RFIDeas pcProx Playback User manual

Rev C
pcProx® Playback &
pcProx® Writer
Configuration Utility
User Manual
For use with the pcProx® Contactless Read/Writer & Playback Readers:
iCLASS Models: RDR-7080AKx & RDR-7085AKx
MIFARE Models: RDR-7580AKx & RDR-7585AKx

Thank You!
Congratulations on the purchase of your pcProx®Playback and/or pcProx® Writer device(s).
RF IDeas hopes you enjoy using the readers as much as we enjoyed creating and developing them.
Configuration is easy, so you will be able to quickly take advantage of a more secure environment in
your business, school, or organization.
Please call our Sales department if you have any questions or are interested in our OEM and
Independent Developer’s programs.
We look forward to your comments and suggestions for our product line! Please go to
www.RFIDeas.com and follow the Support aLearning Center link for more details about our
product line.
We are always discovering new applications for our product line(s). There are several software
developer’s licensing our technology so the solution you are looking for may already be developed.
Thank you,
The RF IDeas Staff
Need Assistance?
Ph: 847.870.1723
Fx: 847.483.1129
2

3
Contents
2 Thank You!
4 Chapter 1: The Basics
4 Wireless Identification Overview
5 ID Card Reader System
5 pcProx Output Formats
6 Credential Form Factors
7 Card Compatibility
7 Reader Configuration Purposes
8 Chapter 2:Hardware
8 What’s In Your Part Number?
9 Interface (Connectors)
10 USB Readers and Wiegand Converters
10 RS-232 Readers and Converters
10 Minimum System Requirements
11 Reader Set-Up Basics
11 LED Beeper
12 Chapter 3: Software
12 pcProx Card Manager Overview
13 pcProx Card Manager Utility
14 Connect Tab
16 pcProx Writer for Log-On Tab
29 pcProx Writer for Swipe Cards Tab
30 pcProx Playback Tab
36 About Tab
38 File Menu
39 Auto-Run Operation
42 Chapter 4: Increasing Security
42 Security Overview
44 Chapter 5: Card Management
44 iCLASS
45 MIFARE
51 Chapter 6: Auto-Locking the Workstation
53 Chapter 7: Tips & Troubleshooting
53 Troubleshooting
53 Before You Call Technical Support
53 Talking to the Technician
56 Index
57 Other Products and Accessories

4
Wireless Identification Overview
pcProx® Activated Identification
Employers are more security conscious than ever. More buildings, machines, systems, and
applications require identification information to gain access. RF IDeas devices allow the building
access cards to be used as a digital identifier throughout the workplace.
Various pcProx applications include:
• Card Enrollment
• Application log-on
• Form filler to existing software applications
• PC/LAN Log On
• Cafeteria Purchases/Vending
• Machine Access
• PLC and embedded controllers
• Time/Attendance
While magnetic stripe technology is very inexpensive, it is prone to read problems from wear and dirt.
Cards have a limited life as they scratch easily. Readers pick up dirt and oils that damage the read
head.
RF IDeas contactless smart cards and readers operate at the allowed frequency of 13.56 MHz. This
contactless technology uses RFID (radio frequency identification). The pcProx 13.56 MHz readers will
fully support HID iCLASS and Phillips NXP MIFARE cards. The pcProx Card Manager utility is focused
on allowing the cards to function not only for door access, but also for computer identification and
access.
Contactless smart cards offer the user endless solutions. One of the struggles users have with smart
cards is they often have to create specialized software applications in order to take advantage of the
many features and capabilities. The pcProx Playback Starter Kit removes most of these barriers by
providing a ‘no-software’ approach. In other words, this system allows you to configure data onto
the cards so that the cards easily adapt to existing applications. The adaptation is possible since the
pcProx Playback readers are capable of reading user specific information and keystrokes or RS-232
characters. The encoding phase (writing keystrokes or RS-232 characters and data to the card) is
done via the Card Manager using either the pcProx Writer USB or pcProx Writer 232 read/write
reader.
The diagram on the following page is a high level overview of how the reader works. The reader
sends RF signals to the card and the card sends signals back to send data. The card data is output by
the reader in keystrokes or ASCII characters. This card data can be configured to include delimiters
to separate the data. This reader can be used as a standalone system or seamlessly integrated with
other software applications using the optional Software Developer’s Kit (SDK).
1
The Basics

ID Card Reader System
Output Formats
5 Chapter 1 The Basics

6 Chapter 1 The Basics
Credential Form Factors
Credentials are inactive electronic devices that rely on readers to supply the required power for
start-up and communication. The credential itself, consists of antennas that produce proximity or
contactless frequencies. Proximity and contactless smart card technology cards allow users to
effortlessly manage multiple applications through a single credential.
Data: The data on access cards are a string of binary numbers set with a fixed configuration and
length.
Frequencies: RF IDeas’ access control readers and credentials utilize the low-frequency 125 kHz
(proximity) band and/or the high-frequency 13.56 MHz (contactless) band.
Credential Form Factors: With over 300 million physical access credentials in use worldwide, there
are a variety of low and high frequency form factors customers can choose from to meet their
particular needs.
The below illustrates some of the various form factors available.
CSN: Also known as the Card Serial Number, is part of the ISO 15693 standard for vicinity cards
operating at the 13.56 MHz frequency.
UID: The User ID or User Identification, can be encoded as data on the card when a security key is
needed.

7 Chapter 1 The Basics
Card Compatibility
Contactless iCLASS
There are three iCLASS memory choices as shown in the below table. Users can add keystrokes and
credentials into any of the fields (pre-keystrokes, credential x, or post keystrokes) as all are saved the
same way on the card.
Note: Overwriting the boundaries of memory as dictated by the card choice is not permitted.
The below table illustrates the limits.
The actual byte count is shown in the Card Manager software in the field labeled Size.
Card Memory Configuration Credential 1 Max Count Credential 2 Max Count
2k bit 2 application 48 bytes 48 bytes
16k bit 2 application 48 bytes 1,800 bytes
16k bit 16 application 48 bytes 48 bytes
Contactless MIFARE Card Choices
There are two MIFARE contactless memory choices as shown below. You can actually put keystrokes
and credentials into any of the fields (pre-keystrokes, credential x, or post keystrokes) as all are saved
the same way on the card. You cannot overwrite the boundaries of memory as dictated by the card
choice.
The below table illustrates the limits.
The actual byte count is shown in the Card Manager software in the field labeled Size.
Card Memory Configuration Credential 1 Max Count Credential 2 Max Count
1K Bytes 3 Blocks 48bytes 3 Blocks 48bytes
4K Bytes 3 Blocks 48bytes 3 Blocks 48bytes
Reader Configuration Purposes
The method of encoding data on a card and transmitting data to the reader differs accordingly to
each technology involved. The reader itself is not aware of the makeup of the card data format or
access privileges for the cardholder. This information is only accessible through the configuration
process of the reader utilizing the supplied software.
The reader is very flexible and may need to be configured in order to present an exact desired
output for the user, such as, singling out FAC or ID, obtaining a desired base (i.e. decimal, lowercase,
uppercase, hexadecimal).

8
What’s In Your Part Number?
All RF IDeas reader part numbers follow a distinct system of categorization to allow for an ease of
differentiation between products.
Below is the basic part number scheme.
RDR - 7 3 8 1 A K U
Reader Type: The reader type distinguishes between standard reader, OEM, converter, mag-stripe, or
a kit.
Frequency: RF IDeas’ access control readers are available in low-frequency 125 kHz (proximity) or
high-frequency 13.56 MHz (contactless).
Card Type: The card type allows for the selection of over 35 different card types for reader
compatibility (Please visit www.RFIDeas.com, choose a product and locate the Part Numbers tab for
specific device part numbers associated to card types).
Housing: This option provides the user to select the form factor housing for the desired reader. The
housings include; desktop, wall mount, USB dongle, PCMCIA, bare board, ExpressCard, or custom.
(For more on form factors, please visit www.RFIDeas.com)
Model: The model selection corresponds to the type of reader, whether it is a standard, writer
(13.56 MHz contactless only), playback (13.56 MHz contactless only), SDK, or analyzer.
Version: The version refers to the selection of either our standard or custom build.
Housing Color: The color category simply allows for the selection of either our black or pearl
housings. (Applies only to desktop and wall mount housings)
Interface: This option specifies the type of connection for the reader (i.e. USB, RS-232, PCMCIA, etc).
2
Hardware
Reader Type Frequency Card Type
Housing
Model
Version
Housing Color Interface

9 Chapter 2 Hardware
Interface (Connectors)
OUTPUT
CONNECTORS
T

10 Chapter 2 Hardware
USB Readers and Wiegand Converters
The pcProx USB keystroke device operates in two primary modes:
• USB keyboard. It reads the card data and sends it as keystrokes as if the user typed the ID
data on a keyboard.
• Under the application programmer interface (API) defined in the pcProx SDK. When it reads
card data, the active application receives the entire card data.
RS-232 Readers and Converters
The RS-232, Ethernet, or virtual COM port device operates in two primary modes:
1. ASCII output device. In this mode the user card data is read and sent as a decimal or
hexadecimal number in ASCII characters.
2. API defined in the pcProx SDK. The device attaches to a computer serial port. When it reads
card data, the active application receives the entire card data.
Once the configuration settings are correctly configured and written to flash memory, the device can
immediately be deployed.
Minimum System Requirements
Minimum System Requirements
HARDWARE Pentium class PC
MEMORY 32 MB RAM
DISK 25 MB hard disk space
I/O 1 available RS-232 or USB Port
OPERATING SYSTEM Any operating system that supports a USB keyboard including
Microsoft Windows 2000®, XP®, Vista®, 7®, Server 2003®,
Server 2008®, Linux. Can be used for keystroke applications.
Note: The software does not perform any data validation checking. The data must be known before it is
read to verify its validity.

11 Chapter 2 Hardware
Reader Set-Up Basics
Plug the connector into the workstation’s (or available on any peripheral) open RS-232 or USB plug.
Place the device next to the monitor, beside the workstation, or where appropriate.
The workstation should detect new hardware for USB connections. Verify the workstation recognizes
this connection using Device Manager.
Verify the correct COM port for RS-232 DB9 connections using ‘Device Manager.’
When the software is installed, it should recognize these connections in order to configure the
appropriate device. Once the device is configured and written to its flash memory, these settings will
not have to be configured again.
LED Beeper
The desktop, USB dongle, wall mount, and bare board (OEM) model readers are all equipped with
a light up LED on the front cover. The LED is configurable through the utility software (See LED and
Beeper functions in the Software section) to allow the device to produce a beep upon light up of the
LED when a credential is detected by the reader.

pcProx Card Manager Overview
pcProx Writer and Card Manager
The pcProx Card Manager, together with the pcProx Writer, allows you to store multiple user-
centric data into different locations in the contactless smart card. You can write both user data and
keystrokes (pcProx Playback USB), RS-232 ASCII characters (pcProx Playback 232), or Wiegand
numeric data (pcProx Playback Wiegand) onto the card.
The keystrokes are useful in helping to launch applications and/or directing the user-centric data into
the correct fields on the screen.
The RS-232 ASCII characters are useful for serial port driven solutions such as truck scales,
time and attendance terminals, PLCs and other serial port devices requiring user-centric data.
The Wiegand numeric data is useful for security panel and other devices accepting Wiegand data.
pcProx Playback and Card Manager
The pcProx Playback reader is configurable using the pcProx Card Manager utility and is used for
reading the card and deliver data. The pcProx Playback (USB/RS-232) reader can be configured to
read specific locations on the card as well as provide keystrokes or ASCII characters surrounding the
user-centric data. The pcProx Playback Wiegand must be pre-configured at the factory.
pcProx Playback USB
The pcProx Playback USB reader installs as a plug-n-play device and requires no drivers or software
to be deployed. This is beneficial since there is no need to develop software, distribute or test
software, modify or replace existing back end systems. Users will simply “write” the data required, as
well as any keystrokes, into the contactless smart card, add additional keystroke delimiters into the
pcProx Playback USB reader, and the solution is ready to deploy.
pcProx Playback RS-232
The pcProx Playback RS-232 reader installs as a standard serial port device and requires no drivers or
software to be deployed. The output is delivered using COM port parameters at: 9600, n,8,1. There is
no need to develop software, distribute or test software, modify or replace existing back end systems.
Users will simply “write” the data required plus any RS-232 characters into the contactless smart
card, add other additional characters, such as delimiters, into the pcProx Playback RS-232 reader, and
the solution is ready to deploy.
pcProx Playback Wiegand
The pcProx Playback Wiegand reader installs as a Wiegand output device and requires no drivers or
software to be deployed. The output is delivered using output lines Data 0/ Data 1 and the Wiegand
protocol. There is no need to develop software, distribute or test software, modify or replace existing
12
3
Software

back end systems. Users will simply “write” the numeric data into the contactless smart card and the
solution is ready to deploy.
The pcProx Card Manager allows users to:
1. Organize user data into specific card memory locations. (See section labeled ‘Card
Organization Forms’)
2. Decide if keystrokes or ASCII characters should be stored within the card, or stored within the
pcProx Playback reader.
3. Write user data (credential, swipe card, or other identification information) along with any
keystrokes or ASCII characters, to individual locations on a contactless card (when using the
pcProx Writer).
4. Configure the pcProx Playback reader to use existing data (if your contactless cards have
ASCII data that has been previously written) to output as desired.
5. Configure the pcProx Playback reader to access a desired location on a card.
Note: If you have multiple applications, you will need to create individual pcProx Playback files (*.PLB) describing
each of these locations (called Card Context). The Playback files are used to dynamically reconfigure the pcProx
Playback reader to retrieve another application credential or identification set from the contactless smart card. To
do this, you can use the ‘Auto-Run’ mode as command-line options and shortcuts such as:
C:\Program Files\RF IDeas, Inc\RFID1356i\pcProxCardman.exe” magstripe.plb.
6. Create hot keys or batch files that can be used to launch the dynamic configuration together
with the associated application.
The pcProx Playback reader is configured to retrieve the data at various locations within the card. It is
therefore possible to write many different identification and security access requirements within
the card. The reader can be configured to retrieve a specific section off the card. Since the Playback
reader may be configured as needed (see ‘Auto-Run Operation’ section), you can use your card for
multiple purposes at a desktop.
pcProx Card Manager Utility
Install the pcProx Card Manager by running the pcProxCardMgr.exe setup program. This will install
the pcProx Card Manager software along with the necessary components as required by Windows.
This application is supported under Windows 2000 and XP. Once installed, use the Windows “Start –
All Programs” to locate and run the pcProx Card Manager Software application.
13 Chapter 3 Software

Connect Tab
The connect section is used to perform the initial connection between either RF IDeas’ pcProx Writer,
or one of HID’s wall mount read/write RS-232 readers such as the RW400, and the pcProx Card
Manager software. It is also used to describe the type of data you will be writing to the card: USB
keystrokes or RS-232 /Wiegand characters. You may have the pcProx Playback USB reader attached
to another USB port at the same time but no connection to the pcProx Playback reader is established
under the Connect check boxes on this screen.
Connect pcProx Writer USB or RS-232
First, attach the pcProx Writer to your PCs (RS-232 or USB) port. The pcProx Writer’s LED should be
red.
Next, if using the RDR-7080AKU iCLASS compatible Writer, place either a 2k BDG-2000 or any of
the 16k bit iCLASS (BDG-2001 or BDG-2002) cards on the top of the reader. If using the
RDR-7580AKU MIFARE compatible Writer, place either a 1k or 4k MIFARE contactless card on the
top of the reader.
Note: It is important to lay the card completely across the face of the pcProx Writer during the encoding
operation. Placing the card on an angle may inhibit the writing operation.
The Card Manager will automatically detect either the USB or RS-232 pcProx Writer reader by simply
selecting the ‘Connect to pcProx Writer USB or RS-232’ checkbox.
Connect HID RS-232 Read/Write Reader
First, attach the HID read/write reader to your PC’s RS-232 port and make sure the power adaptor is
attached and the LED is red.
Next, place either a 2k BDG-2000 or any of the 16k bit iCLASS (BDG-2001 or BDG-2002) cards on
the top of the reader.
For either method of connection made, the LED will light green for approximately 2 seconds and than
go back to red. This is normal. If you remove the iCLASS card for 2-3 seconds, and replace it, the LED
will return to green for 2 seconds.
14 Chapter 3 Software

Commands Description
Device Type Shows which type of reader was found
Card Serial Number Displays the contactless card’s unique serial number
Size-Pages This indicates the number of k-bits and pages for the card
Error Status This field will show interim progress, success and errors.
Connection to the utility with an iCLASS contactless smart card
Commands Description
Reset RF This button is used to reset the RFID portion of the reader. This
may be useful if you are experiencing trouble writing to cards.
pcProx Playback Device USB or
RS-232
Here is where you will describe what type of data is written to
the cards: USB keystrokes or RS-232 characters.
If you plan to use the Playback USB reader, make note that the data is written as keystrokes to the
contactless smart card. The Playback USB reader will emulate a USB keyboard and deliver these
keystrokes.
If you plan to use the Playback RS-232 reader, make note that the data is written as RS-232 ASCII
characters to the contactless smart card. The Playback RS-232 reader will output these at 9600,n,8,1
as ASCII characters.
Connection to the utility with a MIFARE contactless smart card
15 Chapter 3 Software

16 Chapter 3 Software
pcProx Writer for Log-On Tab
For log-on applications, the ‘form’ is actually the log-on dialog fields (username and password).
The keystrokes as simply used to land the cursor to the correct field (ctrl-Alt-Del, TAB etc.), prior to
inserting the employee related data. In fact any application requiring employee specific information is
a perfect candidate for using this system.
Note: The pcProx Writer system is not limited to log-on applications. In fact if you using the Playback USB
reader, you should think of Playback reader as a form filler – with the contactless smart card holding the
keystrokes and the employee specific data.
For users of the Playback RS-232 you should think of the keystrokes as RS-232 characters. For
example, in a serial port truck scale device, you may need to send a HEX 01 to initialize the device.
Simply use the ‘Special Keystrokes’ and select the appropriate RS-232 required characters.
Create and Write Credentials
Access to all user data you write using pcProx Card Manager is secured by writing unique security
keys to the card. If a card location (page, application area, block) has unique keys written to it by
another application (i.e. biometric data), you will not be able to read or write to that location on the
card (See the section labeled ‘Memory Map’ for details on card locations for each type of card).
If the location is available, or in use by the pcProx system, the Card Manager will be able to create
and write keys to the card in order to secure the card’s contents in the locations you are using.
Other locations of the card are not modified.
Card Data and Keystrokes
This section holds the username and password credentials, as well as any additional keystrokes
required by the application or operating system to deliver the credentials to the correct fields on the
screen.
For example, in Windows XP a user would want to send a “GUI-L” as well as a “Alt-U” keystrokes first
prior to typing in your username.

The “GUI-L” keystroke sequence (the windows key + ‘L’), cause the PC to go into a locked state.
This sequence is done first to prevent someone from trying to send your username and password
sequence of keystrokes into another application, such as MS Word (for viewing and stealing). If the
user is already in a logged off or locked stated, these keystrokes are simply discarded. If your PC is
logged-on, the first thing that happens is to lock the machine – eliminating viewing possibilities.
The keystroke sequence, “Alt-U”, places the cursor into the username field at logon. The “Alt-U” is a
‘Special Keystroke’ that is inserted using unique key codes as defined by the USB keyboard
specification.
Note: To insert the correct key codes for special keystrokes, use the ‘Add Special Keystrokes’ section. It is
possible to put keystrokes and user data into any of the Credential and keystrokes fields.
Commands Description
Pre-Keystrokes This field holds the keystrokes that are to be sent prior to the
user’s ‘Credential 1’. In the context of a typical log-on application,
‘Credential 1’ is commonly known as the Username. The
‘Pre-Keystrokes’ would be the sequence of keystrokes required
to bring up the log-on dialog box. This sequence of keystrokes
can be different for each application and operating system.
For example Windows 2000 is Ctrl-Alt-Del, while the home
edition of Windows XP uses the keystroke sequence Alt-U (to
position the cursor into the Username field).
Credential 1 For a log-on application, this field is commonly known as the
Username.
Post Keystrokes This field holds the keystrokes that are to be sent after the user’s
‘Credential 1’ is delivered. In the context of a typical log-on
application, the cursor must be positioned into the password
field by using a TAB keystroke.
Credential 2 For a log-on application, this field is commonly known as the
Password.
Advanced Location
Location for Data on iCLASS Card: Page - Appl Area - Block
Depending on the contactless part number, your card will have a different number of pages and size
(see Memory Map section). This area is automatically entered for you, however if you need to modify
and place the data into different locations, you may modify these values. Be cautious not to overwrite
blocks of data when modifying these values. As you add or remove keystrokes the starting block
location for each Credential may change if a boundary is reached.
Location for Data on MIFARE Card: Sector
For MIFARE cards, each of the Credentials is allocated a complete Sector. A Sector consists of 3
blocks of 16 bytes – for a total of 48 bytes. We do not allow for writing in Sector ‘0’ or the to the last
Sector located on the card. Each keystroke requires 2 bytes, and each block holds up to 8 bytes – 4
keystrokes. Each Credential or Card Gone field requires a 2 byte termination character.
To test a card, simply reconfigure the Playback reader and test the card.
17 Chapter 3 Software

18 Chapter 3 Software
iCLASS Find Free Page
After pressing the Advanced Location button, this feature button is visible. The Find Free Page button
performs a lookup for contactless cards with more than 1 page (16kbit /16 Appl Area), such as the
BDG-2002. This will perform a search of all pages to find which ones are not secured with unique
keys. The list will appear in the adjacent pull down box.
Note: pcProx secured pages will not show up as free.
MIFARE Find Free Sector
This will provide a drop down list of all available Sectors on the card being read.
Note: sectors already being used by pcProx Card Manager will show up as unavailable.
Card Gone Keystrokes
The Card Gone field holds the keystrokes to be delivered when the card is removed from the pcProx
Playback reader. A typical Card Gone keystroke sequence would be to lock a workstation. Under
Windows XP this is done by holding down ‘GUI’ (Windows key) and pressing ‘L’.
Note: This feature should be used with caution since it implies the user is being asked to leave their
card on the reader. Since the contactless card often carries security information, it is dangerous to ask
employees to leave a card on the reader since they are likely to forget the card. It therefore leaves open
a security flaw since another user can easily obtain a card and impersonate the user. A much safer
alternative is to use the RF IDeas pcProx Sonar (visit www.RFIDeas.com for more information on the
Sonar)
Check and Set Keys
As mentioned earlier, the contactless smart card is shipped with default access keys from the factory.
In order to secure an area of the card for a specific application, unique keys are used.
Once the keys are set, the card’s contents for this particular Page and Application Area (or for
MIFARE Sector) are not accessible without the proper key. It is possible that areas of your contactless
card may be secured by another application. If you are unsure if the card is already being used by
another application you should perform a ‘Check and Set Keys’ operation to verify the availability of
the card. If this Page and Application Area (or Sector) is in use, you will see a message in the Error-
Status field. If it is free, it will appear as now secure, as shown below.

19 Chapter 3 Software
If you need to free the location for another application, simply use the ‘Clear Keys’ button. This will
write the default keys to the card allowing others to use the card.
Clear Keys
You can free the page by pressing the ‘Clear Card’ button. This writes the default keys back to the
card and frees this location for another application. When a Clear Card is issued, it is important to
realize that the entire Application Area (1 or 2) for this Page is cleared including all blocks within this
Application Area.
See the ‘Memory Map’ section for more details on card locations.
The below example shows that Page 0 has been cleared.
Writing Credentials
Once a card has been confirmed as available, the card can then be “written” to. The next step is to
enter keystrokes and credentials that would normally be typed to perform the log-on to the operating
system or application.
Note: This section makes the assumption that you already have an established username/password
credential that is in use with an application and/or operating system. There are two examples provided: a
one-factor and a two-factor authentication. Following the examples is a discussion of how to increase the
security using this technology.
The ‘Card Data and Keystrokes’ section is broken into two primary sets of fields labeled
Credential 1 and Credential 2. Each set is broken up into 3 fields: ‘Pre keystrokes’, ‘Credential’ and
‘Post keystrokes. While you may enter data or keystrokes into any of the fields, it is organized
this way to help you think in terms of getting the cursor into the correct field when delivering the
credential to the field.
As a Log-On application you will use:
• Credential 1 as the Username, and
• Credential 2 as either a portion of the Password, or the entire Password.

20 Chapter 3 Software
By placing a portion of the Password into the field, and requiring the end user to fill in the balance of
the Password, you have created a two-factor authentication system (something you have – i.e. the
card, and something you know – i.e. the balance of the password). This has the benefit of protecting
against lost/stolen badges. That being said, there is nothing that would stop you from putting the
entire set of data into either (but not both) fields.
Once you have defined the keystrokes and credentials necessary, you are ready to perform a ‘Write
Credential’ operation.
The default setup for the log-on credential allocates room on the card for 16 character usernames,
passwords, as well as a couple of pre and post keystrokes for each credentials. The 16 characters are
the Microsoft Windows limitation for user credentials. Should you need to override the defaults to
expand or reduce this, you may do so by unlocking the ‘Lock Locations’ and pressing the ‘Advanced
Location’.
For iCLASS cards:
For MIFARE cards:
Euro KeyPad
This checkbox is used for those in European countries which have special Euro keypads in the
keyboards. Checking this checkbox allows for the keycode translations when using these keyboards.
This manual suits for next models
1
Table of contents
Popular RFID System manuals by other brands

Fortress Technologies
Fortress Technologies ATOM operating instructions

GeoVision
GeoVision GV-RU9003 manual

Unitech
Unitech RP902 quick start guide

Software House
Software House RM SE Series Quick start installation guide

TECH FASS
TECH FASS MREM 80 AgorGR-TF user guide

Iron logic
Iron logic CP-Z 2MF user manual