SCH2 Technical Manual TSP016.doc Issue 3.0 – January 2005
Money Controls 2005. All rights reserved.
Page 59 of 61
29. Appendix G
The Unencrypted Hopper
Serial Compact Hopper Mk2 is available in an unencrypted version.
The unencrypted serial compact hopper can be used without any knowledge of the encryption
algorithm used on the standard ‘encrypted’ product. The ccTalk commands have been kept
identical to minimise changes to software between products.
To find out which product you have, use ccTalk header 244, ‘Request product code’.
Product
Encryption ?
Returned Product Code
Serial Compact Hopper Mk2
Yes
SCH2
Serial Compact Hopper Mk2
No
SCH2-NOENCRYPT
“Dispense hopper coins”
ccTalk command
Header 167
.
Transmitted data:
<variable>
[no. of coins]
Received data:
[event counter] or NAK
Where
<variable>
=
8 bytes
of data.
This data can be 1-1-1-1-1-1-1-1, 1-2-3-4-5-6-7-8 or any 8 random bytes of data.
NOTE: The competition tend to only require
3 bytes
of data to be sent which is the
internal serial number and this is used as the
<variable>
in the “transmitted data”, to
payout the coins.
Note that a ‘Request cipher key’ command is still required prior to each dispense but the
result can be thrown away as it is not needed. If the request cipher key is not sent then a
NAK will be returned when a dispense is attempted.
Example Command Sequence
1. Command 'Enable hopper'
TX = 003 001 001
164
165
178
RX = 001 000 003 000 252 = ACK
2. Command 'Request cipher key'
TX = 003 000 001
160
092
RX = 001 008 003 000
097 162 057 066 112 230 076 011
201
The 8 data bytes can be ignored as they are not needed.
3. Command 'Dispense hopper coins'
TX = 003 009 001
167
000 000 000 000 000 000 000 000
005
071
RX = 001 001 003 000 008 243
This examples dispenses
5 coins
.
Summary of Contents for SCH2
Page 8: ......