Table of Contents v
Chapter 5: ZEBRA RFID SDK for Android
Introduction .................................................................................................................................... 5-1
Basics ...................................................................................................................................... 5-1
Connection Management ............................................................................................................... 5-2
Connect to an RFID Reader .................................................................................................... 5-2
Special Connection Handling Cases .................................................................................. 5-2
Disconnect ............................................................................................................................... 5-4
Reconnect ................................................................................................................................ 5-4
Knowing the Reader Capabilities ................................................................................................... 5-4
General Capabilities ................................................................................................................. 5-4
Gen2 Capabilities ..................................................................................................................... 5-4
Regulatory Capabilities ............................................................................................................ 5-5
UHF Band Capabilities ............................................................................................................. 5-5
Reader Identification ................................................................................................................ 5-5
Configuring the Reader .................................................................................................................. 5-6
RF Mode .................................................................................................................................. 5-6
Antenna Specific Configuration ................................................................................................ 5-6
Antenna Configuration ....................................................................................................... 5-6
Singulation Control ............................................................................................................. 5-7
Tag Report Configuration ......................................................................................................... 5-8
Regulatory Configuration ......................................................................................................... 5-8
Beeper Configuration ............................................................................................................... 5-9
Dynamic Power Management Configuration ........................................................................... 5-9
Saving Configuration ................................................................................................................ 5-9
Managing Events ........................................................................................................................... 5-10
Device Status Related Events ................................................................................................. 5-12
Basic Operations ............................................................................................................................ 5-12
Tag Storage Settings ............................................................................................................... 5-12
Simple Inventory (Continuous) ........................................................................................... 5-13
Simple Access Operations - On Single Tag ....................................................................... 5-13
Read ................................................................................................................................... 5-13
Write, Block-Write .............................................................................................................. 5-14
Lock .................................................................................................................................... 5-14
Kill ...................................................................................................................................... 5-15
Block-Erase ........................................................................................................................ 5-15
Block-Permalock ................................................................................................................ 5-15
Access Operations on Specific Memory Field of Single Tag ............................................. 5-16
Advanced Operations .................................................................................................................... 5-16
Using Pre-Filters ...................................................................................................................... 5-16
Introduction .............................................................................................................................. 5-16
Singulation ......................................................................................................................... 5-16
Sessions and Inventoried Flags ......................................................................................... 5-16
Selected Flag ..................................................................................................................... 5-17
State-Aware Singulation ..................................................................................................... 5-17
Applying Pre-Filters ............................................................................................................ 5-17
Add Pre-filters .................................................................................................................... 5-17
Using Triggers .......................................................................................................................... 5-19
Inventory .................................................................................................................................. 5-21
Inventory with Triggers ....................................................................................................... 5-21
Access ..................................................................................................................................... 5-22
Using Access-Filters .......................................................................................................... 5-22