bobapp网站
中文版 한국어 日本の Français Deutsch عربي Pусский España Português
Home>>Activity & News>>RFID Knowledges

RFID Knowledges

Knowledge about UHF RFID reader

News posted on:- by-RFIDtagworld XMINNOVRFID Tag Manufacturer / NewsID:137

Knowledge about UHF RFID reader

超高频射频识别存储区域是什么?

1. EPC area

Store user's EPC information and hexadecimal data. The number of bits that can be written in the RFID chip of different manufacturers is different, and the common EPC stores 16/24 bits.

2. TID area

The unique identification code area and TID number of the RFID electronic tag are unique and not repeated, which is equivalent to the "ID card" of the chip.

3. User area

Store user-defined data, this area is different for different manufacturers.

4. Reserved area

Store Kill Password (destroy) and Access Password (access) passwords. The first two bytes are the destruction password, and the last two bytes are the access password.

The above four storage areas can be write-protected, which means that the area can never be written after protection or cannot be written in non-safe mode. Read protection is only valid for the password area setting, that is, it needs to be accessed in safe mode. TID and EPC cannot be read protected.

UHF RFID reader operation

Different UHF RFID readers only have different ways of calling the SDK, and the functions are the same

1. EPC writing

For common EPC writing, SDK needs to lock the RFID tag that needs to be operated first

TID lock: TID unique code rewriting, suitable for batch update, accurate

EPC lock: EPC may be duplicated, affecting update performance

2. EPC write protection

After the label is initialized, other personnel maliciously perform illegal update or destruction operations, so that the chip cannot play its role in the process and application. Generally, the label needs to be encrypted after initialization or the label supplier performs encryption protection before leaving the factory. The encryption protection is mainly Includes destruction and access password protection.

3. User area write

4. Kill Tag destroys the tag

The unencrypted tag destruction password is composed of 8 0s with the access password. In the process of destroying the password, you need to set a destruction password for it separately. If you have set the destruction password, press the set password. Once the label is destroyed, it will be inactivated. Unable to read normally.

Analysis of reading performance impact of UHF RFID reader

1. UHF RFID reader power

It directly affects the performance and distance of reading tags.

2. Frequency of UHF RFID reader

Different UHF RFID tags have different frequencies, and the frequency band for reading settings will also be affected.

3. UHF RFID reader

There are differences among various readers, which are mainly reflected in: read and write performance, device stability, scalability, and mature algorithms, etc.

4. Antenna gain and feeder attenuation

Generally speaking, the performance will be better when the RFID antenna gain is adjusted to the corresponding distance.

5. Types of RFID tags

Different types of RFID electronic tags, models and different manufacturers design, the performance of RFID tags will be different.

6. Reading direction and environment

The degree of coordination between the polarization direction and the relative angle of the tag and the antenna, if the direction is consistent and the degree of coordination is high, the reading and writing distance will be far. On the contrary, if they do not cooperate, the reading and writing distance will be close.



Baidu
map