User Manual

Kapsch TrafficCom AG
Installation Manual | SRU-8100 RFID Reader 18000-63
Doc No. 47000001169 | Version 01 | 2014-11-03 | released
Page 57 of 58
No. Parameter Function
5 USER memory
bank
If the tag has a memory area provided for user data, these can be protected by
setting the access password.
The respective items in the drop-down menu are divided into access blocks, which prevent reading and
writing, and write blocks.
Clicking on the Lock selected tag button loads the mask that was created to the list of the selected tag.
Alternatively all the tags in the field can be blocked, on the precondition that the tags all have the same
password.
Note: Wrongly configuring the Lock section can render the tag unusable.
Kill
Pressing the Kill selected tag button, with the stated password, executes a Kill command on this tag. The
Kill all tags button, with the stated password, attempts to execute a Kill command on all the tag in the field.
Note: For the deactivation of a tag, a deactivation password that is not 0 must have been set.
Note: After a Kill tag command, the tag will be unusable.
7.8 © KRAI-Settings
The KTC RFID reader is able to control antennas from the manufacturer Kathrein by using their proprietary
communication interface ©KRAI. Those Kathrein antennas are not included in the product portfolio of KTC
and thus in combination with the KTC RFID reader device there is no active support given by KTC when
using KRAI antennas.
7.9 App Manager
The AppManager manages applications that are directly run on the reader. Please ask KTC for possibilities
with respect to customized applications.
The application can be uploaded to the reader device by using the Install app function on the GUI. For this
purpose the application structure has to be available in *.tar format. Using the Reader Start software the
applications can then be managed using the tab AppManager (Get, Install, Start, Stop, Uninstall, Start
app at boot time).
For the configuration options of the respective KTC specific applications please refer to the
application specific configuration manuals.