Type 1 Tag Operation Specification
Technical Specification
NFC Forum
TM
T1TOP 1.1
NFCForum-TS-Type-1-Tag_1.1
2011-04-13
RESTRICTIONS ON USE
This specification is copyright © 2005-2011 by the NFC Forum, and was made available pursuant to a
license agreement entered into between the recipient (Licensee) and NFC Forum, Inc. (Licensor) and may
be used only by Licensee, and in compliance with the terms of that license agreement (License). If you are
not the Licensee, you may read this Specification, but are not authorized to implement or make any other
use of this specification. However, you may obtain a copy of this Specification and implementation rights
at the following page of Licensor's website: http://www.nfc-forum.org/specs/spec_license
after entering
into and agreeing to such license terms as Licensor is then requiring. On the date that this specification was
downloaded by Licensee, the non-implementation terms of that license were as follows:
1. LICENSE GRANT.
Licensor hereby grants Licensee the right, without charge, to copy (for internal purposes only) and share
this Specification with Licensee's members, employees and (to the extent related to Licensees use of this
Specification) consultants. This license grant does not include the right to sublicense, modify or create
derivative works based upon the Specification.
2. NO WARRANTIES.
THE SPECIFICATION IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS
OR IMPLIED, INCLUDING BUT NOT LIMITED TO WARRANTIES OF MERCHANTABILITY,
FITNESS FOR A PARTICULAR PURPOSE, ACCURACY, COMPLETENESS AND
NONINFRINGEMENT OF THIRD PARTY RIGHTS. IN NO EVENT SHALL LICENSOR, ITS
MEMBERS OR ITS CONTRIBUTORS BE LIABLE FOR ANY CLAIM, OR ANY DIRECT, SPECIAL,
INDIRECT OR CONSEQUENTIAL DAMAGES, OR ANY DAMAGES WHATSOEVER RESULTING
FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT,
NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH
THE USE OR PERFORMANCE OF THE SPECIFICATION.
3. THIRD PARTY RIGHTS.
Without limiting the generality of Section 2 above, LICENSOR ASSUMES NO RESPONSIBILITY TO
COMPILE, CONFIRM, UPDATE OR MAKE PUBLIC ANY THIRD PARTY ASSERTIONS OF
PATENT OR OTHER INTELLECTUAL PROPERTY RIGHTS THAT MIGHT NOW OR IN THE
FUTURE BE INFRINGED BY AN IMPLEMENTATION OF THE SPECIFICATION IN ITS CURRENT,
OR IN ANY FUTURE FORM. IF ANY SUCH RIGHTS ARE DESCRIBED ON THE SPECIFICATION,
LICENSOR TAKES NO POSITION AS TO THE VALIDITY OR INVALIDITY OF SUCH
ASSERTIONS, OR THAT ALL SUCH ASSERTIONS THAT HAVE OR MAY BE MADE ARE SO
LISTED.
4. TERMINATION OF LICENSE.
In the event of a breach of this Agreement by Licensee or any of its employees or members, Licensor shall
give Licensee written notice and an opportunity to cure. If the breach is not cured within thirty (30) days
after written notice, or if the breach is of a nature that cannot be cured, then Licensor may immediately or
thereafter terminate the licenses granted in this Agreement.
5. MISCELLANEOUS.
All notices required under this Agreement shall be in writing, and shall be deemed effective five days from
deposit in the mails. Notices and correspondence to the NFC Forum address as it appears below. This
Agreement shall be construed and interpreted under the internal laws of the United States and the
Commonwealth of Massachusetts, without giving effect to its principles of conflict of law.
NFC Forum, Inc.
401 Edgewater Place, Suite 600
Wakefield, MA, USA 01880
Contents
Type 1 Tag Operation Specification Page i
Contents
1 Introduction .................................................................................................... 1
1.1 Objectives ...................................................................................................................... 1
1.2 Applicable Documents or References ........................................................................... 1
1.3 Administration ............................................................................................................... 2
1.4 Name and Logo Usage .................................................................................................. 2
1.5 Intellectual Property ...................................................................................................... 3
1.6 Special Word Usage ...................................................................................................... 3
1.7 Convention and Notations ............................................................................................. 3
1.7.1 Representation of Numbers ............................................................................ 3
1.8 Abbreviations ................................................................................................................ 3
1.9 Glossary ......................................................................................................................... 5
2 Memory Structure and Management ............................................................ 6
2.1 General .......................................................................................................................... 6
2.2 Static Memory Structure ................................................................................................ 6
2.2.1 Memory Map .................................................................................................. 6
2.2.2 Header ROM Format ...................................................................................... 7
2.2.3 UID Format ..................................................................................................... 7
2.2.4 Main Read/Write Memory Format ................................................................. 7
2.2.5 Block Dh ......................................................................................................... 7
2.2.6 Lock Control/Status Bytes .............................................................................. 8
2.2.7 OTP Bytes ....................................................................................................... 8
2.3 Dynamic Memory Structure .......................................................................................... 8
2.3.1 Dynamic Memory Map ................................................................................... 8
2.3.2 Dynamic Memory Reserved Bytes ............................................................... 10
2.3.3 Dynamic Memory Lock Bytes ...................................................................... 10
2.3.4 Dynamic Memory Area ................................................................................ 10
2.4 TLV Blocks ................................................................................................................. 10
2.4.1 Format ........................................................................................................... 10
2.4.2 Location ........................................................................................................ 12
2.4.3 Lock Control TLV ........................................................................................ 12
2.4.4 Reserved Memory Control TLV ................................................................... 13
2.4.5 NDEF Message TLV .................................................................................... 14
2.4.6 Proprietary TLV ............................................................................................ 15
2.4.7 NULL TLV ................................................................................................... 15
2.4.8 Terminator TLV ............................................................................................ 15
3 RF Interface .................................................................................................. 16
4 Framing and Transmission Handling ........................................................ 17
4.1 Frame Formats ............................................................................................................. 17
4.2 Transmission Handling ................................................................................................ 17
5 Command Set .............................................................................................. 18
5.1 State Diagram .............................................................................................................. 18
5.2 Tag Command and Response Set ................................................................................ 18
5.2.1 Static Memory Model ................................................................................... 18
5.2.2 Dynamic Memory Model .............................................................................. 18
5.3 Command Format ........................................................................................................ 19
5.3.1 Command List............................................................................................... 19
Contents
Type 1 Tag Operation Specification Page ii
5.3.2 Command-Response Format ......................................................................... 20
5.3.3 Address Operand........................................................................................... 20
5.3.4 CRC .............................................................................................................. 21
5.3.5 UID Echo ...................................................................................................... 21
5.4 Command Details ........................................................................................................ 21
5.4.1 Detailed Timing ............................................................................................ 21
5.4.2 Timing Definitions ........................................................................................ 21
5.5 SENS_REQ and ALL_REQ ........................................................................................ 22
5.6 Read Identification (RID) ............................................................................................ 22
5.7 Read All Blocks 0-Eh (RALL) .................................................................................... 23
5.8 Read Byte (READ) ...................................................................................................... 23
5.9 Write-Erase Byte (WRITE-E) ..................................................................................... 24
5.10 Write-No-Erase Byte (WRITE-NE) ............................................................................ 25
5.11 Locking ........................................................................................................................ 26
5.12 Read Segment (RSEG) ................................................................................................ 26
5.13 Read 8 Bytes (READ8) ............................................................................................... 27
5.14 Write-Erase 8 Bytes (WRITE-E8) ............................................................................... 27
5.15 Write-No-Erase 8 Bytes (WRITE-NE8) ...................................................................... 27
6 NDEF Detection and NDEF Access ............................................................ 29
6.1 NDEF Management ..................................................................................................... 29
6.1.1 Identification as NFC Forum Type 1 Tag ..................................................... 29
6.1.2 Write Permission........................................................................................... 29
6.1.3 Confirmation of Presence of NDEF Message in Type 1 Tag ....................... 29
6.1.4 Capability Container ..................................................................................... 29
6.2 Version Treatment ....................................................................................................... 30
6.3 NDEF Storage ............................................................................................................. 32
6.4 Life Cycle .................................................................................................................... 33
6.4.1 General .......................................................................................................... 33
6.4.2 Overview of Life-Cycle States ..................................................................... 33
6.4.3 INITIALIZED State ...................................................................................... 33
6.4.4 READ/WRITE State ..................................................................................... 33
6.4.5 READ ONLY State ...................................................................................... 34
6.4.6 Determination of Life Cycle State ................................................................ 34
6.5 Rules for Life Cycle Operation ................................................................................... 35
6.5.1 Detect NDEF on tag ...................................................................................... 35
6.5.2 Read NDEF Message .................................................................................... 35
A. Appendix A................................................................................................... 37
A.1 Example NDEF Mapping (Static Memory Model) ..................................................... 37
A.2 Example NDEF Mapping (Dynamic Memory Model) ................................................ 39
B. Revision History .......................................................................................... 42
Figures
Type 1 Tag Operation Specification Page iii
Figures
Figure 1: Static Memory Map of the Base NFC Forum Type 1 Tag ............................................... 7
Figure 2: Lock Control/Status Bytes ............................................................................................... 8
Figure 3: Example Dynamic Memory Map of NFC Forum Type 1 Tag......................................... 9
Figure 4: Length Field Formats ..................................................................................................... 11
Figure 5: RALL Command/Response Diagram ............................................................................ 23
Figure 6: READ Command/Response Diagram ............................................................................ 23
Figure 7: WRITE-E Command/Response Diagram ...................................................................... 24
Figure 8: WRITE-NE Command/Response Diagram ................................................................... 25
Figure 9: Location of NDEF Message ........................................................................................... 32
Figure 10: Memory Map of Example Smartposter NDEF Message ............................................. 38
Figure 11: Example Dynamic Memory Map ................................................................................. 40
Tables
Table 1: Abbreviations .................................................................................................................... 3
Table 2: Defined TLV blocks ........................................................................................................ 12
Table 3: Command-Response Byte Count (Static Memory Model) ............................................. 18
Table 4: Command-Response Summary (Static Memory Model) ................................................ 18
Table 5: Command-Response Byte Count (Dynamic Memory Model) ........................................ 19
Table 6: Command-Response Summary (Dynamic Memory Model) ........................................... 19
Table 7: List of Commands (Static Memory Model) .................................................................... 19
Table 8: List of Additional Commands (Dynamic Memory Model) ............................................. 20
Table 9: Format of Address Operand ADD (Static Memory Structure) ....................................... 20
Table 10: Format of Address Operand ADDS (Dynamic Memory Model) .................................. 20
Table 11: Format of Address Operand ADD8 (Dynamic Memory Model) .................................. 21
Table 12: Timing Definitions ........................................................................................................ 22
Table 13: FDT Timing Calculations .............................................................................................. 22
Table 14: Example Coding of the CC Bytes of Block 1 ............................................................... 30
Table 15: Rules for Handling of the Version Number .................................................................. 31
Table 16: Example Smartposter NDEF Message .......................................................................... 37
Table 17: Revision History ............................................................................................................ 42