{"id":430762,"date":"2024-10-20T07:24:34","date_gmt":"2024-10-20T07:24:34","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-iso-iec-159622022\/"},"modified":"2024-10-26T14:04:44","modified_gmt":"2024-10-26T14:04:44","slug":"bs-iso-iec-159622022","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-iso-iec-159622022\/","title":{"rendered":"BS ISO\/IEC 15962:2022"},"content":{"rendered":"
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
2<\/td>\n | undefined <\/td>\n<\/tr>\n | ||||||
11<\/td>\n | Foreword <\/td>\n<\/tr>\n | ||||||
12<\/td>\n | Introduction <\/td>\n<\/tr>\n | ||||||
13<\/td>\n | 1 Scope 2 Normative references 3 Terms and definitions and abbreviated terms 3.1 Terms and definitions <\/td>\n<\/tr>\n | ||||||
14<\/td>\n | 3.2 Abbreviated terms 4 Conformance 4.1 Conformance with the air interface 4.2 Conformance with the application interface 4.2.1 Encoders and the application interface <\/td>\n<\/tr>\n | ||||||
15<\/td>\n | 4.2.2 Decoders and the application interface 4.2.3 Comprehensive encoder\/decoder devices and the application interface 4.3 Conformance with the Access-Method 4.3.1 Encoders and the Access-Method 4.3.2 Decoders and the Access-Method 4.3.3 Comprehensive encoder\/decoder devices and the Access-Method 5 Protocol model 5.1 Overview <\/td>\n<\/tr>\n | ||||||
16<\/td>\n | 5.2 Layered protocol 5.2.1 Layers 5.2.2 Application layer as defined in the ISO\/IEC 15961 series <\/td>\n<\/tr>\n | ||||||
17<\/td>\n | 5.2.3 Application interface as defined in ISO\/IEC 15961-1 5.2.4 Data Protocol processing 5.2.5 Data Protocol interface <\/td>\n<\/tr>\n | ||||||
18<\/td>\n | 5.3 Flexible implementation configurations 5.4 Functional processes \u2014 Interrogator implementation 5.4.1 Logical functions and interfaces <\/td>\n<\/tr>\n | ||||||
19<\/td>\n | 5.4.2 Functional processes \u2014 Application interface 5.4.3 Functional processes \u2014 Interrogator <\/td>\n<\/tr>\n | ||||||
20<\/td>\n | 5.4.4 RFID tag <\/td>\n<\/tr>\n | ||||||
21<\/td>\n | 5.5 ISO\/IEC 15962 and the Data Processor 6 Data and presentation conventions 6.1 Data types in ISO\/IEC 15961-1 commands and responses 6.2 Extensible bit vector (EBV) <\/td>\n<\/tr>\n | ||||||
22<\/td>\n | 6.3 Object Identifier presentation in the application interface 6.3.1 Object identifier structure to ISO\/IEC 8824-1 <\/td>\n<\/tr>\n | ||||||
23<\/td>\n | 6.3.2 Presenting the Object-Identifier in accordance with ISO\/IEC 8824-1 6.3.3 Presenting the Object-Identifier as a Uniform Resource Name (URN) 6.4 The Object 6.5 8-bit byte 6.6 N-bit encoding 7 Data Processor \u2014 High level processing <\/td>\n<\/tr>\n | ||||||
24<\/td>\n | 8 Data Processor and the application interface 8.1 Application commands \u2014 Overview <\/td>\n<\/tr>\n | ||||||
26<\/td>\n | 8.2 Application commands and responses \u2014 Write 8.2.1 Configure-AFI <\/td>\n<\/tr>\n | ||||||
27<\/td>\n | 8.2.2 Configure-DSFID 8.2.3 Write-Objects <\/td>\n<\/tr>\n | ||||||
31<\/td>\n | 8.2.4 Write-Objects-Segmented-Memory-Tag <\/td>\n<\/tr>\n | ||||||
34<\/td>\n | 8.2.5 Write-EPC-UII <\/td>\n<\/tr>\n | ||||||
35<\/td>\n | 8.2.6 Write-Password-Segmented-Memory-Tag <\/td>\n<\/tr>\n | ||||||
36<\/td>\n | 8.2.7 Write-Segments-6TypeD-Tag <\/td>\n<\/tr>\n | ||||||
39<\/td>\n | 8.2.8 Write-Monomorphic-UII <\/td>\n<\/tr>\n | ||||||
42<\/td>\n | 8.2.9 Configure-Extended-DSFID <\/td>\n<\/tr>\n | ||||||
43<\/td>\n | 8.2.10 Configure-Multiple-Records-Header <\/td>\n<\/tr>\n | ||||||
45<\/td>\n | 8.3 Application commands and responses \u2014 Read 8.3.1 Read-Object-Identifiers <\/td>\n<\/tr>\n | ||||||
46<\/td>\n | 8.3.2 Read-Logical-Memory-Map <\/td>\n<\/tr>\n | ||||||
47<\/td>\n | 8.3.3 Read-Objects <\/td>\n<\/tr>\n | ||||||
48<\/td>\n | 8.3.4 Inventory-ISO-UIImemory <\/td>\n<\/tr>\n | ||||||
49<\/td>\n | 8.3.5 Inventory-EPC-UIImemory <\/td>\n<\/tr>\n | ||||||
50<\/td>\n | 8.3.6 Read-Words-Segmented-Memory-Tag <\/td>\n<\/tr>\n | ||||||
51<\/td>\n | 8.3.7 Read-Segments-6TypeD-Tag <\/td>\n<\/tr>\n | ||||||
52<\/td>\n | 8.3.8 Read-Multiple-Records <\/td>\n<\/tr>\n | ||||||
56<\/td>\n | 8.4 Application commands and responses \u2014 Other 8.4.1 Inventory-Tags 8.4.2 Delete-Object <\/td>\n<\/tr>\n | ||||||
58<\/td>\n | 8.4.3 Modify-Object <\/td>\n<\/tr>\n | ||||||
60<\/td>\n | 8.4.4 Erase-Memory <\/td>\n<\/tr>\n | ||||||
61<\/td>\n | 8.4.5 Get-App-based-System-Info 8.4.6 Kill-Segmented-Memory-Tag <\/td>\n<\/tr>\n | ||||||
62<\/td>\n | 8.4.7 Delete-Packed-Object <\/td>\n<\/tr>\n | ||||||
63<\/td>\n | 8.4.8 Modify-Packed-Object-Structure <\/td>\n<\/tr>\n | ||||||
64<\/td>\n | 8.4.9 Delete-Multiple-Record <\/td>\n<\/tr>\n | ||||||
65<\/td>\n | 8.5 Air interface support for application commands 9 Data Processor and the air interface 9.1 Use 9.2 Air interface services <\/td>\n<\/tr>\n | ||||||
66<\/td>\n | 9.3 Defining the system information 9.3.1 System information elements 9.3.2 Singulation-Id <\/td>\n<\/tr>\n | ||||||
67<\/td>\n | 9.3.3 Physical block size 9.3.4 Number of blocks 9.3.5 AFI 9.3.6 DSFID <\/td>\n<\/tr>\n | ||||||
68<\/td>\n | 9.3.7 Encoding the Extended-Data-Format 9.3.8 Other extensions using the Extended Syntax indicator bit 9.3.9 Extended Syntax flag byte 1 9.3.10 Memory length indicator bits <\/td>\n<\/tr>\n | ||||||
70<\/td>\n | 9.3.11 Procedure for length encoding 9.3.12 Data CRC indicators 9.3.13 Data CRC 9.3.14 Extended Syntax flag byte 2 <\/td>\n<\/tr>\n | ||||||
71<\/td>\n | 9.3.15 Simple Sensor indicator 9.3.16 Battery Assist indicator 9.3.17 Full-Function Sensor indicator 9.3.18 DSFID and Extended Syntax <\/td>\n<\/tr>\n | ||||||
75<\/td>\n | 9.4 Configuring the Logical Memory 10 Command\/Response Unit \u2014 Processing of command and response arguments 10.1 Function <\/td>\n<\/tr>\n | ||||||
76<\/td>\n | 10.2 Process arguments 10.2.1 Access-Password 10.2.2 Additional-App-bits 10.2.3 AFI 10.2.4 AFI-Lock <\/td>\n<\/tr>\n | ||||||
77<\/td>\n | 10.2.5 Append-To-Existing-Multiple-Record 10.2.6 Application-Defined-Record-Capacity 10.2.7 Avoid-Duplicate 10.2.8 Check-Duplicate <\/td>\n<\/tr>\n | ||||||
78<\/td>\n | 10.2.9 Compact-Parameter 10.2.10 Data-Length-Of-Record <\/td>\n<\/tr>\n | ||||||
79<\/td>\n | 10.2.11 DSFID 10.2.12 DSFID-Lock 10.2.13 Directory-Length-EBV8-Indicator 10.2.14 Encoded-Memory-Capacity 10.2.15 EPC-Code 10.2.16 Hierarchical-Identifier-Arc <\/td>\n<\/tr>\n | ||||||
80<\/td>\n | 10.2.17 Identifier-Of-My-Parent 10.2.18 Identify-Method and Number-Of-Tags 10.2.19 Instance-Of-Arc <\/td>\n<\/tr>\n | ||||||
81<\/td>\n | 10.2.20 Item-Related-DSFID 10.2.21 Item-Related-Segment-Map 10.2.22 Kill-Password 10.2.23 Length-Of-Mask 10.2.24 Lock-Directory-Entry 10.2.25 Lock-Multiple-Records-Header 10.2.26 Lock-Record-Preamble <\/td>\n<\/tr>\n | ||||||
82<\/td>\n | 10.2.27 Lock-UII-Segment-Arguments 10.2.28 Max-App-Length 10.2.29 Memory-Bank 10.2.30 Memory-Bank-Lock 10.2.31 Memory-Segment 10.2.32 Memory-Type 10.2.33 Multiple-Records-Directory-Length <\/td>\n<\/tr>\n | ||||||
83<\/td>\n | 10.2.34 Multiple-Records-Features-Indicator 10.2.35 NSI-bits 10.2.36 Number-In-Data-Element-List 10.2.37 Number-Of-Records 10.2.38 Object-Lock 10.2.39 Packed-Object-Directory-Type <\/td>\n<\/tr>\n | ||||||
84<\/td>\n | 10.2.40 Password 10.2.41 Password-Type 10.2.42 Pointer 10.2.43 Pointer-To-Multiple-Records-Directory <\/td>\n<\/tr>\n | ||||||
85<\/td>\n | 10.2.44 Read-Record-Type 10.2.45 Read-Type 10.2.46 Record-Memory-Capacity <\/td>\n<\/tr>\n | ||||||
86<\/td>\n | 10.2.47 Record-Type-Arc 10.2.48 Record-Type-Classification 10.2.49 Sector-Identifier 10.2.50 Segment-Read-Type <\/td>\n<\/tr>\n | ||||||
87<\/td>\n | 10.2.51 Simple-Sensor-Data-Block 10.2.52 Start-Address-Of-Record 10.2.53 Tag-Data-Profile-ID-Table 10.2.54 Tag-Mask 10.2.55 TID-Segment-Map 10.2.56 UII-DSFID 10.2.57 UII-Segment-Map 10.2.58 Update-Multiple-Records-Directory <\/td>\n<\/tr>\n | ||||||
88<\/td>\n | 10.2.59 Word-Count 10.2.60 Word-Pointer 10.3 Completion-Codes <\/td>\n<\/tr>\n | ||||||
91<\/td>\n | 10.4 Execution-Codes <\/td>\n<\/tr>\n | ||||||
92<\/td>\n | 11 Access-Method 11.1 Methods <\/td>\n<\/tr>\n | ||||||
93<\/td>\n | 11.2 No-Directory structure 11.2.1 Structure <\/td>\n<\/tr>\n | ||||||
94<\/td>\n | 11.2.2 Restrictions to air interfaces 11.2.3 The dataset 11.2.4 Encoding rules <\/td>\n<\/tr>\n | ||||||
95<\/td>\n | 11.3 Directory structure 11.3.1 Structure 11.3.2 Restrictions to air interfaces <\/td>\n<\/tr>\n | ||||||
96<\/td>\n | 11.3.3 Directory structure for Data-Format = “3 \u2026287” 11.3.4 Directory structure for Data-Format = 2 11.3.5 Encoding the address of the dataset 11.3.6 Encoding example 11.4 Packed-Objects structure <\/td>\n<\/tr>\n | ||||||
97<\/td>\n | 11.5 Tag Data Profile 11.5.1 Use <\/td>\n<\/tr>\n | ||||||
98<\/td>\n | 11.5.2 Restrictions to air interfaces 11.5.3 Defining the Tag-Data-Profile 11.5.4 Encoding Rules 11.6 Multiple-Records 11.6.1 Structure <\/td>\n<\/tr>\n | ||||||
99<\/td>\n | 11.6.2 Categories of multiple records <\/td>\n<\/tr>\n | ||||||
101<\/td>\n | 11.6.3 Object-Identifier structure <\/td>\n<\/tr>\n | ||||||
103<\/td>\n | 11.6.4 Sector identifier 11.6.5 Restrictions to air interfaces 11.6.6 Encoding rules 12 ISO\/IEC 15434 direct encoding and transmission method using Access-Method 0 and Data-Format 3 12.1 Use <\/td>\n<\/tr>\n | ||||||
104<\/td>\n | 12.2 General rules for ISO\/IEC 15434 direct encoding 12.3 Specific support for ISO 17364, ISO 17365, ISO 17366 and ISO 17367 13 Monomorphic-UII encoding 13.1 Use <\/td>\n<\/tr>\n | ||||||
105<\/td>\n | 13.2 6-bit encoding 13.3 7-bit encoding <\/td>\n<\/tr>\n | ||||||
106<\/td>\n | 13.4 URN Code 40 encoding 13.5 8859-1 octet encoding 13.6 Application-defined 8-bit coding <\/td>\n<\/tr>\n | ||||||
107<\/td>\n | Annex A (informative) Air interface support for application commands <\/td>\n<\/tr>\n | ||||||
113<\/td>\n | Annex B (normative) Pro forma description for the Tag Driver <\/td>\n<\/tr>\n | ||||||
115<\/td>\n | Annex C (normative) ISO\/IEC 18000 Series Tag Driver Descriptions <\/td>\n<\/tr>\n | ||||||
127<\/td>\n | Annex D (normative) Encoding rules for No-Directory Access-Method <\/td>\n<\/tr>\n | ||||||
140<\/td>\n | Annex E (normative) Basic data compaction schemes <\/td>\n<\/tr>\n | ||||||
145<\/td>\n | Annex F (normative) ISO\/IEC 646 characters supported by the compaction schemes <\/td>\n<\/tr>\n | ||||||
149<\/td>\n | Annex G (informative) Encoding example for No-Directory structure <\/td>\n<\/tr>\n | ||||||
152<\/td>\n | Annex H (informative) Encoding example for a directory structure <\/td>\n<\/tr>\n | ||||||
155<\/td>\n | Annex I (normative) Packed-Objects structure <\/td>\n<\/tr>\n | ||||||
177<\/td>\n | Annex J (normative) Packed Objects ID tables <\/td>\n<\/tr>\n | ||||||
187<\/td>\n | Annex K (normative) Packed Objects Encoding tables <\/td>\n<\/tr>\n | ||||||
192<\/td>\n | Annex L (informative) Encoding example for Packed Objects <\/td>\n<\/tr>\n | ||||||
196<\/td>\n | Annex M (informative) Decoding Packed Objects <\/td>\n<\/tr>\n | ||||||
200<\/td>\n | Annex N (normative) Tag Data Profile encoding <\/td>\n<\/tr>\n | ||||||
205<\/td>\n | Annex O (normative) Tag Data Profile ID tables <\/td>\n<\/tr>\n | ||||||
209<\/td>\n | Annex P (informative) Encoding example for Tag Data Profile <\/td>\n<\/tr>\n | ||||||
213<\/td>\n | Annex Q (normative) Basic encoding rules for Multiple-Records Access-Method <\/td>\n<\/tr>\n | ||||||
230<\/td>\n | Annex R (normative) Multiple-Records encoding rules for hierarchical records <\/td>\n<\/tr>\n | ||||||
237<\/td>\n | Annex S (informative) Encoding example for the Multiple-Records Access-Method <\/td>\n<\/tr>\n | ||||||
249<\/td>\n | Annex T (normative) ISO\/IEC 15434 direct encoding and transmission <\/td>\n<\/tr>\n | ||||||
255<\/td>\n | Annex U (informative) ISO\/IEC 15434 direct DI encoding and transmission for ISO 17364, ISO 17365, ISO 17366 and ISO 17367 <\/td>\n<\/tr>\n | ||||||
260<\/td>\n | Annex V (normative) URN Code 40 encoding <\/td>\n<\/tr>\n | ||||||
263<\/td>\n | Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" Information technology. Radio frequency identification (RFID) for item management. Data protocol: data encoding rules and logical memory functions<\/b><\/p>\n |