GLOBALSTAR PROPRIETARY AND CONFIDENTIAL INFORMATION
Use or disclosure of data contained on this sheet is subject to the restrictions in the Distribution Statements on the title page of this
document.
06/18/20
Subject to Change without Notice
P a g e | 25
4.1.1.11
“auth”
Unlocks privileged commands.
Command: auth
Arguments: A 32 bit unlocking key in Hexadecimal
Example: auth 11764BA3
Example response:
Auth success!
The following commands require a unique authorization key to be issued via this command before they will be
recognized: “bpm”, “raw”, “edfg”
The commands requiring “auth” are unlocked for 30 seconds after sending the auth command. Sending the commands
multiple times (e. g. “raw”) DOES NOT “bump out” th
e 30 second timer. However, once the user has kicked the ST100
board into binary passthrough
mode, the “auth” will expire concurrently with the binary passthrough expiry.
For instructions on how to generate the authorization key, contact Globalstar.
4.2
Binary Serial Packet Commands
These commands represent the Legacy Globalstar format.
These comma
nds are accessible on an individual basis by issuing them as the argument to the “raw” ASCII command.
Several of these commands can be sent in order by putting the command interface into Binary Passthrough Mode by
issuing the “bpm” ASCII command.
NOTE: Whe
n using the “raw” command to send individual messages, the CRC
is not sent by the user. The Nordic
processor firmware calculates and appends the correct CRC to the message going to the ASIC processor.
The CRC discussed below and given by example in the sub
sequent sections is only applicable from the user’s point of
view when sending a series of messages in “binary passthrough mode” (“bpm” command).