Foreword
Introduction
1 Scope
2 Normative references
3 Terms and definitions
4 Compliance
4.1 Application compliance
4.2 Conformance of the Data Processor
5 Protocol model
5.1 Overview
5.2 Layered protocol
5.3 Flexible implementation configurations
5.4 Functional processes - interrogator implementation
5.5 ISO/IEC 15962 and the Data Processor
6 Presentation conventions
6.1 Presentation of commands, responses and arguments
6.2 Object Identifier presentation in the application
interface
6.3 Byte Notation
7 Processing application commands and responses
7.1 General
7.2 Encoding system related information in commands
7.3 Preparing the basic objects and other application-based
arguments
7.4 Other command arguments
7.5 Command-related field names
7.6 Data security
8 Data flows and processes to the air interface
8.1 Establishing communications between the application and
the RFID tag
8.2 Application system services
9 Command-Codes, Completion-Codes, and Execution-Codes
9.1 Final arc values of the command and response modules
9.2 Completion-Code
9.3 Execution-Code
10 Commands and responses
10.1 Configure-AFI
10.2 Configure-DSFID
10.3 Inventory-Tags
10.4 Delete-Object
10.5 Modify-Object
10.6 Read-Object-Identifiers
10.7 Read-Logical-Memory-Map
10.8 Erase-Memory
10.9 Get-App-Based-System-Info
10.10 Write-Objects
10.11 Read-Objects
10.12 Write-Objects-Segmented-Memory-Tag
10.13 Write-EPC-UII
10.14 Inventory-ISO-UIImemory
10.15 Inventory-EPC-UIImemory
10.16 Write-Password-Segmented-Memory-Tag
10.17 Read-Words-Segmented-Memory-Tag
10.18 Kill-Segmented-Memory-Tag
10.19 Delete-Packed-Object
10.20 Modify-Packed-Object-Structure
10.21 Arguments
Annex A (informative) Abstract syntax and transfer encoding rules
A.1 Abstract syntax
A.2 Transfer syntax
Annex B (informative) Accommodating established data formats
Annex C (informative) Relating data objects
C.1 Concatenation technique
C.2 Object identifier extension technique
Annex D (informative) Data security issues
D.1 Object-Identifier issues
D.2 The data Object
D.3 Using the Tag ID
D.4 Advice on public key methods of encryption
Annex E (informative) Original commands and responses using
ASN.1 abstract syntax
E.1 ConfigureAfiModules
E.2 ConfigureStorageFormatModules
E.3 InventoryTagsModules
E.4 AddSingleObjectModules
E.5 DeleteObjectModules
E.6 ModifyObjectModules
E.7 ReadSingleObjectModules
E.8 ReadObjectIdsModules
E.9 ReadAllObjectsModules
E.10 ReadLogicalMemoryMapModules
E.11 InventoryAndReadObjectsModules
E.12 EraseMemoryModules
E.13 GetApplication-basedSystemInformationModules
E.14 AddMultipleObjectsModules
E.15 ReadMultipleObjectsModules
E.16 ReadFirstObjectModules
Annex F (informative) Example of a transfer encoding to
ISO/IEC 15961:2004
F.1 Functional description of the command
F.2 The abstract syntax for the AddMultipleObjects command
F.3 The AddMultipleObjects command with the data values
F.4 The transfer encoding for the example command
F.5 Functional description of the response
F.6 The abstract syntax for the AddMultipleObjects response
F.7 The AddMultipleObjects response with the data values
F.8 The transfer encoding for the example response
Bibliography