SL3S1203_1213 All information provided in this document is subject to legal disclaimers. © NXP Semiconductors N.V. 2014. All rights reserved.
Product data sheet
COMPANY PUBLIC
Rev. 4.4 — 17 March 2014
178844 19 of 37
NXP Semiconductors
SL3S1203_1213
UCODE G2iL and G2iL+
ReadProtect succeeds: After completing the ReadProtect the G2iL shall backscatter
the reply shown in Table 15
comprising a header (a 0-bit), the tag's handle, and a
CRC-16 calculated over the 0-bit and handle. Immediately after this reply the G2iL will
render itself to this ReadProtect mode. If the interrogator observes this reply within
20 ms then the ReadProtect completed successfully.
The G2iL encounters an error: The G2iL will backscatter an error code during the CW
period rather than the reply shown in the EPCglobal Spec (see Annex I for error-code
definitions and for the reply format).
ReadProtect does not succeed: If the interrogator does not observe a reply within
20 ms then the ReadProtect did not complete successfully. The interrogator may
issue a Req_RN command (containing the handle) to verify that the G2iL is still in the
interrogation zone, and may re-initiate the ReadProtect command.
The G2iL reply to the ReadProtect command will use the extended preamble shown in
EPCglobal Spec (Figure 6.11 or Figure 6.15), as appropriate (i.e. a Tag shall reply as if
TRext=1) regardless of the TRext value in the Query that initiated the round.
10.7.4 Reset ReadProtect
3
Reset ReadProtect allows an interrogator to clear the ProtectEPC and ProtectTID bits of
the Configuration Word. This will re-enable reading of the related G2iL memory content.
For details on the command response please refer to Table 17 “
Reset ReadProtect
command.
Table 14. ReadProtect command
Command RN CRC-16
# of bits 16 16 16
description 11100000 00000001 handle -
Table 15. G2iL reply to a successful ReadProtect procedure
Header RN CRC-16
# of bits 1 16 16
description 0 handle -
Table 16. ReadProtect command-response table
Starting State Condition Response Next State
ready all ready
arbitrate, reply,
acknowledged
all arbitrate
open all - open
secured valid handle & invalid
access password
arbitrate
valid handle & valid
non zero access
password
Backscatter handle,
when done
secured
invalid handle secured
killed all killed
SL3S1203_1213 All information provided in this document is subject to legal disclaimers. © NXP Semiconductors N.V. 2014. All rights reserved.
Product data sheet
COMPANY PUBLIC
Rev. 4.4 — 17 March 2014
178844 20 of 37
NXP Semiconductors
SL3S1203_1213
UCODE G2iL and G2iL+
After sending a Reset ReadProtect an interrogator shall transmit CW for the lesser of
T
Reply
or 20 ms, where T
Reply
is the time between the interrogator's Reset ReadProtect
command and the G2iL backscattered reply. A Req_RN command prior to the Reset
ReadProtect is necessary to successfully execute the command. A frame-sync must be
pre-pended the command.
An interrogator may observe three possible responses after sending a Reset
ReadProtect, depending on the success or failure of the operation:
Reset ReadProtect succeeds: After completing the Reset ReadProtect a G2iL will
backscatter the reply shown in Table 18
comprising a header (a 0-bit), the handle, and
a CRC-16 calculated over the 0-bit and handle. If the interrogator observes this reply
within 20 ms then the Reset ReadProtect completed successfully.
The G2iL encounters an error: The G2iL will backscatter an error code during the CW
period rather than the reply shown in Table 18
(see EPCglobal Spec for error-code
definitions and for the reply format).
Reset ReadProtect does not succeed: If the interrogator does not observe a reply
within 20 ms then the Reset ReadProtect did not complete successfully. The
interrogator may issue a Req_RN command (containing the handle) to verify that the
G2iL is still in the interrogation zone, and may reissue the Reset ReadProtect
command.
The G2iL reply to the Reset ReadProtect command will use the extended preamble
shown in EPCglobal Spec (Figure 6.11 or Figure 6.15), as appropriate (i.e. a G2iL will
reply as if TRext=1 regardless of the TRext value in the Query that initiated the round.
The Reset ReadProtect command is structured as following:
16 bit command
Password: 32 bit Access-Password XOR with 2 times current RN16
Remark: To generate the 32 bit password the 16 bit RN16 is duplicated and used two
times to generate the 32 bit (e.g. a RN16 of 1234 will result in 1234 1234).
16 bit handle
CRC-16 calculate over the first command-code bit to the last handle bit
Table 17. Reset ReadProtect command
Command Password RN CRC-16
# of bits 16 32 16 16
description 11100000
00000010
(access
password)
2*RN16
handle -
Table 18. G2iL reply to a successful Reset ReadProtect command
Header RN CRC-16
# of bits 1 16 16
description 0 handle -
SL3S1203_1213 All information provided in this document is subject to legal disclaimers. © NXP Semiconductors N.V. 2014. All rights reserved.
Product data sheet
COMPANY PUBLIC
Rev. 4.4 — 17 March 2014
178844 21 of 37
NXP Semiconductors
SL3S1203_1213
UCODE G2iL and G2iL+
10.7.5 ChangeEAS
3
UCODE G2iL equipped RFID tags will also feature a stand-alone operating EAS alarm
mechanism for fast and offline electronic article surveillance. The PSF bit of the
Configuration Word directly relates to the EAS Alarm feature. With an PSF bit set to '1' the
tag will reply to an EAS_Alarm command by backscattering a 64 bit alarm code without
the need of a Select or Query. The EAS is a built-in solution so no connection to a
backend database is required. In case the EAS_Alarm command is not implemented in
the reader a standard EPC SELCET to the Configuration Word and Query can be used.
When using standard SELECT/QUERY the EPC will be returned during inventory.
ChangeEAS can be executed from the Secured state only. The command will be ignored
if the Access Password is zero, the command will also be ignored with an invalid CRC-16
or an invalid handle, the G2iL will than remain in the current state. The CRC-16 is
calculated from the first command-code bit to the last handle bit. A frame-sync must be
pre-pended the command.
The G2iL reply to a successful ChangeEAS will use the extended preamble, as
appropriate (i.e. a Tag shall reply as if TRext=1) regardless of the TRext value in the
Query that initiated the round.
After sending a ChangeEAS an interrogator shall transmit CW for less than T
Reply
or
20 ms, where T
Reply
is the time between the interrogator's ChangeEAS command and the
G2iL backscattered reply. An interrogator may observe three possible responses after
sending a ChangeEAS, depending on the success or failure of the operation
ChangeEAS succeeds: After completing the ChangeEAS a G2iL will backscatter the
reply shown in Table 21
comprising a header (a 0-bit), the handle, and a CRC-16
calculated over the 0-bit and handle. If the interrogator observes this reply within
20 ms then the ChangeEAS completed successfully.
The G2iL encounters an error: The G2iL will backscatter an error code during the CW
period rather than the reply shown in Table 21
(see EPCglobal Spec for error-code
definitions and for the reply format).
Table 19. Reset ReadProtect command-response table
Starting State Condition Response Next State
ready all ready
arbitrate, reply,
acknowledged
all arbitrate
open valid handle & valid access password Backscatter handle,
when done
open
valid handle & invalid access password arbitrate
invalid handle open
secured valid handle & valid access password Backscatter handle,
when done
secured
valid handle & invalid access password arbitrate
invalid handle secured
killed all killed

SL3S1203FTB0,115

Mfr. #:
Manufacturer:
NXP Semiconductors
Description:
RFID Transponders UCODE G2IL AND G2IL
Lifecycle:
New from this manufacturer.
Delivery:
DHL FedEx Ups TNT EMS
Payment:
T/T Paypal Visa MoneyGram Western Union

Products related to this Datasheet