UHFReader Demo Software User's Guidev1
UHFReader Demo Software User's Guidev1
8
1. Parameter interface operation.............................................................1
1.1 Open COM Port ................................................................................................................ 1 1.2 Parameter Setting: ............................................................................................................ 2 1.3 Work mode parameter setting.......................................................................................... 3
1.2
port display in the place. the demonstration software to by connecting the port and written communication, the connection to the port to have a beginning, such as
38400bps,19200bps
sseccus fi,spb0069 ,
esle
esle
kcilC
1 kcilC
different
Min Frequency and Max Frequency. In different places, the radio requires the rule to be different. Users can follow the local situation and choose to read more sensitive frequency range of the card. In single frequency point operation, only need to set two frequencies to the same value. In frequency hopping operation, only need to set two frequencies to the different value. demo software start run, default use the
baud rate 57600 to open COM port, reader power on, reader baud rate default is 57600. After change the baud rate, reader use the new baud rate until power off. Close port and open port, the baud rate no change. The demo software will use the new baud rate, until close the demo software. set the inventory scan max response time
of reader. If demo software sends the inventory order, it will wait 30*10ms for reader response and exits.
1 2 5 6
If set 0xFF, reader will return error information. set and save power configuration.
Weigand 26 34 select.
Weigand output formart select. Settings wergen the output of data at regular intervals,
10*10us.
the interval between pulses weigand agreement. the impulse to burst the interval between pulses. Work mode setting:
Response to the mode of argument is invalid, the initiative in this mode is valid.
Select
show message as
kcilc .584SR/232SR htiw atad redaeR tuotup tceles nehw.edom krow evitca fo edom tuptuo teS
checks for the tag of EPC. if the data with a password protected areas then can not read.
protocol 0 read from the first word(The appropriate storage first16 bit) 1 read from second word four times when select
protocol 0 read from the first byte(The appropriate storage first 8 bit) 1 read from second byte four times. ifStart Addr+Read NO. Greater than the corresponding storage area to read, read and write the address of the data will not read data Read NO.(10 binary) when select
can not
setting for this time,ifStart Addr+2 Greater than the corresponding storage area to read, read and write the address of the data will not read data
2.3 Data display (tag ID, passwords, memory data is display in 16 hexadecimal)
Display in Hex, then 11 is first byte, 22 is second byte, and 1122 is first word. Total 8 bytes, in other words, total 4 words.
2 1
can see
(1) Read data operation <1> Choose tag <2> Choose memory
<3> Write Start address: 0x00 stand in start to read data from first word in the designated storage area, 0x01 stand in start to read data from second word in the designated storage area, and so on. Read the length: Number of the word to be read. It read 120 words at most. Can not set 0
or 120, otherwise, return the parameter error information. Access password: From left to right it is the former high-word, low word in the access password. If operation dont need access password, it can be the arbitrary value,
but can't lack. <4> Click can see
<3> Write
Start address: 0x00, the first word of data (from left) is written in address 0x00 of the designated storage area, and so on. <4> Click can see
(3) Block Erase Operation (write 0 to the designated data ) <1> Choose tag <2> Choose memory
<3> Write Start address: 0x00 stand in start to erase data from first word in the designated storage area, 0x01 stand in start to erase data from second word in the designated storage area, and so on. The difference from write operation: Needn't fill in the data. <4> Click can see
(4) Write block operation <1> Choose tag <2> Choose memory
<3> Write
Start address: 0x00, the first word of data (from left) is written in address 0x00 of the
2 si 2 si
designated storage area, and so on. <4> Click (4) EPC Mask Enable can see
<1> Maskadr : The mask the first byte address. MaskLen: The mask of bytes length.
(1) Choose tag (2) Choose memory (3) Write access password Access password: From left to right it is the former high-word, low word in the access password. If operation dont need access password, it can be the arbitrary value, but can't lack. Revise the access password 12345678: Write
(4)
(1) Write access password (If EPC area of the tag has not set password protection, we can write 8 data arbitrarily) (2) Write EPC. (3) Click . (Random write one tag in the effective range of antenna)
When there are many or EPC pieces of tag in the effective range of antenna, and the access password of one tag is the same as you entered, or EPC area of tag set no password protection, click antenna. at a time, random write EPC number of one tag in the effective range of
(1) Choose tag (2) Choose memory (3) Choose protection type
(4) Write access password: Any storage area in no password protection status still must write the correct access password.(password can not be zero).
(1) Set Single Tag Read Protection <1> Choose tag <2> Write tag access password <3> Click According to EPC number of the tag, setting read protection, make tag unable to be read and written by any order, even if query the tag, it is unable to get EPC number of the tag. Only NXP UCODE EPC G2X tags valid. (2) Set Single Tag Read Protection without EPC <1> Write tag access password <2> Click the effective range of antenna The difference from : When there can set tag read protection in
are several tag in the effective range of antenna, reader dont know the tag which the order operate. If operate several tags, then the access password of the tag had better be the same.
tags valid.
Comments: If tag does not support the read protection setting, it must be
unprotected.
10
(4) Detect Single Tag Read Protection without EPC <1> Click Can't detect tag whether it support read protection order, can only detect single tag whether it is protected. If tag does not support the read protection setting, it must be
unprotected.
Make sure that there is single tag in the effective range of antenna. Only NXP
(1) Alarm setting <1> Choose tag <2> Write access password
<3> Choose alarm Set or reset the EAS status bit of tag. Only NXP UCODE EPC G2X tags valid. (2) Check alarm without EPC and access password
<1> Click check alarm Check the EAS alarm of tag. Only NXP UCODE EPC G2X tags valid. <2> EAS alarm:
No EAS alarm:
11
3.8 Lock Block for User (Permanently Lock) (After the data locked, it can not be changed again)
(1) Choose tag (2) Write Access password can not be the whole 0. Otherwise, the tag can not be locked, and the tag return response with parameter error. (3) Choose address of tag data (word). The users area amounts to 14 word. (0- 13) Lock permanently in 2 words. Therefore, the address of tag data is divided into 0 and 1, 2 and 3, 4 and 5, 6 and 7, 8 and 9, 10 and 11, 12 and 13. You can lock the data if you wish:
After the data get locked, it can be read only, can't be rewritten, and cant be erased too.
Only NXP UCODE EPC G2X tags valid. 3.9 Kill TagPermanently Kill
(1) Choose tag (2) Write Kill password can not be the whole 0. Otherwise, the tag can not be killed, and the tag return response with parameter error.
(2) Only query the single tag. If many tags are in the effective range of antenna at the same time, it may be unable to query the tag.
12
Note: The 8 bytes of 6B tag number write in the 0~7 which in the address of tag data (0- 233) Figure, query condition begin to compare from the tag data address 0. The comparative content is 22. Click
See
Figure, from the tag number we can see the addresses 0 of tag data: 00, 00, 11, 11. Unequal condition 22, therefore, the four tags are read. <2> Equal Condition:
Note: The 8 bytes of 6B tag number write in the 0~7 which in the address of tag data (0- 233) Figure, query condition begin to compare from the tag data address 0. The comparative content is 00.
13
Click
See
Figure, from the tag number we can see the addresses 0 of tag data: 00, 00. Equal condition 00, therefore, the two tags are read. <3> Greater than
Note: The 8 bytes of 6B tag number write in the 0~7 which in the address of tag data (0- 233) Figure, query condition begin to compare from the tag data address 0. The comparative content is 00. Click
See
Figure, from the tag number we can see the addresses 0 of tag data: 11, 11. Great than 00, therefore, the two tags are read.
14
4.2 Read and Write Data Block / Permanently Write Protect Block of Byte
Start address: 0x00 stand in start to read data from first word in the designated storage area, 0x01 stand in start to read data from second word in the designated storage area, and so on. Range is 8~223. Beyond this range, reader will return
parameter error.
Read length: pointed to the number of bytes to read. Range is 1~32. If Start address + Read length greater than 224, or Read length greater than 32 or is zero, reader will return parameter error information. The high bytes of Read length
Write data: Range is 1~32. If Start address + Write length greater than 224, or Write length greater than 32 or is zero, reader will return parameter error information. The high bytes of Read length write in the low address in tag. (4) Permanently Write Protect: lock the designated byte.
15
(1)Click
,can see
The larger of the percentage ,the better of the results. (2) This function can set an get hopping mode. Click ,if successed ,can see
16