Uhftagcommands 1
Uhftagcommands 1
Uhftagcommands 1
VERSION 112612
Examples of UHF Tag Usage Page |2
TABLE OF CONTENTS
1 Overview ....................................................................................................... 7
3.3 Reading Multiple Blocks from an EPC Class1 Gen1 Tag ..........................................16
Skyetek Inc
1525 Market St. Ste 200
Denver, CO 80202
Main 720.328.3425 Fax:720.228.2400 www.skyetek.com
Examples of UHF Tag Usage Page |3
4.5 Reading a Single Block from an EPC Class1 Gen2 Tag ............................................27
Skyetek Inc
1525 Market St. Ste 200
Denver, CO 80202
Main 720.328.3425 Fax:720.228.2400 www.skyetek.com
Examples of UHF Tag Usage Page |4
Skyetek Inc
1525 Market St. Ste 200
Denver, CO 80202
Main 720.328.3425 Fax:720.228.2400 www.skyetek.com
Examples of UHF Tag Usage Page |5
LIST OF FIGURES
Figure 1 Class1 Gen2 Tag Memory Banks and Blocks .....................................................22
Skyetek Inc
1525 Market St. Ste 200
Denver, CO 80202
Main 720.328.3425 Fax:720.228.2400 www.skyetek.com
Examples of UHF Tag Usage Page |6
LIST OF TABLES
Table 1 Operations Supported for Each Tag Type ....................................................... 7
Table 5 Layout for Data Payload for Load Image Command ..........................................40
Skyetek Inc
1525 Market St. Ste 200
Denver, CO 80202
Main 720.328.3425 Fax:720.228.2400 www.skyetek.com
Examples of UHF Tag Usage Page |7
1 Overview
The Examples of UHF Tag Usage Application Note provides examples of how to use the various
tag functions supported by the SkyeModule M7, M9 and M10, including selecting, reading, writing,
locking, killing, using tag passwords, and authenticating.
Except for tag select operations, which apply to all tags, different tags support different tag
functions. For a complete list of supported tags and which functions apply to each tags, see the
module’s Tag Support List, available from the SkyeWare Help tab, as a link from the SkyeWare
Documentation folder in the Windows Start menu, or as a file on your SkyeWare installation CD.
Also note that the M7 only supports Class1 Gen2 tag types.
Some tag operations apply to all tags (see “Selecting Tags” on page 9). Other tag operations
depend on the type of tag:
Class1 Gen1 Select only (no inventory,) read, “Commands for EPC Class1 Gen1 Tags” on page 14
write, lock and kill
Select, read, write, lock, and kill; “Commands for EPC Class1 Gen2 (ISO 18000-6C) Tags” on page
Class1 Gen2
tag password operations. 22
ISO18000-6B Select, Read, Write and Lock “Commands for ISO18000-6B Tags” on page 44
All commands in the following examples are sent to the reader using the SkyeTek Protocol v3 in
binary mode. You can send commands to the reader using SkyeWare 4 (Test tab), the SkyeWare C
API, the SkyeWare .NET API, or any custom software that you create that uses SkyeTek Protocol v3
to interact with the reader.
NOTE – If you set the tag type to Auto-Detect, the reader automatically includes the tag type in its
response when a tag is successfully detected.
To view compliance information and recommended reader settings, see “Recommended Radio Settings for
Regional Compliance” in the SkyeModule Datasheet. For additional information on system
Skyetek Inc
1525 Market St. Ste 200
Denver, CO 80202
Main 720.328.3425 Fax:720.228.2400 www.skyetek.com
Examples of UHF Tag Usage Page |8
parameters and command formats, see “Customizing System Parameters,” also in the SkyeModule
Datasheet.
Using SkyeTek Protocol v3 commands, you can control the following tag functions with the
SkyeModule:
Select – Queries tags in the field of the reader for their unique IDs or EPCs.
Read – Reads data from the nonvolatile memory of a tag.
Write – Writes data to the nonvolatile memory in a block or group of blocks on a tag
specified.
Lock – Locks a nonvolatile memory block specified of the tag specified.
o Get Lock Status – Gets the lock status of the block specified.
Kill – Permanently disables a tag.
Tag Password – Writes a password to a tag or presents the tag with a password for
operations that require password authentication.
Skyetek Inc
1525 Market St. Ste 200
Denver, CO 80202
Main 720.328.3425 Fax:720.228.2400 www.skyetek.com
Examples of UHF Tag Usage Page |9
2 Selecting Tags
The Select Tag command returns the Unique ID or the EPC code of a tag in the field of the reader. The
UID or EPC can later be used to address a specific tag when executing tag-specific commands. The
reader has several modes for selecting tags:
Autodetect Mode: Reader automatically selects any recognized tag placed in the detection field.
Loop Mode: Reader detects tags in a continuous loop until loop mode is turned off or until another
command stops the loop. (This function works only when the Reader ID system parameter is set to FFFFFFFF.
See “Selecting Any Supported Tag Continuously” on page 11 for more information.)
Inventory Mode: Reader selects all tags in the detection field until a tag is placed in the field or until
the inventory times out. This lets you read a “stack” of tags instead of reading and selecting each type
of tag individually.
NOTE – The format of the Select Tag response is the same for Loop and Inventory Modes.
When you set the tag type to Auto-Detect, the reader determines the tag type of any tags in
the field and includes this information in the response if any tags are successfully detected.
There are several levels of Auto-Detect functionality:
Auto-Detect – The reader scans for any tag type that it supports and reports back the UID (or EPC)
and tag type of the first tag it detects.
Air Interface Auto-Detect – The reader scans for the first tag with the specified air interface
and reports back its UID (or EPC) and the tag type it detected. Tag types of different air
interfaces are reported.
Manufacturer and Air Interface Specific Auto-Detect – The reader scans for the first tag with the
specified manufacturer and air interface and reports back its UID (or EPC) and tag type. Tag
types of different manufacturers with the same air interface are not reported.
Tag Type Specific Select – The reader scans for the first tag of the specified tag type and report
its UID (or EPC). The tag type is not reported, nor are any other tag types in the field.
Skyetek Inc
1525 Market St. Ste 200
Denver, CO 80202
Main 720.328.3425 Fax:720.228.2400 www.skyetek.com
Examples of UHF Tag Usage P a g e | 10
Request
To select any type of supported tag, send the following parameter information to the reader:
Command = Select Tag
Mandatory Flags = None (CRC Flag in Binary Mode)
Tag Type = Auto-Detect (causes reader to include the tag type in its response)
Response
STX Msg. Length Response Code Tag Type TID Length TID / EPC CRC
02 0010 0101 8300 0008 E0040000B32A8D01 E1FF
Skyetek Inc
1525 Market St. Ste 200
Denver, CO 80202
Main 720.328.3425 Fax:720.228.2400 www.skyetek.com
Examples of UHF Tag Usage P a g e | 11
Sending the following command sets up continuous monitoring of whatever supported tag type is detected.
The first time you send this command, it places the reader into loop mode, which sends a response
whenever a tag enters the detection field or when there is a change in the field. Sending any command to
the reader turns off loop mode.
NOTE – Loop mode is designed for demonstrations and read range testing. Therefore, loop mode only
works when the reader ID is set to the factory default of FFFFFFFF. In typical working applications,
readers with unique reader IDs are grouped together on one port or host; they do not need to remain in
loop mode, because the host system usually switches between different readers quickly and frequently.
NOTE – When using Loop mode, place only one tag at a time in the reader’s detection field. Refer to
the SkyeTek Developer Kit User Guide for more information about using Loop mode to test read range
and about anti-collision capabilities for multiple tags.
Request
To set up continuous monitoring, send the following parameter information to the reader:
Response
Skyetek Inc
1525 Market St. Ste 200
Denver, CO 80202
Main 720.328.3425 Fax:720.228.2400 www.skyetek.com
Examples of UHF Tag Usage P a g e | 12
Skyetek Inc
1525 Market St. Ste 200
Denver, CO 80202
Main 720.328.3425 Fax:720.228.2400 www.skyetek.com
Examples of UHF Tag Usage P a g e | 13
Inventory mode permits reading of all tags in the detection field. This lets you read a “stack” of
tags instead of having to read each type of tag individually. This mode gives you an easy way to
test or demonstrate the reader’s anti-collision capabilities.
Request
Response
The reader returns information for all tag types detected. At the end of the tag Inventory, the
reader will send the Inventory Complete Response code (810F).
Response TID
STX Msg. Length Tag Type TID / EPC CRC
Code Length
02 0014 0101 8100 000C 000000000000610222103654 084F
02 0014 0101 8200 000C 112233440707080809090A0A DF0B
02 0014 0101 8200 000C A01A050821A142106A010802 C354
02 0010 0101 8300 0008 E0040000989C6001 ABC3
02 0004 810F 0E82
Skyetek Inc
1525 Market St. Ste 200
Denver, CO 80202
Main 720.328.3425 Fax:720.228.2400 www.skyetek.com
Examples of UHF Tag Usage P a g e | 14
This section discusses tag commands that specifically apply to EPC Class 1 Gen1 tags. The
commands for loop and inventory mode discussed in the section (“Selecting Tags” on page 9) also
apply to these tags.
Request
To detect only EPC Class1 Gen1 tags, send the following parameter information to the reader. (If
you set the tag type to EPC Class1 Gen1 Auto-Detect, the reader includes the tag type in the
response when a tag is successfully detected.)
Response
STX Msg. Length Response Code Tag Type TID Length TID / EPC CRC
02 0014 0101 8100 000C 00000000000061022210 084F
3654
Skyetek Inc
1525 Market St. Ste 200
Denver, CO 80202
Main 720.328.3425 Fax:720.228.2400 www.skyetek.com
Examples of UHF Tag Usage P a g e | 15
Request
Response
Each block is 1 byte long, so the Data Length value should be the same as the Number of Blocks
being read.
Skyetek Inc
1525 Market St. Ste 200
Denver, CO 80202
Main 720.328.3425 Fax:720.228.2400 www.skyetek.com
Examples of UHF Tag Usage P a g e | 16
Request
Response
Each block is one byte long, so the Data Length value should be the same as the Number of Blocks
being read.
Skyetek Inc
1525 Market St. Ste 200
Denver, CO 80202
Main 720.328.3425 Fax:720.228.2400 www.skyetek.com
Examples of UHF Tag Usage P a g e | 17
Request
Response
After writing the EPC, you can verify it by sending the Select Tag command with the tag type set
to the EPC Class1 Gen1.
NOTE – This technique works for both 64-bit and 96-bit memory tags. However, writing a 64-bit EPC to
a 96-bit memory tag prevents the Kill and Lock functionality from working with that tag. Lock and Kill
work normally when you write a 64-bit EPC to a 64-bit memory tag.
Skyetek Inc
1525 Market St. Ste 200
Denver, CO 80202
Main 720.328.3425 Fax:720.228.2400 www.skyetek.com
Examples of UHF Tag Usage P a g e | 18
Response
After writing the EPC, you can verify it by sending the Select Tag command with the tag type set
to EPC Class1 Gen1.
Skyetek Inc
1525 Market St. Ste 200
Denver, CO 80202
Main 720.328.3425 Fax:720.228.2400 www.skyetek.com
Examples of UHF Tag Usage P a g e | 19
Request
Response
CAUTION – Once you lock a tag, you can only select the tag (using the Select Tag command) or kill the
tag; you can no longer erase, read data from, or write data to the tag. You must write all data –
including the kill password – to the tag before you lock it.
Skyetek Inc
1525 Market St. Ste 200
Denver, CO 80202
Main 720.328.3425 Fax:720.228.2400 www.skyetek.com
Examples of UHF Tag Usage P a g e | 20
Request
NOTE – If you write a 64-bit EPC to a 96-bit Class1 Gen1 tag, then you must write the kill password to
the kill password address of a 96-bit tag.
Response
Skyetek Inc
1525 Market St. Ste 200
Denver, CO 80202
Main 720.328.3425 Fax:720.228.2400 www.skyetek.com
Examples of UHF Tag Usage P a g e | 21
Request
Send the Kill command with the 8-bit Kill password in the data field. If the Kill password does not
match the password stored on the tag, the tag cannot be killed.
STX Msg. Len Flags Cmd. Tag Type Data Len. Data CRC
Response
CAUTION – After you kill the tag, you cannot carry out any more operations on that tag.
Skyetek Inc
1525 Market St. Ste 200
Denver, CO 80202
Main 720.328.3425 Fax:720.228.2400 www.skyetek.com
Examples of UHF Tag Usage P a g e | 22
This section discusses Tag commands that specifically apply to EPC Class1 Gen 2 tags. The
commands for loop and inventory mode discussed in the section, “Selecting Tags” on page 9, also
apply to these tags.
Class1 Gen2 tags support four memory banks. Memory within each memory bank is divided into 2-
byte blocks.
The SkyeTek Protocol splits the 16-bit address field for reading and writing tag memory. The first nibble (4
MSBs) specifies the memory bank number and the remaining 12-bits specify the block address in the
memory bank. For example, to address block #2 of the EPC memory bank, the address field in
SkyeTek Protocol is 0x1002. The first nibble, “0x1,” specifies the EPC memory bank (i.e., bank
01), and the next 12-bits specify the block number (0x002).
Skyetek Inc
1525 Market St. Ste 200
Denver, CO 80202
Main 720.328.3425 Fax:720.228.2400 www.skyetek.com
Examples of UHF Tag Usage P a g e | 23
Request
To detect only EPC Class1 Gen2 tags, send the following command and parameter information to
the reader. (If you set the tag type to the EPC Class1 Gen2 Auto-Detect, the reader includes the
tag type in the response when a tag is successfully detected.)
Response
Skyetek Inc
1525 Market St. Ste 200
Denver, CO 80202
Main 720.328.3425 Fax:720.228.2400 www.skyetek.com
Examples of UHF Tag Usage P a g e | 24
Fast Inventory improves the speed and reliability for inventory of Class 1 Gen 2 tags. This feature is
unique to Class 1 Gen 2 tags.
Request
To invoke Fast Inventory, send a Select Tag command to three Class 1 Gen 2 tags with the
Inventory_F flag set:
Response
To optimize Fast Inventory, set the Command Retry system parameter (0x11) to approximately double the
number of anticipated tags in the field.
To decrease the inventory time, decrease the Command Retry time until you find the
shortest time at which the reader can still identify all tags in the field.
Increase the Command Retry time for situations in which tags are difficult to read.
See the “Command Retry” in the SkyeModule Datasheet for more information on the system
parameter.
Skyetek Inc
1525 Market St. Ste 200
Denver, CO 80202
Main 720.328.3425 Fax:720.228.2400 www.skyetek.com
Examples of UHF Tag Usage P a g e | 25
MemBank specifies whether Mask applies to EPC, TID, or User Memory. MemBank may not
specify reserved memory and any greater than 3 is reset to 0x00.
Address references a memory bit address. (Not restricted to byte or word boundary).
Length is 8 bits, allowing masks from 0 to 255 bits in length.
Mask specified in byte boundary (max. 32 bytes) contains the bit string that the Tag compares
against the memory location that begins at Address and ends Length bits later. If Address and
Length reference a memory location that does not exist on the tag then the tag shall consider
the select to be non-matching. If Length is zero then all tags shall be considered matching,
unless Address references a memory location that does not exist.
Mask in specified in MSb Zero-Padded byte boundary. For example, a bit string of binary '11 1010
1011' with length of 10 should be specified as '0000 0011 1010 1011' (0x 03 AB), with the 6 MSb of
Most Significant Byte padded with zeros.
Request
Response:
Skyetek Inc
1525 Market St. Ste 200
Denver, CO 80202
Main 720.328.3425 Fax:720.228.2400 www.skyetek.com
Examples of UHF Tag Usage P a g e | 26
Request
STX Msg. Len Flags Cmd. Tag Type TID Length TID CRC
01 0020 60 000100010001000100010030
Response
Request
STX Msg. Len Flags Cmd. Tag Type TID Length TID CRC
Skyetek Inc
1525 Market St. Ste 200
Denver, CO 80202
Main 720.328.3425 Fax:720.228.2400 www.skyetek.com
Examples of UHF Tag Usage P a g e | 27
02 0000 20 E2001050
Response
This method of using the TID field as a mask can be used with Read and Write commands as
well.
Request
To detect a single block from the EPC memory bank, send the following command and parameter
information to the reader. The EPC is stored starting at block address 0x02 in the EPC memory
bank (bank 1). (If you set the tag type to EPC Class1 Gen2 Auto-Detect, the reader includes the tag
type in the response when a tag is successfully detected.)
STX Msg. Len Flags Cmd. Tag Type Address Num. Blocks CRC
Response
Each block is 2-bytes long, so the data length value should be twice the number of blocks being
read.
Skyetek Inc
1525 Market St. Ste 200
Denver, CO 80202
Main 720.328.3425 Fax:720.228.2400 www.skyetek.com
Examples of UHF Tag Usage P a g e | 28
Request
To read multiple blocks from the EPC memory bank, send the following command and parameter
information to the reader. The EPC is stored starting at block address 0x02 in the EPC memory
bank (bank 1). (If you set the tag type to EPC Class1 Gen2 Auto-Detect, the reader includes the tag
type in the response when a tag is successfully detected.)
STX Msg. Len Flags Cmd. Tag Type Address Num. Blocks CRC
Response
Each block is 2-bytes long, so the data length value is twice the number of blocks being read.
Skyetek Inc
1525 Market St. Ste 200
Denver, CO 80202
Main 720.328.3425 Fax:720.228.2400 www.skyetek.com
Examples of UHF Tag Usage P a g e | 29
Request
To write a single block of data to the EPC memory bank (bank 1), send the following command and
parameter information to the reader. Each block is 2 bytes long, so the data length field must be
twice the length of the number of blocks field.
Msg. Data
STX Flags Cmd Tag Type Address Num. Blocks Data CRC
Len Length
Response
To write three blocks of data to the EPC memory bank (bank 1), send the following command and
parameter information to the reader. Each block is 2 bytes long, so the data length field must be
twice the length of the number of blocks field.
Response
Skyetek Inc
1525 Market St. Ste 200
Denver, CO 80202
Main 720.328.3425 Fax:720.228.2400 www.skyetek.com
Examples of UHF Tag Usage P a g e | 30
To write a 12-byte (96-bit) EPC value to the EPC memory bank (bank 1), send the following
command and parameter information to the reader.
Request
10111213141516
02 001A 0820 0103 8200 1002 0006 000C 753D
1718191A1B
Response
After writing the EPC to the EPC bank, make sure that the PC value (i.e., block address 0x01) is written
with the correct value. The PC value determines the length of the EPC and a value of 0x3000
creates an EPC of 12-bytes (96-bits). To verify the EPC, the send the Select Tag command with the
tag type set to EPC Class1 Gen2.
Skyetek Inc
1525 Market St. Ste 200
Denver, CO 80202
Main 720.328.3425 Fax:720.228.2400 www.skyetek.com
Examples of UHF Tag Usage P a g e | 31
NOTE– The user memory bank (bank 3) is not supported on all of the EPC Class1 Gen2 tags.
Request
To write to the user memory bank, send the following command and parameter information to the
reader:
Request
Response
Skyetek Inc
1525 Market St. Ste 200
Denver, CO 80202
Main 720.328.3425 Fax:720.228.2400 www.skyetek.com
Examples of UHF Tag Usage P a g e | 32
NOTE– This example applies only to tags that support access passwords.
Certain tags allow “Secure State” operations, such as setting password protection for a memory
bank or supporting lock functionality. You can use the Write Tag command to assign a password to
a tag. The 32-bit tag password is stored in Blocks 2 and 3 of the reserved memory bank (bank 0).
Block 2 holds the higher 16-bits of the password, and Block 3 holds the lower 16-bits.
After you write the tag password, the reader requires that you use the password for Secure State
transactions with that tag. That is, you must send the password to the reader using the Send Tag
Password command before you execute another secure command for that tag. (See “Sending a Tag
Password” on page 33.)
To change a password, use the Write Tag command to write a new password to the tag or use a
Select Tag command with Tag Type of EPC Class1 Gen2, which resets the password to zero.
IMPORTANT– When writing the 32-bit password to the tag, the password’s Least Significant Block (LSB)
and Most Significant Block (MSB) are reversed in the data portion of the Write Tag Password command.
For example, if the password is 12345678, it would be represented in the data field of the Write Tag
Password command as 56781234. In the example below, the data field (56781234) represents a
password value of 12345678. (Note that after you have set the password, you do not need to reverse
the LSB and MSB when using the password with other commands.)
NOTE– You may want to use lock functionality when assigning a password to a tag. See “Using Lock
Functionality” on page 34 for more information.
Request
To write a tag password, send the following command and parameter information to the reader:
Response
Skyetek Inc
1525 Market St. Ste 200
Denver, CO 80202
Main 720.328.3425 Fax:720.228.2400 www.skyetek.com
Examples of UHF Tag Usage P a g e | 33
After you have assigned an access password to a tag that supports passwords (see “Writing a Tag
Password” on page 32), you must send the Send Tag Password command to send the password to
the reader before the reader can execute any other Secure State operations for that tag. This
remains a requirement until you change the password or reset the password value to zero.
This command is required only if a tag has an access password that was previously set is a non-zero
value. If the password is set for a tag and you send a command that requires the tag to be in the Secure State
without sending the password first, the command will fail.
Request
To send a tag password, send the following command and parameter information to the reader:
Response
Skyetek Inc
1525 Market St. Ste 200
Denver, CO 80202
Main 720.328.3425 Fax:720.228.2400 www.skyetek.com
Examples of UHF Tag Usage P a g e | 34
Class 1 Gen 2 tags let you use lock functionality to set read permissions, write permissions, and
passwords for tag memory. The following tables list the different values for Locking/Password
protecting different sections of the tag memory for EPC Class1 Gen2 tags.
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19
Kill Access EPC TID User Kill Access EPC TID User
mask mask mask mask mask action action action action action
The first 10 payload bits are Mask bits (Table 3). A Tag interprets these bit values as follows:
o Mask = 0: Ignore the associated Action field and retain the current lock setting.
o Mask = 1: Implement the associated Action field, and overwrite the current lock
setting.
0 1 2 3 4 5 6 7 8 9
Mask skip/ skip/ skip/ skip/ skip/ skip/ skip/ skip/ skip/ skip/
write write write write write write write write write write
10 11 12 13 14 15 16 17 18 19
Action pwd perma pwd perma pwd perma pwd perma pwd perma
read/ lock read/ lock write lock write lock write lock
write write
Skyetek Inc
1525 Market St. Ste 200
Denver, CO 80202
Main 720.328.3425 Fax:720.228.2400 www.skyetek.com
Examples of UHF Tag Usage P a g e | 35
The last 10 payload bits are Action bits (Table 4), A Tag interprets these bit values as follows:
o Action = 0: De-assert lock for the associated memory location.
Action = 1: Assert lock or permalock for the associated memory location.
0 0 Associated memory bank is writable from either the open or secured states.
Associated memory bank is permanently writable from either the open or secured
0 1
states and can never be locked.
Pwd read/
Permalock Description
write
Associated memory bank is readable and writable from either the open or secured
0 0
states.
Associated memory bank is permanently readable and writable from either the
0 1
open or secured states and can never be locked.
Associated memory bank is readable and writable from the secured state only.
1 0
Skyetek Inc
1525 Market St. Ste 200
Denver, CO 80202
Main 720.328.3425 Fax:720.228.2400 www.skyetek.com
Examples of UHF Tag Usage P a g e | 36
CAUTION – Once a memory bank is locked, you can no longer write to it.
Request
To lock the EPC memory bank (bank 1), send the following command and parameter information to
the reader.
Response
Skyetek Inc
1525 Market St. Ste 200
Denver, CO 80202
Main 720.328.3425 Fax:720.228.2400 www.skyetek.com
Examples of UHF Tag Usage P a g e | 37
To password protect the EPC memory bank, send the following command and parameter
information to the reader.
Request
Response
NOTE – After you set the password, you must send the Send Tag Password command (see “Sending a
Tag Password” on page 33) before sending any write commands to the memory banks that have been
password protected.
Skyetek Inc
1525 Market St. Ste 200
Denver, CO 80202
Main 720.328.3425 Fax:720.228.2400 www.skyetek.com
Examples of UHF Tag Usage P a g e | 38
Request
To set the kill password, send the following command and parameter information to the reader:
Response
Skyetek Inc
1525 Market St. Ste 200
Denver, CO 80202
Main 720.328.3425 Fax:720.228.2400 www.skyetek.com
Examples of UHF Tag Usage P a g e | 39
CAUTION – If you kill a tag, you can no longer perform any operations on that tag.
Request
To kill a tag, send the following command and parameter information to the reader.
Response
Skyetek Inc
1525 Market St. Ste 200
Denver, CO 80202
Main 720.328.3425 Fax:720.228.2400 www.skyetek.com
Examples of UHF Tag Usage P a g e | 40
Higgs tags by Alien Technology Corporation have a special command “Load Image” that loads the
entire memory image of the tag in a single transaction.
The different fields in the Load Image command and their possible values are shown below. The
following table gives the layout of the different fields in the data payload being sent with the Load
Image command. The order of the different fields in the 192 bits of data is shown below, and they
must be sent in that order.
Skyetek Inc
1525 Market St. Ste 200
Denver, CO 80202
Main 720.328.3425 Fax:720.228.2400 www.skyetek.com
Examples of UHF Tag Usage P a g e | 41
The following table shows the different configuration values that can be sent for locking different
memories of an Alien Higgs tag.
APW P-Lock
KPW P-Lock
EPC P-Lock
Field Name
APW Lock
KPW Lock
EPC Lock
RES
RES
RES
RES
RES
RES
RES
RES
RES
RES
15
Field Bit # 14 13 12 11 10 9 8 7 6 5 4 3 2 1 0 LSB
MSB
Lock Bits 0 0 0 0 0 0 - - - - - - - - - -
Reserved
- - - - - - 1 1 1 0 1 1 1 0 0 0
Bit Values
For example, to permanently lock the Access Password field, the value should be 0x43B8.
Skyetek Inc
1525 Market St. Ste 200
Denver, CO 80202
Main 720.328.3425 Fax:720.228.2400 www.skyetek.com
Examples of UHF Tag Usage P a g e | 42
The Protocol Control bits determine the length of the EPC as well as the Numbering System used.
The following table shows the different fields in the Protocol Control Word and gives some
examples.
Field Bit# 4 3 2 1 0 1 0 8 7 6 5 4 3 2 1 0
Bit# 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 0
MSB
80-bit EPC 0 0 1 0 1 0 0
64-bit2 EPC 0 0 1 0 0 0 0
The NSI is optional and is user specified. Please refer to the EPC Gen2 v1.10 protocol document for
details.
Refer to the EPC Gen2 v1.10 protocol document for more details on the different length field
values.
Skyetek Inc
1525 Market St. Ste 200
Denver, CO 80202
Main 720.328.3425 Fax:720.228.2400 www.skyetek.com
Examples of UHF Tag Usage P a g e | 43
Request
000102030101020266665555444
02 0026 0820 0103 8251 FFFF 000C 0018 4A05
4333322221111300003B8
Response
After writing the EPC, you can verify it by sending the Select Tag command with the tag type set
to EPC Class1 Gen2.
Skyetek Inc
1525 Market St. Ste 200
Denver, CO 80202
Main 720.328.3425 Fax:720.228.2400 www.skyetek.com
Examples of UHF Tag Usage P a g e | 44
This section discusses tag commands that specifically apply to ISO18000-6B tags. The Select Tag
commands discussed in the section “Selecting Tags” on page 9 also apply to these tags.
For the tags with a tag confirmation as shown above, the user can read all the tag memory and can
write to all the Unlocked User memory locations.
To select an ISO18000-6B, send the following parameter information to the reader. If the tag type
is set to ISO18000-6B Auto-Detect, then the reader will include the tag type in the response if a tag
is successfully detected.
Request
Response
To read a single ISO18000-6B block, send the following parameter information to the reader:
Request
Skyetek Inc
1525 Market St. Ste 200
Denver, CO 80202
Main 720.328.3425 Fax:720.228.2400 www.skyetek.com
Examples of UHF Tag Usage P a g e | 45
Response
Each Block is 1-byte long, so the Data Length value should equal the Number of Blocks being read.
Skyetek Inc
1525 Market St. Ste 200
Denver, CO 80202
Main 720.328.3425 Fax:720.228.2400 www.skyetek.com
Examples of UHF Tag Usage P a g e | 46
To read multiple ISO18000-6B blocks, send the following parameter information to the reader:
Request
Response
Each block is 1-byte long, so the Data Length value should equal the Number of Blocks being read.
Skyetek Inc
1525 Market St. Ste 200
Denver, CO 80202
Main 720.328.3425 Fax:720.228.2400 www.skyetek.com
Examples of UHF Tag Usage P a g e | 47
To write to a single ISO18000-6B, send the following parameter information to the reader. (Each
block is 10byte long, so the Number of Blocks value should be the same as the data length.)
Request
Response
Skyetek Inc
1525 Market St. Ste 200
Denver, CO 80202
Main 720.328.3425 Fax:720.228.2400 www.skyetek.com
Examples of UHF Tag Usage P a g e | 48
To write multiple ISO18000-6B blocks, send the following parameter information to the reader.
(Each block is 1-byte long, so the Number of Blocks value should be the same as the data length.)
Request
Response
Skyetek Inc
1525 Market St. Ste 200
Denver, CO 80202
Main 720.328.3425 Fax:720.228.2400 www.skyetek.com
Examples of UHF Tag Usage P a g e | 49
To lock a single ISO18000-6B block, send the following parameter information to the reader.
You can lock only one block at a time. To lock multiple blocks, send the command multiple times
after incrementing or changing the address.
Once the tag blocks have been locked, they cannot be unlocked or written to.
Request
Response
Skyetek Inc
1525 Market St. Ste 200
Denver, CO 80202
Main 720.328.3425 Fax:720.228.2400 www.skyetek.com
Examples of UHF Tag Usage P a g e | 50
To achieve optimal performance with EM4444 tags, do not include EM4122 tags in the detection
field when you use commands that include read or write operations.
Request
To select any type of supported tag, send the following command and parameter information to
the reader:
Response
Based on the request, the reader returns the following information for an EM4122 tag detected in
the read field:
STX Msg. Length Response Code Tag Type TID Length TID/EPC CRC
02 000E 0101 8512 0006 058000455E49 D597
Skyetek Inc
1525 Market St. Ste 200
Denver, CO 80202
Main 720.328.3425 Fax:720.228.2400 www.skyetek.com
Examples of UHF Tag Usage P a g e | 51
Sending the following command sets up the continuous monitoring of whatever supported tag type
is detected. The first time you send this command, it places the reader into loop mode, which
sends a response whenever a tag enters the detection field or when there is a change in the field.
Sending any command to the reader turns off loop mode.
Request
To set up continuous monitoring, send the following command and parameter information to the
reader:
Response
The reader returns the following information when it starts loop mode:
Skyetek Inc
1525 Market St. Ste 200
Denver, CO 80202
Main 720.328.3425 Fax:720.228.2400 www.skyetek.com
Examples of UHF Tag Usage P a g e | 52
Reading Tags
The table below shows sample output from the reader after loop mode starts. (There can be any
number of reads depending on the number of tags present.)
STX Msg. Length Response Code Tag Type TID Length TID / EPC CRC
02 000E 0101 8512 0006 058000455E49 D597
02 000E 0101 8512 0006 058000455E49 D597
02 000E 0101 8512 0006 058000455E49 D597
-
-
-
The reader exits loop mode when you send another command.
Skyetek Inc
1525 Market St. Ste 200
Denver, CO 80202
Main 720.328.3425 Fax:720.228.2400 www.skyetek.com
Examples of UHF Tag Usage P a g e | 53
Selecting all supported tags in a field can be useful when trying to read a stack of tags
simultaneously (inventory mode). This keeps you from having to issue commands to read each type
of tag individually.
Request
To set up monitoring, send the following command and parameter information to the reader:
Response
The reader returns information for all tag types detected. At the end of the tag inventory, the
reader sends the Inventory Complete Response code (810F).
STX Msg. Length Response Code Tag Type TID Length TID / EPC CRC
02 000E 0101 8525 0006 469900001275 F4B2
02 000E 0101 8525 0006 46990000125E 6B63
02 000E 0101 8525 0006 469900001276 C629
02 000E 0101 8525 0006 46990000125D 59F8
Skyetek Inc
1525 Market St. Ste 200
Denver, CO 80202
Main 720.328.3425 Fax:720.228.2400 www.skyetek.com
Examples of UHF Tag Usage P a g e | 54
Request
To read an EMX44 tag, send the following command and parameter information to the reader:
STX Msg. Length Flags Command Tag Type TID Length TID/EPC CRC
02 000D 0060 0102 8500 0006 46990000125D 4CAB
(The TID for the tag is returned in the response for a previous Select Tag command.)
Response
Based on the request, the reader returns the following information for an EM4444 tag detected in
the read field:
STX Msg. Length Response Code Tag Type TID Length TID/EPC CRC
NOTE – To achieve optimal performance with EM4444 tags, do not include EM4122 tags in the
detection field when you use commands that include read or write operations.
Skyetek Inc
1525 Market St. Ste 200
Denver, CO 80202
Main 720.328.3425 Fax:720.228.2400 www.skyetek.com
Examples of UHF Tag Usage P a g e | 55
Request
To write a single block of data to the EPC memory bank (bank 1), send the following command and
parameter information to the reader:
Response
NOTE – To achieve optimal performance with EM4444 tags, do not include EM4122 tags in the
detection field when you use commands that include read or write operations.
Skyetek Inc
1525 Market St. Ste 200
Denver, CO 80202
Main 720.328.3425 Fax:720.228.2400 www.skyetek.com
Examples of UHF Tag Usage P a g e | 56
Request
You can lock an EM tag by sending a Write Tag command with no data and the Lock flag enabled.
CAUTION – Once a memory bank is locked, you can no longer write to it.
NOTE – To achieve optimal performance with EM4444 tags, do not include EM4122 tags in the
detection field when you use commands that include read or write operations.
Response
Skyetek Inc
1525 Market St. Ste 200
Denver, CO 80202
Main 720.328.3425 Fax:720.228.2400 www.skyetek.com
Examples of UHF Tag Usage P a g e | 57
You can verify the success of the lock operation with a GetLockStatus command:
Request
Command = GetLockStatus
Mandatory Flags = TID (CRC Flag in Binary Mode)
Tag Type = EM4X44 Auto-detect
Response
The response code indicates GetLockStatus: PASS (01), showing the tag is locked.
Skyetek Inc
1525 Market St. Ste 200
Denver, CO 80202
Main 720.328.3425 Fax:720.228.2400 www.skyetek.com
Examples of UHF Tag Usage P a g e | 58
For EM4444 tags, the system page, memory address 000F, contains configuration information for
the tag. You can access individual bytes of the system page using the Read Tag Config and Write
Tag Config commands to manage tag configuration. You can also view configuration information
using the Get Tag Info or Get Lock Status commands.
The block size is always 1 for Read Tag Config and Write Tag Config.
The address specifies a byte from the system page. For example, address 0000 is system page
bits 0-7 (LOCK bits), and address 0007 is system page bits 56 to 63.
Only address 0006 and 0007 are writable, as described below.
Sending a Write Tag Config command to the Tag Talks Only (TTO) byte (address 0006)
automatically calls an EM-specific TTO command. This lets you set what the tag sends when the
tag transmits in TTO mode. (Although the SkyeModule firmware only decodes the first page of
transmitted memory.)
Sending a Write Tag Config command to the CONFIG byte (address 0007) automatically calls an
EM-specific CONFIG command. This lets you set the maximum random delay and the Tx data
rate (either 64 Kbps or 256 Kbps).
NOTE – For additional information on configuration values, refer to the EM4444 data sheet.
Setting the delay control bits to 0b10 (2 decimal). This corresponds to system page bits 61-60.
Setting the Tx baud rate 0b01 (1 decimal). This corresponds to the system page bits 59-58.
Setting system page bits 63-62 and 57-56 to 0.
The resulting byte made up of these requirements for bits 63-56 thus becomes 0b00100100 or
0x24. To configure the tag with the above settings, send the Write Tag Config command with the
address of 0007 and the data of 24, as shown below:
Skyetek Inc
1525 Market St. Ste 200
Denver, CO 80202
Main 720.328.3425 Fax:720.228.2400 www.skyetek.com
Examples of UHF Tag Usage P a g e | 59
Request
To change the tag configuration for an EM4444 tag with TID 469900001276:
NOTE – To achieve optimal performance with EM4444 tags, do not include EM4122 tags in the
detection field when you use commands that include read or write operations.
Response
Skyetek Inc
1525 Market St. Ste 200
Denver, CO 80202
Main 720.328.3425 Fax:720.228.2400 www.skyetek.com
Examples of UHF Tag Usage P a g e | 60
7 Revision History
Skyetek Inc
1525 Market St. Ste 200
Denver, CO 80202
Main 720.328.3425 Fax:720.228.2400 www.skyetek.com