GB/T 29768-2013 English PDF
Price & Delivery
US$555.00 · In stock · Download in 9 secondsGB/T 29768-2013: Information technology - Radio frequency identification - Air interface protocol at 800/900 MHz
Delivery: 9 seconds. True-PDF full-copy in English & invoice will be downloaded + auto-delivered via email. See step-by-step procedure
Status: Valid
| Standard ID | USD | BUY PDF | Delivery | Standard Title (Description) | Status |
| GB/T 29768-2013 | 555 | Add to Cart | Auto, 9 seconds. | Information technology - Radio frequency identification - Air interface protocol at 800/900 MHz | Valid |
Click to Preview this PDF
Similar standards
GB/T 29768-2013: Information technology - Radio frequency identification - Air interface protocol at 800/900 MHz
---This is an excerpt. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.), auto-downloaded/delivered in 9 seconds, can be purchased online: https://www.ChineseStandard.net/PDF.aspx/GBT29768-2013
GB NATIONAL STANDARD OF THE PEOPLE’S REPUBLIC OF CHINA ICS 35.220.01 L 64 Information technology - Radio frequency identification - Air interface protocol at 800/900 MHz Issued on. SEPTEMBER 18, 2013 Implemented on. MAY 01, 2014 Issued by. General Administration of Quality Supervision, Inspection and Quarantine; Standardization Administration of PRC.
Table of Contents
Foreword... 5 Introduction... 6 1 Scope... 11 2 Normative references... 11 3 Terms and definitions... 11 4 Symbols and abbreviations... 11 5 Physical layer and media access control layer... 14 6 Working method of protocol... 27 7 Summary of air interface parameters... 81 Appendix A (Informative) Checking end conditions... 84 Appendix B (Normative) Tables of tag state transitions... 85 Appendix C (Normative) Tables of command responses of tag... 95 Appendix D (Normative) CRC calculation... 106 Appendix E (Normative) Operation state returned by the tag... 107Foreword
This standard was drafted in accordance with the rules given in GB/T 1.1-2009. This standard was proposed by and shall be under the jurisdiction of the National Information Technology Standardization Technical Committee (SAC/TC 28). Drafting organizations of this standard. Chinese People's Liberation Army National University of Defense Technology, Ministry of Industry and Information Technology Electronics Industry Standardization Research Institute, Beijing Zhongdian Huada Design Co., Ltd., Tianjin Zhongxing Zhilian Technology Co., Ltd., Ruixin Lianke (Beijing) Electronic Technology Co., Ltd., Xi'an Xidian Jietong Wireless Network Communication Co., Ltd., Shenzhen Yuanwanggu Information Technology Co., Ltd., National Radio Monitoring Center, Beijing University of Aeronautics and Astronautics, Shanghai Juxing Instrument Co., Ltd., Beijing Tongfang Microelectronics Co., Ltd., Xidian University, China Article Coding Center, Shanghai Kunrui Electronic Technology Co., Ltd. The main drafters of this standard. Li Jiancheng, Geng Li, Gao Lin, Wang Hongyi, Feng Jing, Yang Qing, Gu Xiaochen, Shen Hongwei, Wang Li, Guan Chao, Cao Jun, Wang Zheng, Du Zhiqiang, Lan Tian, Song Jiwei, Jin Qian, Wang Wenfeng, Xia Dina, Liu Wenli, Cao Guoshun, Zheng Liming, Wu Jianfei, Li Cong, Zhang Bingbing, Feng Hanjiong, Song Qizhu, Zhang Youguang, Chen Ke, Wu Xingjun, Liu Weifeng, Wang Yi, Li Zhuofan, Qiao Shenjie, Zhu Zheng.1 Scope
This standard specifies the physical layer and media access control layer parameters and protocol working methods of the air interface in 840 MHz ~ 845 MHz and 920 MHz ~ 925 MHz radio frequency identification system. This standard applies to the design, production, testing, use of tags and readers for radio frequency identification systems in the frequency bands of 840 MHz ~ 845 MHz and 920 MHz ~ 925 MHz.2 Normative references
The following documents are essential to the application of this document. For the dated documents, only the versions with the dates indicated are applicable to this document; for the undated documents, only the latest version (including all the amendments) are applicable to this standard. GB/T 29261.3-2012 Information technology - Automatic identification and data capture (AIDC) techniques - Vocabulary - Part 3.Radio-frequency identification3 Terms and definitions
The terms and definitions as defined in GB/T 29261.3-2012 as well as the following terms and definitions apply to this document.4 Symbols and abbreviations
The following symbols and abbreviations apply to this document. 4.1 Symbols fc - Channel center frequency; 4.2 Abbreviations AK - Authentication key;5 Physical layer and media access control layer
5.1 Communication interaction model The reader uses TPP to encode baseband data, uses DSB-ASK or SSB-ASK to modulate the radio frequency carrier, to send commands to one or more tags. After the command is sent, the reader continues to send the unmodulated radio frequency carrier and listens to the response data pack from the tag. 5.2 The physical layer and media access control layer from the reader to the tag 5.2.1 General requirements The reader uses TPP to encode baseband data. The reader shall support the DSB-ASK or SSB-ASK modulation method. The tag shall be able to demodulate the DSB-ASK and SSB-ASK modulation method. 5.2.7 Data encoding The reader uses the TPP as shown in Figure 4 to encode the baseband data. 5.2.8 Preamble The forward-link shall use the preamble communication as shown in Figure 5. The preamble consists of a separator, a calibration symbol, a calibration symbol. The length tolerance of the separator is ±5%; the length tolerance of the calibration symbol 1 and the calibration symbol 2 are both ±1%.6 Working method of protocol
6.1 Anti-collision mechanism Multi-tag anti-collision uses the DDS-BT mechanism, as shown in Figure 15.In this mechanism, the initial value of the tag time slot counter is set to 0.The time slot counter is gradually adjusted according to subsequent commands. When the time slot counter is 0, the tag jumps from the Arbitrate state to the reply state and starts to respond to the reader. 6.2 Tag storage area structure 6.2.1 Overview The storage of tags is divided into four logical storage areas. tag information area, coding area, security area, user area. Among them, the user area is an optional area. Each logical storage area contains one or more words, as shown in Figure 16. 6.2.2 Tag information area 00h ~ 07h in the tag information area store the assigned identifier in the tag TID. The location above 08h in the tag information area stores other data except the assigned identifier. 6.2.5 User area The user area stores user-defined information. The tag may have no user area, or the user area can be divided into several subareas according to actual needs, up to 16 subareas. The structure of the multi-user area division is as shown in Figure 20.Each user subarea can have a different access password. 6.4 Tag state 6.4.1 General requirements Tags that support security authentication shall include 8 states. ready, arbitrate, reply, acknowledged, authentication, open, secured, killed; tags that do not support security authentication shall include 7 states. ready, arbitrate, reply, acknowledged, open, secured, killed. 6.5 Reader command set 6.5.1 General requirements The command set of the reader is divided into two groups, namely the checking group command and the access group command. The command code is as shown in Table 8.The necessary commands are those commands that the reader and the tag shall support; optional commands are those that the reader and tag may support. 6.5.9 Reply error command The tag shall execute the reply error command as shown in Table 18.Tags in the reply state and acknowledged state, after receiving the reply error command, jump to the arbitrate state without changing their checking flag. Tags in the authentication state, open state, security state, after receiving the reply error command, jump to ready state and do not change its checking flag. Tags in arbitrate state, after receiving the reply error command, keep the current state without changing their checking flag. Tags in the ready state and killed state do not respond to the error command. 6.7 Secure communication protocol Tags that require secure communication can use the following secure communication protocols.7 Summary of air interface parameters
7.1 Summary of physical layer and media access control layer parameters The physical layer and media access control layer parameters from the reader to the tag are as shown in Table 56. ......Source: Above contents are excerpted from the full-copy PDF -- translated/reviewed by: www.ChineseStandard.net / Wayne Zheng et al.