E*Tag ® RFID System e*Tag ® Host Preview. What is e*Tag ® Host? A graphic user interface designed to demonstrate the commands and responses available.

Slides:



Advertisements
Similar presentations
How to Create a Local Collection
Advertisements

Secure File Transfer Protocol (SFTP) With Secure Copy (SC) What is a Secure File Transfer Protocol with Secure Copy???
Unified Communications (UC) Quick Reference Guide USING YOUR UC CLIENT This guide is designed to provide you with a quick overview of the Unified Communications.
IPS of Boston Checks On Demand! ® Welcome! To navigate this presentation, first click in this window, then use the arrow keys on your keyboard. Welcome!
SECURA KEY RK-XRM PROXIMITY STATION RS-485 NETWORK.
Micro Control Solutions Stability System II rev. 6.4
Recruitment Booster.
MASTER QUOTE OVERVIEW.
PowerPoint ® Presentation Chapter 7 LonWorks Network Programming LonWorks Network Programming Network Variable Bindings Device Commissioning.
Filtering and Security By Mohammad Shanehsaz June 2004.
NFC Forum Type 2 Tag Platform Operations with the TRF7970A
With Microsoft Excel 2007 Comprehensive 1e© 2008 Pearson Prentice Hall1 PowerPoint Presentation to Accompany GO! with Microsoft ® Excel 2007 Comprehensive.
Jewelry Inventory Management Software Your Logo Here Welcome to a demonstration of Del Mar Data Systems Jewelry Inventory Management.
Gateplus Time Attendance and Access Control System.
Jewelry Inventory Management Software
Copyright © 2013 FingerTec Worldwide Sdn.Bhd. All rights reserved.
6 February LAN-50/500 Ethernet Communication.
System Components Hardware overview for Apollo ACS.
10 March Setup Users. 10 March Setup Users Window Allows you to perform several user tasks –Enroll users –Enable/disable users –Set user access.
Using TRF7970A USB EVM with GUI for NFC Demonstration Operations
MCTS GUIDE TO MICROSOFT WINDOWS 7 Chapter 14 Remote Access.
» Explain the way that electronic mail ( ) works » Configure an client » Identify message components » Create and send messages.
Lenel OnGuard and Bioscrypt V-Smart
Microsoft Access Database software. What is a database? … a database is an organized collection of data. A collection of data of similar information compiled.
Tapit Call Accounting software for the 21st Century Copyright Trisys, Inc Trisys, Inc 215 Ridgedale Avenue Florham Park, NJ (973)
RemoteDrive. OVERVIEW OVERVIEW The RemoteDrive is a special software running on Windows TM and controlling the devices manufactured by Elettronica Santerno.
MCTS Guide to Microsoft Windows Server 2008 Applications Infrastructure Configuration (Exam # ) Chapter Two Deploying Windows Servers.
Defining Styles and Automatically Creating Table of Contents and Indexes Word Processing 4.03.
O2D EIP through Micrologix Requirements O2D must have firmware 1047 or higher for Ethernet IP communication Object Recognition Software version.
ArtClinica Address: 1175 Marlkress Rd, #2632, Cherry Hill, NJ 08034, USAPhone: Fax: ARTClinica.
1 Lesson 6 Exploring Microsoft Office 2007 Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition Morrison / Wells.
10 February Doors Software Overview. 10 February This presentation is an overview of the basic fundamentals of the Doors software. –Host computer.
Ensure that the Field Day Call Sign is correct.
Introducing Dreamweaver MX 2004
Tutorial 1 Getting Started with Adobe Dreamweaver CS3
1 Access Lesson 5 Creating and Modifying Reports Microsoft Office 2010 Introductory.
WCR 12/2002.
RFid Technology TELE 480 Presentation. What is RFid? RFid is an ADC technology that uses radio- frequency waves to transfer data between a reader and.
Using ISO tags for Authentication Eddie LaCost Embedded RF.
XP New Perspectives on Browser and Basics Tutorial 1 1 Browser and Basics Tutorial 1.
RPTCS Automatic Transfer Control System Low and Medium Voltage Power Transfer Control.
Ensure that the Field Day Call Sign is correct.
ProCal V4.6x New Edition Features USB Auto Connect.
Connecting to a Network Lesson 5. Objectives Understand the OSI Reference Model and its relationship to Windows 7 networking Install and configure networking.
Specview 32 Release 2.5 Enhancements
EVCRS OVERVIEW EVCRS is an application designed to allow collision reports to be completed, submitted and processed electronically EVCRS is wizard based.
MCTS Guide to Microsoft Windows Server 2008 Applications Infrastructure Configuration (Exam # ) Chapter Four Windows Server 2008 Remote Desktop Services,
Computer Literacy BASICS: A Comprehensive Guide to IC 3, 5 th Edition Lesson 24 Managing and Reporting Database Information 1 Morrison / Wells / Ruffolo.
Create Forms Lesson 5. Objectives Software Orientation The Forms group (below) is located on the Create tab in the Ribbon and can be used to create a.
Key Applications Module Lesson 21 — Access Essentials
Submitted By: A.Anjaneyulu INTRODUCTION Near Field Communication (NFC) is based on a short-range wireless connectivity, designed for.
Microsoft Access 2010 Chapter 10 Administering a Database System.
1 PanelView ™ 300 Micro & MicroLogix ™ Lab 1. 2 Today you will receive training on the NEW PanelView 300 Micro operator terminal and the NEW version of.
Networking in Linux. ♦ Introduction A computer network is defined as a number of systems that are connected to each other and exchange information across.
OCS Stand Alone Print and Time Vend. Stand Alone Software Features - Print vending to local card reader. - Print vending to accounts which can be centralized.
Basic Apple Configurator Preferences. Apple Configurator  Preferences…
Configuring Network Connectivity Lesson 7. Skills Matrix Technology SkillObjective DomainObjective # Using the Network and Sharing Center Use the Network.
Chapter 10 Creating a Template for an Online Form Microsoft Word 2013.
Cscape EnvisionFX Horner APG, LLC March 7, EnvisionFX - What Does it Do? Graphical interface allows easy transfers of data to and from the PC and.
Security Device using RFID Reader Alex Gerard & Joe Nevin.
AIDC Technologies Features & Standards ISO ISO LEGIC RF Generic ISO15693 & ISO14443A UID Read-only Legic Prime technology full R&W (non ISO)
Sem 2v2 Chapter 5 Router Startup and Setup. A router initializes by loading the bootstrap, the operating system, and a configuration file. If the router.
©Contrinex JDC PPT_HF_RWMTAGCommands HF RWM and TAG Commands J.-D. Chatelain HF RWM Commands HF TAG Commands.
Interactions & Automations
Operating Systems Concepts 1/e Ruth Watson Chapter 1 Chapter 1 Introduction to Operating Systems Ruth Watson.
LINCWorks Mesh Networking User Guide. This user guide will give a brief overview of mesh networking followed by step by step instructions for configuring.
Company LOGO Sage CRM – Marketing Sage CRM 7.3 provides a new integration with MailChimp for marketing campaigns. In this.
COMPARISON I CODE SLI versus I CODE1. 2 Semiconductors Content  Overview, Block Diagram and System Configuration  Memory Organisation (Write Access.
Reporting An In-Depth Guide.
message manager 1-Way campaign
Presentation transcript:

e*Tag ® RFID System e*Tag ® Host Preview

What is e*Tag ® Host? A graphic user interface designed to demonstrate the commands and responses available in e*Tag ® reader/writers. e*Tag ® Host helps systems integrators and software designers to evaluate the capabilities of e*Tag ® RFID systems.

Launch e*Tag Host from desktop.

Click on “Version” to see reader information. This is also an easy way to confirm that you are communicating with the reader.

Click on “Setup” to see how the reader is currently set to function.

Select the “Tag-it” tab if you are working with original T.I. Tag-it transponders and your reader supports this mode.

Select the “ISO/IEC 15693” tab if you are working with ISO compliant transponders.

Wiegand Mode Wiegand Communications is commonly used for security access control applications. When placed in a Wiegand mode e*Tag ® readers will automatically read any transponders that enter the field and transmit card data to a host.

To place the reader in the automatic Wiegand mode, click on “Wiegand”.

Use the selector to choose the Wiegand mode you want. UID modes read only the unique factory data on the tag. Card Data mode reads encrypted data that has been written on certain blocks of the card.

When a reader is in a Wiegand UID mode, the unique identification number and the reader serial number are sent in ASCII format on the RS-485 lines and the unique identifier is sent in the selected Wiegand format on the Wiegand lines.

Go to “Configuration” and “Encryption” if you want to change the Wiegand encryption key.

The revised Wiegand setup is displayed.

Read / Write Mode In the read/write mode, data can be read from the transponder and new data can be written on the transponder. Read/write functions are used in a variety of Automatic Identification and Data Collection applications. When you select any read/write operation the reader will be taken out of Wiegand mode.

Select “View One Block” to read the data on a single block. Click on “GO” to execute the command once.

Select “Continuous” then click “Go” to repeat the command continuously. Click “Pause” to interrupt the continuous command.

Select “View Many Blocks” to see data on a group of blocks. Up to 32 blocks may be read at one time. Enter the starting block and the number of blocks to be read

Select “View Factory Data” to see the transponder’s Unique I.D., and other information.

Select “Program One Block” to write data on a single block. Enter the block to be written and the data in hexidecimal format.

Select “Lock One Block” to lock the data written on a block. Once locked, this data cannot be changed or erased.

Select “View Lock Status” to see which blocks have been locked.

Select “Program AFI” to Choose an Application Field Identifier. The AFI can be used as a filter to ignore any transponders that are not intended for use in your type of application.

Select “Lock AFI” to make the selected AFI permanent.

Select “Program DSFID” to set a Developer Selected Field Identifier. DFSID can be used to convey custom information specific to the application.

Select “Lock DSFID” to make the DSFID permanent.

Select “Inventory” to view the UID of several transponders at once.

Go to “Configuration” and “DeBug Mode” to view all host interface dialog at the bottom of the screen.

Go to “Configuration” and “LED/Audio” to set LED and buzzer modes.

Go to “Configuration”, “Address Reader” to designate the serial number of a specific reader you want to communicate with.

e*Tag ® Host Summary e*Tag ® Host has been designed to demonstrate the various functions of e*Tag ® reader/writers. In Wiegand mode these readers automatically detect transponders and transmit data to a host in a binary format.

e*Tag ® Host Summary In read/write mode a host can obtain data from transponders as well as write new data on them. Data is sorted by blocks. Data can be permanent (locked) or changeable.

e*Tag ® Host Summary Application-specific software can be written to use e*Tag ® in a variety of Automatic Identification and Data Collection environments. An Application Program Interface (API) and an open communications protocol are provided with the e*Tag ® development kits.

e*Tag ® RFID System RFID For Today’s World