User manual

Copyright © 2011, Unitech America Inc. All rights reserved.
Page 15 of 61
MS246 User Manual
A successful key loading process includes the following steps:
Get Key status
Command Data: <FF><13><01><02><LRC>
Response Data: <FF><00><01><04><LRC>
For Example:
Command: \02\46\46\2F\78\4D\42\41\75\38\3D\0D\0A\03\LRC
Response: \06\02\46\46\...............\0D\0A\03\LRC
Load KSN
Command Data: <FF><0A><11><KSN#><KSN bytes><LRC>
Response Data: <FF><00><06><RESPONSE CODE><LRC>
<KSN#>: TDES: 0x32 DES: 0x0A
<KSN bytes>: 16 bytes ASCII for KSN
<RESPONSE CODE>: 6 bytes data in ASCII format which is converted from the
first 3 cipher hex data. These cipher data are generated by encrypting KSN bytes and
"00 00 00 00 00 00 00 00".
For Example:
Command:
\02\46\46\2F\77\6F\52\4D\6B\5A\47\52\6B\59\35\4F\44\63\32\4E\54\51\7A\4D\6A\4
5\77\52\54\43\69\0D\0A\03\5D
Response: \06\02\46\46\..............\0D\0A\03\LRC
Load Encryption Key
Command Data: <FF><0A><LENGTH><KEY#><KEY bytes><LRC>
Response Data: <FF><00><06><RESPONSE CODE><LRC>
<LENGTH>: TDES: 0x21 DES: 0x11
<KEY#>: TDES: 0x33 DES: 0x0B
<KEY bytes>: TDES: 0x20 DES: 0x10
<RESPONSE CODE>: 6 bytes data in ASCII format which is converted from the
first 3 cipher hex data. These cipher data are generated by encrypting KEY bytes and
"00 00 00 00 00 00 00 00."
For Example:
Command:
\02\46\46\2F\77\6F\68\4D\7A\5A\42\51\7A\49\35\4D\6B\5A\42\51\54\45\7A\4D\54\
56\43\4E\45\51\34\4E\54\68\42\51\6A\4E\42\4D\30\51\33\52\44\55\35\4D\7A\4E\42
\6C\51\3D\3D\0D\0A\03\2D
Response: \06\02\46\46\..............\0D\0A\03\LRC