User's Manual

26
4. Software
To change an existing EPC, the EPC must be selected in the “gelesene EPCs” (EPCs read) box.
The EPC is copied to the editable “EPC” box using the “übernehme EPC” (Copy EPC) button. There
the code can be changed either manually or using the “auto-inkrement” (Auto-increment) function;
the latter function increases the EPC by 1 each time the code is written successfully to a tag. The
“Schreibe EPC” (Write EPC) button transfers the number from the EPC box to the selected tag. If the
“EPC auf einen Tag schreiben” (Write EPC to a tag) button is used it is not necessary to know the
EPC on the tag. But there must only be one tag in the eld. This tag is detected by the reader and
the new EPC written to the tag. If the data area on the tag is protected with an access password,
this password must be entered in the “Passwort” (Password) box prior to the write operation.
4.3.5.3 “Passwörter verändern” (Change passwords) group box
According to the EPC standard, the access to the individual memory areas of a tag can be restricted.
The con guration of which area is protected is de ned in the “Passwörter verändern” (Change
passwords) and “Lock Tag” group boxes.
The access password and the kill password can be set in the rst group box. For this purpose the
old password must be entered rst. If a password has not been set, 0 must be entered. The new
password is entered in the “neue Passwort” (New password) box. The old password is replaced
with the new password by clicking the “Schreibe Passwort” (Write password) button. To set a kill
password, the access password must also be entered. The kill password is only needed for the nal
deactivation of the tag.
Note
The tag will be unusable after a “Kill Tag” command!
The new kill password is entered in the eld and transferred to the tag by clicking the “Kill
Passwort setzten” (Set kill password) button. Once this process has been completed, the new
password applies.
4.3.5.4 “Lock Tag” group box
In this group box, the access to individual tag data areas can be inhibited as per the EPC standard.
Access is then only possible using a valid password, or is no longer possible until the inhibit
is removed.
The access is con gured in 3 steps:
1. Enter the access password
2. Set mask bits for the “Kill”, “Access”, “EPC”, “TID” and “User” data areas. If a check box is selected,
the related action bit is de ned as per the setting, otherwise it is ignored
3. Set action bits for the data areas. The function of the bits for each area is identical and is shown
in the following table. A set bit is the same as the selection of a check box on the user interface
You will nd more detailed information on these bits and the related memory areas in the latest
version of standard “Radio-Frequency Identity Protocols Class-1 Generation-2 UHF RFID” from
EPC global.