1、raising standards worldwideNO COPYING WITHOUT BSI PERMISSION EXCEPT AS PERMITTED BY COPYRIGHT LAWBSI Standards PublicationBS ISO/IEC 15961-1:2013Information technology Radio frequency identification (RFID) for item management: Data protocolPart 1: Application interfaceBS ISO/IEC 15961-1:2013 BRITISH
2、 STANDARDNational forewordThis British Standard is the UK implementation of ISO/IEC 15961-1:2013. Together with BS ISO/IEC 15961-2, BS ISO/IEC 15961-3 and BS ISO/IEC 15961-4, it supersedes BS ISO/IEC 15961:2004, which will be withdrawn upon publication of all parts of the series.The UK participation
3、 in its preparation was entrusted to T e c h n i c a l C o m m i t t e e I S T / 3 4 , A u t o m a t i c i d e n t i f i c a t i o n a n d data capture techniques.A list of organizations represented on this committee can be obtained on request to its secretary.This publication does not purport to in
4、clude all the necessary provisions of a contract. Users are responsible for its correct application. The British Standards Institution 2013. Published by BSI Standards Limited 2013.ISBN 978 0 580 61906 9 ICS 35.040 Compliance with a British Standard cannot confer immunityfrom legal obligations.This
5、British Standard was published under the authority of the Standards Policy and Strategy Committee on 30 April 2013.Amendments issued since publicationDate T e x t a f f e c t e dBS ISO/IEC 15961-1:2013Reference numberISO/IEC 15961-1:2013(E)ISO/IEC 2013INTERNATIONAL STANDARD ISO/IEC15961-1First editi
6、on2013-03-15Information technology Radio frequency identification (RFID) for item management: Data protocol Part 1: Application interface Technologies de linformation Identification par radiofrquence (RFID) pour la gestion dobjets: Protocole de donnes Partie 1: Interface dapplication BS ISO/IEC 1596
7、1-1:2013ISO/IEC 15961-1:2013(E) COPYRIGHT PROTECTED DOCUMENT ISO/IEC 2013 All rights reserved. Unless otherwise specified, no part of this publication may be reproduced or utilized otherwise in any form or by any means, electronic or mechanical, including photocopying, or posting on the internet or
8、an intranet, without prior written permission. Permission can be requested from either ISO at the address below or ISOs member body in the country of the requester. ISO copyright office Case postale 56 CH-1211 Geneva 20 Tel. + 41 22 749 01 11 Fax + 41 22 749 09 47 E-mail copyrightiso.org Web www.iso
9、.org Published in Switzerland ii ISO/IEC 2013 All rights reservedBS ISO/IEC 15961-1:2013ISO/IEC 15961-1:2013(E) ISO/IEC 2013 All rights reserved iiiContents Page Foreword viii Introduction ix 1 Scope 1 2 Normative references 1 3 Terms, definitions and conventions 2 3.1 Terms and definitions . 2 3.2
10、Conventions . 2 4 Compliance 2 4.1 General . 2 4.2 Application compliance 3 4.3 Conformance of the Data Processor . 3 5 Protocol model 3 5.1 Overview . 3 5.2 Layered protocol . 3 5.2.1 Application layer - as defined in the various parts of ISO/IEC 15961 4 5.2.2 Application interface - as defined in
11、ISO/IEC 15961-1 . 5 5.2.3 Data Protocol Processing - as defined in ISO/IEC 15962 5 5.2.4 Data Protocol Interface - as defined in ISO/IEC 15962 5 5.3 Flexible implementation configurations . 6 5.4 Functional processes interrogator implementation . 6 5.4.1 Functional processes - application interface
12、. 7 5.4.2 Functional processes interrogator . 7 5.4.3 RFID tag 8 5.5 ISO/IEC 15962 and the Data Processor . 9 6 Presentation conventions. 9 6.1 Presentation of commands, responses and arguments . 9 6.1.1 Commands and responses 9 6.1.2 Arguments 9 6.1.3 Data types 10 6.2 Object Identifier presentatio
13、n in the application interface 10 6.2.1 Object identifier structure to ISO/IEC 8824-1 10 6.2.2 Presenting the Object-Identifier in the style of ISO/IEC 8824-1 11 6.2.3 Presenting the Object-Identifier as a Uniform Resource Name (URN) 12 6.3 Byte Notation . 12 6.3.1 The byte: the basic unit for 8-bit
14、 coding . 12 6.3.2 Bit ordering 12 6.3.3 Byte conversion . 12 7 Processing application commands and responses 12 7.1 General . 12 7.2 Encoding system related information in commands . 13 7.2.1 Singulation-Id . 13 7.2.2 AFI . 13 7.2.3 DSFID 14 7.2.4 Access-Method 14 7.2.5 Data-Format . 16 7.3 Prepari
15、ng the basic Objects and other application-based arguments 17 7.3.1 General model 17 7.3.2 Object-Identifier . 17 BS ISO/IEC 15961-1:2013ISO/IEC 15961-1:2013(E) iv ISO/IEC 2013 All rights reserved7.3.3 Relating Object-Identifiers 18 7.3.4 Object 18 7.3.5 Compact-Parameter .18 7.3.6 Object-Lock 20 7.
16、4 Other command arguments 20 7.4.1 Access-Password 20 7.4.2 Additional-App-Bits .21 7.4.3 AFI-Lock 21 7.4.4 Append-To-Existing-Multiple-Record 21 7.4.5 Application-Defined-Record-Capacity .21 7.4.6 Avoid-Duplicate 21 7.4.7 Battery-Assist-Indicator 21 7.4.8 Block-Align .21 7.4.9 Block-Align-Packed-Ob
17、ject .21 7.4.10 Check-Duplicate .22 7.4.11 Data-CRC-Indicator 22 7.4.12 Data-Length-Of-Record .22 7.4.13 Delete-MR-Method .22 7.4.14 Directory-Length-EBV8-Indicator .22 7.4.15 DSFID-Lock .22 7.4.16 DSFID-Pad-Bytes .23 7.4.17 Editable-Pointer-Size .23 7.4.18 Encoded-Memory-Capacity 23 7.4.19 EPC-Code
18、 .23 7.4.20 Full-Function-Sensor-Indicator 23 7.4.21 Hierarchical-Identifier-Arc .23 7.4.22 Identifier-Of-My-Parent 23 7.4.23 Identify-Method 23 7.4.24 ID-Type 24 7.4.25 Instance-Of-Arc 24 7.4.26 Kill-Password .24 7.4.27 Length-Of-Mask 24 7.4.28 Lock-Directory-Entry .24 7.4.29 Lock-Multiple-Records-
19、Header .24 7.4.30 Lock-Record-Preamble .25 7.4.31 Lock-UII-Segment-Arguments 25 7.4.32 Max-App-Length .25 7.4.33 Memory-Bank .25 7.4.34 Memory-Bank-Lock25 7.4.35 Memory-Length-Encoding 25 7.4.36 Memory-Segment .25 7.4.37 Memory-Type 25 7.4.38 Multiple-Records-Directory-Length .25 7.4.39 Multiple-Rec
20、ords-Features-Indicator .26 7.4.40 NSI-Bits .26 7.4.41 Number-In-Data-Element-List .26 7.4.42 Number-Of-Records 26 7.4.43 Number-Of-Tags .26 7.4.44 Objects-Offsets-Multiplier .27 7.4.45 Packed-Object-Directory-Type .27 7.4.46 Password 27 7.4.47 Password-Type 27 7.4.48 PO-Directory-Size 27 7.4.49 PO-
21、Index-Length 27 7.4.50 Pointer .27 7.4.51 Pointer-To-Multiple-Records-Directory .27 7.4.52 Read-Record-Type .28 7.4.53 Read-Type .29 7.4.54 Record-Memory-Capacity .30 7.4.55 Record-Type-Arc 30 BS ISO/IEC 15961-1:2013ISO/IEC 15961-1:2013(E) ISO/IEC 2013 All rights reserved v7.4.56 Record-Type-Classif
22、ication 30 7.4.57 Sector-Identifier . 30 7.4.58 Simple-Sensor-Indicator . 31 7.4.59 Start-Address-Of-Record 31 7.4.60 Tag-Data-Profile-ID-Table . 31 7.4.61 Tag-Mask 31 7.4.62 Update-Multiple-Records-Directory . 31 7.4.63 Word-Count 31 7.4.64 Word-Pointer 31 7.5 Command-related field names . 31 7.5.1
23、 Data-Set 32 7.5.2 Identities . 32 7.5.3 Length-Lock Byte 32 7.5.4 Length-Of-Encoded-Data 32 7.5.5 Lock-Status 32 7.5.6 Logical-Memory-Map . 32 7.5.7 Memory-Capacity . 32 7.5.8 Module-OID 32 7.5.9 Number-Of-Tags-Found 32 7.5.10 PO-ID-Table 32 7.5.11 Protocol-Control-Word 32 7.5.12 Read-Data . 33 7.6
24、 Data security 33 8 Data flows and processes to the air interface 33 8.1 Establishing communications between the application and the RFID tag 33 8.1.1 Air interface services 33 8.1.2 System information . 34 8.2 Application system services 34 9 Command-Codes, Completion-Codes, and Execution-Codes 34
25、9.1 Final arc values of the command and response modules 35 9.2 Completion-Code . 36 9.3 Execution-Code . 39 10 Commands and responses 40 10.1 Configure-AFI . 40 10.1.1 Configure-AFI command. 40 10.1.2 Configure-AFI response 40 10.2 Configure-DSFID 41 10.2.1 Configure-DSFID command . 41 10.2.2 Confi
26、gure-DSFID response 42 10.3 Inventory-Tags . 42 10.3.1 Inventory-Tags command . 42 10.3.2 Inventory-Tags response 44 10.4 Delete-Object . 44 10.4.1 Delete-Object command . 44 10.4.2 Delete-Object response 45 10.5 Modify-Object . 46 10.5.1 Modify-Object command. 46 10.5.2 Modify-Object response 47 10
27、.6 Read-Object-Identifiers . 48 10.6.1 Read-Object-Identifiers command . 48 10.6.2 Read-Object-Identifiers response 49 10.7 Read-Logical-Memory-Map. 49 10.7.1 Read-Logical-Memory-Map command 49 10.7.2 Read-Logical-Memory-Map response . 50 10.8 Erase-Memory 50 10.8.1 Erase-Memory command 50 10.8.2 Er
28、ase-Memory response . 51 10.9 Get-App-Based-System-Info 51 BS ISO/IEC 15961-1:2013ISO/IEC 15961-1:2013(E) vi ISO/IEC 2013 All rights reserved10.9.1 Get-App-Based-System-Info command .51 10.9.2 Get-App-Based-System-Info response 51 10.10 Write-Objects 52 10.10.1 Write-Objects command .52 10.10.2 Writ
29、e-Objects response 54 10.11 Read-Objects 55 10.11.1 Read-Objects command 55 10.11.2 Read-Objects response .56 10.12 Write-Objects-Segmented-Memory-Tag 56 10.12.1 Write-Objects-Segmented-Memory-Tag command 56 10.12.2 Write-Objects-Segmented-Memory-Tag response .58 10.13 Write-EPC-UII 59 10.13.1 Write
30、-EPC-UII command .59 10.13.2 Write-EPC-UII response 60 10.14 Inventory-ISO-UIImemory .60 10.14.1 Inventory-ISO-UIImemory command .60 10.14.2 Inventory-ISO-UIImemory response 61 10.15 Inventory-EPC-UIImemory 62 10.15.1 Inventory-EPC-UIImemory command 62 10.15.2 Inventory-EPC-UIImemory response .62 10
31、.16 Write-Password-Segmented-Memory-Tag 63 10.16.1 Write-Password-Segmented-Memory-Tag command 63 10.16.2 Write-Password-Segmented-Memory-Tag response .63 10.17 Read-Words-Segmented-Memory-Tag 64 10.17.1 Read-Words-Segmented-Memory-Tag command 64 10.17.2 Read-Words-Segmented-Memory-Tag response .64
32、10.18 Kill-Segmented-Memory-Tag 65 10.18.1 Kill-Segmented-Memory-Tag command 65 10.18.2 Kill-Segmented-Memory-Tag response .65 10.19 Delete-Packed-Object 65 10.19.1 Delete-Packed-Object command 65 10.19.2 Delete-Packed-Object response .66 10.20 Modify-Packed-Object-Structure 67 10.20.1 Modify-Packed
33、-Object-Structure command 67 10.20.2 Modify-Packed-Object-Structure response .68 10.21 Write-Segments-6TypeD-Tag 69 10.21.1 Write-Segments-6TypeD-Tag command .69 10.21.2 Write-Segments-6TypeD-Tag response 70 10.22 Read-Segments-6TypeD-Tag 71 10.22.1 Read-Segments-6TypeD-Tag command 71 10.22.2 Read-S
34、egments-6TypeD-Tag response .73 10.23 Write-Monomorphic-UII .73 10.23.1 Write-Monomorphic-UII command .73 10.23.2 Write-Monomorphic-UII response 75 10.24 Configure-Extended-DSFID 76 10.24.1 Configure-Extended-DSFID command 76 10.24.2 Configure-Extended-DSFID response .77 10.25 Configure-Multiple-Rec
35、ords-Header 77 10.25.1 Configure-Multiple-Records-Header command 77 10.25.2 Configure-Multiple-Records-Header response .80 10.26 Read-Multiple-Records 80 10.26.1 Read-Multiple-Records command 80 10.26.2 Read-Multiple-Records response .81 10.27 Delete-Multiple-Record 82 10.27.1 Delete-Multiple-Record
36、 command 82 10.27.2 Delete-Multiple-Record response .83 11 Arguments 84 11.1 Add-Objects 84 11.2 DSFID-Constructs 85 BS ISO/IEC 15961-1:2013ISO/IEC 15961-1:2013(E) ISO/IEC 2013 All rights reserved vii11.3 EPC-UIImemory . 85 11.4 Ext-DSFID-Constructs . 85 11.5 ISO-UIImemory . 87 11.6 Item-Related-Add
37、-Objects 87 11.7 Item-Related-DSFID-Constructs . 87 11.8 Multiple-Records-Constructs . 87 11.9 Multiple-Records-Directory-Structure . 89 11.10 Multiple-Records-Header-Structure . 89 11.11 Multiple-Records-Preamble-Structure . 90 11.12 Packed-Object-Constructs . 91 11.13 Read-Objects . 93 11.14 Read-
38、Objects-Response . 93 11.15 Read-OIDs-Response 93 11.16 UII-Add-Objects . 93 11.17 UII-DSFID-Constructs 94 11.18 Write-Responses . 94 Annex A (informative) Abstract syntax and transfer encoding rules 95 Annex B (informative) Accommodating established data formats 104 Annex C (informative) Relating d
39、ata Objects . 106 Annex D (informative) Data security issues . 108 Annex E (informative) Original commands and responses using ASN.1 abstract syntax 110 Annex F (informative) Example of a transfer encoding to ISO/IEC 15961:2004 . 139 Bibliography 142 BS ISO/IEC 15961-1:2013ISO/IEC 15961-1:2013(E) vi
40、ii ISO/IEC 2013 All rights reservedForeword ISO (the International Organization for Standardization) and IEC (the International Electrotechnical Commission) form the specialized system for worldwide standardization. National bodies that are members of ISO or IEC participate in the development of Int
41、ernational Standards through technical committees established by the respective organization to deal with particular fields of technical activity. ISO and IEC technical committees collaborate in fields of mutual interest. Other international organizations, governmental and non-governmental, in liais
42、on with ISO and IEC, also take part in the work. In the field of information technology, ISO and IEC have established a joint technical committee, ISO/IEC JTC 1. International Standards are drafted in accordance with the rules given in the ISO/IEC Directives, Part 2. The main task of the joint techn
43、ical committee is to prepare International Standards. Draft International Standards adopted by the joint technical committee are circulated to national bodies for voting. Publication as an International Standard requires approval by at least 75 % of the national bodies casting a vote. Attention is d
44、rawn to the possibility that some of the elements of this document may be the subject of patent rights. ISO and IEC shall not be held responsible for identifying any or all such patent rights. ISO/IEC 15961-1 was prepared by Joint Technical Committee ISO/IEC JTC 1, Information technology, Subcommitt
45、ee SC 31, Automatic identification and data capture techniques. This first edition of ISO/IEC 15961-1, together with ISO/IEC 15961-2, ISO/IEC 15961-3 and ISO/IEC 15961-4, cancels and replaces ISO/IEC 15961:2004, which has been technically revised. ISO/IEC 15961 consists of the following parts, under
46、 the general title Information technology Radio frequency identification (RFID) for item management: Data protocol: Part 1: Application interface Part 2: Registration of RFID data constructs Part 3: RFID data constructs The following part is under preparation: Part 4: Application interface commands
47、for battery assist and sensor functionality BS ISO/IEC 15961-1:2013ISO/IEC 15961-1:2013(E) ISO/IEC 2013 All rights reserved ixIntroduction The technology of radio frequency identification (RFID) is based on non-contact electronic communication across an air interface. The structure of the bits store
48、d on the memory of the RFID tag is invisible and accessible between the RFID tag and the interrogator only by the use of an air interface protocol, as specified in the appropriate part of ISO/IEC 18000. The result of the transfer of data between an application and an interrogator in open systems req
49、uires data to be encoded in a consistent manner on any RFID tag that is part of that open system. This is not only to allow equipment to be interoperable, but in the special case of data carriers, for the data to be encoded on the RFID tag in one systems implementation and to be read at a later time in a completely different and unknown systems implementation. The data bits stored on each RFID tag must be formatted in such a way as to be reliably read at the point of use if the RFID tag is to fulfil its basic obje
copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
备案/许可证编号:苏ICP备17064731号-1