User's Manual

39
This is the simplest mechanism for using the stand-alone programmable SmartKeys dongles, i.e. models PR, EP, SP
and XM. It enables automatic verification, on all the system's ports, of the presence of a protection dongle with Label,
Password and Secure Data assigned, to find out if the dongle is present and on which door.
COMPARING mode is therefore an extension of the LOCATING MODE, valid for programmable dongles only. It can
be useful in programs where verification of dongle presence is sufficient, without the need to update the contents by
means of Secure Data rewriting operations.
The exchange of information is organized like this:
Models PR, EP, SP, XM
Input COMMAND ā€˜Cā€™
LABEL Label
PASSWORD Password
DATA Data
Output FAIL_CTR Fail Counter
STATUS Status
>=0 Success, number of the port where the dongle is located.
<0 Error
Table 27
COMPARING MODE command parameters
The Status indicates if the operation was successful, returning the port number or a value of less than 0 in case of an
error.
9.11.1 Parameter transfer
Parameters to be transferred to execute a COMPARING operation, including search for the dongle on all parallel ports
present:
COMMAND
50 00
Comparing ("C")
LABEL
53 4D 41 52 54 4B 45 59
00 00 00 00 00 00 00 00
Label ("SMARTKEY")
PASSWORD
45 55 54 52 4F 4E 00 00
00 00 00 00 00 00 00 00
Password ("EUTRON")
DATA
53 45 43 55 52 49 54 59
20 44 41 54 41 00 00 00
00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00
Data(
"SECURITY DATA"
)
Table 28
Exchange of information for the COMPARING MODE command
If the dongle is found on any of the ports present on the system, and with correct Label, Password and Secure Data
values, the status variable will have a value of 1,2 or 3 at the end of the operation, according to the LPT.
9.12 Model reading mode
The MODEL READING function enables one to identify the installed SmartKey model (FX, PR, EP, SP, XM, NET).
This is an accessory function, which, for example, can be used to activate a different type of behavior for software
packages operating in both standalone and network versions.
The exchange of information is organized like this: