TransCore IT241005422 Manual De Usuario

Descargar
Página de 82
Application Program Interface
D-15
A command complete response is associated with this command, followed by a 
8000H asynchronous response type data code with the results of the power-on diag-
nostics test. All buffered tag responses will be deleted after execution of this com-
mand. Execution time is approximately 10 s.
Reset Control — This field contains a unique value to prevent a bit error from inad-
vertently causing a soft reset of the programmer. This field must contain the hexadeci-
mal value A5A5 to invoke a reset of the programmer.
Save Programmer Configuration
The Save Programmer Configuration command causes the current configuration of 
the programmer to be saved to NVM. There is no data associated with the Save Pro-
grammer Configuration command. See the “Restore Programmer Configuration” on 
page D-13 
for a listing of the parameters that are saved and the factory default values 
for each.
Get/Set Programmer Security Characters
Unique security characters are programmed into each customer tag programmer at the 
time of manufacture and are assigned and tracked by TransCore. Each security charac-
ter set is linked to a programmer serial number, also assigned and managed by 
TransCore. The security codes are programmed at the factory prior to shipment.
The Get Programmer Security Character command requests the programmer’s 
assigned security characters. Security characters are bit patterns in predetermined 
positions in the American Trucking Association page. The Set Programmer Security 
Character command sets the programmer security characters.
Invalid security characters are reported using command data invalid response code as 
specified in the “Ethernet Asynchronous Command and Response Protocol” on page 
D-7
.
The data associated with the Get/Set Programmer Security Characters command is 
shown in Table D-11.
Table D-11  Security Characters Data
Security character — This field contains a two-byte quantity indicating that the 
security characters are assigned to the programmer. These security characters may be 
used to aid in controlling fraudulent use of any reader system. The hardware program-
ming key is required to perform the set programmer security characters command suc-
cessfully.
Byte
Bits 7 - 0
0
Security character 0 
1
Security character 1