Demo Software User's Guide v1.2
Demo Software User's Guide v1.2
Demo Software User's Guide v1.2
2
1. Parameter interface operation.............................................................1 1.1 Open COM Port ............................................................................1 1.2 Parameter Setting: ......................................................................2 1.3Work mode parameter setting ......................................................3 2. The Necessary Knowledge ...................................................................5 2.1 EPCC1G2 tag memory ..................................................................5 2.2 18000-6B tag ..............................................................................5 2.3 Data display (tag ID, passwords, memory data is display in 16 hexadecimal) ....................................................................................5 3. EPCC1-G2 Test opration(COM IS OPEN) .............................................5 3.1 Query Tag (The operation needing to choose the tag all need to query tag first)..................................................................................5 3.2 Read Data, Write Data, Block Erase .............................................5 3.3 Revise the password....................................................................8 3.4 Write EPC (Neednt query tag).....................................................9 3.5 Set the state of read and write protection....................................9 3.6 Read Protection ......................................................................... 10 3.7 EAS Alarm ................................................................................. 11 3.8 Lock Block for User (Permanently Lock) (After the data locked, it can not be changed again) .............................................................. 12 3.9 Kill Tag(Permanently Kill) ........................................................ 13 4. 18000-6B Test Interface Operation (After Open COM Port) ............... 13 4.1 Query Tag.................................................................................. 13 4.2 Read and Write Data Block / Permanently Write Protect Block of Byte ................................................................................................ 15
1. Parameter interface operation 1.1 Open COM Port Before open com port, please make controller properly connected with the host using the communication cable provided and then turn on the power. (1) Auto Open Comport: Value 255(0xFF) is broadcasting address. All controllers will respond the order with a broadcasting address. Other value (0x00~0xFE) is controller address. Only will the controller conforming to the address respond the operation.
Click
see the port display in the place. the demonstration software to 57600bps by connecting the port and written communication, the connection to the port to have a beginning, such as :
Click
else
(1)
the new reader address to set. This address can't be 0xFF. If set 0xFF, reader will return error information.
(2)
(3) of different.
(4)
Set reader working Min Frequency and Max Frequency. In different places, the radio requires the rule to be different. Users can follow the local situation and choose to read more sensitive frequency range of the card. In single frequency point operation, only need to set two frequencies to the same value. In frequency hopping operation, only need to set two frequencies to the different value.
(5)
demo software start run, default use the baud rate 57600 to open COM port, reader power on, reader baud rate default is 57600. After change the baud rate, reader use the new baud rate until power off. Close port and open port, the baud rate no change. The demo software will use the new baud rate, until close the demo software.
set the inventory scan max response time of reader. If demo software sends the inventory order, it will wait 30*10ms
<1>
<2>
<3>
intervals, the two sets of data gaps between wergen at least 30 - 10ms.
<5>
100us, with the interval between pulses weigand agreement. the impulse to burst the interval between pulses. (2) Work mode setting:
Response to the mode of argument is invalid, the initiative in this mode is valid. <1> Set Readers support of the protocol. Select Reader is only support ISO18000-6C; Select is only support ISO18000-6B. Reader
<2>
Set output mode of active work mode.when select putout Reader data with RS232/RS485. click
3
show message as
data or checks for the tag of EPC. if the data with a password protected areas
, that Reader support Starting address (16 binary):when select ISO18000-6C protocol, 0 read from the first word(The appropriate storage first16 bit), 1 read from second word, four times; when select ,
that Reader support ISO18000-6B protocol, 0 read from the first byte(The appropriate storage first 8 bit), 1 read from second byte, four times. ifStart Addr+Read NO. Greater than the corresponding storage area to read, read and write the address of the data will not read data. Read NO.(10 binary): when select , ,
, Reader inventory tags EPC, And the starting address and read is not; when select , Read data
nmber is 2, can not setting, for this time,ifStart Addr+2 Greater than the corresponding storage area to read, read and write the address of the data will not read data. (3) Get work mode parameter: can get Readers waigand and work mode parameter. click this button,
2. The Necessary Knowledge 2.1 EPCC1G2 tag memory Tag memory divided into four storage areas, each storage area can be made up of one or more memory words. The four storage areas: EPC areas (EPC): Store the area of EPC number, this module stipulates it can store 15 word EPC number. Can read and can write. TID areas (TID): Store ID number established by the tag production firm. There are 4 words and 8 words two kinds of ID numbers at present. Can read and not can write. User areas (User): This area of different manufacturers is different. There is no user area in G2 tag of Inpinj Company. There are 28 words in Philips Company. Can read and can write. Password areas (Password): The first two words is kill password, the last two words is access password. Can read and can write. Can write protect in four storage areas. It means this area is never writeable or not writeable under the non-safe state; only password area can set unreadable. 2.2 18000-6B tag 6B tag has a memory space, the minimum 8 bytes (byte 0- 7) is UID of the tag, and can't be rewritten. Following byte all can be rewritten, can be locked too, but once locking, can't rewrite again, can't unblock either. 2.3 Data display (tag ID, passwords, memory data is display in 16 hexadecimal)
Display in Hex, then 11 is first byte, 22 is second byte, and 1122 is first word. Total 8 bytes, in other words, total 4 words.
3. EPCC1-G2 Test opration(COM IS OPEN) 3.1 Query Tag (The operation needing to choose the tag all need to query tag first) (1) (2) Every 50ms issued a command checks.
(1)
<3> Write Start address: 0x00 stand in start to read data from first word in the designated storage area, 0x01 stand in start to read data from second word in the designated storage area, and so on. Read the length: Number of the word to be read. It read 120 words at most. Can not set 0 or 120, otherwise, return the parameter error information. Access password: From left to right it is the former high-word, low word in the access password. If operation dont need access password, it can be the arbitrary value, but can't lack.
<4> Click
can see
(2)
<3> Write
Start address: 0x00, the first word of data (from left) is written in address 0x00 of the designated storage area, and so on. <4> Click can see
(3)
Block Erase Operation (write 0 to the designated data ) <1> Choose tag
<3> Write Start address: 0x00 stand in start to erase data from first word in the designated storage area, 0x01 stand in start to erase data from second word in the designated storage area, and so on. The difference from write operation: Needn't fill in the data.
<4> Click
can see
(4)
<1>
Maskadr : The mask the first byte address. MaskLen: The mask of bytes length. 3.3 Revise the password
(1)
Choose tag
(2)
Choose memory
(3)
Write access password Access password: From left to right it is the former high-word, low word in the access password. If operation dont need access password, it can be the arbitrary value, but can't lack.
(4)
(1) Write access password (If EPC area of the tag has not set password protection, we can write 8 data arbitrarily) (2) Write EPC.
(3)
Click
When there are many or EPC pieces of tag in the effective range of antenna, and the access password of one tag is the same as you entered, or EPC area of tag set no password protection, click tag in the effective range of antenna. 3.5 Set the state of read and write protection at a time, random write EPC number of one
(1)
Choose tag
(2) (3)
(4)
Any storage area in no password protection status still must write the correct access password. Note: Once the password area of the tag set permanently readable and writeable or never readable and writeable, once EPC storage area, TID storage area or user's storage area set permanently writeable or never writeable, it cant be changed again. If send order to change it, tag will return error code. 3.6 Read Protection
(1)
<3> Click According to EPC number of the tag, setting read protection, make tag unable to be read and written by any order, even if query the tag, it is unable to get EPC number of the tag. Only NXP UCODE EPC G2X tags valid. (2) Set Single Tag Read Protection without EPC <1> Write tag access password
<2> Click protection in the effective range of antenna The difference from
: When
there are several tag in the effective range of antenna, reader dont know the
10
tag which the order operate. If operate several tags, then the access password of the tag had better be the same. Only NXP UCODE EPC G2X tags valid. (3) Reset Single Tag Read Protection without EPC <1> Write access password
<2> Click Use for reset the tag read protection. Only put a tag in the effective range of antenna. Only NXP UCODE EPC G2X tags valid. Comments: If tag does not support the read protection setting, it must be unprotected. (4) Detect Single Tag Read Protection without EPC <1> Click Can't detect tag whether it support read protection order, can only detect single tag whether it is protected. If tag does not support the read protection setting, it must be unprotected. Make sure that there is single tag in the effective range of antenna. Only NXP UCODE EPC G2X tags valid. 3.7 EAS Alarm
(1)
<3> Choose alarm Set or reset the EAS status bit of tag. Only NXP UCODE EPC G2X tags valid.
11
(2)
<1> Click check alarm Check the EAS alarm of tag. Only NXP UCODE EPC G2X tags valid. <2> EAS alarm:
No EAS alarm:
3.8 Lock Block for User (Permanently Lock) (After the data locked, it can not be changed again)
(1)
Choose tag
(2)
Write Access password can not be the whole 0. Otherwise, the tag can not be locked, and the tag return response with parameter error.
(3) Choose address of tag data (word). The users area amounts to 14 word. (013) Lock permanently in 2 words. Therefore, the address of tag data is divided into 0 and 1, 2 and 3, 4 and 5, 6 and 7, 8 and 9, 10 and 11, 12 and 13. You can lock the data if you wish:
After the data get locked, it can be read only, can't be rewritten, and cant be erased too. Only NXP UCODE EPC G2X tags valid.
12
(1)
Choose tag
(2)
Write After the tag is killed, it will never deal with the order of reader. Kill password can not be the whole 0. Otherwise, the tag can not be killed, and the tag return response with parameter error.
4. 18000-6B Test Interface Operation (After Open COM Port) 4.1 Query Tag (1) every 50ms. send a inventory command
(2) Only query the single tag. If many tags are in the effective range of antenna at the same time, it may be unable to query the tag.
13
Note: The 8 bytes of 6B tag number write in the 0~7 which in the address of tag data (0- 233) Figure, query condition begin to compare from the tag data address 0. comparative content is 22. Click The
See
Figure, from the tag number we can see the addresses 0 of tag data: 00, 00, 11, 11. Unequal condition 22, therefore, the four tags are read. <2> Equal Condition:
Note: The 8 bytes of 6B tag number write in the 0~7 which in the address of tag data (0- 233) Figure, query condition begin to compare from the tag data address 0. The comparative content is 00. Click
See
Figure, from the tag number we can see the addresses 0 of tag data: 00, 00.
14
Note: The 8 bytes of 6B tag number write in the 0~7 which in the address of tag data (0- 233) Figure, query condition begin to compare from the tag data address 0. The comparative content is 00. Click
See
Figure, from the tag number we can see the addresses 0 of tag data: 11, 11. Great than 00, therefore, the two tags are read. 4.2 Read and Write Data Block / Permanently Write Protect Block of Byte
15
Start address: 0x00 stand in start to read data from first word in the designated storage area, 0x01 stand in start to read data from second word in the designated storage area, and so on. Range is 8~223. Beyond this range, reader will return parameter error. Read length: pointed to the number of bytes to read. Range is 1~32. If Start address + Read length greater than 224, or Read length greater than 32 or is zero, reader will return parameter error information. The high bytes of Read length write in the low address in tag. (3) Write data:
Write data: Range is 1~32. If Start address + Write length greater than 224, or Write length greater than 32 or is zero, reader will return parameter error information. The high bytes of Read length write in the low address in tag. (4) Permanently Write Protect: lock the designated byte.
(5)
16
(6)
17