3M Traffic Safety Systems IDMAX012 RFID Reader User Manual Part A

3M Traffic Safety Systems RFID Reader Part A

Contents

Part A

Download: 3M Traffic Safety Systems IDMAX012 RFID Reader User Manual Part A
Mirror Download [FCC.gov]3M Traffic Safety Systems IDMAX012 RFID Reader User Manual Part A
Document ID675833
Application ID0xrI7pmvCsH35d95VMsNQg==
Document DescriptionPart A
Short Term ConfidentialNo
Permanent ConfidentialNo
SupercedeNo
Document TypeUser Manual
Display FormatAdobe Acrobat PDF - pdf
Filesize193.12kB (2413992 bits)
Date Submitted2006-06-30 00:00:00
Date Available2006-06-30 00:00:00
Creation Date2006-06-30 10:33:01
Document Lastmod2006-06-30 10:33:49
Document TitlePart A

fina’m
Ingmllafionarfl
SofiwareUser’sGLfide
,~s'.'rill
IDentityMaX Installation and Software User's Guide
Installation and Software User’s Guide
SIRIT Corporation
1321 Valwood Pkwy Suile 620
Carrollton, TX 75006
Version 12 Page 2
o I J
IDentityMaX Instellatlon and Software User’s Guide t’ 5m,“
Notices
SIRIT INC.
1321 VALWOOD PKWY, CARROLLTDN, TX 75005
372 BAY ST, SUITE 1100, TORONTO, ONTARIO, CANADA MSH ZWQ
Inimrnaflcn contained Wlthln this manual I5 subjeclto change wilhoul notice. No part afihis manual may bE reproduced or transmitted In any
form or by any means, electronic or mechsmlcal, Including phomoopylng and reocfrtlng, for any purpose without the express written permlsslan
of Sirit Inn, (SIRIT). © 2006 Toronto. ON, Sim Inc.. All rights reserved.
Trademarks: Product names mentioned in this manual may be trademarks, and they are used for idenfificzlian only.
Installation and Maintenance Manual
Part Number: IDENTITY MAX Gulde-Verslcn P,1.0
Release Date: May 15. 2006
lDemity MaX installation Manusmoo
& NOTICE
This equipment has been tested and found to comply with the limits for a Class B digital device,
pursuant to part 15 of the FCC Rules. These limits are designed to provide reasonable protection
against harmful interference in a residential installation. This equipment generates, uses, and can
radiate radio frequency energy and, if not installed and used in accordance with the instructions,
may cause harmful interference to radio communications. If this equipment does cause harmful
interference to radio or television reception, which can be determined by turning the equipment
off and on, the user is encouraged to try to correct the interference by one or more of the
following measures:
- Reorienl or relocate the i-ccciving antenna.
0 increase thc scpnction between the equipment and receiverl
0 Connect the cqllipmcntlo in outlet ci circuit different In that which the receiver is connected
0 Consull SIRlT.
Version 1.2 Page 3
IDentityMaX Installatlon and Software User’s Guide r shim.
& NOTICE
Note: This equipment complies with FCC Part 15.247 and Industry CanadaRSS 210 mles. Any
changes or modifications not expressly approved by SIRIT could void the user’s authority to
operate the equipment. To maintain compliance, the IDentity Flex reader must be used with the
power supply that was supplied with the reader.
& RF Exposure Warning
To comply with the FCC radiofi'equenoy (RF) Exposure requirements, the antenna(s) used with
this device must be installed to provide a minimum separation distance of 1 meter from all persons.
NOTICE
For PLUGGABLE EQUIPMENT, the socket/outlet shall be installed near the equipment and shall
be easily accessible. For PERMANENTLY CONNECTED EQUIPMENT, a readily accessible
disconnect device shall be incorporated into the fix
& TRANSPONDER NOTICE
WARNING! Danger of explosion if battery is incorrectly replaced. Replace only with the same
or equivalent type recommended by the manufacturer. Dispose of used batteries according to the
manufacturer’s instructions
ed wiring.
Version 1.2 Page 4
IDentityMaX Installation and Software User's Guide
Table of Contents
Overview ......... 1 General purpose inputs .............. 25
Communications . 1 General purpose outputs . . 26
Installation overview 1 Ethernet ..... 27
Tools and materials 2 Gate control 28
Reader installation ,. 2 Wiegand port . 29
Communications and power Host serial ., 30
Connections .............. 4 XML command set .. 30
PC based user interface .. 5 Get parameter ., 31
Setting reader time and date ,. 5 Set parameter ., 31
Configuring the system t 6 Parameter summary ........ 32
General purpose Inputs 8 Save configuration ,, 34
General purpose outputs . 9 Load configuration .. 34
Serial port . 11 Read translation table entries ...... 35
Wiegand port .. 11 Write translation table entries ...... 36
Access control ......... 12 Delete translation table entries ..... 37
Read event handler .. 13 Store translation table index 38
Gate control ............ 14 Read transaction log .......... 39
Autoconfig ........... 15 Update firmware ....................... 39
Tag list maintenance 15 Execute firmware ................ 40
Trigger and filter 16 Example XML—RFC transaction 42
Trigger settings , 17 Appendix A ........ 43
Filter configuration 17 Appendix B ........ 45
Web based user interface ., 19
Transaction activity .......... 19
Network profile ................ 20
System info
Read triggers ,
Transceiver ......
Tag filter .......
Access control
Read handler ........................... 25
Version 1.2 Page 5
1.0
2.0
3.0
Overview
The iDentity MaX reader is an RFID device capable of reading EPC Class 0,
Ciass1, and Class 1 Gen 2 RFID tags, and processing the data for a gated
access type application, Generally, the reader is configured, upon installation, to
work with specific inputs and outputs to interface with customer systems
including access panels, gates and visual indicators Ali system configurations
are accomplished using either a PC based application or a web based user
interface.
Communications
The IDentity MaX reader supports a variety of communication interfaces and
protocols.
2.1 Ethernet
The reader Ethernet port is fully 802.3 compatible with Auto 10/100 and
Auto MDiX functionality. it also supports Power over Ethernet and is
classified as a Class 0 powered device. The Ethernet is the primary
interface for the web based user interface.
22 USB
The USB port of the lDentity MaX is USB 2.0 compliant and is accessed
via a type B connector on the bottom of the unit. The USB port is the
primary communication method for the PC based user interface.
2.3 Host Serial
The Host serial port supports a variety of protocols and signaling,
including RS—232, RSAZZ, and RS-485. it is primarily used to transfer
RFID tag information to a host or maintenance PC.
2.4 Wiegand Port
The Wiegand port is a simplex type communication from the reader to a
host or access panel compliant to the SIA 26-bit standard but also
supports extended formats.
installation and Connections
3.1 installation Overview
Version 1.2 Page 1
This section lists the steps required to install and test an IDent/‘ty MaX system
comprised of a single reader. The installer should have a successful
installation by completing each step before moving on to the next.
The Suggested installation steps are:
1. Gather all necessary tools and materials, See section 3.2.
2. install reader in desired location using provided hardware. See section
3.3.
3. Complete power and communication connections. See section 3.4.
4, Perform system verification and configuration using either the PC based
Interface or the web based interface. See sections 4.0 or 5.0.
3.2 Tools and Materials
The installation uses the following materials provided by Sirit.
1. IDentity Max reader
2, interface cable (Available from Sirit, but not standard)
3. 48 VDC power supply
4. iEC to three prong power cable
5. Universal mounting bracket
The only tools required will be standard hand tools.
However, the interface cable will require additional tools and material to install
Ethernet, RS—232, i/O, and power connectors.
33 Reader installation
The IDentity Max reader may be mounted on vertical poles or horizontal pipes
utilizing the supplied universal mounting bracket (UMB). Note that the U—boits
provided with the UMB are designed to be used with a 15—inch pole. The
reader requires the supplied interface cable be attached to the Amphenoi
connector on the rear of the reader. The cable may be clamped to walls with
clips or run through appropriate conduits.
The location and angle of the reader define its read zone. Establish the
location and mounting method in conjunction with the Site Planning Guide
Version 1.2 Page 2
prior to installation. it is essential that the reader be installed in the correct
orientation and location for accurate transponder reads.
The figure below illustrates a typical parking access installation. This is an
example only and should not be substituted for the installation setup.
lDEntlty Max Reader———>‘
The Figure below shows the method and hardware required to install the lDentity
MaX reader on a pole. All items (except for the pole) are supplied by Sirit.
Version 1.2 Page 3
Item
Description
U—bolts (for 1.5 inch pole), reader mounting bracket, 2 per
bracket
UMB bracket half, conduit mount side
UMB bracket half, reader mount side
Interface cable
Bracket pinning bolts, 2 required
Nuts for U—bolts, 4 per bracket
lDentity Max reader
Bracket mounting nuts, 74-20, 4 per bracket
(DOONQUILWN
Amphenol connector
3.4
Communication and Power Connections
The interface cable is comprised of approximately 20 feet of a 30
conductor (15 pair) twisted pair cable with an Amphenol connector on one
end, the mate of the connector on the rear of the reader. The opposite
end will have all communications, power, and [lo connections as loose
wire ends, The appropriate communication connectors will be required for
configuration and remote communication, See Appendix B for proper
cable pin outs.
To attach the cable to the reader, carefully align the single connector on
the interface cable with the Amphenol connector on the reader. With
minimal pressure, screw the outer housing of the cable connector onto the
reader connector. The connectors should automatically lock in place
when they are properly attached.
Next, connect the communications connectors to their mates on the user
systems. The Ethernet connection is required to use the web based
interface, the USB interface is required to use the PC based interface, and
the serial connection is required for host attachment.
Finally, plug the lEC power cable into the power supply, and the DC side
of the power supply into the connector on the interface cable. Plug the
three prong connector into a 120V, 60Hz AC power socket.
Version 1.2
Page 4
4.0
PC based User Interface
The PC based application maxguiexe is the primary user interface for system
configuration and monitoring. It is designed to use the USB connection for
communication to the maintenance PC. Microsoft .NET framework version 2.0
needs to be installed on the maintenance PC in order to run the GUI, The .NET
framework installation file is also included as part of the documentation package
for the iDentity Max.
To install the .NET framework, copy dotnetfxexe to the maintenance PC and run
the application. Follow all prompts to install.
Because this GUI is based on xml formatted commands, there is a folder called
“allxmlcmd” that needs to be copied to the c:\ directory. All xml commands are in
this folder.
Connect the USB port of the interface cable to the USB port of the PC. Verify
that the reader has power and is operational. At the initial installation, a dialog
box may appear asking for the USB driver. A copy of this driver has been
included with the iDentity Max software package. Run the interface program
maxgui.exe.
Looking at the main screen of the interface, disregard the “Test Hardware" and
“Flash Memon/ Operation" tabs. These were used by the developer for test and
debug and will be removed at a later revision. AII sub menus will have a
“Confirm" button. This button needs to be clicked after making any changes to
the configuration in that particular menu. Otherwise, the changes will not be
written into the Random Access Memory on the reader.
4.1 Setting reader date and time
The IDentity Max reader will be configured during the manufacturing
process for the date and time based upon US central time zone (GMT—6).
The "Set Date and Time" tab allows the user to change the reader time
and date.
“Get Time and Date" is used to view current reader date and time.
To change the time and date, simply use the drop down options provided
for each parameter. Hours are in 24 hour format. Press “Set Time to
board” to overwrite values currently in the reader.
Though not necessary, it is sometimes desirable to synchronize date and
time on the reader and maintenance PC. “Set PC clock to board" will
change the reader clock to the same time and date as the PC clock.
Version 1.2 Page 5
w-iicmmmr VqlidM-immn] “New m "(Maw-inn him-trim] =J
same-1m , , ———
‘ l
Minty...
|'-jt~ ml]
Nu Mm Sumnd
n-unj l
s, imam mmmma 1
5.1 pc cm W m
ntit t
E. Ml 44a
4.2 Configuring the System
The Configuration System menu is used to verify and change all
parameters related to system interface. This includes the general purpose
inputs and outputs, the serial port, Wiegand port, gate control, and
translation table exception handling,
Version 12 Page 6
WWW.” BMW-4 namwuwm nwum
sum. n! Cnnliwah'ui
5m swim
Somme 5m-
mmm Elsie
su Dwa up. Eel Dine w,
Sui Puinwdm
same-Pom
am has»
Semi m Sui-u
ans-mm E-iS-vuiPnnwiilw
«wmemimrwim 74 ~
saving-m m Mum-1m
Gavan-M m Emilia-{inn
Smu mflmm mm
um um imm
4.2.1 General Purpose inputs (GPI)
Anna: Emmi Run Even was an mm
mm“, 77 . ~ 77
Duh-Agvmdflw
Emliwdinn Sim
Eiu- Wmdrm
To view current GPI settings use “Get GPI Parameters."
To change GPI settings, use ”Set GPI Parameters”
Each input can be set to an active high, active low, or edge
triggered event.
Version 1.2
Page 7
1M AQUA
1 EPIU ~~ GF'I1 - GPIZ M GFIG
1 [Auuvauigh 1:J IMiivaHigh _;J FEMHigh g 1 IAtlivaHigh iv
1 Min Pulse Widlh (ms) Min Full: Widlh [ms] Min Puli= Widlh [ms]
Av: Law I 1 | | 1
11 Hi: ngEdgs i 11 1 i
1 7 Fullin Ed 9 M. m _ V
1 1 Emiirm
‘1
1‘ 1
1 11
1 E
1 i
r ;
i i
1 A
4.2.2 General Purpose Outputs (GPO)
The four general purpose outputs have several parameters that can
be configured for a variety of applications.
To view the current values of Active state and Drive type, use the
respective button.
Active state can be set to active low (0) or active high (1).
1M, Liam
emu EPUI EPnz sen:
|n Ll In 1; in u in r;
' Emil!“
Version 1.2
Page 8
There are three options for output drive state. Open drain, where
the user will need to supply pull up resisters, Push pull, and none
fora tri-stated output,
.. m." tlivlyprJflndi’v 9 Algal
EPD in firm BPD 2 two 3
warm v pushPuii iv mshPuI v paxN’ull i;
nun» _
i a mom
mnfm
Each output waveform is specified with three parameters: Pulse
width, pulse period and pulse repetition, The width is the time that
the signal is active. Period is the time from rising edge to rising
edge (Active high state) or falling edge to falling edge (Active low
state). Pulse repeat is the number of times the active signal is
repeated, The relationship between the three is shown below:
Pulse Period
Pulse
Width
1 2 3 4
Pulse Repetition
All four outputs can be created using the three menus: “Set Pulse
Width", “Set Pulse Period", and “Set Pulse Repeat”.
Version 1.2 Page 9
mm”
BFDZ pajse wldlh: [ms] 25 34
GP03 pulse widlh: [ms]
h GPD1puISEWldlh'[msl 25
ll
mljlulil; p
‘l spun pulse perm: [m] l
3‘ nmlpulsepelmlmsl |“——““5n l
l: GPOZpMsawidlh'hls] r—fi‘m
sPua pdse wlulll [ms] 5p
ll_~. awl
L spun pulse repeal IIE—_—E
H mm pulse repeal Fr—“j;
l GPEIZ pulse repeal lD—-‘—l
‘ GPDB pulse lepsal F—‘Tl
Versiun1.2 Page 10
4.2.3 Serial Port Configuration
ii if rmchriuparlger
rt Serial Port Enable
Pnnlnuol Type
none
Signal Tws
13-232
4.2.4
The serial port supports a variety of protocols and signaling. To
view the current serial port set up, use “Get Serial Port setting". To
change any of the parameters, use “Set Serial Port”,
Baud Rule:
BBDD
Parity:
none
To enable the host port, check the enable box. This serial port
supports WPS and ACOM protocols, as well as RS—232, RS—422,
and RS-485 signaling. To change any of the parameters, simply
choose the value from the pull down menus. Hold off time refers to
the time that is inserted between output data.
Wiegand Port Configuration
The Wiegand port is a simplex type communication compliant to the
SIA 26-bit standard as well as extended formats.
Use “Set Wiegand Port Configuration" to specify Wiegand
parameters.
Version 1.2
Page 11
legal“! Purl Slnlll: HELL“
Hnid Eli time [null Pulse inlewai [7M]: irdfix:
Plutonut Type:
Em him i |32 1 [none fl
mm Type Puknvfidlh (ms; Length: Em" Type
Ipushpul j E5 3 ET 4 rue ij
Confirm
4,2.5
Transmission on the Wiegand interface can only occur when a
corresponding Host Upload Event has been configured and
satisfied. As before, the pulse width is the time that a data pulse is
active for valid data and the pulse interval is the time between
those pulses Index is the offset (in bits) within the translated tag
data where the serialization information will begin. Length specifies
the length of the data packet, not including any protocol overhead.
Both Parity and Checksum protocols are supported in addition to
raw data format. Endian type denotes whether most significant
(Big) or least significant (Little) will be transmitted first,
Access Control Configuration
The lDentity Max reader uses a translation table to reference all
actions and ID associated with specific tags. Access control is
used to determine the action(s) taken for any tag read. Use the
“Access Control" button to start configuring these parameters,
Version 12
Page 12
iiw 1» stated
ll Antes: Eunilol:
l rm
x Delaull Tramtat‘lon lD: [Dec] Detaijt Handler lD: Dealer Handler ID:
i rrrrrrrrrrrrrrrr a; n i'i u w
l Dealer Dude: Faclllv Code:
12345379 | 12345678 l‘
‘i Emtirm
‘l
. l
, r
r .
l l
l a
To enable access control features, select “enabled" from the pull
down menu, The default translation ID is the value the reader will
enter in the log and is set by the user to any 16 digit or less value.
The default handler indicates the reporting action(s) the system will
take if an unknown tag is read. See section 4.2.6 for a full list of
options available.
The dealer and facility codes are programmed by Sirit during the
manufacturing process and are unique to every Sirit customer.
However, the Dealer code and the Dealer handler lD are not
implemented in this version of the IDentity MaX reader.
4.2.6 Read Event Handler
{ The read event handler allows the user to specify a variety of
actions to be taken when a tag is read and looked up in the
translation table. in the event that an unknown tag is read, the
default event handler specified in the Access Control menu will be
‘ used. With this menu, the user will be able to turn on a warning
lamp, send a warning using the host serial port, raise the gate, or
all of these.
To configure the handler, select the desired action from the pull
[ down menu.
Version 1.2 Page 13
Rm Nmfli- u.
flulpmfl awn-4
~ mi
nulpu
n 0mm; mm: mm“. mus-u nap.“ Bulwl7 Drumm-
fllwaz wgrams swag-rd Luau-n _v_||=m=.n=._‘l| Manama. ‘ Emilrm
n amp“. 2 Dmpul a Dulpm 4- Burp-4: st
db“. 11mm. ulmnl 41m,—
nuwul‘l up.“ amp-Ans aw,“- Duiwlfi fliApulS' can,” nun-mm
gym,
|—'—v:|v lnenl Luna". Alumna 7,'_V|V|Mr- mlnm L‘anwnl gr
in.“ mm.” 2
mm a man
[mm Lllnuna “g 1m". Luna". 317.1". up.” gim- fllnww Lil
(1 amp.” Dulwlz nqu- nun-A5 nmwxe Duxww Du-uiwlwv
Danna mm
lama 3mm",
nmnwm z —— , ~ 7 — — —7
n Dulwli fluiwlfi aw“: Dulwl! sup-4.5: umwl? Dt-uiulim'
rm". LflJrWn- ulna”. loam Slum: filmy: ‘I_||
«gamma —
um,“ nun-m1 m”? mural-av nun-4 mums melfl flulwl7 chairman
Inm- L'JI-wnu
,;||mn- gm“? ‘—f‘l,"°"' 4mm gruff. gm". Ln
«mm-«am; W
Inmb fllnwa
Fam- i
meun umpufl
>Rudeflnr2 » ~
amp-m mpm mum-z. mm we.“ Duo-415 mums. Duly-M7 Dlnuiplion
Dulwl s Dulpul 4 new a nulpul av Dull-u! 7 Dl-niwliun
‘dlmm gum? lunar" film-3 dlnam 1” 7 7 JML
7 .:J
111 Imam
L4H,“ ”Lips". 7 Lfllnmu gjlnfniwfllmm 7741 l 7 i “W“
4.2.7 Gate Control
The Gate Control menu is used to select the gate type (normal or
eedback), the control input should synchronization be used, and
he control output. AII parameters are changed using the
respective pull down menus.
ray-way.» ,, W ,, ,,
1 7 .-v “are.“ an... Magda-g
wlflmhmmumm
wyy,w.sirit’:cb)m! ] i ‘
f i
Ej
ioooooooOooo‘
gym ‘
Version 12
Page 14
4.2.7 AutoConfig
AII configuration changes made using this application and
subsequently “confirmed" are stored only in the Random Access
Memory (RAM) of the reader and will be lost upon power down.
Should the user desire to create a permanent configuration, press
the “Save Config on Board” button. This will instruct the reader to
copy the contents of the configuration to Flash memory so that it
can be retrieved upon reader power up or by using the “load"
command. The "Load Config from Board" command will load the
set up currently in Flash memory into the on board RAM. Note that
loading the configuration into RAM will not change the settings in
this application. The "file path browse" button is a debug feature
only and should not be used.
4.3 Tag List Maintenance
The Tag List Maintenance tab is used to view events monitored by the
IDentity MaX reader, The only two active windows in this section are the
"Translation List" and the “Realtime Tag lD”.
tsaD-u-dlml mass” A
i mum-mum - 7— »7——~—— 7 mum“
i n, Dunne
I ma
», w
i am i
4». m ‘
i we unuqin mow queqio
l I" “mum-«main:
i walnut—“ff haul-limb! » 7—
i i nmvnlu
: Upd-ul‘m wzzms l tum items/us
‘ w. Mm. a n, "mm 75
i (mm anulnfl
i tum 0mm
‘ MW _..J_! v
t i
i ~z 7» i
i Sui sum t
i 4
I f,
Version 1.2 Page 15
4,4
The “Display Latest 4 Tag lD" button will show the most recent four tags
read. The source of information for this window is the USB port on the
controller.
The “Display Next 4 Tag ID” will show the next most recent four tags read.
Repeated uses of “Display Next 4 Tag ID" will in essence allow the user to
scroll through all read activity four tags at a time.
The "continue read latest 4 tag IDs" feature is not used in this version of
this application.
Hit the Start button to display all tag reads as they happen. Use the Stop
button to discontinue the display. Note that this will not disable reading of
tags. The source of information for the “Realtime TagID“ window is the
host serial port.
Trigger and Filter
The Trigger and Filter tab allows the user to set specific events which will
initiate RFID transactions and to filter incoming data to reduce the amount
of redundant information being reported back to the user.
l vwwusm l
‘ litmus-Wm ‘
i muzsm ‘l
l “pawn; 1.
r Ynumlsnm ‘
‘ 1 MW,“
! SaFllniErIwiuim , s.m..oucmmm
i finFllnEmiwvabm ammuwwun
41 | NJ
Version 1.2 Page 16
- 4.4.1
4.4.2
Trigger Settings
There are five independent triggers that are given to the user to
use, Use the “Trigger Settings" menu to configure the respective
triggers to be used. All trigger event parameters are configured
using the pull down menus.
Trigger 0: Tliggel 0 Input: Tligger I] Output.
i {I Ilfl «- none iv
Trigger 0 Duration: Helliggeiz
20 11 Disabled iv
Each trigger can have the input linked to a general purpose input or
to the internal timer (to). The Trigger duration determines the
amount of time the reader will attempt an RFID transaction before
going inactive.
The resultant output will be routed to the general purpose output
selected here. By enabling retrigger, all subsequent occurances of
this event can be monitored.
Filter Configuration
To view the current filter parameters, use ”Get Filter Parameters".
To edit or create a filter, use “Set Filter Parameters"
Version 1.2
Page 17
HEM-h 44sz
“W" "W Vaidalinn cm. Valhalion Attempt:
DuptinaleFillui. m—“ [5,——
Enabled w
PenBack‘
Dupliosisfiller Iimewllxl E bled
m v
2 ‘ Dunfim
The duplicate filter will remove all subsequent instances of a
particular tag after the initial read. This can greatly reduce the
amount of data reported back to the user caused by a tag
remaining in the read zone for a longer than average time. This will
not suspend the actual tag read for the time out period, but rather
will cease duplicate data reporting only.
Validation is designed to discard all erroneous incoming data prior
to reporting and processing. The validation count is the number of
times a tag must be successfully read to be considered valid. The
validation attempt is the number of tries the reader will make in
order to obtain a validation count. Naturally, the value in validation
attempts needs to be greater than validation count,
The passback feature will allow the time stamp on all duplicate tag
reads to be updated for each read, extending the timeout. if
passback is enabled, a tag must leave the read zone for the
duration of the duplication filter timeout period.
Version 1.2
Page 18
5.0 Web based User Interface
The second user interface included with the iDentity MaX reader is a web based
interface that is actually built into the control hardware There is no extra application
needed to use this interface. This web based interface is designed to be used with
the Ethernet channel rather than the USB port.
The one requirement to use the interface is that the ip address of the reader must
be known. If used in a networked environment with a DHCP server, simply use the
network admin application to determine the reader ip address.
To begin, open an internet browser window, This GUI has been tested only with
Microsoft’s lnternet Explorer v6. However, it is very likely that it will function
properly with other browsers such a Mozilia or Firefox. Enter the reader ip address
previously determined into the URL line of the browser and press Enter. The title
screen of the User interface should appear. All other menus are brought up using
the links along the left side. Simply click on the text or arrow to navigate to the
desired menu. All sub menus will have “write", “save” and “refresh" buttons. The
write button will update the configuration in the RAM on the reader. The Save
button will update the configuration in the Flash memory on the reader, thus making
it permanent. The Refresh button will refresh the screen of the maintenance PC
with any new configuration parameters.
\ ‘r , . ./.L./ i / _ ‘
wwwtsirit'xém] LAM/fr/y/i} / ,, l lwtil
_ "‘ r . 'i r (f
' Welnmmnihhmil1ecirnmgwslinrlty‘np7Wmsmv-r
ClzkulillrlNi-Muilrmlhlisu MI rmmmmnmmwp a. saws than
was istfierM/lfl w mmm ‘nukmnrrm
mammal...
mm... , m.
(anflllMJ‘KW 1m Mum
mum
lili‘M‘
5. 1 Transaction Activity
This is a display only screen showing a list of all tag reads in realtime.
Version 1.2 Page 19
if!" QM ares"
rwmrmmwmrm
wwwsiriné
, ma
0 "mm
meeimeesseeo
" Om WE'QEQ-j
5.2 Network Profile
h I r ( row-m
Another display only screen showing the loading upon the internal CPU of
the reader by the various software and hardware modules.
mu May;
an
M1“
strum-4
,,er
Hawaii/nu vzxm “Mum ' '
Lima-g MWEM ' , ,
Version 1.2
Page 20

Source Exif Data:
File Type                       : PDF
File Type Extension             : pdf
MIME Type                       : application/pdf
PDF Version                     : 1.5
Linearized                      : No
Page Count                      : 25
XMP Toolkit                     : XMP toolkit 2.9.1-13, framework 1.6
About                           : uuid:96c153b3-847f-480e-87e7-19ddf42c2d82
Modify Date                     : 2006:06:30 10:33:49-04:00
Create Date                     : 2006:06:30 10:33:01-04:00
Metadata Date                   : 2006:06:30 10:33:49-04:00
Document ID                     : uuid:6544dff9-4f6d-4c90-9cf7-28e01c430b3c
Format                          : application/pdf
EXIF Metadata provided by EXIF.tools
FCC ID Filing: M4ZIDMAX012

Navigation menu