Tagsys LIBSECPEDEST2 User Manual

LIBRARY SECURITY PEDESTAL 2
End User's Guide
Revision 1.0
TAGSYS
December 2004
LIBRARY SECURITY PEDESTAL 2

Publishing Information

Disclaimer and Limitation of Liability

All information herein is either public information or is the property of and owned solely by TAGSYS who shall have and keep the sole right to file patent applications or any other kind of intellectual property protection in connection with such information.
Nothing herein shall be construed as implying or granting to you any rights, by license, grant or otherwise, under any intellectual and/or industrial property rights of or concerning any of TAGSYS’ information.
This document can be used for informational, non-commercial, internal and personal use only provided that:
the copyright notice below, the confidentiality and proprietary legend and this full warning notice appear in all
copies.
this document shall not be posted on any network computer or broadcast in any media and no modification of
any part of this document shall be made.
Use for any other purpose is expressly prohibited and may result in severe civil and criminal liabilities.
The information contained in this document is provided “AS IS” without any warranty of any kind. Unless otherwise expressly agreed in writing, TAGSYS makes no warranty as to the value or accuracy of information contained herein. The document could include technical inaccuracies or typographical errors. Changes are periodically added to the information herein. Furthermore, TAGSYS reserves the right to make any change or improvement in the specifications data, information, and the like described herein, at any time.
Therefore TAGSYS assumes no liability and is not responsible for customer applications or product or software that include TAGSYS products.
TAGSYS HEREBY DISCLAIMS ALL WARRANTIES AND CONDITIONS WITH REGARD TO THE INFORMATION CONTAINED HEREIN, INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, TITLE AND NON-INFRINGEMENT. IN NO EVENT SHALL TAGSYS BE LIABLE, WHETHER IN CONTRACT, TORT OR OTHERWISE, FOR ANY INDIRECT, SPECIAL OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER INCLUDING BUT NOT LIMITED TO DAMAGES RESULTING FROM LOSS OF USE, DATA, PROFITS, REVENUES, OR CUSTOMERS, ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF INFORMATION CONTAINED IN THIS DOCUMENT.
TAGSYS does not and shall not warrant that this product/system/equipment will be resistant to all possible attacks, and shall not incur, and disclaims, any liability in this respect. Even if each product is compliant with current security standards in force on the date of their design, security mechanisms' resistance necessarily evolves according to the state-of-the-art in security and notably under the emergence of new attacks. Under no circumstances shall TAGSYS be held liable for any third party actions, and in particular in case of any successful attack against systems or equipment incorporating TAGSYS products.
TAGSYS disclaims any liability with respect to security for direct, indirect, incidental or consequential damages that result from any use of its products. It is further stressed that independent testing and verification by the person using the product is particularly encouraged, especially in any application in which defective, incorrect, or insecure functioning could result in damage to persons or property, denial of service, or loss of privacy.
© 2000-2004 TAGSYS. All rights reserved.
TRADEMARKS. TAGSYS is a registered trademark of TAGSYS S.A, all rights reserved. ARIO, FOLIO and other TAGSYS products referenced in these pages are either trademarks or registered trademarks of TAGSYS S.A. Other products and company names mentioned in these pages may be the trademarks of their respective owners.
Microsoft, Visual C++, Windows, and Windows NT are either registered trademarks or trademarks of Microsoft Corporation in the U.S.A. and/or other countries.
I-Code is a registered trademark of Philips.
Tag-It is a registered trademark of Texas Instruments.
Printed in France.
TAGSYS – 180 Chemin de St Lambert, 13821 LA PENNE SUR HUVEAUNE, France.
Tel: +33 (0) 4.91.27.57.00 / fax: +33 (0) 4.91.27.57.01
Document Reference: 11492A0
2/50 Revision 1.0 December 2004
Read This First

Read This First

Welcome to the TAGSYS L-SP2 Article Surveillance (EAS) system. This user’s guide is designed to help you get up and running quickly using this high-quality Radio Frequency Identification (RFID) Anti-Theft system. It describes all you need to know about how to install and use the TAGSYS EAS system and its associated applications.
It provides a step-by-step guide for the following procedures:
Installation of the L-SP2 EAS anti-theft system
Configuring the system for use in your library
Personalizing your product with your own preference settings
After you become familiar with the basic functions of the product, you can use the rest of this handbook as a reference for less common tasks, for maintaining your system, and also as a source of information if you have problems operating the system.
This End User’s Guide is designed for all CIT (Certified Integrators by TAGSYS) and for TAGSYS Expert Network customers implementing a low-cost and high-performance RFID solution.
This document does not assume any previous knowledge of Radio Frequency Identification (RFID) technology.

Conventions

Symbol Meaning
CAUTION: A note that advises users that a specific action could result in loss of data or
damage the hardware.
WARNING: A note that advises users that a specific action may result in physical harm.
A note that provides additional information that helps the user perform a task or obtain the best performance from the product.

Abbreviations and Acronyms

AFI Application Family Identifier
AON All Or None
API Application Programming Interface
ASK Amplitude Shift Keying
CPU Central Processing Unit
CRC Cyclic Redundancy Check
DLL Dynamic-Link Library
DPU Digital Processing Unit
DSFID Data Storage Format Identifier
DSP Digital Signal Processor
EAS Electronic Article Surveillance
December 2004 Revision 1.0 3/50
LIBRARY SECURITY PEDESTAL 2
ETX End of Text
HPI Host Port Interface
I/O Input/Output
IFD Interface Device
LED Light Emitting Diode
LSb Least Significant Bit
LSB Least Significant Byte
MSb Most Significant Bit
MSB Most Significant Byte
OS Operating System
PC Personal Computer
PCB Printed Circuit Board
RAM Random Access Memory
RF Radio Frequency
RFID Radio Frequency Identification
RFU Reserved for Future Use
RPU Radio Processing Unit
RTC Real Time Clock
SAM Security Access Module
STX Start of Text
TTF Tag Talks First
TTL Transistor-Transistor Logic
TTY Teletype
UID Unique Identifier

Glossary

Anti-Collision Tag capability making it readable while other tags are present in the RF field. Antenna An aerial that receives and/or transmits radio frequency signals. Aerials are
manufactured in a variety of forms, shapes and sizes.
Baud A unit of measure of data transmission speed representing the number of signal changes per
second.
BNC Connector Cylindrical metal connector with a copper core that is located at the tip of a
coaxial cable, and is used to connect cables together. It attaches by pushing and twisting the outer cylinder on to two locking pins.
Coupler See Reader. Data Storage Format Identifier Identifies the structure of the data stored in the TAGSYS RFID
tag.
Digital Signal Processor This part of the Radio Processing Unit (RPU) performs real-time
TAGSYS RFID tag decoding and manages the Medio L200 configuration.
4/50 Revision 1.0 December 2004
Read This First
Dynamic-Link Library Executable routines that are stored as separate files with DLL extensions and executed only when needed by the program.
Host Port Interface Interface used to access the DSP memory. IEC Connector Three-pin connector used on sockets that carry mains electricity to the computer.
All PCs use a male IEC connector and mains lead with a female IEC connector.
Interrogation Pulse A signal transmitted by the coupler to activate the TAGSYS RFID tag’s
transponder.
Monitoring Port Parallel Port granting access to the HPI. It communicates directly with the Radio
Processing Unit
Multi-Read See Anti-Collision Nibble Half a byte (4 bits) Packaged Reader A reader in its casing. Phase Shift Difference of phase between the 13.56 MHz field emitted by two antennas. This
feature is dedicated to rotating field applications and three-dimensional volume TAGSYS RFID tag detection.
Protocol A set of rules governing a particular function, such as the flow of data/information in a
communication system (communication between a TAGSYS RFID tag and a reader or a reader and a PC or host computer).
Radio Frequency Identification System (RFID) An automatic identification and data capture
system comprising one or more readers and one or more TAGSYS RFID tags in which data transfer is achieved by means of suitable modulated inductive or radiating electromagnetic carriers.
Radio Processing Unit This unit controls the main features of the Medio L200, such as the RF
channels, the multiplexer and the TAGSYS RFID tag decoding.
Reader Electronic system for the communication between TAGSYS RFID tags and host
computers.
Reader Talks First Chip protocol for exchanges between the reader and the chip, whereby the
chip waits for a command from the reader to which it responds.
RS-232 Electronic Industries Association (EIA) standard for serial interfaces between computers
and peripherals that define the function, the electrical characteristics and the timing of signals.
RS-485 Electronic Industries Association (EIA) standard for multipoint, differential data
transmission. It allows multiple nodes to communicate bi-directionally over 1 or 2 twisted pairs.
TAGSYS RFID tag Small, flexible, injectable tag from the 13.56 MHz TAGSYS product line. A
TAGSYS RFID tag is made of a chip connected to an etched antenna.
Tag See TAGSYS RFID tag. Tag Talks First Chip protocol for exchanges between the reader and the chip, whereby the tag
sends information continuously, without waiting for a specific command from the reader.
Transceiver A combined transmitter and receiver. Transponder A combined receiver/transmitter that automatically transmits a signal when a ‘trigger’
is received by it. The trigger is often a pulse, called an interrogation pulse.
December 2004 Revision 1.0 5/50
LIBRARY SECURITY PEDESTAL 2

If you need assistance

Please contact your nearest TAGSYS sales representative or the TAGSYS welcome desk at:
Telephone +33 (0) 4 91 27 57 00 Fax: +33 (0) 4 91 27 57 01 E-Mail:
Website: http://www.tagsys.net/
info@tagsys.net

Contact for Comments

We welcome your feedback to help us provide high quality documentation.
For technical comments, please contact our welcome desk:
Telephone: +33 (0) 4 91 27 57 00 Fax: +33 (0) 4 91 27 57 01 E-Mail:
info@tagsys.net
Please remember to quote the Document Reference number 11492A0, your job title and your company.

Quality Issues

TAGSYS implements stringent quality controls at all stages of its manufacturing process. However, should you find a defect with this product, please notify your TAGSYS Quality Service representative using the dedicated Product Return Form.
Telephone: +33 (0) 4 91 27 57 36 Fax: +33 (0) 4 91 27 57 02
6/50 Revision 1.0 December 2004
Read This First
Table of Contents
Publishing Information________________________________________________________________ 2
Disclaimer and Limitation of Liability_________________________________________________________ 2
Read This First_______________________________________________________________________ 3
Conventions _______________________________________________________________________________ 3 Abbreviations and Acronyms________________________________________________________________ 3 Glossary___________________________________________________________________________________ 4 If you need assistance ______________________________________________________________________ 6 Contact for Comments______________________________________________________________________ 6 Quality Issues______________________________________________________________________________ 6
1 For Your Safety___________________________________________________________________ 9
1.1 General Use__________________________________________________________________________ 9
1.2 Care and Maintenance ________________________________________________________________ 9
1.3 Important Safety Information _________________________________________________________ 10
1.3.1 Operating Environment ____________________________________________________________ 10
2 Certification _____________________________________________________________________ 11
2.1 Occupational Health _________________________________________________________________ 11
2.1.1 Public Exposure __________________________________________________________________ 11
2.1.2 Employees Exposure______________________________________________________________ 11
2.2 Safety Notices_______________________________________________________________________ 11
2.3 Regulatory Notices __________________________________________________________________ 12
2.3.1 In Europe (CE and RTTE Directives) ________________________________________________ 12
2.3.2 In USA (FCC Directive) ____________________________________________________________ 13
2.3.3 In Canada _______________________________________________________________________ 13
3 System Overview ________________________________________________________________ 14
3.1 Features ____________________________________________________________________________ 14
3.2 Brief L-SP2 Description ______________________________________________________________ 14
4 Installation ______________________________________________________________________ 15
4.1 L-SP2 EAS System Components______________________________________________________ 15
4.2 L-SP2 Pedestal ______________________________________________________________________ 15
4.2.1 Tools Required ___________________________________________________________________ 15
4.2.2 Placement of Pedestals____________________________________________________________ 16
4.2.3 Installing the Pedestal _____________________________________________________________ 16
5 Configuration____________________________________________________________________ 20
5.1 Understanding the L-SP2 Synchronization Process ____________________________________ 20
5.2 Using the Configuration Software_____________________________________________________ 22
5.2.1 Installing the Configuration Software ________________________________________________ 22
5.3 Configuration of the L-SP2 ___________________________________________________________ 24
5.3.1 Basic Configuration _______________________________________________________________ 24
5.3.2 Advanced Configuration ___________________________________________________________ 28
5.4 Alarm Buzzer Volume Adjustment ____________________________________________________ 31
5.5 People Counter Reset________________________________________________________________ 32
December 2004 Revision 1.0 7/50
LIBRARY SECURITY PEDESTAL 2
6 Antenna Tuning _________________________________________________________________ 33
6.1 Required Materials___________________________________________________________________ 33
6.1.1 TAGSYS Antenna Tuning Kit (not included) __________________________________________ 33
6.1.2 Oscilloscope _____________________________________________________________________ 33
6.1.3 Probes __________________________________________________________________________ 34
6.2 Verifying Antenna Performances______________________________________________________ 34
6.3 Adjusting the Antenna Impedance ____________________________________________________ 34
6.3.1 Using the Antenna Tuning Kit_______________________________________________________ 34
6.3.2 Using an Impedance Analyzer ______________________________________________________ 36
6.4 Adjusting the Antenna Isolation ______________________________________________________ 37
6.4.1 Using the Antenna Tuning Kit_______________________________________________________ 38
6.4.2 Using an Impedance Analyzer ______________________________________________________ 39
7 Operation _______________________________________________________________________ 41
7.1 Theory of Operation _________________________________________________________________ 41
7.2 Starting the System__________________________________________________________________ 41
7.3 Normal Operation____________________________________________________________________ 41
7.4 Shutdown___________________________________________________________________________ 41
8 Maintenance_____________________________________________________________________ 42
8.1 Servicing the Pedestals ______________________________________________________________ 42
8.2 Servicing the Electronics Unit ________________________________________________________ 42
8.3 Spare Parts _________________________________________________________________________ 42
9 Troubleshooting_________________________________________________________________ 43
9.1 Sources of Interference ______________________________________________________________ 43
10 Technical Specifications________________________________________________________ 44
10.1 Mechanical Data_____________________________________________________________________ 44
10.2 Electrical Data_______________________________________________________________________ 44
10.3 RF Output Power (50 Terminated) ___________________________________________________ 44
11 Performance Test ______________________________________________________________ 46
11.1 Test Conditions _____________________________________________________________________ 46
11.2 Test Procedure______________________________________________________________________ 46
12 Warranty Conditions ___________________________________________________________ 48
12.1 Warranty Exclusions_________________________________________________________________ 48
12.2 General Provisions __________________________________________________________________ 49
12.3 How to Return Defective Products ____________________________________________________ 49
8/50 Revision 1.0 December 2004

For Your Safety

1 For Your Safety
1.1 General Use
The L-SP2 is designed to be rugged and reliable and to provide years of trouble-free service. Please observe the following general tips:
Take care not to scratch the device. Keep the device clean. When working with the device,
use only TAGSYS-approved accessories.
This device is not waterproof and should not be exposed to rain or moisture. Under extreme
conditions, water may enter the circuitry.
Protect the device from extreme temperatures. For example, do not place the device in a
windowed area where the sun may cause extreme temperatures, and keep it away from heaters and other heat sources.
Do not store or use the device in any location that is extremely dusty, damp, or wet.
Use a soft, damp cloth to clean the device. If the surface of the device becomes soiled,
clean it with a soft cloth moistened with a diluted window-cleaning solution.

1.2 Care and Maintenance

This device is a product of superior design and should be handled with care. The suggestions below will further increase the lifetime of this device.
Keep the device and all parts and accessories out of the reach of small children.
Keep the device dry. Precipitation, humidity and liquids contain minerals that will corrode
electronic circuits.
Do not use or store the device in dusty, dirty areas. Its moving parts can be damaged.
Do not store in hot areas. High temperatures can shorten the life of electronic devices, damage
batteries and warp or melt certain plastics.
Do not store in cold areas. When the device warms up (to its normal temperature), moisture
can form inside the device, which may damage electronic circuit boards.
Do not attempt to open the device. Non-professional handling of the device may damage it.
Handle the device with care. Shocks may break internal circuit boards.
Do not clean the device with harsh chemicals, cleaning solvents or strong detergents. Gently
wipe the device with a soft cloth slightly dampened in a mild soap-and-water solution.
Do not paint the device. Paint may clog the device’s moving parts and prevent proper
operation. Paint with metallic contents may limit device performances.
If the device or any accessory are not working properly, take it to your nearest qualified
TAGSYS representative.
December 2004 Revision 1.0 9/50
LIBRARY SECURITY PEDESTAL 2

1.3 Important Safety Information

1.3.1 Operating Environment
When connecting the device or any accessory to another device, read its user’s guide for detailed safety instructions. Do not connect incompatible products.
As with all RF equipment, users are advised that the equipment should only be used in its normal operating position.
10/50 Revision 1.0 December 2004

Certification

2 Certification

2.1 Occupational Health

TAGSYS L-SP2 EAS System has been designed and tested to be in conformity with the European Standard EN 50364 “Limitation of human exposure to electromagnetic fields from devices used in Electronic Article Surveillance (EAS), Radio Frequency Identification (RFID) and similar applications” in conjunction with the European Standard EN 50357 describing how to evaluate the exposure level.
2.1.1 Public Exposure
The EAS systems are only planned for transitory use by the public.
Que les bibliothécaires mettent en place les mesures de surveillances aux portes pour exclure la permanence d’une personne entre elles.
2.1.2 Employees Exposure
The operators are located apart from the principal detection zone. So ils ne court aucun risque,
Les travaux les plus avncés de l’EN + travaux en cours + description de la norme + remarques données par le labo.
(Please see
section 4.2.2, “Placement of Pedestals”)
Regarding European Standard EN 50364 and because the EAS system expose in a transitory way people who cross it, it is recommended not to wait in the middle of the system.
For servicing operations it is recommended to deactivate the EAS system.
2.2 Safety Notices
The L-SP2 is also tested to be in conformity with the EN standard 60950-1: “ Information Technology Equipment Safety”
It is the responsibility of the CIT (Certified Integrators by TAGSYS) to install the L-SP2 as described in TAGSYS Product Manuals or TAGSYS Documentation and with the appropriate antennas.
Modification of any TAGSYS Library System is prohibited without the written consent of TAGSYS. Unauthorized modifications may void the conformity of the equipment to safety specifications and will void the TAGSYS warranty.
December 2004 Revision 1.0 11/50
LIBRARY SECURITY PEDESTAL 2
2.3 Regulatory Notices
An RFID system typically composed of an RF emission device such as the L-SP2 connected to an antenna is subject to national regulations that may differ by country.
One important item to consider is the maximum permissible magnetic field intensity at a distance of 10 meters from the antenna that must not exceed 42 dBµA/m in Europe and 38 dBµA/m in US.
The L-SP2 meets these limits.
2.3.1 In Europe (CE and RTTE Directives)
The L-SP2 complies (CE Declaration of Conformity granted) with the European EMC directive.
The L-SP2 complies with the requirements of the Telecommunication Terminal Equipment Act (FTEG) and the RTTE Directive 1995/5/EC.
It is the responsibility of the TAGSYS Reseller to install the L-SP2 as described in this User’s Guide or TAGSYS Documentation.
Any modification of the L-SP2 is prohibited without the written consent of TAGSYS. Unauthorized modifications may void the conformity of the equipment to CE and RTTE Directives and will void the TAGSYS warranty.
CAUTION:
It is the responsibility of the CIT (Certified Integrators by TAGSYS) to install the L-SP2 as
described in this Reference Guide or in TAGSYS Documentation.
If a L-SP2 is further integrated in a different product, it is the responsibility of the manufacturer of this complementary product to obtain the required approvals for this product.
12/50 Revision 1.0 December 2004
Certification
2.3.2 In USA (FCC Directive)
L-SP2
WARNING TO USERS IN THE UNITED STATES
FEDERAL COMMUNICATIONS COMMISSION (FCC) RADIO
INTERFERENCE STATEMENT 47 CFR Section 15.105(b)
This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses and can radiate radio frequency energy and if not installed and used in accordance with the instructions may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation. If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one or more of the following measures:
Reorient or relocate the receiving antenna.
Increase the separation between the equipment and receiver.
Connect the equipment into an outlet on a circuit different to that to which the receiver is
connected.
Consult the dealer or an experienced radio/TV technician for help.
NO UNAUTHORIZED MODIFICATIONS
47 CFR Section 15.21
CAUTION: This equipment may not be modified, altered, or changed in any way without signed
written permission from TAGSYS SA. Unauthorized modification may void the equipment authorization from the FCC and will void the TAGSYS warranty.
ANTENNA REQUIREMENT
47 CFR Section 15.203
CAUTION: This equipment must be professionally installed. The installer shall be responsible for
ensuring that the proper antenna is employed so that the limits in this part are not exceeded. Non­professional installation or installation of the equipment with an improper antenna may void the equipment authorization from the FCC and will void the TAGSYS warranty.
The L-SP2 has been designed to comply with Part 15 of the FCC Rules.
Operation is subject to the following two conditions: (1) The system devices may not cause harmful interference, and (2) The library system devices must accept any interference received, including interference that may cause undesired operation.
2.3.3 In Canada
Cet appareil numérique de la classe B respecte toutes les exigences du Règlement sur le matériel brouilleur du Canada.
This Class B digital apparatus meets all requirements of the Canadian Interference-Causing Equipment Regulations.
December 2004 Revision 1.0 13/50
LIBRARY SECURITY PEDESTAL 2
3 System Overview
3.1 Features
Being a standalone solution, TAGSYS Security Gates do not need to be linked to the library database, and can still operate when the Integrated Library System (ILS) is down or under maintenance. The security gate does not require additional equipment to operate.
The L-SP2 pedestal includes new functionalities as:
- multi-protocol features which makes it compatible with C220, C320, C270 (Philips I-
code), C370 (Philips SLI) chips
- one block system electronic embedded into the pedestal
- mechanical compatibility with Smarto L122 EAS system
- one people counter
This is a low-cost security system as it only requires a single RFID tag for both anti-theft and identification purposes.

3.2 Brief L-SP2 Description

The components of the L-SP2 EAS system are contained within the L-SP2 pedestal. At least two pedestals are required for each EAS gate. A set of pedestals is known as a gate and may consist of several pedestals Please see
The L-SP2 are built in a one frame:
- the electronics unit located on the bottom of the pedestal which manage the whole
system
A L-SP2 Electronics unit is used to control each pedestal. This electronics unit generates the RF signal transmitted by the antennas and picks up the reply from the TAGSYS RFID tag. If a TAGSYS RFID tag with an active theft bit (ON) is detected, the electronics unit will activate the alarm of the LED/buzzer board on the pedestal.
- These antennas are sensitive receivers used to detect the status of the theft bit in
the TAGSYS RFID tag as it passes through the EAS gate.
- a warning visual and audible device (LED/Buzzer board)
- a people counter equipped with an IR sensor having two functionalities:
1. detect crossing people (counter)
2. to be able to limit the alarm release only if a person is detected (this functionality can be deactivated using the L-SP2 Configuration Utility)
section 4, “ Installation “ for more information.
To operate, the L-SP2 will only need a power supply cable.
14/50 Revision 1.0 December 2004

Installation

4 Installation

4.1 L-SP2 EAS System Components

The components included in the L-SP2 EAS System package are listed in Table 1. The
entire kit is delivered in a box as shown in Figure 1.
Table 1: L-SP2 EAS System Components
Quantity Description
1
8 40 mm Philips-head, countersunk screws with a diameter of 6 mm
8 8 mm plastic cement plugs
1 L-SP2 EAS System CD-ROM
1 RS 232 cable

L-SP2 Pedestal

Figure 1: Delivery of L-SP2 EAS System Components
4.2 L-SP2 Pedestal
CAUTION: This equipment is intended for indoor use only under the conditions described in
this document. Should it be used outside these conditions cannot be guaranteed, and is not recommended. Please read
section 1For Your Safety “ before installation or use.
4.2.1 Tools Required
The following tools are required during installation :
Tape measure Square Drill with 4 mm, 8-mm and 19-mm bits Philips-head screwdriver Level
December 2004 Revision 1.0 15/50
+ 35 hidden pages