http://ceshi8.cn1.61916.com/upfile/img/160827/images/1472288443.jpg Shenzhen Fonkan Technology Co.,Ltd. 
Focus on RFID for 13 years

 

   Joerica@fonkan.com
Emily@fonkan.com
  • 1
  • 2
  • 3
  • 4
  • 5
    • 000
    • 001
    • 002
    • 003
    • 005
    Contact

    Oversea Sales--joerica
    Tel: +86-755-23202996
    Mob: +8617603074791

    Skype: joerica@fonkan.com
    Whatsapp:+8617603074791

    E-mail: joerica@fonkan.com

    Add: Rm#308, No,213, Shajing Road, Shajing, Baoan District, Shenzhen, Guangdong, China

    About Us
    Current Location: > About Us
    • Author:
    • Source:
    • Date: 2022-05-05
    • Views: 1019Times

    Uhf electronic tags are generally divided into four areas:

     

     

     

    (Reserve) : address: 0-3;Address: 0-1 stores 32bit kill password (kill), default: 00 00 00 00 00;

     

    Store 32bit Access password (Access), default: 00 00 00 00.

     

    When the region is not accessed or killed, the data in the region can be rewritten at will.

     

    [EPC area] : address: 2-7;Store the 96bit ID number, which is the area where the data that is normally read by our device is stored.When the region is not accessed or killed, the data in the region can be rewritten at will.

     

    TID(sector TID) : address: 0-5;Stores a unique and unrewritable ID number of 96bit globally.

     

    [User(User area)] : address: 0-31;Store 512 bits of data.By default, each address is: 00, 00. When the region is not encrypted or encrypted, the data in the region can be rewritten at will.

     

     

    All the above areas are illustrated with the commonly used label chip Alien H3 as an example.Different chip, corresponding area data and actual function may be different

     

     

    To read the USER zone data, you are advised to look at the EPC protocol first. The basic operations of EPC are read, write, lock, and kill.

    The protocol document is very detailed. In addition, if you are doing application development, you need to operate according to the API provided by each manufacturer, and you need to read the API functions of each manufacturer.

    If you are developing the underlying baseband, you should be more familiar with the EPC protocol.

    Copyright © Shenzhen Fonkan Technology Co.,Ltd.
    URL: www.fonkan.com    E-mail: joerica@fonkan.com     ICP:粤ICP备17081219号-1