The product manual must be read prior to the initial start-up. Observe the safety instructions!
Store for future use. This documentation is not subject to revisions.
ID12003705/2012
Information
This product manual corresponds with "Directiv e 1999/5/EC of the European P arliament
and the Council on radio equipment and telecommunications transmission equipment
and the mutual recognition of the conformity".
This product manual is addressed to the operating company who must pass it on to the
personnel responsible for installation, connection, use and repairs of the machine.
The plant manager must ensure that the information contained in this product manual and
in the accompanying documents has been read and understood.
The product manual must be stored in a place that is familiar and easily accessible to
employees and must be consulted whenever an employee is unsure of how to proceed.
The manufacturer does not assume any responsibility for injuries to persons or animals, or
damage to property or to the device arising from incorrect use or disregard or insufficient
consideration of the safety criteria contained in this product manual or based on
modifications of the device or the use of unsuitable spare parts.
The copyright for this product manual is held solely by
Brooks Automation (Germany) GmbH
RFID Division
Gartenstr. 19
95490 Mistelgau
Germany
or its legal successor.
Reproducing or circulating this product manual is only permitted with the exclusive
approval of the copyright holder. This also applies if only excerpts of the product
manual are copied or circulated. These requirements also apply for circulating the
product manual in digital form.
Status: May 2012
Information
Archiving
Store the product manual in the vicinity of the device!
Always keep the product manual handy!
Symbols and signal words
The following symbols and signal words are used in this documentation. The
combination of a pictograph and a signal word classifies the respective safety
information. The symbol can vary depending on the type of danger.
SymbolSignal word Description
DANGERThis signal word must be used if death or
irreversible damage to health can occur if
Death
WARNINGThis signal word indicates bodily injuries
the hazard information is not followed.
and property damage including injuries,
accidents, and health risks.
property damage
Risk of injury and
No damage
CAUTIONThis signal word indicates a risk of
property damage. In addition, there is a
slight risk of injuries.
ATTENTIONThis signal word warns of malfunctions
and may only be used if no damage to
health can occur.
IMPORTANTThis signal word indicates cross-
references and ways in which operations
are facilitated. It excludes all risks of
property damage and injury risks.
Information
Target group
This product manual is addressed to personnel with the following areas of
responsibility:
Area of responsibilityCompetence
InstallationSpecialized personnel
Commissioning, operation and
Persons who have been instructed and, if required, trained by a specialist as to
the tasks assigned to them, the possible risks of incorrect behavior and the
required safety equipment and safety measures.
Specialized personnel
Persons who can evaluate the work assigned to them and recognize possible risks
based on their specialized training, knowledge, experience and familiarity with
the relevant standards.
This chapter gives you an overview of the following topics:
■ Designated use
■ Incorrect use
Serial number 00 – 0001 – UF70
Part numberTUG-E1ML-4O00-F4-00E1 ETSI version, protection class IP40
TFG-E1ML-4O00-F4-00E1 FCC version, protection class IP40
TUG-E1ML-4O00-R4-00E1 ETSI version, protection class IP65
TFG-E1ML-4O00-R4-00E1 FCC version, protection class IP65
This product is exclusively developed for reading and writing of passive UHF
transponders (e.g. EPC Class1 Gen2). Any other use of this device constitutes
misuse and renders the user's authority to install and operate the device invalid.
This product is designed to be mounted and operated in an industrial setting as a
built-in-device only. It is not designed to be used as a stand-alone or portable
device or in a non-industrial setting, such as a household, vehicle or in the openair.
Intended use also includes the following:
■following all instructions in the product manual
User information
FCC
IMPORTANT
■following all safety information
Before using the device, the user should ensure that the national approval
requirements for use are met.
Changes or modifications not expressly approved by the party responsible for
compliance could void the user’s authority to operate the equipment.
This equipment has been tested, and found to comply with the limits for a Class
A digital device, pursuant to part 15 of the FCC Rules. These limits are
designed to provide reasonable protection against harmful interference when
the equipment is operated in a commercial environment. This equipment
generates, uses, and can radiate radio frequency energy and, if not installed
and used in accordance with the instruction manual, may cause harmful
interference to radio communications. Operation of this equipment in a
residential area is likely to cause harmful interference, in which case the user
will be required to correct the interference at his own expense.
1.2Incorrect use
Incorrect use, which can endanger the device, the user and third parties,
includes:
nbb
■the use of the device, contrary to its intended use ( Designated use)
■modifying, extending or reconstructing the device without first consulting
Brooks Automation (Germany) GmbH
■operating the device when there are obvious problems
Product Manual - RFID Reader UF70 Certum8
Chapter 1
Identification
WARNING
WARNING
Risk of injury through incorrect modifications
There are risks from unauthorized modifications to the machine.
Only use original spare parts from the manufacturer. Do not make any changes,
attachments or modifications to the device without the approval of Brooks
Automation (Germany) GmbH.
Risk of injury and malfunction of machine operation through
incorrect use
There are risks attached to using the device incorrectly.
Use the device exclusively according to its intended use.
Product Manual - RFID Reader UF70 Certum9
Chapter 2
Declaration of Conformity
2Declaration of Conformity
Konformitätserklärung gemäß dem Gesetz über Funkanlagen und
Telekommunikationsendeinrichtungen (FTEG) und der Richtlinie
1999/5/EG (R&TTE)
Declaration of Conformity in accordance with the Radio and Telecommunications
Terminal Equipment Act (FTEG) and Directive 1999/5/FC (R&TTE Directive)
Hersteller / Verantwortliche Person
Manufacturer / responsible person
erklärt, dass das Produkt
declares that the product
Type (ggf. Anlagenkonfiguration mit Angabe der
Module)
Type (if applicable, configuration including the
modules)
Telekommunikations(Tk-)endeinrichtung
Telecommunications terminal equipment
Verwendungszweck
Intended purpose
Geräteklasse
Equipment class
bei bestimmungsgemäßer Verwendung den grundlegenden Anforderungen des
§ 3 und den übrigen einschlägigen Bestimmungen des FTEG (Artikel 3 der
R&TTE) entspric ht .
complies with the essential requirements of § 3 and the other relevant provisions
of the FTEG (Article 3 of the R&TTE Directive), when used for its intended
purpose.
This chapter gives you an overview of the following topics:
■ Liability and warranty
■ Objectives of the product manual
3.1Liability and warranty
The “General sales and delivery conditions” of Brooks Automation (Germany)
GmbH always apply.
The warranty period is 12 months beginning with the delivery of the device, which
is verified by the invoice or other documents.
The warranty includes repairs of all damage to the device that occurs during the
warranty period and was clearly caused by material or manufacturing defects.
Liability and warranty claims in cases of injury to persons or damage to property
are excluded if they can be attributed to one or more of the following causes:
■incorrect use of the device
■disregard of the information in the product manual
■unauthorized structural modifications of the device
■insufficient maintenance and repairs
■disasters due to foreign objects or force majeure
3.2Objectives of the product manual
This product manual serves as support and contains all the necessary safety
information that must be followed for general safety, transport, installation and
operation.
This product manual with all safety information (as well as all additional
documents) must be:
■followed, read and understood by all persons working with the device
(especially the safety information)
■easily available to all persons at all times
■immediately consulted in case of the least doubt (safety)
Product Manual - RFID Reader UF70 Certum12
General Instructions
Objectives:
■avoid accidents
■increase the service life and reliability of the device
■reduce costs due to production downtimes
Chapter 3
nbb
Product Manual - RFID Reader UF70 Certum13
Safety Instructions
4Safety Instructions
This chapter gives you an overview of the following topics:
■ Area of application and symbols
■ Obligations
■ ESD instructions
■ Residual risks
■ Additional information
4.1Area of application and symbols
Chapter 4
DANGER
Danger to life, risk of injuries or damage to property
Risks exist when disregarding the product manual and the safety instructions
therein.
Carefully read the product manual before initial commissioning. Perform the
required safety measures before initial commissioning.
Follow the general safety information as well as the special safety information
given in other chapters.
The device was constructed according to state-of-the-art technology and
recognized safety regulations. In order to prevent any risks to life and limb of the
user, third parties or damage to the device, only use the device for its intended
purpose and in perfect condition with regard to safety.
Bodily injuries and/or property damage resulting from non-compliance with the
instructions given in the product manual are the responsibility of the company
operating the device or of the assigned personnel. Malfunctions that could
compromise safety must be eliminated immediately.
Product Manual - RFID Reader UF70 Certum14
Safety Instructions
4.1.1Safety symbols – in compliance with 4844-2
Chapter 4
WARNING
Risk of injuries when disregarding safety symbols
Risks exist when disregarding warnings in the product manual.
Please heed the warnings.
Special safety symbols in accordance with DIN 4844-2 are used in the
corresponding passages in the text of this product manual and require special
attention depending on the combination of signal word and symbol.
4.1.2Warning symbols
Warning against
hazardous area
Warning against
electromagnetic
radiation
Warning against
hazardous electrical
voltage
Warning against
flammable materials
nbb
Warning against
potentially explosive
atmosphere
4.1.3Prohibition symbols
Unauthorized access
is prohibited
Switching is
prohibited
Warning against
electrostatically
sensitive components
Fire, open flame and
smoking is prohibited
Prohibition
Product Manual - RFID Reader UF70 Certum15
4.1.4Other symbols
Chapter 4
Safety Instructions
Dispose of packing
material according to
regulations
Important
information
Disconnect from
power supply
Recycling
Refer to manual
Product Manual - RFID Reader UF70 Certum16
Chapter 4
Safety Instructions
4.2Obligations
4.2.1Operating company’s obligations
The safe condition and use of the device is a requirement for the safe operation of
the device. The company operating the device therefore has the obligation to
ensure that the following points are adhered to:
The device may only be operated by trained and authorized personnel!
Avoid unsafe and/or dangerous work procedures! If necessary, check
employees' actions!
Only permit personnel to be trained or instructed within the scope of a
general training work on the device under the supervision of an
experienced person!
Personnel must have understood the product manual. Have this confirmed
by signature!
Precisely establish responsibilities according to the various task areas
(operation, installation)!
Operating personnel must be committed to immediately reporting to their
superior any identifiable safety deficiencies which occur!
4.2.2Operating personnel’s obligations
Operators are obligated to contribute to the prevention of work accidents and the
consequences of them by their personal conduc t.
Product Manual - RFID Reader UF70 Certum17
Chapter 4
Safety Instructions
WARNING
CAUTION
Risk of injuries due to insufficient personnel qualifications
A risk exists for personnel and the proper operation due to insufficiently
qualified personnel.
Only trained personnel may operate the device. New operators must be
instructed by the current operating personnel. The operating company must
precisely regulate and monitor the personnel's areas of responsibility and
competence.
Personnel for the areas of responsibility mentioned above must have the
corresponding qualification for this work (training, instructions). If necessary,
this can be done by the manufacturer on behalf of the operating company.
All warranty claims are void when disregarded.
4.3ESD instructions
Static electricity can damage electronic components in the device. All persons
installing or maintaining the device must be trained in ESD protection.
ESD protective measures must be applied when opening the device.
Disconnect the power supply prior to removing or adding components.
Discharge your body and all tools used prior to contacting any components
on the interior of the device!
Touch electronically sensitive parts carefully and at the corners!
4.4Residual risks
Even if all precautions have been taken, there may be unapparent residual risks!
Adhering to the safety instructions, the intended use, and the product manual as
a whole can reduce residual risks!
Product Manual - RFID Reader UF70 Certum18
Chapter 4
Safety Instructions
DANGER
ATTENTION
DANGER
Risks from electric current
Electrical energy remains in lines, equipment and devices even when the device
is switched off.
Only allow qualified electricians to perform work on the electrical supply
system.
Disconnect the device from the power supply system if active parts of the
device can be accessed by using tools. Access is only permitted for authorized
personnel.
Regularly check the electrical equipment of the device. Regularly check all
moving cables for damage within the scope of maintenance and repairs.
Risk of fire and explosions
Fire and explosions may occur within the vicinity of the device.
WARNING
Smoking, open flames and fire are strictly prohibited in the vicinity of the
device. Do not store any flammable liquids within the hazardous area. Keep a
fire extinguisher in the vicinity of the device.
Warning against electromagnetic radiation
Electromagnetic radiation develops when transmitting and receiving data.
Set the antenna in such a position that it is not in the vicinity of or touches a
human body while transmitting.
Product Manual - RFID Reader UF70 Certum19
Chapter 4
Safety Instructions
4.5Additional information
■Read and understand all safety and product manuals prior to installing
and operating the device.
■This documentation was written for specifically trained personnel.
Installation, operation and troubleshooting may only be carried out by
specifically trained personnel.
■Retain these instructions. Keep this documentation in a location that is
accessible to all personnel involved with the installation, use and
troubleshooting of the device.
■Follow all warnings. Follow all warnings on and in the device and in the
documentation.
■Install the device only in accordance with the manufacturer's
instructions.
■Use only the accessories and cables from the manufacturer.
■Troubleshooting that is not described in Chapter Service and
Troubleshooting may only be performed by the manufacturer.
■People with hearing aids should be aware that the radio signals emitted
by the device can cause annoying noises in the hearing aid.
■Do not connect the device to power supplies such as normal household
electrical outlets. The device should only be connected to power supplies
as specified in this document.
■When removing a cable, only pull on the plug and not on the cable.
Connect cable connectors straight and carefully to avoid damaging the
contacts.
■Never overbend the antenna cables or subject these to mechanical
forces.
■When replacement parts are required, use only the replacement parts
that were specified by the manufacturer. Unauthorized spare parts can
result in fire, electric shock or other hazards.
Product Manual - RFID Reader UF70 Certum20
Chapter 4
Safety Instructions
Rules and
regulations
The provisions of the accident prevention regulations of the government safety
organizations always apply to all work on the device.
■applicable binding regulations at the place of use
■the recognized technical rules for safe and professional work
■existing environmental protection regulations
■other applicable regulations
Product Manual - RFID Reader UF70 Certum21
Chapter 5
Product Specifications
5Product Specifications
This chapter gives you an overview of the following topics:
■ Function
■ Images
■ Description of the components
■ Technical data
5.1Function
The Brooks RFID UF70 Certum reader is a multiprotocol reader for reading
passive transponders in the frequency range of 865 MHz to 868 MHz for Europe
and 902 MHz - 928 MHz for the FCC.
The device operates at 2 W and 1 W HF power at the antenna jack depending on
the registration area.
When delivered, the device can read and write transponders according to the EPC
Gen2 standard. Other protocols can be added via software updates.
The device has several high performance interfaces for communications.
The reader has four antenna ports for the connection of transmitting and
receiving antennas for communicating with RFID transponders.
The device also has various interfaces for the connection with the PC, depending
on the configuration stage. Power is supplied via a 3-pin M8 connector.
1Antenna port LED5Mode LED
2Test Error LED6Mode button
3Test OK LED7Reset button
4Test button8Power LED
Product Manual - RFID Reader UF70 Certum25
Chapter 5
Product Specifications
5.3Description of the components
ComponentsDescription
Power LEDIf the correct voltage is applied to the device, the
Power LED is green and the device is operational.
Reset buttonPressing this button initiates a power-reset of the
device. The reset button must be pressed for at least
three seconds until all the LEDs of the foil keypad
simultaneously start and the hardware reset is
executed.
Mode buttonIf the mode button and the reset button are
simultaneously pressed at a powerup reset for about
15 seconds until all the LEDs of the keypad light up for
the second time, the reader will be reset to the default
state (default factory setting).
Mode LEDCurrently no use.
Test buttonPressing this button switches the device to the reading
test mode and is used to select the antenna ports. If
the button is pressed for a longer time (at least 2
seconds), then the test mode is activated (T est OK LED
and Test Error LED both briefly come on) or disabled
(Test OK LED and Test Error LED both go out). Briefly
pressing the buttons when the test mode is activated
results in switching to the next antenna port.
Test OK LEDWhen a transponder in the test mode can be
successfully identified, this LED turns green.
Test Error LEDWhen a transponder in the test mode cannot be
successfully identified, this LED turns red.
Antenna port LED 1
to 4
Antenna portsPorts to connect the antennas.
I/O ports 1 to 4A digital input and output can be connected to each
These LEDs signal the data traffic to the respective
antenna ports. Once data is read or written via the
antenna port 1 (above), the antenna port LED 1
(above) turns green.
antenna port. A 3 wire sensor or dry contact is possible
as the input. The output can operate a LED without a
series resistor or directly switch 5 V DC
(Imax = 100 mA).
Product Manual - RFID Reader UF70 Certum26
Chapter 5
Product Specifications
ComponentsDescription
RS232 interfaceCommunications with the device can be made via the
serial interface (9 pin sub-D socket). Baudrates of
1,200 Bd up to 57,600 Bd are possible.
Ethernet interfaceCommunications with the device can be made via the
10/100 BaseT interface.
Voltage supply
connection
Contact for connecting the 24 V DC voltage supply
Product Manual - RFID Reader UF70 Certum27
Product Specifications
5.4Technical data
Technical data
Voltage24 V DC ± 10%
Power consumptionapprox. 0.8 A at 24 V
Operating temperature-20 to 50 °C
-4 °F to 122 °F
Storage temperature-40 to 85 °C
-40 °F to 185 °F
Chapter 5
Permissible humidity at
50 °C / 122 °F
Protection classIP 40 (optional IP 65)
Housing materialPassivated aluminum
Weightapprox. 1,500 g
Air interfaceISO 18000-6C (EPC Global Class 1 Gen2)
Frequency range Europe865 – 868 MHz
Frequency range FCC902 – 928 MHz
Radiation power< 2 Watt ERP
Transmitting powerprogrammable in 1 dB steps
Read / write rangeup to 8 m
Serial interface RS2321,200 Bd – 57,600 Bd
Ethernet interface10/100 BaseT
25 – 85%
Product Manual - RFID Reader UF70 Certum28
Chapter 5
Product Specifications
Device labelThe device label with the CE mark, part/serial number and MAC address is on the
device housing.
1Part number
2Serial number
3MAC address
Product Manual - RFID Reader UF70 Certum29
Installation
6Installation
This chapter gives you an overview of the following topics:
■ Safety instructions
■ Qualified installation personnel
■ Unpacking
■ Assembly of the device
■ Antenna installation
■ Power supply
■ Terminal connection
■ External input and output (optional)
■ Commissioning
Chapter 6
CAUTION
Refer to manual
Follow the general safety instructions in the chapter
Safety Instructions.
6.1Safety instructions
The device is exclusively designed for indoor use in an industrial environment.
Installation is only allowed in an interior room at a constant temperature
between -20 °C / -4 °F and +50 °C / 122 °F, and a relative humidity between
25% and 80%.
Never use the device near or in water.
Never pour liquids of any type over the device. If the device should accidentally
come in contact with liquid, disconnect it and have it checked by a technician.
Do not install the device near heat sources such as radiators, heat registers,
stoves or other devices (including amplifiers) that generate heat.
Do not install the device in a flammable environment.
Product Manual - RFID Reader UF70 Certum30
Chapter 6
Installation
CAUTION
CAUTION
Never expose the device to extreme temperature fluctuations, since otherwise
condensation develops in the device and causes damage.
Do not install the device in the vicinity of voltage lines or other power lines with
which they could collide (for example, drilling), which could result in serious
injuries or even death.
The device (especially the antenna) should not be installed in the immediate
vicinity of electrical equipment such as medical devices, monitors, telephones,
TV sets, magnetic disks and metal objects.
This could result in reduced read and write ranges.
Never use the device in explosive areas (e.g. paint warehouses).
Do not use the device in areas where it is exposed to vibrations or shocks.
nbb
ATTENTION
The installation location must be adequately illuminated during the installation.
Never install the device during a lightning storm.
Verify that the installation meets the requirements of the (country-specific)
FCC for human exposure to radio frequencies.
Product Manual - RFID Reader UF70 Certum31
Chapter 6
Installation
ATTENTION
CAUTION
CAUTION
When determining the installation site, keep in mind the length of the antenna
wire and the read/write range of the antenna used.
6.2Qualified installation per sonnel
The installation is to be carried out by specially trained personnel only. If you
are uncertain about their qualification, contact the manufacturer.
Installing the device without special training can result in damage to the reader
and/or connected devices.
Disposing of the
packaging material
6.3Unpacking
The device and the accessories are packed under clean-room conditions. In order
to maintain this condition, the device must also be unpacked in clean-room
conditions.
The packaging material consists of cardboard and foil. Dispose of these
materials separately and under the respective legal regulations of your country.
Product Manual - RFID Reader UF70 Certum32
6.4Assembly of the device
Chapter 6
Installation
ATTENTION
Installation
dimensions
The mounting surface must be stable, non-flammable, dry and clean.
If necessary, clean it before you install the device.
The device must be installed so that air can freely circulate vertically through
the heat sink, and the operating and environmental conditions specified under
Technical data are met at all times.
Product Manual - RFID Reader UF70 Certum33
6.5Antenna installation
Chapter 6
Installation
ATTENTION
Consider the required read and write ranges when installing the antenna. The
reader can only be used properly if the transponder is located within the
individual reading/writing range of the respective antenna.
If the transponder is very close to the antenna, the transponder may be
detuned by the metal of the antenna and a reading/writing is not possible. We
recommend keeping a minimum distance between transponder and antenna of
about 10 mm.
6.5.1Positioning the antenna
Reliable reading and writing depends on the distance and orientation of the
transponder from the antenna.
Depending on the polarization of the antenna and the design of the transponder,
the orientation of the two together should be considered when a reliable
identification must be guaranteed.
More information on application-specific antenna structures can be obtained from
our support team.
DANGER
6.5.2Available antenna types
Different types of antennas are available on request.
6.6Power supply
Risk of death from dangerous voltage
Risks exist when supplying the device with the incorrect voltage.
Only use cables, plugs and adapters supplied by the manufacturer.
Observe power ratings of the technical data ( Technical data).
The device can be connected to an internal power supply of the system or to an
external power supply.
Once the device is connected to the power supply, the power LED lights up.
Product Manual - RFID Reader UF70 Certum34
Chapter 6
PinSignal
1GND
2+24 V DC
3GND
Pins 1 and 3 are both grounded.
PinDB9
1NC
2TxD
3RxD
4NC
5GND
6NC
7NC
8NC
9NC
Installation
If the LED does not light up, please refer to chapter Error display with LED.
6.7Terminal connection
The serial interface is a Sub-D socket (9-pin).
A normal RS232 extension cable can be used.
Product Manual - RFID Reader UF70 Certum35
Chapter 6
Installation
6.8External input and output (optional)
The following I/O versions are possible:
A digital input and output can be connected to each antenna port.
A 3 wire sensor or dry contact is possible as the input.
The output can operate a LED without a series resistor or directly switch 5 V DC.
6.9Commissioning
6.9.1Required operating conditions
The following two conditions must be fulfilled for operating the device:
An antenna must be connected correctly to the reader.
Connect the power supply and switch on the device (if a POE is not used).
The transponder must be located within the individual reading/writing
range of the antenna (for testing)!
6.9.2Parameters of the serial interface
Baudrate 57,600
Data bits8
Stop bit 1
Parity No
Product Manual - RFID Reader UF70 Certum36
Login
Chapter 6
Installation
6.9.3Parameters of the Ethernet interface
The Ethernet is connected via an Ethernet module.
Tools are available that allow the Ethernet settings to be configured.
By using Discovery Tools, all Ethernet devices located in the network can be
found.
The respective device can be configured via a web server and a web browser via a
double click. If the TCP / IP address is known, the web server can also be directly
opened in a browser also follows:
http://xxx.xxx.xxx.xxx/
User: "root"
Password: "dbps"
xxx.xxx.xxx.xxx – currently set IP address
The IP address can be set via the "network" link. The settings are transferred with
the "apply" button and the device is then rebooted.
Product Manual - RFID Reader UF70 Certum37
Configuration
Chapter 6
Installation
IMPORTANT
Digi Device
Discovery
The "Factory Default Settings" must not be set under any circumstances as th ey
are not the factory settings of Brooks. Any other settings of the Ethernet device
(exept the IP address) must not be changed. Otherwise a fault-free
communication cannot be guaranteed by Brooks.
The tool displays all devices that have a Digi Connect ME. Devices that are not in
the same subnet are also displayed. The IP address can be set directly via
"configure network settings". Fixed IPs or DHCPs are possible. The web server of
the device can be accessed directly via the "open web interface".
Product Manual - RFID Reader UF70 Certum38
Selection window
Chapter 6
Installation
Input window
Product Manual - RFID Reader UF70 Certum39
Operation
7Operation
This chapter gives you an overview of the following topics:
■ Operating personnel
■ Communication protocol ASC-I1
■ Additional information
7.1Operating personnel
Chapter 7
CAUTION
The UF70 Certum reader should only be operated by specially trained
personnel.
If you have doubts about the required qualifications, contact the manufacturer.
Operating the device without special training can result in damage to the reader
and/or connected devices.
7.2Communication protocol ASC-I1
7.2.1Structure of the communication protocol
General remarks:
■The communication is done with ASCII packages.
■Each device has an RS232 interface and an optional Ethernet interface to
which an address from 0 to E can be assigned. The device has a default
address of 0 on delivery.
■After each command to the device, a defined response is sent. We
recommend waiting for this response before sending a new command.
Product Manual - RFID Reader UF70 Certum40
Chapter 7
Operation
7.2.2Package contents
General remarks:
Each package includes a package header (three characters), a message (two or
more characters) and the end of the package (five characters).
Package headerMessageEnd of package
Package headerThe header includes the start character (one character) and the package length
(two characters)
2 starting characters and 4 length bytes are sent in the extended ASCII protocol.
Package header
StartLength 1Length 2
nbb
Start Start character (ASCII character ´S´)
Length 1High byte package length (hexadecimal) –
ASCII characters ´0´..´F´
Length 2Low byte package length (hexadecimal) –
ASCII characters ´0´..´F´
Extended ASCII format:
Package header
Start 1Start 2Length 1Length 2Length 3Length 4
Start 1First start character (ASCII character 'S')
Start 2Second start character (ASCII character 'X') for marking
the extended ASCII protocol
Length 1High byte package length (hexadecimal) -
ASCII characters ´0´..´F´
Length 2Byte package length (hexadecimal) -
ASCII characters ´0´..´F´
Length 3Byte package length (hexadecimal) -
ASCII characters ´0´..´F´
Length 4Low byte package length
(hexadecimal) - ASCII characters ´0´..´F´
The message length describes the number of characters of a message.
Product Manual - RFID Reader UF70 Certum41
Chapter 7
Operation
Message structureThe message contains a command, a target and source address, the number of
the antenna port (Head) and the actual information. The number of the antenna
port is not required for all messages.
Message
CommandAddressHeadInformation
CommandASCII characters (see section Commands of protocol)
AddressTarget or source address; ASCII characters '0'...’E’
Head Optional – for messages that refer to a specific
antenna port
Information Depends on the command (includes none, one or more
ASCII characters '0'...'F')
*) The device is pre-configured with an address of '0' on delivery.
End of packageThe end of the package includes an end (1 character) and the checksum (4
characters)
End of package
EndChecksum 1Checksum 2Checksum 3Checksum
End End character ASCII character no. 13 (hexadecimal 0D)
Checksum 1 High-byte – XOR logic for all data
(package header, message and end character); ASCII ‘0’..’F’
Checksum 2 Low byte – XOR logic for all data
(package header, message and end character); ASCII ‘0’..’F’
*)
4
Checksum 3 High byte – addition of all data
(package header, message and end character); ASCII ‘0’..’F’
Checksum 4 Low byte – addition of all data
(package header, message and end character); ASCII ‘0’..’F’
Product Manual - RFID Reader UF70 Certum42
Chapter 7
Operation
ATTENTION
Commands
When using the TCP/IP interface option, the checksum is not used (is not
transmitted).
7.2.3Commands of protocol
CommandDescription
X or URXRead data range of all EPC transponders
URYRead data range of the EPC transponders with special EPC
code
MEPC scanning
URBEPC bulk reading with time specification
WWrite EPC of a single transponder
UWWWrite data range of all EPC transponders
UWZWrite data range of the EPC transponders with special EPC
code
UMWWrite data range masked of all EPC transponders
UMZWrite data range masked of the EPC transponders with special
EPC code
UBWErase block of all EPC transponders
UBZErase block of the EPC transponders with special EPC code
ULWRetrie ving all EPC transpo nders
ULZRetrieving all EPC transponders with special EPC code
UKWKilling all EPC transponders
UKZKilling all EPC transponders with special EPC code
T or UAMActivate polling: EPC scanning
UAAActivate polling: Read raw
UAXActivate polling: Read data range
UAWActivate polling: Write data range
Product Manual - RFID Reader UF70 Certum43
Chapter 7
Operation
CommandDescription
UAZActivate polling: Write data range masked
UABActivate polling: Erase block of all EPC transponders
UALActivate polling: Retrieving all EPC transponders
UAKActivate polling: Killing all EPC transponders
UARRead transponder rate in the polling operation
UAEStop polling
UCXActivate polling: NXP-UCODE-G2X Read Protect
UCNActivate polling: NXP-UCODE-G2X Reset Read Protect
UCCActivate polling: NXP-UCODE-G2X Change EAS
UCEActivate polling: NXP-UCODE-G2X EAS Alarm
UFWSet filter data
UFRRead filter data
UFPSet filter
UFGRead filter status
UGLRead out list of radio profiles
UGPDetermine active radio profile
UPPSet the active radio profile
UNHPerform hardware reset
N or UNRPerform software reset
UPELoad factory default values
FRequest parameter
PSet parameter
UGKRead the number of the active parameter set
UPKSet the number of the active parameter set
UGDRead the number of the default parameter set
UPDSet the number of the default parameter set
BSensor status
OSetting the outputs
QQueries of outputs (status)
Product Manual - RFID Reader UF70 Certum44
CommandDescription
EError message
HHeartbeat (request serial number)
V or UVRRequest software version
UGTRead UTC t ime
UPTSet UTC time
Chapter 7
Operation
Product Manual - RFID Reader UF70 Certum45
Message items
Chapter 7
Operation
Access word8 bytes
The 4 byte access word is required to access the various memory areas of the
EPC transponder. The LSB byte is transmitted first during the transmission. The
data are interpreted in HEX format. That is, two ASCII characters in the message
equal one byte of data in HEX format.
Example:
0x01020304
ASCII string: "04030201"
Bulk time4 bytes
2 bytes time in milliseconds specifying how long to read. The LSB byte is
transmitted first during the transmission. The data are interpreted in HEX format.
That is, two ASCII characters in the message equal one byte of data in HEX
format.
Example:
0x0064 (100 ms)
ASCII string "6400"
CMD1 - 3 bytes
Command of the message. See table in chapter
Data words2 to N*4 bytes
Data words (2 bytes) are always read or written. The data are interpreted in HEX
format. That is, two ASCII characters in the message describe one byte of
transponder data in HEX format.
Example:
HEX transponder data: 0x12, 0x34, 0x56, 0x78 (2 data word s)
A network configuration that determines if the static network address is being
used or if the DHCP server assigns the network address.
"0" DHCP is not active, use static network address
"1" DHCP is active; obtain network address from the DHCP server
Direction2 bytes
When polling, the direction flag shows if a transponder enters or leaves the field.
The display that a transponder leaves the field can be activated via parameter
0x29. The data are interpreted in HEX format. That is, two ASCII characters in
the message equal one byte of data in HEX format.
Values:
"00" (0x00) The transponder leaves the field
"80" (0x80) The RSSI value changed The transponder moved within the field
"FF" (0xFF) The transponder enters the field
EPC(2n+1)*2 bytes
With the UHFI20 software version (firmware 2.x), the EPC code has a flexible
length n from 0 to 31 data words (2 bytes data). An n byte is placed before the
actual EPC code and corresponds to the quantity of EPC data words. The EPC code
is transferred so that the LSB byte is transmitted first. The data are interpreted in
HEX format. That is, two ASCII characters in the message equal one byte of data
in HEX format. The following applies to the number of EPC data words:
0<=n<=31
Number of EPC data words: 0x06
EPC: 0x0102030405060708090A0B0C
Product Manual - RFID Reader UF70 Certum47
Chapter 7
Operation
Ex flag2 bytes
The extension flag determines which information is included in the recognized
EPC transponder. The Ex flag is set by parameter 0x76. The data are interpreted
in HEX format. That is, two ASCII characters in the message equal one byte of
data in HEX format.
Values:
0x00 do not transmit extensions
0x01 only transmit antenna port
0x02 only transmit RSSI value
0x03transmit antenna port and RSSI
0x04 transmit time stamp
0x05 transmit time stamp and antenna port
0x06 tr ansmit time stamp and RSSI value
0x07 transmit time stamp, RSSI value and antenna port
0x08 transmit transponder protocol control word
0x09 transmit antenna port and transponder protocol control word
0x0A transmit RSSI value and protocol control word
0x0B transmit antenna port, RSSI value and protocol control word
0x0C transmit time stamp and protocol control word
0x0D transmit time stamp, antenna port and protocol control word
0x0E transmit time stamp, RSSI and protocol control word
0x0F transmit time stamp, RSSI, antenna port and protocol control word
Extension0 - 12 bytes
If and which extensions are transmitted for each detected EPC transponder is
defined by the Ex flag. The data are interpreted in HEX format. That is, two ASCII
characters in the message equal one byte of data in HEX format. The activated
extensions are transferred in the following order:
2 ASCII characters antenna port
2 ASCII characters RSSI value
8 ASCII characters UTC time stamp (LSB byte is transmitted first)
4 or 8 ASCII character protocol word as applicable including XPC_W1 and
XPC_W2
Product Manual - RFID Reader UF70 Certum48
Chapter 7
Operation
Filter maskN* 2 bytes
The filter bits required for the development of a filter are defined in HEX format in
a filter mask. That is, two ASCII characters in the message equal one byte of data
in HEX format. The LSB byte of the filter mask is transmitted first.
Example: N=3
Number of mask bits: 18
Filter mask: "0x03FEFE"
Transmission: "FEFE03"
Filter number2 bytes
The filters defined for filtering are numbered consecutively from 0 to 31.
Values:
"00" – Filter 0
…
"1F" – Filter 31
Frame ID2 bytes
The response of the reader can be accomplished in several frames (e.g. if many
transponders were scanned). The frame ID that is sent indicates how many
response messages follow. Short responses that consist only of a single frame
then always have the frame ID "00". Messages consisting of multiple frames
should be fully received and assembled by the host before they are processed.
The data are interpreted in HEX format. That is, two ASCII characters in the
message equal one byte of data in HEX format.
Head ID1 byte
Number of the antenna port (0 – 4).
"0" read on all antenna ports
"1"-"4" single antenna port
Product Manual - RFID Reader UF70 Certum49
Chapter 7
Operation
MaskN* 4 bytes
The bit-oriented mask determines what data will actually be overwritten in the
masked write. The mask has the same length as the data to be written and actual
data is only written in the places where a 1 is located in the mask. The mask is
passed in the same order and length as the masked data to be written.
Example:
N=1 describe a data word masked
Transponder content: 0x5678
New data:0x1234
Mask:0x0F0F
new transponder content: 0x5274
Memory address8 bytes
The memory areas of the EPC transponder are addressed by 4 byte word
pointers. The LSB byte is transmitted first during the transmission. The data are
interpreted in HEX format. That is, two ASCII characters in the message equal
one byte of data in HEX format. The exact memory distribution can be derived
from the EPC Global standard.
Memory bank2 bytes
The EPC transponder has multiple memory banks, which are addressed by
number. The exact memory structure can be derived from the EPC Global
standard chapter. The data are interpreted in HEX format. That is, two ASCII
characters in the message equal one byte of data in HEX format.
Values:
"00" (0x00) Reserved
"01" (0x01) EPC
"02" (0x02) TID
"03" (0x03) User
Number of data words2 bytes
The number of data words (1 data word consists of 2 bytes), which are read and
written, are hereby defined.
The data are interpreted in HEX format. That is, two ASCII characters in the
message equal one byte of data in HEX format.
Product Manual - RFID Reader UF70 Certum50
Chapter 7
Operation
On/Off4 bytes
The use of a defined filter can hereby be enabled or disabled.
Values:
"00" – Filter off
"FF" – Filter on
Output state1 - 4 bytes
Displays the current status of the outputs at the corresponding antenna port
(Head ID). The information unit "Output state" includes the status of each output
of an antenna port. In the case of querying the status of all outputs of the reader,
the "Output State" contains the status of all 4 outputs (1 per head). The status is
represented as 1 byte for each head.
Values:
0 – Output OFF
1 – Output ON
2 – Output flashes
3 – unchanged (query only!)
Parameter no.2 bytes
Number of the parameter. Two ASCII characters (2 bytes) display the parameter
number in HEX format.
Example:
Parameter 20 0x14 "14"
Parameter value2 bytes
Value of the parameter. Two ASCII characters (2 bytes) specify the value of the
parameter in HEX format.
Example:
Value 192 0xC0 "C0"
Product Manual - RFID Reader UF70 Certum51
Chapter 7
Operation
Payload6 bytes
If a transponder must be locked, the area of the transponder to be locked can be
specified by the payload. The LSB byte is transmitted first during the
transmission. Data (3 bytes) are in HEX format. That is, two ASCII characters in
the message equal one byte of data in HEX format. The exact structure can be
derived from the EPC Global standard chapter "Lock".
Example:
Access area with Permalock=1 lock
Payload 0x0300C0
Transfer Protocol "C00003"
Profile number2 bytes
Radio profiles realized in the reader, which are numbered from 0 to 4.
Radio profiles:
Address of the device ("0" .. "E").
The default address of the card is "0" on delivery.
RECOMMISSION2 bytes
If a transponder must be made unreadable (or possibly also recommissioned), 3
so-called recommission bits must be transferred. The value and significance of
the recommission bits depend on the type of transponder. The 3 bits are
interpreted as one byte data in HEX format. That is, two ASCII characters in the
message equal one byte of data in HEX format. The precise significance of the 3
recommission bits can be seen in the documentation of the EPC transponder and
the EPC global standard chapter "Kill".
Product Manual - RFID Reader UF70 Certum52
Chapter 7
Operation
Response code4 bytes
This feature is not used for the single reader. This code is always "0000".
Result2 bytes
The result flag delivers information on whether an action was completed
successfully. The data are interpreted in HEX format. That is, two ASCII
characters in the message equal one byte of data in HEX format.
Values:
"00" (0x00) no errors occurred
>0x00 an error occurred
Sensor state1 byte
Displays the current status of the sensor at the corresponding antenna port (Head
ID).
Value 0 Sensor is uncovered (open)
Value 1 Sensor is covered (closed)
Serial number4 bytes
Contains the 4-byte serial number of the reader.
The serial number is also shown on the label of the reader.
Software version6 - 8 bytes
Character string with the software version of the reader. The display is in HEX
format. This means that the 12-16 characters of the ASCII character string
describe the 6-8 bytes of the software version in HEX format.
Example:
v0554846493230
0x55 0x48 0x46 0x49 0x32 0x30
= "UHFI20"
Product Manual - RFID Reader UF70 Certum53
Chapter 7
Operation
Transponder error code2 bytes
The transponder itself also delivers an error code, which is also transmitted. The
data are interpreted in HEX format. That is, two ASCII characters in the message
equal one byte of data in HEX format.
Values:
"00" (0x00) no errors occurred
>0x00 an error occurred
UTC8 bytes
The Unix time code (UTC) describes the seconds that have passed since 1.1.1970
0:00:00. The Unix time code (UTC) is the same worldwide for a specific time. The
4 bytes of UTC are transmitted in hex format as 2 ASCII char acters per byte. The
LSB byte is transmitted first.
Product Manual - RFID Reader UF70 Certum54
Chapter 7
Operation
X or URX - Read
data area
The X command starts the reading of a defined data range of the current EPC
transponder.
Several EPC transponders can be located in the reading area of the antenna when
using this command.
Host reader
CMDReader IDHead IDAccess wordMemory bank
X
URX
Reader host
Overhead response telegram
CMD
x
urx
1 byte1 byte8 bytes2 bytes8 bytes2 bytes
2)
Reader IDFrame
ID
1 byte2 bytes2 bytes2 bytes0-12
Result
3)
Ex
flag
Data of the participating EPC transponders
3)
Extensions
bytes
EPC
(2n+1)*
2 bytes
Memory
address
Transponder
error
code
2 bytes2 bytesN*4
Number of
data words
Number
N data
words
1)2)
Data
words
bytes
1) These data are displayed in the order listed for each identified EPC
transponder.
2) The response of the transponder is optional and only appears at result "00".
3) The result and Ex flag is only available in the first transmitted message in
messages with several frames.
Example: Read access password (no transponder is present)
>> X0100000000000200000002
<< x0000A Result "0A" no EPC transponder is present
The URY command starts the reading of a defined data range of the current EPC
transponders which have a defined EPC code. Several EPC transponders can be
located in the reading area of the antenna when using this command.
Number
of data
words
ID
Head
ID
EPC
2)
Result
3)
Ex
flag
Access
word
Data of the participating EPC transponders
Exten-
3)
sions
bytes
Memory
bank
EPC
(2n+1)*
2 bytes
Memory
address
Transponder
error
code
2 bytes2 bytesN*4
Number
N data
words
Data
words
bytes
1)2)
1) These data are displayed in the order listed for each identified EPC
transponder.
2) The response of the transponder is optional and only appears at result "00".
3) The result and Ex flag is only available in the first transmitted message in
messages with several frames.
1) These data are displayed in the order listed for each identified EPC
transponder.
2) The response of the transponder is optional and only appears at result "00".
3) The result and Ex flag is only available in the first transmitted message in
messages with several frames.
Example:
>> M01
<< m0010001 Frame-ID "01"; result "00" and Ex flag "01"
0106470000000000000000000000
0106270000000000000000000000
0106110000000000000000000000
0106490000000000000000000000
0106100000000000000000000000
0106230000000000000000000000
0106420000000000000000000000
0106080000000000000000000000
0106310000000000000000000000
0106290000000000000000000000
0106120000000000000000000000
0106
the missing 12 bytes are included in the next message
>> M01
<< m0000A Result 0x0A, since no transponder is available
Chapter 7
>> URM01
<< urm0000A Result 0x0A, since no transponder is available
>> URM01
<< urm0000001 Frame-ID "00"; result "00" and Ex flag "01"
01060B0C090A0708050603040102
Product Manual - RFID Reader UF70 Certum59
Chapter 7
Operation
URB – EPC
Bulk reading
The command URB starts a reading of EPC transponders over a predetermined
period of time. The EPC of all detected transponders is reported after the
completion of the time.
Host reader
CMDReader IDHead IDBulk time
URB1 byte1 byte4 bytes
Reader host
Overhead response telegram
CMD
urb1 byte2 bytes2 bytes2 bytes0-12
Reader IDFrame
ID
2)
Result
3)
Ex
flag
3)
Data of the participating EPC transponders
Extensions
bytes
EPC
(2n+1)*
2 bytes
Transponder
error
code
2 bytes2 bytesN*4
Number
N data
words
1) These data are displayed in the order listed for each identified EPC
transponder.
2) The response of the transponder is optional and only appears at result "00".
3) The result and Ex flag is only available in the first transmitted message in
messages with several frames.
1)2)
Data
words
bytes
Example:
>> URB016400 ( read 100 ms !!)
<< urb0000001
The UWW command starts to overwrite the defined data range of all EPC
transponders located in the field. Several EPC transponders can be located in the
write area of the antenna when using this command.
ID
Head ID
Result
2)
Access
word
3)
Ex flag
Memory
bank
Data of the participating EPC
transponders
3)
ExtensionsEPC
Memory
address
1)2)
Number of N
data words
Transponder
error code
Data
words
bytes
1) These data are displayed in the order listed for each identified EPC
transponder.
2) The response of the transponder is optional and only appears at result "00".
3) The result and Ex flag is only available in the first transmitted message in
messages with several frames.
Example: Overwrite EPC transponder with a new EPC code
>> UWW01000000000102000000060102030405060708090A0B0C
<< uww000000101060B0C090A070805060304010200
Control reading:
>> M01
<< m0000001
01060B0C090A0708050603040102
Example: Overwrite several EPC transponders with a new EPC code
>> UWW01000000000102000000060102030405060708090A0B0C
<< uww0000001
010600000000C006D9DDB233083000
010600000000C006D9DDB233083000
0106BBCC99AA778855663344112200
Control reading:
>> M01
<< m0000001
01060B0C090A0708050603040102
01060B0C090A0708050603040102
The UWZ command starts to overwrite the defined data range of all EPC
transponders located in the field that have a defined EPC code. Several EPC
transponders can be located in the write area of the antenna when using this
command.
ID
Frame
ID
EPC
bytes
2)
Result
Access
word
8 bytes2 bytes8 bytes2 bytesN*4
3)
Ex flag
Memory
bank
Data of the participating EPC
transponders
3)
ExtensionsEPC
Memory
address
1)2)
bytes
Number
N data
words
Transponder
error code
2 bytes
Data
words
bytes
1) These data are displayed in the order listed for each identified EPC
transponder.
2) The response of the transponder is optional and only appears at result "00".
3) The result and Ex flag is only available in the first transmitted message in
messages with several frames.
Example: Overwrite several EPC transponders with the same EPC code
>> UWZ01060B0C090A0708050603040102000000000102000000060102030
405060708090A0B0C
<< uwz000000101060B0C090A070805060304010200
Product Manual - RFID Reader UF70 Certum64
Chapter 7
Operation
Control reading:
>> M01
<< m0000001
01060B0C090A0708050603040102
EPC: 02010403060508070A090C0B
The UMW command starts to overwrite the defined data range of all EPC
transponders located in the field. Several EPC transponders can be located in the
write area of the antenna when using this command.
The UMZ command starts to overwrite the defined data range of all EPC
transponders located in the field that have a defined EPC code. Several EPC
transponders can be located in the write area of the antenna when using this
command.
masked
Host reader
CMD
UMZ1 byte1 byte(2n+1)*
Reader host
Overhead response telegram
CMD
umz1 byte2 bytes2 bytes2 bytes0-12 bytes(2n+1)*2
Reade
r ID
Reader
ID
Head
ID
Frame
ID
EPC
2 bytes
2)
Access
word
8 bytes2 bytes8 bytes2 bytesN*4
Result
3)
Memory
bank
Ex flag
Memory
address
Data of the participating EPC
transponders
3)
ExtensionsEPC
Number
of data
words
1)2)
bytes
Data
words
bytes
Transponder error
code
2 bytes
Mask
N*4
bytes
1) These data are displayed in the order listed for each identified EPC
transponder.
2) The response of the transponder is optional and only appears at result "00".
3) The result and Ex flag is only available in the first transmitted message in
messages with several frames.
Example: The EPC transponder masks 2 data words of the EPC code, rewrite
>> M01
The UBW command starts to delete (erase) the defined blocks of all EPC
transponders located in the field. Several EPC transponders can be located in the
write area of the antenna when using this command.
2)
Result
Access
word
3)
Memory
bank
Ex flag
3)
Memory
address
Data of the participating EPC
transponders
ExtensionsEPC
1)2)
2 bytes
Number of N
data words
1) These data are displayed in the order listed for each identified EPC
transponder.
2) The response of the transponder is optional and only appears at result "00".
3) The result and Ex flag is only available in the first transmitted message in
messages with several frames.
Transponder error
code
2 bytes
Example: 2 data words of the user area of an EPC transponder are deleted
>> M01
The ULW command starts to lock the defined data range of all EPC transponders
located in the field. Several EPC transponders can be located in the write area of
the antenna when using this command.
Host reader
CMDReader IDHead IDAccess wordPayl oad
ULW1 byte1 byte8 bytes6 bytes
Reader host
Overhead response telegram
CMD
ulw1 byte2 bytes2 bytes2 bytes0-12 bytes(2n+1)*2
Reader IDFrame
ID
2)
Result
3)
Ex flag
Data of the participating EPC
transponders
3)
ExtensionsEPC
1)2
Transponder
error code
2 bytes
bytes
1) These data are displayed in the order listed for each identified EPC
transponder.
2) The response of the transponder is optional and only appears at result "00".
3) The result and Ex flag is only available in the first transmitted message in
messages with several frames.
Example: Lock the ACCESS block of an EPC transponder
Payload 0x0300C0; Permalock=1
>> ULW01FFFFFFFFC00003
<< ulw00000010106BBCC99AA778855663344112200
Since Permalock was set, the kill password cannot be read or written after the
locking process!
>> UWW0100000000000200000002FFFFFFFE
<< uww00000010106BBCC99AA778855663344112284
>> UWW01FFFFFFFF000200000002FEFEFEFE
<< uww00000010106BBCC99AA778855663344112284
Access area can no longer be written!
The ULZ command starts to lock all EPC transponders with the corresponding EPC
code located in the field. Several EPC transponders can be located in the write
area of the antenna when using this command.
Data of the participating EPC
transponders
3)
ExtensionsEPC
1)2)
Transponder
error code
ID
2)
Result
3)
Ex flag
1) These data are displayed in the order listed for each identified EPC
transponder.
2) The response of the transponder is optional and only appears at result "00".
3) The result and Ex flag is only available in the first transmitted message in
messages with several frames.
Example: Lock the Kill block of an EPC transponder
>> UWW0100000000000000000002FEFEFEFE
<< uww00000010106BBCC99AA778855663344112200
Kill password written
Payload 0x0C00C0; Permalock=1
>> ULZ0106BBCC99AA7788556633441122FFFFFFFF00030C
<< ulz00000010106BBCC99AA778855663344112200
Since Permalock was set, the kill password cannot be read or written after the
locking process!
>> UWW0100000000000000000002FEFEFEFE
<< uww00000010106BBCC99AA778855663344112284
Kill password can no longer be written!
Product Manual - RFID Reader UF70 Certum71
Chapter 7
Operation
UKW – Killing all
EPC transponders
The UKW command starts to kill the defined data range of all EPC transponders
located in the field. Several EPC transponders can be located in the write area of
the antenna when using this command. The "kill" command is only performed for
a transponder if the kill password was previously written and matches! The
transponder can no longer be addressed after a successful kill command.
Host reader
CMDReader IDHead IDKill passwordRecommission
UKW1 byte1 byte8 bytes2 bytes
Reader host
Overhead response telegram
CMD
ukw1 byte2 bytes2 bytes2 bytes0-12 bytes(2n+1)*2
Reader IDFrame
ID
2)
Result
3)
Ex flag
3)
Data of the participating EPC
transponders
ExtensionsE PC
1)2)
bytes
Transponder
error code
2 bytes
IMPORTANT
1) These data are displayed in the order listed for each identified EPC
transponder.
2) The response of the transponder is optional and only appears at result "00".
3) The result and Ex flag is only available in the first transmitted message in
messages with several frames.
Example: Kill an EPC transponder
>> UKW01FEFEFEFEFE
<< ukw000000101060102030405060708090A0B0C00
>> UKW01FEFEFEFEFE
<< ukw0000A
The transponder no longer responds!
>> M01
<< m0000A
The transponder no longer responds!
The respective transponder can no longer be addressed after a successfully
conducted kill command.
This command cannot be undone.
Product Manual - RFID Reader UF70 Certum72
Chapter 7
Operation
UKZ – Killing all
EPC transponders
(defined EPC code)
The UKZ command starts to kill all EPC transponders with the corresponding EPC
code located in the field. Several EPC transponders can be located in the write
area of the antenna when using this command. The kill command is only
performed if the kill password was previously written! The transponder can no
longer be addressed after a successful kill command.
Host reader
CMDReader IDHead IDEPCKill passwordRecommission
UKZ1 byte1 byte(2n+1)*2 bytes8 bytes2 bytes
Reader host
Overhead response telegram
CMDReader ID
ukz1 byte2 bytes2 bytes2 bytes0-12 bytes(2n+1)*2
Frame
ID
2)
Result
3)
Ex flag
Data of the participating EPC
transponders
3)
ExtensionsEPC
1)2)
bytes
Transponder
error code
2 bytes
1) These data are displayed in the order listed for each identified EPC
transponder.
2) The response of the transponder is optional and only appears at result "00".
3) The result and Ex flag is only available in the first transmitted message in
messages with several frames.
EPC: 2211443366558877AA99CCBB
Example: Kill an EPC transponder
>> UKZ0106BBCC99AA7788556633441122FEFEFEFEFE
<< ukz0000A
>> M01
<< m0000A
The transponder no longer responds!
>> M01
<< m0000A
The transponder no longer responds!
Product Manual - RFID Reader UF70 Certum73
Chapter 7
Operation
IMPORTANT
The respective transponder can no longer be addressed after a successfully
conducted kill command.
This command cannot be undone.
Product Manual - RFID Reader UF70 Certum74
Chapter 7
Operation
T and UAM – Enable
read polling EPC
The T or UAM command starts the polling of EPC transponders on the respective
antenna port, as long as it is not ended or the device is not reset!! Transponder
messages only appear if EPC transponders are actually moved in the field. The
polling is briefly stopped for intermediate read requests and is continued after the
action.
If polling is activated via parameter "polling port" 0x28, polling is restarted
automatically after reset. Only the so-called transponder messages appear when
activating polling per parameter.
Host reader
CMDReader IDHead ID
UAM
T
Reader host (confirmation)
CMDReader IDResult
uam
t
1 byte1 byte
1 byte2 bytes
Reader host (transponder message)
Overhead response telegramData of the EPC transponder
<< uam0000101060102030405060708080809095C02
EPC transponder leaves the field: 090908080807060504030201
<< uam0FF010106010203040506070808080909
EPC transponder enters the field: 090908080807060504030201
<< uam0000101060102030405060708080809090500
EPC transponder leaves the field: 090908080807060504030201
Product Manual - RFID Reader UF70 Certum76
Chapter 7
Operation
UAA –
Enable Read
Polling Raw
The UAA command starts the polling of EPC transponders on the respective
antenna port, as long as it is not ended or the device is not reset! With each
polling run all transponders are shown - which may result in a high data traffic.
The polling is briefly stopped for intermediate read requests and is continued
after the action.
If polling is activated via parameter "polling port" 0x28, polling is restarted
automatically after reset. Only the so-called transponder messages appear when
activating polling per parameter.
Host reader
CMDReader IDHead ID
UAA1 byte1 byte
Reader host (confirmation)
CMDReader IDResult
uaa1 byte2 bytes
Reader host (transponder me ssage)
Overhead response telegramData of the EPC transponder
CMDReader IDDirectionEx flagExtensionsEPC
uaa1 byte2 bytes2 bytes0-12 bytes(2n+1)*
2 bytes
1) These data are displayed when transponders are moved out of the field.
Example:
>> UAA01
EPC transponder leaves the field: 090908080807060504030201
<< uaa0FF010106010203040506070808080909
EPC transponder enters the field: 090908080807060504030201
<< uaa0000101060102030405060708080809090500
EPC transponder leaves the field: 090908080807060504030201
Chapter 7
Product Manual - RFID Reader UF70 Certum78
Chapter 7
Operation
UAX – Polling Read
Data
The UAX command starts the asynchronous read (polling) of a defined data range
of EPC transponders at the respective antenna port. The polling read data is
executed as long as it is not ended or a reset is executed. T r ansponder messages
only appear if EPC transponders are actually moved in the field. The polling is
briefly stopped for intermediate read requests and is continued after the action.
Host reader
CMDReader IDHead IDAccess word
UAX1 byte1 byte8 bytes2 bytes8 bytes2 bytes
Reader host (confirmation)
CMDReader IDResult
uax1 byte2 bytes
Reader host (transponder me ssage)
Overhead response telegramData of the EPC transponder
Memory
bank
Memory
address
Number of
data words
CMDReader IDDirectionEx flagExtensionsEPC
uax1 byte2 bytes2 bytes0-12 bytes(2n+1)*
2 bytes
1) These data are displayed in the order listed for each identified EPC
transponder.
2) Data of the transponder are optional; they appear only at transponder error
code "00".
uax0FF010106BBCC99AA77885566334411220006112233445566778899AABBC
C
<< uax000010106BBCC99AA77885566334411221100
<<
uax0FF010106BBCC99AA77885566334411220006112233445566778899AABBC
C
The UAW command starts the asynchronous writing (polling) of a defined data
range of EPC transponders at the respective antenna port. The polling write data
is executed as long as it is not ended or a reset is executed. Transponder
messages only appear if EPC transponders are actually moved in the field. The
polling is briefly stopped for intermediate read requests and is continued after the
action.
The UAZ command starts the asynchronous masked writing (polling) of a defined
data range of EPC transponders at the respective antenna port. The polling write
masked data is executed as long as it is not ended or a reset is executed.
T r ansponder messages only appear if EPC tr ansponders are actually moved in the
field. The polling is briefly stopped for intermediate read requests and is
continued after the action.
UAB – Erase BlockThe UAB command starts the asynchronous erase block (polling) of a defined data
range of EPC transponders at the respective antenna port. The polling erase block
is executed as long as it is not ended or a reset is executed. Transponder
messages only appear if EPC transponders are actually moved in the field. The
polling is briefly stopped for intermediate read requests and is continued after the
action.
UAL – Lock EPCThe UAL command starts the asynchronous lock EPC (polling) of defined EPC
transponders at the respective antenna port. The polling lock EPC is executed as
long as it is not ended or a reset is executed. Transponder messages only appear
if EPC transponders are actually moved in the field. The polling is briefly stopped
for intermediate read requests and is continued after the action.
<< uww00000010106000005358004D9DDB233083084
Transponder error 0x84: Kill password is locked!
1)
Product Manual - RFID Reader UF70 Certum86
Chapter 7
Operation
UAK – Kill
EPC transponder
The UAK command starts the asynchronous kill of EPC transponders (polling) at
the respective antenna port. The polling kill EPC is executed as long as it is not
ended or a reset is executed. Transponder messages only appear if EPC
transponders are actually moved in the field. The polling is briefly stopped for
intermediate read requests and is continued after the action. The "kill" command
is only performed for a transponder if the kill password was previously written
and matches! The transponder can no longer be addressed after a successful kill
command.
The respective transponder can no longer be addressed after a successfully
conducted kill command.
This command cannot be undone.
Product Manual - RFID Reader UF70 Certum88
Chapter 7
Operation
UAR – Polling
transponder rate
Host reader
CMDReader IDHead ID
UAR1 byte1 byte
Reader host
CMDReader IDResultTransponder rate
uar1 byte2 bytes4 bytes
The UAR command provides the transponder rate of the activated polling action.
A transponder list of a standard inventory is first established in the reader in all
polling actions before the actual read/write action is executed. The transponder
rate is formed via the inventory and specifies how many transponders are
detected per second during the inventory.
Example: Read transponder rate at various times
<< n0
>> UAR01
<< uar0000000
The UAE command ends all asynchronous commands (polling) at all antenna
ports. If the polling was started per polling port parameter, the parameter must
also be reset to finally end this.
Example: end current polling action
>> UAE0
<< uae000
Product Manual - RFID Reader UF70 Certum92
Chapter 7
Operation
UCX – Activate
polling NXP-
UCODE-G2X Read
Protect
The UCX command starts the asynchronous transponder function (polling
operation) "ReadProtect" of all NXP-UCODE-G2X transponders in the field at the
respective antenna port. The polling "ReadProtect" is executed as long as it is not
ended or a reset is executed.
Transponder messages only appear if NXP-UCODE-G2X transponders are actually
moved in the field. The polling is briefly stopped for intermediate read requests
and is continued after the action.
The UCN command starts the asynchronous transponder function (polling
operation) "ResetReadPro tect" of all NXP-UCODE-G2X transpon ders in the field at
the respective antenna port. The polling "ResetReadProtect" is executed as long
as it is not ended or a reset is executed.
Transponder messages only appear if NXP-UCODE-G2X transponders are actually
moved in the field. The polling is briefly stopped for intermediate read requests
and is continued after the action.
The UCC command starts the asynchronous transponder function (polling
operation) "Change EAS" of all NXP-UCODE-G2X transponders in the field at the
respective antenna port. The polling "Change EAS" is executed as long as it is not
ended or a reset is executed.
Transponder messages only appear if NXP-UCODE-G2X transponders are actually
moved in the field. The polling is briefly stopped for intermediate read requests
and is continued after the action.
The UCE command starts the asynchronous transponder function (polling
operation) "EAS alarm" of all NXP-UCODE-G2X transponders in the field at the
respective antenna port. The polling "EAS alarm" is executed as long as it is not
ended or a reset is executed.
Transponder messages only appear if NXP-UCODE-G2X transponders are actually
moved in the field. The polling is briefly stopped for intermediate read requests
and is continued after the action.
Host reader
CMDReader IDHead ID
UCE1 byte1 byte
Reader host (confirmation)
CMDReader IDResult
uce1 byte2 bytes
Reader host (transpon der message)
Overhead response telegramData of the EPC transponder
CMDReader IDDirectionEx flagExtensionsEPC
uce1 byte2 bytes2 bytes0-12 bytes(2n+1)*2 bytes
Example:
>> UCE01
<< uce000
Product Manual - RFID Reader UF70 Certum96
Chapter 7
Operation
UFW – Set filter
data
By setting and activating so-called filters, it is possible to only let certain EPC
transponders participate in the inventory. A total of 8 filters can be defined. The
UFW command makes it possible to set the data for a filter.
1) See EPC Global specification "Select command" for a description
Reader host
CMDReader IDResultFilter Number
ufw1 byte2 bytes2 bytes
Example:
>> UFW001000000010200000010F0F0
<< ufw00001
Product Manual - RFID Reader UF70 Certum97
Chapter 7
Operation
UFR – Read filter
data
By setting and activating filters, it is possible to only let certain EPC tr ansponders
participate in the inventory. A total of 32 filters can be defined. The UFR
command allows reading of data of a filter.
Host reader
CMDReader IDFilter Number
UFR1 byte2 bytes
Reader host
CMD
ufr1 byte2 bytes2 bytes2
Reader
ID
Result
Filter
Number
On/
Off
bytes
Target
1)
2 bytes2 bytes2 bytes8 bytes2 bytes2 *
Action
1)
Memory
bank
Memory
address
1) See EPC Global specification "Select command" for a description
Example:
>> UFR001
<< ufr00001000000010200000010F0F0
Number
of mask
bits N
Filter
mask
Round
up (N /
8) bytes
Product Manual - RFID Reader UF70 Certum98
Chapter 7
Operation
UFP – Set filterBy setting and activating so-called filters, it is possible to only let certain EPC
transponders participate in the inventory. A total of 32 filters can be defined. The
use of a particular filter can be switched on and off by the UFP command.
>> UFR001
<< ufr00001FF0000010200000010F0F0
Control read of filter data 01
Example: Deactivate filter 01
>> UFP00100
<< ufp00001
Filter 01 was deactivated
Product Manual - RFID Reader UF70 Certum99
Chapter 7
Operation
UFG – Read filter
data
Host reader
CMDReader IDFilter Number
UFG1 byte2 bytes
Reader host
CMDReader IDResultFilter NumberOn/Off
ufg1 byte2 bytes2 bytes2 bytes
By setting and activating so-called filters, it is possible to only let certain EPC
transponders participate in the inventory. A total of 32 filters can be defined. The
status of a particular filter can be determined by the UFG command.
Example: Read status of filter 01
>> UFG001
<< ufg0000100
”00”: Filter 01 is not active
UFP001FF
<< ufp00001
Filter 01 was activated
>> UFG001
<< ufg00001FF
"FF": Filter 01 is active
Product Manual - RFID Reader UF70 Certum100
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.