This document defines various authentication methods and methods of use for the XOR. A tag and an interrogator may support one, a subset, or all of the specified options, clearly stating what is supported.
Cross References:
ISO/IEC 18000-63:2015
ISO/IEC 19762
ISO/IEC 18000-2:2009
ISO/IEC 18000-7:2014 ED4
ISO/IEC 29167-1:2014 ED2
ISO/IEC 18000-3:2010
ISO/IEC 18000-4:2015 ED3
All current amendments available at time of purchase are included with the purchase of this document.