Programmable configuration options, Commands, Privileged commands – MagTek iDynamo MagneSafe V5 User Manual
Page 16

iDynamo MagneSafe V5 Communication Manual
10
“1”. The application may change the final three characters, but making such a change will
automatically cause the first character to a “1”.
PROGRAMMABLE CONFIGURATION OPTIONS
This reader has a number of programmable configuration properties. These properties are stored
in non-volatile memory. These properties can be configured at the factory or by the end user
using a program supplied by MagTek. Programming these parameters requires low level
communications with the reader. Details on how to communicate with the reader to change
programmable configuration properties follows in the next few sections. These details are
included as a reference only. Most users will not need to know these details because the reader
will be configured at the factory or by a program supplied by MagTek. Most users may want to
skip over the next few sections on low level communications and continue with the details of the
configuration properties.
COMMANDS
Most host applications do not need to send commands to the reader. Most host applications only
need to obtain card data from the reader as described previously in this section. This section of
the manual can be ignored by anyone who does not need to send commands to the reader.
Command requests and responses are sent to and received from the reader using command
strings. Command requests are sent to the reader via a serial port. The response to a command
is retrieved from the corresponding serial port.
Each command and response is composed of a series of readable ASCII characters followed by
the ASCII character CR. The ASCII characters preceding the CR are the message; there should
always be an even number of them and they should contain only the characters
0123456789ABCDEF. The receiver will combine two successive ASCII characters from the
message to form one “byte” (see the descriptions of the commands) which may have any value
from 0x00 to 0xFF.
The following table shows the structure of a command message:
Byte
Usage
0
Command Number
1
Data Length
2 – 23
Data
The following table shows the structure of a response to a command.
Byte
Usage
0
Result Code
1
Data Length
2 – 23
Data
Privileged Commands
Some commands are, for security purposes, privileged. These commands are:
(1) Set Property
(2) Reset Device*
* The Reset Device command is usually not Privileged. The exception occurs when sending
a sequence to Activate the Authenticated Mode, during which time the Reset Device