Configuration; Setup Commands Structure - IDTECH SecureHead User Manual

Encrypted magnetic read head usb and uart interface
Hide thumbs Also See for SecureHead:
Table of Contents

Advertisement

User Manual, SecureHead USB and UART Interface

3. CONFIGURATION

The SecureHead reader must be appropriately configured to your application. Configuration settings
enable the reader to work with the host system. Once programmed, these configuration settings are
stored in the reader's non-volatile memory (so they are not affected by the cycling of power).

3.1. Setup Commands Structure

Commands sent to SecureHead
a. Setting Command:
<STX><S>[<FuncID><Len><FuncData>...]<ETX><CheckSum>
b. Read Status Command:
<STX><R><FuncID><ETX><CheckSum>
c. Function Command:
<STX>[<FuncID><Len><FuncData>...]<ETX><CheckSum>
Response from SecureHead
a. Setting Command
Host
Setting Command
<ACK> if OK
or
<NAK> if Error
b. Read Status Command
Host
Read Status Command
<ACK> and <Response> if
OK
or
<NAK> if Error
c. Other Command
Host
Other Command
<ACK> and <Response> if
OK
or
<NAK> if Error
Copyright © 2010-2020, International Technologies & Systems Corporation. All rights reserved.
SecureHead
SecureHead
SecureHead
Page 10 of 76

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the SecureHead and is the answer not in the manual?

Subscribe to Our Youtube Channel

Table of Contents