Copyright © 2010, International Technologies & Systems Corporation. All Rights Reserved
59 of 65
ID TECH EzWriter
Reader Responses
There are two types of responses that the unit, solicited and unsolicited. The unit
produces a solicited response after receiving a command from the host. This includes
command acknowledgements, card data, etc. The unit produces an unsolicited response
normally due to a user’s action or a power on situation.
Solicited Responses
Table 5 – Solicited Response Summary
ASCII
HEX
Name
Use
Length*
^
5E
Command Completed (ACK)
1
!
21
Invalid Command
1
*
2A
Error
1
+
2B
No data found
1
-
2D
Insufficient leading zeros for custom writing
1
/
2F
lsb of first character not a “1” for custom writing
1
?
3F
Communications error
1
~
7E
Can’t Execute, hardware does not support command
1
*Length does not include protocol overhead characters, if any.
Unsolicited Responses
Table 6 – Unsolicited Response Summary
ASCII
HEX
Name
Use
Length*
:
3A
Power On Report
1
^
5E
Card swipe occurred when armed to read or write
1
1
31
Unsuccessful read after write – Track 1
1,2 or 3**
2
32
Unsuccessful read after write – Track 2
1,2 or 3**
3
33
Unsuccessful read after write – Track 3
1,2 or 3**
(
28
Card speed measurement - start
1
)
29
Card speed measurement - end
1
>
3E
Card edge detected
1
*Length does not include protocol overhead characters, if any.
** Responses combined into one message back to the host.