{"id":431323,"date":"2024-10-20T07:27:35","date_gmt":"2024-10-20T07:27:35","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-iso-iec-159622022-tc\/"},"modified":"2024-10-26T14:10:55","modified_gmt":"2024-10-26T14:10:55","slug":"bs-iso-iec-159622022-tc","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-iso-iec-159622022-tc\/","title":{"rendered":"BS ISO\/IEC 15962:2022 – TC"},"content":{"rendered":"
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
370<\/td>\n | undefined <\/td>\n<\/tr>\n | ||||||
379<\/td>\n | Foreword <\/td>\n<\/tr>\n | ||||||
380<\/td>\n | Introduction <\/td>\n<\/tr>\n | ||||||
381<\/td>\n | 1 Scope 2 Normative references 3 Terms and definitions and abbreviated terms 3.1 Terms and definitions <\/td>\n<\/tr>\n | ||||||
382<\/td>\n | 3.2 Abbreviated terms 4 Conformance 4.1 Conformance with the air interface 4.2 Conformance with the application interface 4.2.1 Encoders and the application interface <\/td>\n<\/tr>\n | ||||||
383<\/td>\n | 4.2.2 Decoders and the application interface 4.2.3 Comprehensive encoder\/decoder devices and the application interface 4.3 Conformance with the Access-Method 4.3.1 Encoders and the Access-Method 4.3.2 Decoders and the Access-Method 4.3.3 Comprehensive encoder\/decoder devices and the Access-Method 5 Protocol model 5.1 Overview <\/td>\n<\/tr>\n | ||||||
384<\/td>\n | 5.2 Layered protocol 5.2.1 Layers 5.2.2 Application layer as defined in the ISO\/IEC 15961 series <\/td>\n<\/tr>\n | ||||||
385<\/td>\n | 5.2.3 Application interface as defined in ISO\/IEC 15961-1 5.2.4 Data Protocol processing 5.2.5 Data Protocol interface <\/td>\n<\/tr>\n | ||||||
386<\/td>\n | 5.3 Flexible implementation configurations 5.4 Functional processes \u2014 Interrogator implementation 5.4.1 Logical functions and interfaces <\/td>\n<\/tr>\n | ||||||
387<\/td>\n | 5.4.2 Functional processes \u2014 Application interface 5.4.3 Functional processes \u2014 Interrogator <\/td>\n<\/tr>\n | ||||||
388<\/td>\n | 5.4.4 RFID tag <\/td>\n<\/tr>\n | ||||||
389<\/td>\n | 5.5 ISO\/IEC 15962 and the Data Processor 6 Data and presentation conventions 6.1 Data types in ISO\/IEC 15961-1 commands and responses 6.2 Extensible bit vector (EBV) <\/td>\n<\/tr>\n | ||||||
390<\/td>\n | 6.3 Object Identifier presentation in the application interface 6.3.1 Object identifier structure to ISO\/IEC 8824-1 <\/td>\n<\/tr>\n | ||||||
391<\/td>\n | 6.3.2 Presenting the Object-Identifier in accordance with ISO\/IEC 8824-1 6.3.3 Presenting the Object-Identifier as a Uniform Resource Name (URN) 6.4 The Object 6.5 8-bit byte 6.6 N-bit encoding 7 Data Processor \u2014 High level processing <\/td>\n<\/tr>\n | ||||||
392<\/td>\n | 8 Data Processor and the application interface 8.1 Application commands \u2014 Overview <\/td>\n<\/tr>\n | ||||||
394<\/td>\n | 8.2 Application commands and responses \u2014 Write 8.2.1 Configure-AFI <\/td>\n<\/tr>\n | ||||||
395<\/td>\n | 8.2.2 Configure-DSFID 8.2.3 Write-Objects <\/td>\n<\/tr>\n | ||||||
399<\/td>\n | 8.2.4 Write-Objects-Segmented-Memory-Tag <\/td>\n<\/tr>\n | ||||||
402<\/td>\n | 8.2.5 Write-EPC-UII <\/td>\n<\/tr>\n | ||||||
403<\/td>\n | 8.2.6 Write-Password-Segmented-Memory-Tag <\/td>\n<\/tr>\n | ||||||
404<\/td>\n | 8.2.7 Write-Segments-6TypeD-Tag <\/td>\n<\/tr>\n | ||||||
407<\/td>\n | 8.2.8 Write-Monomorphic-UII <\/td>\n<\/tr>\n | ||||||
410<\/td>\n | 8.2.9 Configure-Extended-DSFID <\/td>\n<\/tr>\n | ||||||
411<\/td>\n | 8.2.10 Configure-Multiple-Records-Header <\/td>\n<\/tr>\n | ||||||
413<\/td>\n | 8.3 Application commands and responses \u2014 Read 8.3.1 Read-Object-Identifiers <\/td>\n<\/tr>\n | ||||||
414<\/td>\n | 8.3.2 Read-Logical-Memory-Map <\/td>\n<\/tr>\n | ||||||
415<\/td>\n | 8.3.3 Read-Objects <\/td>\n<\/tr>\n | ||||||
416<\/td>\n | 8.3.4 Inventory-ISO-UIImemory <\/td>\n<\/tr>\n | ||||||
417<\/td>\n | 8.3.5 Inventory-EPC-UIImemory <\/td>\n<\/tr>\n | ||||||
418<\/td>\n | 8.3.6 Read-Words-Segmented-Memory-Tag <\/td>\n<\/tr>\n | ||||||
419<\/td>\n | 8.3.7 Read-Segments-6TypeD-Tag <\/td>\n<\/tr>\n | ||||||
420<\/td>\n | 8.3.8 Read-Multiple-Records <\/td>\n<\/tr>\n | ||||||
424<\/td>\n | 8.4 Application commands and responses \u2014 Other 8.4.1 Inventory-Tags 8.4.2 Delete-Object <\/td>\n<\/tr>\n | ||||||
426<\/td>\n | 8.4.3 Modify-Object <\/td>\n<\/tr>\n | ||||||
428<\/td>\n | 8.4.4 Erase-Memory <\/td>\n<\/tr>\n | ||||||
429<\/td>\n | 8.4.5 Get-App-based-System-Info 8.4.6 Kill-Segmented-Memory-Tag <\/td>\n<\/tr>\n | ||||||
430<\/td>\n | 8.4.7 Delete-Packed-Object <\/td>\n<\/tr>\n | ||||||
431<\/td>\n | 8.4.8 Modify-Packed-Object-Structure <\/td>\n<\/tr>\n | ||||||
432<\/td>\n | 8.4.9 Delete-Multiple-Record <\/td>\n<\/tr>\n | ||||||
433<\/td>\n | 8.5 Air interface support for application commands 9 Data Processor and the air interface 9.1 Use 9.2 Air interface services <\/td>\n<\/tr>\n | ||||||
434<\/td>\n | 9.3 Defining the system information 9.3.1 System information elements 9.3.2 Singulation-Id <\/td>\n<\/tr>\n | ||||||
435<\/td>\n | 9.3.3 Physical block size 9.3.4 Number of blocks 9.3.5 AFI 9.3.6 DSFID <\/td>\n<\/tr>\n | ||||||
436<\/td>\n | 9.3.7 Encoding the Extended-Data-Format 9.3.8 Other extensions using the Extended Syntax indicator bit 9.3.9 Extended Syntax flag byte 1 9.3.10 Memory length indicator bits <\/td>\n<\/tr>\n | ||||||
438<\/td>\n | 9.3.11 Procedure for length encoding 9.3.12 Data CRC indicators 9.3.13 Data CRC 9.3.14 Extended Syntax flag byte 2 <\/td>\n<\/tr>\n | ||||||
439<\/td>\n | 9.3.15 Simple Sensor indicator 9.3.16 Battery Assist indicator 9.3.17 Full-Function Sensor indicator 9.3.18 DSFID and Extended Syntax <\/td>\n<\/tr>\n | ||||||
443<\/td>\n | 9.4 Configuring the Logical Memory 10 Command\/Response Unit \u2014 Processing of command and response arguments 10.1 Function <\/td>\n<\/tr>\n | ||||||
444<\/td>\n | 10.2 Process arguments 10.2.1 Access-Password 10.2.2 Additional-App-bits 10.2.3 AFI 10.2.4 AFI-Lock <\/td>\n<\/tr>\n | ||||||
445<\/td>\n | 10.2.5 Append-To-Existing-Multiple-Record 10.2.6 Application-Defined-Record-Capacity 10.2.7 Avoid-Duplicate 10.2.8 Check-Duplicate <\/td>\n<\/tr>\n | ||||||
446<\/td>\n | 10.2.9 Compact-Parameter 10.2.10 Data-Length-Of-Record <\/td>\n<\/tr>\n | ||||||
447<\/td>\n | 10.2.11 DSFID 10.2.12 DSFID-Lock 10.2.13 Directory-Length-EBV8-Indicator 10.2.14 Encoded-Memory-Capacity 10.2.15 EPC-Code 10.2.16 Hierarchical-Identifier-Arc <\/td>\n<\/tr>\n | ||||||
448<\/td>\n | 10.2.17 Identifier-Of-My-Parent 10.2.18 Identify-Method and Number-Of-Tags 10.2.19 Instance-Of-Arc <\/td>\n<\/tr>\n | ||||||
449<\/td>\n | 10.2.20 Item-Related-DSFID 10.2.21 Item-Related-Segment-Map 10.2.22 Kill-Password 10.2.23 Length-Of-Mask 10.2.24 Lock-Directory-Entry 10.2.25 Lock-Multiple-Records-Header 10.2.26 Lock-Record-Preamble <\/td>\n<\/tr>\n | ||||||
450<\/td>\n | 10.2.27 Lock-UII-Segment-Arguments 10.2.28 Max-App-Length 10.2.29 Memory-Bank 10.2.30 Memory-Bank-Lock 10.2.31 Memory-Segment 10.2.32 Memory-Type 10.2.33 Multiple-Records-Directory-Length <\/td>\n<\/tr>\n | ||||||
451<\/td>\n | 10.2.34 Multiple-Records-Features-Indicator 10.2.35 NSI-bits 10.2.36 Number-In-Data-Element-List 10.2.37 Number-Of-Records 10.2.38 Object-Lock 10.2.39 Packed-Object-Directory-Type <\/td>\n<\/tr>\n | ||||||
452<\/td>\n | 10.2.40 Password 10.2.41 Password-Type 10.2.42 Pointer 10.2.43 Pointer-To-Multiple-Records-Directory <\/td>\n<\/tr>\n | ||||||
453<\/td>\n | 10.2.44 Read-Record-Type 10.2.45 Read-Type 10.2.46 Record-Memory-Capacity <\/td>\n<\/tr>\n | ||||||
454<\/td>\n | 10.2.47 Record-Type-Arc 10.2.48 Record-Type-Classification 10.2.49 Sector-Identifier 10.2.50 Segment-Read-Type <\/td>\n<\/tr>\n | ||||||
455<\/td>\n | 10.2.51 Simple-Sensor-Data-Block 10.2.52 Start-Address-Of-Record 10.2.53 Tag-Data-Profile-ID-Table 10.2.54 Tag-Mask 10.2.55 TID-Segment-Map 10.2.56 UII-DSFID 10.2.57 UII-Segment-Map 10.2.58 Update-Multiple-Records-Directory <\/td>\n<\/tr>\n | ||||||
456<\/td>\n | 10.2.59 Word-Count 10.2.60 Word-Pointer 10.3 Completion-Codes <\/td>\n<\/tr>\n | ||||||
459<\/td>\n | 10.4 Execution-Codes <\/td>\n<\/tr>\n | ||||||
460<\/td>\n | 11 Access-Method 11.1 Methods <\/td>\n<\/tr>\n | ||||||
461<\/td>\n | 11.2 No-Directory structure 11.2.1 Structure <\/td>\n<\/tr>\n | ||||||
462<\/td>\n | 11.2.2 Restrictions to air interfaces 11.2.3 The dataset 11.2.4 Encoding rules <\/td>\n<\/tr>\n | ||||||
463<\/td>\n | 11.3 Directory structure 11.3.1 Structure 11.3.2 Restrictions to air interfaces <\/td>\n<\/tr>\n | ||||||
464<\/td>\n | 11.3.3 Directory structure for Data-Format = “3 \u2026287” 11.3.4 Directory structure for Data-Format = 2 11.3.5 Encoding the address of the dataset 11.3.6 Encoding example 11.4 Packed-Objects structure <\/td>\n<\/tr>\n | ||||||
465<\/td>\n | 11.5 Tag Data Profile 11.5.1 Use <\/td>\n<\/tr>\n | ||||||
466<\/td>\n | 11.5.2 Restrictions to air interfaces 11.5.3 Defining the Tag-Data-Profile 11.5.4 Encoding Rules 11.6 Multiple-Records 11.6.1 Structure <\/td>\n<\/tr>\n | ||||||
467<\/td>\n | 11.6.2 Categories of multiple records <\/td>\n<\/tr>\n | ||||||
469<\/td>\n | 11.6.3 Object-Identifier structure <\/td>\n<\/tr>\n | ||||||
471<\/td>\n | 11.6.4 Sector identifier 11.6.5 Restrictions to air interfaces 11.6.6 Encoding rules 12 ISO\/IEC 15434 direct encoding and transmission method using Access-Method 0 and Data-Format 3 12.1 Use <\/td>\n<\/tr>\n | ||||||
472<\/td>\n | 12.2 General rules for ISO\/IEC 15434 direct encoding 12.3 Specific support for ISO 17364, ISO 17365, ISO 17366 and ISO 17367 13 Monomorphic-UII encoding 13.1 Use <\/td>\n<\/tr>\n | ||||||
473<\/td>\n | 13.2 6-bit encoding 13.3 7-bit encoding <\/td>\n<\/tr>\n | ||||||
474<\/td>\n | 13.4 URN Code 40 encoding 13.5 8859-1 octet encoding 13.6 Application-defined 8-bit coding <\/td>\n<\/tr>\n | ||||||
475<\/td>\n | Annex A (informative) Air interface support for application commands <\/td>\n<\/tr>\n | ||||||
481<\/td>\n | Annex B (normative) Pro forma description for the Tag Driver <\/td>\n<\/tr>\n | ||||||
483<\/td>\n | Annex C (normative) ISO\/IEC 18000 Series Tag Driver Descriptions <\/td>\n<\/tr>\n | ||||||
495<\/td>\n | Annex D (normative) Encoding rules for No-Directory Access-Method <\/td>\n<\/tr>\n | ||||||
508<\/td>\n | Annex E (normative) Basic data compaction schemes <\/td>\n<\/tr>\n | ||||||
513<\/td>\n | Annex F (normative) ISO\/IEC 646 characters supported by the compaction schemes <\/td>\n<\/tr>\n | ||||||
517<\/td>\n | Annex G (informative) Encoding example for No-Directory structure <\/td>\n<\/tr>\n | ||||||
520<\/td>\n | Annex H (informative) Encoding example for a directory structure <\/td>\n<\/tr>\n | ||||||
523<\/td>\n | Annex I (normative) Packed-Objects structure <\/td>\n<\/tr>\n | ||||||
545<\/td>\n | Annex J (normative) Packed Objects ID tables <\/td>\n<\/tr>\n | ||||||
555<\/td>\n | Annex K (normative) Packed Objects Encoding tables <\/td>\n<\/tr>\n | ||||||
560<\/td>\n | Annex L (informative) Encoding example for Packed Objects <\/td>\n<\/tr>\n | ||||||
564<\/td>\n | Annex M (informative) Decoding Packed Objects <\/td>\n<\/tr>\n | ||||||
568<\/td>\n | Annex N (normative) Tag Data Profile encoding <\/td>\n<\/tr>\n | ||||||
573<\/td>\n | Annex O (normative) Tag Data Profile ID tables <\/td>\n<\/tr>\n | ||||||
577<\/td>\n | Annex P (informative) Encoding example for Tag Data Profile <\/td>\n<\/tr>\n | ||||||
581<\/td>\n | Annex Q (normative) Basic encoding rules for Multiple-Records Access-Method <\/td>\n<\/tr>\n | ||||||
598<\/td>\n | Annex R (normative) Multiple-Records encoding rules for hierarchical records <\/td>\n<\/tr>\n | ||||||
605<\/td>\n | Annex S (informative) Encoding example for the Multiple-Records Access-Method <\/td>\n<\/tr>\n | ||||||
617<\/td>\n | Annex T (normative) ISO\/IEC 15434 direct encoding and transmission <\/td>\n<\/tr>\n | ||||||
623<\/td>\n | Annex U (informative) ISO\/IEC 15434 direct DI encoding and transmission for ISO 17364, ISO 17365, ISO 17366 and ISO 17367 <\/td>\n<\/tr>\n | ||||||
628<\/td>\n | Annex V (normative) URN Code 40 encoding <\/td>\n<\/tr>\n | ||||||
631<\/td>\n | Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" Tracked Changes. Information technology. Radio frequency identification (RFID) for item management. Data protocol: data encoding rules and logical memory functions<\/b><\/p>\n |