1、raising standards worldwideNO COPYING WITHOUT BSI PERMISSION EXCEPT AS PERMITTED BY COPYRIGHT LAWBSI Standards PublicationBS ISO/IEC 24791-1:2010Information technology Radio frequency identification(RFID) for item management Software system infrastructurePart 1: ArchitectureBS ISO/IEC 24791-1:2010 B
2、RITISH STANDARDNational forewordThis British Standard is the UK implementation of ISO/IEC24791-1:2010.The UK participation in its preparation was entrusted to TechnicalCommittee IST/34, Automatic identification and data capturetechniques.A list of organizations represented on this committee can beob
3、tained on request to its secretary.This publication does not purport to include all the necessaryprovisions of a contract. Users are responsible for its correctapplication. BSI 2010ISBN 978 0 580 73029 0ICS 35.040Compliance with a British Standard cannot confer immunity fromlegal obligations.This Br
4、itish Standard was published under the authority of theStandards Policy and Strategy Committee on 31 December 2010.Amendments issued since publicationDate Text affectedBS ISO/IEC 24791-1:2010Reference numberISO/IEC 24791-1:2010(E)ISO/IEC 2010INTERNATIONAL STANDARD ISO/IEC24791-1First edition2010-08-
5、15Information technology Radio frequency identification (RFID) for item management Software system infrastructure Part 1: Architecture Technologies de linformation Identification de radiofrquence (RFID) pour la gestion dlment Infrastructure de systmes logiciels Partie 1: Architecture BS ISO/IEC 2479
6、1-1:2010ISO/IEC 24791-1:2010(E) PDF disclaimer This PDF file may contain embedded typefaces. In accordance with Adobes licensing policy, this file may be printed or viewed but shall not be edited unless the typefaces which are embedded are licensed to and installed on the computer performing the edi
7、ting. In downloading this file, parties accept therein the responsibility of not infringing Adobes licensing policy. The ISO Central Secretariat accepts no liability in this area. Adobe is a trademark of Adobe Systems Incorporated. Details of the software products used to create this PDF file can be
8、 found in the General Info relative to the file; the PDF-creation parameters were optimized for printing. Every care has been taken to ensure that the file is suitable for use by ISO member bodies. In the unlikely event that a problem relating to it is found, please inform the Central Secretariat at
9、 the address given below. COPYRIGHT PROTECTED DOCUMENT ISO/IEC 2010 All rights reserved. Unless otherwise specified, no part of this publication may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying and microfilm, without permission in writing fr
10、om either ISO at the address below or ISOs member body in the country of the requester. ISO copyright office Case postale 56 CH-1211 Geneva 20 Tel. + 41 22 749 01 11 Fax + 41 22 749 09 47 E-mail copyrightiso.org Web www.iso.org Published in Switzerland ii ISO/IEC 2010 All rights reservedBS ISO/IEC 2
11、4791-1:2010ISO/IEC 24791-1:2010(E) ISO/IEC 2010 All rights reserved iiiContents Page Foreword iv Introduction.v 1 Scope1 2 Conformance .1 3 Normative references1 4 Terms and definitions .2 5 Abbreviated terms.3 6 Architecture overview.3 6.1 General .3 6.2 Tag and sensor data considerations.4 6.3 Dat
12、a, control, and management functional distinctions .4 6.4 Relationships to other standards 5 6.4.1 ISO/IEC 15961 5 6.4.2 ISO/IEC 15962 5 6.4.3 ISO/IEC 24753 5 6.4.4 EPCglobal standards 5 7 UML modelling.5 7.1 Component diagrams6 7.2 Deployment diagrams.6 7.3 Interfaces6 7.4 Use 7 8 Architecture .7 8
13、.1 Data management7 8.2 Device interface .8 8.3 Device management9 8.4 Security considerations11 Annex A (informative) Implementation examples12 A.1 General .12 A.2 Interrogator Controller with Interrogator Deployment 12 A.3 Interrogators Exposing Data Management Interface.14 A.4 End User Applicatio
14、ns Communicating Directly with Interrogators15 A.5 Device Management of an Interrogator.16 A.6 Device Management on an Interrogator Controller and Interrogators 17 Annex B (informative) Relationship between ISO/IEC 15961 and ISO/IEC 24791.18 Bibliography19 BS ISO/IEC 24791-1:2010ISO/IEC 24791-1:2010
15、(E) iv ISO/IEC 2010 All rights reservedForeword ISO (the International Organization for Standardization) and IEC (the International Electrotechnical Commission) form the specialized system for worldwide standardization. National bodies that are members of ISO or IEC participate in the development of
16、 International Standards through technical committees established by the respective organization to deal with particular fields of technical activity. ISO and IEC technical committees collaborate in fields of mutual interest. Other international organizations, governmental and non-governmental, in l
17、iaison with ISO and IEC, also take part in the work. In the field of information technology, ISO and IEC have established a joint technical committee, ISO/IEC JTC 1. International Standards are drafted in accordance with the rules given in the ISO/IEC Directives, Part 2. The main task of the joint t
18、echnical committee is to prepare International Standards. Draft International Standards adopted by the joint technical committee are circulated to national bodies for voting. Publication as an International Standard requires approval by at least 75 % of the national bodies casting a vote. Attention
19、is drawn to the possibility that some of the elements of this document may be the subject of patent rights. ISO and IEC shall not be held responsible for identifying any or all such patent rights. ISO/IEC 24791-1 was prepared by Joint Technical Committee ISO/IEC JTC 1, Information technology, Subcom
20、mittee SC 31, Automatic identification and data capture techniques. ISO/IEC 24791 consists of the following parts, under the general title Information technology Radio frequency identification (RFID) for item management Software system infrastructure: Part 1: Architecture Part 2: Data management Par
21、t 5: Device interface The following parts are under preparation: Part 3: Device management BS ISO/IEC 24791-1:2010ISO/IEC 24791-1:2010(E) ISO/IEC 2010 All rights reserved vIntroduction Radio frequency identification (RFID) air interface technology is based on non-contact electro-magnetic communicati
22、on among interrogators and tags. RFID software systems are composed of RFID interrogators, intermediate software systems, and applications that provide control and coordination of air interface operation, tag information exchange, and health and performance management of system components. RFID tech
23、nology is expected to increase effectiveness in many aspects of business by further advancing the capabilities of automatic identification and data capture (AIDC). To achieve this goal through the successful adoption of RFID technology into real business environments, RFID devices, software systems,
24、 and business applications must provide secure and interoperable services, interfaces, and technologies. This is the goal of ISO/IEC 24791. BS ISO/IEC 24791-1:2010BS ISO/IEC 24791-1:2010INTERNATIONAL STANDARD ISO/IEC 24791-1:2010(E) ISO/IEC 2010 All rights reserved 1Information technology Radio freq
25、uency identification (RFID) for item management Software system infrastructure Part 1: Architecture 1 Scope ISO/IEC 24791 defines a Software System Infrastructure that enables RFID system operations between business applications and RFID interrogators. RFID software systems are composed of RFID inte
26、rrogators, intermediate software systems, and applications that provide control and coordination of air interface operation, tag and sensor information exchange, and health and performance management of system components. This part of ISO/IEC 24791 provides the following: an overview of the Software
27、 System Infrastructure; the relationship of the Software System Infrastructure to existing ISO components, e.g. ISO/IEC 15962; a basic description of each Software System Infrastructure component and the services that it provides (The detailed description of a particular component can be found in ot
28、her Parts of ISO/IEC 24791.); illustrative (informative) deployment models of the components of the Software System Infrastructure. 2 Conformance This part of ISO/IEC 24791 describes the overall RFID Software System Infrastructure, but it does not define conformance requirements. Conformance require
29、ments are specified in the other parts of ISO/IEC 24791. There is no requirement for an RFID software system to conform to each of the parts; all conformance requirements are based on the individual parts only. 3 Normative references The following referenced documents are indispensable for the appli
30、cation of this document. For dated references, only the edition cited applies. For undated references, the latest edition of the referenced document (including any amendments) applies. ISO/IEC 19762-1, Information technology Automatic identification and data capture (AIDC) techniques Harmonized voca
31、bulary Part 1: General terms relating to AIDC ISO/IEC 19762-3, Information technology Automatic identification and data capture (AIDC) techniques Harmonized vocabulary Part 3: Radio frequency identification (RFID) BS ISO/IEC 24791-1:2010ISO/IEC 24791-1:2010(E) 2 ISO/IEC 2010 All rights reserved4 Ter
32、ms and definitions For the purposes of this document, the terms and definitions given in ISO/IEC 19762-1, ISO/IEC 19762-3 and the following apply. 4.1 component identifiable part of a larger program or function, typically without reference to the physical computing platform or operating system, that
33、 provides specific functionality and might provide or require interfaces to other components 4.2 data management function and its interfaces that provide reading, writing, collection, filtering, grouping, and event subscription and notification of RFID tag data to higher level applications and inter
34、faces 4.3 device interface communications interface between an RFID interrogator and upstream clients that provides tag data transfer and control of tag access operations 4.4 device management protocols and mechanisms that achieve monitoring and control of discovery, configuration, performance and d
35、iagnosis of one or more RFID interrogators 4.5 endpoint one of two components that implements or exposes an interface to other components or uses the interface of another component 4.6 implementation software and hardware that provides the reduction to practice of a particular function 4.7 interroga
36、tor controller software capability, possibly embodied in a distinct physical device, within the Data Management implementation of the architecture in ISO/IEC 24791-1 which is capable of exercising the data, control and management of interrogators over the device interface defined in ISO/IEC 24791-5
37、4.8 RFID system RFID interrogators, intermediate software systems, and applications that provide control and coordination of air interface operation, tag information exchange, and health and performance management of system components 4.9 security standards-based authentication, authorization, and d
38、ata privacy appropriate for the specific interface and/or function BS ISO/IEC 24791-1:2010ISO/IEC 24791-1:2010(E) ISO/IEC 2010 All rights reserved 35 Abbreviated terms For the purposes of this document, the symbols and abbreviated terms given in ISO/IEC 19762-1, ISO/IEC 19762-3 and the following app
39、ly. AIDC automatic identification and data capture SSI software system infrastructure UML unified modelling language 6 Architecture overview 6.1 General The Software System Infrastructure architecture consists of standard interface definitions and the implementations in which they exist to provide a
40、 particular service or capability. This distinction is necessary to clearly separate the functions which can and should be standardized (the interfaces) from the realization of the interfaces and the product embodiments in which they reside (the implementations). The basic logical relationship among
41、 the interfaces and implementations of the Software System Infrastructure is depicted in Figure 1. Figure 1 Architecture Overview including Relationships to other RFID Standards BS ISO/IEC 24791-1:2010ISO/IEC 24791-1:2010(E) 4 ISO/IEC 2010 All rights reservedWhile Figure 1 is intended to show the re
42、lationships among the full set of components defined in this architecture, there is no requirement that a particular system, product, or embodiment of this architecture implement all interfaces and implementations defined herein. As specified in Clause 2, the only conformance requirements are those
43、placed upon implementations of the individual Part standards. The parts of ISO/IEC 24791 that define Data Management, Device Interface, and Device Management each provide one or more interfaces which allow a client to communicate with a service-providing implementation, either within the same comput
44、ing device or across a network. These client and service implementations are consistently referred to as Client Endpoints and Services Endpoints, respectively, and in general, the Client Endpoint accesses the capabilities provided by the Services Endpoint. It is the responsibility of the specific Pa
45、rt standard to define the formats, procedures, operations, and conformance requirements of each interface. In addition to defining interfaces for providing configuration and control of the implementations in the network, Device Management may also define requirements for basic initial operation of i
46、nterrogators, particularly related to initialization in networked environments. Security considerations provided in each interface specification define how the Parts of ISO/IEC 24791 provide authentication, authorization, and data privacy to protect the implementations from security threats. 6.2 Tag
47、 and sensor data considerations RFID-based AIDC applications had an initial focus reading and writing data specifically in the tag memory. More recently, sensors attached or directly associated with RFID tags have been able to communicate sensor information through specific air protocol commands or
48、memory-mapped reads from the tag memory. This direct relationship between sensor data and RFID air protocol capabilities requires this Software System Infrastructure to support operations for sensor data as well as those for basic tag memory reading and writing operations. 6.3 Data, control, and man
49、agement functional distinctions This architecture specification divides the functionality provided by the Software System Infrastructure into data, control, and management functions. This division provides for isolation and specialization of that capability to aid understanding and standardization. The data function is comprised of the operations that transfer tag and sensor data between RFID interrogators and higher level components, which include service applications and data managing enti