Setup Guide
Table Of Contents
- Notices
- About Thinkify, LLC
- A Quick RFID Introduction
- Thinkify Reader Protocol Overview
- Command Reference
- Summary
- "A" – RX Amplifier Control
- "BOOTLOADER" – Enter Bootloader
- "C" – Low-Level Chip Control Registers
- "F" – RX Filter Control
- "G" – GPIO Settings
- “I” – Inventory Control
- "K" – Kill, Lock, Access Descriptors
- “M" – MASK / SELECT control
- “NM" – Macro Control
- "P" – PROTOCOL control (Gen2 Air protocol)
- "R" – RF Control
- "RP" and "RM" – Multiplexing (Antenna Control)
- "T" – Initiate INVENTORY
- "X" – eXtra Data Read and Write Descriptor Control
"K" – Kill, Lock, Access Descriptors
There are five sections of memory that can be each individually locked:
1. Kill password
2. Access password
3. EPC memory
4. TID memory
5. User memory
The Gen2 protocol specification referenced above describes the data fields associated with the
Lock command. The data is a 20 bit number consisting of a 10 bit Mask field and an associated
10 bit action field. In the Insight reader, we use this number with the KL command lock
descriptor to control the Locking behavior. The meaning of each bit is described in the table
below.
Lock Data Fields, Mask Fields (Bits 10-19)
Kill Password Access Password EPC Memory TID Memory User Memory
19 18 17 16 15 14 13 12 11 10
Skip (0)
Write(1)
Skip (0)
Write(1)
Skip (0)
Write(1)
Skip (0)
Write(1)
Skip (0)
Write(1)
Skip (0)
Write(1)
Skip (0)
Write(1)
Skip (0)
Write(1)
Skip (0)
Write(1)
Skip (0)
Write(1)
Lock Data Fields, Action Fields (Bits 0-9)
Kill Password Access Password EPC Memory TID Memory User Memory
9 8 7 6 5 4 3 2 1 0
Password
Read and
Write
Perma
Locked
Password
Read and
Write
Perma
Locked
Password
Write
Perma
Locked
Password
Write
Perma
Locked
Password
Write
Perma
Locked
We will use this table in an extended example for locking below.
Sub-Commands
Sub
Command
Description Legal Values
for SET
KA
Get or set the Access password.
KA reports the Access password,
KA<ACCESSPASSWORD> sets the Access password.
32 Bits from 8
Nibbles
29