{"id":6910,"date":"2020-02-24T12:42:10","date_gmt":"2020-02-24T12:42:10","guid":{"rendered":"https:\/\/rfid4u.com\/?page_id=6910"},"modified":"2020-09-19T04:09:42","modified_gmt":"2020-09-19T04:09:42","slug":"rfid-epc-gen2-memory","status":"publish","type":"page","link":"https:\/\/rfid4u.com\/rfid-epc-gen2-memory\/","title":{"rendered":"EPC Gen2 Memory"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_section full_width=&#8221;stretch_row&#8221; css=&#8221;.vc_custom_1600488574564{background: #ffffff url(https:\/\/rfid4u.com\/wp-content\/uploads\/2020\/05\/Rfid4uWebsite-Background-Image-1.jpg?id=11905) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221;][vc_row][vc_column][vc_custom_heading text=&#8221;Explore \/ RFID Basics &amp; Resources&#8221; font_container=&#8221;tag:h5|text_align:center|color:%23ffffff&#8221; use_theme_fonts=&#8221;yes&#8221;][vc_custom_heading text=&#8221;RFID Basics &#8211; EPC Gen2 Memory&#8221; font_container=&#8221;tag:h1|text_align:center|color:%23ffffff&#8221; use_theme_fonts=&#8221;yes&#8221;][\/vc_column][\/vc_row][\/vc_section][vc_section full_width=&#8221;stretch_row&#8221; css=&#8221;.vc_custom_1588939470806{background-color: #ffffff !important;background-position: 0 0 !important;background-repeat: no-repeat !important;}&#8221; el_class=&#8221;background-position-right-bottom&#8221;][vc_row][vc_column][vc_column_text]As per <a href=\"https:\/\/rfid4u.com\/rfid-standards-mandates\/\">How to Select a Correct RFID Tag \u2013 Standards &amp; Mandates<\/a>, this standard is officially called EPC Radio-Frequency Identity Protocols Class 1 Generation 2 UHF RFID protocol for communications at 860\u2013960 MHz. It was developed by EPCglobal, Inc. in 2004, which is now GS1, and was approved as ISO 18000-6C in July 2006. It defines air interface parameters for tags operating within the frequency range of 860\u2013960 MHz and allows for use of different frequencies in different regions from within this range.[\/vc_column_text]<div class=\"radiantthemes-blockquote element-two   \" ><blockquote ><i class=\"fa fa-quote-left\" ><\/i>There are several versions of this standard and the latest version Gen2v2 (that was first introduced in 2013) 2.0.1. (ratified in 2015) introduces several new features to the protocol.<cite><\/cite><\/blockquote><\/div>[vc_empty_space height=&#8221;30px&#8221;][vc_custom_heading text=&#8221;THE TABLE BELOW PROVIDES AN OVERVIEW OF GENERATION2 FEATURES:&#8221; font_container=&#8221;tag:h4|text_align:left|color:%23212121&#8243; use_theme_fonts=&#8221;yes&#8221; css=&#8221;.vc_custom_1588940097997{margin-top: 0px !important;margin-bottom: 20px !important;}&#8221;][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_custom_heading text=&#8221;EPC Gen2 Requirement&#8221; font_container=&#8221;tag:h4|text_align:left|color:%23424242&#8243; use_theme_fonts=&#8221;yes&#8221; css=&#8221;.vc_custom_1588940111213{margin-top: 0px !important;margin-bottom: 20px !important;}&#8221;]<div  class=\"rt-separator element-four \" data-separator-width=\"100%\" data-separator-color=\"#e0e0e0\" data-separator-background=\"#ffffff\" data-separator-direction=\"left\"><div class=\"block\"><div class=\"gap\"><\/div><div class=\"bar\"><\/div><\/div><\/div>[vc_column_text]Global regulatory compliance<br \/>\nMemory access control<br \/>\nRead speed<br \/>\nDense-reader operation<br \/>\nAnti-collision<br \/>\nKill security<br \/>\nMemory-write capability<br \/>\nBit-masked filtering<br \/>\nUser Memory<br \/>\nCost and availability<br \/>\nAuthentication<br \/>\nTraceability[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_custom_heading text=&#8221;EPC Gen2 (v2) Features&#8221; font_container=&#8221;tag:h4|text_align:left|color:%23424242&#8243; use_theme_fonts=&#8221;yes&#8221; css=&#8221;.vc_custom_1588940122580{margin-top: 0px !important;margin-bottom: 20px !important;}&#8221;]<div  class=\"rt-separator element-four \" data-separator-width=\"100%\" data-separator-color=\"#e0e0e0\" data-separator-background=\"#ffffff\" data-separator-direction=\"left\"><div class=\"block\"><div class=\"gap\"><\/div><div class=\"bar\"><\/div><\/div><\/div>[vc_column_text]Europe, North America, and others<br \/>\n32-bit Access password Memory locking<br \/>\nGreater than 1,000 tags per second<br \/>\nDense-reader operating mode<br \/>\nFlexible, changing based on environment<br \/>\n32-bit Kill password<br \/>\nGreater than seven tags per second write rate<br \/>\nFlexible Select command<br \/>\nSize based on vendor, enhanced for logging<br \/>\nMulti-vendor available, low cost<br \/>\nCryptographic authentication for anti-counterfeiting<br \/>\nFunctions for Untraceability[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_column_text]For more information, read <a href=\"https:\/\/rfid4u.com\/rfid-standards-mandates\/\">How to Select a Correct RFID Tag \u2013 Standards &amp; Mandates<\/a>.[\/vc_column_text][vc_empty_space height=&#8221;30px&#8221;][vc_custom_heading text=&#8221;TYPES OF DATA IN GEN2 TAG MEMORY&#8221; font_container=&#8221;tag:h4|text_align:left|color:%230f4996&#8243; use_theme_fonts=&#8221;yes&#8221; el_class=&#8221;font-weight-bold text-uppercase&#8221; css=&#8221;.vc_custom_1588940150430{margin-top: 0px !important;margin-bottom: 20px !important;}&#8221;][vc_column_text el_class=&#8221;rfid4u-table&#8221;]<\/p>\n<div class=\"wpb_wrapper_table\">\n<table class=\"table table-striped\" style=\"height: 198px;\" width=\"863\">\n<thead>\n<tr>\n<th>Information Type<\/th>\n<th>Description<\/th>\n<th>Where on Gen 2 Tag<\/th>\n<th>Where Typically Used<\/th>\n<th>Bar Code Equivalent<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td>Business Data<\/td>\n<td>Describes the physical object to which the tag is affixed.<\/td>\n<td>EPC Bank (excluding PC and XPC bits, and filter value within EPC) User Memory Bank<\/td>\n<td>Data Capture layer and Business Application layer<\/td>\n<td>Yes: GS1 keys, Application Identifiers (AIs)<\/td>\n<\/tr>\n<tr>\n<td>Control Information<\/td>\n<td>Facilitates efficient tag interaction MIC<\/td>\n<td>Reserved Bank EPC Bank: PC and XPC bits, and filter value within EPC<\/td>\n<td>Data Capture layer<\/td>\n<td>No<\/td>\n<\/tr>\n<tr>\n<td>Tag Manufacture Information<\/td>\n<td>Describes the tag itself, as opposed to the physical object to which the tag is affixed.<\/td>\n<td>TID Bank<\/td>\n<td>Data Capture layer Unique tag manufacture serial number may reach Business Application layer<\/td>\n<td>No<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<p>[\/vc_column_text][vc_empty_space height=&#8221;30px&#8221;][vc_custom_heading text=&#8221;GENERATION 2 MEMORY LAYOUT&#8221; font_container=&#8221;tag:h4|text_align:left|color:%230f4996&#8243; use_theme_fonts=&#8221;yes&#8221;][vc_column_text]The following graphic depicts the Generation 2 memory layout. Gen2 tags can four banks of non-volatile memory \u2013 Reserved Memory, EPC Memory, Tag Identification (TID) Memory and User Memory. Each memory region is accessed in parts, that are 16-bit long, called words, starting at word 0.[\/vc_column_text][vc_single_image image=&#8221;13998&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221; style=&#8221;vc_box_outline&#8221;][vc_empty_space height=&#8221;30px&#8221;][vc_custom_heading text=&#8221;RESERVED MEMORY (BANK 0)&#8221; font_container=&#8221;tag:h4|text_align:left|color:%230f4996&#8243; use_theme_fonts=&#8221;yes&#8221;][vc_column_text]The reserved area of memory holds the tag\u2019s Access and Kill passwords, with a 32-bit \u201cKill\u201d password that allows a tag to be permanently silenced.<br \/>\n\u2022 The Kill command only executes if the password has been set (that is, is non-zero).<br \/>\n\u2022 The default Kill password value is zero.<br \/>\nA 32-bit Access password allows the Tag to transition to the Secured state. A tag in the Secured state can execute all Access commands, including writing to locked blocks.<br \/>\n<strong>Kill and access passwords must be accepted prior to being used. The kill password is a 32-bit value stored in reserved memory 00h to 1Fh, MSB first. Remember that:<\/strong><br \/>\n\u2022 A tag that does not implement a kill password acts as though it had a zero-valued kill password that is permanently read\/write locked.<br \/>\n\u2022 A tag does not execute a kill operation if its kill password is zero.<br \/>\n\u2022 An interrogator uses a tag\u2019s kill password once, to kill the tag and render it silent thereafter.<br \/>\n\u2022 The default (that is, un-programmed) value is zero.<br \/>\n<strong>The access password is a 32-bit value stored in reserved memory 20h to 3Fh, MSB first. Remember that:<\/strong><br \/>\n\u2022 Tags with a non-zero access password is required an interrogator to issue this password before transitioning to the secured state.<br \/>\n\u2022 The default (that is, un-programmed) value is be zero.<br \/>\nA tag that does not implement an access password acts as though it had a zero-valued access password that is permanently read\/write locked.[\/vc_column_text][vc_empty_space height=&#8221;30px&#8221;][vc_custom_heading text=&#8221;EPC MEMORY (BANK 1)&#8221; font_container=&#8221;tag:h4|text_align:left|color:%230f4996&#8243; use_theme_fonts=&#8221;yes&#8221;][vc_column_text]EPC Memory consists of the 16-bit Cyclic Redundancy Check (CRC-16), which is an error detection code, a 16-bit Protocol Control (PC) and starting with Word 2, the EPC number (96 to 496 bits).[\/vc_column_text]<div class=\"radiantthemes-blockquote element-two   \" ><blockquote ><i class=\"fa fa-quote-left\" ><\/i>The Protocol Control manages, how many bits of EPC are sent back to the reader, regardless the actual length of the EPC data in the bank. The standard is 96 bits but what if you need to send more? The length is defined in the PC. The total amount of words for EPC data in the memory depends on the chip manufacturer.<cite><\/cite><\/blockquote><\/div>[vc_column_text]<strong>The PC is further subdivided:<\/strong><br \/>\n\u2022 First 5 bits indicate the EPC memory length, next bit indicates whether the tag has or does not have user memory.<br \/>\n\u2022 The bit 6 identifies the existence of the Extended Protocol Control Word 1 (XPC_W1) in the word 21 of EPC Memory.<br \/>\n\u2022 The bit 7 identifies whether the data in the EPC data area conforms to a GS1 EPCGlobal&#x2122; (set to 0b) or an ISO\/IEC 15961 coding scheme (set to 1b). The actual coding scheme is identified in the Application Family Identifier (AFI) bit field.[\/vc_column_text][vc_column_text]<\/p>\n<div class=\"wpb_wrapper_table\">\n<table class=\"table table-striped\">\n<thead>\n<tr>\n<th>Bits<\/th>\n<th>Field<\/th>\n<th>Description<\/th>\n<th>Where Specified<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td><strong>10h\u201314h<\/strong><\/td>\n<td>Length<\/td>\n<td>Represents the number of 16-bit words comprising the PC field and the EPC field (below). See discussion in Section 15.1.1 for the encoding of this field.<\/td>\n<td>UHFC1G2 Standard<\/td>\n<\/tr>\n<tr>\n<td><strong>15h<\/strong><\/td>\n<td>User Memory Indicator (UMI)<\/td>\n<td>Indicates whether the user memory bank is present and contains data.<\/td>\n<td>UHFC1G2 Standard<\/td>\n<\/tr>\n<tr>\n<td><strong>16h<\/strong><\/td>\n<td>XPC Indicator (XI)<\/td>\n<td>Indicates whether an XPC is present<\/td>\n<td>UHFC1G2 Standard<\/td>\n<\/tr>\n<tr>\n<td><strong>17h<\/strong><\/td>\n<td>Toggle<\/td>\n<td>If zero, indicates an EPCglobal application; in particular, indicates that bits 18h \u2013 1Fh contain the Attribute Bits and the remainder of the EPC bank contains a binary encoded EPC.<br \/>\nIf one, indicates a non-EPCglobal application; in particular, indicates that bits 18h \u2013 1Fh contain the ISO Application Family Identifier (AFI) as defined in [ISO15961] and the remainder of the EPC bank contains a Unique Item Identifier (UII) appropriate for that AFI.<\/td>\n<td>UHFC1G2 Standard<\/td>\n<\/tr>\n<tr>\n<td><strong>18h\u20131Fh(if toggle = 0)<\/strong><\/td>\n<td>Attribute Bits<\/td>\n<td>Bits that may guide the handling of the physical object to which the tag is affixed. (Applies to Gen2 v 1.x tags only.)<\/td>\n<td>Section 11 of EPC C1G2 Tag Data Standard<\/td>\n<\/tr>\n<tr>\n<td><strong>18h\u20131Fh(if toggle = 1)<\/strong><\/td>\n<td>AFI<\/td>\n<td>An Application Family Identifier that specifies a non-EPCglobal application for which the remainder of the EPC bank is encoded<\/td>\n<td>ISO 15961<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<p>[\/vc_column_text][vc_empty_space height=&#8221;30px&#8221;][vc_custom_heading text=&#8221;USER MEMORY (BANK 3)&#8221; font_container=&#8221;tag:h4|text_align:left|color:%230f4996&#8243; use_theme_fonts=&#8221;yes&#8221;][vc_column_text]User memory is optional and can have various sizes, usually 512 bits and up to 4 or 8K of memory in some tags. This memory is used for additional data that is not suitable or does not fit into the EPC memory, such as for instance temperature or maintenance logs, expiration dates and other data.<br \/>\nThe first few bits are a Data Storage Format Identifier (DSFID) as specified in ISO15961 and ISO15962. The DSFID specifies the format for the remainder of the user memory bank. The DSFID is usually eight bits in length, but may be extended as per ISO15961. When the DSFID specifies Access Method 2, the format of the remainder of user memory is \u201cpacked objects\u201d. This format is recommended for use in EPC applications.[\/vc_column_text][vc_empty_space height=&#8221;30px&#8221;][vc_custom_heading text=&#8221;TAG IDENTIFICATION (TID) MEMORY (BANK 2)&#8221; font_container=&#8221;tag:h4|text_align:left|color:%230f4996&#8243; use_theme_fonts=&#8221;yes&#8221;][vc_column_text]TID Memory carries the unique tag identifier that cannot be changed or erased. This ID identifies the tag itself, rather than item it is applied to.[\/vc_column_text][vc_empty_space height=&#8221;30px&#8221;][vc_custom_heading text=&#8221;EPC TAG DATA STANDARDS, VERSION 1.9 (PUBLISHED JULY 2014)&#8221; font_container=&#8221;tag:h4|text_align:left|color:%230f4996&#8243; use_theme_fonts=&#8221;yes&#8221;][vc_column_text]This standard defines EPC tag data formats for Generation 2 tags. It defines how the EPC is encoded on the tag and how it is encoded for use in the information systems layers of the EPC Systems Network. The standard includes specific encoding schemes for EPC General Identifier (GID).<br \/>\nextended as per ISO15961. When the DSFID specifies Access Method 2, the format of the remainder of user memory is \u201cpacked objects\u201d. This format is recommended for use in EPC applications.[\/vc_column_text][vc_empty_space height=&#8221;30px&#8221;][vc_custom_heading text=&#8221;GID FORMAT&#8221; font_container=&#8221;tag:h3|font_size:20px|text_align:left|color:%23212121|line_height:55px&#8221; use_theme_fonts=&#8221;yes&#8221; el_class=&#8221;font-weight-bold text-uppercase&#8221; css=&#8221;.vc_custom_1582617106483{margin-top: 0px !important;margin-bottom: 20px !important;}&#8221;][vc_column_text el_class=&#8221;rfid4u-table&#8221;]<\/p>\n<div class=\"wpb_wrapper_table\">\n<p>Decimal capacity0011 0101(actual value)268,435,45516,777,21536 bits<\/p>\n<table class=\"table\">\n<thead>\n<tr>\n<th>Information Type<\/th>\n<th>HEADER<\/th>\n<th>GENERAL MANAGER NUMBER<\/th>\n<th>OBJECT CLASS NUMBER<\/th>\n<th>SERIAL NUMBER<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td>GID-96<\/td>\n<td>8 bits<\/td>\n<td>28 bit<\/td>\n<td>24bit<\/td>\n<td>24 bits<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<p><em>The standard also defines encoding of other numbering systems for 96 bits used in global trade.<\/em>[\/vc_column_text][vc_empty_space height=&#8221;30px&#8221;][vc_custom_heading text=&#8221;OTHER EPC SCHEMES&#8221; font_container=&#8221;tag:h4|text_align:left|color:%230f4996&#8243; use_theme_fonts=&#8221;yes&#8221;][vc_column_text]This standard defines EPC tag data formats for Generation 2 tags. It defines how the EPC is encoded on the tag and how it is encoded for use in the information systems layers of the EPC Systems Network. The standard includes specific encoding schemes for EPC General Identifier (GID).<br \/>\nextended as per ISO15961. When the DSFID specifies Access Method 2, the format of the remainder of user memory is \u201cpacked objects\u201d. This format is recommended for use in EPC applications.[\/vc_column_text][vc_empty_space height=&#8221;30px&#8221;][vc_custom_heading text=&#8221;GID FORMAT&#8221; font_container=&#8221;tag:h3|font_size:20px|text_align:left|color:%23212121|line_height:55px&#8221; use_theme_fonts=&#8221;yes&#8221; el_class=&#8221;font-weight-bold text-uppercase&#8221; css=&#8221;.vc_custom_1582617256724{margin-top: 0px !important;margin-bottom: 20px !important;}&#8221;]<div  class=\"rt-separator element-four \" data-separator-width=\"100%\" data-separator-color=\"#e0e0e0\" data-separator-background=\"#ffffff\" data-separator-direction=\"right\"><div class=\"block\"><div class=\"gap\"><\/div><div class=\"bar\"><\/div><\/div><\/div>[vc_column_text el_class=&#8221;rfid4u-table&#8221;]<\/p>\n<div class=\"wpb_wrapper_table\">\n<table class=\"table table-striped\" style=\"height: 198px;\" width=\"863\">\n<thead>\n<tr>\n<th>Information Type<\/th>\n<th>HEADER<\/th>\n<th>GENERAL MANAGER NUMBER<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td>SGTIN<\/td>\n<td>Serialized Global Trade Item Number<\/td>\n<td>Used to assign a unique identity to an instance of a trade item, such as a specific instance of a product or SKU.<\/td>\n<\/tr>\n<tr>\n<td>SSCC<\/td>\n<td>Serial Shipping Container Code<\/td>\n<td>Used to assign a unique identity to a logistics handling unit, such as the aggregate contents of a shipping container or a pallet load.<\/td>\n<\/tr>\n<tr>\n<td>SGLN*<\/td>\n<td>\u00a0Global Location Number (with or without extension)<\/td>\n<td>Used to assign a unique identity to a<br \/>\nphysical location, such as a specific building or a specific unit of shelving within a warehouse.<\/td>\n<\/tr>\n<tr>\n<td>\u00a0GRAI<\/td>\n<td>\u00a0Global Returnable Asset Identifier (serial number mandatory)<\/td>\n<td>\u00a0Used to assign a unique identity to a specific returnable asset, such as a reusable shipping container or a pallet skid.<\/td>\n<\/tr>\n<tr>\n<td>GIAI<\/td>\n<td>Global Individual Asset Identifier<\/td>\n<td>Used to assign a unique identity to a specific asset, such as a forklift or a computer.<\/td>\n<\/tr>\n<tr>\n<td>\u00a0GSRN<\/td>\n<td>Global Service Relation Number (for Recipient)<\/td>\n<td>Used to assign a unique identity to a service recipient, i.e. a Hospital Patient or a Club Member.<\/td>\n<\/tr>\n<tr>\n<td>\u00a0GSRNP<\/td>\n<td>Global Service Relation Number for Provider<\/td>\n<td>Used to assign a unique identity to a service provider, i.e. a hospital or a club.<\/td>\n<\/tr>\n<tr>\n<td>GDTI<\/td>\n<td>Global Document Type Identifier<\/td>\n<td>Used to assign a unique identity to a specific document, such as land registration papers, an insurance policy, etc.<\/td>\n<\/tr>\n<tr>\n<td>CPI<\/td>\n<td>\u00a0Component \/ Part Identifier<\/td>\n<td>\u00a0Used by the technical industries (including the automotive sector) for the unique identification of parts or components.<\/td>\n<\/tr>\n<tr>\n<td>SGCN<\/td>\n<td>Serialized Global Coupon Number<\/td>\n<td>Used to uniquely identify a coupon.<\/td>\n<\/tr>\n<tr>\n<td>GID<\/td>\n<td>General Identifier<\/td>\n<td>\u00a0The GID EPC scheme is independent of any specifications or identity scheme outside the EPCglobal Tag Data Standard.<\/td>\n<\/tr>\n<tr>\n<td>DOD<\/td>\n<td>\u00a0US Department of Defense Identifier<\/td>\n<td>Defined by the United States Department of Defense. This tag data construct may be used to encode 96-bit Class 1 tags for shipping goods to the United States Department of Defense by a supplier who has already been assigned a CAGE (Commercial and Government Entity) code<\/td>\n<\/tr>\n<tr>\n<td>\u00a0ADI<\/td>\n<td>\u00a0Aerospace and Defense Identifier<\/td>\n<td>\u00a0Used by the aerospace and defense sector for the unique identification of parts or items.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<p>[\/vc_column_text][vc_column_text]<em>*Explanation: Note that the letter \u201cS\u201d in the term \u201cSGLN\u201d does not stand for \u201cserialized\u201d as it does in SGTIN. This is because a GLN without an extension also identifies a unique location, as opposed to a class of locations, and so both GLN and GLN with extension may be considered as \u201cserialized\u201d identifiers. The term SGLN merely distinguishes the EPC form, which can be used either for a GLN by itself or GLN with extension, from the term GLN which always refers to the unextended GLN identifier. The letter \u201cS\u201d does not stand for anything. (Source GS1.org)<\/em>[\/vc_column_text][vc_empty_space height=&#8221;30px&#8221;]<div  class=\"rt-separator element-four \" data-separator-width=\"100%\" data-separator-color=\"#e0e0e0\" data-separator-background=\"#ffffff\" data-separator-direction=\"left\"><div class=\"block\"><div class=\"gap\"><\/div><div class=\"bar\"><\/div><\/div><\/div>[vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_btn title=&#8221;RFID Regulations&#8221; style=&#8221;outline&#8221; shape=&#8221;square&#8221; color=&#8221;warning&#8221; align=&#8221;left&#8221; i_icon_fontawesome=&#8221;fas fa-arrow-left&#8221; add_icon=&#8221;true&#8221; link=&#8221;url:https%3A%2F%2Frfid4u.com%2Frfid-regulations%2F|title:RFID%20Regulations||&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_btn title=&#8221;EPC Gen2 Reader Commands and Q Parameter&#8221; style=&#8221;outline&#8221; shape=&#8221;square&#8221; color=&#8221;warning&#8221; align=&#8221;right&#8221; i_align=&#8221;right&#8221; i_icon_fontawesome=&#8221;fas fa-arrow-right&#8221; add_icon=&#8221;true&#8221; link=&#8221;url:https%3A%2F%2Frfid4u.com%2Fepc-gen2-reader-commands-and-q-parameter%2F|title:EPC%20Gen2%20Reader%20Commands%20and%20Q%20Parameter||&#8221;][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][\/vc_section]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_section full_width=&#8221;stretch_row&#8221; css=&#8221;.vc_custom_1600488574564{background: #ffffff url(https:\/\/rfid4u.com\/wp-content\/uploads\/2020\/05\/Rfid4uWebsite-Background-Image-1.jpg?id=11905) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221;][vc_row][vc_column][vc_custom_heading text=&#8221;Explore \/ RFID Basics &amp; Resources&#8221; font_container=&#8221;tag:h5|text_align:center|color:%23ffffff&#8221; use_theme_fonts=&#8221;yes&#8221;][vc_custom_heading text=&#8221;RFID Basics &#8211; EPC Gen2 Memory&#8221; font_container=&#8221;tag:h1|text_align:center|color:%23ffffff&#8221; use_theme_fonts=&#8221;yes&#8221;][\/vc_column][\/vc_row][\/vc_section][vc_section full_width=&#8221;stretch_row&#8221; css=&#8221;.vc_custom_1588939470806{background-color: #ffffff !important;background-position: 0 0 !important;background-repeat: no-repeat !important;}&#8221; el_class=&#8221;background-position-right-bottom&#8221;][vc_row][vc_column][vc_column_text]As per How to Select a Correct RFID Tag \u2013 Standards &amp; Mandates, this standard is officially called [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"om_disable_all_campaigns":false,"inline_featured_image":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"class_list":["post-6910","page","type-page","status-publish","hentry"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/rfid4u.com\/wp-json\/wp\/v2\/pages\/6910","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rfid4u.com\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/rfid4u.com\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/rfid4u.com\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rfid4u.com\/wp-json\/wp\/v2\/comments?post=6910"}],"version-history":[{"count":0,"href":"https:\/\/rfid4u.com\/wp-json\/wp\/v2\/pages\/6910\/revisions"}],"wp:attachment":[{"href":"https:\/\/rfid4u.com\/wp-json\/wp\/v2\/media?parent=6910"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}