Key For Xeptors
The X-Key is an electronic security key
for use with IDX Xeptors. After an X-Key is first used with an
Xeptor, the Xeptor becomes "Secured" from further manual coin
programming unless the X-Key is plugged in. The X-Key keeps a
record of the serial number of each Xeptor to which it was
connected and the Xeptor records the X-Key serial number, the
time and date stamp, and the personnel ID of the person who
enabled the X-Key.
The X-Key is enabled and disabled through
X-Tracker, an MS Windows based software utility for managing and
tracking X-Key activity. One does not need to use X-Tracker
software to obtain the first level of security from tricksters
who may wish to surreptitiously change the coin programming of
your coin acceptors. Treating the X-Key as you would any other
important key will allow you to lock down your coin acceptors.
However, by using the X-Tracker software described below, you
can also have the knowledge of who changed what when.
The X-Tracker is a Windows
based software utility for managing and tracking X-Key
(release-2) activity. An authorized personnel roster is set up
and enables these personnel to "log-on" to an X-Key, which
enables it to communicate with and enable an Xeptor. The
personal ID and a time and date stamp are stored in an encrypted
redundant file system on the PC and in the X-Key. When the X-Key
is used to enable changes to the "learned coins" of an Xeptor,
this same information is stored in the Xeptor and the serial
number of the Xeptor is stored in the X-Key. Responsibility for
the X-Key is terminated by X-Tracker "log off". This disables
the X-Key and stores the log-off information, including the
Xeptor serial numbers in the redundant encrypted PC log files.
The Security Roster Screen is used to determine
access authority for each of the screens. Those at the Master
Security Level can access all screens. Those at the Basic
Security Level can only access the X-Key Log On / Log Off screen
shown below. Be careful to remember that all entries are case
sensitive. Names must be 2 to 15 letters long and the secret
code must be 4 to 6 letters/numbers long. The ID number in the
far right column is a 16 bit number computed from the First Name
and Last Name entries and is the personnel ID number actually
stored in the Xeptor by an enabled X-Key.
The information on this form is stored in an
encrypted file to deter hacking by an employee with less than
honorable intentions. If this form is printed to maintain a
record of authorized personnel, IDX recommends that it, and any
copy of it, be stored only in the locked files of management not
normally accessible to others.
Log On / Log Off
When this screen is activated, the PC will try to
communicate to the X-Key over the specified serial COM port. The
NEVER be connected to the PC and an Xeptor at the same time.
Information about the last four "Logs" on the X-Key are
displayed in the window on the left. The serial numbers of any
Xeptors that have been enabled for programming by the X-Key will
be listed in the right window. When the X-Key is enabled, its
LEDs will be green and the Current Log will display only Log On
information, but no Log Off information.
Activity Log Files
The Activity Log File is a simple list of all
activity, including Log On / Log Off of an X-Key, the list of
Xeptor serial numbers enabled by an X-Key, who viewed, changed
or printed the Security Roster, and who viewed the Activity Log
File. This information is also kept in an encrypted file to
deter hacking by an employee with less than honorable
This file may be viewed by log-date or by user
name. When the file length grows larger than the window, a
scroll bar will appear. Any Xeptor serial numbers are associated
with "Log Off" activity. Click this record, and an additional
window to the right will appear to show the serial numbers.
By connecting the computer's serial port directly
to the Xeptor, you can read the contents of its configuration
memory. All of the parameters used to determine coin acceptance,
sensor calibration, and option configuration may be viewed.
Information which describes the meaning of each of these
parameters is available in a help window in the lower left. A
record of the last three people who altered the program (along
with a time and date stamp) is displayed in the upper right.
Finally, a deciphered summary of the self diagnostic bytes
indicating sensor status, operating problems, and the coin
programming security status of the Xeptor is reported in the
middle window on the right.
protected under the following patents US6564997, AU6653600,
AU753887, CA2323844, GB2357620