CLWA   Clear MFK or KEK Work                                                                           AO, BJ                                                      Area                                                                   CRYP   Cryptogram of Last Key                                                                          AH, AK, AO                                           DDAT   Decrypt Data      AI, AK, AO, BD                                       DESD   DES Decryption    AK, AO, BS                                           DESE   DES Encryption    AK, AO, BS                                           DKTE   Delete Key Table Entry                                                                          AO, BD                                               DTRA   Data Translate    AI, AJ, AK, AO, BD                                   ECHO   Echo Test         AG, AO, BC                                           EDAT   Encrypt Data for  AI, AK, AO, BD                                              Transmission                                                           EDNT   Encrypt Diebold Number                                                                          AI, AK, AO, BD                                              Table                                                                  EPIN   PIN Encrypt       AF, AL, AO, AV, AX,                                                           BD                                                   ERRO   Error message     AM, AN, AO, BB                                       GMAC   Generate MAC      AE, AO, AR, BN, BO,                                                           BP                                                   GMAC   Generate MAC Continuation                                                                       AE, AO, BD, BO, BP                                   GVWK   Generate Visa Working Key                                                                       AE, AO, AX, BD, BI,                                                           BM                                                   GWKS   Generate Working Key                                                                            AE, AO, AP, AS, BD,                                                           BG, BH                                               IKEY   Inject MFK or KEK AH, AK, AO, BJ                                       LATM   Load ATM Master Key                                                                             AC, AE, AK, AO, AQ,                                         (Diebold)         AS, BJ                                               LATM   Load ATM Master Key                                                                             AA, AC, AO, BD, BJ                                          (IBM 3624)        BL                                                   LDNT   Load Diebold Number Table                                                                       AK, AO, AP, BR                                       LENT   Load Entire Diebold                                                                             AI, AK, AO, BD, BR                                          Number Table                                                           LKEY   Loads Key         AE, AK, AO, BJ                                       LMKT   Load Module Key Table                                                                           AE, AO, AS, BD, BG,                                                           BQ                                                   RKEY   Random Key Generation                                                                           AK, AO                                               SKEY   Status of MFK and KEK                                                                           AE, AK, AO                                           STAT   Status of Data Encryption                                                                       AO, ZA, ZB, ZC, ZD,                                         Board             ZE, ZF, ZG, ZH, ZI,                                                           ZJ, ZK, ZL, ZM, ZN,                                                           ZO, ZP                                               TDLY   Transmit Delay    AO, BA                                               TPIN   PIN Translate     AG, AK, AL, AO, AW,                                                           AX, BB, BD, BT                                       TWKD   Translate Working Key for                                                                       AE, AO, AP, AS, BD,                                         Distribution      BG, BH                                               TWKL   Translate Working Key for                                                                       AE, AO, AS, BD, BG,                                         Local Storage     BH                                                   TWKN   Translate Working Key for                                                                       AE, AO, AS, BD, BG,                                         Network Transfer  BH                                                   TWKS   Translate Working Key for                                                                       AE, AO, AS, BD,                                             Local Storage (Switch to                                                                        BG, BH                                                      Switch)                                                                VKTE   Verify Key Table Entry                                                                          AE, AO, BD                                           VMAC   Verify MAC        AE, AO, AR, BB, BN,                                                           BO, BP                                               VMAC   Verify MAC Continuation                                                                         AE, AO, BB, BD, BN,                                                           BO                                                   VPIN   PIN Verification  AD, AK, AL, AO, AT,                                                           AW, AX, AY, AZ, BB,                                                           BD, BE, BF, BS                                       ______________________________________                                    

    ______________________________________                                        RESPONSE FORMAT                                                               Token    Length  Char      Definition                                         ______________________________________                                        AO       4       ERRO      Response ID                                        AM       2       0-9       Error Code                                         AN       2-4     var       Offending Token or Funct                           BB       var     var       Response literal                                   ______________________________________                                    

Syntax

REPLY: [AOERRO;AM01;ANAO;BBFIELD OUT OF RANGE; ]

REPLY: [AOERRO;AM19;ANTWKS;BB FUNCTION NOT SUPPORTED;]

    ______________________________________                                        Error Code   Response Literal                                                 ______________________________________                                        00                                                                            01           FIELD OUT OF RANGE                                               02           INVALID CHARACTER                                                03           VALUE OUT OF RANGE                                               04           TOKEN MISSING                                                    05           PARITY ERROR                                                     06           MAJOR KEY MISSING                                                07           INDEXED KEY MISSING                                              08           HARDWARE FAILURE                                                 09           INVALID MESSAGE FORMAT                                           10           INDEX TABLE FULL                                                 11                                                                            12           PIN TYPE NOT SUPPORTED                                           13           INVALID MESSAGE LENGTH                                           14           COMMUNICATION ERROR                                              15           COMMUNICATION TIMEOUT                                            16           LOADING DIEBOLD TABLE                                            17           MAC ERROR                                                        18                                                                            19           FUNCTION NOT SUPPORTED                                           ______________________________________                                    

    ______________________________________                                        Debug                                                                         Error Code  Response Literal                                                  ______________________________________                                        30          PARALLEL BUFFER OVERFLOW                                          31          SERIAL BUFFER OVERFLOW                                            32          PROGRAM LOAD ERROR                                                33          DATA RAM ERROR                                                    34          INVALID TO KEN                                                    35          FUNCTION PRESENTLY NOT                                                        IMPLEMENTED                                                       ______________________________________                                    

I claim:
 1. A fault-tolerant power supply arrangement for use with amultichannel data encryption system wherein said data encryption systemincludes a host computer, said power supply arrangement comprising:adata bus for providing communication channels between said host computerand said data encryption devices, said data bus including first andsecond power supply lines; first and second power supplies coupled tosaid first and second power supply lines, respectively; and a pluralityof data encryption devices having parallel and serial ports and firstand second power supply inputs coupled to said first and second powersupply lines, respectively, wherein said parallel ports are coupled tosaid data bus and said serial ports are coupled to respective dataencryption channels, and further wherein power is derived from saidsecond power supply line, and power is derived from said first powersupply line if power is present on said first power supply line.
 2. Thesystem of claim 1 further including monitor and display system means fordisplaying operating statistics of said data encryption devices whereinsaid monitor and display system means includes a power supply inputcoupled to said first power supply line.
 3. A fault-tolerant powersupply arrangement for use with a a multichannel data encryption systemwherein said data encryption system includes a host computer, said powersupply arrangement comprising:a host computer including a display,memory and non-volatile storage means; a data bus for providingcommunication channels between said host computer and said dataencryption devices, said data bus including first and second powersupply lines; first and second power supplies coupled to said first andsecond power supply lines, respectively; a plurality of data encryptiondevices coupled to said host computer through said data bus wherein saiddata encryption devices include means for automatically deriving powerfrom one of said first or second power supply lines based on thepresence of power thereon wherein said data encryption devices provideencryption services independent of said host computer.
 4. A method ofproviding a fault-tolerant source of power in a multichannel dataencryption system, said method comprising the steps of:coupling a hostcomputer and a plurality of data encryption devices with a data buswherein said data bus includes first and second power supply lines;coupling first and second power sources to said first and second powersupply lines respectively; deriving power for said host computer fromsaid first power supply line; and automatically deriving power for saiddata encryption devices from said first or second power supply linebased on the presence of power thereon.