mDynamo Support
Brochure
Welcome to the 2024 product catalog. MagTek sells to VARs, ISOs, ISVs, resellers, distributors, and directly to customers. Contact MagTek or your service provider to order. Founded in 1972, MagTek is a leading manufacturer of electronic systems for the reliable issuance, reading, transmission, and security of cards, barcodes, checks, PINs, and identification documents.
Brochure - Family
For the OEM developer, here is an overview of ASICs, Heads, Head Assemblies, Rails. MagTek solutions deliver more, and allow you the option to activate advanced security solutions when you need them. MagTek components and devices using the MagneSafe Security Architecture capture more data with a single swipe and offer the flexibility your applications need.
There are more ways to pay and perform digital transactions than ever before. MagTek has the components and peripherals you need for your transaction environment.
PROGRAMMER'S MANUALS: Developer Tools
This document describes how to communicate with Secure Card Reader Authenticator (SCRA) devices which implement MagneSafe V5.
Dynamag, DynaMAX, eDynamo, mDynamo, tDynamo (Gen I, II), DynaWave, and iDynamo 6, Programmers Reference ( C++ )
This document provides instructions to use the MTSCRA Demo on macOS. It is part of a larger library of documents designed to assist uDynamo, Dynamag, DynaMAX, eDynamo, mDynamo, BulleT, and Secure Card Readers implementers.
Pursuing an L3 Certification (Level 3 Certification) with an EMV (Europay, Mastercard, Visa) payment processor involves several steps. Level 3 Certification typically pertains to testing and certifying integrated circuit cards (ICCs) with advanced functionalities, such as contactless payments. Here are the general steps you might follow, but keep in mind that specific requirements may vary based on the EMV payment processor and the region.
This document provides instructions for software developers who want to create software solutions that include a Dynamag, DynaMAX, eDynamo, mDynamo, tDynamo (Gen I, II), DynaWave, or iDynamo 6 connected to a Windows-based host via USB or Bluetooth LE.
This document provides EMV transaction flow instructions for software developers who want to create software solutions that include a MagTek Secure Card Reader / Authenticator (SCRA) device connected to a Windows PC, Android, or iOS device.
This document provides instructions to use the MTUSDKNET Update Firmware Console Demo.
This document provides instructions to use the MTUSDKNET Test Console. This tests EMV transactions, sends configuration files, and updates firmware.
This document provides instructions for software developers who want to create software solutions that include a DynaWave, mDynamo, DynaProx, DynaFlex Pro, and DynaFlex II PED connected to a Linux-based host via USB. It is part of a larger library of documents designed to assist MagTek devices implementers, which includes the following documents available from MagTek: The following documents are essential: • D99875475 MagneSafe V5 Communication Reference Manual • D998200383 DynaFlex Products Programmer’s Manual ( COMMANDS )
This document provides instructions for software developers who want to create .NET software solutions that include MagTek devices connected to a Windows based host. MagTek Universal SDK (MTUSDKNET) incorporates MagTek SCRA and MagTek PIN Pad SCRA devices into one SDK. This document is part of a larger library of documents designed to assist MagTek device implementers. The following documents are essential: • D998200383 DynaFlex Products Programmer’s Manual ( COMMANDS ) • D998200382 DynaFlex Family of Products Installation and Operation Manual
This document provides instructions for software developers who want to create custom software solutions that communicate with Dynamag, DynaMAX, eDynamo, mDynamo, uDynamo, or BulleT connected to a macOS host via USB or wireless.
Dynamag, DynaMAX, eDynamo, mDynamo Secure Card Reader Authenticator Programmer's Reference (WEBAPI)
This document provides instructions to use the MTNET Demo. It is part of a larger library of documents designed to assist Dynamag, DynaMAX, eDynamo, uDynamo, aDynamo, mDynamo, tDynamo (Gen I, II), iDynamo 5 (Gen III), DynaWave and Secure Card Readers implementers.
ADYNAMO, UDYNAMO, DYNAMAG, DYNAMAX, EDYNAMO, MDYNAMO, BULLET, TDYNAMO, DYNAWAVE, IDYNAMO 5 (GEN III) MAGTEK SCRA DEMO AND OEM DEMO GUIDE (ANDROID) This document provides instructions to use the MagTek SCRA Demo and OEM Demo. It is part of a larger library of documents designed to assist Dynamag, DynaMAX, Dynamo, mDynamo, tDynamo, DynaWave, and Secure Card Readers implementers.
Remote Services Document: Firmware, EMV Tags, and CAPK updates
This document provides instructions to use the MTUSDKNET EMVConfiguration Console. The console sends either a .BIN file or contents of an Excel file to the device. BIN files are directly sent to the device. Excel files are processed by Magena Remote Services web service, then the resulting BIN data is sent to the device.
This is a programmer’s guide to update the firmware of DynaWave through mDynamo. It contains instructions on how to update the DynaWave firmware in the case where DynaWave is only accessible through the UART port on the mDynamo.
These instructions explain how to change the Baud Rate for mDynamo using the Windows version of the MagTek Reader Configuration App (RS2/Remote Services). It will also explain how to test the DynaWave after properly configuring the baud rates for both devices.
USER MANUALS - Installation & Operation Manual
This document provides suggestions, guidelines, and technical information for designing solutions that integrate mDynamo, MagTek’s modular contact chip card reader for OEM solutions.
mDynamo with Outdoor Bezel is an IP34 rated EMV chip card module that is designed for integration into indoor and outdoor, unattended kiosks. The card insertion slot features a spring-loaded door to help prevent dust and moisture from entering the reader.
WHITE PAPER - Overview and Industry
A response to a publication in March 2019, by NIST (National Institute of Standards and Technology) entitled: “NIST Special Publication 800-131A Revision 2 – Transitioning the Use of Cryptographic Algorithms and Key Lengths”.