Sidebar

How MICR Laser Printers Protect Company Funds

Document Management
Typography
  • Smaller Small Medium Big Bigger
  • Default Helvetica Segoe Georgia Times

Check fraud is a booming business. Estimated losses to banks are in the billions of dollars. In less technological times, the main method of check fraud was simple forgery—essentially, the falsification of a signature on somebody else’s bank account.

Today, check fraud is more complex. Check-fraud artists are as technologically adept as any corporate computer scientist. They are comfortable with personal computers, scanners, color printers, publishing software, and chemistry, as well as with the clearing processes of the banking industry. They can take a blank check, make multiple copies that can’t be distinguished from the original, and use them to obtain cash. Or they can steal or buy an employee’s payroll check and chemically alter it, changing the payee name, amount, and so on. Luckily, there are means available to foil most check fraud attempts: magnetic ink character recognition (MICR) laser check printing and the various elements of an MICR laser-check-processing solution that are associated with it.

 

Check-fraud Defense

 

There are three key elements involved in check-fraud defense: check-processing software, MICR laser printers, and blank safety check stock. The software stores check forms electronically. When a check run is required, it accepts data from financial-management software systems, formats it by merging it with the electronic form, and spools it out for printing on the MICR laser printer.

Instead of using preprinted checks, which are highly vulnerable to theft and alteration, the complete, signed checks are generated on blank sheets of safety paper that usually incorporates multiple features that resist duplication or chemical alteration. The checks are printed with MICR toner, which contains iron oxide that is magnetized and read by a specialized check reader. The printed checks include company information, logos, graphics, payee information, MICR lines (bank transfer codes, customer account number, etc.), and a signature. All of this information is held securely in the software or is housed in a secure PCMCIA card that can be inserted into a card reader option on the MICR printer.

 

Development of MICR

 


By today’s standards, business methods were primitive and mainly manual prior to World War II. The state-of-the-art business machine was the typewriter. Checks were mainly business instruments, not used universally by consumers as they are today.

After the war, business began to boom, with corresponding increases in payment volumes, and consumers also began to recognize the convenience of personal checks. By 1952, the estimated annual volume of checks stood at eight billion. Banks began to realize that their manual check-sorting procedures were no longer adequate. An appreciation for technology was in the air, and it was to technology that the industry turned.

Bank of America technologist Alfred Zipf had joined Bank of America in the mid- 1930s as a transit clerk—a check reader/sorter—and, by the early 1950s, he had become the bank’s director of equipment research. In that position, he conceived and installed the first large-scale general-purpose computing system in the banking industry, and he was its director of operations.

He was also leader of a Stanford Research Institute team that was developing MICR technology. MICR technology enables you to encode and read data in characters in which the ink or laser-printer toner has been infused with iron oxide. In the clearing process, the characters are first magnetized and then read by the reader/sorter device. The MICR characters are known as the E13B MICR font, and every check written in the United States and Canada is processed by means of the MICR coding on its face. European countries have their own MICR encoding protocol, which is called CMC7 and follows essentially the same reading/sorting procedure. A magnetic ink character reader was also developed along with MICR: the Electronic Recording Machine Accounting (ERMA) system. The sorter reduced banks’ check sorting time by 80 percent.

MICR check processing continued pretty much without change for about 30 years. Banks provided consumers with MICR-imprinted checkbooks, and electronic data processing became the norm in companies. Businesses had their checks preprinted with company information and MICR lines on continuous forms that could run through their impact printers.

By the early 1980s, the PC had arrived, followed closely by laser-printer technology from such companies as Xerox, Hewlett-Packard, and Apple. PCs opened the technology door to just about everyone, and software soon proliferated, with applications for every conceivable need, even desktop publishing. Scanning devices made it possible to input not only words but also images.

From this combination of technology emerged a whole new industry: large-scale check fraud. Now, with the technology used in business widely available to the bad guys at low cost, check-fraud artists were able to take a single check, alter it or reproduce it multiple times, and score big hits on company treasuries.

Enter MICR laser check printing. Forward-looking thinkers looked at MICR technology, laser-printer technology, and check fraud and found a connection. The idea was this: Don’t use risky preprinted forms. Preprinted forms can be misappropriated and forged.

 

The MICR Font

 

Besides the numbers 0 through 9, the E13B MICR font includes some specialized characters, each of which is actually two symbols, serving as brackets as well as signifiers for functional sets of numbers:

• The Auxiliary On-Us symbol indicates that the sorting criterion is determined by the organization that is doing the sorting on the field—usually the originating bank. It is an optional field and is used only on business checks.

• The Transit symbols and the numbers between them define the instructions on how to clear the check. They indicate such factors as the Federal Reserve district from which the


check should be cleared, the federal bank or branch in the area where the check was drawn, and the bank number.

• The On-Us symbols enclose the account number and sometimes the bank’s branch number and the check number. The format can be defined by the individual bank.

• The Amount symbols enclose the field that contains the amount of the check. It is MICR- encoded by the bank of first deposit.

 

Enhancing the Printer for MICR

 

What makes a MICR laser printer different from a conventional laser printer? The engineering required to MICR-enhance a network laser printer does not alter or modify the actual printer technology. Rather, it is a five-step process that vendors of MICR solutions perform in close collaboration with the engineers who designed the printer. The process ensures that the printers continue to function well in the more stressful MICR check- processing task and that they provide the critical security required for check and sensitive- document processing:

1. MICR toner is like other toner, but the iron oxide it contains makes it more abrasive. Durability and strength testing ensure that the printer engine can handle the tougher toner.

2. A unique E13B MICR font (United States and Canada) must be developed specifically for each model of printer. Each character must produce American National Standards Institute (ANSI) specification signal strength and positioning. While font characters may look the same on checks, viewed under magnification or by a MICR reader/sorter or tester, character and point sizes appear to be different from printer to printer.

3. MICR laser printers are used both in limited-access, totally secure environments and in open environments where one printer performs both MICR and conventional printing. Multiple security features must be developed for either situation.

Toner sensors are one essential security element of MICR enhancement. MICR-only printers, normally housed in a secure environment, are equipped with a single sensor that prevents operation if a conventional toner cartridge is inserted. Printers that handle both MICR and non-MICR printing include a second, non-MICR sensor and a three-position key-lock switch that enables conventional printing.

Font cartridge security is the other major element, and this is maintained by digitizing not only the font but also the customer’s corporate information, logo, MICR line(s), and signatures and placing the information on a removable PCMCIA card. Inserted in the printer, the information is placed in memory when the check stream enters the printer. Some types of printers have no provision for removable media, so some vendors have developed an external PCMCIA card reader that attaches to the printer’s parallel port. At the conclusion of the print run, the PCMCIA card is removed and stored securely.

4. The printer’s fuser temperature is critical to the MICR toner’s adherence to the check stock. Reengineering a laser printer for MICR includes testing and adjustment until toner- fuser temperature performance satisfies specific adherence test criteria.

5. Once the MICR enhancement has been completed, the MICR solutions provider tests the printer in various ways. In one stress test, for example, 3,500 checks are run through a reader/sorter 20 times, analyzing the quality of the printing before and after each run. This analysis examines formatting, character spacing, and any other problems that might be


identified on checks rejected by the reader/sorter. ANSI specifications require a reject rate of less than 1 percent, and some vendors are even more stringent.

There are several other tests:

• Software compatibility testing to ensure that check processing continues to work with all financial management software

• Printer driver testing

• Paper path and stock testing, including weights, bonds, and paper sizes

• Accessory testing, such as high-capacity feeders, duplex units, envelope feeders, and output devices

• Customer-requested devices and features

• Preliminary testing and recommendations on special requirements proposed by customers

• Beta testing with selected customers, often on a day-to-day basis, to determine the viability of the product under actual MICR laser check production

 

MICR Toner

 

MICR toner has regular toner as its base, but iron oxide and other ingredients, such as charge agents and resins, are added to make it conform to the standards established by the ANSI and the American Bankers Association. Because each laser printer engine is unique to its model, MICR toner must be formulated specifically to work with each model of printer in order to ensure that the signal strength is not only correct but also retains its readability as it moves through the various clearing procedures. Moreover, it must have strong adhesive characteristics because a common fraud practice involves lifting characters off the check with adhesive tape and replacing them. Ideally, MICR toner is used with printers that have been enhanced for secure check processing, but there are toner kits available to enable MICR check processing on non-MICR laser printers.

 

Safety-check Stock

 

By far, the greatest amount of check alteration is based on a bleaching process to remove the printing on checks. Treating paper so that it is difficult to remove or change the toner ink from laser-printed documents is a standard feature. Additional standard features include Brownstain, which causes a brown stain to appear when activated by a chlorine-based eradicator; fluorescent fibers, which appear only under ultraviolet light; and a diagonally positioned artificial watermark, which differentiates the new stock from the predecessor product, which had horizontal watermarks.

Check Protect stock features a chemical stain, which causes a multilingual “VOID” (in English, Spanish, or French) to appear when chlorine bleach-activated. It also carries the diagonal watermark.

 

Connecting Laser Printers to the AS/400 Environment

 

IBM AS/400 users converting from conventional MICR check processing (with impact printers and preprinted forms) to MICR laser-check-printing solutions are confronted with a communications technology dilemma: Should they go directly to the printer, or should they access the printer through a local area PC network server?

There is a compatibility problem in connecting the AS/400 computer directly to a laser printer. The problem arises because the EBCDIC data streams produced by AS/400


computers are mostly intended for output to online printers. These printers communicate with the computers over twinax cable, as do their computer terminals. Laser printers do not do EBCDIC or twinax. They do ASCII, communicating via Ethernet, Token-Ring, or other PC network protocols using parallel cables.

Historically, bridging the AS/400 environment over to the PC environment and making MICR laser check printing possible has required laser printer controllers. These are small boxes with a twinax or Ethernet interface on one end and a parallel interface to a parallel printer cable on the other. Between the two interfaces, the IBM code is changed into the ASCII code that laser printers understand.

While protocol converters are still in widespread use, newer technologies have begun to replace them. For example, newer releases of OS/400 have built-in networking capabilities, which enable the machines to spool data streams directly to Ethernet-connected devices. It is estimated that some 60 percent of AS/400 shops now connect to laser printers with IP addresses on Ethernet networks and that perhaps another 20 percent are Ethernet- enabled.

Another alternative to twinax is IBM’s Client Access, which allows AS/400 sessions to be performed on a PC. In check-processing operations, users can activate the check run and print the checks directly to the printer from the PC.

What is the best solution? Often, it is the one that is easiest to implement and fits best into the overall IS topography.

 

MICR in Three Easy Lessons

 

There are three important lessons in any discussion of MICR laser check processing. The first, which impacts the financial side of the house, is that MICR laser check processing is a systems approach to the pervasive problem of corporate check fraud, combining a number of elements to produce a highly effective solution. The second, which directly impacts the IS department, is that it is a highly efficient, secure solution that can, if desired, transfer full control over the process to the payment-originating departments. The third lesson is that it is relatively easy to implement. Check forms and accounts are implemented in software using pilot or existing forms as a basis, and a tape is provided that can be read directly into the AS/400. From there, it is a virtually automatic process.


BLOG COMMENTS POWERED BY DISQUS

LATEST COMMENTS

Support MC Press Online

RESOURCE CENTER

  • WHITE PAPERS

  • WEBCAST

  • TRIAL SOFTWARE

  • White Paper: Node.js for Enterprise IBM i Modernization

    SB Profound WP 5539

    If your business is thinking about modernizing your legacy IBM i (also known as AS/400 or iSeries) applications, you will want to read this white paper first!

    Download this paper and learn how Node.js can ensure that you:
    - Modernize on-time and budget - no more lengthy, costly, disruptive app rewrites!
    - Retain your IBM i systems of record
    - Find and hire new development talent
    - Integrate new Node.js applications with your existing RPG, Java, .Net, and PHP apps
    - Extend your IBM i capabilties to include Watson API, Cloud, and Internet of Things


    Read Node.js for Enterprise IBM i Modernization Now!

     

  • Profound Logic Solution Guide

    SB Profound WP 5539More than ever, there is a demand for IT to deliver innovation.
    Your IBM i has been an essential part of your business operations for years. However, your organization may struggle to maintain the current system and implement new projects.
    The thousands of customers we've worked with and surveyed state that expectations regarding the digital footprint and vision of the companyare not aligned with the current IT environment.

    Get your copy of this important guide today!

     

  • 2022 IBM i Marketplace Survey Results

    Fortra2022 marks the eighth edition of the IBM i Marketplace Survey Results. Each year, Fortra captures data on how businesses use the IBM i platform and the IT and cybersecurity initiatives it supports.

    Over the years, this survey has become a true industry benchmark, revealing to readers the trends that are shaping and driving the market and providing insight into what the future may bring for this technology.

  • Brunswick bowls a perfect 300 with LANSA!

    FortraBrunswick is the leader in bowling products, services, and industry expertise for the development and renovation of new and existing bowling centers and mixed-use recreation facilities across the entertainment industry. However, the lifeblood of Brunswick’s capital equipment business was running on a 15-year-old software application written in Visual Basic 6 (VB6) with a SQL Server back-end. The application was at the end of its life and needed to be replaced.
    With the help of Visual LANSA, they found an easy-to-use, long-term platform that enabled their team to collaborate, innovate, and integrate with existing systems and databases within a single platform.
    Read the case study to learn how they achieved success and increased the speed of development by 30% with Visual LANSA.

     

  • Progressive Web Apps: Create a Universal Experience Across All Devices

    LANSAProgressive Web Apps allow you to reach anyone, anywhere, and on any device with a single unified codebase. This means that your applications—regardless of browser, device, or platform—instantly become more reliable and consistent. They are the present and future of application development, and more and more businesses are catching on.
    Download this whitepaper and learn:

    • How PWAs support fast application development and streamline DevOps
    • How to give your business a competitive edge using PWAs
    • What makes progressive web apps so versatile, both online and offline

     

     

  • The Power of Coding in a Low-Code Solution

    LANSAWhen it comes to creating your business applications, there are hundreds of coding platforms and programming languages to choose from. These options range from very complex traditional programming languages to Low-Code platforms where sometimes no traditional coding experience is needed.
    Download our whitepaper, The Power of Writing Code in a Low-Code Solution, and:

    • Discover the benefits of Low-code's quick application creation
    • Understand the differences in model-based and language-based Low-Code platforms
    • Explore the strengths of LANSA's Low-Code Solution to Low-Code’s biggest drawbacks

     

     

  • Why Migrate When You Can Modernize?

    LANSABusiness users want new applications now. Market and regulatory pressures require faster application updates and delivery into production. Your IBM i developers may be approaching retirement, and you see no sure way to fill their positions with experienced developers. In addition, you may be caught between maintaining your existing applications and the uncertainty of moving to something new.
    In this white paper, you’ll learn how to think of these issues as opportunities rather than problems. We’ll explore motivations to migrate or modernize, their risks and considerations you should be aware of before embarking on a (migration or modernization) project.
    Lastly, we’ll discuss how modernizing IBM i applications with optimized business workflows, integration with other technologies and new mobile and web user interfaces will enable IT – and the business – to experience time-added value and much more.

     

  • UPDATED: Developer Kit: Making a Business Case for Modernization and Beyond

    Profound Logic Software, Inc.Having trouble getting management approval for modernization projects? The problem may be you're not speaking enough "business" to them.

    This Developer Kit provides you study-backed data and a ready-to-use business case template to help get your very next development project approved!

  • What to Do When Your AS/400 Talent Retires

    FortraIT managers hoping to find new IBM i talent are discovering that the pool of experienced RPG programmers and operators or administrators is small.

    This guide offers strategies and software suggestions to help you plan IT staffing and resources and smooth the transition after your AS/400 talent retires. Read on to learn:

    • Why IBM i skills depletion is a top concern
    • How leading organizations are coping
    • Where automation will make the biggest impact

     

  • Node.js on IBM i Webinar Series Pt. 2: Setting Up Your Development Tools

    Profound Logic Software, Inc.Have you been wondering about Node.js? Our free Node.js Webinar Series takes you from total beginner to creating a fully-functional IBM i Node.js business application. In Part 2, Brian May teaches you the different tooling options available for writing code, debugging, and using Git for version control. Attend this webinar to learn:

    • Different tools to develop Node.js applications on IBM i
    • Debugging Node.js
    • The basics of Git and tools to help those new to it
    • Using NodeRun.com as a pre-built development environment

     

     

  • Expert Tips for IBM i Security: Beyond the Basics

    SB PowerTech WC GenericIn this session, IBM i security expert Robin Tatam provides a quick recap of IBM i security basics and guides you through some advanced cybersecurity techniques that can help you take data protection to the next level. Robin will cover:

    • Reducing the risk posed by special authorities
    • Establishing object-level security
    • Overseeing user actions and data access

    Don't miss this chance to take your knowledge of IBM i security beyond the basics.

     

     

  • 5 IBM i Security Quick Wins

    SB PowerTech WC GenericIn today’s threat landscape, upper management is laser-focused on cybersecurity. You need to make progress in securing your systems—and make it fast.
    There’s no shortage of actions you could take, but what tactics will actually deliver the results you need? And how can you find a security strategy that fits your budget and time constraints?
    Join top IBM i security expert Robin Tatam as he outlines the five fastest and most impactful changes you can make to strengthen IBM i security this year.
    Your system didn’t become unsecure overnight and you won’t be able to turn it around overnight either. But quick wins are possible with IBM i security, and Robin Tatam will show you how to achieve them.

  • Security Bulletin: Malware Infection Discovered on IBM i Server!

    SB PowerTech WC GenericMalicious programs can bring entire businesses to their knees—and IBM i shops are not immune. It’s critical to grasp the true impact malware can have on IBM i and the network that connects to it. Attend this webinar to gain a thorough understanding of the relationships between:

    • Viruses, native objects, and the integrated file system (IFS)
    • Power Systems and Windows-based viruses and malware
    • PC-based anti-virus scanning versus native IBM i scanning

    There are a number of ways you can minimize your exposure to viruses. IBM i security expert Sandi Moore explains the facts, including how to ensure you're fully protected and compliant with regulations such as PCI.

     

     

  • Encryption on IBM i Simplified

    SB PowerTech WC GenericDB2 Field Procedures (FieldProcs) were introduced in IBM i 7.1 and have greatly simplified encryption, often without requiring any application changes. Now you can quickly encrypt sensitive data on the IBM i including PII, PCI, PHI data in your physical files and tables.
    Watch this webinar to learn how you can quickly implement encryption on the IBM i. During the webinar, security expert Robin Tatam will show you how to:

    • Use Field Procedures to automate encryption and decryption
    • Restrict and mask field level access by user or group
    • Meet compliance requirements with effective key management and audit trails

     

  • Lessons Learned from IBM i Cyber Attacks

    SB PowerTech WC GenericDespite the many options IBM has provided to protect your systems and data, many organizations still struggle to apply appropriate security controls.
    In this webinar, you'll get insight into how the criminals accessed these systems, the fallout from these attacks, and how the incidents could have been avoided by following security best practices.

    • Learn which security gaps cyber criminals love most
    • Find out how other IBM i organizations have fallen victim
    • Get the details on policies and processes you can implement to protect your organization, even when staff works from home

    You will learn the steps you can take to avoid the mistakes made in these examples, as well as other inadequate and misconfigured settings that put businesses at risk.

     

     

  • The Power of Coding in a Low-Code Solution

    SB PowerTech WC GenericWhen it comes to creating your business applications, there are hundreds of coding platforms and programming languages to choose from. These options range from very complex traditional programming languages to Low-Code platforms where sometimes no traditional coding experience is needed.
    Download our whitepaper, The Power of Writing Code in a Low-Code Solution, and:

    • Discover the benefits of Low-code's quick application creation
    • Understand the differences in model-based and language-based Low-Code platforms
    • Explore the strengths of LANSA's Low-Code Solution to Low-Code’s biggest drawbacks

     

     

  • Node Webinar Series Pt. 1: The World of Node.js on IBM i

    SB Profound WC GenericHave you been wondering about Node.js? Our free Node.js Webinar Series takes you from total beginner to creating a fully-functional IBM i Node.js business application.
    Part 1 will teach you what Node.js is, why it's a great option for IBM i shops, and how to take advantage of the ecosystem surrounding Node.
    In addition to background information, our Director of Product Development Scott Klement will demonstrate applications that take advantage of the Node Package Manager (npm).
    Watch Now.

  • The Biggest Mistakes in IBM i Security

    SB Profound WC Generic The Biggest Mistakes in IBM i Security
    Here’s the harsh reality: cybersecurity pros have to get their jobs right every single day, while an attacker only has to succeed once to do incredible damage.
    Whether that’s thousands of exposed records, millions of dollars in fines and legal fees, or diminished share value, it’s easy to judge organizations that fall victim. IBM i enjoys an enviable reputation for security, but no system is impervious to mistakes.
    Join this webinar to learn about the biggest errors made when securing a Power Systems server.
    This knowledge is critical for ensuring integrity of your application data and preventing you from becoming the next Equifax. It’s also essential for complying with all formal regulations, including SOX, PCI, GDPR, and HIPAA
    Watch Now.

  • Comply in 5! Well, actually UNDER 5 minutes!!

    SB CYBRA PPL 5382

    TRY the one package that solves all your document design and printing challenges on all your platforms.

    Produce bar code labels, electronic forms, ad hoc reports, and RFID tags – without programming! MarkMagic is the only document design and print solution that combines report writing, WYSIWYG label and forms design, and conditional printing in one integrated product.

    Request your trial now!

  • Backup and Recovery on IBM i: Your Strategy for the Unexpected

    FortraRobot automates the routine tasks of iSeries backup and recovery, saving you time and money and making the process safer and more reliable. Automate your backups with the Robot Backup and Recovery Solution. Key features include:
    - Simplified backup procedures
    - Easy data encryption
    - Save media management
    - Guided restoration
    - Seamless product integration
    Make sure your data survives when catastrophe hits. Try the Robot Backup and Recovery Solution FREE for 30 days.

  • Manage IBM i Messages by Exception with Robot

    SB HelpSystems SC 5413Managing messages on your IBM i can be more than a full-time job if you have to do it manually. How can you be sure you won’t miss important system events?
    Automate your message center with the Robot Message Management Solution. Key features include:
    - Automated message management
    - Tailored notifications and automatic escalation
    - System-wide control of your IBM i partitions
    - Two-way system notifications from your mobile device
    - Seamless product integration
    Try the Robot Message Management Solution FREE for 30 days.

  • Easiest Way to Save Money? Stop Printing IBM i Reports

    FortraRobot automates report bursting, distribution, bundling, and archiving, and offers secure, selective online report viewing.
    Manage your reports with the Robot Report Management Solution. Key features include:

    - Automated report distribution
    - View online without delay
    - Browser interface to make notes
    - Custom retention capabilities
    - Seamless product integration
    Rerun another report? Never again. Try the Robot Report Management Solution FREE for 30 days.

  • Hassle-Free IBM i Operations around the Clock

    SB HelpSystems SC 5413For over 30 years, Robot has been a leader in systems management for IBM i.
    Manage your job schedule with the Robot Job Scheduling Solution. Key features include:
    - Automated batch, interactive, and cross-platform scheduling
    - Event-driven dependency processing
    - Centralized monitoring and reporting
    - Audit log and ready-to-use reports
    - Seamless product integration
    Scale your software, not your staff. Try the Robot Job Scheduling Solution FREE for 30 days.