首页资源分类其它科学普及 > ISO/IEC CD 15693-3

ISO/IEC CD 15693-3

已有 460559个资源

下载专区


TI最新应用解决方案

工业电子 汽车电子 个人消费电子

文档信息举报收藏

标    签: iso156933

分    享:

文档简介

ISO/IEC CD 15693-3

文档预览

© ISO/IEC 1999 – All rights reserved 1654 ISO/IEC JTC 1/SC 17 N Date: 1999-11-17 ISO/IEC CD 15693-3 ISO/IEC JTC 1/SC 17/WG 8 Secretariat: DIN Identification cards — Contactless integrated circuit(s) cards - Vicinity cards — Part 3: Anticollision and transmission protocol Cartes d'identification — Cartes à circuit(s) intégré(s) sans contact - Cartes de Vicinité — Partie 3 : Anticollision et protocole de transmission Warning This document is not an ISO International Standard. It is distributed for review and comment. It is subject to change without notice and may not be referred to as an International Standard. Recipients of this document are invited to submit, with their comments, notification of any relevant patent rights of which they are aware and to provide supporting documentation. Document type: International Standard Document subtype: Document stage: (30) Commitee Document language: E D:\1Standards\ISO-TF3\15693-3\ISO-IEC 15693-3 (E).doc STD Version 1.0 ISO/IEC CD 15693-3 Copyright notice This ISO document is a working draft or committee draft and is copyright-protected by ISO. While the reproduction of working drafts or committee drafts in any form for use by participants in the ISO standards development process is permitted without prior permission from ISO, neither this document nor any extract from it may be reproduced, stored or transmitted in any form for any other purpose without prior written permission from ISO. Requests for permission to reproduce this document for the purpose of selling it should be addressed as shown below or to ISO’s member body in the country of the requester: [Indicate : the full address telephone number fax number telex number and electronic mail address as appropriate, of the Copyright Manager of the ISO member body responsible for the secretariat of the TC or SC within the framework of which the draft has been prepared] Reproduction for sales purposes may be subject to royalty payments or a licensing agreement. Violators may be prosecuted. ii ISO/IEC CD 15693-3: 1999 (E) Contents Introduction......................................................................................................................................................... vi 1 Scope ....................................................................................................................................................... 1 2 Normative references .............................................................................................................................. 1 3 3.1 3.1.1 3.1.2 3.2 3.3 Definitions, abbreviations and symbols................................................................................................. 1 Definitions................................................................................................................................................ 1 Anticollision loop ................................................................................................................................... 1 Byte .......................................................................................................................................................... 2 Abbreviations .......................................................................................................................................... 2 Symbols ................................................................................................................................................... 2 4 Definition of data elements ..................................................................................................................... 2 4.1 Unique identifier (UID)............................................................................................................................. 2 4.2 Application family identifier (AFI) ........................................................................................................... 3 4.3 Data storage format identifier (DSFID) ................................................................................................... 6 4.4 CRC .......................................................................................................................................................... 6 5 VICC memory organization ..................................................................................................................... 6 6 Block security status............................................................................................................................... 7 7 7.1 7.1.1 7.1.2 7.1.3 7.2 7.2.1 7.3 7.3.1 7.3.2 7.4 7.4.1 7.4.2 7.4.3 7.4.4 Overall protocol description ................................................................................................................... 7 Modes ...................................................................................................................................................... 8 Addressed mode ..................................................................................................................................... 8 Non-Addressed mode ............................................................................................................................. 8 Select mode ............................................................................................................................................. 8 Request format ........................................................................................................................................ 9 Request flags........................................................................................................................................... 9 Response format ................................................................................................................................... 10 Response flags...................................................................................................................................... 11 Response error code............................................................................................................................. 11 VICC states ............................................................................................................................................ 12 Power-off state ...................................................................................................................................... 12 Ready state ............................................................................................................................................ 12 Quiet state.............................................................................................................................................. 12 Selected state ........................................................................................................................................ 13 8 Anticollision ......................................................................................................................................... 14 8.1 Request parameters .............................................................................................................................. 14 8.2 Request processing by the VICC.......................................................................................................... 15 8.3 Explanation of an anticollision sequence ........................................................................................... 16 8.4 Timing definition ................................................................................................................................... 19 9 9.1 9.2 9.2.1 9.2.2 9.3 9.3.1 9.3.2 9.3.3 9.3.4 9.3.5 9.3.6 Commands............................................................................................................................................. 20 Command codes.................................................................................................................................... 21 Mandatory commands........................................................................................................................... 21 Inventory................................................................................................................................................ 21 Stay quiet............................................................................................................................................... 22 Optional commands .............................................................................................................................. 23 Read single block .................................................................................................................................. 23 Write single block.................................................................................................................................. 24 Lock block ............................................................................................................................................. 24 Read multiple blocks............................................................................................................................. 25 Write multiple blocks............................................................................................................................. 26 Select ..................................................................................................................................................... 27 © ISO/IEC 1999 – All rights reserved iii ISO/IEC CD 15693-3 9.3.7 Reset to ready ....................................................................................................................................... 28 9.3.8 Write AFI ................................................................................................................................................ 29 9.3.9 Lock AFI................................................................................................................................................. 29 9.3.10 Write DSFID command .......................................................................................................................... 30 9.3.11 Lock DSFID............................................................................................................................................ 31 9.3.12 Get system Information......................................................................................................................... 31 9.3.13 Get multiple block security status........................................................................................................ 33 9.4 Custom commands ............................................................................................................................... 34 9.5 Proprietary commands.......................................................................................................................... 35 Annex A (informative) Compatibility with other card standards ...................................................................... 36 Annex B (informative) Bibliography of other ISO/IEC card standards. ............................................................ 37 Annex C (informative) VCD pseudo-code for anticollision.............................................................................. 38 Annex D (informative) Cyclic Redundancy Check (CRC) ................................................................................. 40 D.1 The CRC error detection method ......................................................................................................... 40 D.2 CRC calculation example...................................................................................................................... 40 iv © ISO/IEC 1999 – All rights reserved ISO/IEC CD 15693-3: 1999 (E) Foreword ISO (the International Organization for Standardization) and IEC (the International Electrotechnical Commission) form the specialized system for worldwide standardization. National bodies that are members of ISO or IEC participate in the development of International Standards through technical committees established by the respective organization to deal with particular fields of technical activity. ISO and IEC technical committees collaborate in fields of mutual interest. Other international organizations, governmental and non-governmental, in liaison with ISO and IEC, also take part in the work. International Standards are drafted in accordance with the rules given in the ISO/IEC Directives, Part 3. In the field of information technology, ISO and IEC have established a joint technical committee, ISO/IEC JTC 1. Draft International Standards adopted by the joint technical committee are circulated to national bodies for voting. Publication as an International Standard requires approval by at least 75 % of the national bodies casting a vote. Attention is drawn to the possibility that some of the elements of this part of ISO/IEC 15693 may be the subject of patent rights. ISO and IEC shall not be held responsible for identifying any or all such patent rights. International Standard ISO/IEC 15693-3 was prepared by Joint Technical Committee ISO/IEC JTC 1, Information Technology, Subcommittee SC 17, Cards and personal identification. This second/third/... edition cancels and replaces the first/second/... edition (), [clause(s) / subclause(s) / table(s) / figure(s) / annex(es)] of which [has / have] been technically revised. ISO/IEC 15693 consists of the following parts, under the general title Identification cards — Contactless integrated circuit(s) cards - Vicinity cards:  Part 1: Physical characteristics  Part 2: Radio frequency power and signal interface  Part 3: Anticollision and transmission protocol  Part 4: Extended command set and security features © ISO/IEC 1999 – All rights reserved v ISO/IEC CD 15693-3 Introduction ISO/IEC 15693 is one of a series of International Standards describing the parameters for identification cards as defined in ISO/IEC 7810 and the use of such cards for international interchange. This part of ISO/IEC 15693 describes the anticollision and transmission protocols This International Standard does not preclude the incorporation of other standard technologies on the card. Contactless card standards cover a variety of types as embodied in ISO/IEC 10536 (Close-coupled cards), ISO/IEC 14443 (Proximity cards), ISO/IEC 15693 (Vicinity cards). These are intended for operation when very near, nearby and at a longer distance from associated coupling devices respectively. vi © ISO/IEC 1999 – All rights reserved ISO/IEC CD 15693-3: 1999 (E) Identification Cards — Contactless integrated circuit(s) cards - Vicinity cards — Part 3: Anticollision and transmission protocol 1 Scope This part of ISO/IEC 15693 describes: • protocol and commands, • other parameters required to initialize communications between a VICC and a VCD, • methods to detect and communicate with one card among several cards ("anticollision"), • optional means to ease and speed up the selection of one among several cards based on application criteria. 2 Normative references The following standards contain provisions that, through reference in this text, constitute provisions of this part of ISO/IEC 15693. At the time of publication, the editions indicated were valid. All standards are subject to revision, and parties to agreements based on this part of ISO/IEC 15693 are encouraged to investigate the possibility of applying the most recent editions of the standards listed below. Members of ISO and IEC maintain registers of currently valid International Standards. ISO/IEC 15693, Identification cards - Contactless integrated circuit(s) cards – Vicinity cards - Part 1: Physical characteristics. Part 2: Radio frequency power and signal interface ISO/IEC 10373, Identification cards - Test methods – Part 7: Vicinity cards ISO/IEC 13239, Information technology – Telecommunications and information exchange between systems – High level data link control (HDLC) procedures ISO/IEC 7816-5, Identification cards – Integrated circuit(s) card with contacts – Part 5: Numbering system and registration procedure for application identifiers 3 Definitions, abbreviations and symbols 3.1 Definitions 3.1.1 Anticollision loop Algorithm used to prepare for and handle a dialogue between a VCD and one or more VICCs from several in its energizing field. © ISO/IEC 1999 – All rights reserved 1 INTERNATIONAL STANDARD © ISO/IEC ISO/IEC CD 15693-3: 1999 (E) 3.1.2 Byte A byte consists of 8 bits of data designated b1 to b8, from the most significant bit (MSB, b8) to the least significant bit (LSB, b1). 3.2 Abbreviations AFI Application Family Identifier CRC Cyclic Redundancy Check DSFID Data Storage Format IDentifier EOF End Of Frame LSB Least Significant Bit MSB Most Significant Bit RFU Reserved for Future Use SOF Start Of Frame UID Unique IDentifier VCD Vicinity Coupling Device VICC Vicinity Integrated Circuit Card 3.3 Symbols fc Frequency of operating field (carrier frequency) 4 Definition of data elements 4.1 Unique identifier (UID) The VICCs are uniquely identified by a 64 bits unique identifier (UID). This is used for addressing each VICC uniquely and individually, during the anticollision loop and for one-to-one exchange between a VCD and a VICC. The UID shall be set permanently by the IC manufacturer in accordance with figure 1. MSB 64 57 56 49 48 ‘E0' IC Mfg code LSB 1 IC manufacturer serial number Figure 1 — UID format The UID comprises • The 8 MSB bits shall be 0xE0, 2 © ISO/IEC 1999 – All rights reserved ISO/IEC CD 15693-3: 1999 (E) • The IC manufacturer code, on 8 bits according to ISO/IEC 7816-6/AM1, • A unique serial number on 48 bits assigned by the IC manufacturer. 4.2 Application family identifier (AFI) AFI (Application family identifier) represents the type of application targeted by the VCD and is used to extract from all the VICCs present only the VICCs meeting the required application criteria. It may be programmed and locked by the respective commands. The most significant nibble of AFI is used to code one specific or all application families, as defined in table 1. The least significant nibble of AFI is used to code one specific or all application sub-families. Sub-family codes different from 0 are proprietary. © ISO/IEC 1999 – All rights reserved 3 INTERNATIONAL STANDARD © ISO/IEC ISO/IEC CD 15693-3: 1999 (E) AFI most significant nibble ‘0’ ‘X’ 'X' ‘0’ ‘1' '2' '3' '4' ‘5’ '6' '7' '8' '9' 'A' 'B' 'C' 'D' 'E' ‘F’ AFI Least significant nibble ‘0’ '0' ‘Y’ ‘Y’ ‘0’, ‘Y’ ‘0’, ‘Y’ ‘0’, ‘Y’ ‘0’, ‘Y’ ‘0’, ‘Y’ ‘0’, ‘Y’ ‘0’, ‘Y’ ‘0’, ‘Y’ ‘0’, ‘Y’ ‘0’, ‘Y’ ‘0’, ‘Y’ ‘0’, ‘Y’ ‘0’, ‘Y’ ‘0’, ‘Y’ ‘0’, ‘Y’ Meaning VICCs respond from Examples / note All families and subfamilies No applicative preselection All sub-families of family X Wide applicative preselection Only the Yth sub-family of family X Proprietary sub-family Y only Transport Mass transit, Bus, Airline,... Financial IEP, Banking, Retail,... Identification Access control,... Telecomunication Public telephony, GSM,... Medical Multimedia Internet services.... Gaming Data storage Portable files, ... Item management Express parcels Postal services Airline bags NOTE X = ‘1’ to ‘F’, Y = ‘1’ to ‘F’ Table 1 — AFI coding The support of AFI by the VICC is optional. If AFI is not supported by the VICC and if the AFI flag is set, the VICC shall not answer whatever the AFI value is in the request. If AFI is supported by the VICC, it shall answer according to the matching rules described in table 1. 4 © ISO/IEC 1999 – All rights reserved Inventory Request Received ISO/IEC CD 15693-3: 1999 (E) AFI Flag No Set Answer Yes No AFI supported by VICC Yes No AFI Value =0 Yes Answer NO Answer No AFI value = VICC’s Yes NO Answer Answer Note: “Answer” means that the VICC shall answer to the Inventory request. Figure 2 — VICC decision tree for AFI © ISO/IEC 1999 – All rights reserved 5 INTERNATIONAL STANDARD © ISO/IEC ISO/IEC CD 15693-3: 1999 (E) 4.3 Data storage format identifier (DSFID) The Data storage format identifier indicates how the data is structured in the VICC memory. It may be programmed and locked by the respective commands. It is coded on one byte. It allows for instant knowledge on the logical organization of the data. If its programming is not supported by the VICC, the VICC shall respond with the value zero (0). 4.4 CRC The CRC shall be calculated as per the definition in ISO/IEC 13239. The initial register content shall be all ones : "FFFF". The two bytes CRC are appended to each request and each response, within each frame, before the EOF. The CRC is calculated on all the bytes after the SOF up to but not including the CRC field. Upon reception of a request from the VCD, the VICC shall verify that the CRC value is valid. If it is invalid, it shall discard the frame and shall not answer (modulate). Upon reception of a response from the VICC, it is recommended that the VCD verify that the CRC value is valid. If it is invalid, actions to be performed are left to the responsibility of the VCD designer. The CRC is transmitted least significant byte first. Each byte is transmitted least significant bit first. LSBit LSByte CRC 16 (8bits) MSBit LSBit MSByte CRC 16 (8 bits) MSBit Figure 3 — CRC bits and bytes transmission rules 5 VICC memory organization The commands specified in this standard assume that the physical memory is organized in blocks (or pages) of fixed size. • Up to 256 blocks can be addressed. • Block size can be of up to 256 bits. • This leads to a maximum memory capacity of up to 8 KBytes (64 KBits). Note: The structure allows for future extension of the maximum memory capacity. The commands described in this standard allow the access (read and write) by block(s). There is no implicit or explicit restriction regarding other access method (e.g. by byte or by logical object in future revision(s) of the standard or in custom commands. 6 © ISO/IEC 1999 – All rights reserved ISO/IEC CD 15693-3: 1999 (E) 6 Block security status The block security status is coded on one byte. It is an element of the protocol. There is no implicit or explicit assumption that the 8 bits are actually implemented in the physical memory structure of the VICC. When it is present in a request or a response, the VICC shall interpret (request) or set (response) the supported bits according to the description below: Bit Nb Bit 1 Bit 2 to 8 Flag name Locked RFU Table 2 — Block security status State Description 0 Not locked 1 Locked Shall be set to 0 7 Overall protocol description Protocol concept The transmission protocol (or protocol) defines the mechanism to exchange instructions and data between the VCD and the VICC, in both directions. It is based on the concept of "VCD talks first". This means that any VICC does not start transmitting (i.e. modulating according to 15693-2) unless it has received and properly decoded an instruction sent by the VCD. • The protocol is based on an exchange of • a request from the VCD to the VICC • a response from the VICC(s) to the VCD • Each request and each response are contained in a frame. The frame delimiters (SOF, EOF) are specified in ISO/IEC 15693-2. • Each request consists of the following fields: • Flags • Command code • Mandatory and optional parameters fields, depending on the command • Application data fields • CRC • Each response consists of the following fields: • Flags • Mandatory and optional parameters fields, depending on the command © ISO/IEC 1999 – All rights reserved 7 INTERNATIONAL STANDARD © ISO/IEC ISO/IEC CD 15693-3: 1999 (E) • Application data fields • CRC • The protocol is bit-oriented. The number of bits transmitted in a frame is a multiple of eight (8), i.e. an integer number of bytes. • A single-byte field is transmitted least significant bit (LSBit) first. • A multiple-byte field is transmitted least significant byte (LSByte) first, each byte is transmitted least significant bit (LSBit) first. • The setting of the flags indicates the presence of the optional fields. When the flag is set (to one), the field is present. When the flag is reset (to zero), the field is absent. • RFU flags shall be set to zero (0). 7.1 Modes The term mode refers to the mechanism to specify in a request the set of VICC’s that shall answer to the request. 7.1.1 Addressed mode When the Address_flag is set to 1 (addressed mode), the request shall contain the unique ID (UID) of the addressed VICC. Any VICC receiving a request with the Address_flag set to 1 shall compare the received unique ID (address) to its own ID. It it matches, it shall execute it (if possible) and return a response to the VCD as specified by the command description. If it does not match, it shall remain silent. 7.1.2 Non-addressed mode When the Address_flag is set to 0 (non-addressed mode), the request shall not contain a unique ID. Any VICC receiving a request with the Address_flag set to 0 shall execute it (if possible) and shall return a response to the VCD as specified by the command description. 1) 7.1.3 Select mode When the Select_flag is set to 1 (select mode), the request shall not contain a VICC unique ID. The VICC in the selected state receiving a request with the Select_flag set to 1 shall execute it (if possible) and shall return a response to the VCD as specified by the command description. Only the VICC in the selected state shall answer to a request having the select flag set to 1. 1) Sub-carrier_flag refers to the VICC-to-VCD communication as specified in ISO/IEC 15693-2. 8 © ISO/IEC 1999 – All rights reserved ISO/IEC CD 15693-3: 1999 (E) 7.2 Request format The request consists of the following fields: • Flags • Command code (see clause 9) • Parameters and data fields • CRC (see clause 4.4) SOF Flags Command Parameters code Data CRC EOF Figure 4 — General request format 7.2.1 Request flags In a request, the field "flags" specifies the actions to be performed by the VICC and whether corresponding fields are present or not. It consists of eight bits. Bit Nb Bit 1 Bit 2 Bit 3 Bit 4 Table 3 — Request flags 1 to 4 definition Flag name Sub-carrier_flag Data_rate_flag Inventory_flag Protocol Extension_flag State 0 1 0 1 0 1 0 Description A single sub-carrier frequency shall be used by the VICC Two sub-carriers shall be used by the VICC Low data rate shall be used High data rate shall be used Flags 5 to 8 meaning is according to table 4 Flags 5 to 8 meaning is according to table 5 No protocol format extension 1 Protocol format is extended. Reserved for future use. Note: 1. Sub-carrier_flag refers to the VICC-to-VCD communication as specified in ISO/IEC 15693-2. 2. Data_rate_flag refers to the VICC-to-VCD communication as specified in ISO/IEC 15693-2. © ISO/IEC 1999 – All rights reserved 9 INTERNATIONAL STANDARD © ISO/IEC ISO/IEC CD 15693-3: 1999 (E) Table 4 — Request flags 5 to 8 definition when inventory flag is NOT set Bit Nb Bit 5 Flag name Select_flag Bit 6 Address_flag Bit 7 Bit 8 Custom_flag RFU State 0 1 0 1 0 1 0 1 Description Request shall be executed by any VICC according to the setting of Address_flag Request shall be executed only by VICC in selected state Request is not addressed. UID field is not present. It shall be executed by any VICC. Request is addressed. UID field is present. It shall be executed only by the VICC whose UID matches the UID specified in the request. Meaning is defined by the Custom command Meaning is defined by the Custom command Note: if the Select_flag is set to 1, the Address_flag shall be set to 0 and the UID field shall not be present in the request. Table 5 — Request flags 5 to 8 definition when inventory flag is set Bit Nb Bit 5 Flag name AFI flag Bit 6 Nb_slots_flag Bit 7 Custom_flag Bit 8 RFU State 0 1 0 1 0 1 0 1 Description AFI field is not present AFI field is present 16 slots 1 slot Meaning is defined by the Custom command Meaning is defined by the Custom command 7.3 Response format The response consists of the following fields: • Flags • one or more parameter fields • Data • CRC (see clause 4.4) 10 © ISO/IEC 1999 – All rights reserved ISO/IEC CD 15693-3: 1999 (E) SOF Flags Parameters Data CRC EOF Figure 5 — General response format 7.3.1 Response flags In a response, it indicates how actions have been performed by the VICC and whether corresponding fields are present or not. It consists of eight bits. Bit Nb Bit 1 Bit 2 Bit 3 Bit 4 Bit 5 Bit 6 Bit 7 Bit 8 Table 6 — Response flags 1 to 8 definition Flag name Error_flag RFU RFU Extension_flag RFU RFU RFU RFU State 0 1 Description No error Error detected. Error code is in the "Error" field. 0 No protocol format extension. 1 Protocol format is extended. Reserved for future use. 7.3.2 Response error code If the error flag is set by the VICC in the response, the error code field is present and provides information about the error that occurred. The following error codes are specified. Other codes are reserved for future use. © ISO/IEC 1999 – All rights reserved 11 INTERNATIONAL STANDARD © ISO/IEC ISO/IEC CD 15693-3: 1999 (E) Error code 0x01 0x02 0x0F 0x10 0x11 0x12 0x13 0x14 0xA0 - 0xDF all others Table 7 — Response error code definition Meaning The command is not supported, i.e. the request code is not recognized. The command is not recognized, for example: a format error occurred. Unknown error. The specified block is not available (doesn’t exist). The specified block is already -locked and thus cannot be locked again The specified block is locked and its content cannot be changed. The specified block was not successfully programmed. The specified block was not successfully locked. Custom command error codes RFU Note: If the VICC does not support error codes listed in table 7, it shall answer with the error code 0x0F (unknown error). 7.4 VICC states A VICC can be in 4 states: • Power-off • Ready • Quiet • Selected The transition between these states is specified in figure 4. The support of power-off, ready and quiet states is mandatory. The support of selected state is optional. 7.4.1 Power-off state The VICC is in the power-off state when it cannot be activated by the VCD. 7.4.2 Ready state The VICC is in the Ready state when it is activated by the VCD. It shall process any request where the select flag is not set. 7.4.3 Quiet state When in the quiet state, the VICC shall process any request where the Inventory_flag is not set AND where the Addressed_flag is set. 12 © ISO/IEC 1999 – All rights reserved ISO/IEC CD 15693-3: 1999 (E) 7.4.4 Selected state When in the selected state, the VICC shall answer only to request having the select flag set. Figure 5: VICC state transition diagram Power-off Out of Field Out of Field In Field Ready Any other Command where Select_flag is not set Reset to ready Quiet Stay quiet(UID) Select (UID) Reset to Ready Select(UID) where Select_flag is set ) Stay quiet(UID) Selected Out of Field Any other command where the Addressed_flag is set Any other command Note: The intention of the state transition method is that only one VICC should be in the selected state at a time. © ISO/IEC 1999 – All rights reserved 13 INTERNATIONAL STANDARD © ISO/IEC ISO/IEC CD 15693-3: 1999 (E) 8 Anticollision The purpose of the anticollision sequence is to make an inventory of the VICCs present in the VCD field by their unique ID (UID). The VCD is the master of the communication with one or multiple VICCs. It initiates card communication by issuing the inventory request. The VICC shall send its response in the slot determined or shall not respond, according to the algorithm described in clause 8.2. 8.1 Request parameters When issuing the inventory command, the VCD shall: • set the Nb_slots_flag to the desired setting, • add after the command field the mask length and the mask value. SOF Flags 8 bits Command 8 bits Mask length 8 bits Mask value 0 to 8 bytes EOF Figure 6 — Inventory request format • The mask length is the number of significant bits of the mask value. • The mask value is contained in an integer number of bytes. The mask length indicates the number of significant bits. LSB shall be transmitted first. • If the mask length is not a multiple of 8 (bits), the mask value MSB shall be padded with the required number of null (set to 0) bits so that the mask value is contained in an integer number of bytes. • The next field starts on the next byte boundary. 14 © ISO/IEC 1999 – All rights reserved ISO/IEC CD 15693-3: 1999 (E) MSB 0000 Pad LSB 0100 1100 1111 Value Figure 7 — Example of the padding of the mask In the example of the figure 6, the mask length is 12 bits. The mask value MSB is padded with four bits set to 0 The AFI field shall be present if the AFI_flag is set. The pulse shall be generated according to the definition of the EOF in ISO/IEC 15693-2. The first slot starts immediately after the reception of the request EOF. To switch to the next slot, the VCD sends an EOF. The following rules and restrictions apply: if no VICC answer is detected, the VCD may switch to the next slot by sending an EOF, if one or more VICC answers are received, the VCD shall wait until the VICC frames are completely received before sending an EOF for switching to the next slot. This is illustrated in figure 7 and the timing is described in table 8. 8.2 Request processing by the VICC Upon reception of a valid request, the VICC shall perform the following algorithm or its functional equivalent (implementation dependent). NbS is the total number of slots (1 or 16) SN is the current slot number (0 to 15) LSB (value, n) function returns the n less significant bits of value "&" is the concatenation operator Slot_Frame is either a SOF or an EOF SN= 0 if Nb_slots_flag then NbS =1 SN_length=0 else NbS = 16 SN_length=4 endif label1: if LSB(UID, SN_length + Mask_length) = LSB(SN, SN_length)&LSB(Mask, Mask_length) then transmit response to inventory request endif © ISO/IEC 1999 – All rights reserved 15 INTERNATIONAL STANDARD © ISO/IEC wait (Slot_Frame) if Slot_Frame= SOF then Stop anticollision and decode/process request exit endif if SN> 1) ^ POLYNOMIAL; } else { current_crc_value = (current_crc_value >> 1); } } } if (calculate_or_check_crc == CALC_CRC) © ISO/IEC 1999 – All rights reserved 41 INTERNATIONAL STANDARD © ISO/IEC ISO/IEC CD 15693-3: 1999 (E) { current_crc_value = ~current_crc_value; printf ("Generated CRC is 0x%04X\n", current_crc_value); // current_crc_value is now ready to be appended to the data stream // (first LSByte, then MSByte) } else // check CRC { if (current_crc_value == CHECK_VALUE) { printf ("Checked CRC is ok (0x%04X)\n", current_crc_value); } else { printf ("Checked CRC is NOT ok (0x%04X)\n", current_crc_value); } } } Figure D.1 — C-example to calculate or check the CRC16 according to ISO/IEC 13239 42 © ISO/IEC 1999 – All rights reserved

Top_arrow
回到顶部
EEWORLD下载中心所有资源均来自网友分享,如有侵权,请发送举报邮件到客服邮箱bbs_service@eeworld.com.cn 或通过站内短信息或QQ:273568022联系管理员 高进,我们会尽快处理。