background image

© 1996-2005 RF IDeas, Inc. All rights reserved

 

* Limitations on Reverse Engineering, Decompilation and Disassembly.  You may not reverse engineer, decompile, or disassemble 
the PRODUCT, except and only to the extent that such activity is expressly permitted by applicable law notwithstanding this 
limitation. 
* You may not reproduce or otherwise emulate, in whole or in part, any form the protocol(s) defined within this PRODUCT for use 
without a RF IDeas PRODUCT. 
* Redistributable Code. If you are authorized and choose to redistribute Sample Code (“Redistributables”) as described in Section 
1.4, you agree to: (a) distribute the Redistributables in object code only in conjunction with and as a part of a software application 
product developed by you using the product accompanying this EULA that adds significant and primary functionality to the 
SOFTWARE PRODUCT ("Licensed Product"); (b) not use RF IDeas' name, logo, or trademarks to market the Licensed Product; 
(c) include a valid copyright notice on the Licensed Product; (d) indemnify, hold harmless, and defend RF IDeas from and against 
any claims or lawsuits, including attorney's fees, that arise or result from the use or distribution of the Licensed Product; (e) 
otherwise comply with the terms of this EULA; and (g) agree that RF IDeas reserves all rights not expressly granted. You also 
agree not to permit further distribution of the Redistributables by your end users except: (1) you may permit further redistribution of 
the Redistributables by your distributors to your end-user customers if your distributors only distribute the Redistributables in 
conjunction with, and as part of, the Licensed Product and you and your distributors comply with all other terms of this EULA; and 
(2) in the manner described in Section 1.4. 
* Separation of Components.  The PRODUCT is licensed as a single product.  Its component parts may not be separated for use 
on more than one computer. 
* Single COMPUTER.  The  PRODUCT is licensed with the COMPUTER as a single integrated product.  The PRODUCT may only 
be used with the COMPUTER. 
* Rental.  You may not rent or lease the PRODUCT without permission from RF IDeas.   
* Software Transfer.  You may permanently transfer all of your rights under this EULA only as part of a sale or transfer of the 
COMPUTER, provided you retain no copies, you transfer all of the PRODUCT (including all component parts, the media and 
printed materials, any upgrades, this EULA and, if applicable, the Certificate(s) of Authenticity), AND the recipient agrees to the 
terms of this EULA.  If the PRODUCT is an upgrade, any transfer must include all prior versions of the PRODUCT. 
* Termination.  Without prejudice to any other rights, RF IDeas may terminate this EULA if you fail to comply with the terms and 
conditions of this EULA.  In such event, you must destroy all copies of the SOFTWARE PORTION OF THE PRODUCT and all of 
its component parts. 
 
 
3. UPGRADES.  If the SOFTWARE PORTION OF THE PRODUCT is an upgrade from another product, whether from RF IDeas or 
another supplier, you may use or transfer the PRODUCT only in conjunction with that upgraded product, unless you destroy the 
upgraded product.  If the SOFTWARE PORTION OF THE PRODUCT is an upgrade of a RF IDeas product, you now may use that 
upgraded product  
only in accordance with this EULA.  If the SOFTWARE PORTION OF THE PRODUCT is an upgrade of a component of a package 
of software programs which you licensed as a single product, the SOFTWARE PORTION OF THE PRODUCT may be used and 
transferred only as part of that single product package and may not be separated for use on more than one computer. 
 
4. OEM COPYRIGHT.  All title and copyrights in and to the PRODUCT (including but not limited to any images, photographs, 
animations, video, audio, music, text and "applets," incorporated into the PRODUCT), the accompanying printed materials, and 
any copies of the SOFTWARE PORTION OF THE PRODUCT, are owned by RF IDeas or its suppliers.  The PRODUCT and 
SOFTWARE PORTION OF THE PRODUCT is protected by copyright laws and international treaty provisions.  You may not copy 
the printed materials accompanying the PRODUCT. 
 
5. DUAL-MEDIA SOFTWARE.  You may receive the SOFTWARE PORTION OF THE PRODUCT in more than one medium. 
Regardless of the type or size of medium you receive, you may use only one medium that is appropriate for your single computer.  
You may not use or install the other medium on another computer.  You may not loan, rent, lease, or otherwise transfer the other 
medium to another user, except as part of the permanent transfer (as provided above) of the SOFTWARE PORTION OF THE 
PRODUCT. 
 
FOR THE LIMITED WARRANTIES AND SPECIAL PROVISIONS PERTAINING TO YOUR PARTICULAR JURISDICTION, 
PLEASE REFER TO YOUR WARRANTY BOOKLET INCLUDED WITH THIS PACKAGE OR PROVIDED WITH THE SOFTWARE 
PRODUCT PRINTED MATERIALS. 
 
 

Limited Warranty 

RF IDeas, Inc. warrants to the original buyer of this product, that the hardware and related disk(s) are free of defects in material 
and workmanship for a period of one year from date of purchase from RF IDeas or from an authorized RF IDeas dealer.  Should 
the RF IDeas products fail to be in good working order at any time during the one-year period, RF IDeas will, at its option, repair or 
replace the product at no additional charge, provided that the product has not been abused, misused, repaired or modified.  This 
warranty shall be limited to repair or replacement and in no event shall RF IDeas be liable for any loss of profit or any commercial 
or other damages, including but not limited to special, incidental, consequential or other similar claims. 
 
No dealer, distributor, company, or person has been authorized to change or add to the terms of this agreement, and RF IDeas will 
not be bound by any representation to the contrary.  RF IDeas SPECIFICALLY DISCLAIMS ALL OTHER WARRANTIES, 
EXPRESSED OR IMPLIED, INCLUDING BUT NOT LIMITED TO IMPLIED WARRANTIES OF MERCHANTABILITY AND 
FITNESS OF PURPOSE.  Since some states do not allow such exclusion of limitation of incidental or consequential damages for 
consumer products, check the statute of the state in which your business resides.  This warranty gives you the specific legal rights 
in addition to any rights that you have under the laws of the state in which your business resides or operates. 
 

Summary of Contents for RFID1356i-232

Page 1: ......

Page 2: ...ou may install and use one copy of the SOFTWARE PORTION OF THE PRODUCT on the COMPUTER Network Services If the SOFTWARE PORTION OF THE PRODUCT includes functionality that enables the COMPUTER to act a...

Page 3: ...PRODUCT only in conjunction with that upgraded product unless you destroy the upgraded product If the SOFTWARE PORTION OF THE PRODUCT is an upgrade of a RF IDeas product you now may use that upgraded...

Page 4: ...RF IDeas Inc 1997 2003 All rights reserved Reproduction or distribution of this document in whole or in part or in any form is prohibited without express written permission from RF IDeas Inc Trademar...

Page 5: ...arty application for any serious purposes RF IDeas offers a SDK software developer s kit for third party software developers to develop more serious applications around the AIR ID platform We at RF ID...

Page 6: ...or RS 232 FCC ID iCLASS version M9MRFID1356I100 This device complies with Part 15 of the FCC rules Operation is subject to the following two conditions 1 This device may not cause harmful interface an...

Page 7: ...ound 18 Reset To Defaults 18 Timing 19 Get Set Internal Timing 19 Data is valid for 19 Inter key Press time 19 Inter key Release time 19 Sets USB inter key Release time delay in msecs This is the dela...

Page 8: ...onfiguration 27 Get Card CFG 27 Card SN 28 Card Context 28 Key Management 28 New Key ASCII 28 Key in Hex 28 Write to Card 28 Write to Reader 28 Write Default to Reader 28 Read Write 28 Start Block 28...

Page 9: ...Tracker to Configuration Application Version 2 0 0 May 1 2003 Further pre release refinement Version 1 2 0 April 30 2003 Further pre release refinement Consolidation of some confusing function order...

Page 10: ...a and read it back and 3 To change master keys in the reader and cards The reader s configuration items are grouped according to their general function and are handled through structures defined in th...

Page 11: ...or standard access control applications Application Area 2 is limited to 104 bytes of read write data The key that secures the data cannot be updated 16kbits 2kBytes iCLASS credentials The 16K is a hi...

Page 12: ...ll rights reserved template sizes are estimated and vary between manufacturers template sizes provided by manufacturers and are subject to change these are approximate numbers actual usage depends on...

Page 13: ...special area of memory for the programmed iCLASS cards As can be seen above Application Area 1 is essentially reserved for HID Access Control Application i e proximity card Wiegand data such as parity...

Page 14: ...0 is open for users to read and write To access this area using the supplied demo applications for C and Visual Basic you would set the Card Context to Page 0 Appl Area 2 iCLASS 16 K 16 Appl Memory M...

Page 15: ...y in the reader Here are a few macro type operations you will use in working with the iCLASS cards Each operation is shown to indicate the proper sequence of events for executing the given task Read O...

Page 16: ...the card using the Procedure Find Free Page 3 Place the correct Key value into the New Key field unless you are using the Default Key 4 Write this Key to the Card Write to Card or if using the defaul...

Page 17: ...df Page 0 Application Area 1 of the iCLASS contactless smart card is holding information typically associated with the Access Control Industry s proximity card This file documents the read only identi...

Page 18: ...auto detects the AIR ID first on the USB and then if no reader is found it searches on communications ports 1 through 8 Device Found When the connection is successful the Device Found checkbox will i...

Page 19: ...y in msecs This is how long the key is held down Inter key Release time Sets USB inter key Release time delay in msecs This is the delay between keystrokes Lock out time for repetitive reads The lock...

Page 20: ...information Proximity Cards To better understand this reserved area of read only card memory we are including this discussion of proximity cards and formats There are several bits constructed together...

Page 21: ...nown before the read in order to verify its validity How to determine your format and masking Rule1 1st Convert to Binary Rule 2 Card data format in binary is typically something like parity facility...

Page 22: ...ally associated with the Access Control Industry s proximity card Specifically the iCLASS identification number is also known as the proximity card number see Proximity Card Formats above This screen...

Page 23: ...ading and Trailing parity bits Enable FAC ID character This checkbox indicates that a separator character will be used between the FAC and ID codes This char sent between FAC ID This field holds the c...

Page 24: ...at is used for building access control Wiegand cards usually have a parity bit s at each end of the data stream Often users want to strip these bits and simply retrieve the site code or ID code from t...

Page 25: ...you have written the unique address you can selectively communicate with each device to learn which reader sent the card data stream SDK users will use this address field to enter the address for the...

Page 26: ...ent of the bits defined by an F in the Filter Mask ID Code The ID Code will represent the decimal equivalent of the bits defined by an I in the Filter Mask Enable Output as Hexadecimal This checkbox a...

Page 27: ...ng the Get Card Cfg button will read the entire card s configuration and memory The application will read and determine the free pages those pages that are using the default keys as well as the memory...

Page 28: ...not to leave an access key for someone else to use New Key ASCII Enter a new Key in this field that you will send to either the card reader or both Pressing either the Write Key to Card or Write Key...

Page 29: ...This section contains useful higher level procedures Find Free Page This routine is valid for 16k cards only It searches each page 1 7 for memory pages that are protected with the default key When a p...

Page 30: ...mation the station PC can insert before top section or after bottom section the data read from a specific area middle section of the screen below of the card s memory The concept is to have a series o...

Page 31: ...card Delimiter The user can choose delimiters None Comma or Tab The delimiter is inserted after each field or date time stamp Station Label The user may type in any identifier The first information k...

Page 32: ...1996 2005 RF IDeas Inc All rights reserved ICLASS Memory Map Please refer to the iCLASS Memory Map discussion above...

Page 33: ...1996 2005 RF IDeas Inc All rights reserved About...

Page 34: ...1996 2005 RF IDeas Inc All rights reserved OK Leave the AIR ID Dialog Screen...

Page 35: ...1996 2005 RF IDeas Inc All rights reserved...

Page 36: ...an out of devices 8 SetupDiGetDeviceInterfaceDetail ERROR_INSUFFICIENT_BUFFER GetLastError 9 Failed pDevIFDetail LocalAlloc 10 VendorID and or ProductID not found 11 CreateFile failed 12 SetupDiGetDev...

Reviews: