Comdial Keylink Software

Comdial Keylink Software Average ratng: 9,4/10 461 reviews
ffirs.fm Page i Thursday, December 15, 2005 3:14 PM
A GUIDE TO FORENSIC ACCOUNTING INVESTIGATION
THOMAS W. GOLDEN, STEVEN L. SKALAK, AND MONA M. CLAYTON
JOHN WILEY & SONS, INC.
ffirs.fm Page ii Monday, December 19, 2005 1:46 PM
This book is printed on acid-free paper. Copyright © 2006 by PricewaterhouseCoopers LLP. PricewaterhouseCoopers refers to the individual member firms of the worldwide PricewaterhouseCoopers organization. All rights reserved. Published by John Wiley & Sons, Inc., Hoboken, New Jersey. Published simultaneously in Canada. No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning, or otherwise, except as permitted under Section 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, Inc., 222 Rosewood Drive, Danvers, MA 01923, 978-750-8400, fax 978-646-8600, or on the Web at www.copyright.com. Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, 201-748-6011, fax 201-748-6008, or online at http://www.wiley.com/go/permissions. Limit of Liability/Disclaimer of Warranty: While the publisher and author have used their best efforts in preparing this book, they make no representations or warranties with respect to the accuracy or completeness of the contents of this book and specifically disclaim any implied warranties of merchantability or fitness for a particular purpose. No warranty may be created or extended by sales representatives or written sales materials. The advice and strategies contained herein may not be suitable for your situation. You should consult with a professional where appropriate. Neither the publisher nor author shall be liable for any loss of profit or any other commercial damages, including but not limited to special, incidental, consequential, or other damages. For general information on our other products and services, or technical support, please contact our Customer Care Department within the United States at 800-762-2974, outside the United States at 317-572-3993 or fax 317-572-4002. Wiley also publishes its books in a variety of electronic formats. Some content that appears in print may not be available in electronic books. For more information about Wiley products, visit our Web site at http://www.wiley.com. Library of Congress Cataloging-in-Publication Data Golden, Thomas W. A guide to forensic accounting investigation / Thomas W. Golden, Steven L. Skalak, and Mona M. Clayton. p. cm. Includes index. ISBN-13: 978-0-471-46907-0 (cloth) ISBN-10: 0-471-46907-6 (cloth) 1. Fraud investigation--Auditing. 2. Forensic accounting--Auditing. I. Golden, Thomas W. II. Skalak, Steven L. III. Clayton, Mona M. III. Title. HV8079.F4G65 2005 363.25'963--dc22 2004027090 Printed in the United States of America 10
9
8
7
6
5
4
3
2
1
ftoc.fm Page iii Thursday, December 15, 2005 3:21 PM
CONTENTS Preface Acknowledgments 1
xv xix
Fraud: An Introduction
1
Fraud: What Is It? 2 Fraud: Prevalence, Impact, and Form 3 Fraud in Historical Perspective 4 Types of Fraud 5 Root Causes of Fraud 6 A Historical Account of the Auditor’s Role
7
Auditing: Ancient History 7 Growth of the Auditing Profession in the Nineteenth Century Federal and State Securities Regulation before 1934 9 Current Environment 10
Auditors Are Not Alone 12 Deterrence, Auditing, and Investigation 13 Conceptual Overview of the Fraud Deterrence Cycle
8
14
Corporate Governance 15 Transaction-Level Controls 16 Retrospective Examination 16 Investigation and Remediation 16
First Look Inside the Fraud Deterrence Cycle
17
Corporate Governance 17 Transaction-Level Controls 18
Auditing and Investigation
2
20
The Roles of the Auditor and the Forensic Accounting Investigator The Patrolman and the Detective 22 Complexity and Change 25 Auditor Roles in Perspective 28 Not All Good People 29 Each Company Is Unique 30 Role of Company Culture 30 Estimates 32 Choices 33 What Auditors Do 35 Fraud versus Error 35 Reasonable Assurance 36 Materiality 38 iii
21
ftoc.fm Page iv Thursday, December 15, 2005 3:21 PM
iv
Contents
Bedrock of an Effective Audit
40
Professional Skepticism 40 Knowledge and Experience 40 Independence and Objectivity 41
SPADE 42 Auditing Standards Take a Risk-Based Approach to Fraud Management Override 44 Regulatory Reaction to Fraud 45 Financial Benefits of Effective Fraud Management 46 Conclusion 46
3
42
Psychology of the Fraudster Calculating Criminals
47
48
Case 1: “It Can’t Be Bob” 49
Situation-Dependent Criminals 49 Power Brokers 50 Fraudsters Do Not Intend to Harm 51 Case 2: “For the Good of the Company” 51 Case 3: Personal Catastrophes 51 Case 4: An Educated, Upstanding Citizen 52
Kinds of Rationalization 55 Auditors’ Need to Understand the Mind of the Fraudster Conclusion 57
4
55
Financial Reporting Fraud and the Capital Markets
59
Targets of Capital Market Fraud 60 Securities Investment Model 61 Overview of Financial Information and the Requirement to Present Fairly 62 Overview of Fraud in Financial Statements 64 Accounting Irregularities as an Element of Financial Fraud 68
Some Observations on Financial Fraud
71
Fraud from Within 71
Summary
72
5
Auditor Responsibilities and the Law
75
6
Independence, Objectivity, Skepticism
87
SEC Final Rules for Strengthening Auditor Independence 88 SEC Regulation of Forensic Accounting Services Consulting versus Attest Services 92 Integrity and Objectivity 93 Independence Standards for Nonattest Services 94
Professional Skepticism
95
88
ftoc.fm Page v Thursday, December 15, 2005 3:21 PM
Contents
Trust but Verify: A Case Study
96
Trust but Verify: Exploring Further
99
Loose-Thread Theory of Auditing 103 Further Thoughts on the Loose-Thread Theory
7 8
v
106
Forensic Investigations and Financial Audits: Compare and Contrast
109
Potential Red Flags and Fraud Detection Techniques
119
Types of Fraud Revisited 120 Fraud Detection: Overview 121 Laying a Foundation for Detection
124
Assessing the Risk of Fraud 125 Fraud Risk Factors 125 A Word on Information Technology 126
Interpreting Potential Red Flags 127 Importance of Professional Skepticism Revisiting the Fraud Triangle 132
129
Incentive and Pressure 132 Opportunity 134 Rationalization and Attitude 135
Identifying and Evaluating Risk Factors
137
Discussion among Audit Team Members 138
Information Gathering
140
Other Sources 143
Analytic Procedures
144
Current Company Data versus Company Data from Prior Periods 147 Company Data versus Company Budgets, Forecasts, or Projections 147 Company Data versus Industry Data and/or Comparable Company Data 147 Company Financial Data versus Company Operational Data 148 Company Data versus Auditor-Determined Expected Results 148
Analytic Techniques 148 Assessing the Potential Impact of Fraud Risk Factors 150 Evaluating Controls 152 Addressing the Identified Fraud Risks 153
Unpredictable Audit Tests 154 Observation and Inspection 155 Financial Statement Fraud: Detection Techniques Revenue Recognition 157 Corruption 158 Summary 160
9
Internal Audit: The Second Line of Defense What Do Internal Auditors Do?
162
157
161
ftoc.fm Page vi Thursday, December 15, 2005 3:21 PM
vi
Contents
Internal Audit Scope of Services 164 The Handoff to Forensic Accounting Investigators and Legal Counsel 166 Perception Problem 167 Complex Corporate Fraud and the Internal Audit 168 WorldCom and the Thornburgh Report 169 Case Studies: The Internal Auditor Addresses Fraud 170 No Segregation of Duties—and a Very Nice Car 170 Odd Transportation System 171 A Tragic Circumstance 172 How Many Lunches Can You Buy? 173 Making the Numbers Look Right 173 How Not to Earn a Bonus 174 A Classic Purchasing Fraud 175 The Loneliness of the Internal Auditor 176 Hitting the Jackpot in the Gaming Industry 177
Reporting Relationships: A Key to Empowering Fraud Detection 178 Tomorrow’s Internal Auditor, Tomorrow’s Management and Board 180
10 Financial Statement Fraud: Revenue and Receivables Improper Revenue Recognition Timing
185
186
Revenue Recognition Detection Techniques
188
Side Agreements 191 Liberal Return, Refund, or Exchange Rights 192 Channel Stuffing 195 Bill-and-Hold Transactions 196 Early Delivery of Product 198 Partial Shipments 199 Contracts with Multiple Deliverables 200
Improper Allocation of Value in Multiple-Element Revenue Arrangements 201 Up-Front Fees 202
Improper Accounting for Construction Contracts 202 Related-Party Transactions 204 Revenue and Receivable Misappropriation 206 Revenues 207 Receivables 208 Fictitious Sales 209 Lapping 210 Redating 211
Inflating the Value of Receivables Extended Procedures 212 Round-Tripping 215
211
183
ftoc.fm Page vii Thursday, December 15, 2005 3:21 PM
Contents
vii
Improperly Holding Open the Books 216 Consignments and Demonstration Goods 217 Summary 218
11 Financial Statement Fraud: Other Schemes and Misappropriations Asset Misstatements
219
219
Inventory Schemes 219 Investment Schemes 224 Recording Unrealized Declines in Fair Market Value 226 Recording Fictitious Fixed Assets 226 Depreciation and Amortization 226 Hanging the Debit 227 Software Development Costs 227 Research and Development Costs 228 Start-Up Costs 228 Interest Costs 228 Advertising Costs 229
Understatement of Liabilities and Expenses 229 Off-Balance-Sheet Transactions 230 Two Basic Accounting Models 231 Cookie Jar Reserves 233 Improper and Inadequate Disclosures 234 Materiality 235 Disbursement Schemes 236 Invoice Schemes 236 Check Tampering 239 Expense Reimbursement Schemes 240 Payroll Schemes 242
12 When and Why to Call In Forensic Accounting Investigators Today’s Auditors Are Not Forensic Accounting Investigators Auditors Are Not Authenticators 244 Auditors Have Limited Exposure to Fraud 245 Auditors Are Not Guarantors 246 Historically, Audits May Have Been Predictable 247 Potential Trigger Points of Fraud 248 Reliance on Others 255 Conclusion 257
13 Teaming with Forensic Accounting Investigators Forensic Accounting Investigators’ Cooperation with Internal Auditors 261 Internal Audit’s Position and Function 261 Resource Models 262 Working Together 263
243 244
259
ftoc.fm Page viii Thursday, December 15, 2005 3:21 PM
viii
Contents
Forensic Accounting Investigators’ Cooperation with External Auditors 264 Client History 264 The External Auditor in Today’s Environment
Objectives of All Interested Parties
265
266
Forensic Accounting Investigators’ Objectives 266 Objectives of Other Parties to the Investigation 267
How Should the Investigation Objectives Be Defined? 269 Who Should Direct the Investigation and Why? 270 Ready When Needed 271 Where to Find Skilled Forensic Accounting Investigators 272 Internal Audit 272 Engaging External Forensic Accounting Investigators 273 Accounting and Auditing Firms 273
14 Potential Missteps: Considerations When Fraud Is Suspected
277
Confronting Suspects 277 Dismissing the Target 281 Assumptions 281 The Small Stuff Could Be Important 286 Materiality: More on a Key Topic 287 Addressing Allegations 288 The Case of the Central American General Manager Exercising Skepticism 293 Case Outcomes 294
15 Investigative Techniques
295
Timing 295 Communication 296 Early Administrative Matters 296 Predication 297 What Should You Know before You Start? Gaining an Understanding 299 Gathering and Securing Information 300 Coordination 303 Other 303
A Word about Insurance 304 Exceptions and Other Considerations Document Review 306 ComQuest 306 CPA Services 308 How to Read a Check 308 Airline Tickets 310
Conclusion
311
289
305
299
ftoc.fm Page ix Thursday, December 15, 2005 3:21 PM
Contents
16 Anonymous Communications
ix
313
Typical Characteristics of Anonymous Tips 314 Federal Statutes Related to Anonymous Reporting and Whistle-Blower Protections 315 Receipt of an Anonymous Communication 318 Initial Understanding of Allegations 320 Determine Whether Any Allegation Requires Immediate Remedial Action 320 Development and Implementation of the Investigative Strategy 321 The Investigation Team 321
Disclosure Decisions 322 Prioritize the Allegations 323 Interviewing Employees 325 Follow-Up Tip 329 Conclusion 330
17 Background Investigations Commercial Media Databases Other Public Records
331 332
335
Commercial Database Providers
339
Other Sources 342
Unique Internet Sources
342
Other Government Agencies 345 International Investigations 346
Conclusion
346
18 The Art of the Interview
349
Difficulty and Value of Obtaining an Admission Planning for the Interview 351 Types of Interviews 353
350
The Information-Seeking Interview 353 The Admission-Seeking Interview 354
Others May Wish to Attend Interviews Interview Process 358 Documenting the Interview 364 Summary 364
358
19 Analyzing Financial Statements Developing Effective Analytic Procedures Vertical Analysis 368 Horizontal Analysis 369 Ratio Analysis 369 Reasonableness Testing 369 162–163 Foreign Corrupt Practices Act (FCPA), 501–503 anti-bribery provisions of, 502 internal-accounting-control provisions of, 502 record-keeping provisions of, 502–503 violations investigations, 434 Forensic accountants, in priveleged environment, 114 Forensic accounting: and antitrust laws, 532–533 and business combinations, 532–533 and business interruption, 530 and business valuation, 532 for construction industry, 526–527 for cybercrime, 533 and environmental issues, 527 and government contracting, 529–530 for insurance policies, 530 and intellectual property, 527–528 for marital dissolution, 530–531 Sarbanes-Oxley Act of 2002, 110 and shareholder litigation, 531–532 Forensic accounting investigation: and AML, 518–520 as an evolving discipline, 536–537 corporate environment changes affecting, 540–546 education and training for, 538 future of, 546 new tools for, 538 regulation and enforcement for, 539–540 Forensic accounting investigator(s): for accounting and auditing firms, 273–174 and ACFE guidelines, 53
10A investigation, 255–256 analogy to detectives, 22–25 and audit committees, 113 auditors vs., 244 boundaries of, 112 calling in of, 243–257 company operations, 112 company relationship, 264 cooperation with external auditors, 264–266 cooperation with internal auditors, 261–264 and errors, 112 evidence created by, 431–433 external, 273 external audit firm, use of, 486–488 financial fraud, 110 for internal audits, 272 and law enforcement, 489–490 and legal counsel, 166–167, 475–477 legal counsel, disagreements with, 490–491 liability protection, 115 objectives of, 266–267 oral presentations, 117 recruiting, for investigations, 272–275 serving individual corporate clients, 542–543 skepticism, 116 supporting criminal prosecutions, 446 Forensic investigations: computer-aided investigation techniques, see Data mining defining objectives of, 269–270 directing party of, 270 financial audits vs., 109–117 sampling in, 114 staffing and executing, 114 Forensic technologists, 402–404 communication skills of, 403–404 technical skills of, 403 Forensic technology, and data mining, 388 Fraud(s), 1–20. See also specific types of fraud, e.g.: Employee fraud assessing risk of, 125 auditing standards and risk based approach to, 42–44 auditors and exposure of, 245–246 bank, 69–70 capital market, 60–61 elements of, 2–3 employee, 5, 6 error vs., 35–36 exclusive, 65–67 in financial statements, 5–6, 64–68 historical perspective, 4–5 inclusive, 65–66 indications of, 371–375 internal, 71 management, 75 and money laundering, 510–512
negligence vs., 2–3 prevalence of, 3 regulatory reaction to, 45–46 root causes of, 6–7 trigger points of, 248–255 Fraud detection, 121–124 analytic procedures, 144–148 analytic techniques, 148–150 by auditors, 75–86 control evaluation, 152–153 corruption, 158–159 fake/altered documents, 156–157 financial statement techniques, 157 foundation for, 124–126 and fraud triangle, 132–136 and information technology, 126 key procedures, 122 professional skepticism, 127–132 red flags for, 127–129 and reporting relationships, 178–180 revenue recognition, 157–158 for revenue recognition, 188–201 risk factors, 137–144, 155–156 unpredictable audits, 154–155 Fraud Deterrence Cycle, 14–20 auditing, 20 corporate governance, 15–18 investigation, 16–17, 20 remediation, 16–17 retrospective examination, 16 transaction-level controls, 16, 18–20 Fraud investigation(s), 277–294 and allegations, 288–289 of AML, 523–524 assumptions in, 281–285 case study, 289–294 confronting suspects in, 277–281 detail importance, 286–287 dismissing targets in, 281 materiality, 287–288 missteps in, 277–294 professional skepticism in, 293 and trust but verify, 293 Fraud management, financial benefits of, 46 Fraud on auditors, 70–71 Fraud risk, measures of, 371–375 Fraud risk factors, see Risk factors, fraud Fraudster(s), 47–58 as calculating criminals, 48–49 and intent to harm, 51–55 mind of, 55–57 as power brokers, 50 rationalization of, 51–52, 54–55 as situation-dependent criminals, 49–50 steps when investigating, 53 Fraud triangle, 132–136 incentive and pressure, 132–133 opportunity, 134 rationalization and attitude, 135–136 Fraudulent financial reporting, 134, 157–158
bindex.fm Page 551 Friday, December 16, 2005 4:04 PM
Index G GAAP, see Generally accepted accounting principles General ledger, data mining of, 411–412 Generally accepted accounting principles (GAAP), 34, 63–64 Global investigations, 493–508 accounting issues, 503–504 anti-bribery provisions for, 502 and company network, 504–505 and company policies, 504 coordinating, 496–497 and corporate personnel, 504 and Foreign Corrupt Practices Act, 501–503 internal-accounting-control provisions for, 502 and local licenses, 505 logistics of, 497 personal considerations for conducting, 507–508 planning, 503 record-keeping provisions for, 502–503 and schemes, 505–507 situations encountered in, 505–507 starting, 495–496 work plan for, 497–501 Government agencies, 345–346 Government contracting, 529–530 Guarantors, auditors vs., 246–247 H H. Rosenblum Inc. v. Adler, 80–81 Hanging the debit, 227 Header files, credit, 333 Holding open the books, improperly, 216–217 Home pages, corporate, 343 Horizontal analysis, 148, 369 I Improperly holding open the books, 216–217 Inclusive frauds, 65–66 Incorporation records, 333–334 Independence rules, 87 Independence standards, for nonattest services, 94–95 Industry data, company data vs., 147 Inflation: of inventory quantity, 220–222 of inventory value, 222–223 of receivables value, 211–212 Informal reports, 461–462 Information reports, company, 336 Information-seeking interviews, 353–354 Information technology, 126 Insurance fraud, 304–305 Insurance policies, 530 Intellectual property, 527–528 Interest costs, and asset misstatements, 228–229
Internal-accounting-control provisions, 502 Internal audit(s), 161–181 in changing corporate environment, 541–542 and complex fraud, 168–169 and corporate fraud, 168–169 fraud case studies, 170–178 position and function of, 261–262 resource models for, 262–263 scope of services, 164–165 Internal Audit Migration Model, see “Football” Internal auditor(s): cooperation of, with forensic accounting investigators, 261–264 cooperative relationships, 167–168 external auditors vs., 162 'football' (chart), 162–163 and money laundering, 523 objectives of, 268 professional profile of, 180 role of, 162 Internal control framework, 161–162 Internal fraud, 71 Internet sources and resources: chat rooms, 343 corporate home pages, 343 credit reports, 343–344 of government agencies, 345–346 medical records, 344–345 message boards, 343 private records, 343 Interruption, business, 530 Interview(s), 349–364 and admissions, 350–351 admission-seeking, 354–358 defined, 349 documenting, 364, 473–474 information-seeking, 353–354 planning for, 351–353 process, 358–364 subterfuge, use in, 364 Interviewing: by forensic accounting investigators, 485–486 and limitations of legal counsel, 485–486 Interview memorandums, 473–474 Inventory capitalization, 223 Inventory quantity inflation, 220–222 Inventory schemes: and asset misstatements, 219–223 inventory capitalization, 223 inventory quantity inflation, 220–222 inventory value inflation, 222–223 Inventory turnover ratio, 372 Inventory value inflation, 222–223 Investigation(s). See also specific types, e.g.: Forensic investigations of allegations, 435 data analysis in, 404–405 employee misappropriation, 434 FCPA violations, 434
551
financial statement error, 435 related-party activity, 434 role in Fraud Deterrence Cycle, 16–17, 20 of vendors, 433–434 written reports for, 455 Investigative reports, 449–474 ACFE Reporting Standards for, 453–454 and affidavits, 460 AICPA consulting standards for, 451–453 control issues in, 467 and depositions, 462–466 executive summary, 458 of expert witness opining for plaintiff on a civil fraud claim, 458–460 informal reports, 461–462 interview memorandums, 473–474 language of, 467–468 mistakes in, 466–469 opinions in, 467 oral reports, 450 overstatement in, 467 preparation of, 450–451 and relationship review, 471 subjectivity in, 468–469 summarizing findings in, 457–458 testimony binder, 473 working papers, 469–472 writing, 455–457 written investigative reports, 455 written reports, 450 Investigative team(s): coordination of, 303 legal counsel as part of, 477–483 Investigative techniques, 295–311 administrative concerns of, 296–297 areas of inquiry, 299–304 communicative, 296 and coordination, 303 and document review, 306–311 information gathering/securing, 300–303 for insurance, 304–305 learning about, 299–300 and predication, 297–299 timing, 295 Investments: fictitious, 224 misclassification of, 225–226 value manipulation of, 224–225 Investment model, securities, 61–62 Investment schemes: and asset misstatements, 224–226 fictitious investment, 224 misclassification of investments, 225–226 value manipulation of investments, 224–225 Invoice schemes, 236–239 IRS, public records of, 334
bindex.fm Page 552 Friday, December 16, 2005 4:04 PM
552
Index
K Keyword searches, 412–414 L Lapping, 210–211 Larceny: of receivables, 208–209 and revenue misappropriation, 207 Law enforcement, 489–490 Lawyers, see Legal counsel Lease-contracts receivable (LCR), 96 Legal counsel: confidentiality requirements of, 477 and forensic accounting investigators, 166–167, 475–477 forensic accounting investigators, disagreements with, 490–491 interviewing, limitations of, 485–486 investigative team, as part of, 477–483 objectives of, 268 LexisNexis, 332, 340 Liabilities and expenses, understatement of, 229–230 Liability: of auditors, 79–80, 82–85 of forensic accounting investigators, 115 Licensing boards, professional, 336–337 Litigation: civil, 485 documentation for, 483–484 Local licenses, 505 Loose-thread theory, 103–107 M Management fraud, 75 Management override, 44–45 Margin analysis, 376–377 Marital dissolution, 530–531 Materiality, 38–39 and financial statement fraud, 235–236 in fraud investigations, 287–288 Material misstatement: due to fraud, 123–124 due to fraudulent financial reporting, 134 due to misappropriation of assets, 133 Media databases, 333 Medical records, 344–345 Memorandums, interview, 473–474 Message boards, 343 Misappropriation, 5, 6 by employees, 434 investigations, 434 material misstatement due to, 133 of receivables, 206–211 revenue, 206–211 revenue recognition, 206–211
Misclassification of investments, 225–226 MLRO (money laundering reporting officer), 516 Money laundering, 509–524. See also Anti-money laundering (AML) and anonymity, 520–521 auditing and, 522–523 consequences of, 517 corporate accountancy for, 523 corporate entities and, 520–521 and customs officials, 516 defined, 519–510 and external auditors, 523 FATF definition of, 510 and financial statement auditors, 523 fraud and, 510–512 impact on financial statements, 517 and internal auditors, 523 managerial responsibility for, 523 in nonfinancial companies, 516 OECD definition of, 510 and PATRIOT Act, 513n. red flags for, 521–522 and responsibilities of MLRO, 516 scandals, 512–513 varying impact of, on companies, 512–513 Money laundering reporting officer (MLRO), 516 Multiple deliverables, 200–201 Multiple-element revenue arrangements, 201–202 N National Commission on Fraudulant Financial Reporting, see Treadway Commission Negligence, fraud vs., 2–3 NFOD, validation of, 544–545 Nonattest services, independence standards for, 94–95 Nonfinancial companies, money laundering in, 516 Nonfinancial operating data, 543–544 O Objectivity: of auditors, 41 outlined by Sarbanes-Oxley Act of 2002, 41 OECD (Organization for Economic Cooperation and Development), 510 Off-balance-sheet transactions, 230–231 Operating data, nonfinancial, 543–544 Operational company data, financial company data vs., 148 Oral presentations: and auditors, 117 use by forensic accounting investigators, 117
Oral reports, 450 Organization for Economic Cooperation and Development (OECD), 510 Overstated revenue, 183, 185 Overstatement (in investigative reports), 467 P PACER, 341 Partial shipments, 199–200 PATRIOT Act, 513n. Payments history, data mining in, 410–411 Payroll schemes, 242 PCAOB, see Public Company Accounting Oversight Board Personal pressures, 133 Plea agreements, 447 Ponzi schemes, 69 Power brokers, 50 Predication, 297–299 Predictability of audits, 154–155, 247–248 Private records, Internet sources of, 343 Priveleged environment, 114 Professional Code of Ethics, 87, 95–96 Professional licensing boards, 336–337 Professional skepticism: AICPA Code of Professional Ethics, 95–96 of auditors, 95–96, 116, 130–131 of forensic accounting investigators, 116 in fraud detection, 127–132 in fraud investigations, 293 outlined by Sarbanes-Oxley Act of 2002, 40 outlined by SAS 99, 40 Profit margin ratio, 373–374 Property ownership, public records of, 339 Prosecutors, referrals to, 444–445 Public Company Accounting Oversight Board (PCAOB), xv, 29 Public Oversight Board, 29, 33, 34 Public records: automobiles/aircraft/watercraft records, 339 for bankruptcy, 334 of bibliographies, 339 civil court records, 338 civil judgments, 338 company credit reports, 336 company information reports, 336 credit header files, 333 criminal history records, 337–338 divorce court records, 338 driving history, 336 education records, 336 environmental regulation reports, 338–339
bindex.fm Page 553 Friday, December 16, 2005 4:04 PM
Index incorporation records, 333–334 of IRS, 334 professional licensing boards, 336–337 of property ownership, 339 SEC filings, 334 Social Security numbers, 335–336 stock ownership, 334 of tax liens, 338 Uniform Commercial Code filings, 334–335 U.S. Tax Court Web site, 334 vital records, 335 voter registration records, 336 Q Quantity inflation, inventory, 220–222 Quarterly financial reports, 110 Quick ratio, 372 R Ratio analysis, 369, 372–374 asset turnover ratio, 374 average-number-of-days-in-inventor y ratio, 372–373 collection ratio, 373 current ratio, 372 debt-to-equity ratio, 373 for fraud detection, 149–150 inventory turnover ratio, 372 profit margin ratio, 373–374 quick ratio, 372 receivable turnover ratio, 373 Rationalization(s): common, 135–136 of crime, 55 of fraudsters, 51–52, 54–55 risk factors for, 135 R&D costs, 228 Reagan, Ronald, 99 Reasonable assurance, 35–38 Reasonableness testing, 369–370 Receivables, larceny of, 208–209 Receivable misappropriation, 206–211 detecting, 212–215 fictitious sales, 209–210 improperly holding open the books for, 216–217 lapping, 210–211 redating, 211 and round-tripping, 215–216 scheme, 208–209 value inflation of, 211–212 Receivable turnover ratio, 373 Record-keeping provisions, 502–503 Redating of receivables, 211 Regulation: financial statement requirements, 76 reaction to fraud, 45–46 for reporting financial information, 62–64 securities, see Securities regulation Regulators, 518 Regulatory agencies:
changes under consideration by, 72–73 and fair presentation, 63 objectives of, 268 Reimbursement schemes, 240–242 Related-party activity investigations, 434 Related-party transactions, 204–206 Relationship review, 471 Relevant data: access to, 390–392 availability of, 389–390 Remediation, 16–17 Reports of investigation, see Investigative reports Reserves, 67–68 Resource models, for internal audits, 262–263 Responsibility for disclosure, 544–545 Restatement (Second) of Torts, 81–82 Retention of evidence, 424–425 Retrospective examination, 16 Revenue, overstated, 183, 185 Revenue arrangements, multiple-element, 201–202 Revenue misappropriation, 206–211 Revenue recognition, 185 and bill-and-hold transactions, 196–198 and channel stuffing, 195–196 and consignments, 217–218 in construction contracts, 202–203 and demonstration goods, 217–218 detection techniques, 188–201, 212–215 and early delivery of product, 198–199 and fraud detection, 157–158 improperly holding open the books for, 216–217 misappropriation, 206–211 and multiple deliverables, 200–201 multiple-element revenue arrangements, 201–202 and partial shipments, 199–200 and related-party transactions, 204–206 and rights of return, 192–195 and round-tripping, 215–216 and side agreements, 191–192 timing, 186–188 Right(s): to evidence, 430–431 of return, 192–195 Risk: as factor in equity investments, 62 financial ratios as measures of, 371–375 of money laundering, 512, 516 Risk-based approach, 42–44 Risk factors, fraud, 125–126 addressing identified, 153 assessing potential impact of, 150–152
553
and financial staff, 131 fraud detection, 137–144, 150–152, 155–156 fraud evidence vs., 127 identifying/evaluating, 137–140 information gathering, 140–144 for material misstatement due to fraudulent financial reporting, 134 for material misstatement due to misappropriation of assets, 133 observation and inspection, 155–157 opportunity-based, 134–135 of rationalization and attitude, 135 and senior management, 131, 132–133 Round-tripping, 215–216 S Sales, questions for, 198–199 Sampling: in audits, 114 in forensic investigations, 114 Sarbanes-Oxley Act of 2002 (SOX), 10–11 and auditor objectivity, 41 and forensic accounting, 110 and professional skepticism, 40 SAS 56 guidelines, 145 SAS 99 guidelines: attributes of risk, 126 evidential risk factors, 155 material misstatement due to fraud, 123–124 and professional skepticism, 40 and risk-based approach, 43–44 unpredictability in audits, 154–155 Schemes, 505–507 Seasonality, 377 Securities and Exchange Commission (SEC): auditor independence, 88 and auditor objectivity, 41 and fair presentation, 64 forensic accounting services regulation, 88–92 public record filings, 334 quarterly financial information requirement, 110 Securities class-action complaint, 65 Securities investment model, 61–62 Securities regulation, prior to 1934, 9–10 Senior management, 29 decisions of, 33–35 and fraud deterrence, 161 and fraud risk factors, 131 incentive and pressure for fraud, 132–133 and management override, 44–45 objectives of, 267 questions for, 131, 140–141 responsibilities concerning money laundering, 523 and risk factors, 132–133
bindex.fm Page 554 Friday, December 16, 2005 4:04 PM
554
Index
Shareholder litigation, 531–532 Shipping department, auditor questions for, 198 Side agreements, 191–192 Situation-dependent criminals, 49–50 Skepticism, see Professional skepticism Social Security numbers, 335–336 Software development costs, 227–228 SOX, see Sarbanes-Oxley Act of 2002 SPADE, 42 Start-up costs, 228 Stock ownership, 334 Substantive working papers, 471 Subterfuge, in interviews, 364 Superior Information Services, 342 Suspects, confronting, 277–281 T Tax liens, public records of, 338 10A investigations, 255–256 Testimony binder, 473 Thornburgh report, 169 Time series analysis, 375–376 Tips, anonymous, see Anonymous communications
Total balance comparison, 149 Traffic data, see Audit trails Transaction-level controls, 16, 18–20 Treadway Commission: and audited financial statements, 77 Committee of Sponsoring Organizations, 161–162 Trend analysis, 375–376 “Trust but verify”: case study, 96–99 defining verification, 100 examples, 101–103 and fraud investigations, 293 Ronald Reagan, 99 U Ultramares, 75–76 Understatement of liabilities and expenses, 229–230 Uniform Commercial Code filings, 334–335 United States v. Arthur Young & Co., 77 U.S. sentencing commission guidelines, 440–442 U.S. Tax Court Web site, 334
V Valuation, business, 532 Value manipulation of investments, 224–225 Vendor master file, data mining in, 410–411 Verification, see “Trust but verify” Vertical analysis, 148–149 Virginia Military Institute, 289 Vital records, 335 Voter registration records, 336 W Warehouse department, auditor questions for, 198–199 Watercraft records, 339 Whistle-blowers, protections for, 315–318 Working papers: considerations regarding, 435–437 as evidence, 431–432 investigative reports, 469–472 in investigative reports, 471–472 substantive, 471 WorldCom, 169 Written reports, 455
Start display at page:

Www.dataey.com 3 Click on the Device Manager link at the bottom of the window, which will bring up a window that is similar to the one shown below. The yellow warning indicator appears for the KeyLink III device. 4 With the KeyLink III device selected (highlighted), select Action Update Driver Software.This will launch the window below: Select the bottom option to Browse my computer for.

Download 'signopad API Documentation'
  • Poppy Pitts
  • 2 years ago
  • Views:

Transcription

1 signopad API Documentation Software components for communicating with signotec Sigma and Omega LCD pads signotec GmbH Am Gierath 20 b Ratingen, Germany / Version 2.2 as of

2 Contents CONTENTS 2 LEGAL NOTICE 4 1 DOCUMENT HISTORY 5 2 FUNCTION OVERVIEW 6 3 SYSTEM REQUIREMENTS SIGNOPAD API COMPONENTS FOR WINDOWS SIGNOPAD API COMPONENTS FOR JAVA SIGNOPAD API COMPONENTS FOR LINUX 8 4 GENERAL INFORMATION ON THE SIGNOPAD API COMPONENTS STPADCAPT.OCX STPADLIB.DLL STPADLIBNET.DLL USING MULTIPLE INSTANCES DATA FORMATS SIGNDATA STRUCTURES NOTES FOR REDISTRIBUTION 11 5 DESCRIPTION OF POSSIBLE ERROR MESSAGES 13 6 INFORMATION ABOUT THE AVAILABLE IMAGE MEMORY VOLATILE IMAGE MEMORY NON-VOLATILE IMAGE MEMORY COPYING BETWEEN IMAGE MEMORIES THE TYPICAL PROCESS THE STANDBY FEATURE EXCLUSIVE USE OF NON-VOLATILE MEMORY 17 7 METHODS DEVICESETCOMPORT METHOD DEVICEGETCOMPORT METHOD DEVICEGETCOUNT METHOD DEVICEGETINFO METHOD DEVICEGETVERSION METHOD DEVICEOPEN METHOD DEVICECLOSE METHOD DEVICESETLED METHOD SENSORGETSAMPLERATEMODE METHOD SENSORSETSAMPLERATEMODE METHOD SENSORSETSIGNRECT METHOD SENSORCLEARSIGNRECT METHOD SENSORADDHOTSPOT METHOD SENSORADDSCROLLHOTSPOT METHOD SENSORSETHOTSPOTMODE METHOD SENSORCLEARHOTSPOTS METHOD SENSORSTARTTIMER METHOD SENSORSTOPTIMER METHOD SIGNATURESTART METHOD SIGNATURESTOP METHOD SIGNATURECONFIRM METHOD SIGNATURERETRY METHOD signotec GmbH signopad API Documentation Page 2 of 140

3 7.23 SIGNATURECANCEL METHOD SIGNATUREGETSIGNDATA METHOD SIGNATURESAVEASFILE METHOD SIGNATURESAVEASFILEEX METHOD SIGNATURESAVEASSTREAM METHOD SIGNATURESAVEASSTREAMEX METHOD SIGNATUREGETBOUNDS METHOD SIGNATURESCALETODISPLAY METHOD DISPLAYERASE METHOD DISPLAYERASERECT METHOD DISPLAYCONFIGPEN METHOD DISPLAYSETFONT METHOD DISPLAYSETFONTCOLOR METHOD DISPLAYSETTARGET METHOD DISPLAYSETTEXT METHOD DISPLAYSETTEXTINRECT METHOD DISPLAYSETIMAGE METHOD DISPLAYSETIMAGEFROMFILE METHOD DISPLAYSETIMAGEFROMSTORE METHOD DISPLAYSETOVERLAYRECT METHOD DISPLAYSETSCROLLPOS METHOD DISPLAYGETSCROLLPOS METHOD DISPLAYSAVEIMAGEASFILE METHOD DISPLAYSAVEIMAGEASSTREAM METHOD DISPLAYSETSTANDBYIMAGE METHOD DISPLAYSETSTANDBYIMAGEFROMFILE METHOD DISPLAYCONFIGSLIDESHOW METHOD DISPLAYGETSTANDBYID METHOD DISPLAYSETBACKLIGHT METHOD CONTROLGETVERSION METHOD CONTROLERASE METHOD CONTROLGETERRORSTRING METHOD CONTROLSETSTPADLIB METHOD CONTROLSETCALLBACK METHOD CONTROLEXIT METHOD PROPERTIES DEVICELEDDEFAULTFLAG PROPERTY CONTROLVERSION PROPERTY CONTROLAPPNAME PROPERTY CONTROLBACKCOLOR PROPERTY CONTROLRECTCOLOR PROPERTY CONTROLPENCOLOR PROPERTY CONTROLPENWIDTH PROPERTY CONTROLMIRRORDISPLAY PROPERTY DISPLAYWIDTH PROPERTY DISPLAYHEIGHT PROPERTY DISPLAYTARGETWIDTH PROPERTY DISPLAYTARGETHEIGHT PROPERTY DISPLAYSCROLLSPEED PROPERTY SIGNATURESTATE PROPERTY SIGNATURESIGNDATA PROPERTY EVENTS DEVICEDISCONNECTED EVENT SIGNATUREDATARECEIVED EVENT SENSORHOTSPOTPRESSED EVENT signotec GmbH signopad API Documentation Page 3 of 140

4 9.4 EVENT SENSORTIMEOUTOCCURED DISPLAYSCROLLPOSCHANGED EVENT 139 Legal notice All rights reserved. This document and the components it describes are products copyrighted by signotec GmbH based in Ratingen, Germany. Reproduction of this documentation, in part or in whole, is subject to prior written approval from signotec GmbH. All hardware and software names used are trade names and/or trademarks of their respective manufacturers/owners. Subject to change at any time without notice. We assume no liability for any errors that may appear in this documentation signotec GmbH signopad API Documentation Page 4 of 140

5 1 Document history Version Date Person responsible Status/note 1.8 7th January Paul Grütter Changes made to 2, 3.1, 7.18, /1/2010 Paul Grütter Changes made to 7.2 Following new item added: th February 2010 Paul Grütter Changes made to 2, 7.1, 7.3, 7.4, 7.13, 7.15, 7.19, 7.20 Following new items added: 4.4, March 2010 Paul Grütter Changes made to 6, 7.1, 7.4, 7.19, 7.20, 7.22, 7.23, 7.24, th March 2010 Paul Grütter Changes made to th June th July th August th October th November th January th February th April May July 2011 Paul Grütter Changes made to 4.3, 6, 7.21, 7.22, 7.25, 7.29, 7.30, 7.31, 7.32 Following new item added: 7.15, 7.16, 7.23, 7.25, 7.28, 7.33, 7.34, 7.35, 7.38, 7.39, 7.41, 9.3 Clemens Sutor Visual and content-related corrections Paul Grütter Changes made to 7.17, 7.19, 7.20, 7.22, 7.24, 7.41 Following new items added: 7.18, 7.23, 7.25 Paul Grütter Changes made to 8.23, 8.24, 8.31, 8.36, 8.27, 8.38 Following new items added: 7 et seqq. Paul Grütter Changes made to 3.1.2, 3.2, 3.3, 4.4, 8.6, 8.7, 8.11, 8.13, 8.24, 8.26, 8.28, 8.30, 8.31, 8.33, 8.37, 8.39, 8.40, 8.41, 8.42 Following new items added: 8.14, 8.29, 8.44, 8.45 Paul Grütter Changes made to 2, 3.1, 3.1.2, 4.4, 6, 7 et seqq., 8.13, 8.15, 8.25, 8.27, 8.29, 8.34, 8.39 Following new items added: , , 7.5 et seqq., 7.6 et seqq., 8.14, 8.40, 8.41, 8.42, 9.2, 9.10, 9.11, 9.12, 10.4 Paul Grütter Changes made to 8.13, 8.14, 8.25, 8.27, 8.40, 8.43, 8.44 Paul Grütter Document fundamentally revised Description of the STPadLib.dll & STPadLibNet.dll components added Changes that apply to the STPadCapt.ocx component are specified in the following sections: 2, 3.1.1, 4.6, 5, 6.6, 7.24, 7.26, 7.28, 7.30, 7.37, 7.52, 8.2, 8.15, 9.5 Paul Grütter Changes made to 7.1 Following new item added: Paul Grütter Changes made to 2, , 4, 7.3, 7.6, 7.7, 7.19, , , 8.3, 8.4, 8.5, 8.6, 8.7, 8.8 Following new items added: 4.4, signotec GmbH signopad API Documentation Page 5 of 140

6 2 Function overview The signopad API contains visual and non-visual interfaces, allowing programmers to implement a wide range of functions for capturing electronic signatures and displaying graphics, text and buttons on a signotec LCD pad. The STPad components all offer virtually the same range of functions right up to display on the PC screen and differ mainly in the technology used (COM,.NET, Win32). The STPadLib.dll component does not contain a visual control element and can therefore not be used directly to display signatures in real time on a PC screen. The following table provides an overview of the components included in the signopad API. File name Short description Version STPadCapt.ocx Visual control element (ActiveX/COM) for activating the Sigma and Omega model types and for visualizing signature data. STPadLib.dll Non-visual Win32 library for activating the Sigma and Omega model types. STPadLibNet.dll.NET class library for activating the Sigma and Omega model types. Contains a non-visual as well as a visual (Windows Forms Control) class. STPad.ini Control file to set different kind of parameters for the pad communication. In addition, debug logging can be activated for the components listed above. STPadStores.ini Control file to assign non-volatile image memories exclusively to an application. Please refer to chapter Exclusive use of non-volatile memory for details. signoimager 2.exe A simple program to capture, view and save signatures with a signotec LCD Signature Pad. signointegrator 2.exe A simple program for capturing signatures with a signotec LCD signature pad that can pass a rendered signature to the clipboard or to a running program. signoreset 2.exe A simple console program that resets all connected pads to the factory default settings. signohelp.dll Needed by SignoImager 2 and SignoIntegrator signview.dll Some of the included demo applications and the signoimager 2 use the SignDraw Control from the signview.dll. This file is only included as a demo version. The full version and documentation are available separately in the signoapi. Several sample applications Applications and source code in different programming languages to demonstrate the functions of the STPad components. - Note: The STPad.dll component contained in the signopad API or earlier is no longer required signotec GmbH signopad API Documentation Page 6 of 140

7 3 System requirements 3.1 signopad API components for Windows The signopad API for Windows can be run on all Windows versions as of Windows XP. It was tested under the following systems and development environments: - Windows XP SP3 - Windows Vista - Windows 7 - Microsoft Visual Studio 6 Professional Edition - Microsoft Visual Studio 2005 Professional Edition - Microsoft Visual Studio 2008 Professional Edition - Microsoft Visual Studio 2010 Professional Edition - CodeGear Delphi 2007 Professional Edition - Embarcadero Delphi XE Architect Edition C++ dependencies All components require the Microsoft C++ libraries, Version 10. The C++ example programs require the Microsoft C++ libraries, Version 8. The signopad API Setup automatically installs the Visual Studio 2010 Redistributables and Visual Studio 2005 SP1 Redistributables, where necessary NET dependency The STPadLibNet.dll requires the.net Framework Version 2.0. The C# and Visual Basic.NET demo applications included in the signopad API require the.net Framework Version 2.0 or 3.5. The signoimager 2 and the signointegrator 2 need the.net framework in version 3.5. The.NET Framework is not included in the signopad API and must be manually installed if necessary. The Visual Basic 6 demo application does not need these frameworks and is therefore linked to the start menu as standard demo Known problems Visual C++ 6 and Windows Vista The STPadCapt.ocx element cannot be added via Project > Add to project > Components and control elements. Please add this element as follows: - Right-click in your dialog and select Add ActiveX control element - Select signotec Pad Capture Control from the list - Right-click the new element and select Class wizard - Go to the Member variables tab - Select Add variable - Follow the dialog boxes that appear - Right-click the new element and select Events - Select Add and edit - Follow the dialog boxes that appear signotec GmbH signopad API Documentation Page 7 of 140

8 bit applications As all components included in the signopad API are 32-bit components, they cannot be used in applications built for x64 or Any CPU. Please set the target x86 for your application. Applications that were created in Visual Studio 2005 and use the STPadLibNet.dll component cannot be run under Windows Vista x64. Please use Visual Studio 2008 or a newer version instead Multithreading ActiveX controls must live in the so-called Single Threaded Apartment (STA). If the STPadCapt.ocx shall be used in an MTA application, you should create an STA Form including the STPadCapt.ocx and call this as a modal dialog from your application NET 4.0 The.NET 2.0 runtime activation policy must be enabled in order to use the STPadLibNet.dll components in.net 4.0 based projects. The app.config file must be edited within the project as follows for this purpose: <?xml version='1.0'?> <configuration> <startup uselegacyv2runtimeactivationpolicy='true'> <supportedruntime version='v4.0' sku='.netframework,version=v4.0'/> </startup> </configuration> 3.2 signopad API components for Java Please use the signopad-api Java that can be downloaded for free from our website. 3.3 signopad API components for Linux Please use the signopad-api Java that can be downloaded for free from our website signotec GmbH signopad API Documentation Page 8 of 140

9 4 General information on the signopad API components One of the three STPad components is required to activate a signotec LCD pad. The required functionality and technology used determine which component is chosen. For further details, see the following sections. 4.1 STPadCapt.ocx The STPadCapt.ocx component is self-registering and supports the Microsoft IDispatch interface. This makes it equally available under environments such as.net, Delphi, Visual C++ or Visual Basic. This component should be used if the signature is to be displayed in a window in real-time. The STPadLibNet.dll component should be used for.net applications. This OCX must be registered in the system using regsvr32 so that all applications access the same component. Generally speaking, the control element is embedded in a window during development; most development environments will then automatically ensure correct initialisation. However, it is also possible to generate the element at runtime; the CreateControl() method is available in this case. For details, please see the Microsoft documentation for ActiveX components ProgID allocation Below is the CLSID for the control: ActiveX control name signotec Pad Capture Control CLSID B D4F-A2DF-CD35C8908BA1 The IID for the dispatch interface: Interface name _DSTPadCapt IID DBCB C3A-975D AC408 The IID for the event dispatch interface: Interface name _DSTPadCaptEvents IID 30C53BC9-DAF3-423A-A283-BFEF408BD0A9 Below is the ProgID for the control: ActiveX control name signotec Pad Capture Control Prog ID STPadCapt.STPadCaptCtrl 4.2 STPadLib.dll The STPadLib.dll is a Win32 library. A C header file (STPadLib.h) and a library file (STPadLib.lib) are included. This DLL can be used both statically and with dynamic linking; it can therefore be used in all common Win32-compatible development environments. Initialisation is performed automatically as soon as the DLL is activated; before it is unloaded again, the STControlExit() method must be called to release resources used internally signotec GmbH signopad API Documentation Page 9 of 140

10 This component should be used if there is no window available in which a visual control element can be embedded, or if no real-time display is required. It is also very suitable for a simple program without user interface that only checks, for example, whether signotec pads are connected. The STPadLibNet.dll component should be used for.net applications. The DLL cannot be registered in the system, but must be in the application s search path at runtime. Various applications can therefore access various versions of the DLL. 4.3 STPadLibNet.dll The STPadLibNet.dll is a.net class library. It can be used in all common.net-compatible development environments. All classes, enumerations, etc., are contained in the signotec.stpadlibnet namespace. This component should be used if.net is used for development purposes. It contains a nonvisual as well as a visual (Windows Forms Control) class. The two classes can also be combined. The DLL cannot be registered in the system, but must be in the application s search path at runtime. Various applications can therefore access various versions of the DLL Using the STPadLibControl class The STPadLibControl class is derived from System.Windows.Forms.UserControl. It can be embedded as a visual control element in a Windows form or in a WPF window via a Windows Forms Host. All documented methods, properties and events are available Using the STPadLib class The STPadLib class is designed for communicating without a visual control element. Only the non-visual methods, properties and events are therefore available Using both classes It is also possible to use the STPadLib and STPadLibControl classes simultaneously in a project. For example, a STPadLib object, which is responsible for basic communication tasks (searching for devices etc.), can remain valid during the entire runtime of a program. As soon as the signing process has started, a STPadLibControl object to which the STPadLib object is passed, can be generated in a dialog box (also see ControlSetSTPadLib()). This means that a pad search and initialisation does not need to be performed each time the dialog box is generated. This technology is used in the supplied demo application. 4.4 Using multiple instances The components included in the signopad API can be instantiated more than once. If multiple instances of a component are used in different memory areas (for example, different programs), these instances are completely independent of each other and there is nothing else to be aware of signotec GmbH signopad API Documentation Page 10 of 140

11 If multiple instances of a component are used in the same memory area, please note the following: - When DeviceGetCount() is called, it is valid for all instances and therefore only needs to be executed in one instance. - If a connection to a device has already been opened by an instance, only the previously determined value is returned when DeviceGetCount() is called in another instance, i.e., no new search is carried out. - A maximum of two connections can be opened simultaneously. In general, there is therefore no point in using more than two instances simultaneously. 4.5 Data formats The data formats of the individual components vary according to the technology used. The STPadCapt.ocx component uses only OLE-compliant and COM-compliant data types for complex data structures (VARIANT, BSTR, etc.), while the STPadLib.dll uses types such as BYTE and LPCWSTR and the STPadLibNet.dll uses byte and string. Signatures can be returned in BMP, GIF, JPEG, PNG and TIFF format. As a rule, you should use the TIFF format as this offers the best results with the smallest file size. JPEG is an image format with lossy compression and is not recommended. 4.6 SignData structures The signopad API components can return a captured signature as a SignData data structure. It is an encrypted, compressed, biometric format that can be stored in a database and/or as a tag in a TIFF document or a PDF document. A separate API (signoapi) is available for the (ISO-compliant) signature of PDF and TIFF documents. This API includes a wide range of functions for PDF management along with much more. Please contact your signotec contact if you are interested. SignData structures can be visualised in real time using the signview.dll component from the signoapi. The component is included as a demo version; the full version is included in the signoapi. 4.7 Notes for redistribution The signopad-api setup may be installed with the silent flag set. For details, please see the signopad API Installation Guide, which can be found in the Download area at You can, of course, redistribute individual files from the signopad API in a separate Setup. Essentially, only the STPad component used by your application, possibly the STPad.ini and STPadStores.ini files, and, depending on component used, Microsoft runtime and/or Framework files, are required to support the signotec Sigma and Omega LCD signature pads. If your application uses the STPadCapt.ocx component, it must be registered in the system using regsvr signotec GmbH signopad API Documentation Page 11 of 140

12 The signopad API Setup installs files at the following locations: Component STPadCapt.ocx STPadLib.dll STPadLib.h STPadLib.lib STPadLibNet.dll STPad.ini STPadStores.ini signoimager 2.exe signointegrator 2.exe signoreset 2.exe signohelp.dll signview.dll Several sample applications including source code Installation path <Installation path>dll <Installation path> signopad-apistpadlib <Installation path> signopad-apistpadlib <Installation path> signopad-apistpadlib <Installation path> signopad-apistpadlibnet %COMMONPROGRAMFILES%signotecconfig %COMMONPROGRAMFILES%signotecconfig <Installation path>signopad- APIApplicationssignoImager 2 <Installation path>signopad- APIApplicationssignoIntegrator 2 <Installation path>signopad- APIApplicationssignoReset 2 <Installation path>dll <Installation path>dll <Installation path>signopad-apisamples signotec GmbH signopad API Documentation Page 12 of 140

13 5 Description of possible error messages Most methods of the STPadCapt.ocx component and the STPadLib.dll return an integer value, which is always negative in the case of an error. A description of the respective error messages is provided in the following table. By calling the ControlGetErrorString() method, you can get an error description at runtime. The description is either in German or in English, depending on the default system language settings. The STPadLibNet.dll throws an STPadException if an error occurs, which is why all calls should be enclosed with try() & catch(). The Messageand ErrorCodeproperties of the STPadException contain an error description (in German or in English, depending on default system language settings) or one of the error codes listed below. Error Description -1 A NULL pointer was passed. -3 One of the parameters that was passed contains an invalid value. -4 The signing pad is already being used by another application. -5 No connection has been opened to this signature pad. -6 A connection has already been opened. -7 No further connections can be opened. -8 No device with this ID is connected. -9 The LED colour that was passed cannot be set. -12 The function could not be executed because the signature capture process is running. -13 No further hotspots can be added -14 The coordinates are overlapping with the signature window or one of the hotspots already set. -15 The function cannot be executed because no signature capture area has been set. -17 The function cannot be executed because no signature capture process was started. -18 An error occurred while attempting to reserve memory. -19 An error occurred while initialising a system resource. -20 An error occurred while communicating with the signing pad. -21 The rectangle passed is too small. -22 No compatible devices connected or the connection to a device has been cut. -25 The connected device does not support this function or one of the parameters. -26 Error while reading or writing a file. -94 The function could not be executed because the display content is scrolled. -95 The function could not be executed because it would have activated the scroll mode that is not possible if a hotspot outside the overlay rectangle is defined. -97 An error occurred during initialisation. Please restart the software signotec GmbH signopad API Documentation Page 13 of 140

14 6 Information about the available image memory The signotec LCD Signature Pads have several image memory, which can be used by different methods. An image memory has at least the size of the display and can store one picture in a maximum of this size. Adding another image overrides the areas it overlaps with the existing memory content. Adding multiple images to one memory can therefore create a collage. Depending on the model, a different number of volatile and non-volatile memories are available. 6.1 Volatile image memory All signotec LCD Signature Pads have at least two volatile image memories, one foreground buffer containing the current display content and one background buffer, which can be used to prepare the display content. It can be written in both of the buffers. The content of the volatile image memory is lost when you close the connection to the device Model type Sigma The two volatile image memories have the size of the display (320 x 160 pixels). The transmission and representation of images is usually so fast that there is no visible lag. For more complex representations that consist of several individual images, it may be useful to first save them in the background buffer before copying them into the foreground buffer Model type Omega The Omega model has three volatile image memories, two that have the doubled size of the display (640 x 960 pixels) to be used as foreground and background buffers and one that has the size of the display (640 x 480 pixels) to be used as overlay buffer. Its contents can be overlaid over the current display content. The speed of displaying a picture in Omega model depends on the size and content of the images, usually it s visible. Therefore, images should always be stored first in the background buffer and then copied into the foreground buffer. 6.2 Non-volatile image memory Depending on the model, a different number of non-volatile memories are available. The saving of images in non-volatile image memory lasts longer than storing in volatile image memory, but the content remains unchanged even after switching off the device. An intelligent memory management detects whether an image to be stored is already stored in the device so that only the first time it s stored it comes to a delay Model type Sigma The Sigma model has one non-volatile image memory in the size of the display (320 x 160 pixels), which can only be used for the standby image. Due to the rapid transmission and display of pictures, it is not necessary to be able to save other images permanently signotec GmbH signopad API Documentation Page 14 of 140

15 6.2.2 Model type Omega The Omega model has eleven non-volatile image memories, which can be used for the standby image, the slide show and optimizations of the program. The memories, used for the standby image or the slide show, are read-only and can be freed only by disabling the standby image or the slide show. One non-volatile image memory has the doubled size of the display (640 x 960 pixels), ten memories have the size of the display (640 x 480 pixels). To use a non-volatile memory, this must be reserved first. This is done by calling the DisplaySetTarget() method. The size of the currently selected memory can be queried using the DisplayTargetWidth and DisplayTargetHeight properties. 6.3 Copying between image memories The contents can be copied between the most of the available image stores. The contents of the background buffer cannot be copied but only moved to the foreground buffer. The contents of the overlay buffer cannot be copied but only overlaid over the display content. Typical copy operations are copying from a non-volatile memory in a volatile memory and moving from the volatile back buffer into the foreground buffer. Copying an image within the device is always faster than sending this image from the PC to the device. Please refer to the descriptions of the DisplaySetImageFromStore() and DisplaySetOverlayRect() methods for details. 6.4 The typical process Most applications use the same images with possibly variable units (such as document-related texts) for the signature process. It therefore makes sense to store images that are the same each time in one of the non-volatile memory if possible. The following is the typical work flow for this scenario (C# sample code): First, the images are loaded, which will be permanently stored in the device, since they change rarely. A memory is reserved by calling the DisplaySetTarget() method with the value -1. This method returns the ID of the memory used. If there s no non-volatile memory available the volatile background buffer is set as target (ID 1). This is always the case when using the Sigma model. When using the Omega model the number of available memories can be less than expected when a slide show is configured. Text and images that are added to a non-volatile memory are only saved locally to begin with and are sent to the device only when DisplaySetImageFromStore() or DisplayConfigSlideShow() is called in order to be able to compare the image (which may be composed of several texts and images) with the image already stored in the device. Thus only when one of these methods is called, there will be a noticeable delay. int nstoreid = axstpadcapt1.displaysettarget(-1); if (nstoreid < 0) MessageBox.Show(String.Format('Error 0', nstoreid); int nresult = axstpadcapt1.displaysetimagefromfile(10, 10, 'C:/1.bmp'); MessageBox.Show(String.Format('Error 0', nresult); int nresult = axstpadcapt1.displaysettext(200, 160, 0, 'signature:'); signotec GmbH signopad API Documentation Page 15 of 140

16 MessageBox.Show(String.Format('Error 0', nresult); int nresult = axstpadcapt1.displaysetimagefromfile(220, 400, 'C:/2.bmp'); MessageBox.Show(String.Format('Error 0', nresult); The contents can now be copied to a volatile image memory, typically the background buffer (DisplaySetTarget(1)). If the images have already been written to the background buffer because no non-volatile memory was available (see above), the DisplaySetImageFromStore() method will not function, however it will also not produce any errors and can therefore be safely called. int nstoreid = axstpadcapt1.displaysettarget(1); if (nstoreid < 0) MessageBox.Show(String.Format('Error 0', nstoreid); int nreturn = axstpadcapt1.displaysetimagefromstore(nstoreid); if (nreturn < 0) MessageBox.Show(String.Format('Error 0', nreturn); Now content, that change with every signature process, can be added to the background buffer. int nresult = axstpadcapt1.displaysetimagefromfile(120, 400, 'C:/3.bmp'); MessageBox.Show(String.Format('Error 0', nresult); int nresult = axstpadcapt1.displaysettext(200, 160, 0, ' '); MessageBox.Show(String.Format('Error 0', nresult); In the background buffer there s now a collage of two images and a text copied from a nonvolatile memory and an image and a text that have been sent from the PC. This collage can now be moved to the foreground buffer and thus displayed on the screen. The total composition has happened before in the background buffer and thus 'invisible'. int nstoreid = axstpadcapt1.displaysettarget(0); if (nstoreid < 0) MessageBox.Show(String.Format('Error 0', nstoreid); int nreturn = axstpadcapt1.displaysetimagefromstore(1); if (nreturn < 0) MessageBox.Show(String.Format('Error 0', nreturn); 6.5 The standby feature The signotec LCD Signature Pads can display one or more (Omega model only) images automatically when not in use (no established connection). These images are stored permanently in the device and they are displayed without launching any application on the PC. Image memories that are used by the standby feature are write protected and cannot be used for by an application signotec GmbH signopad API Documentation Page 16 of 140

17 6.5.1 Displaying a logo All devices can store one image that is displayed automatically in standby. Please refer to the descriptions of the DisplaySetStandbyImage() and DisplaySetStandbyImageFromFile() methods for details Displaying a slide show Alternatively, The Omega model can display a slide show containing up to eleven pictures. To configure a slide show, please follow these steps: First, a standby mode that may be configured must be disabled by calling DisplayConfigSlideShow() in order to remove write protection from all images. The current configuration can be retrieved with the DisplayGetStandbyId() method. Then any contents can be written to one or more of the non-volatile image memories (as described in 7.4). When all the contents have been written, the desired image memories must be configured using the DisplayConfigSlideShow() method. 6.6 Exclusive use of non-volatile memory Since after closing the connection to a device all the information about reserved stores is lost, two applications may use the same memory and thus always overwrite it. As a result, the use of non-volatile memory even leads to a slower program execution. To avoid this problem, a user may exclusively reserve up to ten image memories of an Omega device for a particular application. These stores are not available to other applications and thus cannot be overwritten accidently Implementation in an application To support this feature, applications must notify the control of their name. This is done with the ControlAppName property. Users can enter this name in the configuration file and reserve a certain number of memories for this application Assign non-volatile memory to an application Memories are assigned in the STPadStores.ini file, which must be located in the %COMMONPROGRAMFILES%signoteccon fig folder. The configuration in this file is for the current workstation only; when connecting a device to another workstation without a configuration all image memories are available again. The file can contain up to ten sections (for ten applications). The names of the sections are [Application1], [Application2], etc. Each section contains two keys named Nameand StoreCount. The Name key contains the name given by the application (see above). The StoreCount key contains the number of memories to be reserved. It does not matter whether the memory is reserved only for one or for multiple applications, but the sum of the allocated memories must not exceed 10. The memory with a size of 640 x 960 pixels cannot be used exclusively signotec GmbH signopad API Documentation Page 17 of 140

18 [Application1] Name=MyGreatApp StoreCount=2 [Application2] Name=Another Great App StoreCount=4 If not all of the available memory is assigned exclusively, all further image memories are available for all applications. If a standby image or a slide show is already configured, the maximum number of available memories is reduced accordingly. If an application configures a standby image or a slide show on a workspace with a memory configuration, only the image memories that are reserved for this or none application can be used signotec GmbH signopad API Documentation Page 18 of 140

19 7 Methods Methods are named according to the following naming convention: - Methods that set or query general hardware properties begin with Device - Methods that set or query sensor properties begin with Sensor - Methods that apply to signatures begin with Signature - Methods that set or query LCD properties begin with Display - Methods that set or query the properties of an ActiveX control element begin with Control The methods included in the STPadLib.dll component all begin with ST, for example, STDeviceOpen(). Some methods and parameters are not contained in all components, so you should always take note of the given method declaration. The methods of STPadCapt.ocx and STPadLib.dll are declared in C syntax; the methods of STPadLibNet.dll are declared in C# and VB syntax. 7.1 DeviceSetComPort method This method defines the interfaces to be searched for devices when DeviceGetCount() is called up. Parameter Values I/O Meaning BSTR bstrportlist NULL, I A search will only be made for HID devices ' LPCWSTR szportlist (default). 'IP=< I string portlist Addre ByVal portlist As ss>: String <Port >' Return value LONG int Integer An HID device that is connected to a signotec AK USB device server will be searched for at the IP address indicated; <Address> is the IP address of the device server and has the format xxx.xxx.xxx.xxx, <Port> is the port via which the signature device should be activated, generally A valid value would therefore be 'IP= :1002' for example; for details about the signotec AK USB device server, please refer to your contact at signotec. 'all' I A search is made for serial devices on all COM ports; this search may take an extremely long time depending on the hardware configuration; a search is not made for HID devices. other I A search is made for serial devices on all COM ports that are transferred into a list separated by semicolons (1 256); this search may take an extremely long time depending on the hardware configuration and number of defined ports; a search is not made for HID devices. Values Meaning 1 - Number of COM ports set/ip addresses defined; the 256 search for local HID devices is disabled 0 The search for serial devices/devices connected in the network is disabled < 0 Error (not for STPadLibNet.dll) signotec GmbH signopad API Documentation Page 19 of 140

20 7.1.1 STPadCapt.ocx Available from Version onwards. The status described is available from Version LONG DeviceSetComPort(BSTR bstrcomportlist) Implementation in C# int nportcount = axstpadcapt1.devicesetcomport('1;4;128'); if (nportcount < 0) MessageBox.Show(String.Format('Error 0', nportcount); else MessageBox.Show(String.Format('0 ports set.', nportcount); Implementation in Visual Basic Dim nportcount As Integer = AxSTPadCapt1.DeviceSetComPort('1;4;128') If nportcount < 0 Then MsgBox('Error ' & CStr(nPortCount)) Else MsgBox(CStr(nPortCount) & ' ports set.') End If STPadLib.dll The status described is available from Version LONG STDeviceSetComPort(LPCWSTR szcomportlist) Implementation in C++ long nportcount = STDeviceSetComPort(L'1;4;128'); WCHAR sztext[64]; if (nportcount < 0) swprintf_s(sztext, 64, L'Error %d', nportcount); else swprintf_s(sztext, 64, L'%d ports set', nportcount); AfxMessageBox(szText); STPadLibNet.dll The status described is available from Version int DeviceSetComPort(string comportlist) Function DeviceSetComPort(ByVal comportlist As String) As Integer Implementation in C# try int nportcount = STPad.DeviceSetComPort('1;4;128'); MessageBox.Show(String.Format('0 ports set.', nportcount); catch (STPadException ex) MessageBox.Show(ex.Message); signotec GmbH signopad API Documentation Page 20 of 140

21 Implementation in Visual Basic Try Dim nportcount As Integer = STPad.DeviceSetComPort('1;4;128') MsgBox(CStr(nPortCount) & ' ports set') Catch ex As STPadException MsgBox(ex.Message) End Try 7.2 DeviceGetComPort method This method returns the number of the COM port to which a device is connected. Parameter Values I/O Meaning LONG nindex >= 0 I Index of the device whose port number is to be int index queried ByVal index As Integer Return value LONG int Integer Values Meaning 1 - Number of the COM port in serial devices This device is an HID device < 0 Error (not for STPadLibNet.dll) STPadCapt.ocx Available from Version onwards. LONG DeviceGetComPort(LONG nindex) Implementation in C# int nport = axstpadcapt1.devicegetcomport(0); if (nport < 0) MessageBox.Show(String.Format('Error 0', nport)); else if (nport 0) MessageBox.Show(String.Format('This is an HID device. )); else MessageBox.Show(String.Format('This device is connected to COM port 0.', nport)); Implementation in Visual Basic Dim nport As Integer = AxSTPadCapt1.DeviceGetComPort(0) If nport < 0 Then MsgBox('Error ' & CStr(nPort)) ElseIf nport = 0 Then MsgBox('This is an HID device.') Else MsgBox('This device is connected to COM port ' & CStr(nPortCount)) End If signotec GmbH signopad API Documentation Page 21 of 140

22 7.2.2 STPadLib.dll LONG STDeviceGetComPort(LONG nindex) Implementation in C++ long nport = STDeviceGetComPort(0); WCHAR sztext[64]; if (nport < 0) swprintf_s(sztext, 64, L'Error %d', nport); else if (nport 0) swprintf_s(sztext, 64, L'This is an HID device. ); else swprintf_s(sztext, 64, L'This device is connected to COM port %d', nport); AfxMessageBox(szText); STPadLibNet.dll int DeviceGetComPort(int index) Function DeviceGetComPort(ByVal nindex As Integer) As Integer Implementation in C# try int nport = STPad.DeviceGetComPort(0); if (nport 0) MessageBox.Show(String.Format('This is an HID device. )); else MessageBox.Show(String.Format('This device is connected to COM port 0.', nport)); catch (STPadException ex) MessageBox.Show(ex.Message); Implementation in Visual Basic Try Dim nport As Integer = STPad.DeviceGetComPort(0) If nport = 0 Then MsgBox('This is an HID device.') Else MsgBox('This device is connected to COM port ' & CStr(nPort)) End If Catch ex As STPadException MsgBox(ex.Message) End Try signotec GmbH signopad API Documentation Page 22 of 140

23 7.3 DeviceGetCount method This method searches for connected devices, generates an internal index beginning with 0 and returns the number of devices detected. This value should be cached so that the method only needs to be called, if the number of connected devices has changed. A device s index is retained until the method is called again. The index can be assigned to a device via the information returned by DeviceGetInfo(). By default, a search will only be made for HID devices that are locally connected. A search will only be made for other devices if this has been configured previously by calling up DeviceSetComPort(). Please observe the relevant information in the Using multiple instances section. Parameter Values I/O Meaning Return value Values Meaning LONG >= 0 Number of devices detected int < 0 Error (not for STPadLibNet.dll) Integer STPadCapt.ocx Available from Version onwards. LONG DeviceGetCount() Implementation in C# int ndevicecount = axstpadcapt1.devicegetcount(); if (ndevicecount < 0) MessageBox.Show(String.Format('Error 0', ndevicecount); else MessageBox.Show(String.Format('0 devices detected.', ndevicecount); Implementation in Visual Basic Dim ndevicecount As Integer = AxSTPadCapt1.DeviceGetCount If ndevicecount < 0 Then MsgBox('Error ' & CStr(nDeviceCount)) Else MsgBox(CStr(nDeviceCount) & ' devices detected.') End If STPadLib.dll LONG STDeviceGetCount() signotec GmbH signopad API Documentation Page 23 of 140

24 Implementation in C++ long ndevicecount = STDeviceGetCount(); WCHAR sztext[64]; if (ndevicecount < 0) swprintf_s(sztext, 64, L'Error %d', ndevicecount); else swprintf_s(sztext, 64, L'%d devices detected.', ndevicecount); AfxMessageBox(szText); STPadLibNet.dll int DeviceGetCount() Function DeviceGetCount() As Integer Implementation in C# try int ndevicecount = STPad.DeviceGetCount(); MessageBox.Show(String.Format('0 devices detected.', ndevicecount)); catch (STPadException ex) MessageBox.Show(ex.Message); Implementation in Visual Basic Try Dim nport As Integer = STPad.DeviceGetCount() MsgBox(CStr(nDeviceCount) & ' devices detected.') Catch ex As STPadException MsgBox(ex.Message) End Try 7.4 DeviceGetInfo method You can use this method to retrieve the serial number and model type of a connected device in order to uniquely identify it. Parameter Values I/O Meaning BSTR* pbstrserial max. O Serial number WCHAR szserial[16] 16 chars ref string serial ByRef serial As String LONG* pntype ref int type ByRef type As Integer 1 O Sigma HID model type 2 O Sigma serial model type 11 O Omega HID model type 12 O Omega serial model type other O Reserved for further model types signotec GmbH signopad API Documentation Page 24 of 140

25 LONG nindex int index >= 0 I Index of the device whose information is to be queried ByVal index As Integer Return value Values Meaning LONG 0 Method was executed successfully < 0 Error STPadCapt.ocx Available from Version onwards. LONG DeviceGetInfo(BSTR* pbstrserial, LONG* pntype, LONG nindex) Implementation in C# string strserial = '; int ntype = 0; int nresult = axstpadcapt1.devicegetinfo(ref strserial, ref ntype, 0); MessageBox.Show(String.Format('Error 0', nresult); else MessageBox.Show(String.Format('Type: 0, Serial: 1', ntype, strserial); Implementation in Visual Basic Dim strserial As String = ' Dim ntype As Integer = 0 Dim nresult As Integer = AxSTPadCapt1.DeviceGetInfo(strSerial, ntype, 0) If nresult < 0 Then MsgBox('Error ' & CStr(nResult)) Else MsgBox('Type: ' & CStr(nType) & ', Serial: ' & strserial) End If STPadLib.dll LONG STDeviceGetInfo(WCHAR szserial[16], LONG* pntype, LONG nindex) Implementation in C++ WCHAR szserial[16]; long ntype = 0; long nresult = STDeviceGetInfo(szSerial, &ntype, 0); WCHAR sztext[64]; swprintf_s(sztext, 64, L'Error %d', nresult); else swprintf_s(sztext, 64, L'Type: %d, Serial: %s', ntype, szserial); AfxMessageBox(szText); signotec GmbH signopad API Documentation Page 25 of 140

26 7.4.3 STPadLibNet.dll void DeviceGetInfo(ref string serial, ref int type, int index) Sub DeviceGetInfo(ByRef serial As String, ByRef type As Integer, ByVal index As Integer) Implementation in C# try string strserial = '; int ntype = 0; STPad.DeviceGetInfo(ref strserial, ref ntype, 0); MessageBox.Show(String.Format('Type: 0, Serial: 1', ntype, strserial); catch (STPadException ex) MessageBox.Show(ex.Message); Implementation in Visual Basic Try Dim strserial As String = ' Dim ntype As Integer = 0 STPad.DeviceGetInfo(strSerial, ntype, 0) MsgBox('Type: ' & CStr(nType) & ', Serial: ' & strserial) Catch ex As STPadException MsgBox(ex.Message) End Try 7.5 DeviceGetVersion method You can use this method to retrieve the version number of a connected device s firmware. It is intended primarily for support purposes. Parameter Values I/O Meaning BSTR* pbstrversion max. O Firmware version number (major.minor) WCHAR 16 szversion[16] chars LONG nindex int index >= 0 I Index of the device whose information is to be queried ByVal index As Integer Return value Values Meaning LONG 0 Method was executed successfully < 0 Error string max. Firmware version number (major.minor) 16 String chara cters signotec GmbH signopad API Documentation Page 26 of 140

27 7.5.1 STPadCapt.ocx Available from Version onwards. LONG DeviceGetInfo(BSTR* pbstrversion, LONG nindex) Implementation in C# string strversion = '; int nresult = axstpadcapt1.devicegetversion(ref strversion, 0); MessageBox.Show(String.Format('Error 0', nresult); else MessageBox.Show(String.Format('Firmware: 0', strversion); Implementation in Visual Basic Dim strversion As String = ' Dim nresult As Integer = AxSTPadCapt1.DeviceGetVersion(strVersion, 0) If nresult < 0 Then MsgBox('Error ' & CStr(nResult)) Else MsgBox('Firmware: ' & strversion) End If STPadLib.dll LONG STDeviceGetVersion(WCHAR szversion[16], LONG nindex) Implementation in C++ WCHAR szversion[16]; long nresult = STDeviceGetVersion(szVersion, 0); WCHAR sztext[64]; swprintf_s(sztext, 64, L'Error %d', nresult); else swprintf_s(sztext, 64, L'Firmware: %s', szversion); AfxMessageBox(szText); STPadLibNet.dll string DeviceGetVersion(int index) Function DeviceGetVersion(ByVal index As Integer) As String signotec GmbH signopad API Documentation Page 27 of 140

28 Implementation in C# try MessageBox.Show(String.Format('Firmware: 0', STPad.DeviceGetVersion(0))); catch (STPadException ex) MessageBox.Show(ex.Message); Implementation in Visual Basic Try MsgBox('Firmware: ' & STPad.DeviceGetVersion(0)) Catch ex As STPadException MsgBox(ex.Message) End Try 7.6 DeviceOpen method This method opens a connection to a device. The LCD is erased and the backlight is switched on if configured so in the file STPad.ini (see method DisplaySetBacklight()). Please observe the relevant information in the Using multiple instances section. Parameter Values I/O Meaning LONG nindex >= 0 I Index of the device to which a connection is to int index be opened ByVal index As Integer Return value Values Meaning LONG 0 Method was executed successfully < 0 Error STPadCapt.ocx Available from Version onwards. LONG DeviceOpen(LONG nindex) Implementation in C# int nresult = axstpadcapt1.deviceopen(0); MessageBox.Show(String.Format('Error 0', nresult); Implementation in Visual Basic Dim nresult As Integer = AxSTPadCapt1.DeviceOpen(0) If nresult < 0 Then MsgBox('Error ' & CStr(nResult)) End If signotec GmbH signopad API Documentation Page 28 of 140

29 7.6.2 STPadLib.dll LONG STDeviceOpen(LONG nindex) Implementation in C++ long nresult = STDeviceOpen(0); AfxMessageBox(L'Error!'); STPadLibNet.dll void DeviceOpen(int index) Sub DeviceOpen(ByVal index As Integer) Implementation in C# try STPad.DeviceOpen(0); catch (STPadException ex) MessageBox.Show(ex.Message); Implementation in Visual Basic Try STPad.DeviceOpen(0) Catch ex As STPadException MsgBox(ex.Message) End Try 7.7 DeviceClose method This method closes the connection to a device. A currently running signature capture process is terminated and and the backlight is switched off if configured so in the file STPad.ini (see method DisplaySetBacklight()). Captured signature data is discarded When the STPadCapt.ocx component is used, this method is called automatically as soon as the window containing the control element is closed. Parameter Values I/O Meaning LONG nindex >= 0 I Index of the device whose connection is to be int index closed ByVal index As Integer Return value Values Meaning LONG 0 Method was executed successfully < 0 Error signotec GmbH signopad API Documentation Page 29 of 140

30 7.7.1 STPadCapt.ocx Available from Version onwards. LONG DeviceOpen(LONG nindex) Implementation in C# int nresult = axstpadcapt1.deviceclose(0); MessageBox.Show(String.Format('Error 0', nresult); Implementation in Visual Basic Dim nresult As Integer = AxSTPadCapt1.DeviceClose(0) If nresult < 0 Then MsgBox('Error ' & CStr(nResult)) End If STPadLib.dll LONG STDeviceClose(LONG nindex) Implementation in C++ long nresult = STDeviceClose(0); AfxMessageBox(L'Error!'); STPadLibNet.dll void DeviceClose(int index) Sub DeviceClose(ByVal index As Integer) Implementation in C# try STPad.DeviceClose(0); catch (STPadException ex) MessageBox.Show(ex.Message); Implementation in Visual Basic Try STPad.DeviceClose(0) Catch ex As STPadException MsgBox(ex.Message) End Try signotec GmbH signopad API Documentation Page 30 of 140

The full setup includes the server itself, the server control panel, Firebird Database Server, and three sample applications with source code.

Content Introduction... 2 Data Access Server Control Panel... 2 Running the Sample Client Applications... 4 Sample Applications Code... 7 Server Side Objects... 8 Sample Usage of Server Side Objects...

More information

Installing jabra pc suite. V01_0905 Jabra is a registered trademark of GN Netcom A/S www.jabra.com

Installing jabra pc suite V01_0905 Jabra is a registered trademark of GN Netcom A/S www.jabra.com JABRA PC SUITE OVERVIEW Elements of the Jabra PC Suite The Jabra PC Suite is a collection of PC programs

More information

UniFinger Engine SDK Manual (sample) Version 3.0.0

UniFinger Engine SDK Manual (sample) Version 3.0.0 Copyright (C) 2007 Suprema Inc. Table of Contents Table of Contents... 1 Chapter 1. Introduction... 2 Modules... 3 Products... 3 Licensing... 3 Supported

More information

Title Release Notes PC SDK 5.14.03. Date 2012-03-30. Dealt with by, telephone. Table of Content GENERAL... 3. Corrected Issues 5.14.03 PDD...

1/15 Table of Content GENERAL... 3 Release Information... 3 Introduction... 3 Installation... 4 Hardware and Software requirements... 5 Deployment... 6 Compatibility... 7 Updates in PC SDK 5.14.03 vs.

More information

Important. Please read this User s Manual carefully to familiarize yourself with safe and effective usage.

Important Please read this User s Manual carefully to familiarize yourself with safe and effective usage. About This Manual This manual describes how to install and configure RadiNET Pro Gateway and RadiCS

More information

Pcounter Web Report 3.x Installation Guide - v2014-11-30. Pcounter Web Report Installation Guide Version 3.4

Pcounter Web Report 3.x Installation Guide - v2014-11-30 Pcounter Web Report Installation Guide Version 3.4 Table of Contents Table of Contents... 2 Installation Overview... 3 Installation Prerequisites

More information

FREQUENTLY ASKED QUESTIONS (FAQs) 123Scan 2 Scanner Configuration Utility 19 April 2011

FREQUENTLY ASKED QUESTIONS (FAQs) 123Scan 2 Scanner Configuration Utility 19 April 2011 Table of Content Question No. Product Overview What model scanners are supported by 123Scan 2 1 What are the key

More information

ebus Player Quick Start Guide

ebus Player Quick Start Guide This guide provides you with the information you need to efficiently set up and start using the ebus Player software application to control your GigE Vision or USB3 Vision

More information

Getting Started. Document Overview. What is Faronics Power Save? Installation Process

Document Overview This document provides step-by-step instructions for installing Faronics Power Save on a single segment Local Area Network. Following these instructions will allow you to have Power Save

More information

USER GUIDE. Ethernet Configuration Guide (Lantronix) P/N: 2900-300321 Rev 6

KRAMER ELECTRONICS LTD. USER GUIDE Ethernet Configuration Guide (Lantronix) P/N: 2900-300321 Rev 6 Contents 1 Connecting to the Kramer Device via the Ethernet Port 1 1.1 Connecting the Ethernet Port Directly

More information

Accounting Manager. User Guide A31003-P1030-U114-2-7619

Accounting Manager User Guide A31003-P1030-U114-2-7619 Our Quality and Environmental Management Systems are implemented according to the requirements of the ISO9001 and ISO14001 standards and are certified

More information

Modbus and ION Technology

70072-0104-14 TECHNICAL 06/2009 Modbus and ION Technology Modicon Modbus is a communications protocol widely used in process control industries such as manufacturing. PowerLogic ION meters are compatible

More information

Back-up Server DOC-OEMSPP-S/2014-BUS-EN-10/12/13

Back-up Server DOC-OEMSPP-S/2014-BUS-EN-10/12/13 The information contained in this guide is not of a contractual nature and may be subject to change without prior notice. The software described in this

More information

User Manual. 3-Heights PDF Producer API. Version 4.6

User Manual 3-Heights PDF Producer API Version 4.6 Contents 1 Introduction........................................................................ 2 1.1 Operating Systems...................................................................

More information

Title Release Notes PC SDK 5.14.01. Date 2011-06-15. Dealt with by, telephone. Table of Content GENERAL... 2

1/10 Table of Content GENERAL... 2 Release Information... 2 Introduction... 2 Installation... 3 Hardware and Software requirements... 4 Compatibility... 5 Updates in PC SDK 5.14.01 vs. 5.14... 6 Updates

More information

COM Port Stress Test

COM Port Stress Test COM Port Stress Test All rights reserved. No parts of this work may be reproduced in any form or by any means - graphic, electronic, or mechanical, including photocopying, recording,

More information

To install Multifront you need to have familiarity with Internet Information Services (IIS), Microsoft.NET Framework and SQL Server 2008.

Znode Multifront - Installation Guide Version 6.2 1 System Requirements To install Multifront you need to have familiarity with Internet Information Services (IIS), Microsoft.NET Framework and SQL Server

More information

HTML Code Generator V 1.0 For Simatic IT Modules CP 443-1 IT, 343-1 IT, 243-1 IT

HTML Code Generator V 1.0 For Simatic IT Modules CP 443-1 IT, 343-1 IT, 243-1 IT Manual This manual and program are freeware. Every user can use, copy or forward this program and documentation FREE OF

More information

DUKANE Intelligent Assembly Solutions

PC Configuration Requirements: Configuration Requirements for ipc Operation The hardware and operating system of the PC must comply with a list of minimum requirements for proper operation with the ipc

More information

Ipswitch Client Installation Guide

IPSWITCH TECHNICAL BRIEF Ipswitch Client Installation Guide In This Document Installing on a Single Computer... 1 Installing to Multiple End User Computers... 5 Silent Install... 5 Active Directory Group

More information

Orange Apps UserLogonUSB V1.0

Orange Apps UserLogonUSB V1.0 KUKA KRC4 User Documentation As of 07/08/2013 Document version: 1.0 2 Introduction Copyright 2013 OrangeApps GmbH Arnikaweg 1 87471 Durach Germany www.orangeapps.de This documentation

More information

L11 - New Techniques to Increase Efficiency with PanelView Plus 6 Applications Wil Mattheis Commercial Engineer

L11 - New Techniques to Increase Efficiency with PanelView Plus 6 Applications Wil Mattheis Commercial Engineer November 2012 Rev 5058-CO900C Agenda Product Overview Device Connectivity Design-time Improvements

More information

Cart Interface Installation & Control Board Manual for M38 XP and RX Carts and Legacy M39 Carts

Rubbermaid Medical Solutions Cart Interface Installation & Control Board Manual for M38 XP and RX Carts and Legacy M39 Carts REVISED FEBRUARY 25, 2010 Filename: Cart Interface Installation & Control Board

More information

Select Correct USB Driver

Select Correct USB Driver Windows often installs updated drivers automatically, and defaults to this latest version. Not all of these drivers are compatible with our software. If you are experiencing communications

More information

How to develop your own app

How to develop your own app It s important that everything on the hardware side and also on the software side of our Android-to-serial converter should be as simple as possible. We have the advantage that

More information

Sharpdesk V3.5. Push Installation Guide for system administrator Version 3.5.01

Sharpdesk V3.5 Push Installation Guide for system administrator Version 3.5.01 Copyright 2000-2015 by SHARP CORPORATION. All rights reserved. Reproduction, adaptation or translation without prior written

More information

Deposit Direct. Getting Started Guide

Deposit Direct Getting Started Guide Table of Contents Before You Start... 3 Installing the Deposit Direct application for use with Microsoft Windows Vista... 4 Running Programs in Microsoft Windows Vista...

Comdial keylink software More information

Image Acquisition Toolbox Adaptor Kit User's Guide

Image Acquisition Toolbox Adaptor Kit User's Guide R2015b How to Contact MathWorks Latest news: www.mathworks.com Sales and services: www.mathworks.com/sales_and_services User community: www.mathworks.com/matlabcentral

Comdial keylink software download More information

Installation and User Guide

MANJRASOFT PTY LTD Aneka 3.0 Manjrasoft 5/13/2013 This document describes in detail the steps involved in installing and configuring an Aneka Cloud. It covers the prerequisites for the installation, the

More information

mypro Installation and Handling Manual Version: 7

mypro Installation and Handling Manual Version: 7 Date: JAN 2016 Thank you for using mypro on your PC. myscada is a full featured HMI/SCADA system with advanced options such as vector graphics views, advanced

More information

Comdial Network Management System User Instructions

Comdial Network Management System User Instructions GCA40 237.01 8/00 printed in U.S.A. Microsoft and Windows 95 are registered trademarks of Microsoft Corporation, Redmond WA. pcanywhere is a registered

More information

Shakambaree Technologies Pvt. Ltd.

Welcome to Support Express by Shakambaree Technologies Pvt. Ltd. Introduction: This document is our sincere effort to put in some regular issues faced by a Digital Signature and USB Token user doing on

More information

AXIS Camera Station Quick Installation Guide

AXIS Camera Station Quick Installation Guide Copyright Axis Communications AB April 2005 Rev. 3.5 Part Number 23997 1 Table of Contents Regulatory Information.................................. 3 AXIS Camera

More information

Hypercom Key Loading and Management (HKLM) RS232 PPP Key Injection PC Setup Guide

Hypercom Key Loading and Management (HKLM) RS232 PPP Key Injection PC Setup Guide Hypercom Corporation 8888 East Raintree Drive Scottsdale, Arizona 85260 USA Corporate Telephone: 480.642.5000 Corporate

More information

UBS KeyLink Quick reference WEB Installation Guide

ab UBS KeyLink Quick reference WEB Installation Guide Table of contents 1. Introduction 3 1.1. Why is an Installation needed? 3 1.2. Is UBS KeyLink secure? 3 1.3. Information about Secure Sockets Layer

More information

v1 System Requirements 7/11/07

v1 System Requirements 7/11/07 Core System Core-001: Windows Home Server must not exceed specified sound pressure level Overall Sound Pressure level (noise emissions) must not exceed 33 db (A) SPL at ambient

More information

User Guide Win7Zilla

User Guide Win7Zilla Table of contents Section 1: Installation... 3 1.1 System Requirements... 3 1.2 Software Installation... 3 1.3 Uninstalling Win7Zilla software... 3 Section 2: Navigation... 4 2.1 Main

More information

Aras Innovator Internet Explorer Client Configuration

Aras Innovator Internet Explorer Client Configuration Aras Innovator 9.4 Document #: 9.4.012282009 Last Modified: 7/31/2013 Aras Corporation ARAS CORPORATION Copyright 2013 All rights reserved Aras Corporation

More information

EDC version 6.2 Set up instructions & Aldelo For Restaurants Integration

EDC version 6.2 Set up instructions & Aldelo For Restaurants Integration Windows 7,Enterprise and Ultimate Initial steps: Download the following files from the Aldelo download site to your desktop: AldeloPre.exe

More information

Avalanche Site Edition

Avalanche Site Edition Version 4.8 avse ug 48 20090325 Revised 03/20/2009 ii Copyright 2008 by Wavelink Corporation All rights reserved. Wavelink Corporation 6985 South Union Park Avenue, Suite 335 Midvale,

More information

Out n About! for Outlook Electronic In/Out Status Board. Administrators Guide. Version 3.x

Out n About! for Outlook Electronic In/Out Status Board Administrators Guide Version 3.x Contents Introduction... 1 Welcome... 1 Administration... 1 System Design... 1 Installation... 3 System Requirements...

More information

Additional Requirements for ARES-G2 / RSA-G2. One Ethernet 10 Base T/100 Base TX network card required for communication with the instrument.

TA Instruments TRIOS Software Installation Instructions Installation Requirements Your TRIOS Instrument Control software includes all the components necessary to install or update the TRIOS software, as

More information

Practice Fusion API Client Installation Guide for Windows

Practice Fusion API Client Installation Guide for Windows Quickly and easily connect your Results Information System with Practice Fusion s Electronic Health Record (EHR) System Table of Contents Introduction

More information

USB Flash Memory TransMemory-EX II TM

USB Flash Memory TransMemory-EX II TM Security Software User Manual TOSHIBA Corporation Semiconductor & Storage Products Company Contents Chapter 1: Introduction... 2 Chapter 2: System Requirements...

More information

USER S MANUAL. AXIS Media Control

USER S MANUAL AXIS Media Control AXIS Media Control - Notices Notices About This Document This manual is intended for administrators and users of the AXIS cameras and video encoders that want more detailed

More information

Printer Driver Installation Manual

Printer Driver Installation Manual Copyrights Any unauthorized reproduction of the contents of this document, in part or whole, is strictly prohibited. Limitation of Liability SATO Corporation and its

More information

Scan to Network and Scan to Network Premium

Scan to Network and Scan to Network Premium Administrator's Guide Important: This guide is intended for MX6500e. March 2013 www.lexmark.com Contents 2 Contents Overview...3 Configuring Scan to Network...4

More information

SQL Server 2008 R2 Express Edition Installation Guide

Hardware, Software & System Requirements for SQL Server 2008 R2 Express Edition To get the overview of SQL Server 2008 R2 Express Edition, click here. Please refer links given below for all the details

More information

KPN SMS mail. Send SMS as fast as e-mail!

KPN SMS mail Send SMS as fast as e-mail! Quick start Start using KPN SMS mail in 5 steps If you want to install and use KPN SMS mail quickly, without reading the user guide, follow the next five steps.

More information

Implicit Sync. Professional Edition Users Guide

1159 Sonora Court, Suite #305 Sunnyvale, CA 94086 Tel: (408) 737-9609 Implicit Sync User Guide Implicit Sync Professional Edition Users Guide Implicit Inc. May 2013 Version 2.6 Rev. 3 Copyright 2004-2013

More information

DriveLock Quick Start Guide

Be secure in less than 4 hours CenterTools Software GmbH 2012 Copyright Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise

More information

Outlook Add-in Deployment Guide

Outlook Add-in Deployment Guide Sophos TOC 3 Contents Introduction...4 Prerequisites...4 Installation...4 Downloading the Outlook Add-in...5 Installing the Add-in on a Single Workstation...5 Installing

More information

Model 288B Charge Plate Graphing Software Operators Guide

Monroe Electronics, Inc. Model 288B Charge Plate Graphing Software Operators Guide P/N 0340175 288BGraph (80207) Software V2.01 100 Housel Ave PO Box 535 Lyndonville NY 14098 1-800-821-6001 585-765-2254

More information

Release Notes for Dominion SX Firmware 3.1.6

Release Notes for Dominion SX Firmware 3.1.6 Release Notes Version: 4.0 Release Notes Date: December 4, 2008 Effective: Immediately Applicability: The 3.1.6 Release is applicable to the Dominion SX. SX

More information

Manuals for This Product

Installation Guide Manuals for This Product Manuals for this product have the following structure. Read the manual according to your purpose for using this product. Disc Guides with this symbol are PDF

More information

KX-Series PBX TAPI Service Provider

R KX-Series PBX TAPI Service Provider Installation Manual Revision: 4.0.0.1 October 2011 Introduction About TSP Panasonic TAPI Service Provider for TDA/TDE/NCP/NS Series PBX (Panasonic TSP) is a driver

More information

Crestron Electronics, Inc. AirMedia Deployment Guide

Crestron Electronics, Inc. AirMedia Deployment Guide Crestron product development software is licensed to Crestron dealers and Crestron Service Providers (CSPs) under a limited non-exclusive, non transferable

More information

Xerox EX Print Server, Powered by Fiery, for the Xerox 700 Digital Color Press. Printing from Windows

Xerox EX Print Server, Powered by Fiery, for the Xerox 700 Digital Color Press Printing from Windows 2008 Electronics for Imaging, Inc. The information in this publication is covered under Legal Notices

More information

Cloud Portal for imagerunner ADVANCE

Cloud Portal for imagerunner ADVANCE User's Guide Please read this guide before operating this product. After you finish reading this guide, store it in a safe place for future reference. ENG How This

More information

Operating Instructions

Operating Instructions (For Setting Up) Digital Color Imaging Systems Installation Overview Table of Contents Installation Overview General Installation Overview... Setting Your Machine Network Configuration...

More information

Bluetooth Installation

Overview Why Bluetooth? There were good reasons to use Bluetooth for this application. First, we've had customer requests for a way to locate the computer farther from the firearm, on the other side of

More information

SHARP Digital Signage Software Pro PN-SS05 OPERATION MANUAL

SHARP Digital Signage Software Pro PN-SS05 Version 4.1 OPERATION MANUAL Contents Introduction... 2 Precautions on Use...2 Trademarks...2 How to Read this Manual...3 Definitions...3 Installing/Launching...

More information

SUPER SMC LCD. User's Guide. Revision 1.0

SUPER SMC LCD User's Guide Revision 1.0 The information in this User s Manual has been carefully reviewed and is believed to be accurate. The vendor assumes no responsibility for any inaccuracies that

More information

Metalogix SharePoint Backup. Advanced Installation Guide. Publication Date: August 24, 2015

Metalogix SharePoint Backup Publication Date: August 24, 2015 All Rights Reserved. This software is protected by copyright law and international treaties. Unauthorized reproduction or distribution of this

More information

DigitalPersona, Inc. Altus AUTH SDK. Version 1.1. Developer Guide

DigitalPersona, Inc. Altus AUTH SDK Version 1.1 Developer Guide DigitalPersona, Inc. 2012-2014 DigitalPersona, Inc. All Rights Reserved. All intellectual property rights in the DigitalPersona software,

More information

Parallels Remote Application Server

Parallels Remote Application Server Parallels Client for Chrome User's Guide v15 Copyright 1999-2016 Parallels IP Holdings GmbH and its affiliates. All rights reserved. Parallels IP Holdings GmbH Vordergasse

More information

Windows Server Update Services 3.0 SP2 Step By Step Guide

Windows Server Update Services 3.0 SP2 Step By Step Guide Microsoft Corporation Author: Anita Taylor Editor: Theresa Haynie Abstract This guide provides detailed instructions for installing Windows Server

More information

Firmware Loader. User Manual

Firmware Loader User Manual CONTROL MICROSYSTEMS SCADA products... for the distance 48 Steacie Drive Telephone: 613-591-1943 Kanata, Ontario Facsimile: 613-591-1022 K2K 2A9 Technical Support: 888-226-6876

More information

Definiens XD 1.2.1. Release Notes

Definiens XD 1.2.1 Release Notes Imprint and Version Document Version Copyright 2010 Definiens AG. All rights reserved. This document may be copied and printed only in accordance with the terms of the

More information

Network Licensing. White Paper 0-15Apr014ks(WP02_Network) Network Licensing with the CRYPTO-BOX. White Paper

WP2 Subject: with the CRYPTO-BOX Version: Smarx OS PPK 5.90 and higher 0-15Apr014ks(WP02_Network).odt Last Update: 28 April 2014 Target Operating Systems: Windows 8/7/Vista (32 & 64 bit), XP, Linux, OS

More information

LDCDP 11999.GdW. L force Controls. Ä.GdWä. Software Manual. Industrial PC. WindowsR CE Thin Client. Operating system

L force Controls Ä.GdWä LDCDP 11999.GdW Software Manual Industrial PC WindowsR CE Thin Client Operating system l Please read these instructions before you start working! Follow the enclosed safety instructions.

More information

IntegriSign Desktop User Manual

IntegriSign Desktop User Manual C O N T E N T S Copyright... 1 Disclaimer... 1 Trademarks... 1 1. Welcome... 2 2. Where to find information... 2 2.1 IntegriSign Desktop Help... 2 3. Installing/Uninstalling

More information

Using the Remote Access Library

Using the Remote Access Library The Remote Access Library (RACLib) was created to give non-skywire Software applications the ability to start, stop, and control (to some degree) the Documaker Workstation,

More information

Using Microsoft Visual Studio 2010. API Reference

2010 API Reference Published: 2014-02-19 SWD-20140219103929387 Contents 1... 4 Key features of the Visual Studio plug-in... 4 Get started...5 Request a vendor account... 5 Get code signing and debug token

More information

STEP BY STEP IIS, DotNET and SQL-Server Installation for an ARAS Innovator9x Test System

STEP BY STEP IIS, DotNET and SQL-Server Installation for an ARAS Innovator9x Test System Abstract The intention of this document is to ensure successful installation of 3rd-Party software required for

More information

138 Configuration Wizards

9 Configuration Wizards 9.1 Introduction to Wizards ACP ThinManager uses wizards for configuration. Wizards take two forms. List Wizards associate Terminal Servers and ThinManager Servers with their IP

More information

BarTender Web Print Server

The World's Leading Software for Label, Barcode, RFID & Card Printing White Paper BarTender Web Print Server Web-based Software for Printing Barcodes, Labels, ID Cards and more. Contents Introduction to

More information

Parallels Remote Application Server

Parallels Remote Application Server Parallels Client for Windows Phone User's Guide v15 Copyright 1999-2016 Parallels IP Holdings GmbH and its affiliates. All rights reserved. Parallels IP Holdings GmbH

More information

Eclipse installation, configuration and operation

Eclipse installation, configuration and operation This document aims to walk through the procedures to setup eclipse on different platforms for java programming and to load in the course libraries for

More information

Complete PDF. User Guide

Complete PDF Version 3.10 User Guide 06 June, 2014 Please visit www.informatik for latest version of the software Summary (please read) Informatik Complete PDF requires the Microsoft Framework 4.0 or higher.

More information

Easy Setup Guide for the Sony Network Camera

-878-191-11 (1) Easy Setup Guide for the Sony Network Camera For setup, a computer running the Microsoft Windows Operating System is required. For monitoring camera images, Microsoft Internet Explorer

More information

Witango Application Server 6. Installation Guide for Windows

Witango Application Server 6 Installation Guide for Windows December 2010 Tronics Software LLC 503 Mountain Ave. Gillette, NJ 07933 USA Telephone: (570) 647 4370 Email: support@witango.com Web: www.witango.com

More information

Vodafone PC SMS 2010. (Software version 4.7.1) User Manual

Vodafone PC SMS 2010 (Software version 4.7.1) User Manual July 19, 2010 Table of contents 1. Introduction...4 1.1 System Requirements... 4 1.2 Reply-to-Inbox... 4 1.3 What s new?... 4 2. Installation...6

More information

SPAMfighter Mail Gateway

SPAMfighter Mail Gateway User Manual Copyright (c) 2009 SPAMfighter ApS Revised 2009-05-19 1 Table of contents 1. Introduction...3 2. Basic idea...4 2.1 Detect-and-remove...4 2.2 Power-through-simplicity...4

More information

AliOffice 2.0 Installation Guide

January 25, 2012 AliOffice 2.0 Installation Guide Overview This document contains instructions for installing AliOffice and readying the application for the completion and submission of compliance evaluations.

More information

Network/Floating License Installation Instructions

Network/Floating License Installation Instructions Installation steps: On the Windows PC that will act as License Manager (SERVER): 1. Install HASP Run-time environment, SERVER 2. Plug in the red USB hardware

More information

SUDT AccessPort TM Advanced Terminal / Monitor / Debugger Version 1.37 User Manual

SUDT AccessPort TM Advanced Terminal / Monitor / Debugger Version 1.37 User Manual Version 1.0 - January 20, 2015 CHANGE HISTORY Version Date Description of Changes 1.0 January 20, 2015 Initial Publication

More information

APPLICATION NOTE. Getting Started with pylon and OpenCV

APPLICATION NOTE Getting Started with pylon and OpenCV Applicable to all Basler USB3 Vision, GigE Vision, and IEEE 1394 cameras Document Number: AW001368 Version: 01 Language: 000 (English) Release Date:

More information

Guide to Installing BBL Crystal MIND on Windows 7

Guide to Installing BBL Crystal MIND on Windows 7 Introduction The BBL Crystal MIND software can not be directly installed on the Microsoft Windows 7 platform, however it can be installed and run via XP

More information

RTI Database Integration Service. Release Notes

RTI Database Integration Service Release Notes Version 5.2.0 2015 Real-Time Innovations, Inc. All rights reserved. Printed in U.S.A. First printing. June 2015. Trademarks Real-Time Innovations, RTI, NDDS,

More information

Preparing the Windows version of the software for use

Preparing the Windows version of the software for use System requirements Component Processor RAM Hard disk Drives Interfaces/network TCP/IP internet protocol Screen Installing the Conference Manager software

More information

INSTALLATION GUIDE. AXIS Camera Station

INSTALLATION GUIDE AXIS Camera Station About this Guide This guide is intended for administrators and users of the AXIS Camera Station, and is applicable for software release 3.50 and later. It covers

More information

Nero MediaStreaming for MCE Manual

Nero MediaStreaming for MCE Manual Nero AG Copyright and Trademark Information This manual and all its contents are protected by copyright and are the property of Nero AG. All rights reserved. This manual

More information

File Management Utility User Guide

File Management Utility User Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held

More information

Product Manual. MDM On Premise Installation Version 8.1. Last Updated: 06/07/15

Product Manual MDM On Premise Installation Version 8.1 Last Updated: 06/07/15 Parallels IP Holdings GmbH Vordergasse 59 8200 Schaffhausen Switzerland Tel: + 41 52 632 0411 Fax: + 41 52 672 2010 www.parallels.com

More information

LevelOne MUS-1001. 1GB Smart Flash. User Manual V1.0.0-0610

LevelOne MUS-1001 1GB Smart Flash User Manual V1.0.0-0610 CONTENT CHAPTER 1 INTRODUCTION...4 1.1 About this Manual...4 1.2 Support Services...5 CHAPTER 2 PRODUCT OVERVIEW...6 2.1 Package Contents...6 2.2

More information

Kofax Export Connector 8.3.0 for Microsoft SharePoint

Kofax Export Connector 8.3.0 for Microsoft SharePoint Administrator's Guide 2013-02-27 2013 Kofax, Inc., 15211 Laguna Canyon Road, Irvine, California 92618, U.S.A. All rights reserved. Use is subject to

More information

VisionView Maintenance Utility 1.2.0 Release Notes

VisionView Maintenance Utility 1.2.0 Release Notes Copyright 2008-2009, Cognex Corporation. All rights reserved. Overview This document describes Release 1.2.0 of the Cognex VisionView Maintenance Utility.

More information

FileMaker Server 15. Getting Started Guide

FileMaker Server 15 Getting Started Guide 2007 2016 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker and FileMaker Go are trademarks

More information

Fiery Clone Tool For Embedded Servers User Guide

Fiery Clone Tool For Embedded Servers User Guide Fiery Clone Tool allows you to clone image files to a folder on a USB flash drive connected to the Fiery server. You can restore the image file to the Fiery

More information