EasyManua.ls Logo

Panasonic PT-RZ690

Panasonic PT-RZ690
240 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Chapter 7Appendix — Technical information
ENGLISH - 217
2) Check the response from the projector.
Data section Blank Mode Blank Random number section
Termination
symbol
Command
example
“NTCONTROL”
(ASCII string)
‘ ’
0x20
‘1’
0x31
‘ ’
0x20
“zzzzzzzz”
(ASCII code hex number)
(CR)
0x0d
Data length
9 bytes 1 byte 1 byte 1 byte 8 bytes 1 byte
f
Mode: 1 = Protect mode
f
Example: Response during protect mode (random number section is undened value)
“NTCONTROL 1 23181e1e” (CR)
3) Generate a 32-byte hash value from the following data using MD5 algorithm.
f
“xxxxxx:yyyyy:zzzzzzzz”
xxxxxx
User name of the administrator account
yyyyy
Password of the administrator account
zzzzzzzz
8-byte random number obtained in Step
2)
Command transmission method
Transmit using the following command formats.
r
Transmitted data
Header Data section
Termination
symbol
Command
example
Hash value
“Connecting” (
x
page 216)
‘0’
0x30
‘0’
0x30
Control command
(ASCII string)
(CR)
0x0d
Data length
32 bytes 1 byte 1 byte Undened length 1 byte
f
Example: Transmission of power supply status acquisition command (hash value is calculated from the
administrator account user name and password, and the acquired random number)
“dbdd2dabd3d4d68c5dd970ec0c29fa6400QPW” (CR)
r
Received data
Header Data section
Termination
symbol
Command
example
‘0’
0x30
‘0’
0x30
Control command
(ASCII string)
(CR)
0x0d
Data length
1 byte 1 byte Undened length 1 byte
f
Example: The projector is powered on
“00001” (CR)
r
Error response
String Details
Termination
symbol
Message
“ERR1” Undened control command
(CR)
0x0d
“ERR2” Out of parameter range
“ERR3” Busy state or no-acceptable period
“ERR4” Timeout or no-acceptable period
“ERR5” Wrong data length
“ERRA” Password mismatch
Data length
4 bytes 1 byte
Note
f
The projector will automatically disconnect the connection with the network right after sending the command. This is the specication based
on the security view point to prevent unauthorized operation of this product by a malicious third party. To send commands continuously,
execute the network connection request every time the command is to be sent. For details, refer to “Communication ow between server
and client” (
x
page 218).

Table of Contents

Related product manuals