IDTECH
How to use IDTECH terminals with the Decryptx Payload Parser.
The Decryptx Payload Parser supports three IDTECH terminal models, the SecuRED, the SREDKey, and the VP3350. The SecuRED is a magnetic swipe device and the SREDKey supports both keyed and magnetic swipe input. The VP3350 is a mobile device option that supports swipe, insert, and contactless input. The SREDKey keyed input supports six different modes for manual data entry, capturing different combinations of card number, expiration date, CVV2, zip code, and address house number.
Swiped and Keyed Payloads
The SREDKey and SecuRED are capable of emulating USB keyboard input. Therefore, capturing payloads is very straightforward:
- Plug the IDTECH terminal into a computer.
- Open a text editor (Notepad or TextEdit).
- Swipe a card in the magnetic reader or manually enter a card number.
The terminal will output an encrypted payload similar to the following:
029C01801F322400839B%*4124********9990^TEST/BLUEFIN^2212************?*;4124********9990=2212************?*6B8C6CAF90CA99315585BE485CFDAB1242477885E2BAE018FB3644140C1BEB5A4AE1731FFA5C2F37D186273BAC4B165EE7BA4F36E831945A9D7C5A9765F5E06933160B3A288670537EC6A37919555328E254D2033665F34BF5BD3BF0A1EAF1A40000000000000000000000000000000000000000000000000000000000000000000000000000000035343154313132373038629949960E001D200229629C03
To use this payload with the Parser, post it with your Bluefin credentials to our Parser endpoint:
curl 'https://cert-parser.decryptx.com/api/decrypt/parser' \
-X POST \
--header 'Content-Type: application/json' \
--header 'Accept: application/json' \
-d '{
"partnerId" : "?????????",
"partnerKey" : "ef1ad938150fb15a1384b883a104ce70",
"clientId" : "bobs_burgers",
"reference" : "723f57e1-e9c8-48cb-81d9-547ad2b76435",
"deviceType" : "idtech",
"devicePayload":"029C01801F322400839B%*4124********9990^TEST/BLUEFIN^2212************?*;4124********9990=2212************?*6B8C6CAF90CA99315585BE485CFDAB1242477885E2BAE018FB3644140C1BEB5A4AE1731FFA5C2F37D186273BAC4B165EE7BA4F36E831945A9D7C5A9765F5E06933160B3A288670537EC6A37919555328E254D2033665F34BF5BD3BF0A1EAF1A40000000000000000000000000000000000000000000000000000000000000000000000000000000035343154313132373038629949960E001D200229629C03"
}'
If the API call is successful, a JSON response object similar to the following is returned:
{
"success" : true,
"messageId" : "1201703221454071031104814",
"reference" : "723f57e1-e9c8-48cb-81d9-547ad2b76435",
"clientId" : "bobs_burgers",
"meta": {
"device" : "IDTECH",
"serial" : "541T112708",
"mode" : "swiped"
},
"track1": {
"decrypted" : "2542343132343933393939393939393939305e544553542f424c554546494e5e323231323130313132333435363738393f3c000000000000",
"encoding" : "hex",
"length" : 50,
"ascii" : "%B4124939999999990^TEST/BLUEFIN^2212101123456789?<",
"masked" : "%*4124********9990^TEST/BLUEFIN^2212************?*"
},
"track2" : {
"decrypted" : "3b343132343933393939393939393939303d323231323130313132333435363738393f3b00000000",
"encoding" : "hex",
"length" : 36,
"ascii" : ";4124939999999990=2212101123456789?;",
"masked" : ";4124********9990=2212************?*"
},
"extracted" : {
"PAN" : "4124939999999990",
"EXPY" : "1222",
"Surname" : "TEST",
"FirstName" : "BLUEFIN",
"ServiceCode" : "101",
"Discretionary" : "123456789"
}
}
EMV and Contactless Payloads
The raw output from the VP3350 is needed for the Parser.
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
A successful response will show as follows:
{
"success": true,
"messageId": "1202401310856402221521889",
"meta": {
"device": "IDTECH",
"serial": "344T168518",
"mode": "emv"
},
"pan": {
"decrypted": "5a084761731000000043000000000000",
"encoding": "tlv",
"length": 16,
"ascii": "4761731000000043",
"masked": "4761********0043"
},
"track2equivalent": {
"decrypted": "57134761731000000043d24122011303130600000f0000000000000000000000",
"encoding": "tlv",
"length": 38,
"ascii": "4761731000000043D24122011303130600000F",
"masked": "4761********0043D2412*****************"
},
"track2": {
"decrypted": ";4761731000000043=24122011303130600000?",
"encoding": "ascii",
"length": 39,
"ascii": ";4761731000000043=24122011303130600000?",
"masked": ";476173******0043=2412****************?"
},
"extracted": {
"PAN": "4761731000000043",
"EXPY": "1224",
"ExpyRaw": "2412",
"ServiceCode": "201",
"Discretionary": "1303130600000",
"FirstName": "Test Card 02 ",
"Surname": "UAT USA",
"Track2Equivalent": "4761731000000043D24122011303130600000"
}
}
Updated 9 months ago