EasyManua.ls Logo

Panasonic PT-REQ12 Series

Panasonic PT-REQ12 Series
306 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Chapter 7Appendix — Technical information
274 - ENGLISH
Data section Blank Mode Blank Random number section
Termination
symbol
Data length 9 bytes 1 byte 1 byte 1 byte 8 bytes 1 byte
f Mode: 1 = Protect mode
f Example: Response during protect mode (random number section is undened value)
“NTCONTROL 1 23181e1e” (CR)
3) Generate a 32-byte hash value from the following data using MD5 algorithm.
f “xxxxxx:yyyyy:zzzzzzzz”
xxxxxx The user name for the administrator account
yyyyy The password for the administrator account
zzzzzzzz 8-byte random number obtained in Step 2)
Command transmission method
Transmit using the following command formats.
r Transmitted data
Header Data section
Termination
symbol
Command
example
Hash value
“Connecting” (x page 273)
‘0’
0x30
‘0’
0x30
Control command
(ASCII string)
(CR)
0x0d
Data length 32 bytes 1 byte 1 byte Undened length 1 byte
f Example: Transmission of power supply status acquisition command (hash value is calculated from the user
name and password of the administrator account, and acquired random number)
“dbdd2dabd3d4d68c5dd970ec0c29fa6400QPW” (CR)
r Received data
Header Data section
Termination
symbol
Command
example
‘0’
0x30
‘0’
0x30
Control command
(ASCII string)
(CR)
0x0d
Data length 1 byte 1 byte Undened length 1 byte
f Example: The projector is powered on
“00001” (CR)
r Error response
String Details
Termination
symbol
Message
“ERR1” Undened control command
(CR)
0x0d
“ERR2” Out of parameter range
“ERR3” Busy state or no-acceptable period
“ERR4” Timeout or no-acceptable period
“ERR5” Wrong data length
“ERRA” Password mismatch
Data length 4 bytes 1 byte
Note
f The projector will automatically disconnect the connection with the network right after sending the command. This is the specication based
on the security view point to prevent unauthorized operation of this product by a malicious third party. To send commands continuously,
execute the network connection request every time the command is to be sent. For details, refer to “Communication ow between server
and client” (x page 276).

Table of Contents

Related product manuals