Foreword
Introduction
1 Scope
2 Normative references
3 Terms, definitions and abbreviated terms
3.1 Terms and definitions
3.2 Abbreviated terms
4 Protocol model
4.1 Overview
4.2 Layered protocol
4.3 Functional processes
5 Data structure
5.1 Notation
5.2 Structure of the transfer between ISO/IEC 15961
and ISO/IEC 15962
6 Abstract and transfer syntax
6.1 Abstract syntax
6.2 Transfer syntax
7 Data flows and processes
7.1 Establishing communications between the application
and the RF tag
7.2 Preparing the basic objects
7.3 Application system services
7.4 Data security
8 Application commands and responses
8.1 Final arc values of the command and response modules
8.2 CompletionCode (elementName)
8.3 ExecutionCode (elementName)
8.4 Command-related elementNames
8.5 ConfigureAfiModules
8.6 ConfigureStorageFormatModules
8.7 InventoryTagsModules
8.8 AddSingleObjectModules
8.9 DeleteObjectModules
8.10 ModifyObjectModules
8.11 ReadSingleObjectModules
8.12 ReadObjectIdsModules
8.13 ReadAllObjectsModules
8.14 ReadLogicalMemoryMapsModules
8.15 InventoryAndReadObjectsModules
8.16 EraseMemoryModules
8.17 GetApplication-basedSystemInformationModules
8.18 AddMultipleobjectsModules
8.19 ReadMutipleObjectsModules
8.20 ReadFirstObjectModules
8.21 Development commands
9 Compliance, or classes of compliance, to this standard
9.1 Application compliance
9.2 Compliance of the Data Protocol Processor
9.3 Compliance of the RF tag and RF interrogator
Annex A (normative) First, Second and Third Arcs of Object
Identifier Tree
Annex B (normative) Code Assignments for ApplicationFamilyId
Annex C (informative) Accommodating established data formats
Annex D (informative) Contact Addresses for Managers of Main
Application Data Dictionaries
D.1 EAN.UCC System
D.2 Data Identifiers
D.3 IATA data elements
D.4 UPU data elements
Annex E (normative) Converting alphanumeric Data Identifiers
to the final arc of the Object Identifier
Annex F (informative) Relating data objects
F.1 Concatenation technique
F.2 Object identifier extension technique
Annex G (informative) Data security issues
G.1 Object identifier issues
G.2 The data object
G.3 Using the TagId
G.4 Advice on public key methods of encryption
Annex H (informative) Example of a transfer encoding
H.1 Functional description of the command
H.2 The abstract syntax for the AddMultipleObjects
command
H.3 The AddMultipleObjects command with the data values
H.4 The transfer encoding for the example command
H.5 Functional description of the response
H.6 The abstract syntax for the AddMultipleObjects
response
H.7 The AddMultipleObjects response with the data values
H.8 The transfer encoding for the example response
Annex I (informative) Guidance to implementers of development
commands