User's Manual
User Manual | SRU-8X1X RFID Reader 18000-63
Doc No. 47000001740
|
Version 01
|
2018-12-11
|
released
Page 99 of 105
Confidential
Authentication
Using this function, it is possible to authenticate a tag.
The Authentication tab consists of 4 areas, Get All Tags, Tags, Key and functions that are described below.
Figure 63 Authentication
ᬅ
Password enters the access password; see 14.9.2 Password for Operation
ᬆ
Get all tags reads all the tags in the antenna field
ᬇ
Tags shows all the detected tags
ᬈ
Key see 14.12.114.12.1
Key; necessary for TAM1 and TAM2
ᬉ
Functions see 14.12.2 Functions
14.12.1 Key
Figure 64 Authentication: Key
ᬅ
Key 0/Key 1
selects a key for the authentication (Key 0 is only used for TAM1, Key 1 is used for
both TAM1 and TAM2)
ᬆ
Key
enters the key selected in ᬅ
ᬇ
Crypto suite selects the crypto suite
ᬈ
see 14.12.2 Functions