ZK-RFID105 UHF RFID Reader User's Manual V1.2
RFID基础
目录RFID基础知识 (1)RFID应用领域 (4)RFID相关术语 (4)标签 (6)RFID读写设备基本介绍 (8)RFID读写器 (10)RFID知识进阶 (11)RFID工作频率的分类 (13)RFID中间件知识 (15)如何保护RFID内部信息 (19)RFID天线知识 (21)电子标签耦合 (23)电子标签的制作及封装 (25)射频标签通信协议简介 (26)射频标签内存信息的写入方式 (26)RFID工作频率指南和典型应用 (27)从传统条码到RFID (30)射频技术和条码的比较 (36)RFID标签能否取代条码技术 (38)使用高频标签会对人体有辐射危害吗 (39)RFID面临的问题 (39)RFID基础知识1.什么是RFIDRFID是Radio Frequency Identification的缩写,即射频识别。
常称为感应式电子晶片或近接卡、感应卡、非接触卡、电子标签、电子条码,等等。
一套完整 RFID系统由 Reader 与 Transponder 两部份组成 ,其动作原理为由 Reader 发射一特定频率之无限电波能量给Transponder,用以驱动Transponder电路将內部之ID Code送出,此时Reader便接收此ID Code。
Transponder的特殊在于免用电池、免接触、免刷卡故不怕脏污,且晶片密码为世界唯一无法复制,安全性高、长寿命。
RFID的应用非常广泛,目前典型应用有动物晶片、汽车晶片防盜器、门禁管制、停车场管制、生产线自动化、物料管理。
RFID标签有两种:有源标签和无源标签。
以下是电子标签内部结构:芯片+天线与RFID系统组成示意图2.什么是电子标签电子标签即为 RFID 有的称射频标签、射频识别。
它是一种非接触式的自动识别技术,通过射频信号识别目标对象并获取相关数据,识别工作无须人工干预,作为条形码的无线版本,RFID技术具有条形码所不具备的防水、防磁、耐高温、使用寿命长、读取距离大、标签上数据可以加密、存储数据容量更大、存储信息更改自如等优点。
倍福RFID读写器手册说明书
Company AddressesEurope, Germany, HeadquarterBalluff GmbHSchurwaldstraße 9D-73765 Neuhausen a.d.F.ArgentinaBalluff Argentina S.R.L.Av del Libertador 650 Piso 7 SurB1638BES - Vicente Lopez, Buenos AiresAustraliaBalluff Pty Ltd.18 Malvern StreetBayswater, 3153 VictoriaBrasilBalluff Controles Elétricos Ltda.Rua Francisco Foga, 25 ,Distrito IndustrialCEP 13280.000 – Vinhedo – SPCanadaBalluff Canada Inc.2840 Argentia Road, Unit 1 Mississauga,Ontario L5N 8G4ChinaBalluff (Shanghai) Trading Co. Ltd.No.800 Chengshan Rd, 8F, Building A, Yunding International Commercial Plaza 200125, Pudong, ShanghaiJapanBalluff Co., Ltd.Aqua Hakusan Bldg. 9F 1-13-7 Hakusan, Bunkyo-ku,Tokyo 113-0001MexicoBalluff de México S.A. de C.V.Anillo Vial II Fray Junipero Serra No. 4416; Colonia La Vista ResidencialCP 76232 Delegación Epigmenio González, QuerétaroUSABalluff Inc.8125 Holton Drive, FlorenceKentucky 41042-0937Operating GuidePurpose of the DeviceThe BF-IDU08 device is intended to read and write "EPC Global Class 1 Gen2" compliant data carriers (so called tags) via country dependent UHF radio frequencies.Check that you have the right device variantThis UHF system consists of a radio frequency unit and an integrated antenna according to specifications and may only be operated within the specified countries subject to all applicable national legal regulations and standards.Check that the type label contains the correct type of approval symbol for your country.► When using the UHF system in the European Community, the provisions in ETSI standard 302 208 apply.► When using the UHF system in the USA, the directives of the FCC, Part 15 B and 15 C, apply.► When using the UHF system in Canada, the directives of the IC, RSS-210 apply.► When using the UHF system in China, the directives of the RFID National Standard and GB 9254 apply.This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions:(1) This device may not cause harmful interference, and(2) This device must accept any interference received, including interference that may cause undesired operation.Connecting the DeviceThe BF-IDU08 device has to be connected to one of the IO-Link-Device ports of an IO-Link-Master unit via standard 4-wire cable with M12 industry connectors (A-coded). The IO-Link-Master unit provides power supply and controls the device over its IO-Link interface connection.Figure 1: System overviewThe IO-Link-Master unit itself needs to be connected to a power supply and the customer's PLC unit. For further information, please refer to the user manual of the used IO-Link-Master unit. MountingBefore operating the device has to be mounted with the provided M30 nuts or other suitable fixtures, Figure 2. Optional mounting fixtures are available at .The BF-IDU08 device may be mounted in any direction, the operating direction of the integrated antenna is towards the length axis of the BF-IDU08 device as displayed in Figure 1 (direction towards the UHF-Tags).Figure 2: BF-IDU08 mounted on metal carrier using 2 x Nut M30The antennas of the identification system BIS U transmit ultra-high frequency electromagnetic waves. People should not remain within the near enclosure of the UHF antenna over long time periods (several hours). The mounting position of the BF-IDU08 should take respect to a clearance area of about 25cm to workplaces.Setup and OperationThe BF-IDU08 device will operate when connected to an IO-Link-Master that provides power supply and implements the BF-IDU08 RFID-Reader protocol.Device behavior e.g. transmission power or operating modes can be setup via different parameters. Protocol description and available parameters are described in the firmware configuration manual.Status IndicatorsThe device will show its status using RGB LEDs located at the M12 plug. Depending on the device state the LED changes color and lighting mode (static, blink slow, blink fast).Electrical DataMechanical Data。
开发包ZK_RFID105
ZK_RFID105.DLL Dynamic Link LibraryUser’s Guide V1.21.OPERATION SYSTEM REQUIREMENT: (1)2.FUNCTION LIST: (1)2.1)G ENERAL F UNCTION: (1)2.2)EPCC1-G2F UNCTION: (1)2.3)18000-6B F UNCTION: (3)3.FUNCTION EXPLANATION: (4)3.1)G ENERAL F UNCTION: (4)3.1.1) AutoOpenComPort(): (4)3.1.2) OpenComPort(): (5)3.1.3) CloseComPort(): (6)3.1.4) CloseSpecComPort(): (6)3.1.5)GetReaderInformation(): (6)3.1.6) WriteComAdr (): (7)3.1.7) WriteScanTime (): (7)3.1.8) SetPowerDbm(): (8)3.1.9) Writedfre(): (8)3.1.10) Writebaud(): (8)3.2)EPCC1-G2F UNCTION: (9)3.2.1) Inventory_G2 (): (9)3.2.2) ReadCard_G2 (): (10)3.2.3) WriteCard_G2 (): (10)3.2.4) EraseCard_G2 (): (11)3.2.5) SetCardProtect_G2 (): (12)3.2.6) DestroyCard_G2 (): (13)3.2.7) WriteEPC_G2 (): (14)3.2.8) SetReadProtect_G2 (): (14)3.2.9) SetMultiReadProtect_G2 (): (15)3.2.10) RemoveReadProtect_G2 (): (15)3.2.11) CheckReadProtected_G2 (): (15)3.2.12) SetEASAlarm_G2 (): (16)3.2.13) CheckEASAlarm_G2 (): (17)3.2.14) LockUserBlock_G2 (): (17)3.2.15) WriteBlock_G2 (): (18)3.3)18000-6B F UNCTION: (19)3.3.1) Inventory_6B (): (19)3.3.2) Inventory2_6B (): (19)3.3.3) ReadCard_6B (): (20)3.3.4) WriteCard_6B (): (20)3.3.5) CheckLock_6B (): (21)3.3.6) LockByte_6B (): (21)4. RETURN V ALUE DEFINITION (22)5.ERRORCODE DEFINITION (23)ZK_RFID105.DLL is a dynamic link library designed to facilitate EPCC1-G2 and 18000-6B protocol UHF tag application software development.1.Operation System Requirement:WINDOWS 2000/XP2.Function List:ZK_RFID105.DLL includes the following functions:2.1)General Function:1)Long WINAPI AutoOpenComPort(long *Port, unsigned char *ComAdr, unsigned char Baud , long *FrmHandle);2) Long WINAPI OpenComPort(long Port, unsigned char *ComAdr, unsigned char Baud, long *FrmHandle);3) Long WINAPI CloseComPort(void);4) Function long WINAPI CloseSpecComPort(long FrmHandle);5) Long WINAPI GetReaderInformation(unsigned char *ComAdr, unsigned char *VersionInfo, unsigned char *ReaderType, unsigned char *TrType,unsigned char * dmaxfre , unsigned char *dminfre, unsigned char *powerdBm,unsigned char *ScanTime, long FrmHandle);6) Long WINAPI WriteComAdr(unsigned char *ComAdr, unsigned char *ComAdrData, long FrmHandle);7) Long WINAPI WriteScanTime(unsigned char *ComAdr, unsigned char *ScanTime, long FrmHandle);8) Long WINAPI SetPowerDbm (unsigned char *ComAdr, unsigned char *power, long FrmHandle);9) Long WINAPI Writedfre (unsigned char *ComAdr, unsigned char * dmaxfre, unsigned char * dminfre, long FrmHandle);10) Long WINAPI Writebaud (unsigned char *ComAdr, unsigned char * baud, long FrmHandle);2.2)EPCC1-G2 Function:1) Long WINAPI Inventory_G2 (unsigned char *ComAdr, unsigned char AdrTID, unsigned char LenTID, unsigned char TIDFlag,unsigned char * EPClenandEPC, long *Totallen, long *CardNum, long FrmHandle);2) Long WINAPI ReadCard_G2 (unsigned char *ComAdr, unsigned char * EPC, unsigned char Mem, unsigned char WordPtr, unsigned char Num, unsigned char * Password , unsigned char *Data , unsigned char EPClength, long * errorcode, long FrmHandle);3) Long WINAPI WriteCard_G2 (unsigned char *ComAdr, unsigned char * EPC, unsigned char Mem, unsigned char WordPtr, unsigned char Writedatalen, unsigned char *Writedata,unsigned char * Password, long WrittenDataNum, unsigned char EPClength, long * errorcode, long FrmHandle);4) Long WINAPI EraseCard_G2 (unsigned char *ComAdr, unsigned char * EPC, unsigned char Mem, unsigned char WordPtr, unsigned char Num, unsigned char * Password,unsigned char EPClength, long * errorcode, long FrmHandle);5) Long WINAPI SetCardProtect_G2 (unsigned char *ComAdr, unsigned char * EPC, unsigned char select, unsigned char setprotect, unsigned char * Password, unsigned char EPClength, long * errorcode, long FrmHandle);6) Long WINAPI DestroyCard_G2 (unsigned char *ComAdr, unsigned char * EPC, unsigned char * Password, unsigned char EPClength, long * errorcode, long FrmHandle);7) Long WINAPI WriteEPC_G2 (unsigned char *ComAdr, unsigned char * Password, unsigned char * WriteEPC, unsigned char WriteEPClen, long * errorcode, long FrmHandle);8) Long WINAPI SetReadProtect_G2 (unsigned char *ComAdr, unsigned char * EPC, unsigned char * Password, unsigned char EPClength, long * errorcode, long FrmHandle);9) Long WINAPI SetMultiReadProtect_G2 (unsigned char *ComAdr, unsigned char * Password, long * errorcode, long FrmHandle);10) Long WINAPI RemoveReadProtect_G2 (unsigned char *ComAdr, unsigned char * Password, long * errorcode, long FrmHandle);11) Long WINAPI CheckReadProtected_G2 (unsigned char *ComAdr, unsigned char *readpro,long * errorcode, long FrmHandle);12) Long WINAPI SetEASAlarm_G2 (unsigned char *ComAdr, unsigned char * EPC, unsigned char * Password, unsigned char EAS, unsigned char EPClength, long * errorcode, long FrmHandle);13) Long WINAPI CheckEASAlarm_G2 (unsigned char *ComAdr, long * errorcode, long FrmHandle);14) Long WINAPI LockUserBlock_G2 (unsigned char *ComAdr, unsigned char * EPC, unsigned char * Password, unsigned char BlockNum,unsigned char EPClength, long * errorcode, long FrmHandle);15) Long WINAPI WriteBlock_G2 (unsigned char *ComAdr, unsigned char * EPC, unsigned char Mem, unsigned char WordPtr, unsigned char Writedatalen, unsigned char *Writedata,unsigned char* Password, long WrittenDataNum, unsigned char EPClength, long * errorcode, long FrmHandle);2.3)18000-6B Function:1) Long WINAPI Inventory_6B (unsigned char *ComAdr, unsigned char * ID_6B , long FrmHandle);2) Long WINAPI Inventory2_6B (unsigned char *ComAdr, unsigned char * Condition , unsigned char StartAddress, unsigned char mask , unsigned char ConditionContent,unsigned char * ID_6B , long * Cardnum, long FrmHandle);3) Long WINAPI ReadCard_6B (unsigned char *ComAdr, unsigned char * ID_6B , unsigned char StartAddress, unsigned char Num, unsigned char * Data, long * errorcode, long FrmHandle);4) Long WINAPI WriteCard_6B (unsigned char *ComAdr, unsigned char * ID_6B , unsigned char StartAddress, unsigned char * Writedata, unsigned char Writedatalen, int * writtenbyte, long * errorcode, long FrmHandle);5) Long WINAPI LockByte_6B (unsigned char *ComAdr, unsigned char * ID_6B , unsigned char Address, long * errorcode, long FrmHandle);6) Long WINAPI CheckLock_6B (unsigned char *ComAdr, unsigned char * ID_6B , unsigned char Address, unsigned char * ReLockState,long * errorcode, long FrmHandle);3.Function Explanation:3.1)General Function:3.1.1) AutoOpenComPort():Function description:This function is used to automatically detect the communication port unoccupied by other application and attached with a reader. The function try to establish the connection between them. The protocol parameters are 57600bps, 8 data bits, 1 start bit, 1 stop bit, no parity bit.If the connection is established successfully, the function will open the communication port and return a valid handle, otherwise the function will return an error code with a invalid handle(value as -1).Usage:Long WINAPI AutoOpenComPort(long *Port, unsigned char *ComAdr, unsigned char Baud , long FrmHandle);Parameter:Port:Pointed to the communication port number (COM1~COM9) that the reader is detected and connected.ComAdr: Pointed to the address of the reader.When using broadcasting address 0xFF as ComAdr to call the function, the port number to which the reader is detected and the address of the reader will be writed back to parameter Port and ComAdr;When using a designated address 0x00~0xFE as ComAdr to call the function, the port number to which the reader with the specified address is detected will be writed back to parameter Port.Constants COM1~COM9 are defined as follows:#define COM1 1#define COM2 2#define COM3 3#define COM4 4#define COM5 5#define COM6 6#define COM7 7#define COM8 8#define COM9 9Baud:This value set the baud rate of the serial communication control.FrmHandle: Pointed to the communication handle which is binding with the communication port opened successfully. The application software should use this handle to manipulate thereader connected to the port.Returns:Zero value when successfully, non-zero value when error occurred.3.1.2) OpenComPort():Function description:This function is used to establish the connection between the reader and a specified communication port. The protocol parameters are 57600bps, 8 data bits, 1 start bit, 1 stop bit, no parity bit.Usage:Long WINAPI OpenComPort(long Port, unsigned char *ComAdr, unsigned char Baud, long FrmHandle);Parameter:Port: Communication port number which is a constant from COM1 to COM9defined as following:#define COM1 1#define COM2 2#define COM3 3#define COM4 4#define COM5 5#define COM6 6#define COM7 7#define COM8 8reader will be writed back to parameter ComAdr;When using a designated address 0x00~0xFE as ComAdr to call the function, the function will detect whether a specified address reader is connected to the designaged communication port.FrmHandle: Pointed to the communication handle which is binding with the communication port opened successfully. The application software should use this handle to manipulate the reader connected to the port.Returns:Zero value when successfully, non-zero value when error occurred.3.1.3) CloseComPort():Function description:This function is used to disconnect the reader and release the corresponding communication port resources. In some development environment, the communication port resources must be released before exiting. Otherwise the operation system will become unstable.Usage:Long WINAPI CloseComPort(void);Parameter: None.Returns:Zero value when successfully, non-zero value when error occurred.3.1.4) CloseSpecComPort():Function description:This function is used to disconnect the reader with the designated communication port and release the corresponding resources.Usage:Long WINAPI CloseSpecComPort(long FrmHandle);Parameter:FrmHandle: Handle of the corresponding communication port the reader is connected. The handle value is got when calling function AutoOpenComPort or OpenComPort.Returns:Zero value when successfully, non-zero value when error occurred.3.1.5)GetReaderInformation():Function description:This function is used to get reader-related information such as reader address(ComAdr), firmware version, supported protocol type and InventoryScanTime.Usage:Long WINAPI GetReaderInformation(unsigned char *ComAdr, unsigned char *VersionInfo, unsigned char *ReaderType, unsigned char *TrType,unsigned char * dmaxfre , unsigned char *dminfre, unsigned char *powerdBm,unsigned char *ScanTime, long FrmHandle);Parameter:ComAdr: Pointed to the address of the reader.VersionInfo: Pointed to 2 bytes firmware version information. The first byte is version number, the second byte is sub-version number.ReaderType: Pointed to the reader type byte. 0x08 lines on ZK_RFID105TrType: Pointed to 2 bytes supported protocol information.Dmaxfre:Output variable, Bit7-Bit6 band set for use; Bit5-Bit0 that the current maximum frequency reader to work, the specific definitions, see the user manual.Dminfre: Output variable, Bit7-Bit6 band set for use; Bit5-Bit0 reader work that the current minimum frequency, the specific definitions, see the user manual.PowerdBm:The output power of reader.Range is 20 to 30,when PowerdBm is 0x00, it means the output power of reader unkown.ScanTime: Point to the value of time limit for inventory command. Please refer to ZK_RFID105 User’s manual for details.FrmHandle: Handle of the corresponding communication port the reader is connected. The handle value is got when calling function AutoOpenComPort or OpenComPort.Returns:Zero value when successfully, non-zero value when error occurred.3.1.6) WriteComAdr ():Function description:This function is used to set a new address of the reader. The address value will store in reader’s inner nonvolatile memory. Default address value is 0x00. Thevalue range is 0x00~0xFE. The address 0xFF is reserved as the broadcasting address. When user try to write a 0xFF to ComAdr, the reader will set the value to 0x00 automatically.Usage:Long WINAPI WriteComAdr(unsigned char *ComAdr, unsigned char *ComAdrData, long FrmHandle);Parameter:ComAdr: Pointed to the original address of the reader.ComAdrData: Pointed to the new address of the reader.FrmHandle: Handle of the corresponding communication port the reader isconnected. The handle value is got when calling function AutoOpenComPortor OpenComPort.Returns:Zero value when successfully, non-zero value when error occurred.3.1.7) WriteScanTime ():Function description:This function is used to set a new value to InventoryScanTime of an appointed reader. The range is 3~255 corresponding to 3*100ms~255*100ms InventoryScanTime. The default value of InventoryScanTime is 30*100ms.Usage:Long WINAPI WriteScanTime(unsigned char *ComAdr, unsigned char *ScanTime, long FrmHandle);Parameter:ComAdr: Pointed to the address of the reader.InventoryScanTime: Pointed to the value of InventoryScanTime.FrmHandle: Handle of the corresponding communication port the reader is connected. The handle value is got when calling function AutoOpenComPort or OpenComPort.Returns:Zero value when successfully, non-zero value when error occurred.3.1.8) SetPowerDbm():Function description:The function is used to set the power of reader.Usage:Long WINAPI SetPowerDbm (unsigned char *ComAdr, unsigned char * powerDbm, long FrmHandle);Parameter:ComAdr: Pointed to the address of the reader.Powerdbm:The output power of reader. range is 20~30.FrmHandle: Handle of the corresponding communication port the reader is connected. The handle value is got when calling function AutoOpenComPort or OpenComPort.Returns:Zero value when successfully, non-zero value when error occurred.3.1.9) Writedfre():Function description:The function is used to set the reader working of the lower limit and the upper limit of frequency.Usage:Long WINAPI Writedfre (unsigned char *ComAdr, unsigned char * dmaxfre, unsigned char * dminfre, long FrmHandle);Parameter:ComAdr: Pointed to the address of the reader.Dmaxfre:Input variable, Bit7-Bit6 band set for use; Bit5-Bit0 that the current maximum frequency reader to work, the specific definitions, see the user manual.Dminfre: Input variable, Bit7-Bit6 band set for use; Bit5-Bit0 reader work that the current minimum frequency, the specific definitions, see the user manual.FrmHandle: Handle of the corresponding communication port the reader is connected. The handle value is got when calling function AutoOpenComPort or OpenComPort.Returns:Zero value when successfully, non-zero value when error occurred.3.1.10) Writebaud():Function description:The function is used to change the serial port baud rate.Usage:Long WINAPI Writebaud (unsigned char *ComAdr, unsigned char * baud, long FrmHandle);Parameter:ComAdr: Pointed to the address of the reader.Baud: After reader power on, the baud rate of reader is 57600bps. Range is 0~6.but ApdComPort control in DLL is not support 43000bps.FrmHandle: Handle of the corresponding communication port the reader is connected. The handle value is got when calling function AutoOpenComPort or OpenComPort.Returns:Zero value when successfully, non-zero value when error occurred.3.2) EPCC1-G2 Function:3.2.1) Inventory_G2 ():Function description:The function is used to detect tags in the inductive area and get their EPC values.Usage:Long WINAPI Inventory_G2 (unsigned char *ComAdr, unsigned char AdrTID, unsigned char LenTID, unsigned char TIDFlag,unsigned char *EPClenandEPC, long *Totallen, long *CardNum, long FrmHandle);Parameter:ComAdr: Input, pointed to the address of the reader.AdrTID:Input,query TID’s start address.LenTID: Input,query TID’s data word number.TIDFlag: Input,query TID’s falg.TIDFlag=1:query TID.TIDFlag=0:query EPC.EPClenandEPC: Output, Pointed to the array storing the inventory result. It is the EPC data of tag Reader read. The unit of the array includes 1 byte EPCLen and N (the value of EPCLen) bytes EPC. It is the former high-word, low word in the EPC of each tag. It is the former high-byte, low byte in the each word.Totallen: Output. Pointed to the byte count of theCardNum: Output. Pointed to the number of tagFrmHandle: Handle of the corresponding communication port the reader is connected. The handle value is got when calling function AutoOpenComPort or OpenComPort.Returns:Zero value when successfully, value:0x01 Return before Inventory finished0x02 the Inventory-scan-time overflow0x03 More Data0x04 Reader module MCU is Fullothers when error occurred.3.2.2) ReadCard_G2 ():Function description:The function is used to read part or all of a Tag’s Password, EPC, TID, or User memory. To the word as a unit, start to read data from the designated address.Usage:Long WINAPI ReadCard_G2 (unsigned char *ComAdr, unsigned char * EPC, unsigned char Mem, unsigned char WordPtr, unsigned char Num, unsigned char * Password , unsigned char * Data , unsigned char EPClength, long * errorcode, long FrmHandle);Parameter:ComAdr: Input. Pointed to the address of the reader.EPC: Input, Pointed to the array of tag’s EPC value. It is the EPC number of tag.Mem: Input, Pointed to select the memory area to read.0x00: Password area0x01: EPC memory area0x02: TID memory area0x03: User’s memory areaOther value when error occurred.WordPtr: Input, Pointed to the address of tag data to read (Word/Hex). Such as, 0x00 stand in start to read data from first word, 0x01 stand in start to read data from second word, and so on.Num: Input, Pointed to the number of word to read. Can not set 0 or 120, otherwise, return the parameter error information. Num <= 120Password: Input, Pointed to the 8 bytes of tag’s accesspassword value. From left to right it is the former high-word, low word in the accesspassword.maskadr: Input, EPC masking starting address of byte.maskLen: Input, Masking bytes.maskFlag: Input,EPC masking Flag.0x00:disabled;0x01:enabled;Data: Output.Pointed to the array of the data read from tag.EPClength: Input, Pointed to the byte length of EPC.Errorcode: Output, Pointed to an explanation byte when the function return value equals 0xFC.FrmHandle: Handle of the corresponding communication port the reader is connected. The handle value is got when calling function AutoOpenComPort or OpenComPort.Returns:3.2.3) WriteCard_G2 ():Function description:The function is used to write several words in a Tag’s Reserved, EPC, TID, or User memory.Usage:Long WINAPI WriteCard_G2 (unsigned char *ComAdr, unsigned char * EPC, unsigned char Mem, unsigned char WordPtr, unsigned char Writedatalen, unsigned char * Writedata, unsigned char * Password, long WrittenDataNum, unsigned char EPClength, long * errorcode, long FrmHandle);Parameter:ComAdr: Input. Pointed to the address of the reader.EPC: Input, Pointed to the array of tag’s EPC value. It is the EPC number of tag.Mem: Input, Pointed to select the memory area to read.0x00: Password area0x01: EPC memory area0x02: TID memory area0x03: User’s memory areaOther value when error occurred.WordPtr: Input, Pointed to the starting address of tag data to write (Word/Hex).If write in the EPC area, it will ignore the start address, and start to write at the address 0x02.Writedatalen: Input, Pointed to the number of bytes to be written. It must be even and greater than 0. The number of bytes is equal toThe actual number of data to be written. Otherwise, return the parameter error information.Writedata: Input, Pointed to the array of the word to be written. For example, WordPtr equal 0x02, then the first word in Data write in the address 0x02 of designated Mem, the second word write in 0x03, and so on.Password: Input, Pointed to the 8 bytes of tag’s accesspassword value. From left to right it is the former high-word, low word in the accesspassword.maskadr: Input, EPC masking starting address of byte.maskLen: Input, Masking bytes.maskFlag: Input,EPC masking Flag.0x00:disabled;0x01:enabled;WrittenDataNum: Output, the number of the word has been written.in word units.EPClength: Input, Pointed to the byte length of EPC.Errorcode: Output, Pointed to an explanation byte when the function return value equals 0xFC.FrmHandle: Handle of the corresponding communication port the reader is connected. The handle value is got when calling function AutoOpenComPort or OpenComPort.Returns:Zero value when successfully, non-zero value when error occurred.3.2.4) EraseCard_G2 ():Function description:The function is used to erase multiple words in a Tag’s Password, EPC, TID, or User memory.Usage:Long WINAPI EraseCard_G2 (unsigned char *ComAdr, unsigned char * EPC, unsigned char Mem, unsigned char WordPtr, unsigned char Num, unsigned char * Password, unsigned char EPClength, long * errorcode, long FrmHandle);Parameter:ComAdr: Input. Pointed to the address of the reader.EPC: Input, Pointed to the array of tag’s EPC value. It is the EPC number of tag.Mem: Input, Pointed to select the memory area to read.0x00: Password area0x01: EPC memory area0x02: TID memory area0x03: User’s memory areaOther value when error occurred.WordPtr: Input, Pointed to the address of tag data to erase (Word/Hex). Such as, 0x00 stand inNum: Input, Pointed to the number of word to erase. Can not set 0, otherwise, return the parameter error information.Password: Input, Pointed to the 8 bytes of tag’s accesspassword value. From left to right it is the former high-word, low word in the accesspassword.maskadr: Input, EPC masking starting address of byte.maskLen: Input, Masking bytes.maskFlag: Input,EPC masking Flag.0x00:disabled;0x01:enabled;EPClength: Input, Pointed to the byte length of EPC.Errorcode: Output, Pointed to an explanation byte when the function return value equals 0xFC.FrmHandle: Handle of the corresponding communication port the reader is connected. The handle value is got when calling function AutoOpenComPort or OpenComPort.Returns:Zero value when successfully, non-zero value when error occurred.3.2.5) SetCardProtect_G2 ():Function description:The function is used to set Password area as readable and writeable from any state, readable and writeable from the secured state, permanently readable and writeable, never readable and writeable.It used to set EPC, TID or User as writeable from any state, writeable from the secured state, permanently writeable, never writeable.Usage:Long WINAPI SetCardProtect_G2 (unsigned char *ComAdr, unsigned char * EPC, unsigned char select, unsigned char setprotect, unsigned char * Password, unsigned char EPClength, long * errorcode, long FrmHandle);Parameter:ComAdr: Input. Pointed to the address of the reader.EPC: Input, Pointed to the array of tag’s EPC value. It is the EPC number of tag.Select: Input.0x00, Control kill password protection setting.0x01, Control access password protection setting.0x02, Control EPC memory protection setting.0x03, Control TID memory protection setting.0x04, Control User memory protection setting.as follows:0x01: permanently readable and writeable.0x02: readable and writeable from the secured state.as follows:0x01: permanently writeable.0x02: writeable from the secured state.0x03: never writeable.Password: Input, Pointed to the 8 bytes of tag’s accesspassword value. From left to right it is the former high-word, low word in the accesspassword.maskadr: Input, EPC masking starting address of byte.maskLen: Input, Masking bytes.maskFlag: Input,EPC masking Flag.0x00:disabled;0x01:enabled;EPClength: Input, Pointed to the byte length of EPC.Errorcode: Output, Pointed to an explanation byte when the function return value equals 0xFC.FrmHandle: Handle of the corresponding communication port the reader is connected. The handle value is got when calling function AutoOpenComPort or OpenComPort.Returns:Zero value when successfully, non-zero value when error occurred.3.2.6) DestroyCard_G2 ():Function description:The function is used to destroy tag. After the tag destroyed, it never process command.Usage:Long WINAPI DestroyCard_G2 (unsigned char *ComAdr, unsigned char * EPC, unsigned char * Password, unsigned char EPClength, long * errorcode, long FrmHandle);Parameter:ComAdr: Input. Pointed to the address of the reader.EPC: Input, Pointed to the array of tag’s EPC value. It is the EPC number of tag.Password: Input, Pointed to the 8 bytes of tag’s accesspassword value. From left to right it is the former high-word, low word in the accesspassword.maskadr: Input, EPC masking starting address of byte.maskLen: Input, Masking bytes.maskFlag: Input,EPC masking Flag.0x00:disabled;0x01:enabled;EPClength: Input, Pointed to the byte length of EPC.Errorcode: Output, Pointed to an explanation byte when the function return value equals 0xFC.FrmHandle: Handle of the corresponding communication port the reader is connected. The handle value is got when calling function AutoOpenComPort or OpenComPort.Returns:Zero value when successfully, non-zero value when error occurred.3.2.7) WriteEPC_G2 ():Function description:The function is used to write EPC value in a Tag’s EPC memory. Random write one tag in the antenna.Usage:Long WINAPI WriteEPC_G2 (unsigned char *ComAdr, unsigned char * Password, unsigned char * WriteEPC, unsigned char WriteEPClen, long * errorcode, long FrmHandle);Parameter:ComAdr: Input. Pointed to the address of the reader.Password: Input, Pointed to the 8 bytes of tag’s accesspassword value. From left to right it is the former high-word, low word in the accesspassword.WriteEPC: Input, Pointed to the array of the new tag’s EPC value to overwrite the old tag’s EPC value.WriteEPClen: Input, Pointed to the number of bytes of new EPC value.range is 2~30. It must be even number, such as 2, 4, and so on.Errorcode: Output, Pointed to an explanation byte when the function return value equals 0xFC.FrmHandle: Handle of the corresponding communication port the reader is connected. The handle value is got when calling function AutoOpenComPort or OpenComPort.Returns:Zero value when successfully, non-zero value when error occurred.3.2.8) SetReadProtect_G2 ():Function description:The function is used to set designated tag read protection. After the tag destroyed, it never process command. Even if inventory tag, reader can not get the EPC number.Only NXP's UCODE EPC G2X tags valid.Usage:Long WINAPI SetReadProtect_G2 (unsigned char *ComAdr, unsigned char * EPC, unsigned char * Password, unsigned char EPClength, long * errorcode, long FrmHandle);Parameter:ComAdr: Input. Pointed to the address of the reader.EPC: Input, Pointed to the array of tag’s EPC value. It is the EPC number of tag.Password: Input, Pointed to the 8 bytes of tag’s accesspassword value. From left to right it is the former high-word, low word in the accesspassword.maskadr: Input, EPC masking starting address of byte.maskLen: Input, Masking bytes.maskFlag: Input,EPC masking Flag.0x00:disabled;0x01:enabled;EPClength: Input, Pointed to the byte length of EPC.Errorcode: Output, Pointed to an explanation byte when the function return value equals 0xFC.FrmHandle: Handle of the corresponding communication port the reader is connected. The handle value is got when calling function AutoOpenComPort or OpenComPort.Returns:。
UHF读写器用户手册说明书
UHF Reader User Manual2E-26562E-2657Contents1. Model Parameter: (3)2. Model Package: (3)3. Wiring Diagram: (4)3.1 Example with Anson Controller (5)3.2 Connect to Ground: (5)4. Installation: (5)4.1 Installation 1 example: (6)4.2 Mounting reader and height adjustment (6)4.3 Reader Installation Angle Adjustment (7)4.4 Installation Example-Parking Lot (7)4.5 Tag position in vehicle (8)5. Application: (9)6. Quick Start for Software (9)6.1 Connect reader With PC (9)6.1.1 RS232 Communication (10)6.1.2 TCP/IP Communication (10)6.2 Basic Settings: (12)6.2.1 Wiegand Parameter Input Zone: (12)6.2.2 Basic Parameters Input Zone: (12)6.2.3 Freq Parameters Input Zone: (14)6.2.4 Senior Parameter Input Zone: (14)6.2.5 Active Encrypt Function (14)6.2.6 . Get Parameter (17)6.2.7 Set Parameter (17)6.2.8 Default All (17)6.2.9 Net Initialize (17)6.3.10 WIFI Initialize (17)6.3 Senior Settings (17)6.4 EPC Read and Write (18)6.5 ISO1800-6B Read and Write (19)7. Notice (20)1. Model Parameter:2. Model Package:In the package include one reader, 1 RS232 Serial port , 12V adapter and the antenna bearer. When you open the box, please check the spare parts, if with any question, please contact distributor or sales department.See below picture for the inside package and separate products picture(2E -2656).RS232/485 RS232/4851-15mDescription PictureDeviceRS232 Serial PortCable12V AdapterAntenna Bearer3. Wiring Diagram:Description Model Wire No. Color Function1 Red DC9-15Positive 2E-2656/57V2 Black GND Negative 2E-2656/573.1 Example with Anson Controller3.2 Connect to Ground:In case you use the external power supply for the UHF reader, then you must have acommon ground with controller, or will cause unknown problems.4. Installation:In general there are two installation ways of UHF reader, see blow picture 1 and 2.7 2E-2656/572E-2656/57PIN58 Grey Trigger/ 2E-2656/57 9 Orange 485+ / 2E-2656/57 10 Purple 485-/ 2E-2656/57TCP/IP UHF reader without Grey, orange and purple cable. 4 Green Data0 Wiegand D0 5 Yellow TXD RS232 PIN26BrownRXDRS232 PIN32E-2656/577 Blue GND RS232 GND 3 White Data1 Wiegand D12E-2656/572E-2656/57(1) (2)Installation 1 will be easy for installation, but distance will be less than installation 2, installation 2 will be more difficult for installation.4.1 Installation 1 example:4.2 Mounting reader and height adjustmentFor installation 1, the mounting pole diameter should be 50-60mm, height should be 2.2m, we suggest to use the stainless steel material(thickness greater than 1.2mm), use the bearer inside the reader box to fix into pole top, and adjust the height from reader center position to road according to vehicle type, in general the height is 1.8-2.2m.For installation 2,the L type mounting pole diameter should be 60-80mm, the cross beam diameter should be 50-60mmmm, and we suggest to use the stainless steel material(thickness should be 1.2mm-2mm).Use the bearer inside the reader box to fix into pole top and adjust the height from reader center position to road according to vehicle type, in general the height is 3.5-4m.4.3 Reader Installation Angle AdjustmentSee below picture 3 and 4 for reference adjust angle for reader.3 44.4 Installation Example-Parking LotPrincipal to install the reader:(1)Reader and barrier gate linear distance no go across 1m.(2)Between reader and tag, no items covered.(3)Distance between reader and control panel or PC distance we suggest as closer as possible and install shielded communication cable.(4)For detailed installation please according to real situation.Reader close to barrier, and make sure the sensing area can cover the ground sensor,See below picture.4.5 Tag position in vehicleIn general, the parking devices are installed in the left side of the lane, then the tag should be stick in the position of below picture showed.For small vehicle, we suggest A, B and C position, for big truck or big bus, we suggest D, E and F position. The principal of the tagposition is not cover the eyesight of driver.Suggest Position: If reader install in left side, then suggest A and E position. If reader install in the top, then suggest B and F, if reader install in right side, then we suggest C and D position.Tag installation when vehicle windshield with metal UV film:(1) Original UV film: According to European standard, Position B willreserve2E-2656 is 1-6m, 2E-2657 is 1-15m. And the vehicle speed should less than 15km/h.120m*70mm space(no contain metal) for RFID stickers. When install the tag, just install in the B position.(2)Self-stick UV film: Cut a space 120*70mmm special for RFID stickers.We suggest B,D or E position.(3) Use anti-metal tags, install in the car license plate.(4) Manual hold the RFID card to read.Correct Hold Card Wrong Hold Card5. Application:(1) Transport Control:(2) Vehicle Management(3) Parking Management(4) Access Control Management(5) Product Anti-fake Detection(6) Anti-thief Management6. Quick Start for SoftwareThe UHF reader with software to read and write the tags and cards, as well to adjust the basic parameter of the reader.6.1 Connect reader With PCThere are two mode of reader, one is TCP/IP and RS232 communication, the other is RS232 communication only.6.1.1 RS232 CommunicationThere are two client in software package, on is RFIDDemo3203.exe other is Netconfig.exe. For RS232 communication device, just open RFIDDemo3203.exe client.See below.Please ensure serial port of reader connect with PC, and select correct port in PC, then select baud rate, then click connect.6.1.2 TCP/IP CommunicationFor TCP/IP communication, you need open two client, Netconfig.exe and RFIDDemo3203.exe. Netconfig.exe to get the IP address and port of connected UHF reader. You can open it by click broadcast.1.See blow procedure 1, click broadcast to get the IP of uhf reader.2.And input the detected IP, but make sure that your pc and the address at the same LAN, be simple, you can ping the IP, see procedure 2.3.Then click “Connect” to connect the reader.4. If communication OK, see below6.2 Basic Settings:6.2.1 Wiegand Parameter Input Zone:It is mainly related to Wiegand output interface. Only communication mode is Wiegand26 or Wiegand34 available.Byte Offset:The byte of card number to be offset, there is a initial position when read card number. To change the initial position, for example Wiegand 26,output 3 byte, but 18600-6B card number (E0 01 02 03 04 05 06 07) i s 8 byte, the parameter is this 3 byte, when the value is 0, it is (E0 01 02), when the value is 1, It is (01 02 03)... More details, please refer to Wiegand protocol.Output Period: It is frequency of Wiegand port. More details, please refer to Wiegand protocol. Pulse Width: It is the time length of Wiegand signal.Pulse Period: It is interval time that from first low pulse to next low pulse sending. For details, please refer to Wiegand protocol.Note: In general, user only need set byte offset, other setup is default.6.2.2 Basic Parameters Input Zone:Work Mode:It includes 3 items:Active , Passive and Response modeActive: Reader keep reading card, and transmit each of card number by communication port (apply to active upload data).Passive: Reader keep reading card, and each of card number store in reader, but do not upload card number,the max. storage is 100pcs (apply to passive upload). 3. Response: Reader do not read card, reader response according difference commands. For example, PC send a recognize card command, reader will read a time and reply card number to PC (apply to short distance read and write card, test).Output Mode:It includes RS232, TCPIP, CANBUS, Wiegand26 and Wiegand34.RS232: Serial port communication mode, It connects with PC serial port directly and point to point mode.TCPIP:Network communication mode, it communicate with PC by LAN or WAN. CANBUS:BUS communication mode, it is point to multiple mode.Wiegand26:It is standard reader communication mode, one-way communication mode. Wiegand34 :It is standard reader communication mode, one-way communication mode.Read Interval:The speed of reading card.Note: read card interval must more than 10ms. If read card interval is too short, it will short lift of the reader.Power Size: The max. value is 30.Trigger:1. Close: Close trigger mode to read card.2. Low Trigger: When trigger lead (gray wire) connect with low power (OV), reader power on, when trigger lead (gray wire) connect with high power (12V), reader power off.Note: When Trigger mode is Close, trigger lead must connect with high power or low power and can not be dangling.Same ID Interval:When reader read a same card continuously, reader only upload one data. The read interval can be set at here, and if the read time is over set interval, reader will upload continuously. Buzzer: When reader read card, the buzzer beep or not.Buzzer:It includes disable and enable, disable mean turn off the buzzer, when read card, no beep, enable mean turn on the buzzer, when read card, with beep.Card Type:1. ISO18000-6B:Only read ISO18000-6B protocol tag.;2. EPC (GEN 2 )Single – Tag :Only read EPC(GEN 2)protocol tag, read one tag one time. Reader hard to or not read multiple tags when put them in the effective range.3. EPC (GEN 2 )Multi – Tag:Only reader EPC (GEN 2 )protocol tag, multi-tag can be read.4. EPC (GEN2 )Multi –Data:Only read EPC (GEN 2 )protocol tag,except read default EPC area 12 bytes data, other area data can be read. (Select this type and set to read the length of other area data in senior parameter, the max. Is 12 bytes)5. ISO18000-6B + EPC (GEN 2 ): ISO18000-6B and EPC (GEN 2 )protocol tag can be read.Freq Parameters Input Zone It refer to 18000-6b and EPC card, normally hopping need be selected.6.2.3 Freq Parameters Input Zone:It refer to 18000-6b and EPC card, normally hopping need be selected.6.2.4 Senior Parameter Input Zone:It is used for multiple channel reader (split reader), integrative reader default is antenna 6.2.5 Active Encrypt FunctionFor this version software, the encrypt function is hided, to enable the encrypt function, please see below procedure.1) Press”F8” 5 Time s2) Choose then “Enabled”, and set password, then set Parameters [Set Para].3) Now, put the tag on the reader, the reader is not beep;4) Presses “Encrypt Tag”, until the reader beep, then enc rypt succeed;Note: when the encrypt tag, you can move the tag to accelerate the process of encryption;6.2.6 . Get ParameterClick “Get Para” button, parameter of the reader can be acquired. Acquire parameter succeed if display green in status bar; Acquire parameter failure if display red in status bar.(Do not read card when acquire parameter)6.2.7 Set ParameterWhen change parameter in demonstration area, click “Set Para” button, updated data will be set in currently reader. Setup succeed if display green in status bar; Setup failure if display red in status bar.6.2.8 Default AllClick “ Default All” button, basic parameter and senior parameter will recover to default. (Need to click “parameter setup”, updated parameter will be set in reader).6.2.9 Net InitializeNull6.3.10 WIFI InitializeNull6.3 Senior SettingsSenior settings is mainly setup the TCP/IP reader parameter, such as IP address, Syris config and time config etc.TCP/IP config: User can modify the TCP/IP uhf readerSYRIS Config: It is to set Syris SN and Syris ID.Time Config: It is to set reader time.Soft Config: In general can ignore the function, soft reset, is reset the device by software.6.4 EPC Read and WriteThe module is used to read and write the EPC card number. when you click the module, will show below picture interface.Identify:When click, the card in the reader Hex number will display here.Read: When click read, the related address and length Hex number will display, for example the card number is 01-02-03-04-05-06-08-09-10-11-12,Address 2, length 2: 01-02, length is 3, then 01-02-03Address 3., length 2:03-04Address 4, length 2: 05-06...Write: When click write, will write the related Hex to related address.For example the card number is 01-02-03-04-05-06-07-08-09-12-10Address is 2 and length is 2, and write 02-01 to the address, then the card no. Become 02-01-03-04-05-06-07-08-09-10-11-12If write to address 3 and the length is 2.Then card number become 01-02-02-01-05-06-08-09-10-11-126.5 ISO1800-6B Read and WriteFor this module is to read and write 1800-6B card number.Identify:When click, the card in the reader Hex number will display here.Read: When click read, the related address and length Hex number will display, for example the card number is E0-04-00-00-3F-0B-22-07-00-00-00-00,Address 0, length 2: E0-04, length is 3, then E0-04-00Address 1., length 2:04-00Address 2, length 2: 00-00...Write: When click write, will write the related Hex to related address.For example the card number is E0-04-00-00-3F-0B-22-07-00-00-00-00,Address is 0 and length is 2, and write 01-02 to the address, then the card no. Become 01-02-00-00-3F-0B-22-07-00-00-00-00,If write to address 1 and the length is 2.Then card number become E0-01-02-00-3F-0B-22-07-00-00-00-007. Notice1. When reader is working, the operator should away from reader 30cm to satisfy the FCC RF requirement.2. Reader must away from the high he strong magnetic field3. When reader use external power supply, must connect the common ground with the controller or the device you connect with.4. For the reader, we suggest 9-15v power supply, you’d better use the power supply we supply or appropriate voltage power supply.5. Mount the reader on a round pole or flat surface when you do installation.6. Connect all the wire as wiring diagram suggest.。
标签可重用的仓储管理系统UHFRFID阅读器设计
用 , 以降 低 仓 储 管 理 系 统 中的 RF D 标 签 使 用成 本 。 可 I UHF RFI 阅读 器 是 标 签 可 重 用 仓 储 管 理 系 统 的关 D
R I 是 新 一 代 的射 频 识 别 技 术 , 传 统 识 别 形 式 采 用 的 F D) 与
t g e n e e nd t e c s om ia in ofU H F a s b i g r us d a h u t z to RFI r a r r du e t os he s t m nd p om o e t pp ia in o H F D e de e c he c toft yse a r t he a lc to fU RFI D
Z n in h n , u Z u j n e gL a c e g F h oa
( n or a i inc n c olgy I tt e, H un n Agrc lu a nie st I f m ton Sce e a d Te hn o ns iut a iu t r lU v r iy,Cha gs a 41 2 n h 01 8,Chia) n
t m ie o z d. U H F RFI r a rha dwa e c D e de r r onss s o it f Core - 3 or p o e s r LPC1 8, U H F t x M c e r c s o 76 RFI m o l D du e,SPI Fl s a d TFT ah n LCD
进 了 UHF RF D 技 术 的 广 泛 应 用 。 I
关 键 词 :嵌 入 式 系 统 ; 频 识 别 ; 储 管 理 ; 读 器 ; 签 ; 重 用 射 仓 阅 标 可
UHF RFID实验手册
1、UHF RFID读卡实验1.1、EPC Gen2读、写标签号实验实验目的理解UHF RFID的工作原理,并掌握其与HF RFID工作原理的异同点。
掌握EPC标签号的存储区域以及结构特点。
实验设备UHF 读卡器一个、UHF 天线一个、USB连接线一条、9V电源适配器一个、电脑一台、UHF实验上位机软件实验知识预备与原理1.UHF-RFID工作原理在UHF RFID阅读器及电子标签之间的通讯是采用电磁反向散射耦合方式完成。
电磁反向散射耦合方式类似雷达的工作原理,如下图所示。
阅读器就像手电筒,标签就像一个镜子,标签反射最大,就是逻辑“1”。
标签反射最小,就是逻辑“0”。
阅读器开始工作之后,通过天线先向空间发送860~960 MHz频率范围的载波,激活标签,然后开始发送带调制的命令信息到标签(TAG),可以采用ASK调制,脉冲间隔编码(Pulse Interval Encoding),通讯速率26.7到128 KBIT/S。
在高频范围内的标签收到阅读器发出的高频载波信号,标签天线接收到特定的电磁波,天线就会产生感应电流,在经过整流电路时,激活电路上的微型开关,给标签供电。
标签上的电子线路,将根据阅读器发出信息,通过ASK或者PSK 耦合方式进行调制,FM0等编码方式,向阅读器反馈相关信息。
UHF标签电路采用ASK和PSK的调制方式,将编码信息发送给阅读器,实现了阅读器和标签之间的双向通讯。
相互认证通过之后,阅读器会向电子标签发出读、写、锁定、kill、盘存等操作指令。
2.EPC编码产品电子代码(EPC编码)是国际条码组织推出的新一代产品编码体系,原来的产品条码仅是对产品分类的编码,EPC码是对每个单品都赋予一个全球唯一编码,EPC编码96位(二进制)方式的编码体系,可以为2.68亿公司赋码,每个公司可以由1600万产品分类,每类产品有680亿的独立产品编码,形象的说可以为地球上的每一粒大米赋一个唯一的编码。
UHF电子标签读写器RFID用户手册v2.0
UHF电子标签读写器RM915M用户手册v2.0目录一、通讯接口规格 (4)二、协议描述 (4)三、数据的格式 (5)1. 上位机命令数据块 (5)2. 读写器响应数据块 (5)四、操作命令总汇 (6)1. EPC C1 G2(ISO18000-6C)命令 (6)2. 18000-6B命令 (7)3. 读写器自定义命令 (7)五、命令执行结果状态值 (8)六、电子标签返回错误代码 (12)七、标签存储区及需要注意的问题 (12)八、操作命令详细描述 (13)8.1 命令概述 (13)8.2 EPC C1G2命令 (13)8.2.1 询查标签 (13)8.2.2 读数据 (14)8.2.3 写数据 (15)8.2.4 写EPC号 (16)8.2.5 销毁标签 (17)8.2.6 设定存储区读写保护状态 (18)8.2.7 块擦除 (20)8.2.8 读保护设置(根据EPC号设定) (21)8.2.9 读保护设定(不需要EPC号) (21)8.2.10 解锁读保护 (22)8.2.11 测试标签是否被设置读保护 (22)8.2.12 EAS报警设置 (23)8.2.13 EAS报警检测 (24)8.2.14 user区块锁 (24)8.2.15 询查单张标签 (25)8.2.16 块写命令 (26)8.3 18000-6B命令 (27)8.3.1寻查命令(单张) (27)8.3.2 按条件寻查标签 (27)8.3.3 读数据 (28)8.3.4 写数据 (29)8.3.5 锁定检测 (29)8.3.6 锁定 (30)8.4读写器自定义命令 (30)8.4.1 读取读写器信息 (30)8.4.2 设置读写器工作频率 (31)8.4.3 设置读写器地址 (32)8.4.4 设置读写器询查时间 (32)8.4.5 设置串口波特率 (32)8.4.6 调整功率 (33)8.4.7 声光控制命令 (33)8.4.8韦根参数设置命令 (34)8.4.9工作模式设置命令 (34)8.4.10读取工作模式参数 (36)8.4.11 EAS检测精度设置 (37)8.4.12 Syris响应偏置时间设置 (37)8.4.13 触发延时设置 (38)一、通讯接口规格读写器通过RS232或者RS485接口与上位机串行通讯,按上位机的命令要求完成相应操作。
UHF-RFID基础知识问答
UHF-RFID基础知识符合EPC Class1 Gen2(简称G2)协议V109版的电子标签(Tag,简称标签)和Reader(读写器),应该具有下述的特性。
Q1:标签存储器分为哪几个区?A:Tag memory(标签内存)分为Reserved(保留),EPC(电子产品代码),TID(标签识别号)和User(用户)四个独立的存储区块(Bank)。
Reserved区:存储Kill Password(灭活口令)和Access Password(访问口令)。
EPC区:存储EPC号码等。
TID区:存储标签识别号码,每个TID号码应该是唯一的。
User区:存储用户定义的数据。
此外还有各区块的Lock(锁定)状态位等用到的也是存储性质的单元。
Q2:标签有哪几种状态?A:收到连续波(CW)照射即上电(Power-up)以后,标签可处于Ready(准备),Arbitrate(裁断),Reply(回令),Acknowledged(应答),Open(公开),Secured(保护),Killed(灭活)七种状态之一。
1、Ready状态是未被灭活的标签上电以后,开始所处的状态,准备响应命令。
2、在Arbitrate状态,主要为等待响应Query等命令。
3、响应Query后,进入Reply状态,进一步将响应ACK命令就可以发回EPC 号码。
4、发回EPC号码后,进入Acknowledged状态,进一步可以响应Req_RN命令。
5、Access Password不为0才可以进入Open状态,在此进行读、写操作。
6、已知Access Password才可能进入Secured状态,进行读、写、锁定等操作。
7、进入到Killed状态的标签将保持状态不变,永远不会产生调制信号以激活射频场,从而永久失效。
被灭活的标签在所有环境中均应保持Killed状态,上电即进入灭活状态。
灭活操作不可逆转。
要使标签进入某一状态一般需要适当次序的一组合法命令,反过来各命令也只能当标签在适当的状态下才能有效,标签响应命令后也会转到其他状态。
RFID标签和读卡器介绍说明
RFID标签和读卡器介绍说明作为在供应链上跟踪产品的一种手段,RFID在访问控制和越来越多的传统应用(如售票)中迅速得到采用。
RFID系统一般由单芯片RFID标签和一个RFID读卡器组成,标签上集成了射频前端、存储器和控制器,RFID读卡器可对标签上的数据进行解码,然后进行适当的操作(比如打开门锁)。
RFID标签类似于条形码,但它们是以电子方式存储产品信息。
最新的RFID标签除了具有安全特性外,还具有随着产品在供应链上传输,自动更新相关信息的能力。
RFID标签可用于跟踪从家庭宠物、家畜到高端电子产品的所有物品。
它们可以自动征收过桥费和道路费,可以限制接近敏感区域。
最近,RFID标签开始进入安全性更高的领域,如制药、无接触支付、货运安全以及电子护照等。
这些信息应用和安全密集型应用必须采用新的标准来定义RFID标签和读卡器。
这种标准包括:标签上存储器的可用性、加密算法的鲁棒性、标签上不同信息区的数目和安全性。
存储密度和配置能力RFID标签必须能够支持更精确的跟踪机制。
以制药业为例,据美国食品与药品管理局(FDA)统计,假药的数量在过去5年中增加了10倍。
在最坏的情况下,假药甚至可能危及病人的生命。
制造商在药片上的标记可被逼真地复制,达到以假乱真的效果。
包装上的条形码虽然可以提供一些额外的信息和安全措施,但也很容易被扫描和复印。
估计全球有10%的处方药是假药,每年因此而无辜丧失的生命数以万计。
为阻止假药泛滥,美国佛罗里达州规定,从2006年7月1日起,处方药必须具有纸面的药历档案,包含药品的名称、剂量表、浓度、制造商、批号数量、相应的发票/付运/转账凭单号、交易日期、每一位所有者的名称和地址、每一位用药者的名称和地址、鉴定证书、每一位批发商的联络信息、确认该药历档案信息准确完整性的签名或宣誓,以及制造商的跟踪号码等信息。
美国加利福尼亚州要求从2009年1月1日起,药品必须具备电子药历档案,其它各州也将纷纷效仿。
UHF RFID系统方案-2013 智慧图书馆方案
基于UHF-RFID技术的LibEZ TM智能图书馆系统方案1. LibEZ TM RFID智能图书馆系统特点 (3)1.1 系统总体布局 (3)1.2 智能标签和借书证的储存方案 (5)1.3 主要设备同图书馆家具设施环境的协调方案 (5)2.系统概览 (6)2.1 LibEZ TM智能图书馆系统组件 (6)2.1.1 智能流通标签 (6)2.1.2 读者自助借阅系统 (7)2.1.3 智能监测系统 (7)2.1.4 馆员工作站 (8)2.1.5 读者自助还书分拣系统 (9)2.1.6 便携式馆藏点检器 (9)2.1.7 应用服务器 (10)2.1.8 智能流通标签编程站 (11)2.1.9 远程服务 (11)2.1.10 无线功能扩展 (11)3 系统如何工作 (12)1.LibEZ TM UHF RFID智能图书馆系统特点博美讯LibEZ TM超高频无线射频识别智能图书馆系统,(UHF RFID Library System)用来识别、追踪、和保护图书馆的所有资料。
博美讯集成全球优异的RFID产品和系统在帮助图书馆保护馆藏的同时提升图书馆的运作和改善读者服务质量。
本系统和图书馆自动化流通系统直接连接对每本书提供安全保护并极大提高图书馆资料处理的效率。
本系统的核心元素是精心挑选的UHF RFID标签,相对于传统磁条更薄更短,和磁条一样粘贴在两页书之间,并且不受原先贴在书中的磁条干扰,保证足够的识别效率和足够长的使用寿命。
UHF RFID射频识别是一种非接触式的自动识别技术,它通过超高频射频信号自动识别目标对象并获取相关数据,识别工作无须人工干预,可工作于各种恶劣环境。
RFID技术可识别高速运动物体并可同时识别多个标签,操作快捷方便。
1.1 系统总体布局博美讯LibEZ TM的UHF RFID系统根据现代图书馆的流程趋势,采用独特的方案布局,是和未来快速通过式借阅/归还流程最为吻合的方案。
RFID智能图书馆系统和图书馆自动化系统是并行工作,并非是取代自动化系统。
RFID设备操作使用说明
RFID设备操作使用说明RFID(Radio Frequency IDentification)即射频识别技术,又称电子标签、无线射频识别,是一种通信技术,可通过无线电讯号识别特定目标并读写相关数据,无需识别系统与特定目标之前建立机械或光学接触。
一套完整的RFID系统,是由阅读器(即手持终端或桌面式终端)与电子标签及应用软件系统三个部分所组成,其工作原理是阅读器发射一特定频率的无线电波能量给电子标签用以驱动电子标签电路将内部的数据送出,此时阅读器便依序接收解读数据,送给应用程序做相应的处理。
本次购买的两套设备均为深圳市溪源尔科技有限公司的产品,分别为E9900U超高频手持机及RFID桌面式超高频发卡器。
但所购买的手持终端机功能进行了裁剪,只具有UHF RFID识别及WIFI功能。
下面讲解下两套设备的使用:E9900U超高频手持终端机注:关于手持机快捷键的一些说明:左右两侧的黄色按键是显示桌面的功能,键盘上黄色按键是二维扫描的快捷键,F2键是打开二维应用程序的快捷键1.开关机长按手持机键盘右下角的红色小按键3秒开机,再次长按关机。
2.触摸笔校准在桌面上找到“我的设备”,打开“我的设备”->“控制面板”->“笔针”,出现以下触摸笔校准界面选择“校准”点击“再校准”。
用触摸笔依次点击十字光标进行校准。
最后再点击一下屏幕或者按一下”OK”键保存设置。
3.查看内存和Nandflash 空间大小“我的设备”->控制面板->系统。
可以看到剩余内存为191132KB 约187M。
其余内存为系统运行所需内存。
查看NandFlash 空间大小。
找到nandflash 右键->属性或者“我的设备”->控制面板->存储管理器如下图:4.电池检测在桌面上找到“我的设备”,打开“我的设备”->“控制面板”->“电源”,弹出电源属性对话框,显示电池电量如图:充电用AC电源线,连上设备后,手持机屏幕上的右上角,充电电源指示灯,红灯亮,桌面任务栏上显示充电图标;如下:5.手持机与计算机通信5.1 安装USB同步驱动系统在启动后,在USB数据线连接PC的状态下,本设备将作为从设备,被PC监测到,如果没有安装USB同步驱动,PC端自动发现新硬件,并要求安装USB同步驱动,要使本设备与PC通信,需安装:1、USB同步驱动2、Microsoft ActiveSync4.5 同步软件下面介绍详细安装步骤:选择在这些位置上搜索最近驱动程序浏览:找到我们发给你的驱动选择USB同步驱动选择下一步5.2 安装Microsoft ActiveSync4.5 同步软件6.UHF 模块的使用1. 基本操作1.1读915M 卡号启动手持机,找到并打开我的设备\NandFlash\Powercontrol.exe 如图1所示:打开RFID_915(UHF模块)的电源,如图2所示图1 图2关闭Powercontrol.exe应用程序,打开UHF02_Demo.exe程序,点击打开串口,提示打开串口成功即可,如图3图3选择UHF02_Demo应用程序的“盘存”选项卡点击单步识别按钮,进行读卡操作,将卡置于合适的位置上,就可以读到卡号(标签ID)了。
RFID读卡器
感谢观看
RFID读卡器
电子标签数据的自动识别设备
01 产品介绍
03 原理
目录
02 组成 04 结语
RFID是射频识别的英文缩写。通俗地说,RFID读卡器是一种能阅读电子标签数据的自动识别设备。根据阅读 标签频率的不同分为低频、高频、超高频读卡器。RFID读卡器需配备RFID天线一起使用才能读取标签信息。
组成
UART通讯转换模块 功能完善的以太网 <-> UART通讯转换模块,使用AX11015的网络转换模块,无外壳,TCP/UDP, server/client,配套工具程序。 UART通讯转换器 功能完善的以太网 <-> UART通讯转换器。12V供电,可卡装于电工导轨之上。使用AX11015网络转换模块的 转换器,12V供电,有外壳,外壳有导轨安装卡口。 RS485转换器 USB <-> RS485转换器。 软质铁氧体 当非接触IC卡读写器的天线处于金属物质比较多的环境时,在天线背面安装铁氧体材料制成的板,可以减低 金属物质对读卡性能和稳定性的影响。软质铁氧体方便裁剪,但性能不如硬质铁氧体好,首推厚度1.7mm,尺寸 可以任意裁剪,频率范围宽。
无线射频识别技术(RFID)的快速崛起,既是技术发展的结果,也是应用需求的体现。从上个世纪90年代开 始,围绕RFID的各种应用就如雨后春笋般大量涌现出来。今天,我们就简单地介绍一下RFID技术和其中最重要的 产品-划分成6大部分。而RFID主要频带:低频、高频、超高频和微波。
低频(30~300kHz)
常见的工作频率有低频125kHz与134.2kHz,低频RFID主要用在短距离、低成本的应用中,如门禁控制、校 园卡、煤气表、水表等。
高频 (3~30MHz)
RFID自助服务系统设备-技术参数
8、★登录:支持多种方式登录,支持图书馆的读者证、市民卡、二代身份证卡,手机,可以通过多合一读卡器识别登录,其他读者可通过微信公众号的扫描自助机二维码登录,或输入证号和密码登录。外设故障必须记录到图书馆自动化管理系统流通日志中,可在管理系统的日志查询中查询,同时通过图书馆短信平台通知管理员。还书后同时可按要求变更图书的馆藏地点和文献类型。
18、★本项目投标人需要在投标时提供力博图书管理系统软件生产厂家对本项目的授权原件或说明原件,(提供证明材料原件加盖投标人鲜章)。
3
自助借还设备
一、产品整体外观需求:
1、外观要求:占地面积≤0.6M²,视觉高度在1.1m-1.4m之间。
2、设计要求:立式设计。
3、工作平台;斜面平台,防止读者疏忽导致身份证件等遗留台面;台面有明确引导操作标识,操作面板上有防掉落台阶,防止读者刷卡时卡掉落。阅读扫描平台为钢化玻璃,外观美观大方,耐脏,耐划伤。
4、安全要求:结构稳固,防脱落设计,外表设计圆滑,无锋利棱角,内部布线系统严密,以免因线路破损短路发生火灾等消防危险。
5、整体集成需求:采用立式结构,底部集成工控机、阅读器、电源控制模块,读者操作台高度550mm~600mm,触摸屏离地高度1250~1300mm.阅读器高度700~750mm,整机集成工业控制计算机、触摸屏模块、RFID阅读器天线模块、电源控制模块、凭条打印模块等。
迪卡侬使用RFID读取机器人
2019年2月第1期总第76期《中国自动识别技术》全球各地的登机手续柜台。
FEIG Electronic 的混合式EC⁃CO +RFID /条码扫描器为航空公司提供了一种利用现有行李标签打印机的方法,将无源UHF RFID 标签ID 号与条码相关联,实现行李自动跟踪并遵守IATA 的753号决议。
带RFID 功能的疏水阀性能测试设备研发Armstrong International 日前推出SAGE UMT ,这是一种无线手持式蒸汽疏水阀测试解决方案,可对蒸汽疏水阀性能进行准确、可靠的测试。
SAGE UMT 使用RFID 技术快速定位和识别蒸汽疏水阀。
SAGE UMT 可与Armstrong 的SAGE 智能热效用系统管理平台集成,通过蓝牙无线同步到SAGE Mo⁃bile 应用程序,提供实时诊断,取消蒸汽疏水阀数据手动录入的需求。
柔性RFID 标签研发日前,亚洲的几家包装公司开始测试一种低成本NFC 标签定制型解决方案,可让RFID 标签的拾取及附着更加容易。
标签制造服务提供商S&S 已经引进并测试了倒装芯片机,以适应PragmatIC 的FlexIC 芯片,这将加快生产速度和降低芯片成本。
FlexIC 轻薄且可折叠,同时可以附着在纸上或塑料嵌体上。
欧洲柔性电子创新项目面世UWINLOC 计划开发一种用于位置跟踪的小型及环保版本技术。
该公司将与Eurecat 以及大学研究人员合作开发新的细分市场的产品。
同时,UWINLOC 还将开发一款更小版本的超宽带(UWB)和超高频(UHF)RFID 柔性标签,带有印刷标签。
标签的小尺寸和柔性特性使之可以附着在小物品上,例如工业、医疗、物流或零售环境中带有弯曲表面的工具或物体。
华为发布5G 多模终端芯片近日,Balong 5000多模终端芯片发布。
这是全球首个支持V2X 的5G 多模芯片,可用于车联网、自动驾驶。
Balong 系列芯片体积小、集成度高,能够同时实现2G 、3G 、4G 和5G 多种网络模式,具备能耗更低、延迟更短等特性,增加了5G 商用价值体验,NSA (非独立组网)和SA (独立组网)的双兼容架构,可以灵活应对5G 产业发展不同阶段下用户和运营商对硬件设备的通信能力要求。
UHF_RFID标签通用读写系统研究
物联网技术 2023年 / 第9期360 引 言目前UHF RFID 标签以其多目标、长距离、长寿命、抗污染等特点被广泛应用于仓储物流、身份识别、供应链管理、自动生产、图书管理、全寿命信息追踪等各个领域[1-3]。
UHF RFID 标签的用途广泛、用户需求多样,但这也导致标签读写设备需要进行二次开发,从而造成开发时间延长和成本上升。
为了解决这一问题,本文设计了标签通用读写系统。
1 UHF RFID 系统的工作原理一个UHF RFID 系统由读写设备、天线和标签组成,读写设备通过数据接口与外界交换信息,通过编码/解码模块实现信息的格式转换,通过射频模块和天线与标签通信[4-6],如图1所示。
图1 UHF RFID 系统工作原理2 UHF RFID 标签存储信息UHF RFID 标签内存分为Reserved (保留)、EPC (电子产品代码)、TID (标签识别号)和User (用户)共4个独立的存储区块。
Reserved 区存储灭活口令和访问口令,EPC 区存储EPC 号码等,TID 区存储标签识别号码,User 区存储用户定义的数据。
产品信息主要存储在EPC 区和User 区中。
UHF RFID 标签的EPC 区通常用于存储产品编码,按EPC Global 标准体系可存储EPC 码[7-8];按我国物联网编码体系可存储Ecode 码[9],也可存储由用户自定义的产品编码。
User 区存储信息则主要由用户自定义。
3 UHF RFID 标签读写系统的问题UHF RFID 系统中产品信息的读写操作以二进制格式实现,需要通过编码/解码模块转换为人工或机器能够识别的数据格式,如字符、数字(十进制)等。
常规做法是在既有读写器基础上进行二次开发,实现编码/解码功能。
这种技术路线有以下缺点:(1)需要根据用户要求开发不同的编码/解码软件,使用门槛高、开发周期长、开发成本高;(2)不同的产品需要相应的专用编码/解码软件,不适合大规模多类别的产品标识管理和应用;(3)当面对大规模多种类应用时,自动化设备无法自动选择应采取的编码/解码软件,需要人工辅助甄别,不利于自动化建设。
UHF RFID读写器控制模块的SOPC设计
UHF RFID读写器控制模块的SOPC设计
李鸿
【期刊名称】《山西电子技术》
【年(卷),期】2014(000)002
【摘要】为简化UHF RFID读写器系统设计,提高读写器控制模块控制协调能力、抗干扰强度、降低功耗,提出了一种基于NiosⅡ处理器的UHF RFID读写器控制模块的SOPC设计方案.采用SOPC设计理念,在一个可配置的FPGA芯片上嵌入NiosⅡ处理器,搭载操作系统,实现收发信号的数字处理控制及与上位机系统的通信控制.根据设计需要充分配置了处理器性能,给出了模块硬件结构,模块与上位机、数字基带处理模块间的通信接口及模块软件设计流程图.仿真结果表明,该控制模块能实现所需控制信号的产生和传输,完成协议解析、时序控制、状态转换及防碰撞等功能.与传统嵌入式控制模块相比,该控制模块实时控制能力强、稳定性高,功耗更低,外围电路更简单,系统更小型化.
【总页数】4页(P20-22,29)
【作者】李鸿
【作者单位】湘潭职业技术学院,湖南湘潭411102
【正文语种】中文
【中图分类】TN830
【相关文献】
1.UHF RFID读写器系统的设计与实现 [J], 郭振军;孙应飞;
2.UHF RFID读写器系统的设计与实现 [J], 郭振军;孙应飞
3.一种UHF RFID读写器载波抵消电路设计 [J], 杨勇;王军华;黄金
4.一种通用型UHF RFID读写器天线的设计 [J], 杨文贵;李兴广;张良;陈恩志
5.一种适用于食品供应链的UHF RFID读写器设计 [J], 高海韬;李丹宁
因版权原因,仅展示原文概要,查看原文内容请购买。
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
ZK-RFID105 UHF RFID Reader User'sManual V1.2Content1、COMMUNICATION INTERFACE SPECIFICATION (4)2、PROTOCOL DESCRIPTION (4)3、DATA BLOCK FORMAT (5)3.1 COMMAND DATA BLOCK (5)3.2 RESPONSE DATA BLOCK (5)4、OPERATION COMMAND (CMD) SUMMARY (6)4.1 EPC C1 G2(ISO18000-6C)COMMAND (6)4.2 18000-6B COMMAND (8)4.3 READER DEFINED COMMAND (8)5、LIST OF COMMAND EXECUTION RESULT STATUS (9)6、TAG ERROR CODES (13)7、TAG MEMORY AND ISSUES REQUIRING ATTENTION (13)8、DETAILED DESCRIPTION OF OPERATION COMMAND (14)8.1 COMMAND OVERVIEV (14)8.2 EPC C1G2 COMMAND (14)8.2.1 Inventory (14)8.2.2 Read Data (15)8.2.3 Write Data (16)8.2.4 Write EPC (17)8.2.5 Kill Tag (18)8.2.6 Lock (19)8.2.7 BlockErase (20)8.2.8 ReadProtect (With EPC) (21)8.2.9 ReadProtect (Without EPC) (22)8.2.10 Reset ReadProtect (23)8.2.11 Check ReadProtect (23)8.2.12 EAS Alarm (24)8.2.13 Check EAS Alarm (24)8.2.14 User Block Lock (25)8.2.15 Inventory (Single) (26)8.2.16 Block Write (26)8.3 18000-6B COMMAND (28)8.3.1Inventory Signal 6B (28)8.3.2 Inventory Multiple 6B (28)8.3.3 Read Data 6B (29)8.3.4 Write Data 6B (29)8.3.5 Check Lock 6B (30)8.3.6 Lock 6B (30)8.4 READ-DEFINED COMMAND (31)8.4.1 Get Reader Information (31)8.4.2 Set Region (32)8.4.3 Set Address (32)8.4.4 Set Scan Time (33)8.4.5 Set Band Rate (33)8.4.6 Set Power (34)8.4.7 Acousto-optic Control (34)1、COMMUNICATION INTERFACE SPECIFICATIONThe reader communicates with host (MCU,MPU,Controller) using serial communication interface RS232 or RS485 and complete corresponding operation according to the host command. The communication parameter is 57600bps 1 start bit, 8 data bits, 1 stop bit without parity check bit. In the process of serial communication, the least significant bit of one byte is transmitted first and the least significant byte of command data sequence is transmitted first.2、PROTOCOL DESCRIPTIONA communication procedure is sponsored by the host sending commands and data to the reader and the reader returns the result status and data to host after command execution.Reader receives a command executes a command, only the reader complete the implementation of a command, to receive the next command. During the implementation of the command in the reader, if sending commands to the reader, the command will be lost.command data block sending, synchronization will lost if the host receives any data from the reader and the host should stop command sending and restart the communication after 15ms.The reader completes command execution in inventory ScanTime (not including host sending data time) except inventory command after receiving host command and returns the results. During the period, it doesn’t3、DATA BLOCK FORMAT3.1 COMMAND DATA BLOCK3.2 RESPONSE DATA BLOCKThe default value of the reader address is 0x00. The host may change it by using reader-defined command“W rite Adr”.Cyclic Redundancy Check (CRC) computation includes all data from Len. A reference CRC computation program is presented as follow:C-Example:#define PRESET_V ALUE 0xFFFF#define POL YNOMIAL 0x8408unsigned int uiCrc16Cal(unsigned char const * pucY, unsigned char ucX){unsigned char ucI,ucJ;unsigned short int uiCrcV alue = PRESET_V ALUE;for(ucI = 0; ucI < ucX; ucI++){uiCrcValue = uiCrcValue ^ *(pucY + ucI);for(ucJ = 0; ucJ < 8; ucJ++){if(uiCrcValue & 0x0001){uiCrcValue = (uiCrcValue >> 1) ^ POL YNOMIAL;}else{uiCrcValue = (uiCrcValue >> 1);}}}return uiCrcValue;}4、OPERATION COMMAND (CMD) SUMMARY4.1 EPC C1 G2(ISO18000-6C)COMMAND4.2 18000-6B COMMAND4.3 READER DEFINED COMMAND5、LIST OF COMMAND EXECUTION RESULT STATUS6、TAG ERROR CODES7、TAG MEMORY AND ISSUES REQUIRING ATTENTIONA.EPC C1G2 TAG(G2 TAG)Tag memory shall be logically separated into four distinct banks, each of which may comprise zero or more memory words. The four storage areas:Reserved memory (password memory) shall contain the kill and and/or access passwords, if passwords are implemented on the Tag. The kill password shall be stored at memory addresses 00h to 1Fh; the access password shall be stored at memory addresses 20h to 3Fh.EPC memory shall contain a Stored CRC at memory addresses 00h to 0Fh, a Stored PC at addresses 10h to 1Fh, a code (such as an EPC, and hereafter referred to as an EPC) that identifies the object to which the Tag is or will be attached beginning at address 20h, and if the Tag implements Extended Protocol Control (XPC) then either one or two XPC word(s) beginning at address 210h.TID memory shall contain an 8-bit ISO/IEC 15963 allocation class identifier at memory locations 00h to 07h. TID memory shall contain sufficient identifying information above 07h for an Interrogator to uniquely identify the custom commands and/or optional features that a Tag supports.User memory is optional. This area of different manufacturers is different. There is no user area in G2 tag of Inpinj Company. There are 28 words in Philips Company.Can write protect in four distinct banks. It means this memory is never writeable or not writeable under the non-safe state; only password area can set unreadable.B.18000-6B TAG6B tag has a memory space, the minimum 8 bytes (byte 0- 7) is UID of the tag, and can't be rewritten. Following byte all can be rewritten, can be locked too, but once locking, can't rewrite and unblock again.8、DETAILED DESCRIPTION OF OPERATION COMMAND8.1 COMMAND OVERVIEVThe reader supports three kinds of command, one kind is the ISO/IEC 18000-6 protocol command, another kind is reader-defined command, and also one kind is the transparent command.If the host input of the command is an unrecognized command, such as the command does not support, orTwo kinds of command reader cannot respond:1. The reader address error.2. The command is incomplete, namely the command Len is longer than the actual command length.8.2 EPC C1G2 COMMAND8.2.1 InventoryThe command function is used to inventory tags in the effective field and get their EPC values. The reader executes an Inventory command and gets tag’s EPC before any other operation.The user may accord need to establish this command the first biggest running time (Inventory scan time), before the command enquires. The reader completes command execution in inventory ScanTime (not including host sending data time) except inventory command after receiving host command and returns the results.The default value is 0x0A (corresponding to 10*100ms=1s). The value range is 0x03~0xFF (corresponding to 3*100ms~255*100ms). In various environments, the actual inventory scan time may be 0~75ms longer than the InventoryScanTime defined.If the inventory scan time establishes excessively short, possibly will inventory no tag appear in inventory scan time.Parameter Connect:Num: The number of tag detected.EPC ID: Inventoried tag’s EPC data, EPC-1 is the first tag EPC Len + EPC data, etc. The most significant word (EPC C1 G2 data in word units) of EPC is transmitted first and the most significant byte of word is transmitted first. EPC Len is one byte.8.2.2 Read DataThe command is used to read part or all of a Tag’s Password, EPC, TID, or U ser memory. To the word as a unit, start to read data from the designated address.Parameter Connect:ENum: EPC length,in word units. The length of EPC is less than 15 words, can be 0 or 15. Otherwise, it returns the parameters error message.EPC: Be operated tag’s EPC number. EPC length according to the decision of the EPC number, EPC numbers in word units, and must be an integer number of lengths. High word first, the high byte of each word first. Requirement given here is a complete EPC number.Mem:One byte. It specifies whether the Read accesses Password, EPC, TID, or User memory. 0x00: Password memory; 0x01: EPC memory; 0x02; TID memory; 0x03: User memory. Other values reserved. Other value when error occurred.WordPtr: One byte. It specifies the starting word address for the memory read. For example, WordPtr = 00h specifies the first 16-bit memory word, WordPtr = 01h specifies the second 16-bit memory word, etc.Num: One byte. It specifies the number of 16-bit words to be read. The value is less then 120, can not be 0.Otherwise, it returns the parameters error message.Pwd: Four bytes, they are Access Password. The most significant word of Access Password is first, the most significant byte of word is first. The first bit of 32-bit access password is left, and the last bit of 32-bit access password is right. Only done the memory set to lock and the Tag’s Access Password is not zero, it needs right Pwd. In other cases, Pwd can be zero.MaskAdr: One byte, it specifies the starting byte address for the memory mask. For example, MaskAdr = 0x00 specifies the first EPC bytes, MaskAdr = 0x01 specifies the second EPC bytes, etc.MaskLen: One byte, it is the mask length. That a Tag compares against the memory location that begins at MaskAdr and ends MaskLen bytes later. MaskAdr + MaskLen must be less the length of ECP number. Otherwise, it returns the parameters error message.Notes: That a tag compares against complete EPC number when the MaskAdr and MaskLen vacant.Word1, Word2….: In word units, one word is two bytes. High byte is first. Word1 is the word which reads from the start address, Word2 is the word which reads from the second address, etc.8.2.3 Write DataThe command is used to write several words in a Tag’s Reserved, EPC, TID, or User memory.Parameter Connect:WNum: One byte. It specifies the number of 16-bit words to be written. The value can not be 0. Otherwise, it returns the parameters error message.ENum: EPC length,in word units. The length of EPC is less than 15 words, can be 0 or 15. Otherwise, it returns the parameters error message.EPC: Be oper ated tag’s EPC number. EPC length according to the decision of the EPC number, EPC numbers in word units, and must be an integer number of lengths. High word first, the high byte of each word first.Requirement given here is a complete EPC number.Mem:One byte. It specifies whether the Write accesses Password, EPC, TID, or User memory. 0x00: Password memory; 0x01: EPC memory; 0x02; TID memory; 0x03: User memory. Other values reserved. Other value when error occurred.WordPtr: One byte. It specifies the starting word address for the memory write. For example, WordPtr = 00h specifies the first 16-bit memory word, WordPtr = 01h specifies the second 16-bit memory word, etc.Wdt: Be written words. The most significant byte of each word is first. Wdt specifies the array of the word to be written. For example, WordPtr equal 0x02, then the first word in Data write in the address 0x02 of designated Mem, the second word write in 0x03, etc.Pwd: Four bytes, they are Access Password. The most significant word of Access Password is first, the most significant byte of word is first. The first bit of 32-bit access password is left, and the last bit of 32-bit access password is right. Only done the memory set to lock and the Access Password is not zero, it needs Pwd. In other cases, Pwd can be zero.MaskAdr: One byte, it specifies the starting byte address for the memory mask. For example, MaskAdr = 0x00 specifies the first EPC bytes, MaskAdr = 0x01 specifies the second EPC bytes, etc.MaskLen: One byte, it is the mask length. That a Tag compares against the memory location that begins at MaskAdr and ends MaskLen bytes later. MaskAdr + MaskLen must be less the length of ECP number. Otherwise, it returns the parameters error message.Notes: That a tag compares against complete EPC number when the MaskAdr and MaskLen vacant.8.2.4 Write EPCThe command is used to write EPC number in a Tag’s EPC memory. Random write one tag in the effective field.ENum: One byte, it specifies the array of the word to be written EPC length,in word units. The length of EPC is not more than 15 words, can’t be 0. Otherwise, it returns the parameters error message.Pwd: Four bytes, they are Access Password. The most significant word of Access Password is first, the most significant byte of word is first. The first bit of 32-bit access password is left, and the last bit of 32-bit access password is right. Only done the memory set to lock and the Access Password is not zero, it needs Pwd. In other cases, Pwd can be zero.WEPC: Be written EPC value. WEPC is not more than 15 words, can’t be 0. Otherwise, it returns the parameters error message.8.2.5 Kill TagThe command is used to kill tag. After the tag killed, it never process command.ENum: EPC length,in word units. The length of EPC is less than 15 words, can be 0 or 15. Otherwise, it returns the parameters error message.EPC: B e operated tag’s EPC number. EPC length according to the decision of the EPC number, EPC numbers in word units, and must be an integer number of lengths. High word first, the high byte of each word first. Requirement given here is a complete EPC number.Killpwd: Four bytes, they are Kill Password. The most significant word of Kill Password is first, the most significant byte of word is first. The first bit of 32-bit Kill Password is left, and the last bit of 32-bit Kill Password is right. Tag’s whose Kill Password is zero do not execute a kill operation; if such a Tag receives a Kill command it ignores the command and backscatters an error codeMaskAdr: One byte, it specifies the starting byte address for the memory mask. For example, MaskAdr = 0x00 specifies the first EPC bytes, MaskAdr = 0x01 specifies the second EPC bytes, etc.MaskLen: One byte, it is the mask length. That a Tag compares against the memory location that begins at MaskAdr and ends MaskLen bytes later. MaskAdr + MaskLen must be less the length of ECP number. Otherwise, it returns the parameters error message.Notes: That a tag compares against complete EPC number when the MaskAdr and MaskLen vacant.8.2.6 LockThe Lock command Lock reversibly or permanently locks a password or an entire EPC, TID, or User memory bank in a readable/writeable or unreadable/unwriteable state.Once tag’s password memory establishes to forever may be readable and writable or unreadable and unwriteable, then later cannot change its read-write protection again. Tag’s EPC memory, TID memory or user memory, if establishes to forever may be writeable or unwriteable, then later cannot change its read-write protection again. If sends the command to want forcefully to change the above several states, then the tag will return to the error code.When the tag’s memory established in a readable/writeable state, the command must give the Access Password, so tag’s Access Password is not zero.ENum: EPC length,in word units. The length of EPC is less than 15 words, can be 0 or 15. Otherwise, it returns the parameters error message.EPC: B e operated tag’s EPC number. EPC length according to the decision of the EPC number, EPC numbers in word units, and must be an integer number of lengths. High word first, the high byte of each word first. Requirement given here is a complete EPC number.Select: One byte, defined as follows:0x00: Control Kill Password protection setting.0x01: Control Access password protection setting.0x02: Control EPC memory protection setting.0x03: Control TID memory protection setting.0x04: Control User memory protection setting.Other value when error occurred.SetProtect:When Select is 0x00 or 0x01, SetProtect means as follows:0x00: readable and writeable from any state.0x01: permanently readable and writeable.0x02: readable and writeable from the secured state.0x03: never readable and writeableWhen Select is 0x02, 0x03 or 0x04, SetProtect means as follows:0x00: writeable from any state.0x01: permanently writeable.0x02: writeable from the secured state.0x03: never writeable.Other value when error occurred.Pwd: Four bytes, they are Access Password. The most significant word of Access Password is first, the most significant byte of word is first. The first bit of 32-bit access password is left, and the last bit of 32-bit access password is right. Pwd must be right Access Password.MaskAdr: One byte, it specifies the starting byte address for the memory mask. For example, MaskAdr = 0x00 specifies the first EPC bytes, MaskAdr = 0x01 specifies the second EPC bytes, etc.MaskLen: One byte, it is the mask length. That a Tag compares against the memory location that begins at MaskAdr and ends MaskLen bytes later. MaskAdr + MaskLen must be less the length of ECP number. Otherwise, it returns the parameters error message.Notes: That a tag compares against complete EPC number when the MaskAdr and MaskLen vacant.8.2.7 BlockEraseThe command is used to erase multiple words in a Tag’s Password, EPC, TID, or User memory.ENum: EPC length,in word units. The length of EPC is less than 15 words, can be 0 or 15. Otherwise, it returns the parameters error message.EPC: B e operated tag’s EPC number. EPC length according to the decision of the EPC number, EPC numbers in word units, and must be an integer number of lengths. High word first, the high byte of each word first. Requirement given here is a complete EPC number.Mem:One byte. It specifies whether the Erase accesses Password, EPC, TID, or User memory. 0x00: Password memory; 0x01: EPC memory; 0x02; TID memory; 0x03: User memory. Other values reserved. Other value when error occurred.WordPtr: One byte. It specifies the starting word address for the memory block erase. For example, WordPtr = 00h specifies the first 16-bit memory word, WordPtr= 01h specifies the second 16-bit memory word, etc. WordPtr must be bigger than 0x00 when it erases EPC memory.Num:One byte. It specifies the number of 16-bit words to be erased. If Num= 0x00, it returns the parameters error message.Pwd: Four bytes, they are Access Password. The most significant word of Access Password is first, the most significant byte of word is first. The first bit of 32-bit access password is left, and the last bit of 32-bit access password is right. Only done the memory set to lock and the Access Password is not zero, it needs Pwd. In other cases, Pwd can be zero.MaskAdr: One byte, it specifies the starting byte address for the memory mask. For example, MaskAdr = 0x00 specifies the first EPC bytes, MaskAdr = 0x01 specifies the second EPC bytes, etc.MaskLen: One byte, it is the mask length. That a Tag compares against the memory location that begins at MaskAdr and ends MaskLen bytes later. MaskAdr + MaskLen must be less the length of ECP number. Otherwise, it returns the parameters error message.Notes: That a tag compares against complete EPC number when the MaskAdr and MaskLen vacant.8.2.8 ReadProtect (With EPC)The command is used to set designated tag read protection. After the tag protected, it never process command. Even if inventory tag, reader can not get the EPC number. The read protection can be removed by executing Reset ReadProtect. Only NXP's UCODE EPC G2X tags valid.Parameter Connect:ENum: EPC length,in word units. The length of EPC is less than 15 words, can be 0 or 15. Otherwise, it returns the parameters error message.EPC: B e operated tag’s EPC number. EPC length according to the decision of the EPC number, EPC numbers in word units, and must be an integer number of lengths. High word first, the high byte of each word first. Requirement given here is a complete EPC number.Pwd: Four bytes, they are Access Password. The most significant word of Access Password is first, the most significant byte of word is first. The first bit of 32-bit access password is left, and the last bit of 32-bit access password is right. T ags’ Access Password can not be zero.MaskAdr: One byte, it specifies the starting byte address for the memory mask. For example, MaskAdr = 0x00 specifies the first EPC bytes, MaskAdr = 0x01 specifies the second EPC bytes, etc.MaskLen: One byte, it is the mask length. That a Tag compares against the memory location that begins at MaskAdr and ends MaskLen bytes later. MaskAdr + MaskLen must be less the length of ECP number. Otherwise, it returns the parameters error message.Notes: That a tag compares against complete EPC number when the MaskAdr and MaskLen vacant.8.2.9 ReadProtect (Without EPC)The command is used to random set random one tag read protection in the effective field. The tag must be having the same access password. Only NXP's UCODE EPC G2X tags valid.Parameter Connect:Pwd: Four bytes, they are Access Password. The most significant word of Access Password is first, the most significant byte of word is first. The first bit of 32-bit access password is left, and the last bit of 32-bit access password is right. T ags’ Access Password can not be zero.8.2.10 Reset ReadProtectThe command is used to remove only one tag read protection in the effective field. The tag must be having the same access password. Only NXP's UCODE EPC G2X tags valid.Pwd: Four bytes, they are Access Password. The most significant word of Access Password is first, the most significant byte of word is first. The first bit of 32-bit access password is left, and the last bit of 32-bit access password is right. Pwd must be right tag’s Access Password.8.2.11 Check ReadProtectThe command is used to check only one tag in the effective field, whether the tag is protected. It can not check the tag whether the tag support protection setting. Only NXP's UCODE EPC G2X tags valid.8.2.12 EAS AlarmThe function is used to set or reset the EAS status bit of designated tag. Only NXP's UCODE EPC G2X tags valid.Parameter Connect:ENum: EPC length,in word units. The length of EPC is less than 15 words, can be 0 or 15. Otherwise, it returns the parameters error message.EPC: B e operated tag’s EPC number. EPC length according to the decision of the EPC number, EPC numbers in word units, and must be an integer number of lengths. High word first, the high byte of each word first. Requirement given here is a complete EPC number.Pwd: Four bytes, they are Access Password. The most significant word of Access Password is first, the most significant byte of word is first. The first bit of 32-bit access password is left, and the last bit of 32-bit access password is right. T ags’ Access Password can not be zero.EAS: One byte. Bit0=0 means reset the EAS state, Bit0=1 means set the EAS state.Bit1~Bit7 default 0.MaskAdr: One byte, it specifies the starting byte address for the memory mask. For example, MaskAdr = 0x00 specifies the first EPC bytes, MaskAdr = 0x01 specifies the second EPC bytes, etc.MaskLen: One byte, it is the mask length. That a Tag compares against the memory location that begins at MaskAdr and ends MaskLen bytes later. MaskAdr + MaskLen must be less the length of ECP number. Otherwise, it returns the parameters error message.Notes: That a tag compares against complete EPC number when the MaskAdr and MaskLen vacant.8.2.13 Check EAS AlarmThe function is used to check EAS status bit of any tag in the effective field. Only NXP's UCODE EPC G2X tags valid.It returns "no tag actionable" message when No EAS alarm8.2.14 User Block LockThe command is used to permanently lock the designated data in designated tag’s user memory. Block Lock command supports an additional locking mechanism, which allows the locking of individual 32 bit blocks (rows) in the 224 bit User Memory. Once locked these locks cannot be unlocked. Only NXP's UCODE EPC G2X tags valid.ENum: EPC length,in word units. The length of EPC is less than 15 words, can be 0 or 15. Otherwise, it returns the parameters error message.EPC: B e operated tag’s EPC number. EPC length according to the decision of the EPC number, EPC numbers in word units, and must be an integer number of lengths. High word first, the high byte of each word first. Requirement given here is a complete EPC number.Pwd: Four bytes, they are Access Password. The most significant word of Access Password is first, the most significant byte of word is first. The first bit of 32-bit access password is left, and the last bit of 32-bit access password is right. Pwd must be right tag’s Access Password.WrdPointer: Each EEPROM row can be addressed by either of the two related WordPointers:MaskAdr: One byte, it specifies the starting byte address for the memory mask. For example, MaskAdr = 0x00 specifies the first EPC bytes, MaskAdr = 0x01 specifies the second EPC bytes, etc.MaskLen: One byte, it is the mask length. That a Tag compares against the memory location that begins at MaskAdr and ends MaskLen bytes later. MaskAdr + MaskLen must be less the length of ECP number. Otherwise, it returns the parameters error message.Notes: That a tag compares against complete EPC number when the MaskAdr and MaskLen vacant.8.2.15 Inventory (Single)EPC ID: Inventoried tag’s EPC data, EPC-1 is the first tag EPC Len + EPC data. The most significant word (EPC C1 G2 data in word units) of EPC is transmitted first and the most significant byte of word is transmitted first. EPC Len is one byte.8.2.16 Block WriteThe command is used to write multiple words in a Tag’s Reserved, EPC, TID, or User memory.Parameter Connect:WNum: One byte. It specifies the number of 16-bit words to be written. The value can not be 0. Otherwise, it returns the parameters error message.ENum: EPC length,in word units. The length of EPC is less than 15 words, can be 0 or 15. Otherwise, it returns the parameters error message.EPC: B e operated tag’s EPC number. EPC length according to the decision of the EPC number, EPC numbers in word units, and must be an integer number of lengths. High word first, the high byte of each word first. Requirement given here is a complete EPC number.Mem:One byte. It specifies whether the Write accesses Password, EPC, TID, or User memory. 0x00: Password memory; 0x01: EPC memory; 0x02; TID memory; 0x03: User memory. Other values reserved. Other value when error occurred.WordPtr: One byte. It specifies the starting word address for the memory write. For example, WordPtr = 00h specifies the first 16-bit memory word, WordPtr = 01h specifies the second 16-bit memory word, etc.Wdt: Be written words. The most significant byte of each word is first. Wdt specifies the array of the word to be written. For example, WordPtr equal 0x02, then the first word in Data write in the address 0x02 of designated Mem, the second word write in 0x03, etc.Pwd: Four bytes, they are Access Password. The most significant word of Access Password is first, the most significant byte of word is first. The first bit of 32-bit access password is left, and the last bit of 32-bit access password is right. Only done the memory set to lock and the Access Password is not zero, it needs Pwd. In other cases, Pwd can be zero.MaskAdr: One byte, it specifies the starting byte address for the memory mask. For example, MaskAdr = 0x00 specifies the first EPC bytes, MaskAdr = 0x01 specifies the second EPC bytes, etc.MaskLen: One byte, it is the mask length. That a Tag compares against the memory location that begins at MaskAdr and ends MaskLen bytes later. MaskAdr + MaskLen must be less the length of ECP number. Otherwise, it returns the parameters error message.Notes: That a tag compares against complete EPC number when the MaskAdr and MaskLen vacant.。