. Before You Begin 1.1 Overview l Target client The user who uses Invengo RFID handheld reader products l Software application The RFID handheld reader demo software applies to multiple types of RFID handheld readers, demonstrating the function and parameters setting of the RFID handheld reader. l Features The software applies to multiple types of RFID handheld reader products, integrating many functions including barcode reading and photographing. 1.
1.6 FCC Compliance Statement This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions: (1) this device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation. Changes or modifications not expressly approved by the party responsible for compliance could void the user's authority to operate the equipment.
2. Application Instruction 2.1 Open the Interface Open the demo software, the main interface will show as below: Figure 2-1 the main interface l Explorer: To open the explore in the system l Control Panel: To open the control panel in the system. l View process: To open the process viewer in the system. “PDA”, “RFID”, “Barcode”, “TimeSync” and “Camera” will be described in detail below. 2.
Figure 2-2 RFID interface l Clear: To clear the scanning results in the table. l Read: To perform loop reading. l Option: To set reader parameters and tag operations. Click the button “Scan” (the button will be transferred to “Stop” after clicking), the reader will perform loop scanning. That means a tag will be scanned for many times. Then, the data and scanning times of the tag will be listed in the table.
2.2.2 Read Settings Path: RFID --> Option --> Read Set Settings: Data area, Tag amount, Read interval, TID Length, Tag Type, RSSI, Sound, Char. display. The interface is shown as figure 2-5. Figure 2-5 Read Settings • Data area: ∘ ∘ ∘ ∘ TID_6C: TID data memory section of 6C tag. The default length is 8 bytes. EPC_6C: EPC data memory section of 6C tag. The default length is 30 bytes. EPC_TID_UserData: the data memory sections of 6C tag including EPC, TID and UserData.
l ∘ ∘ ∘ ∘ l TID Length: to set the length of TID data memory section that will be read. l Tag Type: to select the tag type (6C, 6B or 6C/6B). l Stop Condition: l ID length: The length of TID data memory section to be read, measured in bytes. Userdata offset: The offset address of user data memory section, measured in byte. Userdata length: The length of user data, measured in bytes. OK: perform the settings and return to the interface of read settings.
l Data memory section: to select the data memory section for operation from the drop-down list. l Text Area: to display or input data. l Read: to perform read operation. l Write: to perform write operation. l Option: click to jump into another interface shown as figure 2-8. Figure 2-8 Read/Write tag ∘ ∘ ∘ ∘ Write mode: Default, Block write or Block erase. Block length: the length of block to be operated, measured in bytes.
l l 24, 27 or 30dBm. Query: to query current antenna power. Set: to set new antenna power. 2.2.5 Tag operation Path: RFID --> Option --> Tag Opt Settings: If the RFID interface has got the read data of tags, you could set access password, kill password, EAS Bits, locking or unlocking of memory sections for each tag. The interface is as shown in figure 2-10. Figure 2-10 Tag Operating l Drop-down list: to select a tag for operation. l Access password: to enter the correct current access password.
Settings: the killed tag will not be available so please be careful on this operation. The EPC and kill password should be provided when doing this operation, as shown in figure 2-11. Therefore, please make sure that the EPC of the tag has been read. The read data memory section could be changed referring to chapter 2.2.2 Read Settings. Figure 2-11 Kill tag l EPC: to select EPC of the tag to be killed. l Kill Password: to enter the correct kill password. l Kill: to kill the tag. 2.2.
2.2.8 EAS EAS is available on tags with NXP tag chips. An EAS flag bit is provided on an EAS tag. After enabling EAS flag bit, EAS will be on. If tags with enabled EAS flag bits are located in reader field, data of tags with configured EAS flag bit (alarm information) will be returned. EAS can be disabled by power off operation instruction. Figure 2-13 EAS Alarm start Path: RFID --> Option --> EAS Click button , the EAS Alarm starts.
Settings: set or cancel filtering overlap tags by time. In other word, a tag will be read for once in specified time. The interface is as shown in figure 2-15. Figure 2-15 Overlap Filter l Time: set the overlap filtering time, measured by milliseconds. The value is limited from 0 to 65535. l Cancel: cancel overlap filtering. l Set: perform the settings. 2.2.
Only the tags matching these conditions can be scanned. 2.2.11 Data Set Path: RFID --> Option --> Data Set Settings: save or upload tag data to specified PC. The interface is as shown in figure 2-17. Figure 2-17 Data configuration l Save data: tick to perform save data operation. The operation is to save tag data to the file system of the reader. You can click button “Cache data” to view or process saved data (please refer to details below). l Upload data: tick to perform upload operation.
Figure 2-18 Cache data ∘ Export: to export cache data to local file system. A dialog will come up as below. Click “No” to cancel the operation and return to cache data interface. Click “Yes” to output data and save to “\InvengoFlash\Demo\Data”. The operation result will be displayed at the bottom of cache data interface, as shown below. ∘ Delete: to delete selected data. A dialog will come up as below. Click “No” to cancel the operation and return to cache data interface.
Click “No” to cancel the operation and return to cache data interface. Click “Yes” to delete selected data and return to cache data interface (cache data interface will be refreshed and the operation result will be displayed). 2.2.12 Version Path: RFID --> Option --> Version Settings: to display the version of software and hardware.
2.3.1 Battery information Path: PDA settings --> Battery information Settings: to display power type, remained energy, current voltage and battery status. There are two ways to supply power for RFID handheld reader as below: l Battery supplying interface is as shown below: Figure 2-21 System power-battery power The battery can be used directly. However, the power is limited so you need to charge the battery before it runs out.
Settings: to adjust brightness of the screen by using the slider, as shown below. Figure 2-23 Screen backlight l l l Upward: the screen will be brighter. Downward: the screen will be darker. Note: the brightness can also be adjusted by the progress bar. 2.3.3 Adjust Volume Path: PDA settings --> Adjust Volume Settings: to adjust the volume using the slider, as shown below.
Figure 2-25 Version l l l Software version: the version number of software. Operation System: the version number of the operation system. Inner System: the version number to distinguish customization of operation system. 2.4 Read Barcode The interface is to display how RFID handheld reader reads barcodes. 2.4.1 Read operation Click to enter read barcodes interface, as shown below: Figure 2-26 Barcode Click button “Read”, barcodes scanning begins.
barcode for multiple times. Click button “Stop” to stop scanning. The scanning result will be displayed as shown below. The scanning state (including amount of tags that have been read, total scanning times, successful scanning times and reading rate) will be displayed under the table. Figure 2-27 Barcode-scanning results Note: if reading barcodes failed, please adjust the position including angle and distance of the reader towards the barcode. l Clear: to clear the results. 2.4.
The reading result is as shown below. 2.5 Synchronization Click on the main interface to synchronize the time on the RFID handheld reader and the server. The interface is as shown below. Figure 2-29 Datetime sync IP address: the IP address of the server Port: the port of the server OK: perform the synchronization operation The time on RFID reader will be set as same as that on the server, providing that the IP address and port is correct. 2.6 Other function 2.6.
The opening status of Wi-Fi and GPRS will be displayed under the icons. As shown in the picture above, the Wi-Fi ad GPRS are being closed. 2.6.2 Wi-Fi Path: “Wi-Fi” on main interface --> Wi-Fi Providing that Wi-Fi is opening, a confirm message to close Wi-Fi will come up by clicking the icon “Wi-Fi”, as shown below. Yes: to close Wi-Fi. No: not to close Wi-Fi. Providing that Wi-Fi is being closed, a new interface will come up, as shown below.
Figure 2-32 connect the wireless If it is necessary to modify the setting of the target network, please double-click the target name. Then, another interface will come up, as shown below. Figure 2-33 Wireless Properties If the password identifying is not configured, the text box for encryption will display “Forbidden”, otherwise you need to enter correct password. After modifying the settings, click “OK” to perform the settings and return to wireless information interface.
Figure 2-34 Data receiving software The program will monitor automatically. Then, please open the demo software on RFID handheld reader, select “RFID--> Option--> data config”, as shown below. Figure 2-35 Data configuration Please see the chapter 2.2.11 Data set for the description of this interface. Tick “upload data”, enter the IP address of the PC where runs the data receiving software. The port should be the port monitored by the program on the server (6543 in default).
Figure 2-36 RFID interface By the time the tags are scanned, the demo software will upload the data shown in the table, as shown above. Then, the data receiving program receives the data as shown below. 3. After sale 3.1 Contact Invengo Information Technology Co.,Ltd. 3/F, No.T2-B, High-tech Industrial Park South, Shenzhen 518057, China www.invengo.cn Tel: (86)755 26711633 Fax: (86) 755 26711693 E-mail:sales@invengo.