EPC™ Radio-Frequency Identity Protocols Generation-2 UHF RFID Standard

EPC™ Radio-Frequency Identity Protocols Generation-2 UHF RFID Standard

EPC™ Radio-Frequency Identity Protocols Generation-2 UHF RFID Standard Specification for RFID Air Interface Protocol for Communications at 860 MHz – 960 MHz Release 2.1, Ratified, Jul 2018 EPC™ Radio-Frequency Identity Protocols Generation-2 UHF RFID Standard Document Summary Document Item Current Value Document Name EPC™ Radio-Frequency Identity Protocols Generation-2 UHF RFID Standard Document Date Jul 2018 Document Version 2.1 Document Issue Document Status Ratified Document Description Specification for RFID Air Interface Protocol for Communications at 860 MHz – 960 MHz Log of Changes Release Date of Change Changed By Summary of Change Version 1.0.4 Sept 8, 2004 Modified Chicago protocol V1.0.3 as per August 17, 2004 “combo” CRC change template. Version 1.0.5 Sept 14, 2004 Modified Gen2 protocol V1.0.4 as per September 10, 2004 CRC review. Version 1.0.6 Sept 17, 2004 Modified Gen2 protocol V1.0.5 as per September 17, 2004 HAG review. Version 1.0.7 Sept 24, 2004 Modified Gen2 protocol V1.0.6 as per September 21, 2004 CRC review to fix errata. Changed OID to EPC. Version 1.0.8 Dec 11, 2004 Modified Gen2 protocol V1.0.7 as per the V1.0.7 errata. Version 1.0.9 Jan 26, 2005 Modified Gen2 protocol V1.0.8 as per the V1.0.8 errata and AFI enhancement requests. Version 1.1.0 Dec 1, 2005 Harmonized Gen2 protocol V1.0.9 with the ISO 18000-6 Type C amendment. Version 1.2.0 May 11, 2008 Modified Gen2 protocol V1.1.0 to satisfy the ILT JRG requirements V1.2.3. 2.0.0 Oct 2013 Modified Gen2 protocol V1.2.0 to satisfy EAS JRG requirements V0.8, TA JRG requirements V0.7, and CE JRG requirements V1.5.4. 2.0.1 Apr 2015 Modified Gen2 protocol V2.0.0 to fix errata 2.1 Jul 2018 D.Buckley (branding), Update to new GS1 branding and WR 17-223: D.Mullen (content) Modified Gen2 to harmonize with ISO 18000-63 clarifications (briefly, and incorrectly, published as version 3.0). Disclaimer GS1®, under its IP Policy, seeks to avoid uncertainty regarding intellectual property claims by requiring the participants in the Work Group that developed this EPC™ Radio-Frequency Identity Protocols Generation-2 UHF RFID Standard to agree to grant to GS1 members a royalty-free licence or a RAND licence to Necessary Claims, as that term is defined in the GS1 IP Policy. Furthermore, attention is drawn to the possibility that an implementation of one or more features of this Specification may be the subject of a patent or other intellectual property right that does not involve a Necessary Claim. Any such patent or other intellectual property right is not subject to the licencing obligations of GS1. Moreover, the agreement to grant licences provided under the GS1 IP Policy does not include IP rights and any claims of third parties who were not participants in the Work Group. Release 2.1, Ratified, Jul 2018 © 2018 GS1 AISBL Page 2 of 157 EPC™ Radio-Frequency Identity Protocols Generation-2 UHF RFID Standard Accordingly, GS1 recommends that any organisation developing an implementation designed to be in conformance with this Specification should determine whether there are any patents that may encompass a specific implementation that the organisation is developing in compliance with the Specification and whether a licence under a patent or other intellectual property right is needed. Such a determination of a need for licencing should be made in view of the details of the specific system designed by the organisation in consultation with their own patent counsel. THIS DOCUMENT IS PROVIDED “AS IS” WITH NO WARRANTIES WHATSOEVER, INCLUDING ANY WARRANTY OF MERCHANTABILITY, NONINFRINGMENT, FITNESS FOR PARTICULAR PURPOSE, OR ANY WARRANTY OTHER WISE ARISING OUT OF THIS SPECIFICATION. GS1 disclaims all liability for any damages arising from use or misuse of this Standard, whether special, indirect, consequential, or compensatory damages, and including liability for infringement of any intellectual property rights, relating to use of information in or reliance upon this document. GS1 retains the right to make changes to this document at any time, without notice. GS1 makes no warranty for the use of this document and assumes no responsibility for any errors which may appear in the document, nor does it make a commitment to update the information contained herein. GS1 and the GS1 logo are registered trademarks of GS1 AISBL. Release 2.1, Ratified, Jul 2018 © 2018 GS1 AISBL Page 3 of 157 EPC™ Radio-Frequency Identity Protocols Generation-2 UHF RFID Standard Table of Contents Introduction ........................................................................................................ 7 1. Scope ............................................................................................................ 8 2. Conformance ................................................................................................ 8 2.1 Claiming conformance ..................................................................................................... 8 2.2 General conformance requirements ................................................................................... 8 2.2.1 Interrogators .......................................................................................................... 8 2.2.2 Tags ...................................................................................................................... 8 2.3 Command structure and extensibility ................................................................................. 9 2.3.1 Mandatory commands ............................................................................................. 9 2.3.2 Optional commands ................................................................................................ 9 2.3.3 Proprietary commands............................................................................................. 9 2.3.4 Custom commands ................................................................................................. 9 2.4 Reserved for Future Use (RFU).......................................................................................... 9 2.5 Cryptographic Suite Indicators .......................................................................................... 9 3. Normative references ................................................................................. 10 4. Terms and definitions ................................................................................. 10 4.1 Additional terms and definitions ...................................................................................... 10 5. Symbols, abbreviated terms, and notation ................................................. 14 5.1 Symbols ....................................................................................................................... 15 5.2 Abbreviated terms ......................................................................................................... 15 5.3 Notation ....................................................................................................................... 16 6. Protocol requirements ................................................................................ 17 6.1 Protocol overview .......................................................................................................... 17 6.1.1 Physical layer ....................................................................................................... 17 6.1.2 Tag-identification layer .......................................................................................... 17 6.2 Protocol parameters ...................................................................................................... 17 6.2.1 Signaling – Physical and media access control parameters ......................................... 17 6.2.2 Logical – Operating procedure parameters ............................................................... 20 6.3 Description of operating procedure .................................................................................. 21 6.3.1 Physical interface .................................................................................................. 21 6.3.2 Logical interface ................................................................................................... 41 7. Intellectual property rights policy and disclaimer ..................................... 111 Annex A (normative) Extensible bit vectors (EBV) .......................................... 112 Annex B (normative) State-transition tables................................................... 113 B.1 Present state: Ready .................................................................................................... 113 B.2 Present state: Arbitrate................................................................................................. 115 B.3 Present state: Reply ..................................................................................................... 117 B.4 Present state: Acknowledged ......................................................................................... 119 B.5 Present state: Open ..................................................................................................... 121 Release 2.1, Ratified, Jul 2018 © 2018 GS1 AISBL Page 4 of 157 EPC™ Radio-Frequency Identity Protocols Generation-2 UHF RFID Standard B.6 Present state: Secured ................................................................................................. 124 B.7 Present state: Killed ....................................................................................................

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    157 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us