RF290R
Configuration Manual, 09/2014, C79000-G8976-C377-01
47
Protocols for controlling the reader
7
With the aid of the protocols for controlling the reader, this can be adapted to individual
conditions of various applications within a wide framework.
You can only access the configuration parameters after executing the "[0xA0] Reader-Login
(Page 59)" command with the correct READER-ID.
Since your data needs to be protected from unauthorized access, the reader is equipped
with the following protection mechanism:
●
Configuration protection:
Access to the configuration data stored in the EEPROM of the reader is locked.
7.1
[0x52] Baud Rate Detection
This protocol is used to determine the baud rate set for the asynchronous interface of the
reader.
Table 7- 1
Host → reader
Byte
1
2
3
4
5
6
7, 8
Content
STX
MSB
ALENGTH
LSB
ALENGTH
COM-ADR
[0x52]
0x00
CRC16
Default
0x02
-
-
-
-
-
-
Table 7- 2
Reader → host
Byte
1
2
3
4
5
6
7, 8
Content
STX
MSB
ALENGTH
LSB
ALENGTH
COM-ADR
[0x52]
0x00
CRC16
Default
0x02
-
-
-
-
-
-
Note
Response protocol
The response protocol is sent only when the query is made with the baud rate and correct
parity of the reader.