5 - 22
5 - 22
5. THINGS YOU NEED TO KNOW BEFORE PROGRAMMING
(1) Method of use
After data are written, calculate and write the check code using the Check Data
command and specifying the calculation process, and verify the check code prior to
reading using the Check Data command and specifying the verification process.
With the above, data damage within an ID tag can be detected before the data are
read.
Write stage
Write data
Calculate check code
Read stage
Read data
Verify check code
(2) Example of use
The following describes an example of a case where a data check is performed for
addresses 0010
H
to 0012
H
.
1. First, assume that the following data have been entered.
Bit 0
Bit 7
Address
0013
H
0012
H
0011
H
0010
H
000F
H
1
2
5
6
3
4
0015
H
0014
H