throbber
Specification for RFID Air Interface
`
`
`
`EPC™ Radio-Frequency Identity Protocols
`Class-1 Generation-2 UHF RFID
`Protocol for Communications at 860 MHz – 960 MHz
`Version 1.2.0
`
`Copyright notice
`
`© 2004 – 2008 EPCglobal Inc.
`All rights reserved. Unauthorized reproduction, modification, and/or use of this Document is not permitted. Requests for
`permission to reproduce should be addressed to epcglobal@epcglobalinc.org.
`EPCglobal Inc.TM is providing this document as a service to interested industries. This document was developed through a
`consensus process of interested parties. Although efforts have been to assure that the document is correct, reliable, and
`technically accurate, EPCglobal Inc. makes NO WARRANTY, EXPRESS OR IMPLIED, THAT THIS DOCUMENT IS
`CORRECT, WILL NOT REQUIRE MODIFICATION AS EXPERIENCE AND TECHNOLOGICAL ADVANCES DICTATE, OR
`WILL BE SUITABLE FOR ANY PURPOSE OR WORKABLE IN ANY APPLICATION, OR OTHERWISE. Use of this Docu-
`ment is with the understanding that EPCglobal Inc. has no liability for any claim to the contrary, or for any damage or loss of
`any kind or nature.
`
`Disclaimer
`Whilst every effort has been made to ensure that this document and the information contained herein are correct, EP-
`Cglobal and any other party involved in the creation of the document hereby state that the document is provided on an “as
`is” basis without warranty, either expressed or implied, including but not limited to any warranty that the use of the informa-
`tion herein will not infringe any rights, of accuracy or fitness for purpose, and hereby disclaim any liability, direct or indirect,
`for damages or loss relating to the use of the document.
`
`© 2004 – 2008 EPCglobal Inc.
`
`Page 1 of 108
`
`23 October 2008
`
`CSC ServiceWorks - Ex.1012
`
`Page 1 of 108
`
`

`

`Contents
`INDEX OF FIGURES .................................................................................................................................................6
`INDEX OF TABLES ...................................................................................................................................................7
`FOREWORD ..............................................................................................................................................................9
`INTRODUCTION......................................................................................................................................................10
`1. SCOPE..............................................................................................................................................................11
`2. CONFORMANCE .............................................................................................................................................11
`2.1 CLAIMING CONFORMANCE.............................................................................................................................11
`2.2 GENERAL CONFORMANCE REQUIREMENTS.....................................................................................................11
`2.2.1
`Interrogators .......................................................................................................................................11
`2.2.2
`Tags....................................................................................................................................................11
`2.3 COMMAND STRUCTURE AND EXTENSIBILITY....................................................................................................12
`2.3.1 Mandatory commands ........................................................................................................................12
`2.3.2 Optional commands............................................................................................................................12
`2.3.3
`Proprietary commands .......................................................................................................................12
`2.3.4
`Custom commands.............................................................................................................................12
`2.4 RESERVED FOR FUTURE USE (RFU).............................................................................................................12
`3. NORMATIVE REFERENCES...........................................................................................................................13
`4. TERMS AND DEFINITIONS.............................................................................................................................14
`4.1 ADDITIONAL TERMS AND DEFINITIONS ............................................................................................................14
`5. SYMBOLS, ABBREVIATED TERMS, AND NOTATION.................................................................................16
`5.1 SYMBOLS.....................................................................................................................................................16
`5.2 ABBREVIATED TERMS ...................................................................................................................................17
`5.3 NOTATION....................................................................................................................................................18
`6. PROTOCOL REQUIREMENTS........................................................................................................................19
`6.1 PROTOCOL OVERVIEW ..................................................................................................................................19
`6.1.1
`Physical layer......................................................................................................................................19
`6.1.2
`Tag-identification layer .......................................................................................................................19
`6.2 PROTOCOL PARAMETERS..............................................................................................................................19
`6.2.1
`Signaling – Physical and media access control (MAC) parameters...................................................19
`6.2.2
`Logical – Operating procedure parameters........................................................................................23
`6.3 DESCRIPTION OF OPERATING PROCEDURE.....................................................................................................24
`6.3.1
`Signaling .............................................................................................................................................24
`6.3.1.1
`Operational frequencies ..............................................................................................................24
`6.3.1.2
`Interrogator-to-Tag (R=>T) communications...............................................................................24
`6.3.1.2.1 Interrogator frequency accuracy...............................................................................................24
`6.3.1.2.2 Modulation ................................................................................................................................24
`6.3.1.2.3 Data encoding...........................................................................................................................24
`6.3.1.2.4 Tari values ................................................................................................................................25
`6.3.1.2.5 R=>T RF envelope....................................................................................................................25
`6.3.1.2.6 Interrogator power-up waveform...............................................................................................25
`6.3.1.2.7 Interrogator power-down waveform..........................................................................................26
`6.3.1.2.8 R=>T preamble and frame-sync ...............................................................................................26
`6.3.1.2.9 Frequency-hopping spread-spectrum waveform ......................................................................27
`6.3.1.2.10 Frequency-hopping spread-spectrum channelization...............................................................27
`6.3.1.2.11 Transmit mask ..........................................................................................................................27
`6.3.1.3
`Tag-to-Interrogator (T=>R) communications...............................................................................29
`6.3.1.3.1 Modulation ................................................................................................................................29
`6.3.1.3.2 Data encoding...........................................................................................................................30
`6.3.1.3.2.1 FM0 baseband....................................................................................................................30
`6.3.1.3.2.2 FM0 preamble ....................................................................................................................30
`6.3.1.3.2.3 Miller-modulated subcarrier................................................................................................31
`
`© 2004 – 2008 EPCglobal Inc.
`
`Page 2 of 108
`
`23 October 2008
`
`CSC ServiceWorks - Ex.1012
`
`Page 2 of 108
`
`

`

`6.3.1.3.2.4 Miller subcarrier preamble..................................................................................................32
`6.3.1.3.3 Tag supported Tari values and backscatter link rates..............................................................34
`6.3.1.3.4 Tag power-up timing .................................................................................................................34
`6.3.1.3.5 Minimum operating field strength and backscatter strength.....................................................34
`6.3.1.4
`Transmission order......................................................................................................................35
`6.3.1.5
`Cyclic-redundancy check (CRC) .................................................................................................35
`6.3.1.6
`Link timing ...................................................................................................................................35
`6.3.2
`Tag selection, inventory, and access .................................................................................................37
`6.3.2.1
`Tag memory ................................................................................................................................37
`6.3.2.1.1 Reserved Memory.....................................................................................................................38
`6.3.2.1.1.1 Kill password ......................................................................................................................38
`6.3.2.1.1.2 Access password................................................................................................................38
`6.3.2.1.2 EPC Memory.............................................................................................................................38
`6.3.2.1.2.1 CRC-16 (StoredCRC and PacketCRC)..............................................................................38
`6.3.2.1.2.2 Protocol-control (PC) word (StoredPC and PacketPC)......................................................39
`6.3.2.1.2.3 EPC for an EPCglobal™ Application..................................................................................41
`6.3.2.1.2.4 EPC for a non-EPCglobal™ Application ............................................................................41
`6.3.2.1.2.5 Extended Protocol Control (XPC) word or words (optional)...............................................41
`6.3.2.1.3 TID Memory ..............................................................................................................................43
`6.3.2.1.4 User Memory ............................................................................................................................43
`6.3.2.1.4.1 User memory for an EPCglobal™ Application ...................................................................43
`6.3.2.1.4.2 User memory for a non-EPCglobal™ Application ..............................................................43
`6.3.2.2
`Sessions and inventoried flags....................................................................................................43
`6.3.2.3
`Selected flag................................................................................................................................44
`6.3.2.4
`Tag states and slot counter.........................................................................................................45
`6.3.2.4.1 Ready state...............................................................................................................................45
`6.3.2.4.2 Arbitrate state............................................................................................................................45
`6.3.2.4.3 Reply state ................................................................................................................................45
`6.3.2.4.4 Acknowledged state..................................................................................................................45
`6.3.2.4.5 Open state ................................................................................................................................46
`6.3.2.4.6 Secured state............................................................................................................................46
`6.3.2.4.7 Killed state ................................................................................................................................46
`6.3.2.4.8 Slot counter...............................................................................................................................46
`6.3.2.5
`Tag random or pseudo-random number generator.....................................................................46
`6.3.2.6 Managing Tag populations ..........................................................................................................48
`6.3.2.7
`Selecting Tag populations...........................................................................................................48
`6.3.2.8
`Inventorying Tag populations ......................................................................................................49
`6.3.2.9
`Accessing individual Tags...........................................................................................................51
`6.3.2.10 Killing or recommissioning a Tag ................................................................................................52
`6.3.2.11
`Interrogator commands and Tag replies .....................................................................................53
`6.3.2.11.1 Select commands .....................................................................................................................55
`6.3.2.11.1.1 Select (mandatory) .............................................................................................................55
`6.3.2.11.2 Inventory commands ................................................................................................................57
`6.3.2.11.2.1 Query (mandatory) .............................................................................................................57
`6.3.2.11.2.2 QueryAdjust (mandatory) ...................................................................................................58
`6.3.2.11.2.3 QueryRep (mandatory).......................................................................................................59
`6.3.2.11.2.4 ACK (mandatory)................................................................................................................60
`6.3.2.11.2.5 NAK (mandatory)................................................................................................................61
`6.3.2.11.3 Access commands....................................................................................................................62
`6.3.2.11.3.1 Req_RN (mandatory) .........................................................................................................63
`6.3.2.11.3.2 Read (mandatory)...............................................................................................................64
`6.3.2.11.3.3 Write (mandatory)...............................................................................................................66
`6.3.2.11.3.4 Kill (mandatory) ..................................................................................................................67
`6.3.2.11.3.5 Lock (mandatory)................................................................................................................70
`6.3.2.11.3.6 Access (optional) ................................................................................................................72
`6.3.2.11.3.7 BlockWrite (optional) ..........................................................................................................74
`6.3.2.11.3.8 BlockErase (optional) .........................................................................................................75
`6.3.2.11.3.9 BlockPermalock (optional)..................................................................................................76
`
`© 2004 – 2008 EPCglobal Inc.
`
`Page 3 of 108
`
`23 October 2008
`
`CSC ServiceWorks - Ex.1012
`
`Page 3 of 108
`
`

`

`INTELLECTUAL PROPERTY RIGHTS INTRINSIC TO THIS SPECIFICATION............................................79
`7.
`ANNEX A (NORMATIVE) EXTENSIBLE BIT VECTORS (EBV) ............................................................................80
`ANNEX B (NORMATIVE) STATE-TRANSITION TABLES ....................................................................................81
`B.1 PRESENT STATE: READY...............................................................................................................................81
`B.2 PRESENT STATE: ARBITRATE ........................................................................................................................82
`B.3 PRESENT STATE: REPLY ...............................................................................................................................83
`B.4 PRESENT STATE: ACKNOWLEDGED................................................................................................................84
`B.5 PRESENT STATE: OPEN ................................................................................................................................85
`B.6 PRESENT STATE: SECURED ..........................................................................................................................86
`B.7 PRESENT STATE: KILLED...............................................................................................................................87
`ANNEX C (NORMATIVE) COMMAND-RESPONSE TABLES ...............................................................................88
`C.1 COMMAND RESPONSE: POWER-UP................................................................................................................88
`C.2 COMMAND RESPONSE: QUERY......................................................................................................................88
`C.3 COMMAND RESPONSE: QUERYREP ...............................................................................................................89
`C.4 COMMAND RESPONSE: QUERYADJUST ..........................................................................................................89
`C.5 COMMAND RESPONSE: ACK .........................................................................................................................90
`C.6 COMMAND RESPONSE: NAK .........................................................................................................................90
`C.7 COMMAND RESPONSE: REQ_RN...................................................................................................................90
`C.8 COMMAND RESPONSE: SELECT.....................................................................................................................91
`C.9 COMMAND RESPONSE: READ ........................................................................................................................91
`C.10
`COMMAND RESPONSE: WRITE ...................................................................................................................91
`C.11
`COMMAND RESPONSE: KILL.......................................................................................................................92
`C.12
`COMMAND RESPONSE: LOCK.....................................................................................................................92
`C.13
`COMMAND RESPONSE: ACCESS.................................................................................................................93
`C.14
`COMMAND RESPONSE: BLOCKWRITE.........................................................................................................93
`C.15
`COMMAND RESPONSE: BLOCKERASE ........................................................................................................94
`C.16
`COMMAND RESPONSE: BLOCKPERMALOCK ................................................................................................94
`C.17
`COMMAND RESPONSE: T2 TIMEOUT............................................................................................................94
`C.18
`COMMAND RESPONSE: INVALID COMMAND .................................................................................................95
`ANNEX D (INFORMATIVE) EXAMPLE SLOT-COUNT (Q) SELECTION ALGORITHM.......................................96
`D.1 EXAMPLE ALGORITHM AN INTERROGATOR MIGHT USE TO CHOOSE Q ...............................................................96
`ANNEX E (INFORMATIVE) EXAMPLE OF TAG INVENTORY AND ACCESS.....................................................97
`E.1 EXAMPLE INVENTORY AND ACCESS OF A SINGLE TAG .....................................................................................97
`ANNEX F (INFORMATIVE) CALCULATION OF 5-BIT AND 16-BIT CYCLIC REDUNDANCY CHECKS............98
`F.1 EXAMPLE CRC-5 ENCODER/DECODER ..........................................................................................................98
`F.2 EXAMPLE CRC-16 ENCODER/DECODER ........................................................................................................98
`F.3 EXAMPLE CRC-16 CALCULATIONS ................................................................................................................99
`ANNEX G (NORMATIVE) MULTIPLE- AND DENSE-INTERROGATOR CHANNELIZED SIGNALING.............100
`G.1 OVERVIEW OF DENSE-INTERROGATOR CHANNELIZED SIGNALING (INFORMATIVE)............................................100
`ANNEX H (INFORMATIVE) INTERROGATOR-TO-TAG LINK MODULATION ..................................................102
`H.1 BASEBAND WAVEFORMS, MODULATED RF, AND DETECTED WAVEFORMS .......................................................102
`ANNEX I (NORMATIVE) ERROR CODES............................................................................................................103
`I.1
`TAG ERROR CODES AND THEIR USAGE .........................................................................................................103
`ANNEX J (NORMATIVE) SLOT COUNTER .........................................................................................................104
`J.1
`SLOT-COUNTER OPERATION........................................................................................................................104
`ANNEX K (INFORMATIVE) EXAMPLE DATA-FLOW EXCHANGE....................................................................105
`K.1 OVERVIEW OF THE DATA-FLOW EXCHANGE ..................................................................................................105
`K.2 TAG MEMORY CONTENTS AND LOCK-FIELD VALUES.......................................................................................105
`K.3 DATA-FLOW EXCHANGE AND COMMAND SEQUENCE ......................................................................................106
`ANNEX L (INFORMATIVE) OPTIONAL TAG FEATURES ..................................................................................107
`L.1 OPTIONAL TAG PASSWORDS .......................................................................................................................107
`L.2 OPTIONAL TAG MEMORY BANKS AND MEMORY-BANK SIZES ...........................................................................107
`
`© 2004 – 2008 EPCglobal Inc.
`
`Page 4 of 108
`
`23 October 2008
`
`CSC ServiceWorks - Ex.1012
`
`Page 4 of 108
`
`

`

`L.3 OPTIONAL TAG COMMANDS.........................................................................................................................107
`L.4 OPTIONAL TAG ERROR-CODE REPORTING FORMAT.......................................................................................107
`L.5 OPTIONAL TAG BACKSCATTER MODULATION FORMAT ...................................................................................107
`L.6 OPTIONAL TAG FUNCTIONALITY...................................................................................................................107
`ANNEX M (INFORMATIVE) REVISION HISTORY ...............................................................................................108
`
`
`© 2004 – 2008 EPCglobal Inc.
`
`Page 5 of 108
`
`23 October 2008
`
`CSC ServiceWorks - Ex.1012
`
`Page 5 of 108
`
`

`

`Index of Figures
`FIGURE 6.1 – PIE SYMBOLS ........................................................................................................................................24
`FIGURE 6.2 – INTERROGATOR-TO-TAG RF ENVELOPE ..................................................................................................25
`FIGURE 6.3 – INTERROGATOR POWER-UP AND POWER-DOWN RF ENVELOPE .................................................................26
`FIGURE 6.4 – R=>T PREAMBLE AND FRAME-SYNC ........................................................................................................27
`FIGURE 6.5 – FHSS INTERROGATOR RF ENVELOPE.....................................................................................................28
`FIGURE 6.6 – TRANSMIT MASK FOR MULTIPLE-INTERROGATOR ENVIRONMENTS..............................................................29
`FIGURE 6.7 – TRANSMIT MASK FOR DENSE-INTERROGATOR ENVIRONMENTS..................................................................29
`FIGURE 6.8 – FM0 BASIS FUNCTIONS AND GENERATOR STATE DIAGRAM........................................................................30
`FIGURE 6.9 – FM0 SYMBOLS AND SEQUENCES.............................................................................................................30
`FIGURE 6.10 – TERMINATING FM0 TRANSMISSIONS......................................................................................................31
`FIGURE 6.11 – FM0 T=>R PREAMBLE .........................................................................................................................31
`FIGURE 6.12 – MILLER BASIS FUNCTIONS AND GENERATOR STATE DIAGRAM ..................................................................31
`FIGURE 6.13 – SUBCARRIER SEQUENCES ....................................................................................................................32
`FIGURE 6.14 – TERMINATING SUBCARRIER TRANSMISSIONS..........................................................................................33
`FIGURE 6.15 – SUBCARRIER T=>R PREAMBLE.............................................................................................................33
`FIGURE 6.16 – LINK TIMING .........................................................................................................................................36
`FIGURE 6.17 – LOGICAL MEMORY MAP.........................................................................................................................37
`FIGURE 6.18 – SESSION DIAGRAM ...............................................................................................................................44
`FIGURE 6.19 – TAG STATE DIAGRAM............................................................................................................................47
`FIGURE 6.20 – INTERROGATOR/TAG OPERATIONS AND TAG STATE................................................................................48
`FIGURE 6.21 – ONE TAG REPLY ..................................................................................................................................50
`FIGURE 6.22 – SUCCESSFUL WRITE SEQUENCE...........................................................................................................66
`FIGURE 6.23 – KILL PROCEDURE .................................................................................................................................69
`FIGURE 6.24 – LOCK PAYLOAD AND USAGE ..................................................................................................................71
`FIGURE 6.25 – ACCESS PROCEDURE ...........................................................................................................................73
`FIGURE D.1 – EXAMPLE ALGORITHM FOR CHOOSING THE SLOT-COUNT PARAMETER Q....................................................96
`FIGURE E.1 – EXAMPLE OF TAG INVENTORY AND ACCESS.............................................................................................97
`FIGURE F.1 – EXAMPLE CRC-5 CIRCUIT......................................................................................................................98
`FIGURE F.2 – EXAMPLE CRC-16 CIRCUIT....................................................................................................................99
`FIGURE G.1 – EXAMPLES OF DENSE-INTERROGATOR-MODE OPERATION......................................................................101
`FIGURE H.1 – INTERROGATOR-TO-TAG MODULATION..................................................................................................102
`FIGURE J.1 – SLOT-COUNTER STATE DIAGRAM...........................................................................................................104
`
`
`© 2004 – 2008 EPCglobal Inc.
`
`Page 6 of 108
`
`23 October 2008
`
`CSC ServiceWorks - Ex.1012
`
`Page 6 of 108
`
`

`

`Index of Tables
`TABLE 6.1 – INTERROGATOR-TO-TAG (R=>T) COMMUNICATIONS ..................................................................................20
`TABLE 6.2 – TAG-TO-INTERROGATOR (T=>R) COMMUNICATIONS ..................................................................................21
`TABLE 6.3 – TAG INVENTORY AND ACCESS PARAMETERS ..............................................................................................23
`TABLE 6.4 – COLLISION MANAGEMENT PARAMETERS ....................................................................................................23
`TABLE 6.5 – RF ENVELOPE PARAMETERS ....................................................................................................................25
`TABLE 6.6 – INTERROGATOR POWER-UP WAVEFORM PARAMETERS ...............................................................................26
`TABLE 6.7 – INTERROGATOR POWER-DOWN WAVEFORM PARAMETERS ..........................................................................26
`TABLE 6.8 – FHSS WAVEFORM PARAMETERS ..............................................................................................................28
`TABLE 6.9 – TAG-TO-INTERROGATOR LINK FREQUENCIES .............................................................................................34
`TABLE 6.10 – TAG-TO-INTERROGATOR DATA RATES .....................................................................................................34
`TABLE 6.11 – CRC-16 PRECURSOR ............................................................................................................................35
`TABLE 6.12 – CRC-5 DEFINITION. SEE ALSO ANNEX F .................................................................................................35
`TABLE 6.13 – LINK TIMING

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket