`
`
`
`EPC™ Radio-Frequency Identity Protocols
`Class-1 Generation-2 UHF RFID
`Protocol for Communications at 860 MHz – 960 MHz
`Version 1.2.0
`
`Copyright notice
`
`© 2004 – 2008 EPCglobal Inc.
`All rights reserved. Unauthorized reproduction, modification, and/or use of this Document is not permitted. Requests for
`permission to reproduce should be addressed to epcglobal@epcglobalinc.org.
`EPCglobal Inc.TM is providing this document as a service to interested industries. This document was developed through a
`consensus process of interested parties. Although efforts have been to assure that the document is correct, reliable, and
`technically accurate, EPCglobal Inc. makes NO WARRANTY, EXPRESS OR IMPLIED, THAT THIS DOCUMENT IS
`CORRECT, WILL NOT REQUIRE MODIFICATION AS EXPERIENCE AND TECHNOLOGICAL ADVANCES DICTATE, OR
`WILL BE SUITABLE FOR ANY PURPOSE OR WORKABLE IN ANY APPLICATION, OR OTHERWISE. Use of this Docu-
`ment is with the understanding that EPCglobal Inc. has no liability for any claim to the contrary, or for any damage or loss of
`any kind or nature.
`
`Disclaimer
`Whilst every effort has been made to ensure that this document and the information contained herein are correct, EP-
`Cglobal and any other party involved in the creation of the document hereby state that the document is provided on an “as
`is” basis without warranty, either expressed or implied, including but not limited to any warranty that the use of the informa-
`tion herein will not infringe any rights, of accuracy or fitness for purpose, and hereby disclaim any liability, direct or indirect,
`for damages or loss relating to the use of the document.
`
`© 2004 – 2008 EPCglobal Inc.
`
`Page 1 of 108
`
`23 October 2008
`
`CSC ServiceWorks - Ex.1012
`
`Page 1 of 108
`
`
`
`Contents
`INDEX OF FIGURES .................................................................................................................................................6
`INDEX OF TABLES ...................................................................................................................................................7
`FOREWORD ..............................................................................................................................................................9
`INTRODUCTION......................................................................................................................................................10
`1. SCOPE..............................................................................................................................................................11
`2. CONFORMANCE .............................................................................................................................................11
`2.1 CLAIMING CONFORMANCE.............................................................................................................................11
`2.2 GENERAL CONFORMANCE REQUIREMENTS.....................................................................................................11
`2.2.1
`Interrogators .......................................................................................................................................11
`2.2.2
`Tags....................................................................................................................................................11
`2.3 COMMAND STRUCTURE AND EXTENSIBILITY....................................................................................................12
`2.3.1 Mandatory commands ........................................................................................................................12
`2.3.2 Optional commands............................................................................................................................12
`2.3.3
`Proprietary commands .......................................................................................................................12
`2.3.4
`Custom commands.............................................................................................................................12
`2.4 RESERVED FOR FUTURE USE (RFU).............................................................................................................12
`3. NORMATIVE REFERENCES...........................................................................................................................13
`4. TERMS AND DEFINITIONS.............................................................................................................................14
`4.1 ADDITIONAL TERMS AND DEFINITIONS ............................................................................................................14
`5. SYMBOLS, ABBREVIATED TERMS, AND NOTATION.................................................................................16
`5.1 SYMBOLS.....................................................................................................................................................16
`5.2 ABBREVIATED TERMS ...................................................................................................................................17
`5.3 NOTATION....................................................................................................................................................18
`6. PROTOCOL REQUIREMENTS........................................................................................................................19
`6.1 PROTOCOL OVERVIEW ..................................................................................................................................19
`6.1.1
`Physical layer......................................................................................................................................19
`6.1.2
`Tag-identification layer .......................................................................................................................19
`6.2 PROTOCOL PARAMETERS..............................................................................................................................19
`6.2.1
`Signaling – Physical and media access control (MAC) parameters...................................................19
`6.2.2
`Logical – Operating procedure parameters........................................................................................23
`6.3 DESCRIPTION OF OPERATING PROCEDURE.....................................................................................................24
`6.3.1
`Signaling .............................................................................................................................................24
`6.3.1.1
`Operational frequencies ..............................................................................................................24
`6.3.1.2
`Interrogator-to-Tag (R=>T) communications...............................................................................24
`6.3.1.2.1 Interrogator frequency accuracy...............................................................................................24
`6.3.1.2.2 Modulation ................................................................................................................................24
`6.3.1.2.3 Data encoding...........................................................................................................................24
`6.3.1.2.4 Tari values ................................................................................................................................25
`6.3.1.2.5 R=>T RF envelope....................................................................................................................25
`6.3.1.2.6 Interrogator power-up waveform...............................................................................................25
`6.3.1.2.7 Interrogator power-down waveform..........................................................................................26
`6.3.1.2.8 R=>T preamble and frame-sync ...............................................................................................26
`6.3.1.2.9 Frequency-hopping spread-spectrum waveform ......................................................................27
`6.3.1.2.10 Frequency-hopping spread-spectrum channelization...............................................................27
`6.3.1.2.11 Transmit mask ..........................................................................................................................27
`6.3.1.3
`Tag-to-Interrogator (T=>R) communications...............................................................................29
`6.3.1.3.1 Modulation ................................................................................................................................29
`6.3.1.3.2 Data encoding...........................................................................................................................30
`6.3.1.3.2.1 FM0 baseband....................................................................................................................30
`6.3.1.3.2.2 FM0 preamble ....................................................................................................................30
`6.3.1.3.2.3 Miller-modulated subcarrier................................................................................................31
`
`© 2004 – 2008 EPCglobal Inc.
`
`Page 2 of 108
`
`23 October 2008
`
`CSC ServiceWorks - Ex.1012
`
`Page 2 of 108
`
`
`
`6.3.1.3.2.4 Miller subcarrier preamble..................................................................................................32
`6.3.1.3.3 Tag supported Tari values and backscatter link rates..............................................................34
`6.3.1.3.4 Tag power-up timing .................................................................................................................34
`6.3.1.3.5 Minimum operating field strength and backscatter strength.....................................................34
`6.3.1.4
`Transmission order......................................................................................................................35
`6.3.1.5
`Cyclic-redundancy check (CRC) .................................................................................................35
`6.3.1.6
`Link timing ...................................................................................................................................35
`6.3.2
`Tag selection, inventory, and access .................................................................................................37
`6.3.2.1
`Tag memory ................................................................................................................................37
`6.3.2.1.1 Reserved Memory.....................................................................................................................38
`6.3.2.1.1.1 Kill password ......................................................................................................................38
`6.3.2.1.1.2 Access password................................................................................................................38
`6.3.2.1.2 EPC Memory.............................................................................................................................38
`6.3.2.1.2.1 CRC-16 (StoredCRC and PacketCRC)..............................................................................38
`6.3.2.1.2.2 Protocol-control (PC) word (StoredPC and PacketPC)......................................................39
`6.3.2.1.2.3 EPC for an EPCglobal™ Application..................................................................................41
`6.3.2.1.2.4 EPC for a non-EPCglobal™ Application ............................................................................41
`6.3.2.1.2.5 Extended Protocol Control (XPC) word or words (optional)...............................................41
`6.3.2.1.3 TID Memory ..............................................................................................................................43
`6.3.2.1.4 User Memory ............................................................................................................................43
`6.3.2.1.4.1 User memory for an EPCglobal™ Application ...................................................................43
`6.3.2.1.4.2 User memory for a non-EPCglobal™ Application ..............................................................43
`6.3.2.2
`Sessions and inventoried flags....................................................................................................43
`6.3.2.3
`Selected flag................................................................................................................................44
`6.3.2.4
`Tag states and slot counter.........................................................................................................45
`6.3.2.4.1 Ready state...............................................................................................................................45
`6.3.2.4.2 Arbitrate state............................................................................................................................45
`6.3.2.4.3 Reply state ................................................................................................................................45
`6.3.2.4.4 Acknowledged state..................................................................................................................45
`6.3.2.4.5 Open state ................................................................................................................................46
`6.3.2.4.6 Secured state............................................................................................................................46
`6.3.2.4.7 Killed state ................................................................................................................................46
`6.3.2.4.8 Slot counter...............................................................................................................................46
`6.3.2.5
`Tag random or pseudo-random number generator.....................................................................46
`6.3.2.6 Managing Tag populations ..........................................................................................................48
`6.3.2.7
`Selecting Tag populations...........................................................................................................48
`6.3.2.8
`Inventorying Tag populations ......................................................................................................49
`6.3.2.9
`Accessing individual Tags...........................................................................................................51
`6.3.2.10 Killing or recommissioning a Tag ................................................................................................52
`6.3.2.11
`Interrogator commands and Tag replies .....................................................................................53
`6.3.2.11.1 Select commands .....................................................................................................................55
`6.3.2.11.1.1 Select (mandatory) .............................................................................................................55
`6.3.2.11.2 Inventory commands ................................................................................................................57
`6.3.2.11.2.1 Query (mandatory) .............................................................................................................57
`6.3.2.11.2.2 QueryAdjust (mandatory) ...................................................................................................58
`6.3.2.11.2.3 QueryRep (mandatory).......................................................................................................59
`6.3.2.11.2.4 ACK (mandatory)................................................................................................................60
`6.3.2.11.2.5 NAK (mandatory)................................................................................................................61
`6.3.2.11.3 Access commands....................................................................................................................62
`6.3.2.11.3.1 Req_RN (mandatory) .........................................................................................................63
`6.3.2.11.3.2 Read (mandatory)...............................................................................................................64
`6.3.2.11.3.3 Write (mandatory)...............................................................................................................66
`6.3.2.11.3.4 Kill (mandatory) ..................................................................................................................67
`6.3.2.11.3.5 Lock (mandatory)................................................................................................................70
`6.3.2.11.3.6 Access (optional) ................................................................................................................72
`6.3.2.11.3.7 BlockWrite (optional) ..........................................................................................................74
`6.3.2.11.3.8 BlockErase (optional) .........................................................................................................75
`6.3.2.11.3.9 BlockPermalock (optional)..................................................................................................76
`
`© 2004 – 2008 EPCglobal Inc.
`
`Page 3 of 108
`
`23 October 2008
`
`CSC ServiceWorks - Ex.1012
`
`Page 3 of 108
`
`
`
`INTELLECTUAL PROPERTY RIGHTS INTRINSIC TO THIS SPECIFICATION............................................79
`7.
`ANNEX A (NORMATIVE) EXTENSIBLE BIT VECTORS (EBV) ............................................................................80
`ANNEX B (NORMATIVE) STATE-TRANSITION TABLES ....................................................................................81
`B.1 PRESENT STATE: READY...............................................................................................................................81
`B.2 PRESENT STATE: ARBITRATE ........................................................................................................................82
`B.3 PRESENT STATE: REPLY ...............................................................................................................................83
`B.4 PRESENT STATE: ACKNOWLEDGED................................................................................................................84
`B.5 PRESENT STATE: OPEN ................................................................................................................................85
`B.6 PRESENT STATE: SECURED ..........................................................................................................................86
`B.7 PRESENT STATE: KILLED...............................................................................................................................87
`ANNEX C (NORMATIVE) COMMAND-RESPONSE TABLES ...............................................................................88
`C.1 COMMAND RESPONSE: POWER-UP................................................................................................................88
`C.2 COMMAND RESPONSE: QUERY......................................................................................................................88
`C.3 COMMAND RESPONSE: QUERYREP ...............................................................................................................89
`C.4 COMMAND RESPONSE: QUERYADJUST ..........................................................................................................89
`C.5 COMMAND RESPONSE: ACK .........................................................................................................................90
`C.6 COMMAND RESPONSE: NAK .........................................................................................................................90
`C.7 COMMAND RESPONSE: REQ_RN...................................................................................................................90
`C.8 COMMAND RESPONSE: SELECT.....................................................................................................................91
`C.9 COMMAND RESPONSE: READ ........................................................................................................................91
`C.10
`COMMAND RESPONSE: WRITE ...................................................................................................................91
`C.11
`COMMAND RESPONSE: KILL.......................................................................................................................92
`C.12
`COMMAND RESPONSE: LOCK.....................................................................................................................92
`C.13
`COMMAND RESPONSE: ACCESS.................................................................................................................93
`C.14
`COMMAND RESPONSE: BLOCKWRITE.........................................................................................................93
`C.15
`COMMAND RESPONSE: BLOCKERASE ........................................................................................................94
`C.16
`COMMAND RESPONSE: BLOCKPERMALOCK ................................................................................................94
`C.17
`COMMAND RESPONSE: T2 TIMEOUT............................................................................................................94
`C.18
`COMMAND RESPONSE: INVALID COMMAND .................................................................................................95
`ANNEX D (INFORMATIVE) EXAMPLE SLOT-COUNT (Q) SELECTION ALGORITHM.......................................96
`D.1 EXAMPLE ALGORITHM AN INTERROGATOR MIGHT USE TO CHOOSE Q ...............................................................96
`ANNEX E (INFORMATIVE) EXAMPLE OF TAG INVENTORY AND ACCESS.....................................................97
`E.1 EXAMPLE INVENTORY AND ACCESS OF A SINGLE TAG .....................................................................................97
`ANNEX F (INFORMATIVE) CALCULATION OF 5-BIT AND 16-BIT CYCLIC REDUNDANCY CHECKS............98
`F.1 EXAMPLE CRC-5 ENCODER/DECODER ..........................................................................................................98
`F.2 EXAMPLE CRC-16 ENCODER/DECODER ........................................................................................................98
`F.3 EXAMPLE CRC-16 CALCULATIONS ................................................................................................................99
`ANNEX G (NORMATIVE) MULTIPLE- AND DENSE-INTERROGATOR CHANNELIZED SIGNALING.............100
`G.1 OVERVIEW OF DENSE-INTERROGATOR CHANNELIZED SIGNALING (INFORMATIVE)............................................100
`ANNEX H (INFORMATIVE) INTERROGATOR-TO-TAG LINK MODULATION ..................................................102
`H.1 BASEBAND WAVEFORMS, MODULATED RF, AND DETECTED WAVEFORMS .......................................................102
`ANNEX I (NORMATIVE) ERROR CODES............................................................................................................103
`I.1
`TAG ERROR CODES AND THEIR USAGE .........................................................................................................103
`ANNEX J (NORMATIVE) SLOT COUNTER .........................................................................................................104
`J.1
`SLOT-COUNTER OPERATION........................................................................................................................104
`ANNEX K (INFORMATIVE) EXAMPLE DATA-FLOW EXCHANGE....................................................................105
`K.1 OVERVIEW OF THE DATA-FLOW EXCHANGE ..................................................................................................105
`K.2 TAG MEMORY CONTENTS AND LOCK-FIELD VALUES.......................................................................................105
`K.3 DATA-FLOW EXCHANGE AND COMMAND SEQUENCE ......................................................................................106
`ANNEX L (INFORMATIVE) OPTIONAL TAG FEATURES ..................................................................................107
`L.1 OPTIONAL TAG PASSWORDS .......................................................................................................................107
`L.2 OPTIONAL TAG MEMORY BANKS AND MEMORY-BANK SIZES ...........................................................................107
`
`© 2004 – 2008 EPCglobal Inc.
`
`Page 4 of 108
`
`23 October 2008
`
`CSC ServiceWorks - Ex.1012
`
`Page 4 of 108
`
`
`
`L.3 OPTIONAL TAG COMMANDS.........................................................................................................................107
`L.4 OPTIONAL TAG ERROR-CODE REPORTING FORMAT.......................................................................................107
`L.5 OPTIONAL TAG BACKSCATTER MODULATION FORMAT ...................................................................................107
`L.6 OPTIONAL TAG FUNCTIONALITY...................................................................................................................107
`ANNEX M (INFORMATIVE) REVISION HISTORY ...............................................................................................108
`
`
`© 2004 – 2008 EPCglobal Inc.
`
`Page 5 of 108
`
`23 October 2008
`
`CSC ServiceWorks - Ex.1012
`
`Page 5 of 108
`
`
`
`Index of Figures
`FIGURE 6.1 – PIE SYMBOLS ........................................................................................................................................24
`FIGURE 6.2 – INTERROGATOR-TO-TAG RF ENVELOPE ..................................................................................................25
`FIGURE 6.3 – INTERROGATOR POWER-UP AND POWER-DOWN RF ENVELOPE .................................................................26
`FIGURE 6.4 – R=>T PREAMBLE AND FRAME-SYNC ........................................................................................................27
`FIGURE 6.5 – FHSS INTERROGATOR RF ENVELOPE.....................................................................................................28
`FIGURE 6.6 – TRANSMIT MASK FOR MULTIPLE-INTERROGATOR ENVIRONMENTS..............................................................29
`FIGURE 6.7 – TRANSMIT MASK FOR DENSE-INTERROGATOR ENVIRONMENTS..................................................................29
`FIGURE 6.8 – FM0 BASIS FUNCTIONS AND GENERATOR STATE DIAGRAM........................................................................30
`FIGURE 6.9 – FM0 SYMBOLS AND SEQUENCES.............................................................................................................30
`FIGURE 6.10 – TERMINATING FM0 TRANSMISSIONS......................................................................................................31
`FIGURE 6.11 – FM0 T=>R PREAMBLE .........................................................................................................................31
`FIGURE 6.12 – MILLER BASIS FUNCTIONS AND GENERATOR STATE DIAGRAM ..................................................................31
`FIGURE 6.13 – SUBCARRIER SEQUENCES ....................................................................................................................32
`FIGURE 6.14 – TERMINATING SUBCARRIER TRANSMISSIONS..........................................................................................33
`FIGURE 6.15 – SUBCARRIER T=>R PREAMBLE.............................................................................................................33
`FIGURE 6.16 – LINK TIMING .........................................................................................................................................36
`FIGURE 6.17 – LOGICAL MEMORY MAP.........................................................................................................................37
`FIGURE 6.18 – SESSION DIAGRAM ...............................................................................................................................44
`FIGURE 6.19 – TAG STATE DIAGRAM............................................................................................................................47
`FIGURE 6.20 – INTERROGATOR/TAG OPERATIONS AND TAG STATE................................................................................48
`FIGURE 6.21 – ONE TAG REPLY ..................................................................................................................................50
`FIGURE 6.22 – SUCCESSFUL WRITE SEQUENCE...........................................................................................................66
`FIGURE 6.23 – KILL PROCEDURE .................................................................................................................................69
`FIGURE 6.24 – LOCK PAYLOAD AND USAGE ..................................................................................................................71
`FIGURE 6.25 – ACCESS PROCEDURE ...........................................................................................................................73
`FIGURE D.1 – EXAMPLE ALGORITHM FOR CHOOSING THE SLOT-COUNT PARAMETER Q....................................................96
`FIGURE E.1 – EXAMPLE OF TAG INVENTORY AND ACCESS.............................................................................................97
`FIGURE F.1 – EXAMPLE CRC-5 CIRCUIT......................................................................................................................98
`FIGURE F.2 – EXAMPLE CRC-16 CIRCUIT....................................................................................................................99
`FIGURE G.1 – EXAMPLES OF DENSE-INTERROGATOR-MODE OPERATION......................................................................101
`FIGURE H.1 – INTERROGATOR-TO-TAG MODULATION..................................................................................................102
`FIGURE J.1 – SLOT-COUNTER STATE DIAGRAM...........................................................................................................104
`
`
`© 2004 – 2008 EPCglobal Inc.
`
`Page 6 of 108
`
`23 October 2008
`
`CSC ServiceWorks - Ex.1012
`
`Page 6 of 108
`
`
`
`Index of Tables
`TABLE 6.1 – INTERROGATOR-TO-TAG (R=>T) COMMUNICATIONS ..................................................................................20
`TABLE 6.2 – TAG-TO-INTERROGATOR (T=>R) COMMUNICATIONS ..................................................................................21
`TABLE 6.3 – TAG INVENTORY AND ACCESS PARAMETERS ..............................................................................................23
`TABLE 6.4 – COLLISION MANAGEMENT PARAMETERS ....................................................................................................23
`TABLE 6.5 – RF ENVELOPE PARAMETERS ....................................................................................................................25
`TABLE 6.6 – INTERROGATOR POWER-UP WAVEFORM PARAMETERS ...............................................................................26
`TABLE 6.7 – INTERROGATOR POWER-DOWN WAVEFORM PARAMETERS ..........................................................................26
`TABLE 6.8 – FHSS WAVEFORM PARAMETERS ..............................................................................................................28
`TABLE 6.9 – TAG-TO-INTERROGATOR LINK FREQUENCIES .............................................................................................34
`TABLE 6.10 – TAG-TO-INTERROGATOR DATA RATES .....................................................................................................34
`TABLE 6.11 – CRC-16 PRECURSOR ............................................................................................................................35
`TABLE 6.12 – CRC-5 DEFINITION. SEE ALSO ANNEX F .................................................................................................35
`TABLE 6.13 – LINK TIMING