All blog posts

RAIN RFID Tag ICs – The Road to Configuration Words

Nov 21, 2023

Tag config memory –  What is that? Is it a fifth memory bank? Having configuration words in tag memory is the new normal in the industry and it is slowly gaining importance and cannot be ignored any longer. How did we end up with config words and how can we embrace them instead? Let’s take a look.  

Birth of Gen2

The core features and the operating principles of a RAIN tag IC have remained the same since the birth of the protocol in 2004 – The ability to wirelessly read and write memory contents, the ability to lock all or parts of the content from further edits by outsiders, and the ability to permanently disable the transponder when it has served its purpose.  That was pretty much it and to a great extent, still is.

The memory was organized into four parts all with their special purpose. Also, in the air interface protocol, a total of two bits were reserved to specify which memory was to be selected, read, written, or locked.

Memory bank 00 is the “reserved memory” and it contains the 32-bit Kill password as its two first words and the 32-bit Access password for the following two words, four 16-bit words in total.

Memory bank 01 is the “EPC memory”. This is where the EPC code is stored. EPC code is the specified part and length of the memory that will be broadcasted in the inventory process. The two first words in the EPC code have a special function. The very first word has a precalculated error correction word, CRC, stored in it. The second word, referred to as the protocol control word, or PC-word, is an important one. It is a word broadcasted prior to the EPC code in inventory and has several single-bit flags to tell which features tag has activated, and what numbering system it might belong to. It also has a 5-bit L parameter to tell and set the length of the broadcasted part of the EPC code. In short, in the inventory process, the tag would give a reply consisting of PC+EPC+CRC all from this memory.

Memory bank 10 is the “TID memory”. This has all the unalterable records of the tag locked from the factory in the wafer state. In particular, it has MDID specifying the company that designed the IC and TMN specifying the exact IC type and version.

Memory bank 11, is the “user memory”. This is a memory dedicated for the user to write any other entries the application needs, and should contain no special words or bits for the protocol or IC operation. As only a few applications require this type of “disc space” and most applications work solely around the EPC code, most commodity tags don’t actually have any user memory. Manufacturing expensive non-volatile memory “just in case” is too expensive as it uses quite a lot of  IC surface area.

Typical memory map and memory contents of the four memory banks when read with Tagformance Memory Management tool. The MDID+TMN reveal that this is the memory of a tag equipped with an older monza5 chip .

Rise and fall of the custom commands

Very soon after the very first wave of ICs had hit the market, the second wave of ICs from roughly 2010 and onward had several new features that were not considered in the original memory organization and protocol. However, the protocol had large RFU provisions for custom commands. So, each tag IC got their own set of special vendor and IC-specific commands to activate and control the new advanced features. The tag features were often clearly documented in datasheets and worked well. However, readers, their command sets, and UIs really struggled to keep up with new and specific firmware versions often needed. For practical matters, like controlling the privacy level of retail tags in this somewhat custom and vendor-specific way just didn’t work too well.

Gen2v2 to the rescue

In 2014, the protocol got a new version, the Gen2v2, which included many of the features added earlier as custom in a somewhat more standard way. The main topics that the new version touched were authentication, encryption, and user privileges. This cleaned the table a little, but still, using new commands to access new features was already found to not always be the easiest solution to adopt.

Configuration words

What happened nearly simultaneously with the release of Gen2v2 was that the control of these added features was slowly transferring from specific new commands to standard Select, Read, and Write commands just pointing to special memory locations. Every reader and reader UI already had filters and memory read functions enabled, so these could be “misused” to control tag settings. Specially formulated Select commands were used to trigger events like “record sensor reading” and “switch to temporary operating mode X”. Writing specific control bits changed settings like tag memory allocations and backscatter levels the state of which could be retained in memory from this point on and to be retained through power cycles.

Soon every manufacturer had their own “config memory bank” or “config word” hidden deep inside the already existing four banks with bits and parameters to be configured to tailor the tag functionality.  The trouble was that each IC manufacturer placed the config memory in a different place with varying functionality. Also changing the settings is not always as easy as hailing the tag and writing, as special safety measures are often set in place.

In hindsight, It would have been great to have had a 5th memory bank for tag settings, but as there were just the two bits in each command to specify the memory bank, we were already kind of maxed out at four.

Vendor-specific implementations

Impinj

From roughly the R6 family onwards, Impinj has chosen to place the config word in the reserved memory bank, right after the two passwords at address 0x04. This location has been kept throughout the various R6, M700, and M800 families of ICs with the purpose of each bit being kept more or less similar. Some of the features that can be configured are read range reduction, autotune disable, unkillable mode, and memory split between EPC and User memories, and some inventory optimization modes. More complex ICs like the Monza X-8K have used several words deeper in the same reserved bank for even more settings. Care must be taken when setting the features as only some of the bits can be written, some need to be written from a secured state with a non-zero access password and some bits can only ever be changed once. As the protocol only allows full 16-bit words to be written, changing single bits needs to be done with care and optimally the whole config set on one single write event.

A common reason for changing tag configuration is to trade some of the maximum EPC length into user memory. For instance, the only difference between the M830 and M850 is a different split between the EPC and user memory sizes, and the swap can also be made through the tag configuration bits.

NXP

NXP on the other hand has chosen to primarily use the word at a word address 0x20 in the EPC memory for configuration starting form the Ucode G2iL family of ICs and through the G2iM, Ucode 7, Ucode 8, and Ucode 9. Available features vary from model to model, some of them touching on the topics of product flags, backscatter strength and curve type,  parallel encoding, memory config selection, write power indicator, self-adjust settings, and memory checks. Some of the bits are action bits, meaning that selecting on those will trigger special features, some bits are permanent bits for configuring more permanent modes and some are purely indicator bits for reading current feature status. Changing some of the settings is careful work as some require a non-zero access password, then accessing the tag with that, then strictly using a mandatory Write command to perform a toggle-write on the bits that are wanted to be flipped.

NXP Ucode9 has config bits to select from different backscatter responses which can be helpful to optimize for privacy, performance, or conformance.

EM Microelectronic

EM Microelectronic has been known for their “more involved”, more advanced, and therefore also more complicated ICs hosting a variety of features, such as serial data interface, power outputs, sensoring, IO-pins, NFC+RAIN operation, TOTAL tag talks only modes, etc. These advanced settings often take several words of memory space for configuration in what EM refers to as “System memory” at the far end of the User memory bank.

Alien

Alien has a “Device configuration” often further up the TID memory bank. However, not many public datasheets are available describing the functionalities better. Most probably they are settings performed by the manufacturer and are not meant for the user or an encoding process to mess with. Anyhow, so far four manufacturers and four different memory banks have been chosen for config purposes.

Other manufacturers

With several dozens of Gen2 tag IC manufacturers in the game, there are too many to mention and not all distribute proper open datasheets to share all features in public. However, it seems that some of the newer players on the market have chosen to adopt one of the existing strategies, such as the Impinj Reserved memory word 0x04 for a comparable configuration. This might help existing readers support the newcomers when the location of the settings is the same.

Afterthoughts

There are several good aspects on this topic. First of all, for at least 90% of the customers, the initial settings are just fine. Also, with the two biggest RAIN IC providers on the market covering such a large market share, there nearly are two “standard” ways to control tag configurations. Furthermore, the Gen2v3 is just around the corner (more on that later), but it is not going to touch on the subjects typically controlled by the tag config bits. Unfortunate, that it will not clean this up, but then again fortunate, that it will not introduce even more ways to facilitate configurations that are bound to evolve faster than the protocol versions ever will. The place where the spread and complexity of configuring RAIN tags is putting the most pressure is probably in the encoding of tags where each IC type needs to be recognized and catered for to serve the remaining sub 10% of cases. If your software or UI is not recognizing the IC types, then the datasheet is your friend in deciphering the tag configuration options.

A personal plea to all the RAIN IC manufacturers out there: Please keep the datasheets publicly available to your customers and solutions providers. Also, luckily we are today talking about small single-bit differences in tag configs, as RAIN stands technologically relatively united and nowhere near as spread out and as complicated a disorder as the 13.56MHz playground that NFC is trying to unite and clean up. Let’s continue keeping RAIN united.

All blog posts
All blog posts

RAIN RFID Label Converting Essentials – Webinar Recap

Nov 07, 2023

Our past two Voyantic webinars have focused on educating the label-converting industry on RFID – how to get started with RFID labels and what are the key things you should consider to succeed in the RFID business. 

The first webinar covered the RFID technology basics for label converters. (If you missed it, you can watch the recording here).

For the second webinar, we invited panelists from different companies in the RFID label ecosystem, including an inlay supplier, a converting machine manufacturer, and a label converter, to give their perspectives on what is essential in RFID label converting.  We also had our own expert on the panel to talk about the importance of quality inspection in RFID label production. 

Check out the webinar recording or read the highlights from the webinar discussion below. 

Watch the webinar recording 

The webinar panelists were:

  • Wayne Oldham, Innovation and Sustainable Technology Director at 4id Solutions.
    4id Solutions is a label converter company specializing in RFID.
  • Axel Hess, Product Manager RFID at BW Papersystems.
    BW Papersystems is a converting machine manufacturer and a pioneer in RFID technology. 
  • Amy Lu, Global Sales Manager at Arizon RFID Technology.
    Arizon is an RFID inlay and tag manufacturer, providing ODM & OEM services to RFID companies and system integrators. 
  • Gerald Smid, Solution Specialist at Voyantic. At Voyantic, Gerald helps our customers integrate and set up Voyantic’s quality control systems on their RFID production machines.  

Understanding the RFID Label Buyer Needs

When it comes to RFID labels, there is often a gap between a customer’s request and what the customer needs – the initial customer request often differs significantly from the final product they end up getting. When customers have a weak understanding of RFID technology some level of education is always required. Education is needed to make sure the label buyers understand the capabilities and limitations of the technology and to ensure they have a clear understanding of their use case requirements in order to find the right label product.

To address this challenge, companies like 4id Solutions employ a range of templates with specific questions that help in identifying the customer’s exact requirements. The questions range from technical aspects such as what frequency they need, features, performance, and data requirements to material selection, use cases, and form factor requirements.  Voyantic has also put together an RFID Tag Buyer’s Guide with a checklist for label requirements and considerations.

Download the RFID Tag Buyer’s Guide here ›

For both label converters and end customers, understanding the application is also critical in the RFID inlay selection process. Some products may be challenging from an RF perspective, for example, products containing metals or liquids. These kinds of products require an inlay designed specifically for those purposes. The number of RFID labels that need to be read simultaneously also varies according to the application. In some use cases, like apparel inventory, where multiple labels must be read simultaneously, the choice of inlay becomes crucial to ensure stable and consistent performance. Inlays are always designed, and often certified, for specific applications and materials. New customers require guidance to select the right inlay for their application.

Label type and functionalities are selected based on the application and the product type.

From an RFID converting machine manufacturer’s point of view, the customers’ challenges include narrowing down the focus of their RFID project. Customers must not only consider the shape and size of the RFID label but also the choice of materials, inlays (dry or wet), and chip direction. These choices significantly affect the configuration of the converting machine. The clearer the output specifications are the better the machine can be configured for a specific product. 

Whether we are talking about machines, inlays, or ready labels, standardization, and shared practices within the industry could further help the industry with interoperability and drive the adoption of the technology.  

Best practices: 

  • Ask a lot of questions from your customers to nail down requirements
    • Frequency?
    • Use cases and applications?
    • Required read range, reader types?
    • Product types, materials?
    • Label physical requirements?
    • Tagging specifications?
The required read range and the reader type are factors in inlay selection.

RFID Label Converting Practicalities 

The biggest difference between RFID label converting and traditional label converting is that RFID labels contain electronic components that can be easily damaged in the converting process. The most effective way to avoid any issues is to understand your converting equipment, have a strong relationship with your suppliers, and ask as many questions as you can possibly think of. No question is considered too trivial in the RFID field, as asking the right questions can potentially save thousands of dollars that would be lost in a failed production run. 

For a label converter, it is also important to have a good relationship with your inlay supplier to make sure you have all the latest information and understanding of the inlay materials and the impact they will have on how the materials run through your converting press. It is always better to do test runs with new materials and construction to see the impact on the converting process.

Protecting the IC within the RFID label is imperative to prevent mechanical damage. Traditional label manufacturers may focus on production speed and appearance, while RFID label converters need to prioritize IC protection. To protect against damaging the IC, there are special rollers available with IC protection (avoidance slot) or you can use special rollers with very soft materials to protect the IC from pressure.

Maker sure the machine rollers are suitable for RFID labels.

Another important aspect to consider is ESD (electrostatic discharge) protection. ESD control systems are vital, especially when exposed antennas are involved, ESD can potentially damage the tag IC. 

Best practices:

  • Ask a lot of questions from your machine and inlay vendors
  • Know your machine!
  • Do test runs
  • Consider IC protection in every production step
  • Consider ESD protection

The Importance of Quality Inspection

“It’s very hard to damage a piece of paper, it’s very easy to damage an [RFID] inlay when you are running it through a converting press. And it’s very easy to damage a lot of inlays very quickly when you don’t have the right processes in place.” – Wayne Oldham, 4id Solutions

For a label converter who cares about the quality of the delivered products, a proper RFID quality control system is essential. Without RFID inspection, there is no way to guarantee the quality of the labels that have been sent to the customer as RF performance cannot be visually verified. A damaged RFID label may look exactly the same as a working one. RFID label performance can only be verified with RF measurements. 

A professional RFID quality testing system provides a comprehensive assessment of the tag’s performance on multiple frequencies. Using a simple reader to test that the tag responds, does not give a full picture of the performance nor assurance that the tag will also work in the end user application, from the required distance and attached to the product. A testing system is also a valuable tool for the machine operator, giving visibility into the production process to ensure everything runs smoothly. 

A quality control system gives a full picture of the RFID labels’ performance and detects labels that are outside of specifications.

Each label must be tested individually, at high production speeds, and faulty tags can be marked, removed, or killed using chip killers or chip crunchers, depending on customer preferences. What is done to the faulty tags post-production is another important consideration for the label converter. The types of machines and processes handling bad labels also depend on the label types, for example, whether you are producing single tickets vs continuous label rolls. Some customers choose to save costs and remove the faulty, marked labels themselves in the label application process. 

Best Practices:

  • Test every label in the production line with a proper RF inspection system
  • Choose your strategy for bad label handling

Learn more about best practices for quality testing in RFID label production ›

Long-Term Considerations for RFID Label Converters

The RFID market is growing, and long-term considerations are integral when purchasing RFID converting machines. Companies must consider their target markets, future requirements, and budget when making decisions on investments. The choice of machine impacts the types and volumes of labels that can be produced. 

Although retail is still driving the market, several applications, such as consumer packaged goods (CPG), healthcare, and logistics, hold promise in the RFID industry. To stay informed about market trends, consult reports from the RAIN Alliance website. The RAIN Alliance also serves as a valuable resource for networking with industry experts and peers.

How to Get Started with RFID?

For those new to RFID converting, education, building in-house expertise, and early engagement with suppliers are crucial. Take the time to understand the technology, machines, and various aspects involved. Navigating the world of RFID label converting is a process that demands a deep understanding of customer needs, best practices, long-term considerations, and the broader RFID ecosystem. You also need to be agile — the RFID industry develops quickly, and new tag ICs with new features and functionalities are constantly introduced. However, the RFID industry also offers numerous opportunities for new converters as well as customers. 

Let us know how we can help you!

Contact Voyantic

All blog posts