SATO CL408E User Guide
Version 0.8
21/10/2004
Page 17 of 44
the identification code needs to be changed or where variable data is more important than
a unique identity.
As far as Class 1, Generation 2 specifications are concerned, it calls for RFID tags that are
WORM (write-once-read-many), which implies that it is one-time programmable, and
carries a 96-bit EPC (Electronic Product Code) with an additional 32 bits in order to
execute error correction and the kill command. The kill command renders the tag
inoperable and is useful for end-users in areas such as the retail industry where tags need
to be killed at the point-of-sale and never allowed to be activated again. Another great
feature of this protocol is a robust anti-collision algorithm so an RFID reader can swiftly
read many EPC tags within its read field. This new standard will be optimised to work
globally by conforming to the ISO standards.
a unique identity.
As far as Class 1, Generation 2 specifications are concerned, it calls for RFID tags that are
WORM (write-once-read-many), which implies that it is one-time programmable, and
carries a 96-bit EPC (Electronic Product Code) with an additional 32 bits in order to
execute error correction and the kill command. The kill command renders the tag
inoperable and is useful for end-users in areas such as the retail industry where tags need
to be killed at the point-of-sale and never allowed to be activated again. Another great
feature of this protocol is a robust anti-collision algorithm so an RFID reader can swiftly
read many EPC tags within its read field. This new standard will be optimised to work
globally by conforming to the ISO standards.
This is the most flexible type of tag, allowing users to read and write data into the tag’s
memory. They are typically used as data loggers, and therefore contain more memory
space than what is needed for just a simple ID number.
memory. They are typically used as data loggers, and therefore contain more memory
space than what is needed for just a simple ID number.
These tags contain on-board sensors for recording parameters like temperature, pressure
and motion, which can be recorded by writing into the tags memory. As sensor readings
must be taken in the absence of a reader, the tags are either semi-passive or active.
and motion, which can be recorded by writing into the tags memory. As sensor readings
must be taken in the absence of a reader, the tags are either semi-passive or active.
Similar to miniature radio devices, Class 4 tags are capable of communicating with other
tags and devices without the presence of a reader, denoting that they are active tags with
their own battery power source.
Q: What are the benefits of read-only vs. read-write tags?
tags and devices without the presence of a reader, denoting that they are active tags with
their own battery power source.
Q: What are the benefits of read-only vs. read-write tags?
Read-only
tags:
tags:
These RFID tags generally provide a fixed factory-set
identification code that is tamperproof. The unique
code, known as a “License Plate”, enables the tag to be
cross-referenced with a database, thereby allowing the
tagged item to be closely followed and monitored. The
data on the EPC is a unique serial number.
identification code that is tamperproof. The unique
code, known as a “License Plate”, enables the tag to be
cross-referenced with a database, thereby allowing the
tagged item to be closely followed and monitored. The
data on the EPC is a unique serial number.
Read-write
tags:
The customer can modify the tag’s data. This offers
advantages in many applications where the
identification code needs to be changed, or where
variable data is more important than a unique identity.
PROS AND CONS TO USING RFID