ClarIDy Solutions SUG-100-04 UHF Single-lane Security Gate User Manual

ClarIDy Solutions, Inc. UHF Single-lane Security Gate

User Manual

艾迪訊科技股份有限公司
Claridy Solutions, Inc.
www.claridy.com
E-mail:mkt@claridy.com
IDSmart UHF Security Gate
User Manual
IDSmart UHF Security Gate User Manual
© Copyright 2014 ClarIDy Solutions, Inc. All rights reserved. 2/40
Copyright Notice
© Copyright 2014 ClarIDy Solutions, Inc. All rights reserved.
No part of this document may be reproduced without the prior written permission of ClarIDy Solutions, Inc.
Disclaimer
The information of this document is subject to change without notice and does not represent a commitment on any part
of ClarIDy Solutions, Inc.
Trademarks
All the product names are trademarks or registered trademarks of their respective owners
IDSmart UHF Security Gate User Manual
© Copyright 2014 ClarIDy Solutions, Inc. All rights reserved. 3/40
Revision History
Revision
Date Author Description
E1.0 2014.01.02 Alex Choo
Nick Chen
Revise documentation for international security
gate model deployment.
IDSmart UHF Security Gate User Manual
© Copyright 2014 ClarIDy Solutions, Inc. All rights reserved. 4/40
Contents
1. Overview ............................................................................................................................... 6
1.1. Specification ............................................................................................................... 6
1.2. Equipment Exterior Overview .................................................................................... 7
1.3. Maintenance Access ................................................................................................... 8
1.4. Quick Start .................................................................................................................. 9
1.4.1. Raising the Panels .......................................................................................... 10
1.4.2. Connecting and Holding the Panels Together .............................................. 11
1.4.3. Arranging and Wiring the Cables ................................................................... 11
1.4.4. Covering Up the Slot Fitting ........................................................................... 12
1.4.5 Switching On the Equipment........................................................................... 12
1.4.6 Preparation for Testing the Equipment .......................................................... 13
1.5. Installation of the UHF Security Gate Tools ............................................................ 13
1.6. SAFETY NOTES ........................................................................................................ 14
2. Deploying the Security Gate .............................................................................................. 16
3. The System Connectivity ................................................................................................... 17
3.1. Ethernet Port ............................................................................................................. 17
3.2. LED Light Bar ............................................................................................................ 18
3.3. Buzzer ........................................................................................................................ 18
3.4. Counter ...................................................................................................................... 18
3.5. PIR Sensor and IR Sensor ........................................................................................ 18
3.6. UHF RFID Reader ...................................................................................................... 19
4. Modifying the Default Network Configuration ................................................................... 19
4.1. Initial Network Configuration of UHF Security Gate ............................................... 19
4.2. Accessing and Changing the UHF Security Gate Network Configuration ............. 20
5. Testing the Component of the Equipment ........................................................................ 21
5.1. Connecting to the Equipment .................................................................................. 22
5.2. Switching to Debug Mode ........................................................................................ 23
5.3. Running the Demo Program for Diagnosis ............................................................. 23
5.4. LED Light Bar Verification ........................................................................................ 24
5.5. Buzzer and Alarm Triggering ................................................................................... 25
5.6. Counter ...................................................................................................................... 25
5.7. PIR Sensor and IR Sensor ........................................................................................ 26
5.8. UHF RFID Reader Verification .................................................................................. 27
5.9. Switching to Service Mode ....................................................................................... 29
6. Accessing the UHF RFID Reader with Security Gate Tools ............................................. 29
6.1. Prerequisite of using the UHF Reader Tool ............................................................. 30
6.2. Connecting to the UHF RFID Reader ....................................................................... 30
6.3. Configuring the UHF RFID Reader and Antenna Settings ...................................... 32
IDSmart UHF Security Gate User Manual
© Copyright 2014 ClarIDy Solutions, Inc. All rights reserved. 5/40
6.4. Performing Inventory Operation .............................................................................. 34
6.5. Setting the API Level of the UHF RFID Reader ........................................................ 36
7. Appendix - Security Gate Mounting ................................................................................... 37
IDSmart UHF Security Gate User Manual
© Copyright 2014 ClarIDy Solutions, Inc. All rights reserved. 6/40
1. Overview
The purpose of this user manual is to facilitate users in deploying the IDSmart UHF
Security Gate (hereafter referred to as "the equipment"). The manual describes the software
included in the equipment and how they could be used to verify the functionality of the
equipment.
The main peripheral of the equipment includes a UHF RFID Reader with antennas that
supports EPC C1G2 UHF RFID protocols, an embedded board, a retro-reflective type
photoelectric sensors (IR Sensor), a Passive Infrared Sensor (PIR Sensor), a pair of two-color
LED light bar, a counter and a piezo electric buzzer.
1.1. Specification
The specification of the equipment is as follows.
General Specification
Dimension 760mm (D) x 120mm (W) x 1700mm (H)
Material White acrylics with extruded aluminum
Color White (Standard Corporate Identity)
Weight 76.5Kg (Single Lane)
Power AC100~240V, 0.8A, 50/60HZ
Operating Temperature 0°C~55°C
Storage Temperature -20°C~85°C
Humidity 0%~95% non-condensing
Hardware Specification
Embedded Board ARM Cortex A8@1Ghz 1GB RAM
Storage 2GB SD Card (1GB available for user)
Operating System Embedded Linux
Communication Interface Ethernet, TCP/IP x1 for LAN
Ethernet, TCP/IP x1 for UHF Reader Setup/Tuning
UHF RFID Reader Ethernet Interface (Connected internally to embedded
board)
16 Port, EPC UHF Class 1 Gen 2
IR Sensor Retro-Reflective Type 2M
PIR Motion Sensor Max 5M (w/o top LED lampshade). Approx. 1.5-2M (with
top LED lampshade)
LED Light Strip 12V, two color (blue and red) LED
Buzzer Oscillation frequency 2.5 ±0.5 KHz
Counter Built-in battery powered 7-segment LCD with 8 digits
IDSmart UHF Security Gate User Manual
© Copyright 2014 ClarIDy Solutions, Inc. All rights reserved. 7/40
UHF RFID Specification
Protocol EPC UHF Class 1 Gen 2, ISO18000-6C
Operating Frequency US: 902 928MHz / TW: 922 928MHz /
SG, HK: 920 925MHz / CHN: 920.5 924.5MHz / JP:
916.8-923.4MHz
RF Output Power 28dBm
Antenna Gain 5.5dBi
1.2. Equipment Exterior Overview
The following exhibits provide a general concept of whereabouts the peripheral located.
45° view from the outer area of the
equipment
A. Main Panel
B. Secondary Panel
1. On/Off Switch
2. PIR Sensor
3. Two-color LED Light Bar
(Warning Indicator)
4. IR Sensor
5. Counter
C. Ethernet Port and Power
6. LAN Communication Port
7. Reader Setup Port
8. Power Cable
B
A
C*
IDSmart UHF Security Gate User Manual
© Copyright 2014 ClarIDy Solutions, Inc. All rights reserved. 8/40
* Ethernet Port and Power outlet could be located at the inner side or outer side of the door
panel
45° view from the inner area
of the equipment
A. Main Panel
B. Secondary Panel
D. Slot Fitting (Holds both
panels and connect the
mounting plates)
E. Mounting Plate
1. On/Off Switch
2. PIR Sensor
3. Two-color LED Light
Bar (Warning Indicator)
9. IR Reflector
10. Buzzer outlet
1.3. Maintenance Access
The equipment maintenance required proper tools and training. The scope of the security
gate maintenance is not covered in this user manual. In general, the deployment of application
and control of peripherals can be done through the Ethernet interface. The equipment
maintenance access is only required when there is component failure. Users should consult
Claridy technical personnel for proper training before performing any maintenance activity on
the equipment. The security gate maintenance access can be gained through removing the
lampshade of the gate and the arcylic protective cover with a no.4 hex key or wretch. Note that
unauthorized changes, removal or tampering to the component/structure/wiring of the
equipment makes the provided warranty/guarantee null and void.
A
D
B
E
10
C*
IDSmart UHF Security Gate User Manual
© Copyright 2014 ClarIDy Solutions, Inc. All rights reserved. 9/40
1.4. Quick Start
There are four different parts in the delivery package, which is, (a) the main panel of the
gate, (b) the secondary panel of the gate, (c) the slot fitting that connects the mounting plate of
the gate panels, (d) the cover of the slot fitting.
The standard product does not come with mounting plate or base plate. The enclosed
mounting plates and slot fitting are designed to facilitate the testing of the equipment. In actual
deployment, the equipment is mounted to the floor and cabling is done through a wiring conduit
or duct (See section 7. Appendix - Security Gate Mounting).
Upon unpacking the equipment, users should assemble the security gate in accordance to
the steps described in this section. The equipment must be assembled on a flat and level floor.
Failure of doing so will cause unexpected behavior and result. For best result, allow a 2 meter
clearance space for the equipment, as illustrated below.
IDSmart UHF Security Gate User Manual
© Copyright 2014 ClarIDy Solutions, Inc. All rights reserved. 10/40
1.4.1. Raising the Panels
Unpack the main and secondary panel. The main panel can be identified by either looking
at the cable or the counter of the panel. The main panel should have 4 short RF cables, 2
Ethernet connector socket, a signal cable and a power cable coming out from the mounting
plate. Whereas, the secondary panel has 4 longer RF cables and a signal cable. The main
panel (item #1 in the following diagram) and the secondary panel (item #2) should be 780mm
apart standing with their mounting plate opening (#3) facing each other.
IDSmart UHF Security Gate User Manual
© Copyright 2014 ClarIDy Solutions, Inc. All rights reserved. 11/40
1.4.2. Connecting and Holding the Panels Together
Get the slot fitting part and snap one side to the secondary panel and the other side to the
main panel as illustrated below. The cables (not seen in the diagram below) should remain on
top of the mounting plate. By snapping both the mounting plate with the slot fitting, the main and
secondary panel are hold together and stand firmly on the floor.
1.4.3. Arranging and Wiring the Cables
After securing the panels on the floor, put the RF cables and signal cables on the slot.
Place RF cables together away from the signal cable. Connect the RF cables and the signal
cable by plugging the male plug to the female jack. Make sure that the RF cables are tightly
secured.
IDSmart UHF Security Gate User Manual
© Copyright 2014 ClarIDy Solutions, Inc. All rights reserved. 12/40
The RF cables are labeled with Channel "A" to "D", be sure that cable with the same
channel labeled are connected together. The signal connector is a fool-proof connector.
1.4.4. Covering Up the Slot Fitting
When the wiring is done, take the cover and slide it into the top area of the slot. The left
end of the cover has a small opening that allow Ethernet cable and power cable to go through.
In standard installation, power and Ethernet cable are within the equipment itself.
1.4.5 Switching On the Equipment
Ensure that proper power (115VAC for Model J, 230VAC for Model A & C) is supplied to
the equipment by plugging the power cable to the socket. The on/off switch is underneath the
lamp shade of the main panel to prevent tampering. Use a thin rod to push the switch to turn on
the power. When the equipment is ready, the blue LED light bar on top of the gate will be lit.
IDSmart UHF Security Gate User Manual
© Copyright 2014 ClarIDy Solutions, Inc. All rights reserved. 13/40
1.4.6 Preparation for Testing the Equipment
A notebook or computer with Ethernet adapter is required in order to setup the equipment
for testing. The default IP address of the equipment is set to 192.168.10.210 with subnet mask
of 255.255.255.0. Users are advised to set their notebook or computer Ethernet adapter to the
same network (i.e. 192.168.10.x). Then, plug one end of the Ethernet cable to the LAN
communication port of the equipment and the other end to the Ethernet adapter of the computer
or notebook. Follow instructions on section "1.5. Installation of the UHF Security Gate Tools" to
install the software tools to the notebook or computer.
1.5. Installation of the UHF Security Gate Tools
The release media include installation package for UHF Security Gate Tools. These tools
are useful in verifying the security gate peripheral functionalities. To install the package, run
"setup.exe". Dependency packages such as .NET Framework and Visual C++ Runtime are
installed first following by the setup welcome screen. Proceed as instructed.
IDSmart UHF Security Gate User Manual
© Copyright 2014 ClarIDy Solutions, Inc. All rights reserved. 14/40
Upon completing the installation process, the system creates a shortcut named "UHF
Security Gate Tools" on the desktop.
The tools installed are WinSCP, Putty and UHF Reader Tool. These tools are used to
access the equipment in the upcoming section of the user manual.
Alternatively, users could also install their choice of ssh client or obtain tool pack that
doesn’t required installation from technical support.
1.6. SAFETY NOTES
The equipment can only be operated at the stated supply voltage. If the supply voltage is
too high, there is a risk of fire.
Always turn off power before performing any maintenance activities or touching any interior
part and exterior connection cables of the equipment. Failure to do so might lead to injuries.
There is a risk of health.
Appropriate means are provided to dissipate the heat generated within this equipment. The
equipment must however not be installed in a cabinet or on shelves with insufficient ventilation..
There is a risk of fire.
Protect the equipment from moisture, dripping water and spraying water. The equipment
must not be placed close to sources of heat, exposed to direct sunlight or operated in a damp
environment. The equipment may only be operated in the condition stated in the specification.
IDSmart UHF Security Gate User Manual
© Copyright 2014 ClarIDy Solutions, Inc. All rights reserved. 15/40
Do not place anything which has a naked flame on the equipment. There is a risk of fire.
Connection, installation and maintenance work, as well as all other work on the unit, may
only be carried out by properly qualified and trained personnel. Unauthorized changes to the
unit and the use of spare parts and peripheral devices which are not sold or recommended by
the manufacturer can result in fires, electric shocks and injuries. Such actions therefore result in
exclusion of liability and make the manufacturer’s warranty/guarantee null and void.
IDSmart UHF Security Gate User Manual
© Copyright 2014 ClarIDy Solutions, Inc. All rights reserved. 16/40
2. Deploying the Security Gate
Once the security gate has been installed in the designated area, most likely somewhere
near the exit, users may examine the functionality of the security gate by walking through the
gate with books that has been encoded.
The security gate can operate even without network connectivity. This design ensures
security policies continue to be enforced during network or server failure. The security gate will
trigger the alarm and switch to alert status if there is any book with security flag enabled. By
default, books returned to the library will have security flag enabled whereas books successfully
borrowed by patron will have security flag disabled. The security gate has blue light lit when it’s
in normal status. The security gate will trigger the alarm, which is the combination of buzzer
sound and red light flashing when it’s in alert status.
To validate the security gate, users can perform three basic scenarios below and check the
corresponding light and sound of the security gate.
Scenario Light and Sound
1. Walk through the gate without carrying any books Blue
2. Carry a book that has not been borrowed (security flag enabled)
Red with Buzzer
3. Carry a book that has been borrowed (security flag disabled) Blue
Security Gate Normal Security Gate Alert
If the security gate is not functioning as expected, users may perform diagnosis by
referring to steps in section 5. Testing the Component of the Equipment.
IDSmart UHF Security Gate User Manual
© Copyright 2014 ClarIDy Solutions, Inc. All rights reserved. 17/40
3. The System Connectivity
The system is configured to boot up automatically into embedded Linux. The blue LED light
bar will be turned on when the equipment is ready. The following section provides user with
more information regarding the configuration of the peripherals or components.
3.1. Ethernet Port
Two Ethernet port sockets are located at the lower part of the main panel. One of the port
is labeled as "Reader Setup Port" and the other is labeled as "LAN Comm. Port"
Reader Setup Port (Item #2) LAN Comm. Port (Item #1)
MAC Address 00:05:7B:82:02:5C 48:D8:FE:F0:00:01
IP Address 192.168.25.203 192.168.10.210
Usage Reserved for reader setup, debug
and testing only, not for application.
Connect to Local Area Network
for communication with other
system and remote access to the
system.
Both port are set to static IP address. The reader setup port doesn't need to be connected
to the network, it is only use for setup and tuning. The LAN communication port is the main
interface between the equipment and the network server or remote access client.
To make the equipment accessible for local area network, either adjust the network to
192.168.10.x or change the default IP address of the LAN Comm. Port. Refer to section 4.2.
Accessing and Changing the UHF Security Gate Network Configuration for information on how
to change IP address of the LAN Communication. Port.
Note: Users should not change the IP Address of the reader through the Reader
Setup Port. Changing the IP Address will disconnect the reader from the embedded
board. If user has accidentally change the IP address using the reader test tool. Use the
tool to search the reader and change it back to the default IP address.
IDSmart UHF Security Gate User Manual
© Copyright 2014 ClarIDy Solutions, Inc. All rights reserved. 18/40
3.2. LED Light Bar
The LED light bar is used primarily as warning indicators. To accommodate various
requirement, two type of LED light are available for control, namely Red and Blue. In general,
red lights represent warning/alert and blue lights represent normal condition. The LED lights are
control with different digital output of the embedded board, making it also possible to turn both
LED on simultaneously. In general application, either red or blue light are used at a single point
of time.
3.3. Buzzer
The buzzer is used together with the LED light to constitute the effect of alarm. Only on/off
control can be set.
3.4. Counter
The eight digits counter is used to record the amount of people that go through the gate.
The detection is normally done through IR sensor. The counter can also be reset
programmatically if there is special request. In general application, software counter is used
because software counter offers the flexibility of counting visitor within a period of time.
3.5. PIR Sensor and IR Sensor
The PIR sensor is meant to detect human motion that it faced within a distance of
approximately 2M. The IR sensor is meant to detect people walking through the equipment.
Both sensors can be used to trigger activity such as tag detection, alarm or counting.
The IR sensor installed is retro-reflective type. A reflector is located at the other side of the
panel (image #3 as shown below). If an object or person comes in between of the IR sensor
and the reflector, the IR sensor signal is triggered. This can been determined by looking at the
orange LED light of the IR sensor. When there is nothing detected, the orange LED is off
(image #2).
IDSmart UHF Security Gate User Manual
© Copyright 2014 ClarIDy Solutions, Inc. All rights reserved. 19/40
3.6. UHF RFID Reader
The 16-port UHF RFID reader is conformed to EPC UHF Class 1 Gen 2 and capable of
supporting ISO18000-6C protocol. It is connected to the Ethernet interface of the embedded
board. The reader and the embedded board each has a fixed IP address assigned ensuring
direct communication between these two units..
Setting Value
Embedded Board Ethernet Port IP 192.168.25.210
Embedded Board Network Mask 255.255.255.0
UHF RFID Reader IP 192.168.25.203
UHF RFID Reader Network Mask 255.255.255.0
Note: User should not change the default IP address of the UHF RFID Reader.
Besides the internal Ethernet interface that connected to the Embedded Board. The
equipment also includes an external Ethernet Port (i.e. The Reader Setup Port) for
accessing the reader externally. This is particularly useful when user wish to calibrate
and tune the equipment for tag detection.
4. Modifying the Default Network Configuration
The security gate's network configuration (i.e. the configuration of LAN communication port)
can be changed by accessing the equipment through remote access terminal. SSH protocol is
selected for better security. This LAN communication port is the only port that user may change
according to the deployed networking environment.
4.1. Initial Network Configuration of UHF Security Gate
The factory default network configuration of the UHF Security Gate is as follows.
IP Address 192.168.10.210
IDSmart UHF Security Gate User Manual
© Copyright 2014 ClarIDy Solutions, Inc. All rights reserved. 20/40
Netmask 255.255.255.0
Gateway 192.168.10.253
Preferred DNS Server 8.8.8.8
Alternative DNS Server 8.8.4.4
4.2. Accessing and Changing the UHF Security Gate Network Configuration
There are two approaches to make the equipment accessible, either through changing the
network configuration of the equipment or the network configuration of the local area network.
Normally, changing equipment's network configuration is more feasible and practical. To
access the reader, please follow the steps below.
Prepare a Notebook or computer with Ethernet adapter.
Modify the network configuration with static IP and netmask. This will make the computer or
Notebook resides at the same network as the equipment.
IP Address 192.168.10.x (x can be any number between 1 to 252)
Netmask 255.255.255.0
Connect the Ethernet port of the computer or Notebook and UHF Security Gate "LAN
Comm. Port" with a standard cat 5 network cable.
Use SSH client to connect to the equipment. If this is the first time connecting to the
equipment, a security alert dialog pops up. Select "Yes" to continue. The username and
password to be used is as follows.
Username: sshuser
Password : IDSmart
Modify "/home/sshuser/outgoing_network.config" to fit the current network
environment settings by typing "vi outgoing_network.config" at the command prompt.
This opens an editor window for changing the configuration.
IDSmart UHF Security Gate User Manual
© Copyright 2014 ClarIDy Solutions, Inc. All rights reserved. 21/40
sshuser@freescale ~$ vi outgoing_network.config
After finish editing the network configuration, type ":wq" to save the configuration file.
Restart or reboot the equipment.
Always remember the IP Address (OUTGOING_IPADDR) and the Subnet Mask
(OUTGOING_NETMASK) that are changed. When the equipment restarts, the remote access
will no longer available if the network of the notebook or computer are different from the
equipment. If for any reason users can no longer access remotely, the configuration can also
only be changed through accessing the system via console port. The console port can only be
connected through maintenance access of the equipment.
Gateway is used when the equipment communicates across different network. Be sure that
the DEL_GATEWAY and ADD_GATEWAY has the same address.
DNS_SERVER1 and DNS_SERVER2 must be set if the equipment is communicating with
other devices on the network using naming system instead of IP address.
5. Testing the Component of the Equipment
Once the equipment is ready, an illegal item such as an un-borrowed book will trigger
alarm when it is carry through the security gate. If the security gate is not function as expected,
users may switch to debug mode and perform diagnostic on each component during
troubleshooting.
The equipment is remotely accessed using SSH remote access software such as "Putty".
The remote access software should be installed on a computer. To simplify the testing process,
the remote access software can be installed on a notebook. A direct connection can be hooked
up between the notebook and the equipment using Ethernet cable without changing the
network configuration of the equipment (see section 1.4.6 Preparation for Testing the
Equipment).
IDSmart UHF Security Gate User Manual
© Copyright 2014 ClarIDy Solutions, Inc. All rights reserved. 22/40
The connection can only be made if the computer that has the remote access software
installed can reach the equipment.
Ping the equipment from the computer to ensure that network connectivity is OK. If it is
a direct connection, check cable if the equipment has no response.
Allow bi-directional access of port 22 as the equipment SSH protocol is configured to
listen and communicate through port 22. If it is a direct connection, check if there is any
antivirus or firewall security software that blocks this port when connection fails.
Consult the network administrator for further advice and information on the local area
network configuration. If the equipment and the computer is located on two different networks,
the gateway configuration of the equipment must be changed.
5.1. Connecting to the Equipment
Start the SSH remote access tool. "Putty" is used as the SSH remote access tool
throughout this user manual, users are free to choose different tool. Type the IP address of the
equipment in the "Host Name (or IP address)" textbox and click "Open" button.
IDSmart UHF Security Gate User Manual
© Copyright 2014 ClarIDy Solutions, Inc. All rights reserved. 23/40
If this is a first time connection, a security alert will be shown. Choose "Yes" to accept the
security key for future connection, as we are pretty sure that we are connecting to the intended
equipment.
The default username and password is listed below. User can change the password with
Linux change password command once connected.
Username: sshuser
Password : IDSmart
A command shell is shown when the login is successful. Most of the common Linux
command works under this shell, but some may not since it is embedded Linux.
5.2. Switching to Debug Mode
The security gate is started up in service mode. To perform diagnostic, the user must
switch the security gate to debug mode.
After successful logged in with the "sshuser" account, user should be in the home directory
of the user, run the debug mode script by typing "./security-gate-DebugMode.sh" in the shell.
sshuser@freescale ~$ ./security-gate-DebugMode.sh
When the script executed, the security gate will reboot and user can log in to the system
running the debug mode. Always switch to debug mode when performing diagnostic and
configuration of the system.
The reboot process will kick the remote access connection so users will need to reconnect
to the system once the system restart. The LED light of the security gate will not turn to blue
after reboot to debug mode.
5.3. Running the Demo Program for Diagnosis
A demo program is developed to facilitate the testing of the equipment. The demo program
can test individual components of the equipment and is therefore very handy when performing
diagnosis. Before running the demo program, be sure that the system is in "debug mode".
The demo program is preinstalled in the equipment. It is located under the directory
"/usr/local/security-gate-demo/". When login, change the directory to "security-gate-demo" and
IDSmart UHF Security Gate User Manual
© Copyright 2014 ClarIDy Solutions, Inc. All rights reserved. 24/40
run the "./demo.sh" shell script.
sshuser@freescale ~$ cd /usr/local/security-gate-demo
sshuser@freescale /usr/local/security-gate-demo$ ./demo.sh
After executing the demo program, the context shell of the demo program is loaded. Type
"help" to see commands available for the demo program. Please refer to the SDK reference
manual for detailed usage.
sshuser@freescale ~$ cd /usr/local/security-gate-demo
sshuser@freescale /usr/local/security-gate-demo$ ./demo.sh
[Demo] Start Demo Program.
$>
$>help
[Demo] Commands ::
[Demo] Command Description
[Demo] "help" "Display all command and description"
[Demo] "connect" "Connect to CS468"
[Demo] "disconnect" "Disconnect from CS468"
[Demo] "inventory" "Start Inventory"
[Demo] "read-user-memory" "Read the user memory data"
[Demo] "read-tid" "Read the TID data"
[Demo] "stop" "Stop Operation"
[Demo] "set-power" "Set the antenna power."
[Demo] "get-power" "Get the antenna power."
[Demo] "enable-ant" "Enable the antenna port"
[Demo] "disable-ant" "Disable the antenna port"
[Demo] "set-fix-q" "Set Fix-Q Algorithm"
[Demo] "set-dwell-time" "Set the dwell time of the antenna"
[Demo] "set-ant-inv-count" "Set the inventory round counts of the antenna"
[Demo] "start-scenario" "Run Scenario"
[Demo] "stop-scenario" "Stop Scenario"
[Demo] "get-ir-state" "Get the state of the IR pin (0 or 1)"
[Demo] "start-ir" "Start monitor the IR pin state."
[Demo] "stop-ir" "Stop monitor the IR pin state"
[Demo] "get-pir-state" "Get the state of the PIR pin (0 or 1)"
[Demo] "start-pir" "Start monitor the PIR pin state."
[Demo] "stop-pir" "Stop monitor the PIR pin state"
[Demo] "turn-red-led-on" "Turn red led on"
[Demo] "turn-red-led-off" "Turn red led off"
[Demo] "blink-red-led" "Blink the red led"
[Demo] "turn-blue-led-on" "Turn blue led on"
[Demo] "turn-blue-led-off" "Turn blue led off"
[Demo] "blink-blue-led" "Blink the blue led"
[Demo] "add-counter" "Add counter by 1"
[Demo] "reset-counter" "Reset counter "
[Demo] "beep" "Make beep."
[Demo] "trigger-alarm" "Trigger Alram."
[Demo] "turn-reserved-port-on" "Turn on the reserved port."
[Demo] "turn-reserved-port-off" "Turn off the reserved port"
[Demo] "q" "quit "
$>
5.4. LED Light Bar Verification
The two-color LED light bar can be controlled separately. The following example turns the
blue LED off and turn the red LED on. The blink function allows user to blink the LED light bar
for a desired time in seconds. The example also makes the red LED blink for 5 seconds.
[Demo] Start Demo Program.
$>
$>turn-blue-led-off
[Demo] Turn Blue led off
$>turn-red-led-on
[Demo] Turn the red led on
IDSmart UHF Security Gate User Manual
© Copyright 2014 ClarIDy Solutions, Inc. All rights reserved. 25/40
$>blink-red-led 5
[Demo] Blink red led :: "5" seconds
$>
From left to right: Both LED lights are off, blue LED lights on, red LED lights on.
5.5. Buzzer and Alarm Triggering
Users can control the number of second that a buzzer beeps. By combining the buzzer
beeping and red LED light bar blinking, alarm effect can be created. The example causes the
buzzer to beep for 7 seconds and then sound the alarm for 3 seconds (red lights and buzzer will
be activated for 3 seconds).
[Demo] Start Demo Program.
$>
$>beep 7
[Demo] Beep in "7" seconds
$>trigger-alarm 3
[Demo] Trigger alarm in "3" seconds
$>
5.6. Counter
Users may increase the counting or reset the counting of the counter. The following
example increases the counter five times and then reset it. The counter current count can be
checked by looking at the lower part of the main panel. The reset counter is per request special
feature which might not available for most model.
[Demo] Start Demo Program.
$>
$>add-counter
[Demo] Plus 1 in the Counter
$>add-counter
[Demo] Plus 1 in the Counter
$>add-counter
[Demo] Plus 1 in the Counter
$>add-counter
[Demo] Plus 1 in the Counter
$>add-counter
[Demo] Plus 1 in the Counter
$>
$>reset-counter
[Demo] Reset the Counter
$>
IDSmart UHF Security Gate User Manual
© Copyright 2014 ClarIDy Solutions, Inc. All rights reserved. 26/40
Current count at 5
After reset of counter
5.7. PIR Sensor and IR Sensor
Both sensors are input to the system, which mean that they are triggered by external event.
The sensors are put to monitoring the external event, which is people coming near the
equipment or passing through the equipment.
To make the testing straight forward, the buzzer beeps once when the sensors are
triggered. Due to the nature of fast sensor response, the sensor response are deliberately
slowed down through software programming so that the equipment is not over reacted or too
sensitive to motion. The following example starts the PIR sensor monitoring process and stop it
[Demo] Start Demo Program.
$>
$>start-pir
[Demo] Start Monitor the PIR
$>[Demo] PIR Detected
[Demo] PIR Detected
[Demo] PIR Detected
[Demo] PIR Detected
$>
$>stop-pir
[Demo] Stop Monitor the PIR
$>
When PIR sensor monitoring process started, stand in front of the equipment and move
around (e.g. walk toward the gate). When the PIR sensor detects the motion, the buzzer's beep
can be heard. Once detected, the PIR sensor stop detecting until one second later.
IDSmart UHF Security Gate User Manual
© Copyright 2014 ClarIDy Solutions, Inc. All rights reserved. 27/40
The following example starts the IR sensor monitoring process and stop it
[Demo] Start Demo Program.
$>
$>start-ir
[Demo] Start Monitor the IR
$>[Demo] IR Detected
[Demo] IR Detected
[Demo] IR Detected
[Demo] IR Detected
$>
$>stop-ir
[Demo] Stop Monitor the IR
$>
When IR sensor is started, walk through the security gate. The buzzer beeps when the
user passes through the IR sensor.
5.8. UHF RFID Reader Verification
The reader is connected internally to the embedded board through Ethernet port. The
IDSmart UHF Security Gate User Manual
© Copyright 2014 ClarIDy Solutions, Inc. All rights reserved. 28/40
reader is assigned a static IP address and connected to a designated IP address of the
embedded board. User should not change this IP address as they are private internal IP
address. The internal IP address of the UHF reader is set to 192.168.25.203. The following
example starts a reader connection and set the Q value parameter of the reader. Q value is one
of many parameters of UHF EPC C1G2. The parameters can be adjusted based on various
scenario, this is out of the scope of this user manual. Consult RFID technical expert for
optimization of these values. Connection to the reader is required before performing any
inventory or tag reading operation.
[Demo] Start Demo Program.
$>
$>connect 192.168.25.203
[Demo] Connect to the Reader. IP : "192.168.25.203"
[Demo] CS468 Connected!!
[Demo] Initial the default parameters.
[Demo] Disable 0-port antenna and enable the 8 ~ 15 port antenna.
[Demo] Set dwell time as 250
[Demo] Set antenna power as 270
$>
$>set-fix-q
[Demo] Error :: The count of parameters is not match with the command. CMD:: "set-fix-q"
[Demo] Usages ::
"set-fix-q [q-value] [retry-count] [toggle] [runTillZero]"
$>
$>set-fix-q 4 0 1 1
[Demo] Set Fix Q : 4 ,Retry Count : 0 , is Toggle : true , is Run Till Zero : true
$>
Prepare several books with tag or UHF RFID tag and place those tags near the equipment.
Depending on the environment, the reading radius could be around one to two meters. To test
the reader, we place the UHF RFID tags in between the two panels of the security gate. The
following example performs an inventory cycle. Information of tags, i.e. PC, EPC and RSSI of
the detected tags are displayed, regardless of whether it repeats on different antenna.
$>
$>set-fix-q 4 0 1 1
[Demo] Set Fix Q : 4 ,Retry Count : 0 , is Toggle : true , is Run Till Zero : true
$>
$>inventory
[Demo] Start Inventory
[Demo] Tag PC:: "4800" EPC :: "104000000001023a80000003525c00010000" , RSSI :: "66.4"
[Demo] Tag Detected
[Demo] Tag PC:: "4800" EPC :: "104000000001023a80000003525c00010000" , RSSI :: "60"
[Demo] Tag Detected
[Demo] Tag PC:: "4800" EPC :: "104000000001023a80000003525c00010000" , RSSI :: "64"
[Demo] Tag Detected
[Demo] Tag PC:: "4800" EPC :: "104000000001023a80000003525c00010000" , RSSI :: "61.6"
[Demo] Tag Detected
[Demo] Tag PC:: "4800" EPC :: "104000000001023a80000003525c00010000" , RSSI :: "62.4"
[Demo] Tag Detected
[Demo] Tag PC:: "4800" EPC :: "104000000001023a80000003525c00010000" , RSSI :: "62.4"
[Demo] Tag Detected
[Demo] Tag PC:: "4800" EPC :: "104000000001023a80000003525c00010000" , RSSI :: "76.8"
[Demo] Tag Detected
[Demo] Tag PC:: "4800" EPC :: "104000000001023a80000003525c00010000" , RSSI :: "76.8"
[Demo] Tag Detected
[Demo] Tag PC:: "3000" EPC :: "300833b2ddd9014000000000" , RSSI :: "50.4"
[Demo] Tag Detected
[Demo] Tag PC:: "3000" EPC :: "300833b2ddd9014000000000" , RSSI :: "48.8"
[Demo] Tag Detected
IDSmart UHF Security Gate User Manual
© Copyright 2014 ClarIDy Solutions, Inc. All rights reserved. 29/40
[Demo] Tag PC:: "4800" EPC :: "104000000001023a80000003525c00010000" , RSSI :: "73.6"
[Demo] Tag Detected
[Demo] Tag PC:: "4800" EPC :: "104000000001023a80000003525c00010000" , RSSI :: "67.2"
[Demo] Tag Detected
[Demo] Tag PC:: "4800" EPC :: "104000000001023a80000003525c00010000" , RSSI :: "74.4"
[Demo] Tag Detected
[Demo] Tag PC:: "4800" EPC :: "104000000001023a80000003525c00010000" , RSSI :: "76"
: (truncated)
:
$>
There are eight antenna (port 8 to port 15) installed for the equipment, to set antenna
power and dwell time, run the command with appropriate parameter, check the SDK reference
manual for further usage. The following example disables antenna on port no.8 and enables it.
Then, a disconnection to the reader is done follows by exiting the context shell.
Note: only one connection can be connected to the reader at the same time.
$>
$>disable-ant 8
[Demo] Disable Antenna :: 8
$>
$>enable-ant 8
[Demo] Enable Antenna :: 8
$>
$>disconnect
$>
$>q
sshuser@freescale ~/security-gate-demo$
5.9. Switching to Service Mode
Once the user has completed the diagnosis, the system should be switched to service
mode. The service mode script is located in the home directory of the "sshuser". Change the
directory to "/home/sshuser". the run the debug mode script by typing
"./security-gate-DebugMode.sh" in the shell.
sshuser@freescale /usr/local/security-gate-demo$ cd /home/sshuser
sshuser@freescale ~$ ./security-gate-ServiceMode.sh
When the script executed, the security gate will reboot and switch to service mode. Always
switch to debug mode when performing diagnostic and configuration of the system. In service
mode, the security gate LED will be red when restarting and turn to blue when it is ready to
service. If the LED doesn’t switch from red to blue within 20sec, login to the system again to
correct the issue.
6. Accessing the UHF RFID Reader with Security Gate Tools
The UHF RFID Reader is internally connected to the embedded board. To facilitate testing
and tuning, the security gate tools include a program that can directly connect to the reader
through the Ethernet Port labeled "Reader Setup Port". This tool is especially useful when
developers wish to test different setting of the reader and antenna to optimize the result of the
IDSmart UHF Security Gate User Manual
© Copyright 2014 ClarIDy Solutions, Inc. All rights reserved. 30/40
security gate detection. One of the key successful factors of UHF RFID equipment deployment
is environment. This tool provides a way to easily perform on site tuning with portable computer
such as Notebook.
6.1. Prerequisite of using the UHF Reader Tool
Before using the tool, install the tool to the computer according to the instructions
described in section 1.5. Installation of the UHF Security Gate Tools.
The computer Ethernet interface configuration will need to be changed to ensure the
computer residing on the same network as the UHF RFID reader. The reader has a static IP
address of 192.168.25.203 and subnet mask of 255.255.255.0. As a result, the IP address of
the computer should be set to 192.168.25.X (except 192.168.25.0 and 192.168.25.203) with
the same subnet mask. The following example set the computer IP address to 192.168.25.21
6.2. Connecting to the UHF RFID Reader
Double click "Claridy UHF Security Gate Tools" shortcut on the desktop and double click
the "UHF Reader Tool" shortcut to run the tool.
An initial search dialog is presented when the program is executed. Click "Search" button
to discover the reader. Since the UHF RFID reader and the computer are allocated to the same
network, the discovery process is pretty straight forward.
IDSmart UHF Security Gate User Manual
© Copyright 2014 ClarIDy Solutions, Inc. All rights reserved. 31/40
After searching the network, the installed UHF RFID reader at 192.168.25.203 is found.
Stop the search by clicking the "Stop" button.
Check the checkbox next to the reader name and click "Connect" button to connect to the
reader. A splash screen will be shown while the program attempts to access the UHF RFID
reader.
IDSmart UHF Security Gate User Manual
© Copyright 2014 ClarIDy Solutions, Inc. All rights reserved. 32/40
After connected to the reader. Users may choose the intended operation using the "Menu"
located at the lower left corner.
6.3. Configuring the UHF RFID Reader and Antenna Settings
To configure the UHF RFID reader, select "Setup" from the "Menu". The setup dialog pops
up showing various parameters that can be refined. To start configuring the UHF RFID reader,
select the IP address of the UHF RFID reader by clicking the combo box located at the lower
left corner of the dialog.
After choosing the designated UHF RFID reader. The configuration tabs and options are
enabled with additional FixedQ and Carrier Wave tabs available for access.
IDSmart UHF Security Gate User Manual
© Copyright 2014 ClarIDy Solutions, Inc. All rights reserved. 33/40
The general options tab allows setting of profile, power, country regulation and reconnect
timeout of the UHF RFID reader. The following example setup the reader to adopt Fixed Q
algorithm with a Q value of 4. After changing the value of the setting, remember to click the
"Apply" button located at the lower right corner.
Antenna configuration can be accessed and set by clicking "Antenna Config" button in the
general options tab.
IDSmart UHF Security Gate User Manual
© Copyright 2014 ClarIDy Solutions, Inc. All rights reserved. 34/40
This equipment's UHF RFID reader is capable of controlling 16 antenna ports. Only 8
antenna ports (Port 8 to 15) are attached to antenna for this equipment. The tool automatically
enables port 8 to 15 and disables port 0 to 7 when "Antenna Config" is executed for the first
time. Users may configure the Dwell time, Inventory Cycle and Power Level of each antenna
port. Click "Apply" button to apply setting to a single antenna port. Click "Apply All" to apply
setting to all antenna ports according to what configured on the screen. The Antenna can be
switched on and off by clicking the corresponding radio button. The following configuration will
allow the equipment to scan through 8 antennas in 2 seconds as the dwell time for each
antenna port is 250ms.
Further adjustment can be done. The tool is handy for experimenting with different setting
of the equipment. Check the result of the setting by doing an inventory cycle.
6.4. Performing Inventory Operation
After setting up the desired value for the reader and antenna ports, users can then check
the result by performing inventory operation through the tool. Start the inventory operation by
selecting "Start" under the "Inventory" sub menu.
IDSmart UHF Security Gate User Manual
© Copyright 2014 ClarIDy Solutions, Inc. All rights reserved. 35/40
Place tags near to the equipment and the detected tag information shall display on the grid.
Port, RSSI, Read Count and Missing Cycle Count can be used to determine the effect of the
parameter set for the reader and antenna ports.
Stop the inventory by selecting "Stop" under the "Inventory" sub menu.
Select "Exit" from the menu if users wish to end current connection with the reader. Note
IDSmart UHF Security Gate User Manual
© Copyright 2014 ClarIDy Solutions, Inc. All rights reserved. 36/40
that only one connection can be made to the reader at the same time.
6.5. Setting the API Level of the UHF RFID Reader
The UHF RFID reader has two modes when it comes to API. The demo program provided
with the equipment uses low level API to communicate with the reader. Whereas, the UHF
reader tool uses high level API to communicate with the reader. When connecting to the reader
using the UHF reader tool, the tool automatically checks the mode of the API. The tool
automatically switches to high level API mode if it finds that the reader is in low level API mode.
A message box pops up if automatic switching of low level to high level API occurs. Click "OK"
button to proceed if the message box pops up.
Always check the networking configuration and Ethernet cable when attempting to find the
UHF RFID Reader. If the tool cannot connect to the reader after a period of time, user could try
to switch API level manually by clicking on the "Set API" button on the search reader dialog.
The set API level can only be performed when a reader has been successfully searched. Select
"Set High Level API" button to switch the reader to high level API mode.
IDSmart UHF Security Gate User Manual
© Copyright 2014 ClarIDy Solutions, Inc. All rights reserved. 37/40
7. Appendix - Security Gate Mounting
In general, the security gate is best mounted to the floor for robustness and aesthetic. If
base plate or mounting plate approach is desired, installers are responsible for designing the
base plate or mounting plate according to the site survey. Consult Claridy technical personnel
for customizing the base plate or mounting plate. The following picture illustrates the mounting
point for the gate which ensure the panel of the security gate is correctly aligned. Wiring conduit
or duct is located underneath the floor surface.
The diagram below illustrates three panels of a double lane security gate mounted to the
floor.
Conduit or duct underneath
Conduit or duct underneath
IDSmart UHF Security Gate User Manual
© Copyright 2014 ClarIDy Solutions, Inc. All rights reserved. 38/40
The following base plate or mounting plate is one of many types available for shipping.
There are 4 holes (3 visible and shown below) designed for mounting the security gate with the
base plate to the floor.
Rotary hammer/hammer drill with 12.7mm (0.5 inch) masonry/concrete drill bit is
recommended for drilling the floor.
Both mounting approaches need anchor bolt or expansion bolt to attach the security gate
structure to floor.
IDSmart UHF Security Gate User Manual
© Copyright 2014 ClarIDy Solutions, Inc. All rights reserved. 39/40
FCC Warning
FEDERAL COMMUNICATIONS COMMISSION
INTERFERENCE STATEMENT
This equipment has been tested and found to comply with the limits for a Class B digital
device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide
reasonable protection against harmful interference in a residential installation. This
equipment generates, uses and can radiate radio frequency energy and, if not installed
and used in accordance with the instructions, may cause harmful interference to radio
communications. However, there is no guarantee that interference will not occur in a
particular installation. If this equipment does cause harmful interference to radio or
television reception, which can be determined by turning the equipment off and on, the
user is encouraged to try to correct the interference by one or more of the following
measures:
-- Reorient or relocate the receiving antenna.
-- Increase the separation between the equipment and receiver.
-- Connect the equipment into an outlet on a circuit different from that to which the
receiver is connected.
-- Consult the dealer or an experienced radio/TV technician for help
CAUTION:
To assure continued FCC compliance:
1. Any changes or modifications not expressly approved by the grantee of this device
could void the user's authority to operate the equipment.
2. This equipment complies with FCC radiation exposure limits set forth for an
uncontrolled environment. This equipment should be installed and operated with
minimum distance 20cm between the radiator & your body.
BATTERY CAUTION:
Risk of explosion if Battery is replaced by an incorrect type.
Dispose of used batteries according to the instructions.
IDSmart UHF Security Gate User Manual
© Copyright 2014 ClarIDy Solutions, Inc. All rights reserved. 40/40

Navigation menu