RF Ideas RDR8XX8U Proximity Card Reader User Manual

RF Ideas Inc Proximity Card Reader Users Manual

Users Manual

pcProx® ConfigConfiguration UtilityUser Manual99009010 G
Thank You!Congratulations on the purchase of your pcProx, AIR ID and/or Wiegand device(s). RF IDeas hopes you enjoy using the readers as much as we enjoyed creating and developing them.  Configuration is easy, so you will be able to quickly take advantage of a more secure environment in your business, school, or organization.Please call our Sales department if you have any questions or are interested in our OEM and Independent Developer’s programs.We look forward to your comments and suggestions for our product line!  Please go to www.RFIDeas.com and follow the Support a Learning Center link for more details about our product line.We are always discovering new applications for our product line(s).  There are several software developers licensing our technology so the solution you are looking for may already be developed.Thank you,The RF IDeas StaffNeed Assistance?  Ph: 847.870.1723  Fx: 847.483.1129  E:  Sales@RFIDeas.com       TechSupport@RFIDeas.com2
END-USER LICENSE AGREEMENTLICENSE AGREEMENTEnd-User License Agreement for RF IDeas™ SOFTWARE and HARDWARE - RF IDeas’ pcProx®,  AIR ID® , Proximity Activated Readers, Software Developer’s Kit, and Proximity Reader DLLs, and Protocol(s). IMPORTANT-READ CAREFULLY: This End-User License Agreement (“EULA”) is a legal agreement between you (either an individual or a single entity) and the manufacturer RF IDeas (“Manufacturer”) with which you acquired the RF IDeas software and hardware product(s) identied above (“PRODUCT”).  The PRODUCT includes the RF IDeas reader, computer software, the associated media, any printed materials, and any “on line” or electronic documentation.  By installing, copying or otherwise using the PRODUCT, you agree to be bound by the terms of this EULA.  The SOFTWARE PORTION OF THE PRODUCT includes the computer software, the associated media, any printed materials, and any “on line” or electronic documentation.  By installing, copying or otherwise using the PRODUCT, you agree to be bound by the terms of this EULA.  If you do not agree to the terms of this EULA, RF IDeas is unwilling to license the PRODUCT to you.  In such event, you may not use or copy the SOFTWARE PORTION OF THE PRODUCT, and you should promptly contact the vendor you obtained this PRODUCT from for instructions on return of the unused product(s) for a refund. The products described in this publication are intended for consumer applications. RF IDeas assumes no liability for the performance of product. RF IDeas products are not suitable for use in life-support applications, biological hazard applications, nuclear control applications, or radioactive areas.  None of these products or components, software or hardware, are intended for applications that provide life support or any critical function necessary for the support of protection of life, property or business interests.  The user assumes responsibility for the use of any of these products in any such application. RF IDeas shall not be liable for losses due to failure of any of these products, or components of these products, beyond the RF IDeas commercial warranty, limited to the original purchase price. SOFTWARE PRODUCT LICENSE  The PRODUCT is protected by copyright laws and international copyright treaties, as well as other intellectual property laws and treaties.  The SOFTWARE PORTION OF THE PRODUCT is licensed, not sold. 1. GRANT OF LICENSE.  This EULA grants you the following rights:  *Software. You may install and use one copy of the SOFTWARE POR-TION OF THE PRODUCT on the COMPUTER. *Network Services. If the SOFTWARE PORTION OF THE PRODUCT includes functionality that enables the COMPUTER to act as a network server, any number of computers or workstations may access or otherwise utilize the basic network services of that server.  The basic network services are more fully described in the printed materials accompanying the SOFTWARE PORTION OF THE PRODUCT. *Storage/Network Use. You may also store or install a copy of the computer SOFTWARE PORTION OF THE PRODUCT on the COMPUTER to allow your other computers to use the SOFTWARE PORTION OF THE PRODUCT over an internal network, and distribute the SOFTWARE PORTION OF THE PRODUCT to your other computers over an internal network.1.1 General License Grant RF IDeas grants to an individual, a personal, nonexclusive license to make and use copies of the SOFTWARE PRODUCT for the sole purposes of designing, developing, and testing your software product(s) that are designed to operate in conjunction with any RF IDeas designed proximity reader product. You may install copies of the SOFTWARE PRODUCT on an unlimited number of computers provided that you are the only individual using the SOFTWARE PRODUCT. If you are an entity, RF IDeas grants the right to designate one individual within your organization to have the sole right to use the SOFTWARE PRODUCT in the manner provided above.1.2 Documentation. This EULA grants an individual, a personal, nonexclusive license to make and use an unlimited number of copies of any documentation, provided that such copies shall be used only for personal purposes and are not to be republished or distributed (either in hard copy or electronic form) beyond the user’s premises and with the following exception: you may use documentation identied in the SOFTWARE PRODUCT as the le format specication for RF IDeas’ proximity readers solely in connection with your development of software product(s) or an integrated work or product suite whose components include one or more general purpose software products. 1.3 Storage/Network Use. You may also store or install a copy of the SOFTWARE PRODUCT on a storage device, such as a network server, used only to install or run the SOFTWARE PRODUCT on computers used by a licensed end user in accordance with Section 1.1.  A single license for the SOFTWARE PRODUCT may not be shared or used concurrently by other end users. 1.4 Sample Code. RF IDeas grants you the right to use and modify the source code version of those portions of the SOFTWARE PRODUCT identied as “Samples in the SOFTWARE PRODUCT (“Sample Code”) for the sole purposes to design, develop, and test your software product(s), and to reproduce and distribute the Sample Code, along with any modications thereof, only in object code form.2. DESCRIPTION OF OTHER RIGHTS AND LIMITATIONS.*Limitations on Reverse Engineering, Decompilation and Disassembly.  You may not reverse engineer, decompile, or disassemble the PRODUCT, except and only to the extent that such activity is expressly permitted by applicable law notwithstanding this limitation*You may not reproduce or otherwise emulate, in whole or in part, any form the protocol(s) dened within this PRODUCT for usewithout a RF IDeas PRODUCT Redistributable Code. If you are authorized and choose to redistribute Sample Code (“Redistributables”) as described in Section 1.4, you agree to: (a) distribute the Redistributables in object code only in conjunction with and as a part of a software application product developed by you using the PRODUCT accompanying this EULA that adds signicant and primary functionality to the SOFTWARE PRODUCT (“Licensed Product”); (b) not use RF IDeas’ name, logo, or trademarks to market the Licensed Product; (c) include a valid copyright notice on the Licensed Product; (d) indemnify, hold harmless, and defend RF IDeas from and against any claims or lawsuits, including attorney’s fees, that arise or result from the use or distribution of the Licensed Product; (e) otherwise comply with the terms of this EULA; and (g) agree that RF IDeas reserves all rights not expressly granted. You also agree not to permit further distribution of the Redistributables by your end users except: (1) you may permit further redistribution of the Redistributables by your distributors to your end-user customers if your distributors only distribute the Redistributables in conjunction with, and as part of, the Licensed Product and you and your distributors comply with all other terms of this EULA; and (2) in the manner described in Section 1.4.*Separation of Components. The PRODUCT is licensed as a single product.  Its component parts may not be separated for use on more than one computer.*Single COMPUTER. The PRODUCT is licensed with the COMPUTER as a single integrated product.  The PRODUCT may only be used with the COMPUTER. *Rental. You may not rent or lease the PRODUCT without permission from RF IDeas*Software Transfer. You may permanently transfer all of your rights under this EULA only as part of a sale or transfer of the COMPUTER,provided you retain no copies, you transfer all of the PRODUCT (including all component parts, the media and printed materials, any *Separation of Components. The PRODUCT is licensed as a single product.  Its component parts may not be separated for use onmore than one computer.*Single COMPUTER. The PRODUCT is licensed with the COMPUTER as a single integrated product.  The PRODUCT may only be used with the COMPUTER. *Rental. You may not rent or lease the PRODUCT without permission from RF IDeas.3
4nnupgrades, this EULA and, if applicable, the Certicate(s) of Authenticity), AND the recipient agrees to the terms of this EULA.  If the PRODUCT is an upgrade, any transfer must include all prior versions of the PRODUCT. *Termination. Without prejudice to any other rights, RF IDeas may terminate this EULA if you fail to comply with the terms and conditionsof this EULA.  In such event, you must destroy all copies of the SOFTWARE PORTION OF THE PRODUCT and all of its component parts. 3. UPGRADES.  If the SOFTWARE PORTION OF THE PRODUCT is an upgrade from another product, whether from RF IDeas or another supplier, you may use or transfer the PRODUCT only in conjunction with that upgraded product, unless you destroy the upgraded product.  If the SOFTWARE PORTION OF THE PRODUCT is an upgrade of a RF IDeas product, you now may use that upgraded product  only in accordance with this EULA.  If the SOFTWARE PORTION OF THE PRODUCT is an upgrade of a component of a package of software programs which you licensed as a single product, the SOFTWARE PORTION OF THE PRODUCT may be used and transferred only  as part of that single product package and may not be separated for use on more than one computer.4. OEM COPYRIGHT.  All title and copyrights in and to the PRODUCT (including but not limited to images, photographs, animations, video, audio, music, text and “applets,” incorporated into the PRODUCT), the accompanying printed materials, and any copies of the SOFTWARE PORTION OF THE PRODUCT, are owned by RF IDeas or its suppliers.  The PRODUCT and SOFTWARE PORTION OF THE PRODUCT is protected by copyright laws and international treaty provisions.  You may not copy the printed materials accompanying the PRODUCT.5. DUAL-MEDIA SOFTWARE.  You may receive the SOFTWARE PORTION OF THE PRODUCT in more than one medium. Regardless of the type or size of medium you receive, you may use only one medium that is appropriate for your single computer.  You may not use or install the other medium on another computer.  You may not loan, rent, lease, or otherwise transfer the other medium to another user, except as part of the permanent transfer (as provided above) of the SOFTWARE PORTION OF THE PRODUCT. 6. OEM PRODUCT SUPPORT.  Product support for the product is not provided by RF IDeas or its subsidiaries.  For product support, please refer to the OEM supplies support number provided in the documentation.  Should you have any questions concerning the EULA, or if you desire to contact OEM for any other reason, please refer to the  address provided in the documentation provided.FOR THE LIMITED WARRANTIES AND SPECIAL PROVISIONS PERTAINING TO YOUR PARTICULAR JURISDICTION, PLEASE REFER TO YOUR WARRANTY BOOKLET INCLUDED WITH THIS PACKAGE OR PROVIDED WITH THE SOFTWARE PRODUCT PRINTED MA-TERIALS. Limited Warranty:  RF IDeas warrants to the original buyer of this product, that the hardware and related disk(s) are free of defects in material and workmanship for a period of one year from date of purchase from RF IDeas or from an authorized RF IDeas dealer.  Should the RF IDeas products fail to be in good working order at any time during the one-year period, RF IDeas will, at its option, repair or replace the product at no additional charge, provided that the product has not been abused, misused, repaired or modied.  This warranty shall be limited to repair or replacement and in no event shall RF IDeas be liable for any loss of prot or any commercial or other damages, including but not limited to special, incidental, consequential or other similar claims. No dealer, distributor, company, or person has been authorized to change or add to the terms of this agreement, and RF IDeas will not be bound by any representation to the contrary.  RF IDeas SPECIFICALLY DISCLAIMS ALL OTHER WARRANTIES, EXPRESSED OR IM-PLIED, INCLUDING BUT NOT LIMITED TO IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS OF PURPOSE.  Since some states do not allow such exclusion of limitation of incidental or consequential damages for consumer products, check the statute of the state in which your business resides.  This warranty gives you the specic legal rights in addition to any rights that you have under the laws of the state in which your business resides or operates. Returns:  RF IDeas products which require Limited Warranty service during the warranty period shall be delivered to the nearest authorized dealer or sent directly to RF IDeas at the address below with proof of purchase and a Return Materials Authorization  (RMA) Number provided by RF IDeas Technical Support Dept. Replacement parts or complete boards become the property of RF IDeas   If the returned board or unit is sent by mail, the purchaser agrees to pre-pay the shipping charges and insure the board or unit or assume the risk of loss or damage which may occur in transit.  The purchaser is expected to employ a container equivalent to the original packaging. Copyright:  Copyright by RF IDeas 2011.  All rights reserved.  Reproduction or distribution of this document in whole or in part or in any form is prohibited without express written permission from RF IDeas.Trademarks:  All RF IDeas products are trademarks of RF IDeas.  All other product names or names are trademarks or registered trade-marks of their respective holders.Disclaimer:  This Reference Guide is printed in the U.S.A.  Any resemblance mentioned in the Reference Guide to persons living or dead, or to actual corporations or products is purely coincidental.  RF IDeas believes that the information contained in this manual is correct. However, RF IDeas does not assume any responsibility for the accuracy of the content of this User Manual, nor for any patent infringements or other rights of third parties. RF IDeas reserves the right to make any modications in either product or the manual without giving prior written notication.   CAUTION: Pursuant to Part 15.21 of the FCC Rules, any changes or modications to this product not expressly approved by RF IDeas             might cause harmful interference and void the FCC authorization to operate this product. FCC Compliance StatementFCC ID: M9MPCPROXHUSB100 (HID USB model)                          FCC ID: M9MPCPROXH100 (HID RS-232 model)FCC ID: M9MPCPROXM101 (Indala model)                                      FCC ID: M9MBUPCPROXA100 (AWID) FCC ID: M9MRDR6X8X (Kantech, Indala, Casi-Rusco)                     FCC ID: M9MPCPROXP100 (Pyramid)FCC ID: M9MPCPROXC101 (Casi-Rusco model)                              FCC ID: M9MRDR7P71 (FIPS 201 13.56MHz)FCC ID: M9MRFID1356I100 (MIFARE/iCLASS models)                    FCC ID: M9MRDR7L81 (Legic 13.56MHz)FCC ID: M9MRDR7081 (iCLASS Module based)                               FCC ID: M9MRDR7580 (iCLASS MIFARE & Other 13.56Mhz)FCC ID: M9MRDR7581 (iCLASS MIFARE & Other 13.56MHz)         FCC ID: M9MRDR7081AKF (iCLASS MIFARE & Other 13.56MHz)FCC ID: M9MRDR7081AKE (iCLASS MIFARE & Other 13.56MHz)  FCC ID: M9MRDR75DX (iCLASS MIFARE & Other 13.56MHz)FCC ID: M9MRDR8XX8U (Plus combo model)“Changes to this reader system not expressly approved by RF IDeas will void the User’s authority to operate the equipment.Note:  This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions: (1) This device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation. This product complies with FCC OET Bulletin 65 radiation exposure limits set forth for an uncontrolled environment.The reader may not recognize value cards in the presence of high RF elds. If the current reading is erratic, the user shall take the following step:  Move the equipment from any known transmitters nearby.  For more information contact Tech Support at 866.439.4884.
5Contents2   Chapter 1: The Basics2  Thank You! 6  Wireless Identification Overview7  ID Card Reader System7  pcProx Output Formats 8  pcProx Features8  pcProx Functions8  pcProx Connectors10  USB Readers & Wiegand Converters10  RS-232 Readers & Converters10  System Requirements10  Card Compatibility11  Chapter 2: Getting Started 11  Hardware Installation 11  pcProx Software Installation15  Chapter 3: Configuration15  pcProx Configuration Utility15   Tool Bar 16   Connect Button 17  Disconnect Button17  Open Button18  Save Button 18  Defaults Button19  Flash Button19  About Button20  File Menu20  Connect Menu20  Device Menu21  Navigation Menu21  View Menu21  Help Menu22  pcProx + Section22  Connect Tab26  Data Format Tab29  Delimiters Tab31  Timing Tab33   SDK Tab37  CHUID Tab46  FIPS 201 Card Configuration47  Chapter 4: ASCII Command Protocol47  ASCII Command Overview48  Connect Serial Communications49  Command Structure52  Help Command54  Variable Command58  ACP Error Codes59  Chapter 5: Tips and Troubleshooting59  Troubleshooting60  Precautions61  Appendix62  The pcProx for Password Security  63  Index 64  Other Products and Accessories
6Wireless Identification OverviewpcProx® Activated IdentificationEmployers are more security conscious than ever.  More buildings, machines, systems, and applications require identification information to gain access.  RF IDeas devices allow the building access cards to be used as a digital identifier through out the workplace.pcProx applications include:•CardEnrollment•PC/LANLogOn•CafeteriaPurchases/Vending•MachineAccess•Time/AttendancepcProx technology is based on a contactless interface and is not subject to reliability issues. Our pcProx, AIR ID and Wiegand devices are easily configured to increase security and reliability.   Companies using proximity and/or contactless technology for building access immediately benefit as their employee identification cards can also be used with the proximity/contactless device for additional authentication applications.  Thus, the majority of deployment and enrollment costs are quickly recovered.The diagram on the following page is a high level overview of how the reader works.  The card sends radio signals to the reader and the reader sends these signals back to read the card.  The card data is output by the reader in keystrokes or ASCII characters. This card data can be configured to include delimiters to separate the data.  A list of features, functions, and connectors follows. This reader can be used as a standalone system or seamlessly integrated with other software applications using the optional Software Developer’s Kit (SDK).1The Basics
ID Card Reader SystemOutput FormatsChapter 1   The Basics7
8Features• Readalldatafromproximity/contactlesscards• Readconfiguration• Writeconfigurations• SoftwareDeveloper’sKit/APIcompatibility• Outputindecimalorhexadecimal• UsercontrolsnumberofdigitsoutputFunctions• SoftwareDeveloper’sKit(SDK)USB• SoftwareDeveloper’sKitRS-232• USBKeyboard• RS-232• SerialVirtualCOMConnectors• USBKeyboard• USBVirtualCOMPort• RJ45• PS/2• DB-9RS-232• PowerPlug–2.1mm• PowerPlug–2.5mm• PS/2• DB9–Pin9PowerChapter 1   The Basics
9Connectors Chapter 1   The BasicsOUTPUTCONNECTORSTCard Types We SupportView the list at www.RFIDeas.com
10USB Readers and Wiegand ConvertersThe USB keystroke reader operates in two primary modes:•USBkeyboard.ItreadsthecarddataandsendsitaskeystrokesasiftheusertypedtheIDdata on a keyboard.•Undertheapplicationprogrammerinterface(API)definedinthepcProxSDK.Whenitreadscard data, the active application receives the entire card data.RS-232 Readers and ConvertersThe RS-232, Ethernet, or virtual COM port reader operates in two primary modes:  1. ASCII output device.  In this mode the user card data is read and sent as a decimal or hexadecimal number in ASCII characters.2. API defined in the pcProx SDK.  The device attaches to a computer serial port.  When it reads card data, the active application receives the entire card data.Once the configuration settings are correctly configured and written to flash memory, the device can immediately be deployed.Minimum System Requirements  HARDWARE            Pentium class PC  MEMORY            32 MB RAM  DISK              25 MB hard disk space  I/O               1 available RS-232 or USB Port Operating System          Any operating system that supports  a USB keyboard including      MicrosoftWindows2000,XP,Vista,Linux,Macintosh.Canbe                used for keystroke applicationsNote:  The software does not perform any data validation checking.  The data must be known before it is read to verify its validity.Manufacturer/Vendor Card CompatibilityPlease go to www.RFIDeas.com for specific device part numbers associated to card types.Chapter 1   The Basics
11Hardware InstallationPlug the connector into the workstation’s (or available on any peripheral) open RS-232, USB or Ethernet plug.Place the device next to the monitor, beside the workstation, or where appropriate. The workstation should detect new hardware for USB connections.  Verify the workstation recognizes this connection using the ‘Device Manager’.Verify the correct COM port for RS-232 DB9 connections using the ‘Device Manager.’ When the software is installed, it should recognize these connections in order to configure the appropriate device.  Once the device is configured and written to its flash memory, these settings will not have to be configured again.Software InstallationInstall the device installation program to the Desktop for quick access.  This installer is digitally signed by RF IDeas to authenticate file integrity for your safety .Open the www.RFIDeas.com website and click Support a Software and Downloads.Click pcProxConfig.exe to download the installation utility.  This file is the pcProx installation          program.  Use this icon on the desktop to open the installation program to configure the device once the software is installed.  TheFileDownload–SecurityWarningwindowdisplays.Click SaveintheFileDownload–SecurityWarningwindowtosavetheinstallationprogramtotheDesktop.Note: The browser can be closed, as the configuration software can be run from the location it was saved.2Getting Started
12Click Save in the Save As window to accept the default file name.The configuration software downloads to the appropriate location. Click Run in the Download Complete window to install the configuration software.Follow the prompts to install the configuration software.Chapter 2   Getting Started
13Check pcProxConfig component to install utility and click next.Note: Use Control Panel a Add/Remove Programs to successfully remove the setup program if there is a problem with installation or if this is an upgrade. Reboot and then reinstall the program.Select a destination folder for the utility installation and then click next.Once the installation is complete, click finish to close the Setup Wizard.Chapter 2   Getting Started
14 Once the pcProxConfig utility is installed connect a device to the workstation. Verify the device is connected to the appropriate connector. It is best to configure one device at a time, plug each device in so you know which device is being configured.Now the device can be configured to output the card data in the appropriate format. Chapter 2   Getting Started
15pcProxConfig UtilityThe pcProxConfig configuration utility allows for more delimiters to be added with the card data.Tool BarThe Tool Bar displays the following commands:   Commands           Click to:Connect       Connect to reader of selected interface on connect tab.Disconnect    Disconnect all devicesOpen      Opens a specific configuration into the selected device.Save        Save the configuration as a HWG+ file.Defaults      Reset the device configuration to the factory default settings.Flash       Write configuration into device’s flash memory. Save’s the on screen        settings into device’s flash memory.About      Display the application and library version.If no device is found, the following message displays:3Configuration
16Connect ButtonClick Connect to search for available connected device.Chapter 3   Configuration
17Disconnect ButtonClick Disconnect to disconnect from available connected device.Open ButtonClick Open to load an ASCII .HWG+ file into the device. The following message displays:Chapter 3   Configuration
18Save ButtonThe Save button will allow the user to save their current device data to an ASCII .HWG+ file for later use.Defaults ButtonClick Defaults to set the device’s flash configuration to factory default settings. The following       message will appear for the user to agree or disagree.Chapter 3   Configuration
19Flash ButtonClick the Flash button to write the configuration into the device’s flash memory.About ButtonClick the About button to find software information and version number for the configuration utility.Chapter 3   Configuration
20File MenuThe file menu lists the options for Opening .HWG files and Saving to .HWG files. It also includes the Exit command.Connect MenuThe Connect menu lists the following commands:  Commands        Description Auto Connect on Startup  Check to connect devices automatically on startup Connect      Click to connect device Connect USB     Click to search for USB devices Connect Serial     Click to search for serial devices Connect Ethernet TCP/IP  Click to search for Ethernet TCP/IP devices   Disconnect      Click to disconnect deviceDevice MenuThe Device menu lists the following commands:  Commands        Description Reset Device to Factory Defaults         Click to reset the device to factory defaults  Reset Device to Original Shipping         Resets device to its original shipping configurations Configuration Save Configuration to Original           Click to save a configuration as original shipping Shipping Configuration           configuration. Read Device Configuration from             Click to read the configuration in the device’s flash  Flash Memory                  memory. Write Configuration to Device Flash     Click to write the current configuration to the  Memory                device’s flash memory.  Clone Current Reader Configuration     Click to clone current device configuration to more  to other Devices             devices.Chapter 3   Configuration
21Navigation MenuThe Navigation menu lists the same commands as seen on the utility tabs. (An explanation of each can be found in the tab sections of this manual). View MenuThe View menu allows for the option to change certain visuals on the configuration window.   Commands        Description Show Tool Tip Balloon Help  Check to allow for pop-up balloons upon hovering over menu option Show Text Under Toolbar    Check to allow for text to appear under each toolbar icon  Icons Show Pop-up Warning   Check to enable pop-up warnings on certain actions (by default,  Dialogs                                           selection is set to Yes) Show Confirm Dialog               Check to have a pop-up for confirmation on certain actions Asking Yes/No   Beep on Warnings     Check to allow for beeps Resize Window     Check to allow for resizing of utility windowHelp MenuThe Help menu allows for the option to resize the configuration window.Commands        DescriptionpcProxConfig Manual    Click to be taken to the pcProxConfig manual on the RF IDeas websiteFrom Website          www.RFIDeas.com     Click to open the RF IDeas website. Check Website for      Click to go to the RF IDeas website to check for an update to the Updates        configuration utility. About        Click to display the software name and library versionsChapter 3   Configuration
22pcProx +This section allows for users to choose multiple configurations in the Configuration # drop down menu. The card type drop down menu allows for a selection of  a card type for the configuration. Each configuration (if multiple) can have a separate card type. The High Priority checkbox sets the selected configuration as priority above any others.   Note:  For example, the High Priority checkbox can set priorities for corp 1000 cards or dual frequency  cards. If multiple cards are on the reader the designated High Priority selection will be read first.Connect TabUse this tab to connect to the device.In the Connect tab, the Device List allows for the proper interface to be selected to  connect the devices. Select from the following: USB (Universal Serial Bus)     Scan the USB Bus for readers RS-232 and Virtual COM Ports      Use serial ports RS-232 and virtual COM ports. Serial              devices may slow when scanning a wide port range. Ethernet IP          Connect to an Ethernet reader at the given IP address,              and open a TCP/IP on the given portChapter 3   Configuration
23USB (Universal Serial Bus)This selection will scan USB bus for readers.,RS-232 and Virtual COM Ports     This section scans for RS-232, physical COM port devices, virtual COM port devices, including USB,CDC and PCMCIA devices. It stops after the first USB device is found. The list holds only one serialdevice. Once RS-232 selection has been made, the lower and upper limits of the COM ports to scan need to be set. The default COM ports are set at 1 thru 8. The Default 1..8 button to the right sets the COM ports back to 1 thru 8.Note: Serial devices may slow when scanning a wide port range.Ethernet IP     Connect to an Ethernet reader at the given IP address and open a TCP/IP on the given port.The first, second, third, and fourth byte of the TCP/IP address need to be entered for the interface to connect to the reader. The IP port number will also be required. Note: Ports below 1024 are for sytem use only.Chapter 3   Configuration
24The drop-down menu bar will provide the list of devices found on the USB bus.Output Test AreaThis is the test area for the keystrokes entered by the reader. On serial devices this displays the unsolicited serial port data.The Auto GetID box can be checked for the utility to poll the reader for a card ID every 500ms and displays the result to the right of the box.Chapter 3   Configuration
25The Auto Focus box keeps the cursor in the test area box to capture the keystrokes output by the device. Note: When the Auto Focus box is checked, it is possible that the selection may conflict with the menus and drop downs, due to the fact that the cursor will attempt to move back into the test area.  If this prob-lem arises, simply uncheck the box. The Auto Clear box auto selects all text in the Output Test Area, so that new keystrokes output by the device will replace old text.The Clear button erases all text in the Output Test Area.The Test button (Green Flag) starts the batch file “testarea.bat” or script “testarea” to bring up a users own application to view the readers keystrokes.Chapter 3   Configuration
26Data Format TabUse this tab to configure the bits the device reads from the ID token.Wiegand to Keystroke Data FormatFunction         Description Strip leading parity bit count   Set the device to strip leading parity bits from 0 to 15. Strip trailing parity bit count   Set the device to strip trailing parity bits from 0 to 15.Chapter 3   Configuration
27Function           Description Send FAC         Check to send the Facility/Site (FAC) code. Send FAC as hexadecimal     Check to send this code in hexadecimal. This is set for number         KANTECH 10 proximity cards. Send ID         Check to send the ID portion of the card data from the          device. Send ID as hex number     Check to send the ID portion as a hexadecimal number. ID Field Bit Count        Enter the bit count of ID portion.Function           Description Fixed Length ID / FAC Fields   Click to set the ID / FAC codes to a fixed length. ID Digits         Enter the number of zeros to add to the front the ID data to          create a specific length. FAC Digits         Enter the number of zeros to add to the front of the FAC data          to create a specific length.Chapter 3   Configuration
28Rarely Used Legacy Settings     Function                                        Description Only Read Cards With This Bit  No data is sent from the device unless the bit count is matched. Count         The total bits received from the card must match this bit count,          parity bits included. If checked and 26 is entered in the field, the          device will only respond to 26 bit cards. Display Hex in Lowercase (a-f)  Check to keystroke out lowercase hex (This option is only                     available when Send FAC as hex or Send ID as hex is selected)  Use Numeric Keypad for 0-9  Check to use the European AZERTY keyboard (i.e., keyboard (European)    numerickeypadkeys).NumLockmustbeon. 64 Bit Math On      Check so the device uses a 64 bit binary to decimal          conversion to calculate the card number. This is available for          firmware version 5.6 and above. In previous versions, the          device would only convert 32 bits at a time and concatenate          when larger bit length ID numbers were encountered. Check          this to display the true representation of the number or if the          card is over 32 bits. Reverse Wiegand Bytes    Check to read the card data in a reverse byte order. Use this           feature with MIFARE CSN readers. For 56 bit cards, go to the          ‘Set Key Stroke Data’ tab and set the Bit Count of ID Portion to     56. Reverse Wiegand Bits     Check to reverse the order of Wiegand bits. This is primarily           used for Card Key proximity cards. Invert Wiegand Data     Check if using a legacy application that requires the Wiegand          data to be inverted. Emulate ProxPro      Emulate serial data format to match HID Corp. Prox Pro reader            by sending a 2 byte checksum after the card data.Chapter 3   Configuration
29Delimiters TabUse this tab to configure pre and post data delimiters. A delimiter can also be set between the ID and FAC card data.Click the appropriate keyboard icon to select the pre and post delimiters. Click Insert.Note: Only 3 pre and post delimiters can be configured. If 3 pre-delimiters are set, no post delimiterscan be set.The Scan Code output for the key selected displays above the list of keys.Pre Data Delimiters (ABC)Select from 0 to 3 characters to display prior to sending the card data.FAC/ID Delimiter (:)Select a character to display between the FAC and ID data.Post Data Delimiters (XYZ)Select from 0 to 4 characters to send after the card data is sent. These first three characters areshared between the pre and post string.Chapter 3   Configuration
30Termination Keystroke (T)Select a character to display to signify the keystroke termination.Card Gone Delimiter (GN)Select two character to display once card data has finished keystroking and leaves the desired field.Chapter 3   Configuration
31Timing TabUse this tab to configure the device’s card timing and USB keystroke timing.Card Read TimingFunction           Description Card Data Hold Time      Enter the time the card data remains valid in the device.            The minimum value is 900. This is read in 50 msec            increments. The default is 1,000. Continuous Read, Sends Data Upon  If this is checked, the card data is repeatedly sent. Read            Generally this check box is not checked. If left            unchecked, the card data is only read once. Otherwise,            the card data is continuously sent. Lock-Out Time For Repetitive Reads  This sets how long the device is locked and will not            accept the data of the next card. This is read in 50 msec            increments. The minimum value is 0. The maximum is            12,500.Chapter 3   Configuration
32USB Keyboard Timing  Function                                Description Key Press Time     Enter the length of time the key is held down. The minimum value is 0.        The maximum is 640. The default is 20. Key Release Time     Enter the time delay between keystrokes. The minimum value is 0.        The maximum is 640. The default is 20.Chapter 3   Configuration
33SDK TabUse this tab to configure the Software Developer’s Kit (SDK) functions, as well as enable and disable keystroking.Software Developers Kit          Function                                                        Description Disable Keystrokes for SDK  Check to disable keystroking. When keystroking or unsolicited   (Halt Keyboard Send)    serial out is disabled, all card data must be read via the SDK            functions.    LEDFunction           Description Auto         SelectthistomakethedevicesettheLEDcolor. Off          SelectthistosettheLEDtooff Red     SelectthistosettheLEDcolortored. Green    SelectthistosettheLEDcolortogreen. Amber        Select this to set the color to amber.Chapter 3   Configuration
34Logical Unit IDA user defined 16 bit Logic Unit ID to identify one device from another. BeeperFunction           Description Enable Beep on Card Read       Check this to set the device to beep when a card is read. Beep Now          Press to listen to the beep the reader will provide when in        use.  Long Beep(s)         Check the box to configure a long beep of 375 msec. By              default the beep is set to a short beep of 125 msecThenumbervalueinputareatotherightoftheLongBeep(s)boxisdesignatedforthenumberofbeeps to produce when the device is in use.OEM Converter BoardFunction           Description Beeper On (Output Active Low)    Check this to turn the device beeper on. Relay On          Check this to activate the OEM board.Chapter 3   Configuration
35Card ID       Function           Description GETID     Click while scanning a card over the device. The ID displays under the      button. This returns 64 bits maximum. GETID (32)     Click while scanning a card over the device. The ID displays under the      button. This returns 255 bits maximum. GetQueuedID   Click to display the last card data read. This returns 255 bits maximum. Clear Lockout   Check to clear the time remaining to allow the device to read the next      card immediately. Clear UID     If clearUID is set, the card and the over run counters will be cleared for      the next read.      If clearHold is set, the reader will be ready to read another card      immediately.GETID Data DisplayTheMostSignificantByteisfirst–E0.TheLeastSignificantByteislast–34.GETID(32) Data DisplayChapter 3   Configuration
36GetQueuedID Data DisplayHH:MM:SSdisplays–00:00:06Chapter 3   Configuration
37CHUID TabThis tab allows manipulation of all fields on the Federal Information Processing Standard (FIPS) 201,or proximity cards. Use the red buttons to configure additional fields. The fields can be moved to change the order displayed in the binary bit pattern display.Function           Description Define Fields             Click to select the number of source bits to define the fields. The                           correct type must be selected to allow for all card bits to be manipulated. Enable               Check to enable the highlighted field. This allows the delimiters to be                  output and the corresponding card field to be processed and output. All                  green fields are enabled. All red fields are disabled. Keyboard                   Click to select key delimiters that are stored in the device’s flash memory     thatprecedecarddataoutput.Eachfieldmayhavefrom0–14key                strokes.  Clear                Click to clear keystrokes preceding the card data. Decimal               Click to display the card field in decimal format. Hex                 Click to display the card field as a base 16 number in uppercase HEX    0–9andA–F. BCD w/ Parity              Displays the card data in binary coded decimal, where each 5 bits                 represent 1, 2, 4, 8, and parity. FASCN data is always odd parity.Chapter 3   Configuration
38Function           Description Advanced       Click to display the binary bit pattern. GetID       Click to display the binary bit pattern captured from the card. Start Bit       Enter a number to define the left most significant starting bit for the          field. Bits         Enter the number of bits to add to the Start Bit to define the range of bits          in the field. Digits       This is the number of digits that will display in a selected field. Up         Click to move the highlighted field up one position. Down        Click to move the highlighted field down one position.Advanced ButtonThis displays the bit ranges of the card.Click each field button to display the location of the card binary data. In the example below, thePersonal ID starts at bit 111, is 50 bits long, and is 10 digits. The Bit Range is 111 .. 160 and the cardbit pattern is highlighted. This output format is displayed in binary coded decimal with parity (BCD with Parity). This is the 245 bit configuration. If any additional keystrokes were entered to precede the card data, click Clear to remove them.Note: The message that displays the number of bytes used and how much room for keystrokesabove the Advanced button is determined by the device’s flash memory. In this example theconfiguration is: “Keystrokes: 8 of 32 bytes used. Room for 14 keystrokes.” Every field is 15keystrokes maximum. All fields share 96 bytes.The Bit Range that displays to the left of the binary bit pattern is the Start Bit field total + theBitsfieldtotal–1.Chapter 3   Configuration
39Get IDClick GetID and scan the card to display the output format of the FIPS 201 and proximity card and the interpretation display of the card data. Click GetID to define the fields to set up the device.In this example, The Agency data starts at bit 11, is 16 bits long, and is 5 digits. The location of theagency data is highlighted in the binary bit pattern. The Bit Range is 6 .. 25.The actual card data displays in blue below the binary bit pattern layout. The interpretation of the card data displays in red in the text field. The card data in blue will always be the same. The card data in red changes based on configuration settings flashed to the device.Note: Click Clear to delete the red card data in the text field. A confirmation message will display.Chapter 3   Configuration
40The Start Bit changes the actual location of the selected field on the binary bit pattern.Note: The ‘????’ that display to the right of the Digits field indicate the BCD parity is incorrect. Verifythe correct field is selected.Chapter 3   Configuration
41Change Fields ConfigurationClick on the appropriate field button and uncheck Enable to remove field data from being displayed.In the example below, the Agency, Personal ID, and Expiration Date fields have been removed.Additional function keys display to configure more fields.Chapter 3   Configuration
42Assign Preceding KeystrokesIf Enable is checked for a field, specific keystrokes can be assigned to precede card data output.Note: The Scan Code output for the key selected displays above the list of keys.Click Clear to remove all preceding keystrokes as appropriate.Chapter 3   Configuration
43Each single keystroke entered to precede card data equals 1 byte of memory.Chapter 3   Configuration
44If any special character is selected with a keystroke, this equals 2 bytes of memory.Chapter 3   Configuration
45If all the keystrokes have been assigned to the fields, the following message displays:Depending on the active document/window, additional functionality can be assigned to a field. Forexample, if the card data is read in OpenOffice, the Note feature can also be assigned.Select the appropriate field. Click the keyboard icon. Check Left Control. Check Left Alt. Click n.Click Insert. Click Flash to write this configuration to flash memory. Verify the active window isOpenOffice. Scan the card. The Notes function opens when the card is read.The value assigned to the function key in the active document/window determines the output.Note: This configuration utility creates a ComSpecPort.txt file and saves to the default directory. Thisfile can be opened and deleted at will.Chapter 3   Configuration
46FIPS 201 Card ConfigurationIn order to configure a FIPS 201 card:•ClickAdvanced to display the card data in the binary bit pattern to determine bit length andformat•ClickGetID and present the card to the reader•Definethefieldstomatchthespecificoutput•Configureanyadditionalfieldsasappropriate•FlashtheconfigurationtomemoryThe Advanced button displays:•Startbitlocation•Numberofbitsforaspecificfield•Numberofdigitsforthefield•Locationofthefieldwithinthe245bitrangeChapter 3   Configuration
47ASCII OverviewASCIICommandProtocol(ACP)allowstheusertotalkdirectlytothedevicewithoutaDLLorspecialapplication. The serial Prox communicates using ASCII commands. Printable ASCII commands at9600 baud, no parity 1 stop bit, and no echo, can be sent to the device.Note: USB devices that are virtual COM port do not need the baud rate set. The input is buffered bythedeviceandexecutedwhenacarriagereturn(CR)orlinefeedlinefeed(LF)istyped.Theunit then parses the command and performs the operation, and displays the results or errorcode.“\r\nRFIDeas>”where\rrepresentsaCRand\nrepresentsaLFthatdisplaysonthecommand line.Allcommandsbeginwiththeprefixrfid:andendwithaReturnkey,CRorLF.Determine the COM PortWindowsUse device manager to display the COM ports. Open the serial COM port. If it is a CDC virtual port,open the newly installed device that was created.LinuxMostLinuxdistributionsincludeMinicom.Downloadputty(www.putty.org)tocommunicatewiththe serial device if Minicom is not available.AftertheUSBCDCdeviceisenumeratedontheLinuxmachineadeviceofeither/dev/ttyACM0or/dev/ttyACM1 is found in the /dev/directory. Minicom users may have to create a symbolic link from/dev/ttyACM0 to /dev/modem using the command ln -s /dev//tty/ACMO /dev/modem orln -s /dev/ttyACM1 /dev/modem.Mac OS XThe /dev/cu.usbmodemfa211 device is found on a Mac OS X . Use putty to communicate with thisdevice.4ASCII Command Protocol
48Connect Serial Communications ProgramOpen putty.exe. Click Connection a Serial and set the Speed (baud) to 9600, Data bits to 8, Stopbits to 1, and Parity to None. Flow control is not needed as there is no software or hardwarehandshaking.Click Session.Note: Use Hyper Terminal instead of putty with the XP operating system.Chapter 4   ASCII Command Protocol
49Highlight the appropriate session. Click Save. Click Apply.Putty opens. Type rfid:help and press Enter. The Help command output displays. The complete listof Help command output is found in this section of the pcProx and AIR ID Enroll Configuration UserManual.Command StructureCommands are not case sensitive. Characters assigned to variables are case sensitive.· All commands begin with a prefix string followed by one or more token strings with a perioddelimiter character between multiple tokens.·FunctionsmustendwithaCRorLF.· Variables can be assigned a value with an equal sign followed by the value or queried with aquestion mark.·AnycontrolcharactersotherthanCR,LF,andbackspaceterminatethecommand.· The Escape key cancels a command.The general syntax is:PREFIXTOKEN{DELIMITERTOKEN}{{=Value}|{?}}The prefix string is rfid:Chapter 4   ASCII Command Protocol
50Command structure falls into one of three groups:1. Perform a function.2. Assign a variable.3. Query a variable.Perform a FunctionA function performs an operation that may or may not display any results. A function may not bequeried. An example of a function is to write the variable settings to flash memory usingrfid:cfg.write CR.Certain functions that display a value or series of values display the string between curly braces foreasy parsing. For example, the rfid:qid function output displays:{0x00BB,1,0x0000,80;0x000000801CD1931B2F14}Assign a VariableThere are three types of variables:1. Boolean2. Integer3. CharacterExamples of Boolean Assignmentsrfid:op.beep=0rfid:op.beep=truerfid:op.beep=Falserfid:op.beep=FExamples o f Integer Assignmentrfid:out.led=0003rfid:out.led=3Examples of Character Assignmentrfid:Delim.Chr.fac=’:’CRrfid:Delim.Chr.fac=’x3a’CRChapter 4   ASCII Command Protocol
51Query a VariableQuery a single variable to display its current value.· Booleans display as true or false.· Integers display as 0..255 with leading zero suppression.· Characters display as single quoted printable ASCII characters in the range 0x20..0x7E.· Values from 0x00 .. 0x1F and 0x7F..0xFF will be with a leading backslash lowercase x and thetwo digit upper case hex number.· The output of the variable displays between curly braces.For example: RF IDeas>rfid:out.led?   {3}Variables are set and stored in RAM and are lost when the utility is closed. Use the cfg.write functionto write the RAM configuration to flash memory. Use the cfg.read function to read the flash memory.Chapter 4   ASCII Command Protocol
52Help CommandHelp displays the commands followed by its data type and expected syntax. The table below displaysthe Help command output. The functions display in blue.Help Command Summaryrfid:cfg.readThis function tells the device to read the flash memory to RAM.rfid:cfg.resetThis function resets the flash memory to the factory settings.rfid:cfg.writeThis function tells the device to write the RAM to flash memory.Chapter 4   ASCII Command Protocol
53rfid:dev.partThis function displays the part number of the devicerfid: varThis function tells the device to display the variable command output. This is similar to a .HWG file.QIDThe rfid:qid function exists in four forms:•rfid:qid(Function)•rfid:qid.hold(Function)•rfid:qid.id(Function)•rfid:qid.id.hold(Function)Each quid function returns the same queued ID. The last 3 items control what is cleared after thefunction displays the output. The top line below is an example output string. The bottom line displayshow this example is formatted.EXAMPLEOutputString: {0x1000,2,0x0000,80;0x000000801DD1910B2F04}FORMAT of Output String:   {AGE,OVERRUN,LOCKOUTTIME,BITCOUNT;ID}AGE is the time in 48ms ticks that counts how long ago a card was scanned. This value count from 0through 65535 displays in hex with “0x” hex notation. After 52.5 minutes the counter maxes out at65535.Thecarddataaboveshowsthiscardwasread4,096(0x1000hex)x.048=196.608seconds which equals 3 minutes and 16 seconds. The AGE counts until 65,535 (0xFFFF hex) and then maxes out. It will not roll over to zero. Use the qid.id function to clear the age counter.OVERRUN is a counter from 0 through 255 displaying the number of cards scanned and over writesunread buffer contents. The device buffers one card. When a second card is read, the first card datais lost and the counter is set to one, meaning one card has overrun the buffer. The card data exampleabove displays that 2 cards were read and the data from those cards was not transferred beforereading this card.LOCKOUTTIME is the number of 48ms ticks remaining until another card can be scanned. The carddata above displays 10 times .048 which equals .48 seconds until the next card can be read.BIT COUNT is the number of bits that follow 26 .. 255 and display as hex after the ‘;’. Notice the use of commas and semicolons. The card data example above shows that the ID contains 80 bits.ID The card data above has 80 bits and is 0x000000801DD1910B2F04.QID.holdThis reads the card data as above and resets the hold lockout timer. Once the card data displays, asecond card can be read immediately after without waiting for the lock out time period to expire.Chapter 4   ASCII Command Protocol
54QID.idThis reads the card data and also clears the age,overrun, and bit count after the values display.QID.id.holdThis reads the card data and clears the ID variables and hold timer like both combined functionsabove.SDK CommandThrfid:op.sdk=Falsetellsthedevicetodisplaycarddataeverytimeacardisscanned.Iftrue,nocarddata displays. In the SDK mode, all keystroke or serial send data can be inhibited. The card data canbe read using function rfid:qid.Variable CommandThe var command displays all variables. The command output can be captured and played back intothe device. There must be a delay of several milliseconds after each character or the pcProx serialinput buffer overflows.Chapter 4   ASCII Command Protocol
55These five variables work together to display leading and trailing (pre and post) card data delimiters.1.rfid:chr.1=’\x00’2.rfid:chr.2=’\x00’3.rfid:chr.3=’\x00’4.rfid:chr.count.lead=05.rfid:chr.count.trail=0The first three commands identify the pre delimiter characters that can display. Three characters maybe divided up as pre and/or post delimiters. Count.lead identifies how many of the three characters(chr.1 .. chr.3) display before the card data. For example, if count.lead is set to 1, only one characterdisplays before the card data and chr.2 and chr.3 can be set as post delimiters. Then count.trail canhave a value of 0, 1, or 2. If count.lead is 2, chr.1 and chr.2 are set as leading delimiters. Then onlychr.3 can be set as a trailing delimiter. The same character can not be used for both a leading andtrailing delimiter.rfid:chr.eol=’\x0D’ThiscommandsendstheEndOfLine(EOL)characterattheendofthecarddata.Typicallyacarriage return (CR) (0x0D) is used.rfid:chr.fac=’:’This command sets a delimiter between the FAC and card data.rfid:chr.gone.1=’\x0A’ and rfid:chr.gone.2=’@’These commands prompt the device to send the characters ‘x0A’ and ‘@’ when the ID card isremoved if they are not ‘00’.rfid:cmd.echo=TrueThis command echoes user input when true and controls if backspace sends a space, backspace,space to erase the last character typed. If false, it is turned off for computer control. This value canbe written to flash memory using cfg.write. It defaults to true on cfg.reset.rfid:cmd.prompt=TrueThis command displays the prompt when true. If false, the prompt does not display. This value can bewritten to flash memory using cfg.write. It defaults to true on cfg.reset.rfid:dev.luid=0x1234This command sets the logical unit ID. A user-defined 2 byte value to identify this unit.rfid:disp.64bit=FalseThis command uses 64 bit math to computer 64 bit decimal digits. This should always be kept on. Iftrue, it uses 64 bit math.rfid:disp.fac.digits=3This command truncates or sets the FAC display leading zero.Chapter 4   ASCII Command Protocol
56rfid:disp.fac.hex=FalseThis command sends the FAC code in hex when true. If false, the FAC code is sent in decimal.rfid:disp.fac.send=FalseThis command sends the FAC code if true. If false, the FAC code does not display.rfid:disp.fac.strip=FalseThis command separates the FAC from the card data when true so it can be independently formattedfor display. If false, the FAC code is not separated from the card data.rfid:disp.id.digits=16This command sets the digits so the left most significant digits will be truncated. For example, if thecarddatais1234andid.digits=3,thenonly234displays.Ifthecarddata=8formatsthedisplaywidth by truncating digits or adding leading zeros.rfid:disp.id.hex=FalseThis command displays the card data as hexadecimal when true. If false, the card data displays asdecimal.rfid:op.beep=TrueThis command sets the device to beep on a successful card read when true. If false, the device willnot beep even if the card is successfully read.rfid:op.cont=FalseThis command sets the device to continuously read when true. This tells the device to read the samecard data over and over while the card is on the device. If false, the device only sends the card dataonce.rfid:op.sdk=FalseThis command stops the device from displaying the card data when true, so the qid or SDK API callmust be used to get the card data. When true the device will send the data via keystrokes or serialdepending on device type/model.rfid:out.beep=FalseThis command makes the device beep when true. If false, the device will not beep. This is onlyavailable on OEM converter boards.Chapter 4   ASCII Command Protocol
57rfid:out.led=255ThiscommandsetsthevariableandalsosetstheoutputLEDcolorinRAM.Usecf.writetowritethischange to flash memory to persist across power cycles.               LED Value                           Description0                      OFF1                     RED2                  GREEN3                  AMBER4..254                Reserved   255                Controlled by the deviceRfid.out.relay= TrueThis command sets the output driver to ON (active low) when true. This is only available on OEMconverter boards.rfid:time.hold=20This command sets how long in 48ms ticks the data is held for the active ID. This also controls howlongthedevicekeepstheLEDgreenin48msecticks.Thedefaulttimeis20*0.048=0.960seconds.Note: The quid.hold resets the internal timer this value initializes.rfid:time.lo=24This command sets how long in 48ms ticks the card device has to wait for no card in the RF field tobegin accepting new card data. This prevents the same card data from being read over and over. Ifop.contistruethisvaluehasnoeffect.Thedefaulttimeis24*0.048=1.15seconds.Note: The quid.hold resets the internal timer this value initializes, so that a new card can be read assoon as the data is transferred to the host computer.rfid:wieg.id.bits=80This command sets byte reversal and also defines the FAC bit size.rfid:wieg.inv.bits=TrueThis command sets all ones to become zero in the Wiegand data. If false, all zeros are set to becomea one.rfid:wieg.qual=FalseThis command sets card reading filter to off. If true, card reading filter is on. This is related to the nextcommand,.qual.bits=80.rfid:wieg.qual.bits=80This command sets the device to read only cards with this many bits. All other size cards are filteredout.Chapter 4   ASCII Command Protocol
58rfid:wieg.rev.bits=FalseThis command does not reverse all bits. If true, the least significant bits are swapped with the mostsignificant bits.rfid:wieg.rev.bytes=FalseThis command does not reverse all the bytes in the id.bits size field. If true, all bytes are reversed.rfid:wieg.strip.lead.bits=1This command strips 0 .. 15 bits from the most significant bits.rfid:wieg.strip.trail.bits=1This command strips 0 .. 15 bits from the least significant bits.ACP Error Codes          Value     Display String       Description 1  {Error#1}  Illegalcommand.WrongorMissingPrefix(rfid:). 2  {Error#2}  Inputbufferexceeded.Toomanycharacterweretyped      withoutaCRorLF. 3  {Error#3}  Illegaloperation,suchastryingtoqueryorassigna            variable to a function or trying to use a variable as a             function. 4  {Error#4}  RangeError.Thevalueassignedtothevariabledoesnot            make sense for its data type, such as try to assign 257 to              a byte value.Chapter 4   ASCII Command Protocol
59TroubleshootingIf the device is not working or the following error message displays:1.  Check to be sure the device is plugged into the USB or RS-232 port. When the workstation isonandnocardisbeingread,theLEDisred.AvalidproximitycardcausestheLEDtoturngreen, provided the configuration is not set to only read certain bit lengths.2.  Only one COM port application can own the RS-232 port at a time. Make sure there is notanother COM port application running. This prevents our software from seeing the device.3.  Verify the correct model and the software configuration screen agrees with the deviceattached.4.  Verify the port agrees with the workstation connector.5.   If the device still does not work, unplug it, remove ‘General USB Device’ using Windows‘Control Panel’ a ‘Add/Remove’ Hardware. Then reboot the workstation. When theworkstation boots up, re-attach the device USB and the OS should re-install the Windowsdriver automatically.Change the release time to 1000 on the Timing tab for USB keystrokes to slow down the device.Open Notepad or Word and swipe a card to display the card data to see the actions of any non-printable symbols.If the device does not read the card, contact the card manufacturer/vendor to verify that the card type is compatible with the device model.5Tips and Troubleshooting
60PrecautionsDo not mount the device directly on a metal surface. This could interfere with the RF signal and theoperation of the device.The device may not recognize valid cards in the presence of high RF fields. If current readings areerratic, take the following step:· Move the equipment from any known transmitters nearby.Contact Technical Support at 866.439.4884 for more information.Chapter 5   Tips and Troubleshooting
61AppendixStandard 26 Bit Format StructureThere are several bits constructed together that comprise data sent from the proximity card to thedevice. There are numerous bit formats and lengths for proximity cards. The most popular is a 26 bitcard format. The typical layout for this format is 24 bits of usable information as the first and last areparity bits to ensure data integrity.The 26 bit format consists of 255 possible facility codes. Within each facility code there is a total of65,535 unique card numbers.The standard 26 bit Wiegand format is H10301. It is binary encoded data. The format consists of 2parity bits, 8 bit facility code (F) and 16 bit card number fields (B). This format displays below.PFFFFFFFFBBBBBBBBBBBBBBBBPEXXXXXXXXXXXX..........................XXXXXXXXXXXXOBit CodingP=ParityO=OddParityE=EvenParityX=ParitymaskF=Facilitycode,range=0to255B=CardNumber,range=0to65,535In general, the 26 bit format is the industry standard format. Primary benefits of this include:•Openformat•Convenienttoorder•UniversalaccesscontrolpanelacceptanceThe sale of this format is not limited to any one company yet the range of card numbers available inthis format is limited. There is a potential for card numbers to be duplicated.Please go to www.RFIDeas.com and follow the Support a Learning Center a Proximity CardFormats link for more details. The card manufacturer may also have additional details about the cardformat.Chapter 5   Tips and Troubleshooting
62Use the pcProx Device for Password SecurityComplex PasswordsIt is possible with certain limitations, to use the proximity token as a password for an application oroperating system log on. The unique card bit-stream converted to either decimal or hexadecimalbecomes the entire or a portion of the password. Enroll this card data to the password of theoperating system application for the user.Since the proximity token has no read/write memory there is no way go change this or write alphanumeric characters such as a user name to the proximity token. Some examples are shown below. Please see RF IDeas AIR ID Playback Starter Kit or call the Sales Department if this capability is needed.Several companies have adopted a policy that requires users to change their password every xxnumber of days to increase security. The PIN is the portion of the password the user changes everyxx number of days. Since the card data is completely numeric, any alpha and upper/lower case letterconstraints are handled in the user supplied PIN.A two-factor authentication system is made up of:1. Card ID data2. Personal Identification Number (PIN)The device may be configured to allow operation under either a one or two-factor authenticationsystem.One-FactorIn a one-factor system, the user simply scans the ID card. The device may be configured to add TABkeystrokes ahead of the data as well as a TAB or ENTER keystroke after the card data.Two-FactorThe two-factor approach is especially useful when insisting on password construction rules or periodic changing of passwords.In a two-factor system, the user may enter the PIN either before or after the card data. If the useradds the PIN before the card data, the device may be configured to append the ENTER keystroke.Pre and Post CharactersThere are some additional measures that can be taken to make it more difficult for unauthorized users to reproduce the password.Add additional keystroke characters to the card information that are difficult to re-produce whileconfiguring the data. These additional characters are labeled special1, special2, and special3 on theDelimeters character menu selections.Chapter 5   Tips and Troubleshooting
IndexIndex63AAIR ID Playback          62, 64ACP Error Codes           58ASCII          6, 7, 10, 17, 18, 47Assign Preceding Keystrokes          42Auto Clear          25Auto Correct          20Auto Focus          25Auto GetID          24BBeep          21Beeper          34Button Bar          15     About        15, 16     Connect          15, 16             Defaults          15, 18             Disconnect          15, 17  Flash           15, 19            Open          15, 17             Save          15, 18           CCard Compatibility          10Card Data Hold          31Change Fields Configuration          41Clear Button          25Clone Configuration          20COM          11, 22-23, 59 Complex Passwords          62Connectors          9Continuous Read          31         DData Delimiters          29-30, 37DeviceList22EEmulate Prox Pro          28Ethernet          20, 22, 23FFAC          27-29 FAC Digits          27                 Factory Defaults          20FIPS 201          37, 39, 46GGETID          35, 38-39GetQueuedID          35   H.HWG          15, 17-18, 20IID Digits          27KKey Press Time          32Key Release Time          32LLED33,57,59LegacySettings28Lock-OutTime31LogicalUnitID34MManufacturer Card Compatibility          (See Card Compatibility)MIFARE          28          Minimum System Requirements          32OOEM          34One-Factor Security          62Output Test Area          24 PpcProxConfig Manual          21RRS-232          8-11, 22-23, 59           SSDK          6, 7, 10, 33Serial          20Shipping Configuration          20Start Bit          28, 40TTermination Keystroke          30Test Button          25Tool Tip Balloon          21Two-Factor Security          62UUSB          8-11, 20, 22-23, 31-32, 47WWiegand          10, 26, 28Wiegand Bits          28 Wiegand Bytes          28Wiegand to Keystroke Data          26
64Other Products & AccessoriesSoftware Developer’s KitAllows independent developer’s to use their application to read proximity access badge Read ID data of more than 1 billion cards in the fieldPVC Label Proximity CardCredit card size with paper release liner, 500 cards per boxComplete selection of various manufacturers proximity cards, labels and key fobs.  Marked with data code and ID number, available in several Wiegand formatsAIR ID Read/Write Contactless SDK Reads and writes directly to the smart cardsAIR ID Writer and PlaybackDesktop read-only for  iCLASSandNXPandsmartcardsAIR ID Playback Starter KitPlays back card sector data in ASCII or keystrokespcProx Sonar Presence detector configured as a keyboardPS/2 to USB Power Tap Powers a USB RF IDeas device from a PS/2 portMounting Brackets Further adjust the standard mounting of the device angle
65RF IDeas Inc.© 2011 RF IDeas. All rights reserved. Specifications subject to change without notice. Windows,Macintosh,Solaris,SunRayandLinuxaretrademarksoftheirrespectivecompanies.All other trademarks, service marks and product or service names are property of their respective owners.Mention of third-party products is for informational purposes only and constitutes neither an endorsement nor a recommendation. RF IDeas assumes no responsibility with regard to the performance or use of these products. All understandings, agreements, or warranties, if any, take place directly between the vendors and the prospective users.Please feel free to call, e-mail or visit our web site for a full list of applications, products, configuration options, supported cards and form factor specifications. Our web site includes application videos, support materials, case studies anddetailed information about our product line.Every effort has been made to ensure that the information in this manual is accurate. RF IDeas is not responsible for printing or clerical errors.

Navigation menu