Brooks Automation UF70 User Manual

English
Product Manual
RFID Reader UF70 Certum
The product manual must be read prior to the initial start-up. Observe the safety instructions! Store for future use. This documentation is not subject to revisions.
ID120037 05/2012
Information
This product manual corresponds with "Directiv e 1999/5/EC of the European P arliament
and the Council on radio equipment and telecommunications transmission equipment
This product manual is addressed to the operating company who must pass it on to the
personnel responsible for installation, connection, use and repairs of the machine.
The plant manager must ensure that the information contained in this product manual and
in the accompanying documents has been read and understood.
The product manual must be stored in a place that is familiar and easily accessible to
employees and must be consulted whenever an employee is unsure of how to proceed.
The manufacturer does not assume any responsibility for injuries to persons or animals, or
damage to property or to the device arising from incorrect use or disregard or insufficient
consideration of the safety criteria contained in this product manual or based on
modifications of the device or the use of unsuitable spare parts.
The copyright for this product manual is held solely by
Brooks Automation (Germany) GmbH
RFID Division
Gartenstr. 19
95490 Mistelgau
Germany
or its legal successor.
Reproducing or circulating this product manual is only permitted with the exclusive
approval of the copyright holder. This also applies if only excerpts of the product
manual are copied or circulated. These requirements also apply for circulating the
product manual in digital form.
Status: May 2012
Information
Archiving
Store the product manual in the vicinity of the device! Always keep the product manual handy!
Symbols and signal words
The following symbols and signal words are used in this documentation. The combination of a pictograph and a signal word classifies the respective safety information. The symbol can vary depending on the type of danger.
Symbol Signal word Description
DANGER This signal word must be used if death or
irreversible damage to health can occur if
Death
WARNING This signal word indicates bodily injuries
the hazard information is not followed.
and property damage including injuries, accidents, and health risks.
property damage
Risk of injury and
No damage
CAUTION This signal word indicates a risk of
property damage. In addition, there is a slight risk of injuries.
ATTENTION This signal word warns of malfunctions
and may only be used if no damage to health can occur.
IMPORTANT This signal word indicates cross-
references and ways in which operations are facilitated. It excludes all risks of property damage and injury risks.
Information
Target group
This product manual is addressed to personnel with the following areas of responsibility:
Area of responsibility Competence
Installation Specialized personnel Commissioning, operation and
decommissioning Troubleshooting Specialized personnel
Definition according to DIN EN 60204-1:
Instructed personnel
Persons who have been instructed and, if required, trained by a specialist as to the tasks assigned to them, the possible risks of incorrect behavior and the required safety equipment and safety measures.
Specialized personnel
Persons who can evaluate the work assigned to them and recognize possible risks based on their specialized training, knowledge, experience and familiarity with the relevant standards.
Instructed personnel
Contents
1 Identification . . . . . . . . . . . . . . . . . . . . . . . . . 7
1.1 Designated use 8
1.2 Incorrect use 8
2 Declaration of Conformity . . . . . . . . . . . . . . . 10
3 General Instructions . . . . . . . . . . . . . . . . . . . 12
3.1 Liability and warranty 12
3.2 Objectives of the product manual 12
4 Safety Instructions . . . . . . . . . . . . . . . . . . . . 14
4.1 Area of application and symbols 14
4.1.1 Safety symbols – in compliance with 4844-2 15
4.1.2 Warning symbols 15
4.1.3 Prohibition symbols 15
4.1.4 Other symbols 16
4.2 Obligations 17
4.2.1 Operating company’s obligations 17
4.2.2 Operating personnel’s obligations 17
4.3 ESD instructions 18
4.4 Residual risks 18
4.5 Additional information 20
5 Product Specifications . . . . . . . . . . . . . . . . . . 22
5.1 Function 22
5.2 Images 23
5.2.1 Front view 23
5.2.2 Rear view 24
5.2.3 Top view 25
5.3 Description of the components 26
5.4 Technical data 28
6 Installation . . . . . . . . . . . . . . . . . . . . . . . . . . 30
6.1 Safety instructions 30
6.2 Qualified installation personnel 32
6.3 Unpacking 32
6.4 Assembly of the device 33
6.5 Antenna installation 34
Contents
6.5.1 Positioning the antenna 34
6.5.2 Available antenna types 34
6.6 Power supply 34
6.7 Terminal connection 35
6.8 External input and output (optional) 36
6.9 Commissioning 36
6.9.1 Required operating conditions 36
6.9.2 Parameters of the serial interface 36
6.9.3 Parameters of the Ethernet interface 37
7 Operation . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
7.1 Operating personnel 40
7.2 Communication protocol ASC-I1 40
7.2.1 Structure of the communication protocol 40
7.2.2 Package contents 41
7.2.3 Commands of protocol 43
7.2.4 Parameters 126
7.3 Additional information 155
8 Service and Troubleshooting . . . . . . . . . . . . 156
8.1 General remarks 156
8.2 Qualified troubleshooting personnel 157
8.3 Safety instructions 157
8.4 Error codes 158
8.5 Error display with LED 160
8.6 Reader does not respond 160
8.7 Reset 161
8.8 Power cut 161
8.9 Software releases 161
8.10 Customer service 161
9 Dismantling and Storage . . . . . . . . . . . . . . . 162
9.1 Dismantling 162
9.2 Storage 162
10 Transport and Disposal . . . . . . . . . . . . . . . . 163
10.1 Transport 163
10.2 Disposal 163
Model RFID Reader UF70 Certum
Manufacturer
Chapter 1
Identification

1 Identification

This chapter gives you an overview of the following topics:
Designated use
Incorrect use
Serial number 00 – 0001 – UF70 Part number TUG-E1ML-4O00-F4-00E1 ETSI version, protection class IP40
TFG-E1ML-4O00-F4-00E1 FCC version, protection class IP40 TUG-E1ML-4O00-R4-00E1 ETSI version, protection class IP65 TFG-E1ML-4O00-R4-00E1 FCC version, protection class IP65
Brooks Automation (Germany) GmbH RFID Division
Gartenstr. 19 D-95490 Mistelgau GERMANY
Telephone +49 (0) 9279 - 991 550 Fax +49 (0) 9279 - 991 501
E-mail info.rfid@brooks.com Website www.brooks-rfid.com
For information on the label, see
Device label.
Product Manual - RFID Reader UF70 Certum 7
Chapter 1
Identification

1.1 Designated use

This product is exclusively developed for reading and writing of passive UHF transponders (e.g. EPC Class1 Gen2). Any other use of this device constitutes misuse and renders the user's authority to install and operate the device invalid.
This product is designed to be mounted and operated in an industrial setting as a built-in-device only. It is not designed to be used as a stand-alone or portable device or in a non-industrial setting, such as a household, vehicle or in the open­air.
Intended use also includes the following:
following all instructions in the product manual
User information
FCC
IMPORTANT
following all safety information
Before using the device, the user should ensure that the national approval requirements for use are met.
Changes or modifications not expressly approved by the party responsible for compliance could void the user’s authority to operate the equipment.
This equipment has been tested, and found to comply with the limits for a Class A digital device, pursuant to part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference when the equipment is operated in a commercial environment. This equipment generates, uses, and can radiate radio frequency energy and, if not installed and used in accordance with the instruction manual, may cause harmful interference to radio communications. Operation of this equipment in a residential area is likely to cause harmful interference, in which case the user will be required to correct the interference at his own expense.

1.2 Incorrect use

Incorrect use, which can endanger the device, the user and third parties, includes:
nbb
the use of the device, contrary to its intended use ( Designated use)
modifying, extending or reconstructing the device without first consulting
Brooks Automation (Germany) GmbH
operating the device when there are obvious problems
Product Manual - RFID Reader UF70 Certum 8
Chapter 1
Identification
WARNING
WARNING
Risk of injury through incorrect modifications
There are risks from unauthorized modifications to the machine. Only use original spare parts from the manufacturer. Do not make any changes,
attachments or modifications to the device without the approval of Brooks Automation (Germany) GmbH.
Risk of injury and malfunction of machine operation through incorrect use
There are risks attached to using the device incorrectly. Use the device exclusively according to its intended use.
Product Manual - RFID Reader UF70 Certum 9
Chapter 2
Declaration of Conformity

2 Declaration of Conformity

Konformitätserklärung gemäß dem Gesetz über Funkanlagen und Telekommunikationsendeinrichtungen (FTEG) und der Richtlinie 1999/5/EG (R&TTE)
Declaration of Conformity in accordance with the Radio and Telecommunications Terminal Equipment Act (FTEG) and Directive 1999/5/FC (R&TTE Directive)
Hersteller / Verantwortliche Person
Manufacturer / responsible person
erklärt, dass das Produkt
declares that the product
Type (ggf. Anlagenkonfiguration mit Angabe der Module)
Type (if applicable, configuration including the modules)
Telekommunikations(Tk-)endeinrichtung
Telecommunications terminal equipment
Verwendungszweck
Intended purpose
Geräteklasse
Equipment class
bei bestimmungsgemäßer Verwendung den grundlegenden Anforderungen des
§ 3 und den übrigen einschlägigen Bestimmungen des FTEG (Artikel 3 der R&TTE) entspric ht .
complies with the essential requirements of § 3 and the other relevant provisions of the FTEG (Article 3 of the R&TTE Directive), when used for its intended purpose.
BROOKS Automation (Germany) GmbH / Herr Dittrich
UF70 Certum
Funkanlage
Radio equipment
Identification system
2
Gesundheit und Sicherheit gemäß § 3 (1) 1. (Artikel 3 (1) a))
Health and safety requirements pursuant to § 3 (1) 1. (Article 3(1) a))
angewendete harmonisierte Normen
Harmonized standards applied
Einhaltung der grundlegenden Anforderungen auf andere Art und Weise (hierzu verwe ndete Standard s/ Spezifikationen)
Other means of proving conformity with the essential requirements (standards / specifications used)
EN 60950-1:2006
- - -
Product Manual - RFID Reader UF70 Certum 10
Chapter 2
Declaration of Conformity
Schutzanforderungen in Bezug auf die elektromagnetische Verträglichkeit (§ 3 (1) 2, Artikel 3 (1) b)
Protection requirements concerning electromagnetic compatibility § 3(1)(2), (Article 3(1)(b))
angewendete harmonisierte Normen
Harmonized standards applied
Einhaltung der grundlegenden Anforderungen auf andere Art und Weise (hierzu verwe ndete Standard s/ Spezifikationen)
Other means of proving conformity with the essential requirements (standards / interface specifications used)
Maßnahmen zur effizienten Nutzung des Funkfrequenzspektrums
Measures for the efficient use of the radio frequency spectrum
Luftschnittstelle bei Funkanlagen gemäß § 3(2) (Artikel 3(2))
Air interface of the radio systems pursuant to § 3(2) (Article 3(2))
angewendete harmonisierte Normen
Harmonized standards applied
Einhaltung der grundlegenden Anforderungen auf andere Art und Weise (hierzu verwendete Standards/ Spezifikationen)
Other means of proving conformity with the essential requirements (standards/specifications used)
EN 301 489-1 V1.8.1 EN 301 489-3 V1.4.1
EN 302 208-1 V1.3.1 EN 302 208-2 V1.3.1
- - -
nbb
BROOKS Automation (Germany) GmbH Gartenstr. 19
D-95490 Mistelgau GERMANY
Telephone Fax E-Mail
Mistelgau, July 21, 2011
(Place and date of issue) (Name and signature)
+49 (0) 9279 - 991 550 +49 (0) 9279 - 991 501 info.rfid@brooks.com
Gerald Dittrich
Product Manual - RFID Reader UF70 Certum 11
Chapter 3
General Instructions

3 General Instructions

This chapter gives you an overview of the following topics:
Liability and warranty
Objectives of the product manual

3.1 Liability and warranty

The “General sales and delivery conditions” of Brooks Automation (Germany) GmbH always apply.
The warranty period is 12 months beginning with the delivery of the device, which is verified by the invoice or other documents.
The warranty includes repairs of all damage to the device that occurs during the warranty period and was clearly caused by material or manufacturing defects.
Liability and warranty claims in cases of injury to persons or damage to property are excluded if they can be attributed to one or more of the following causes:
incorrect use of the device
disregard of the information in the product manual
unauthorized structural modifications of the device
insufficient maintenance and repairs
disasters due to foreign objects or force majeure

3.2 Objectives of the product manual

This product manual serves as support and contains all the necessary safety information that must be followed for general safety, transport, installation and operation.
This product manual with all safety information (as well as all additional documents) must be:
followed, read and understood by all persons working with the device
(especially the safety information)
easily available to all persons at all times
immediately consulted in case of the least doubt (safety)
Product Manual - RFID Reader UF70 Certum 12
General Instructions
Objectives:
avoid accidents
increase the service life and reliability of the device
reduce costs due to production downtimes
Chapter 3
nbb
Product Manual - RFID Reader UF70 Certum 13
Safety Instructions

4 Safety Instructions

This chapter gives you an overview of the following topics:
Area of application and symbols
Obligations
ESD instructions
Residual risks
Additional information

4.1 Area of application and symbols

Chapter 4
DANGER
Danger to life, risk of injuries or damage to property
Risks exist when disregarding the product manual and the safety instructions therein.
Carefully read the product manual before initial commissioning. Perform the required safety measures before initial commissioning.
Follow the general safety information as well as the special safety information given in other chapters.
The device was constructed according to state-of-the-art technology and recognized safety regulations. In order to prevent any risks to life and limb of the user, third parties or damage to the device, only use the device for its intended purpose and in perfect condition with regard to safety.
Bodily injuries and/or property damage resulting from non-compliance with the instructions given in the product manual are the responsibility of the company operating the device or of the assigned personnel. Malfunctions that could compromise safety must be eliminated immediately.
Product Manual - RFID Reader UF70 Certum 14
Safety Instructions
4.1.1 Safety symbols – in compliance with 4844-2
Chapter 4
WARNING
Risk of injuries when disregarding safety symbols
Risks exist when disregarding warnings in the product manual. Please heed the warnings.
Special safety symbols in accordance with DIN 4844-2 are used in the corresponding passages in the text of this product manual and require special attention depending on the combination of signal word and symbol.

4.1.2 Warning symbols

Warning against hazardous area
Warning against electromagnetic radiation
Warning against hazardous electrical voltage
Warning against flammable materials
nbb
Warning against potentially explosive atmosphere

4.1.3 Prohibition symbols

Unauthorized access is prohibited
Switching is prohibited
Warning against electrostatically sensitive components
Fire, open flame and smoking is prohibited
Prohibition
Product Manual - RFID Reader UF70 Certum 15

4.1.4 Other symbols

Chapter 4
Safety Instructions
Dispose of packing material according to regulations
Important information
Disconnect from power supply
Recycling
Refer to manual
Product Manual - RFID Reader UF70 Certum 16
Chapter 4
Safety Instructions

4.2 Obligations

4.2.1 Operating company’s obligations

The safe condition and use of the device is a requirement for the safe operation of the device. The company operating the device therefore has the obligation to ensure that the following points are adhered to:
The device may only be operated by trained and authorized personnel! Avoid unsafe and/or dangerous work procedures! If necessary, check
employees' actions!
Only permit personnel to be trained or instructed within the scope of a
general training work on the device under the supervision of an experienced person!
Personnel must have understood the product manual. Have this confirmed
by signature!
Precisely establish responsibilities according to the various task areas
(operation, installation)!
Operating personnel must be committed to immediately reporting to their
superior any identifiable safety deficiencies which occur!

4.2.2 Operating personnel’s obligations

Operators are obligated to contribute to the prevention of work accidents and the consequences of them by their personal conduc t.
Product Manual - RFID Reader UF70 Certum 17
Chapter 4
Safety Instructions
WARNING
CAUTION
Risk of injuries due to insufficient personnel qualifications
A risk exists for personnel and the proper operation due to insufficiently qualified personnel.
Only trained personnel may operate the device. New operators must be instructed by the current operating personnel. The operating company must precisely regulate and monitor the personnel's areas of responsibility and competence.
Personnel for the areas of responsibility mentioned above must have the corresponding qualification for this work (training, instructions). If necessary, this can be done by the manufacturer on behalf of the operating company.
All warranty claims are void when disregarded.

4.3 ESD instructions

Static electricity can damage electronic components in the device. All persons installing or maintaining the device must be trained in ESD protection.
ESD protective measures must be applied when opening the device.
Disconnect the power supply prior to removing or adding components. Discharge your body and all tools used prior to contacting any components
on the interior of the device!
Touch electronically sensitive parts carefully and at the corners!

4.4 Residual risks

Even if all precautions have been taken, there may be unapparent residual risks! Adhering to the safety instructions, the intended use, and the product manual as
a whole can reduce residual risks!
Product Manual - RFID Reader UF70 Certum 18
Chapter 4
Safety Instructions
DANGER
ATTENTION
DANGER
Risks from electric current
Electrical energy remains in lines, equipment and devices even when the device is switched off.
Only allow qualified electricians to perform work on the electrical supply system.
Disconnect the device from the power supply system if active parts of the device can be accessed by using tools. Access is only permitted for authorized personnel.
Regularly check the electrical equipment of the device. Regularly check all moving cables for damage within the scope of maintenance and repairs.
Risk of fire and explosions
Fire and explosions may occur within the vicinity of the device.
WARNING
Smoking, open flames and fire are strictly prohibited in the vicinity of the device. Do not store any flammable liquids within the hazardous area. Keep a fire extinguisher in the vicinity of the device.
Warning against electromagnetic radiation
Electromagnetic radiation develops when transmitting and receiving data. Set the antenna in such a position that it is not in the vicinity of or touches a
human body while transmitting.
Product Manual - RFID Reader UF70 Certum 19
Chapter 4
Safety Instructions

4.5 Additional information

Read and understand all safety and product manuals prior to installing
and operating the device.
This documentation was written for specifically trained personnel.
Installation, operation and troubleshooting may only be carried out by specifically trained personnel.
Retain these instructions. Keep this documentation in a location that is
accessible to all personnel involved with the installation, use and troubleshooting of the device.
Follow all warnings. Follow all warnings on and in the device and in the
documentation.
Install the device only in accordance with the manufacturer's
instructions.
Use only the accessories and cables from the manufacturer.
Troubleshooting that is not described in Chapter Service and
Troubleshooting may only be performed by the manufacturer.
People with hearing aids should be aware that the radio signals emitted
by the device can cause annoying noises in the hearing aid.
Do not connect the device to power supplies such as normal household
electrical outlets. The device should only be connected to power supplies as specified in this document.
When removing a cable, only pull on the plug and not on the cable.
Connect cable connectors straight and carefully to avoid damaging the contacts.
Never overbend the antenna cables or subject these to mechanical
forces.
When replacement parts are required, use only the replacement parts
that were specified by the manufacturer. Unauthorized spare parts can result in fire, electric shock or other hazards.
Product Manual - RFID Reader UF70 Certum 20
Chapter 4
Safety Instructions
Rules and
regulations
The provisions of the accident prevention regulations of the government safety organizations always apply to all work on the device.
The following must also be observed:
applicable legally binding accident-prevention regulations
applicable binding regulations at the place of use
the recognized technical rules for safe and professional work
existing environmental protection regulations
other applicable regulations
Product Manual - RFID Reader UF70 Certum 21
Chapter 5
Product Specifications

5 Product Specifications

This chapter gives you an overview of the following topics:
Function
Images
Description of the components
Technical data

5.1 Function

The Brooks RFID UF70 Certum reader is a multiprotocol reader for reading passive transponders in the frequency range of 865 MHz to 868 MHz for Europe and 902 MHz - 928 MHz for the FCC.
The device operates at 2 W and 1 W HF power at the antenna jack depending on the registration area.
When delivered, the device can read and write transponders according to the EPC Gen2 standard. Other protocols can be added via software updates.
The device has several high performance interfaces for communications. The reader has four antenna ports for the connection of transmitting and
receiving antennas for communicating with RFID transponders. The device also has various interfaces for the connection with the PC, depending
on the configuration stage. Power is supplied via a 3-pin M8 connector.
Product Manual - RFID Reader UF70 Certum 22

5.2 Images

5.2.1 Front view

Chapter 5
Product Specifications
nbb
1 Power (24 V) 3 RS232 interface 2 Ethernet interface 4 4 antenna ports
Product Manual - RFID Reader UF70 Certum 23

5.2.2 Rear view

Chapter 5
Product Specifications
1 4 I/Os
Product Manual - RFID Reader UF70 Certum 24

5.2.3 Top view

Chapter 5
Product Specifications
1 Antenna port LED 5 Mode LED 2 Test Error LED 6 Mode button 3 Test OK LED 7 Reset button 4 Test button 8 Power LED
Product Manual - RFID Reader UF70 Certum 25
Chapter 5
Product Specifications

5.3 Description of the components

Components Description
Power LED If the correct voltage is applied to the device, the
Power LED is green and the device is operational.
Reset button Pressing this button initiates a power-reset of the
device. The reset button must be pressed for at least three seconds until all the LEDs of the foil keypad simultaneously start and the hardware reset is executed.
Mode button If the mode button and the reset button are
simultaneously pressed at a powerup reset for about 15 seconds until all the LEDs of the keypad light up for the second time, the reader will be reset to the default
state (default factory setting). Mode LED Currently no use. Test button Pressing this button switches the device to the reading
test mode and is used to select the antenna ports. If
the button is pressed for a longer time (at least 2
seconds), then the test mode is activated (T est OK LED
and Test Error LED both briefly come on) or disabled
(Test OK LED and Test Error LED both go out). Briefly
pressing the buttons when the test mode is activated
results in switching to the next antenna port. Test OK LED When a transponder in the test mode can be
successfully identified, this LED turns green. Test Error LED When a transponder in the test mode cannot be
successfully identified, this LED turns red. Antenna port LED 1
to 4
Antenna ports Ports to connect the antennas. I/O ports 1 to 4 A digital input and output can be connected to each
These LEDs signal the data traffic to the respective
antenna ports. Once data is read or written via the
antenna port 1 (above), the antenna port LED 1
(above) turns green.
antenna port. A 3 wire sensor or dry contact is possible
as the input. The output can operate a LED without a
series resistor or directly switch 5 V DC
(Imax = 100 mA).
Product Manual - RFID Reader UF70 Certum 26
Chapter 5
Product Specifications
Components Description
RS232 interface Communications with the device can be made via the
serial interface (9 pin sub-D socket). Baudrates of
1,200 Bd up to 57,600 Bd are possible. Ethernet interface Communications with the device can be made via the
10/100 BaseT interface. Voltage supply
connection
Contact for connecting the 24 V DC voltage supply
Product Manual - RFID Reader UF70 Certum 27
Product Specifications

5.4 Technical data

Technical data
Voltage 24 V DC ± 10% Power consumption approx. 0.8 A at 24 V Operating temperature -20 to 50 °C
-4 °F to 122 °F
Storage temperature -40 to 85 °C
-40 °F to 185 °F
Chapter 5
Permissible humidity at 50 °C / 122 °F
Protection class IP 40 (optional IP 65) Housing material Passivated aluminum Weight approx. 1,500 g Air interface ISO 18000-6C (EPC Global Class 1 Gen2) Frequency range Europe 865 – 868 MHz Frequency range FCC 902 – 928 MHz Radiation power < 2 Watt ERP Transmitting power programmable in 1 dB steps Read / write range up to 8 m Serial interface RS232 1,200 Bd – 57,600 Bd Ethernet interface 10/100 BaseT
25 – 85%
Product Manual - RFID Reader UF70 Certum 28
Chapter 5
Product Specifications
Device label The device label with the CE mark, part/serial number and MAC address is on the
device housing.
1 Part number 2 Serial number 3 MAC address
Product Manual - RFID Reader UF70 Certum 29
Installation

6 Installation

This chapter gives you an overview of the following topics:
Safety instructions
Qualified installation personnel
Unpacking
Assembly of the device
Antenna installation
Power supply
Terminal connection
External input and output (optional)
Commissioning
Chapter 6
CAUTION
Refer to manual
Follow the general safety instructions in the chapter
Safety Instructions.

6.1 Safety instructions

The device is exclusively designed for indoor use in an industrial environment. Installation is only allowed in an interior room at a constant temperature
between -20 °C / -4 °F and +50 °C / 122 °F, and a relative humidity between 25% and 80%.
Never use the device near or in water. Never pour liquids of any type over the device. If the device should accidentally
come in contact with liquid, disconnect it and have it checked by a technician.
Do not install the device near heat sources such as radiators, heat registers, stoves or other devices (including amplifiers) that generate heat.
Do not install the device in a flammable environment.
Product Manual - RFID Reader UF70 Certum 30
Chapter 6
Installation
CAUTION
CAUTION
Never expose the device to extreme temperature fluctuations, since otherwise condensation develops in the device and causes damage.
Do not install the device in the vicinity of voltage lines or other power lines with which they could collide (for example, drilling), which could result in serious injuries or even death.
The device (especially the antenna) should not be installed in the immediate vicinity of electrical equipment such as medical devices, monitors, telephones, TV sets, magnetic disks and metal objects.
This could result in reduced read and write ranges.
Never use the device in explosive areas (e.g. paint warehouses).
Do not use the device in areas where it is exposed to vibrations or shocks.
nbb
ATTENTION
The installation location must be adequately illuminated during the installation.
Never install the device during a lightning storm.
Verify that the installation meets the requirements of the (country-specific) FCC for human exposure to radio frequencies.
Product Manual - RFID Reader UF70 Certum 31
Chapter 6
Installation
ATTENTION
CAUTION
CAUTION
When determining the installation site, keep in mind the length of the antenna wire and the read/write range of the antenna used.

6.2 Qualified installation per sonnel

The installation is to be carried out by specially trained personnel only. If you are uncertain about their qualification, contact the manufacturer.
Installing the device without special training can result in damage to the reader and/or connected devices.
Disposing of the
packaging material

6.3 Unpacking

The device and the accessories are packed under clean-room conditions. In order to maintain this condition, the device must also be unpacked in clean-room conditions.
The packaging material consists of cardboard and foil. Dispose of these materials separately and under the respective legal regulations of your country.
Product Manual - RFID Reader UF70 Certum 32

6.4 Assembly of the device

Chapter 6
Installation
ATTENTION
Installation
dimensions
The mounting surface must be stable, non-flammable, dry and clean. If necessary, clean it before you install the device. The device must be installed so that air can freely circulate vertically through
the heat sink, and the operating and environmental conditions specified under
Technical data are met at all times.
Product Manual - RFID Reader UF70 Certum 33

6.5 Antenna installation

Chapter 6
Installation
ATTENTION
Consider the required read and write ranges when installing the antenna. The reader can only be used properly if the transponder is located within the individual reading/writing range of the respective antenna.
If the transponder is very close to the antenna, the transponder may be detuned by the metal of the antenna and a reading/writing is not possible. We recommend keeping a minimum distance between transponder and antenna of about 10 mm.

6.5.1 Positioning the antenna

Reliable reading and writing depends on the distance and orientation of the transponder from the antenna.
Depending on the polarization of the antenna and the design of the transponder, the orientation of the two together should be considered when a reliable identification must be guaranteed.
More information on application-specific antenna structures can be obtained from our support team.
DANGER

6.5.2 Available antenna types

Different types of antennas are available on request.

6.6 Power supply

Risk of death from dangerous voltage
Risks exist when supplying the device with the incorrect voltage. Only use cables, plugs and adapters supplied by the manufacturer. Observe power ratings of the technical data ( Technical data).
The device can be connected to an internal power supply of the system or to an external power supply.
Once the device is connected to the power supply, the power LED lights up.
Product Manual - RFID Reader UF70 Certum 34
Chapter 6
Pin Signal
1 GND 2 +24 V DC 3 GND
Pins 1 and 3 are both grounded.
Pin DB9
1 NC 2 TxD 3 RxD 4 NC 5 GND 6 NC 7 NC 8 NC 9 NC
Installation
If the LED does not light up, please refer to chapter Error display with LED.

6.7 Terminal connection

The serial interface is a Sub-D socket (9-pin). A normal RS232 extension cable can be used.
Product Manual - RFID Reader UF70 Certum 35
Chapter 6
Installation

6.8 External input and output (optional)

The following I/O versions are possible:
A digital input and output can be connected to each antenna port. A 3 wire sensor or dry contact is possible as the input.
The output can operate a LED without a series resistor or directly switch 5 V DC.

6.9 Commissioning

6.9.1 Required operating conditions

The following two conditions must be fulfilled for operating the device:
An antenna must be connected correctly to the reader. Connect the power supply and switch on the device (if a POE is not used). The transponder must be located within the individual reading/writing
range of the antenna (for testing)!

6.9.2 Parameters of the serial interface

Baudrate 57,600 Data bits 8 Stop bit 1 Parity No
Product Manual - RFID Reader UF70 Certum 36
Login
Chapter 6
Installation

6.9.3 Parameters of the Ethernet interface

The Ethernet is connected via an Ethernet module. Tools are available that allow the Ethernet settings to be configured. By using Discovery Tools, all Ethernet devices located in the network can be
found. The respective device can be configured via a web server and a web browser via a double click. If the TCP / IP address is known, the web server can also be directly opened in a browser also follows:
http://xxx.xxx.xxx.xxx/
User: "root"
Password: "dbps"
xxx.xxx.xxx.xxx – currently set IP address
The IP address can be set via the "network" link. The settings are transferred with the "apply" button and the device is then rebooted.
Product Manual - RFID Reader UF70 Certum 37
Configuration
Chapter 6
Installation
IMPORTANT
Digi Device
Discovery
The "Factory Default Settings" must not be set under any circumstances as th ey are not the factory settings of Brooks. Any other settings of the Ethernet device (exept the IP address) must not be changed. Otherwise a fault-free communication cannot be guaranteed by Brooks.
The tool displays all devices that have a Digi Connect ME. Devices that are not in the same subnet are also displayed. The IP address can be set directly via "configure network settings". Fixed IPs or DHCPs are possible. The web server of the device can be accessed directly via the "open web interface".
Product Manual - RFID Reader UF70 Certum 38
Selection window
Chapter 6
Installation
Input window
Product Manual - RFID Reader UF70 Certum 39
Operation

7Operation

This chapter gives you an overview of the following topics:
Operating personnel
Communication protocol ASC-I1
Additional information

7.1 Operating personnel

Chapter 7
CAUTION
The UF70 Certum reader should only be operated by specially trained personnel.
If you have doubts about the required qualifications, contact the manufacturer. Operating the device without special training can result in damage to the reader
and/or connected devices.

7.2 Communication protocol ASC-I1

7.2.1 Structure of the communication protocol

General remarks:
The communication is done with ASCII packages.
Each device has an RS232 interface and an optional Ethernet interface to
which an address from 0 to E can be assigned. The device has a default address of 0 on delivery.
After each command to the device, a defined response is sent. We
recommend waiting for this response before sending a new command.
Product Manual - RFID Reader UF70 Certum 40
Chapter 7
Operation

7.2.2 Package contents

General remarks: Each package includes a package header (three characters), a message (two or
more characters) and the end of the package (five characters).
Package header Message End of package
Package header The header includes the start character (one character) and the package length
(two characters) 2 starting characters and 4 length bytes are sent in the extended ASCII protocol.
Package header
Start Length 1 Length 2
nbb
Start Start character (ASCII character ´S´) Length 1 High byte package length (hexadecimal) –
ASCII characters ´0´..´F´
Length 2 Low byte package length (hexadecimal) –
ASCII characters ´0´..´F´
Extended ASCII format:
Package header
Start 1 Start 2 Length 1 Length 2 Length 3 Length 4
Start 1 First start character (ASCII character 'S') Start 2 Second start character (ASCII character 'X') for marking
the extended ASCII protocol
Length 1 High byte package length (hexadecimal) -
ASCII characters ´0´..´F´
Length 2 Byte package length (hexadecimal) -
ASCII characters ´0´..´F´
Length 3 Byte package length (hexadecimal) -
ASCII characters ´0´..´F´
Length 4 Low byte package length
(hexadecimal) - ASCII characters ´0´..´F´
The message length describes the number of characters of a message.
Product Manual - RFID Reader UF70 Certum 41
Chapter 7
Operation
Message structure The message contains a command, a target and source address, the number of
the antenna port (Head) and the actual information. The number of the antenna port is not required for all messages.
Message
Command Address Head Information
Command ASCII characters (see section Commands of protocol)
Address Target or source address; ASCII characters '0'...’E’ Head Optional – for messages that refer to a specific
antenna port
Information Depends on the command (includes none, one or more
ASCII characters '0'...'F')
*) The device is pre-configured with an address of '0' on delivery.
End of package The end of the package includes an end (1 character) and the checksum (4
characters)
End of package
End Checksum 1Checksum 2Checksum 3Checksum
End End character ASCII character no. 13 (hexadecimal 0D) Checksum 1 High-byte – XOR logic for all data
(package header, message and end character); ASCII ‘0’..’F’
Checksum 2 Low byte – XOR logic for all data
(package header, message and end character); ASCII ‘0’..’F’
*)
4
Checksum 3 High byte – addition of all data
(package header, message and end character); ASCII ‘0’..’F’
Checksum 4 Low byte – addition of all data
(package header, message and end character); ASCII ‘0’..’F’
Product Manual - RFID Reader UF70 Certum 42
Chapter 7
Operation
ATTENTION
Commands
When using the TCP/IP interface option, the checksum is not used (is not transmitted).

7.2.3 Commands of protocol

Command Description
X or URX Read data range of all EPC transponders URY Read data range of the EPC transponders with special EPC
code M EPC scanning URB EPC bulk reading with time specification W Write EPC of a single transponder UWW Write data range of all EPC transponders UWZ Write data range of the EPC transponders with special EPC
code UMW Write data range masked of all EPC transponders UMZ Write data range masked of the EPC transponders with special
EPC code UBW Erase block of all EPC transponders UBZ Erase block of the EPC transponders with special EPC code ULW Retrie ving all EPC transpo nders ULZ Retrieving all EPC transponders with special EPC code UKW Killing all EPC transponders UKZ Killing all EPC transponders with special EPC code T or UAM Activate polling: EPC scanning UAA Activate polling: Read raw UAX Activate polling: Read data range UAW Activate polling: Write data range
Product Manual - RFID Reader UF70 Certum 43
Chapter 7
Operation
Command Description
UAZ Activate polling: Write data range masked UAB Activate polling: Erase block of all EPC transponders UAL Activate polling: Retrieving all EPC transponders UAK Activate polling: Killing all EPC transponders UAR Read transponder rate in the polling operation UAE Stop polling UCX Activate polling: NXP-UCODE-G2X Read Protect UCN Activate polling: NXP-UCODE-G2X Reset Read Protect UCC Activate polling: NXP-UCODE-G2X Change EAS UCE Activate polling: NXP-UCODE-G2X EAS Alarm UFW Set filter data UFR Read filter data UFP Set filter UFG Read filter status UGL Read out list of radio profiles UGP Determine active radio profile UPP Set the active radio profile UNH Perform hardware reset N or UNR Perform software reset UPE Load factory default values F Request parameter P Set parameter UGK Read the number of the active parameter set UPK Set the number of the active parameter set UGD Read the number of the default parameter set UPD Set the number of the default parameter set B Sensor status O Setting the outputs Q Queries of outputs (status)
Product Manual - RFID Reader UF70 Certum 44
Command Description
E Error message H Heartbeat (request serial number) V or UVR Request software version UGT Read UTC t ime UPT Set UTC time
Chapter 7
Operation
Product Manual - RFID Reader UF70 Certum 45
Message items
Chapter 7
Operation
Access word 8 bytes
The 4 byte access word is required to access the various memory areas of the EPC transponder. The LSB byte is transmitted first during the transmission. The data are interpreted in HEX format. That is, two ASCII characters in the message equal one byte of data in HEX format.
Example: 0x01020304
ASCII string: "04030201"
Bulk time 4 bytes
2 bytes time in milliseconds specifying how long to read. The LSB byte is transmitted first during the transmission. The data are interpreted in HEX format. That is, two ASCII characters in the message equal one byte of data in HEX format.
Example: 0x0064 (100 ms) ASCII string "6400"
CMD 1 - 3 bytes
Command of the message. See table in chapter
Data words 2 to N*4 bytes
Data words (2 bytes) are always read or written. The data are interpreted in HEX format. That is, two ASCII characters in the message describe one byte of transponder data in HEX format.
Example: HEX transponder data: 0x12, 0x34, 0x56, 0x78 (2 data word s)
ASCII transmission: 0x31, 0x32, 0x33, 0x34, 0x35, 0x36,
0x37, 0x38
Transmitted ASCII string: "12345678"
Commands of protocol.
Product Manual - RFID Reader UF70 Certum 46
Chapter 7
Operation
DHCP 1 byte
A network configuration that determines if the static network address is being used or if the DHCP server assigns the network address.
"0" DHCP is not active, use static network address "1" DHCP is active; obtain network address from the DHCP server
Direction 2 bytes
When polling, the direction flag shows if a transponder enters or leaves the field. The display that a transponder leaves the field can be activated via parameter 0x29. The data are interpreted in HEX format. That is, two ASCII characters in the message equal one byte of data in HEX format.
Values: "00" (0x00) The transponder leaves the field "80" (0x80) The RSSI value changed The transponder moved within the field "FF" (0xFF) The transponder enters the field
EPC (2n+1)*2 bytes
With the UHFI20 software version (firmware 2.x), the EPC code has a flexible length n from 0 to 31 data words (2 bytes data). An n byte is placed before the actual EPC code and corresponds to the quantity of EPC data words. The EPC code is transferred so that the LSB byte is transmitted first. The data are interpreted in HEX format. That is, two ASCII characters in the message equal one byte of data in HEX format. The following applies to the number of EPC data words: 0<=n<=31
Example: ASCII string: "060C0B0A090807060504030201"
Number of EPC data words: 0x06 EPC: 0x0102030405060708090A0B0C
Product Manual - RFID Reader UF70 Certum 47
Chapter 7
Operation
Ex flag 2 bytes
The extension flag determines which information is included in the recognized EPC transponder. The Ex flag is set by parameter 0x76. The data are interpreted in HEX format. That is, two ASCII characters in the message equal one byte of data in HEX format.
Values: 0x00 do not transmit extensions
0x01 only transmit antenna port 0x02 only transmit RSSI value 0x03 transmit antenna port and RSSI 0x04 transmit time stamp 0x05 transmit time stamp and antenna port 0x06 tr ansmit time stamp and RSSI value 0x07 transmit time stamp, RSSI value and antenna port 0x08 transmit transponder protocol control word 0x09 transmit antenna port and transponder protocol control word 0x0A transmit RSSI value and protocol control word 0x0B transmit antenna port, RSSI value and protocol control word 0x0C transmit time stamp and protocol control word 0x0D transmit time stamp, antenna port and protocol control word 0x0E transmit time stamp, RSSI and protocol control word 0x0F transmit time stamp, RSSI, antenna port and protocol control word
Extension 0 - 12 bytes
If and which extensions are transmitted for each detected EPC transponder is defined by the Ex flag. The data are interpreted in HEX format. That is, two ASCII characters in the message equal one byte of data in HEX format. The activated extensions are transferred in the following order:
2 ASCII characters antenna port 2 ASCII characters RSSI value 8 ASCII characters UTC time stamp (LSB byte is transmitted first) 4 or 8 ASCII character protocol word as applicable including XPC_W1 and
XPC_W2
Product Manual - RFID Reader UF70 Certum 48
Chapter 7
Operation
Filter mask N* 2 bytes
The filter bits required for the development of a filter are defined in HEX format in a filter mask. That is, two ASCII characters in the message equal one byte of data in HEX format. The LSB byte of the filter mask is transmitted first.
Example: N=3 Number of mask bits: 18 Filter mask: "0x03FEFE" Transmission: "FEFE03"
Filter number 2 bytes
The filters defined for filtering are numbered consecutively from 0 to 31. Values:
"00" – Filter 0 … "1F" – Filter 31
Frame ID 2 bytes
The response of the reader can be accomplished in several frames (e.g. if many transponders were scanned). The frame ID that is sent indicates how many response messages follow. Short responses that consist only of a single frame then always have the frame ID "00". Messages consisting of multiple frames should be fully received and assembled by the host before they are processed. The data are interpreted in HEX format. That is, two ASCII characters in the message equal one byte of data in HEX format.
Head ID 1 byte
Number of the antenna port (0 – 4). "0" read on all antenna ports
"1"-"4" single antenna port
Product Manual - RFID Reader UF70 Certum 49
Chapter 7
Operation
Mask N* 4 bytes
The bit-oriented mask determines what data will actually be overwritten in the masked write. The mask has the same length as the data to be written and actual data is only written in the places where a 1 is located in the mask. The mask is passed in the same order and length as the masked data to be written.
Example: N=1 describe a data word masked
Transponder content: 0x5678 New data: 0x1234 Mask: 0x0F0F new transponder content: 0x5274
Memory address 8 bytes
The memory areas of the EPC transponder are addressed by 4 byte word pointers. The LSB byte is transmitted first during the transmission. The data are interpreted in HEX format. That is, two ASCII characters in the message equal one byte of data in HEX format. The exact memory distribution can be derived from the EPC Global standard.
Memory bank 2 bytes
The EPC transponder has multiple memory banks, which are addressed by number. The exact memory structure can be derived from the EPC Global standard chapter. The data are interpreted in HEX format. That is, two ASCII characters in the message equal one byte of data in HEX format.
Values: "00" (0x00) Reserved "01" (0x01) EPC
"02" (0x02) TID "03" (0x03) User
Number of data words 2 bytes
The number of data words (1 data word consists of 2 bytes), which are read and written, are hereby defined.
The data are interpreted in HEX format. That is, two ASCII characters in the message equal one byte of data in HEX format.
Product Manual - RFID Reader UF70 Certum 50
Chapter 7
Operation
On/Off 4 bytes
The use of a defined filter can hereby be enabled or disabled. Values:
"00" – Filter off "FF" – Filter on
Output state 1 - 4 bytes
Displays the current status of the outputs at the corresponding antenna port (Head ID). The information unit "Output state" includes the status of each output of an antenna port. In the case of querying the status of all outputs of the reader, the "Output State" contains the status of all 4 outputs (1 per head). The status is represented as 1 byte for each head.
Values: 0 – Output OFF 1 – Output ON 2 – Output flashes 3 – unchanged (query only!)
Parameter no. 2 bytes
Number of the parameter. Two ASCII characters (2 bytes) display the parameter number in HEX format.
Example: Parameter 20 0x14 "14"
Parameter value 2 bytes
Value of the parameter. Two ASCII characters (2 bytes) specify the value of the parameter in HEX format.
Example: Value 192 0xC0 "C0"
Product Manual - RFID Reader UF70 Certum 51
Chapter 7
Operation
Payload 6 bytes
If a transponder must be locked, the area of the transponder to be locked can be specified by the payload. The LSB byte is transmitted first during the transmission. Data (3 bytes) are in HEX format. That is, two ASCII characters in the message equal one byte of data in HEX format. The exact structure can be derived from the EPC Global standard chapter "Lock".
Example: Access area with Permalock=1 lock Payload 0x0300C0
Transfer Protocol "C00003"
Profile number 2 bytes
Radio profiles realized in the reader, which are numbered from 0 to 4. Radio profiles:
"00" – Tx:40kbps/Rx:80kbps/FM0 "01" – Tx:40kbps/Rx:40kbps/Miller2 "02" – Tx:40kbps/Rx:160kbps/FM0 "03" – Tx:40kbps/Rx:80kbps/Miller2 "04" – Tx:40kbps/Rx:40kbps/Miller4 (default setting)
Reader ID 1 byte
Address of the device ("0" .. "E"). The default address of the card is "0" on delivery.
RECOMMISSION 2 bytes
If a transponder must be made unreadable (or possibly also recommissioned), 3 so-called recommission bits must be transferred. The value and significance of the recommission bits depend on the type of transponder. The 3 bits are interpreted as one byte data in HEX format. That is, two ASCII characters in the message equal one byte of data in HEX format. The precise significance of the 3 recommission bits can be seen in the documentation of the EPC transponder and the EPC global standard chapter "Kill".
Product Manual - RFID Reader UF70 Certum 52
Chapter 7
Operation
Response code 4 bytes
This feature is not used for the single reader. This code is always "0000".
Result 2 bytes
The result flag delivers information on whether an action was completed successfully. The data are interpreted in HEX format. That is, two ASCII characters in the message equal one byte of data in HEX format.
Values: "00" (0x00) no errors occurred >0x00 an error occurred
Sensor state 1 byte
Displays the current status of the sensor at the corresponding antenna port (Head ID).
Value 0 Sensor is uncovered (open) Value 1 Sensor is covered (closed)
Serial number 4 bytes
Contains the 4-byte serial number of the reader. The serial number is also shown on the label of the reader.
Software version 6 - 8 bytes
Character string with the software version of the reader. The display is in HEX format. This means that the 12-16 characters of the ASCII character string describe the 6-8 bytes of the software version in HEX format.
Example: v0554846493230
0x55 0x48 0x46 0x49 0x32 0x30 = "UHFI20"
Product Manual - RFID Reader UF70 Certum 53
Chapter 7
Operation
Transponder error code 2 bytes
The transponder itself also delivers an error code, which is also transmitted. The data are interpreted in HEX format. That is, two ASCII characters in the message equal one byte of data in HEX format.
Values: "00" (0x00) no errors occurred >0x00 an error occurred
UTC 8 bytes
The Unix time code (UTC) describes the seconds that have passed since 1.1.1970 0:00:00. The Unix time code (UTC) is the same worldwide for a specific time. The 4 bytes of UTC are transmitted in hex format as 2 ASCII char acters per byte. The LSB byte is transmitted first.
Product Manual - RFID Reader UF70 Certum 54
Chapter 7
Operation
X or URX - Read
data area
The X command starts the reading of a defined data range of the current EPC transponder. Several EPC transponders can be located in the reading area of the antenna when
using this command.
Host reader
CMD Reader ID Head ID Access word Memory bank
X URX
Reader host
Overhead response telegram
CMD
x urx
1 byte 1 byte 8 bytes 2 bytes 8 bytes 2 bytes
2)
Reader IDFrame
ID
1 byte 2 bytes 2 bytes 2 bytes 0-12
Result
3)
Ex flag
Data of the participating EPC transponders
3)
Exten­sions
bytes
EPC
(2n+1)* 2 bytes
Memory address
Trans­ponder error code
2 bytes 2 bytes N*4
Number of data words
Number N data words
1)2)
Data words
bytes
1) These data are displayed in the order listed for each identified EPC transponder.
2) The response of the transponder is optional and only appears at result "00".
3) The result and Ex flag is only available in the first transmitted message in messages with several frames.
Example: Read access password (no transponder is present) >> X0100000000000200000002 << x0000A Result "0A" no EPC transponder is present
Example: Read access password (2 transponders) >> X0100000000000200000002 << x0000001 0106010203040506070808080909000200000000
01060B0C090A0708050603040102000200000000
Product Manual - RFID Reader UF70 Certum 55
Example: Read access password (many transponders) >> X0100000000000200000002
<< x0020001 0106480000000000000000000000000200000000 0106010000000000000000000000000200000000 0106060000000000000000000000000200000000 0106270000000000000000000000000200000000
<< x001 0106190000000000000000000000000200000000 0106500000000000000000000000000200000000
0106470000000000000000000000000200000000 0106170000000000000000000000000200000000 0106090000000000000000000000000200000000 0106100000000000000000000000000200000000 0106310000000000000000000000000200000000 0106390000000000000000000000000200000000 0106020000000000000000000000000200000000 0106460000000000000000000000000200000000 0106410000000000000000000000000200000000 0106070000000000000000000000000200000000 01062300000000000000 << x000 00000000000200000000 0106380000000000000000000000000200000000 0106400000000000000000000000000200000000 0106180000000000000000000000000200000000 0106280000000000000000000000000200000000 0106420000000000000000000000000200000000 0106240000000000000000000000000200000000 0106290000000000000000000000000200000000 0106080000000000000000000000000200000000 0106110000000000000000000000000200000000 0106160000000000000000000000000200000000 0106260000000000000000000000000200000000 0106490000000000000000000000000200000000
Chapter 7
Operation
Product Manual - RFID Reader UF70 Certum 56
Chapter 7
Operation
URY – Read data
area (defined EPC
code)
Host reader
CMD
URY 1 byte 1 byte (2n+1)*2 bytes 8 bytes 2 bytes 8 bytes 2 bytes
Reader host
Overhead response telegram
CMD
ury 1 byte 2 bytes 2 bytes 2 bytes 0-12
Reader ID
Reader IDFrame
The URY command starts the reading of a defined data range of the current EPC transponders which have a defined EPC code. Several EPC transponders can be located in the reading area of the antenna when using this command.
Number of data words
ID
Head ID
EPC
2)
Result
3)
Ex flag
Access word
Data of the participating EPC transponders
Exten-
3)
sions
bytes
Memory bank
EPC
(2n+1)* 2 bytes
Memory address
Trans­ponder error code
2 bytes 2 bytes N*4
Number N data words
Data words
bytes
1)2)
1) These data are displayed in the order listed for each identified EPC transponder.
2) The response of the transponder is optional and only appears at result "00".
3) The result and Ex flag is only available in the first transmitted message in messages with several frames.
Example: Read access password >> URY01060102030405060708090A0BCD00000000000200000002
<< ury000000101060102030405060708090A0BCD000200000000
Product Manual - RFID Reader UF70 Certum 57
Chapter 7
Operation
M - EPC scanning The M command starts the scanning of the EPC transponder located in the
activated antenna located in the read area.
Host reader
CMD Reader ID Head ID
M 1 byte 1 byte
Reader host
Overhead response telegram
CMD
m 1 byte 2 bytes 2 bytes 2 bytes 0-12 bytes (2n+1)*2 bytes
Reader ID
Frame ID
2)
Result
3)
Ex flag
3)
Data of the participating EPC transponders
Extensions EPC
1)2)
1) These data are displayed in the order listed for each identified EPC transponder.
2) The response of the transponder is optional and only appears at result "00".
3) The result and Ex flag is only available in the first transmitted message in messages with several frames.
Example: >> M01
<< m0010001 Frame-ID "01"; result "00" and Ex flag "01" 0106470000000000000000000000 0106270000000000000000000000 0106110000000000000000000000 0106490000000000000000000000 0106100000000000000000000000 0106230000000000000000000000 0106420000000000000000000000 0106080000000000000000000000 0106310000000000000000000000 0106290000000000000000000000 0106120000000000000000000000 0106 the missing 12 bytes are included in the next message
<< m000 250000000000000000000000 0106480000000000000000000000 0106410000000000000000000000
0106380000000000000000000000
Product Manual - RFID Reader UF70 Certum 58
Operation
0106280000000000000000000000 0106030000000000000000000000 0106170000000000000000000000 0106190000000000000000000000 0106400000000000000000000000 0106050000000000000000000000 0106090000000000000000000000 0106010000000000000000000000 0106240000000000000000000000 0106460000000000000000000000 0106260000000000000000000000 0106180000000000000000000000 0106390000000000000000000000 0106060000000000000000000000
>> M01 << m0000A Result 0x0A, since no transponder is available
Chapter 7
>> URM01 << urm0000A Result 0x0A, since no transponder is available
>> URM01 << urm0000001 Frame-ID "00"; result "00" and Ex flag "01" 01060B0C090A0708050603040102
Product Manual - RFID Reader UF70 Certum 59
Chapter 7
Operation
URB – EPC
Bulk reading
The command URB starts a reading of EPC transponders over a predetermined period of time. The EPC of all detected transponders is reported after the completion of the time.
Host reader
CMD Reader ID Head ID Bulk time
URB 1 byte 1 byte 4 bytes
Reader host
Overhead response telegram
CMD
urb 1 byte 2 bytes 2 bytes 2 bytes 0-12
Reader IDFrame
ID
2)
Result
3)
Ex flag
3)
Data of the participating EPC transponders
Exten­sions
bytes
EPC
(2n+1)* 2 bytes
Trans­ponder error code
2 bytes 2 bytes N*4
Number N data words
1) These data are displayed in the order listed for each identified EPC transponder.
2) The response of the transponder is optional and only appears at result "00".
3) The result and Ex flag is only available in the first transmitted message in messages with several frames.
1)2)
Data words
bytes
Example: >> URB016400 ( read 100 ms !!) << urb0000001
0106010203040506070808080909 01060B0C090A0708050603040102 0106BBCC99AA7788556633441122
>> URB010064 << urb0000A Result 0x0A, since no transponder is available
Product Manual - RFID Reader UF70 Certum 60
Chapter 7
Operation
W – Write EPC code The W command starts the description of the EPC of a present EPC transponder.
Only one EPC transponder should be located in the write area of the antenna when using this command.
Host reader
CMD Reader ID Head ID Access word EPC
W 1 byte 1 byte 8 bytes (2n+1)*2 bytes
Reader host
Overhead response telegram
CMD
w 1 byte 2 bytes 2 bytes 2 bytes 0-12 bytes (2n+1)*2 bytes 2 bytes
Reader ID
Frame ID
Result
Ex flag
Data of the participating EPC transponders
Extensions
EPC
1)
Transponder error code
1) The transponder here delivers as a response the EPC code which was previously programmed.
2) The response of the transponder is optional and only appears at result "00". Example: Overwrite EPC transponder with a new EPC code
>> M01 (read old EPC code) << m000000101060102030405060708090A0BCD
>> W0100000000060102030405060708090A0B0C << w000000101060102030405060708090A0BCD8B
>> M01 (read new EPC code) << m000000101060102030405060708090A0B0C
Example: Several transponders are in the field; the action is therefore incorrect >> W0100000000060102030405060708090A0B0C << w0000B Result 0x0B
2)
Product Manual - RFID Reader UF70 Certum 61
Chapter 7
Operation
UWW – Write data
range of all EPC
transponders
Host reader
CMD
UWW 1 byte 1 byte 8 bytes 2 bytes 8 bytes 2 bytes N*4
Reader host
Overhead response telegram
CMD
uww 1 byte 2 bytes 2 bytes 2 bytes 0-12 bytes (2n+1)*2 bytes 2 bytes
Reader ID
Reader IDFrame
The UWW command starts to overwrite the defined data range of all EPC transponders located in the field. Several EPC transponders can be located in the write area of the antenna when using this command.
ID
Head ID
Result
2)
Access word
3)
Ex flag
Memory bank
Data of the participating EPC transponders
3)
Extensions EPC
Memory address
1)2)
Number of N data words
Transponder error code
Data words
bytes
1) These data are displayed in the order listed for each identified EPC transponder.
2) The response of the transponder is optional and only appears at result "00".
3) The result and Ex flag is only available in the first transmitted message in messages with several frames.
Example: Overwrite EPC transponder with a new EPC code >> UWW01000000000102000000060102030405060708090A0B0C
<< uww000000101060B0C090A070805060304010200 Control reading: >> M01 << m0000001 01060B0C090A0708050603040102
Example: Overwrite several EPC transponders with a new EPC code >> UWW01000000000102000000060102030405060708090A0B0C << uww0000001 010600000000C006D9DDB233083000
010600000000C006D9DDB233083000 0106BBCC99AA778855663344112200 Control reading: >> M01 << m0000001 01060B0C090A0708050603040102 01060B0C090A0708050603040102
Product Manual - RFID Reader UF70 Certum 62
Operation
01060B0C090A0708050603040102
EPC: 02010403060508070A090C0B EPC: 02010403060508070A090C0B EPC: 02010403060508070A090C0B
Example: Write EPC transponder access code >> UWW0100000000000200000002FFFFFFFF << uww00000010106BBCC99AA778855663344112200 Control reading:
>> X01FFFFFFFF000200000002 << x00000010106BBCC99AA77885566334411220002FFFFFFFF
Chapter 7
Product Manual - RFID Reader UF70 Certum 63
Chapter 7
Operation
UWZ – Write data
range of all EPC-
transponders
(defined EPC code)
Host reader
CMD
UWZ 1 byte 1 byte (2n+1)*2
Reader host
Overhead response telegram
CMD
uwz 1 byte 2 bytes 2 bytes 2 bytes 0-12 bytes (2n+1)*2
Reader IDHead
Reader ID
The UWZ command starts to overwrite the defined data range of all EPC transponders located in the field that have a defined EPC code. Several EPC transponders can be located in the write area of the antenna when using this command.
ID
Frame ID
EPC
bytes
2)
Result
Access word
8 bytes 2 bytes 8 bytes 2 bytes N*4
3)
Ex flag
Memory bank
Data of the participating EPC transponders
3)
Extensions EPC
Memory address
1)2)
bytes
Number N data words
Transponder error code
2 bytes
Data words
bytes
1) These data are displayed in the order listed for each identified EPC transponder.
2) The response of the transponder is optional and only appears at result "00".
3) The result and Ex flag is only available in the first transmitted message in messages with several frames.
Example: Overwrite several EPC transponders with the same EPC code >> UWZ01060B0C090A0708050603040102000000000102000000060102030 405060708090A0B0C << uwz000000101060B0C090A070805060304010200
Product Manual - RFID Reader UF70 Certum 64
Chapter 7
Operation
Control reading: >> M01 << m0000001 01060B0C090A0708050603040102 EPC: 02010403060508070A090C0B
>> M01 << m0000001 01060102030405060708090A0B0C
01060102030405060708090A0B0C 01060102030405060708090A0B0C
EPC: 0C0B0A090807060504030201 EPC: 0C0B0A090807060504030201 EPC: 0C0B0A090807060504030201
>> UWZ01060102030405060708090A0B0C000000000102000000061122334 45566778899AABBCC << uwz000000101060102030405060708090A0B0C00
>> M01 << m0000001
0106BBCC99AA7788556633441122 01060102030405060708090A0B0C 01060102030405060708090A0B0C
>> UWZ01060102030405060708090A0B0C00000000010200000006112233445 566778899AABBCC << uwz000000101060102030405060708090A0B0C00
>> UWZ01060102030405060708090A0B0C00000000010200000006112233445 566778899AABBCC
<< uwz000000101060102030405060708090A0B0C00 >> UWZ01060102030405060708090A0B0C00000000010200000006112233445
566778899AABBCC << uwz0000A >> M01
<< m0000001 0106BBCC99AA7788556633441122 0106BBCC99AA7788556633441122 0106BBCC99AA7788556633441122
EPC: 2211443366558877AA99CCBB EPC: 2211443366558877AA99CCBB EPC: 2211443366558877AA99CCBB
Product Manual - RFID Reader UF70 Certum 65
Chapter 7
Operation
UMW – Write data
range of all EPC
transponders
The UMW command starts to overwrite the defined data range of all EPC transponders located in the field. Several EPC transponders can be located in the write area of the antenna when using this command.
masked
Host reader
CMD
UMW 1 byte 1 byte 8 bytes 2 bytes 8 bytes 2 bytes N*4 bytes N*4 bytes
Reader host
Overhead response telegram
CMD
umw 1 byte 2 bytes 2 bytes 2 bytes 0-12 bytes (2n+1)*2 bytes 2 bytes
Reader IDHead
ID
Reader IDFrame
ID
Access word
2)
Result
3)
Memory bank
Ex flag
Memory address
Data of the participating EPC transponders
3)
Extensions EPC
Number of data words
1)2)
Data words
Mask
Transponder error code
1) These data are displayed in the order listed for each identified EPC transponder.
2) The response of the transponder is optional and only appears at result "00".
3) The result and Ex flag is only available in the first transmitted message in messages with several frames.
Example: The EPC transponder masks 1 data word of the EPC code, rewrite >> M01 << m00000010106BBCC99AA7788556633441122 EPC: 2211443366558877AA99CCBB
>> UMW01000000000102000000011111FFFF << umw00000010106BBCC99AA778855663344112200
>> M01 << m00000010106BBCC99AA7788556633441111
EPC: 1111443366558877AA99CCBB Example: The EPC transponder masks 2 data words of the EPC code, rewrite
>> UMW0100000000010200000002AABBCCDD0F0F0F0F << umw00000010106BBCC99AA778855663344111200
>> M01 << m00000010106BBCC99AA778855663C4D1A1B EPC: 1B1A4D3C66558877AA99CCBB
Product Manual - RFID Reader UF70 Certum 66
Chapter 7
Operation
UMZ – Write data
range of all EPC-
transponders
(defined EPC code)
The UMZ command starts to overwrite the defined data range of all EPC transponders located in the field that have a defined EPC code. Several EPC transponders can be located in the write area of the antenna when using this command.
masked
Host reader
CMD
UMZ 1 byte 1 byte (2n+1)*
Reader host
Overhead response telegram
CMD
umz 1 byte 2 bytes 2 bytes 2 bytes 0-12 bytes (2n+1)*2
Reade r ID
Reader ID
Head ID
Frame ID
EPC
2 bytes
2)
Access word
8 bytes 2 bytes 8 bytes 2 bytes N*4
Result
3)
Memory bank
Ex flag
Memory address
Data of the participating EPC transponders
3)
Extensions EPC
Number of data words
1)2)
bytes
Data words
bytes
Transpon­der error code
2 bytes
Mask
N*4 bytes
1) These data are displayed in the order listed for each identified EPC transponder.
2) The response of the transponder is optional and only appears at result "00".
3) The result and Ex flag is only available in the first transmitted message in messages with several frames.
Example: The EPC transponder masks 2 data words of the EPC code, rewrite >> M01
<< m000000101060102030405060708090A0B0C EPC: 0C0B0A090807060504030201
>> UMZ01060102030405060708090A0B0C000000000102000000029999888 80F0F0F0F << umz000000101060102030405060708090A0B0C00
>> M01 << m00000010106010203040506070808080909 EPC: 090908080807060504030201
Product Manual - RFID Reader UF70 Certum 67
Chapter 7
Operation
UBW – Erase block
of all EPC
transponders
Host reader
CMD Rea der ID Head ID
UBW 1 byte 1 byte 8 bytes 2 bytes 8 bytes 2 bytes
Reader host
Overhead response telegram
CMD Reader ID Frame ID
ubw 1 byte 2 bytes 2 bytes 2 bytes 0-12 bytes (2n+1)*
The UBW command starts to delete (erase) the defined blocks of all EPC transponders located in the field. Several EPC transponders can be located in the write area of the antenna when using this command.
2)
Result
Access word
3)
Memory bank
Ex flag
3)
Memory address
Data of the participating EPC transponders
Extensions EPC
1)2)
2 bytes
Number of N data words
1) These data are displayed in the order listed for each identified EPC transponder.
2) The response of the transponder is optional and only appears at result "00".
3) The result and Ex flag is only available in the first transmitted message in messages with several frames.
Transpon­der error code
2 bytes
Example: 2 data words of the user area of an EPC transponder are deleted >> M01
<< m000000101060B0C090A0708050603040102 >> UBW01060B0C090A070805060304010200000000030000000002
<< ubw000000101060B0C090A070805060304010200
Product Manual - RFID Reader UF70 Certum 68
Chapter 7
Operation
UBZ – Erase block
of all EPC
transponders
(defined EPC code)
Host reader
CMD
UBZ 1 byte 1 byte (2n+1)*2
Reader host
Overhead response telegram
CMD
ubz 1 byte 2 bytes 2 bytes 2 bytes 0-12 bytes (2n+1)*2
Reader ID
Reader IDFrame
The UBZ command starts to delete (erase) the defined data range of all EPC transponders located in the field that have a defined EPC code.
Several EPC transponders can be located in the write area of the antenna when using this command.
Head ID EPC
2)
ID
Result
bytes
3)
Access word
8 bytes 2 bytes 8 bytes 2 bytes
Ex flag
3)
Memory bank
Data of the participating EPC transponders
Extensions EPC
Memory address
1)2)
bytes
Number of N data words
Transponder error code
2 bytes
1) These data are displayed in the order listed for each identified EPC transponder.
2) The response of the transponder is optional and only appears at result "00".
3) The result and Ex flag is only available in the first transmitted message in messages with several frames.
Example: 2 data words of the user area of an EPC transponder are deleted >> M01
<< m000000101060B0C090A0708050603040102 >> UBZ01060B0C090A070805060304010200000000030000000002
<< ubz000000101060B0C090A070805060304010200
Product Manual - RFID Reader UF70 Certum 69
Chapter 7
Operation
ULW – Locking all EPC transponders
The ULW command starts to lock the defined data range of all EPC transponders located in the field. Several EPC transponders can be located in the write area of the antenna when using this command.
Host reader
CMD Reader ID Head ID Access word Payl oad
ULW 1 byte 1 byte 8 bytes 6 bytes
Reader host
Overhead response telegram
CMD
ulw 1 byte 2 bytes 2 bytes 2 bytes 0-12 bytes (2n+1)*2
Reader IDFrame
ID
2)
Result
3)
Ex flag
Data of the participating EPC transponders
3)
Extensions EPC
1)2
Transponder error code
2 bytes
bytes
1) These data are displayed in the order listed for each identified EPC transponder.
2) The response of the transponder is optional and only appears at result "00".
3) The result and Ex flag is only available in the first transmitted message in messages with several frames.
Example: Lock the ACCESS block of an EPC transponder Payload 0x0300C0; Permalock=1
>> ULW01FFFFFFFFC00003 << ulw00000010106BBCC99AA778855663344112200 Since Permalock was set, the kill password cannot be read or written after the locking process!
>> UWW0100000000000200000002FFFFFFFE << uww00000010106BBCC99AA778855663344112284 >> UWW01FFFFFFFF000200000002FEFEFEFE << uww00000010106BBCC99AA778855663344112284 Access area can no longer be written!
Product Manual - RFID Reader UF70 Certum 70
Chapter 7
Operation
ULZ – Locking all
EPC transponders
(defined EPC code)
Host reader
CMD Reader ID Head ID EPC Access word Payload
ULZ 1 byte 1 byte (2n+1)*2 bytes 8 bytes 6 bytes
Reader host
Overhead response telegram
CMD
ulz 1 byte 2 bytes 2 bytes 2 bytes 0-12 bytes (2n+1)*2 bytes 2 bytes
Reader IDFrame
The ULZ command starts to lock all EPC transponders with the corresponding EPC code located in the field. Several EPC transponders can be located in the write area of the antenna when using this command.
Data of the participating EPC transponders
3)
Extensions EPC
1)2)
Transponder error code
ID
2)
Result
3)
Ex flag
1) These data are displayed in the order listed for each identified EPC transponder.
2) The response of the transponder is optional and only appears at result "00".
3) The result and Ex flag is only available in the first transmitted message in messages with several frames.
Example: Lock the Kill block of an EPC transponder >> UWW0100000000000000000002FEFEFEFE << uww00000010106BBCC99AA778855663344112200
Kill password written Payload 0x0C00C0; Permalock=1
>> ULZ0106BBCC99AA7788556633441122FFFFFFFF00030C << ulz00000010106BBCC99AA778855663344112200 Since Permalock was set, the kill password cannot be read or written after the locking process!
>> UWW0100000000000000000002FEFEFEFE << uww00000010106BBCC99AA778855663344112284 Kill password can no longer be written!
Product Manual - RFID Reader UF70 Certum 71
Chapter 7
Operation
UKW – Killing all
EPC transponders
The UKW command starts to kill the defined data range of all EPC transponders located in the field. Several EPC transponders can be located in the write area of the antenna when using this command. The "kill" command is only performed for a transponder if the kill password was previously written and matches! The transponder can no longer be addressed after a successful kill command.
Host reader
CMD Reader ID Head ID Kill password Recommission
UKW 1 byte 1 byte 8 bytes 2 bytes
Reader host
Overhead response telegram
CMD
ukw 1 byte 2 bytes 2 bytes 2 bytes 0-12 bytes (2n+1)*2
Reader IDFrame
ID
2)
Result
3)
Ex flag
3)
Data of the participating EPC transponders
Extensions E PC
1)2)
bytes
Transponder error code
2 bytes
IMPORTANT
1) These data are displayed in the order listed for each identified EPC transponder.
2) The response of the transponder is optional and only appears at result "00".
3) The result and Ex flag is only available in the first transmitted message in messages with several frames.
Example: Kill an EPC transponder >> UKW01FEFEFEFEFE << ukw000000101060102030405060708090A0B0C00
>> UKW01FEFEFEFEFE << ukw0000A The transponder no longer responds!
>> M01 << m0000A The transponder no longer responds!
The respective transponder can no longer be addressed after a successfully conducted kill command.
This command cannot be undone.
Product Manual - RFID Reader UF70 Certum 72
Chapter 7
Operation
UKZ – Killing all
EPC transponders
(defined EPC code)
The UKZ command starts to kill all EPC transponders with the corresponding EPC code located in the field. Several EPC transponders can be located in the write area of the antenna when using this command. The kill command is only performed if the kill password was previously written! The transponder can no longer be addressed after a successful kill command.
Host reader
CMD Reader ID Head ID EPC Kill password Recommission
UKZ 1 byte 1 byte (2n+1)*2 bytes 8 bytes 2 bytes
Reader host
Overhead response telegram
CMD Reader ID
ukz 1 byte 2 bytes 2 bytes 2 bytes 0-12 bytes (2n+1)*2
Frame ID
2)
Result
3)
Ex flag
Data of the participating EPC transponders
3)
Extensions EPC
1)2)
bytes
Transponder error code
2 bytes
1) These data are displayed in the order listed for each identified EPC transponder.
2) The response of the transponder is optional and only appears at result "00".
3) The result and Ex flag is only available in the first transmitted message in messages with several frames.
EPC: 2211443366558877AA99CCBB Example: Kill an EPC transponder
>> M01 << m00000010106BBCC99AA7788556633441122
>> UKZ0106BBCC99AA7788556633441122FEFEFEFEFE << ukz00000010106BBCC99AA778855663344112200
The transponder no longer responds!
>> UKZ0106BBCC99AA7788556633441122FEFEFEFEFE << ukz0000A >> M01 << m0000A The transponder no longer responds!
>> M01 << m0000A The transponder no longer responds!
Product Manual - RFID Reader UF70 Certum 73
Chapter 7
Operation
IMPORTANT
The respective transponder can no longer be addressed after a successfully conducted kill command.
This command cannot be undone.
Product Manual - RFID Reader UF70 Certum 74
Chapter 7
Operation
T and UAM – Enable
read polling EPC
The T or UAM command starts the polling of EPC transponders on the respective antenna port, as long as it is not ended or the device is not reset!! Transponder messages only appear if EPC transponders are actually moved in the field. The polling is briefly stopped for intermediate read requests and is continued after the action.
If polling is activated via parameter "polling port" 0x28, polling is restarted automatically after reset. Only the so-called transponder messages appear when activating polling per parameter.
Host reader
CMD Reader ID Head ID
UAM T
Reader host (confirmation)
CMD Reader ID Result
uam t
1 byte 1 byte
1 byte 2 bytes
Reader host (transponder message)
Overhead response telegram Data of the EPC transponder
CMD Reader ID Direction Ex flag Extensions EPC
uam 1 byte 2 bytes 2 bytes 0-12 bytes (2n+1)*2 bytes 2 bytes
Reading cycles
1) These data are displayed when transponders are moved out of the field. Example: >> P02901 (UHFshow Going active)
<< p0 >> UAM01
<< uam000 << uam0FF010106BBCC99AA7788556633441122 EPC transponder enters the field: 2211443366558877AA99CCBB
<< uam0FF010106010203040506070808080909 EPC transponder enters the field: 090808080706050403020106
1)
Product Manual - RFID Reader UF70 Certum 75
Chapter 7
Operation
<< uam000010106BBCC99AA77885566334411225502 EPC transponder leaves the field:  EPC: 2211443366558877AA99CCBB
<< uam0000101060102030405060708080809095C02 EPC transponder leaves the field: 090908080807060504030201
<< uam0FF010106010203040506070808080909 EPC transponder enters the field: 090908080807060504030201
<< uam0000101060102030405060708080809090500 EPC transponder leaves the field: 090908080807060504030201
Product Manual - RFID Reader UF70 Certum 76
Chapter 7
Operation
UAA –
Enable Read
Polling Raw
The UAA command starts the polling of EPC transponders on the respective antenna port, as long as it is not ended or the device is not reset! With each polling run all transponders are shown - which may result in a high data traffic. The polling is briefly stopped for intermediate read requests and is continued after the action.
If polling is activated via parameter "polling port" 0x28, polling is restarted automatically after reset. Only the so-called transponder messages appear when activating polling per parameter.
Host reader
CMD Reader ID Head ID
UAA 1 byte 1 byte
Reader host (confirmation)
CMD Reader ID Result
uaa 1 byte 2 bytes
Reader host (transponder me ssage)
Overhead response telegram Data of the EPC transponder
CMD Reader ID Direction Ex flag Extensions EPC
uaa 1 byte 2 bytes 2 bytes 0-12 bytes (2n+1)*
2 bytes
1) These data are displayed when transponders are moved out of the field. Example: >> UAA01
<< uaa000 << uaa0FF010106BBCC99AA7788556633441122 EPC transponder enters the field: 2211443366558877AA99CCBB
<< uaa0FF010106010203040506070808080909 EPC transponder enters the field: 090808080706050403020106
<< uaa000010106BBCC99AA77885566334411225502 EPC transponder leaves the field:  EPC: 2211443366558877AA99CCBB
<< uaa0000101060102030405060708080809095C02
Reading
1)
cycles
2 bytes
Product Manual - RFID Reader UF70 Certum 77
Operation
EPC transponder leaves the field: 090908080807060504030201 << uaa0FF010106010203040506070808080909
EPC transponder enters the field: 090908080807060504030201 << uaa0000101060102030405060708080809090500
EPC transponder leaves the field: 090908080807060504030201
Chapter 7
Product Manual - RFID Reader UF70 Certum 78
Chapter 7
Operation
UAX – Polling Read
Data
The UAX command starts the asynchronous read (polling) of a defined data range of EPC transponders at the respective antenna port. The polling read data is executed as long as it is not ended or a reset is executed. T r ansponder messages only appear if EPC transponders are actually moved in the field. The polling is briefly stopped for intermediate read requests and is continued after the action.
Host reader
CMD Reader ID Head ID Access word
UAX 1 byte 1 byte 8 bytes 2 bytes 8 bytes 2 bytes
Reader host (confirmation)
CMD Reader ID Result
uax 1 byte 2 bytes
Reader host (transponder me ssage)
Overhead response telegram Data of the EPC transponder
Memory bank
Memory address
Number of data words
CMD Reader ID Direction Ex flag Extensions EPC
uax 1 byte 2 bytes 2 bytes 0-12 bytes (2n+1)*
2 bytes
1) These data are displayed in the order listed for each identified EPC transponder.
2) Data of the transponder are optional; they appear only at transponder error code "00".
Example: Read EPC (memory bank 01, address 02000000, length 06) >> UAX0100000000010200000006 << uax000 Polling successfully initiated
<< uax000 <<
uax0FF010106BBCC99AA77885566334411220006112233445566778899AABBC C << uax000010106BBCC99AA77885566334411221100 << uax0FF010106BBCC99AA77885566334411220006112233445566778899AABBC C
Reading
1)
cycles
2 bytes
Product Manual - RFID Reader UF70 Certum 79
Chapter 7
Operation
<< uax0FF0101060102030405060708080809090006090908080708050603040102 << uax000010106BBCC99AA77885566334411224700 << uax0FF010106BBCC99AA77885566334411220006112233445566778899AABBC C << uax000010106BBCC99AA77885566334411222400 << uax0000101060102030405060708080809097100 >> UAE0 << uae000
Product Manual - RFID Reader UF70 Certum 80
Chapter 7
Operation
UAW – Polling
Write Data
The UAW command starts the asynchronous writing (polling) of a defined data range of EPC transponders at the respective antenna port. The polling write data is executed as long as it is not ended or a reset is executed. Transponder messages only appear if EPC transponders are actually moved in the field. The polling is briefly stopped for intermediate read requests and is continued after the action.
Host reader
CMD
UAW 1 byte 1 byte 8 bytes 2 bytes 8 bytes 2 bytes N*4 bytes
Reader host (confirmation)
CMD Reader ID Result
uaw 1 byte 2 bytes
Reader host (transponder message)
Reader ID
Head ID
Access word
Memory bank
Memory address
Number of N data words
Data words
Overhead response telegram
CMD
uaw 1 byte 2 bytes 2 bytes 0-12 bytes (2n+1)*2 bytes 2 bytes
Reader ID
Direction Ex flag Extensions EPC
Data of the participating EPC transponders
Reading cycles
1) These data are displayed in the order listed for each identified EPC transponder.
Example: Write EPC (memory bank 01, address 02000000, length 06) >> UAW01000000000102000000060102030405060708090A0B0C << uaw000 Polling successfully initiated
<< uaw0FF010106BBCC99AA778855663344112200 << uaw000010106BBCC99AA77885566334411220500 << uaw0FF0101060B0C090A070805060304010200
<< uaw0000101060B0C090A07080506030401023000 << uaw0FF01010601020304050607080808090900 << uaw0000101060102030405060708080809090500 << uaw0FF0101060B0C090A070805060304010200 << uaw0000101060B0C090A07080506030401020700 << uaw0FF0101060B0C090A070805060304010200
1)
Product Manual - RFID Reader UF70 Certum 81
<< uaw0000101060B0C090A07080506030401024E00 >> UAE0
<< uae000 Stop polling
Control reading: >> M01 << m0000001
01060B0C090A0708050603040102 01060B0C090A0708050603040102
EPC: 02010403060508070A090C0B EPC: 02010403060508070A090C0B
Chapter 7
Operation
Product Manual - RFID Reader UF70 Certum 82
Chapter 7
Operation
UAZ – Polling Write
Masked Data
The UAZ command starts the asynchronous masked writing (polling) of a defined data range of EPC transponders at the respective antenna port. The polling write masked data is executed as long as it is not ended or a reset is executed. T r ansponder messages only appear if EPC tr ansponders are actually moved in the field. The polling is briefly stopped for intermediate read requests and is continued after the action.
Host reader
CMD
UAZ 1 byte 1 byte 8 bytes 2 bytes 8 bytes 2 bytes N*4
Reader host (confirmation)
CMD Reader ID Result
uaz 1 byte 2 bytes
Reader IDHead IDAccess
word
Memory bank
Memory address
Number of N data words
Data words
bytes
Mask
N*4 bytes
Reader host (transponder message)
Overhead response telegram
CMD Reader ID Direction Ex flag Extensions EPC
uaz 1 byte 2 bytes 2 bytes 0-12 bytes (2n+1)*2 bytes 2 bytes
Data of the participating EPC transponders
Reading cycles
1) These data are displayed in the order listed for each identified EPC transponder.
Example: 1 data word of the EPC masked write (memory bank 01, address 02000000, length 01, mask FFFF) >> M01
<< m000000101060B0C090A0708050603040102 EPC: 02010403060508070A090C0B
>> UAZ01000000000102000000011122FFFF << uaz000 Polling successfully initiated
<< uaz000 << uaz0FF0101060B0C090A070805060304010200 << uaz0000101060B0C090A07080506030401020500 << uaz0FF0101060B0C090A070805060304112200
1)
Product Manual - RFID Reader UF70 Certum 83
<< uaz0000101060B0C090A07080506030411224E00 >> UAE0
<< uae000 Stop polling
>> M01 << m000000101060B0C090A0708050603041122 EPC: 22110403060508070A090C0B
Chapter 7
Operation
Product Manual - RFID Reader UF70 Certum 84
Chapter 7
Operation
UAB – Erase Block The UAB command starts the asynchronous erase block (polling) of a defined data
range of EPC transponders at the respective antenna port. The polling erase block is executed as long as it is not ended or a reset is executed. Transponder messages only appear if EPC transponders are actually moved in the field. The polling is briefly stopped for intermediate read requests and is continued after the action.
IMPORTANT
Host reader
CMD
UAB 1 byte 1 byte (2n+1)*2 bytes 8 bytes 2 bytes 8 bytes 2 bytes
Reader host (confirmation)
CMD Reader ID Result
uab 1 byte 2 bytes
Reader host (transponder message)
Overhead response telegram
Reader ID
Erasing a block is only supported by a few transponders at this time!
Head ID
EPC
Access word
Data of the participating EPC transponders
Memory bank
Memory address
Number of N data words
1)
CMD Reader ID Direction Ex flag Extensions EPC
uab 1 byte 2 bytes 2 bytes 0-12 bytes (2n+1)*2 bytes 2 bytes
Transponder error code
1) These data are displayed in the order listed for each identified EPC transponder.
Example: Delete 2 data words of the USER memory area (memory bank 03, address 00000000, length 02) >> UAB0100000000030000000002 << uab000
Polling successfully initiated << uab0FF0101060B0C090A070805060304112200
Product Manual - RFID Reader UF70 Certum 85
Chapter 7
Operation
UAL – Lock EPC The UAL command starts the asynchronous lock EPC (polling) of defined EPC
transponders at the respective antenna port. The polling lock EPC is executed as long as it is not ended or a reset is executed. Transponder messages only appear if EPC transponders are actually moved in the field. The polling is briefly stopped for intermediate read requests and is continued after the action.
Host reader
CMD Reader ID Head ID Access word Payload
UAL 1 byte 1 byte 8 bytes 6 bytes
Reader host (confirmation)
CMD Reader ID Result
ual 1 byte 2 bytes
Reader host (transpo nder message)
Overhead response telegram
CMD Reader ID Direction Ex flag Extensions EPC
ual 1 byte 2 bytes 2 bytes 0-12 bytes (2n+1)*2 bytes 2 bytes
Data of the participating EPC transponders
Transponder error code
1) These data are displayed in the order listed for each identified EPC transponder.
Example: Lock kill password (Payload 0x0C0300 Permalock=1) >> UWW0100000000000000000002FEFEFEFE << uww000000101000005358004D9DDB233083000 Kill password written
>> UAL010000000000030C << ual000
Polling successfully initiated Since Permalock was set, the kill password cannot be read or written after the
locking process! << ual0FF010106000005358004D9DDB233083000 >> UWW0100000000000000000002FEFEFEFE
<< uww00000010106000005358004D9DDB233083084 Transponder error 0x84: Kill password is locked!
1)
Product Manual - RFID Reader UF70 Certum 86
Chapter 7
Operation
UAK – Kill
EPC transponder
The UAK command starts the asynchronous kill of EPC transponders (polling) at the respective antenna port. The polling kill EPC is executed as long as it is not ended or a reset is executed. Transponder messages only appear if EPC transponders are actually moved in the field. The polling is briefly stopped for intermediate read requests and is continued after the action. The "kill" command is only performed for a transponder if the kill password was previously written and matches! The transponder can no longer be addressed after a successful kill command.
Host reader
CMD Reader I D Head ID Kill password Recommission
UAK 1 byte 1 byte 8 bytes 2 bytes
Reader host (confirmation)
CMD Reader ID Result
uak 1 byte 2 bytes
Reader host (transponder message)
Overhead response telegram
CMD
uak 1 byte 2 bytes 2 bytes 0-12 bytes ( 2n+1)*2 bytes 2 bytes
Reader ID
Direction Ex flag Extensions EPC
Data of the participating EPC transponders
Transponder error code
1) These data are displayed in the order listed for each identified EPC transponder.
Example: Kill EPC transponder >> UAK01FEFEFEFE00 << uak000 Polling successfully initiated
<< uak0FF010106000005358004D9DDB233083000
EPC transponder successfully made unreadable! The transponder no longer responds!
Additional example: >> UAK010000000000
<< uak000 Polling successfully initiated << uak0FF0101060B0C090A070805060304112280
1)
Product Manual - RFID Reader UF70 Certum 87
<< uak0FF0101060B0C090A070805060304112280 << uak0FF0101060B0C090A070805060304112280 << uak0FF0101060B0C090A070805060304112280 Kill password not set
<< uak0FF010106000005358004D9DDB233083002 Wrong Kill password
Chapter 7
Operation
IMPORTANT
The respective transponder can no longer be addressed after a successfully conducted kill command.
This command cannot be undone.
Product Manual - RFID Reader UF70 Certum 88
Chapter 7
Operation
UAR – Polling
transponder rate
Host reader
CMD Reader ID Head ID
UAR 1 byte 1 byte
Reader host
CMD Reader ID Result Transponder rate
uar 1 byte 2 bytes 4 bytes
The UAR command provides the transponder rate of the activated polling action. A transponder list of a standard inventory is first established in the reader in all polling actions before the actual read/write action is executed. The transponder rate is formed via the inventory and specifies how many transponders are detected per second during the inventory.
Example: Read transponder rate at various times << n0 >> UAR01 << uar0000000
>> UAM01 << uam000 Polling Get EPCs started!
<< uam0FF0101060B0C090A0708050603040102 EPC: 02010403060508070A090C0B
<< uam0FF010106370000000000000000000000 EPC: 000000000000000000000037 << uam0FF010106069905358004D9DDB2330830 EPC: 300833B2DDD9048035059906 << uam0FF010106089905358004D9DDB2330830 EPC: 300833B2DDD9048035059908 << uam0FF010106160000000000000000000000 EPC: 000000000000000000000016 << uam0FF010106380000000000000000000000 EPC: 000000000000000000000038 << uam0FF010106060000000000000000000000 EPC: 000000000000000000000006 << uam0FF010106140000000000000000000000 EPC: 000000000000000000000014 << uam0FF010106400000000000000000000000 EPC: 000000000000000000000040 << uam0FF010106079905358004D9DDB2330830 EPC: 300833B2DDD9048035059907
Product Manual - RFID Reader UF70 Certum 89
<< uam0FF010106050000000000000000000000 EPC: 000000000000000000000005 << uam0FF010106340000000000000000000000 EPC: 000000000000000000000034 << uam0FF010106180000000000000000000000 EPC: 000000000000000000000018 << uam0FF010106430000000000000000000000 EPC: 000000000000000000000043 << uam0FF010106109905358004D9DDB2330830 EPC: 300833B2DDD9048035059910 << uam0FF010106170000000000000000000000 EPC: 000000000000000000000017 << uam0FF010106420000000000000000000000 EPC: 000000000000000000000042 << uam0FF010106070000000000000000000000 EPC: 000000000000000000000007 << uam0FF010106330000000000000000000000 EPC: 000000000000000000000033 << uam0FF010106150000000000000000000000 EPC: 000000000000000000000015 << uam0FF010106520000000000000000000000 EPC: 000000000000000000000052 << uam0FF010106390000000000000000000000 EPC: 000000000000000000000039 << uam0FF010106080000000000000000000000 EPC: 000000000000000000000008 << uam0FF010106410000000000000000000000 EPC: 000000000000000000000041 << uam0FF010106230000000000000000000000 << uar0006C00 << uam0FF010106230000000000000000000000 EPC: 000000000000000000000023 >> UAR01 << uar0007800 EPC: 000000000000000000000023 >> UAR01 << uar0005800 >> UAR01 << uar0005800 >> UAR01 << uar0005900 >> UAR01 << uar0006100 >> UAR01 << uar0006100
Chapter 7
Operation
Product Manual - RFID Reader UF70 Certum 90
>> UAR01 << uar0006C00 >> UAR01 << uar0006C00 >> UAR01 << uar0006C00 << uam0FF010106230000000000000000000000 EPC: 000000000000000000000023 >> UAR01 << uar0007800
Chapter 7
Operation
Product Manual - RFID Reader UF70 Certum 91
Chapter 7
Operation
UAE – End
polling
Host reader
CMD Reader ID
UAE 1 byte
Reader host
CMD Reader ID Result
uae 1 byte 2 bytes
The UAE command ends all asynchronous commands (polling) at all antenna ports. If the polling was started per polling port parameter, the parameter must also be reset to finally end this.
Example: end current polling action >> UAE0 << uae000
Product Manual - RFID Reader UF70 Certum 92
Chapter 7
Operation
UCX – Activate
polling NXP-
UCODE-G2X Read
Protect
The UCX command starts the asynchronous transponder function (polling operation) "ReadProtect" of all NXP-UCODE-G2X transponders in the field at the respective antenna port. The polling "ReadProtect" is executed as long as it is not ended or a reset is executed.
Transponder messages only appear if NXP-UCODE-G2X transponders are actually moved in the field. The polling is briefly stopped for intermediate read requests and is continued after the action.
Host reader
CMD Reader ID Head ID Access word
UCX 1 byte 2 bytes 8 bytes
Reader host (confirmati on)
CMD Reader ID Result
ucx 1 byte 2 bytes
Reader host (transponder message)
Overhead response telegram
CMD
ucx 1 byte 2 bytes 2 bytes 0-12 bytes (2n+1)*2 bytes 2 bytes
Reader ID
Direction Ex flag Extensions EPC
Data of the participating EPC transponders
Transponder error code
1) These data are displayed in the order listed for each identified EPC transponder.
Example: >> UCX0100000000 << ucx000 << ucx0FF0101060B0C090A070805060304112200
1)
Product Manual - RFID Reader UF70 Certum 93
Chapter 7
Operation
UCN – Activate
polling NXP-
UCODE-G2X Reset
Read Protect
The UCN command starts the asynchronous transponder function (polling operation) "ResetReadPro tect" of all NXP-UCODE-G2X transpon ders in the field at the respective antenna port. The polling "ResetReadProtect" is executed as long as it is not ended or a reset is executed.
Transponder messages only appear if NXP-UCODE-G2X transponders are actually moved in the field. The polling is briefly stopped for intermediate read requests and is continued after the action.
Host reader
CMD Reader ID Head ID Access word
UCN 1 byte 1 byte 8 bytes
Reader host (confirmation)
CMD Reader ID Result
ucn 1 byte 2 bytes
Reader host (transpo nder message)
Overhead response telegram
CMD
ucn 1 byte 2 bytes 2 bytes 0-12 bytes (2n+1)*2 bytes 2 bytes
Reader ID
Direction Ex flag Extensions EPC
Data of the participating EPC transponders
Transponder error code
1) These data are displayed in the order listed for each identified EPC transponder.
Example: >> UCN0100000000 << ucn000 << ucn0FF0101060B0C090A070805060304112200
1)
Product Manual - RFID Reader UF70 Certum 94
Chapter 7
Operation
UCC - Activate
Polling NXP-
UCODE-G2X Change EAS
The UCC command starts the asynchronous transponder function (polling operation) "Change EAS" of all NXP-UCODE-G2X transponders in the field at the respective antenna port. The polling "Change EAS" is executed as long as it is not ended or a reset is executed.
Transponder messages only appear if NXP-UCODE-G2X transponders are actually moved in the field. The polling is briefly stopped for intermediate read requests and is continued after the action.
Host reader
CMD Reader ID Head ID Access word EAS alarm bit
UCC 1 byte 1 byte 8 bytes 2 bytes
Reader host (confirmation)
CMD Reader ID Result
ucc 1 byte 2 bytes
Reader host (transpo nder message)
Overhead response telegram
CMD Reader ID Direction Ex flag Extensions EPC
ucc 1 byte 2 bytes 2 bytes 0-12 bytes (2n+1)*2 bytes 2 bytes
Data of the participating EPC transponders
Transponder error code
1) These data are displayed in the order listed for each identified EPC transponder.
Example: >> UCC010000000001 << ucc000 << ucc0FF0101060B0C090A070805060304112200
1)
Product Manual - RFID Reader UF70 Certum 95
Chapter 7
Operation
UCE - Activate
polling NXP-
UCODE-G2X EAS
alarm
The UCE command starts the asynchronous transponder function (polling operation) "EAS alarm" of all NXP-UCODE-G2X transponders in the field at the respective antenna port. The polling "EAS alarm" is executed as long as it is not ended or a reset is executed.
Transponder messages only appear if NXP-UCODE-G2X transponders are actually moved in the field. The polling is briefly stopped for intermediate read requests and is continued after the action.
Host reader
CMD Reader ID Head ID
UCE 1 byte 1 byte
Reader host (confirmation)
CMD Reader ID Result
uce 1 byte 2 bytes
Reader host (transpon der message)
Overhead response telegram Data of the EPC transponder
CMD Reader ID Direction Ex flag Extensions EPC
uce 1 byte 2 bytes 2 bytes 0-12 bytes (2n+1)*2 bytes
Example: >> UCE01
<< uce000
Product Manual - RFID Reader UF70 Certum 96
Chapter 7
Operation
UFW – Set filter
data
By setting and activating so-called filters, it is possible to only let certain EPC transponders participate in the inventory. A total of 8 filters can be defined. The UFW command makes it possible to set the data for a filter.
Host reader
CMD
UFW 1 byte 2 bytes 2 bytes 2 bytes 2 bytes 2 bytes 8 bytes 2 bytes 2 *
Reader ID
Filter Num­ber
On/ Off
Target
1)
Action
1)
Memory bank
Memory address
Number of mask bits N
Filter mask
Round up (N /
8) bytes
1) See EPC Global specification "Select command" for a description
Reader host
CMD Reader ID Result Filter Number
ufw 1 byte 2 bytes 2 bytes
Example: >> UFW001000000010200000010F0F0
<< ufw00001
Product Manual - RFID Reader UF70 Certum 97
Chapter 7
Operation
UFR – Read filter
data
By setting and activating filters, it is possible to only let certain EPC tr ansponders participate in the inventory. A total of 32 filters can be defined. The UFR command allows reading of data of a filter.
Host reader
CMD Reader ID Filter Number
UFR 1 byte 2 bytes
Reader host
CMD
ufr 1 byte 2 bytes 2 bytes 2
Reader ID
Result
Filter Number
On/ Off
bytes
Target
1)
2 bytes 2 bytes 2 bytes 8 bytes 2 bytes 2 *
Action
1)
Memory bank
Memory address
1) See EPC Global specification "Select command" for a description Example:
>> UFR001 << ufr00001000000010200000010F0F0
Number of mask bits N
Filter mask
Round up (N /
8) bytes
Product Manual - RFID Reader UF70 Certum 98
Chapter 7
Operation
UFP – Set filter By setting and activating so-called filters, it is possible to only let certain EPC
transponders participate in the inventory. A total of 32 filters can be defined. The use of a particular filter can be switched on and off by the UFP command.
Host reader
CMD
UFP 1 byte 2 bytes 2 bytes 2 bytes 2 bytes 2 bytes 8 bytes 2 bytes 2 *
Reader ID
Filter Num­ber
On/ Off
Target
1)
Action
1)
Memory bank
Memory address
Number of mask bits N
Filter mask
Round up (N /
8) bytes
1) See EPC Global specification "Select command" for a description
Reader host
CMD Reader ID Result Filter Number
ufp 1 byte 2 bytes 2 bytes
Example: Activate filter 01 >> UFP001FF << ufp00001
Filter 01 was activated >> UFG001
<< ufg00001FF Current status of filter 01
>> UFR001 << ufr00001FF0000010200000010F0F0 Control read of filter data 01
Example: Deactivate filter 01 >> UFP00100
<< ufp00001 Filter 01 was deactivated
Product Manual - RFID Reader UF70 Certum 99
Chapter 7
Operation
UFG – Read filter
data
Host reader
CMD Reader ID Filter Number
UFG 1 byte 2 bytes
Reader host
CMD Reader ID Result Filter Number On/Off
ufg 1 byte 2 bytes 2 bytes 2 bytes
By setting and activating so-called filters, it is possible to only let certain EPC transponders participate in the inventory. A total of 32 filters can be defined. The status of a particular filter can be determined by the UFG command.
Example: Read status of filter 01 >> UFG001
<< ufg0000100 ”00”: Filter 01 is not active
UFP001FF << ufp00001
Filter 01 was activated >> UFG001
<< ufg00001FF "FF": Filter 01 is active
Product Manual - RFID Reader UF70 Certum 100
Loading...