AT88SC1616CRF [ATMEL]

13.56 MHz CryptoRF® EEPROM Memory 16 Kbits; 13.56 MHz的CryptoRF® EEPROM存储器16千位
AT88SC1616CRF
型号: AT88SC1616CRF
厂家: ATMEL    ATMEL
描述:

13.56 MHz CryptoRF® EEPROM Memory 16 Kbits
13.56 MHz的CryptoRF® EEPROM存储器16千位

存储 可编程只读存储器 电动程控只读存储器 电可擦编程只读存储器
文件: 总10页 (文件大小:165K)
中文:  中文翻译
下载:  下载PDF数据表文档文件
Features  
One of a Family of Devices with User Memory of 1 Kbit to 64 Kbits  
Contactless 13.56 MHz RF Communications Interface  
ISO/IEC 14443-2:2001 Type B Compliant  
ISO/IEC 14443-3:2001 Type B Compliant Anticollision Protocol  
Command Set Optimized for Multicard RF Communications  
Tolerant of Type A Signaling for Multiprotocol Applications  
Integrated 82 pF Tuning Capacitor  
User EEPROM Memory  
13.56 MHz  
CryptoRF®  
16 Kbits Configured as Sixteen 128-byte (1-Kbit) User Zones  
Byte, Page, and Partial Page Write Modes  
EEPROM Memory  
16 Kbits  
Self-timed Write Cycle  
256-byte (2-Kbit) Configuration Zone  
User-programmable Application Family Identifier (AFI)  
User-defined Anticollision Polling Response  
AT88SC1616CRF  
Summary  
User-defined Keys and Passwords  
High-Security Features  
64-bit Mutual Authentication Protocol (under license of ELVA)  
Encrypted Checksum  
Stream Encryption  
Four Key Sets for Authentication and Encryption  
Eight Sets of Two 24-bit Passwords  
Password and Authentication Attempts Counters  
Selectable Access Rights by Zone  
Antitearing Function  
Tamper Sensors  
High Reliability  
Endurance: 100,000 Write Cycles  
Data Retention: 10 Years  
Operating Temperature: 40°C to +85°C  
Description  
The CryptoRF® family integrates a 13.56 MHz RF interface into a CryptoMemory®,  
resulting in a contactless smart card with advanced security and cryptographic  
features. This device is optimized as a contactless secure memory, for RF smart  
cards, and secure data storage, without the requirement of an internal  
microprocessor.  
5026DS–CRRF–03/09  
For communications, the RF interface utilizes the ISO/IEC 14443-2 and -3 Type B bit timing and signal modulation schemes,  
and the ISO/IEC 14443-3 Slot-MARKER Anticollision Protocol. Data is exchanged half duplex at a 106-kbit/s rate, with a  
two-byte CRC_B providing error detection capability. The maximum communication range between the reader antenna and  
contactless card is approximately 10 cm when used with an RFID reader that transmits the maximum ISO/IEC 14443-2 RF  
power level. The RF interface powers the other circuits; no battery is required. Full compliance with the ISO/IEC 14443-2 and -3  
standards results in anticollision interoperability with the AT88RF020 2-Kbit RFID EEPROM product and provides both a proven  
RF communication interface and a robust anticollision protocol.  
2
AT88SC1616CRF  
5026DS–CRRF–03/09  
AT88SC1616CRF  
The AT88SC1616CRF contains 16 Kbits of user memory and 2 Kbits of configuration memory. The 2 Kbits of configuration  
memory contain eight sets of read/write passwords, four crypto key sets, security access registers for each user zone, and  
password/key registers for each zone.  
The CryptoRF command set is optimized for a multicard RF communications environment. A programmable AFI register allows  
this IC to be used in numerous applications in the same geographic area with seamless discrimination of cards assigned to a  
particular application during the anticollision process.  
1.  
Block Diagram  
Figure 1.  
Block Diagram  
RF Interface  
AC1  
Command  
and  
EEPROM  
Response  
Data Transfer  
Over  
Voltage  
Clamp  
r
e
i
C
f
i
VDD  
t
Regulator  
c
e
R
VSS  
Password  
Verification  
Authentication  
Encryption  
and  
Certification  
Unit  
Frame  
Formatting  
and  
Error  
Detection  
Interface  
AC2  
Anticollision  
Clock  
Extraction  
Data  
Extraction  
Random Number  
Generator  
3
5026DS–CRRF–03/09  
2.  
Communications  
All personalization and communication with this device is performed through the RF interface. The IC includes an  
integrated tuning capacitor, enabling it to operate with only the addition of a single external coil antenna.  
The RF communications interface is fully compliant with the electrical signaling and RF power specifications in ISO/IEC  
14443-2:2001 for Type B only. Anticollision operation and frame formatting are compliant with ISO/IEC 14443-3:2001  
for Type B only.  
ISO/IEC 14443 nomenclature is used in this specification where applicable. The following abbreviations are utilized  
throughout this document. Additional terms are defined in the section in which they are used.  
PCD – Proximity Coupling Device: the reader/writer and antenna  
PICC – Proximity Integrated Circuit Card: the tag/card containing the IC and antenna  
RFU – Reserved for Future Use: any feature, memory location, or bit that is held as reserved for future use  
$ xx – Hexadecimal Number: denotes a hex number “xx” (Most Significant Bit on left)  
2.1.  
Anticollision Protocol  
When the PICC enters the 13.56 MHz RF field of the host reader (PCD), it performs a power on reset (POR) function  
and waits silently for a valid Type B polling command. The CryptoRF PICC processes the antitearing registers as part  
of the POR process.  
The PCD initiates the anticollision process by issuing an REQB or WUPB command. The WUPB command activates  
any card (PICC) in the field with a matching AFI code. The REQB command performs the same function but does not  
affect a PICC in the Halt state. The CryptoRF command set is available only after the anticollision process has been  
completed.  
2.2.  
2.3.  
CRC Error Detection  
A two-byte CRC_B is required in each frame transmitted by the PICC or PCD to permit transmission error detection.  
The CRC_B is calculated on all of the command and data bytes in the frame. The SOF, EOF, start bits, stop bits, and  
EGT are not included in the CRC_B calculation. The two-byte CRC_B follows the data bytes in the frame.  
Figure 2.  
Location of the Two CRC_B Bytes within a Frame  
SOF  
K data bytes  
CRC1  
CRC2  
EOF  
Type A Tolerance  
The RF Interface is designed for use in multiprotocol applications. It will not latch or lock up if exposed to Type A  
signals and will not respond to them. The PICC may reset in the presence of Type A field modulation but is not  
damaged by exposure to Type A signals.  
4
AT88SC1616CRF  
5026DS–CRRF–03/09  
AT88SC1616CRF  
3.  
User Memory  
The EEPROM user memory is divided into 16 user zones as shown in the memory map in Table 1. Multiple zones  
allow for different types of data or files to be stored in different zones. Access to the user zones is allowed only after  
security requirements have been met. These security requirements are defined by the user in the configuration memory  
during personalization of the device. The EEPROM memory page length is 16 bytes.  
Table 1.  
Memory Map  
Zone  
$0  
$1  
$2  
$3  
$4  
$5  
$6  
$7  
$00  
-
-
128 Bytes  
User 0  
$78  
$00  
-
User 1  
-
-
-
-
User 14  
$78  
$00  
-
128 Bytes  
User 15  
-
$78  
4.  
Configuration Memory  
The configuration memory consists of 2048 bits of EEPROM memory used for storing system data, passwords, keys,  
codes, and security-level definitions for each user zone. Access rights to the configuration zone are defined in the  
control logic and may not be altered by the user. These access rights include the ability to program certain portions of  
the configuration memory and then lock the data written through use of the security fuses.  
4.1.  
Security Fuses  
There are three fuses on the device that must be blown during the device personalization process. Each fuse locks  
certain portions of the configuration memory as OTP memory. Fuses are designated for the module manufacturer, card  
manufacturer and card issuer and must be blown in sequence.  
5
5026DS–CRRF–03/09  
5.  
Communication Security  
Communication between the PICC and reader operates in three basic modes. Standard mode is the default mode for  
the device after power-up and anticollision. Authentication mode is activated by a successful authentication sequence.  
Encryption mode is activated by a successful encryption activation, following a successful authentication.  
Table 2.  
Configuration Security Modes  
Mode User Data  
Passwords  
clear  
Data Integrity Check  
MDC(1)  
Standard  
clear  
clear  
Authentication  
Encryption  
encrypted  
encrypted  
MAC(2)  
MAC(2)  
encrypted  
Note: 1. Modification Detection Code  
2. Message Authentication Code  
5.1.  
Security Methodology  
Figure 3.  
Security Methodology  
Device (Card)  
Card Number  
VERIFY A  
Host (Reader)  
COMPUTE Challenge A  
Challenge A  
COMPUTE Challenge B  
Challenge B  
VERIFY B  
Check Password (RPW)  
DATA  
Read Password (RPW)  
VERIFY CS (optional)  
Checksum (CS)  
Check Password (WPW)  
VERIFY CS  
Write Password (WPW)  
DATA  
CS  
Write DATA  
5.2.  
Memory Access  
Depending on the device configuration, the host will carry out the authentication protocol and/or present different  
passwords for each operation: read or write. To insure security between the different user zones (multiapplication  
card), each zone can use a different set of passwords. A specific attempts counter for each password and for the  
authentication provides protection against systematic attacks.  
6
AT88SC1616CRF  
5026DS–CRRF–03/09  
AT88SC1616CRF  
6.  
Security Operations  
Antitearing  
6.1.  
In the event of a power loss during a write cycle, the integrity of the device’s stored data may be recovered. This  
function is optional: the host may choose to activate the antitearing function depending on application requirements.  
When antitearing is active, write commands take longer to execute since more write cycles are required to complete  
them. Data writes are limited to 8-byte pages when antitearing is active.  
Data is written first to a buffer zone in EEPROM instead of to the intended destination address, but with the same  
access conditions. The data is then written to the required location. If this second write cycle is interrupted due to a  
power loss, the device will automatically recover the data from the buffer zone at the next power-up.  
6.2.  
6.3.  
Password Verification  
Passwords may be used to protect user zone read and/or write access. When a password is presented using the  
Check Password command, it is memorized and active until power is removed unless a new password is presented or  
a valid DESELECT or IDLE command is received. Only one password is active at a time, but write passwords also give  
read access.  
Authentication Protocol  
The access to a user zone may be protected by an authentication protocol in addition to password dependent rights.  
Passwords are encrypted in authentication mode.  
The authentication success is memorized and active as long as the chip is powered, unless a new authentication is  
initialized or a valid DESELECT or IDLE command is received. If the new authentication request is not validated, the  
card loses its previous authentication and it must be presented again. Only the last request is memorized.  
6.4.  
Encryption  
The data exchanged between the card and the reader during Read, Write, and Check Password commands may be  
encrypted to ensure data confidentiality.  
The issuer may choose to protect the access to a user zone with an encryption key by settings made in the  
configuration memory. In that case, activation of the encryption mode is required in order to read/write data in the zone.  
The encryption activation success is memorized and active as long as the chip is powered, unless a new initialization is  
initiated or a valid DESELECT or IDLE command is received. If the new encryption activation request is not validated,  
the card will no longer encrypt data during read operations nor will it decrypt data received during write or Check  
Password operations.  
6.5.  
6.6.  
Checksum  
The PICC implements a data validity check function in the form of a checksum. The checksum may function in  
standard or cryptographic mode. In the standard mode, the checksum is optional and may be used for transmission  
error detection. The cryptographic mode is more powerful since it provides data origin authentication capability in the  
form of a Message Authentication Code (MAC). To write data to the device, the host is required to compute a valid  
MAC and provide it to the device. If after an ingoing command the device computes a MAC different from the MAC  
transmitted by the host, not only is the command abandoned but the cryptographic mode is also reset. A new  
authentication is required to reactivate the cryptographic mode.  
Initial Device Programming  
CryptoRF is delivered with all security features disabled. To program the polling response or enable the security  
features of CryptoRF the device must be personalized by programming several registers. This is accomplished by  
programming the configuration memory using simple write and read commands.  
7
5026DS–CRRF–03/09  
6.7.  
7.  
Transport Password  
To gain access to the configuration memory, a transport password known as the secure code must be presented using  
the Check Password command. The secure code for AT88SC1616CRF is $50 44 72.  
Tuning Capacitance  
The capacitance between the coil pins AC1 and AC2 is 82 pF nominal and may vary ±10% over temperature and  
process variation.  
8.  
Reliability  
Table 3.  
Reliability  
Parameter  
Min  
100,000  
10  
Typ  
Max  
Units  
Write Cycles  
Years  
Write endurance  
Data retention  
9.  
Mechanical  
9.1.  
Engineering Samples  
Table 4.  
Engineering Samples  
Sample Code  
Sample Description  
R Module, 82 pF, on 35 mm tape  
Maximum Range  
AT88SC1616CRF-MR1  
AT88SC1616CRF-L01B  
AT88SC1616CRF-MU1  
AT88SC1616CRF-MS1  
RF Smart Card, ID-1 size, PVC  
810 cm  
13 cm  
RFID Tag, 17 mm diameter, on 35 mm tape  
RFID Tag, 10 x 20 mm size, on 35 mm tape  
1015 mm  
8
AT88SC1616CRF  
5026DS–CRRF–03/09  
AT88SC1616CRF  
9.2.  
Ordering Information  
Table 5.  
Ordering Information  
Ordering Code  
Package  
Tuning Capacitor  
82 pF  
Temperature Range  
Commercial (0°C to 70°C)  
Industrial (40°C to 85°C)  
AT88SC1616CRF-MR1  
AT88SC1616CRF-WA1  
R Module  
6 mil wafer, 150 mm diameter  
82 pF  
Package Type  
Description  
2- lead RF Smart Card Module, XOA2 style, RoHS compliant  
R Module  
9.3.  
Packaging Information  
Ordering Code: AT88SCxxxxCRF-MR1  
Module Size: M5  
Dimension*: 5.06 x 8.00 [mm]  
Glob Top: Square - 4.8 x 5.1 [mm]  
Thickness: 0.38 [mm]  
Pitch: 9.5 mm  
9
5026DS–CRRF–03/09  
Headquarters  
International  
Atmel Corporation  
Atmel Asia  
Atmel Europe  
Atmel Japan  
2325 Orchard Parkway  
San Jose, CA 95131  
USA  
Tel: 1(408) 441-0311  
Fax: 1(408) 487-2600  
Unit 1-5 & 16, 19/F  
Le Krebs  
8, Rue Jean-Pierre Timbaud  
BP 309  
78054 Saint-Quentin-en-  
Yvelines Cedex  
France  
9F, Tonetsu Shinkawa Bldg.  
1-24-8 Shinkawa  
Chuo-ku, Tokyo 104-0033  
Japan  
Tel: (81) 3-3523-3551  
Fax: (81) 3-3523-7581  
BEA Tower, Millennium City 5  
418 Kwun Tong Road  
Kwun Tong, Kowloon  
Hong Kong  
Tel: (852) 2245-6100  
Fax: (852) 2722-1369  
Tel: (33) 1-30-60-70-00  
Fax: (33) 1-30-60-71-11  
Product Contact  
Web Site  
Technical Support  
Sales Contact  
www.atmel.com  
securef@atmel.com  
www.atmel.com/contacts  
Literature Requests  
www.atmel.com/literature  
I N N O VAT R O N  
RATP/Innovation Technology  
Disclaimer: The information in this document is provided in connection with Atmel products. No license, express or implied, by estoppel or otherwise, to any  
intellectual property right is granted by this document or in connection with the sale of Atmel products. EXCEPT AS SET FORTH IN ATMEL’S TERMS AND  
CONDITIONS OF SALE LOCATED ON ATMEL’S WEB SITE, ATMEL ASSUMES NO LIABILITY WHATSOEVER AND DISCLAIMS ANY EXPRESS, IMPLIED  
OR STATUTORY WARRANTY RELATING TO ITS PRODUCTS INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTY OF MERCHANTABILITY,  
FITNESS FOR  
A PARTICULAR PURPOSE, OR NON-INFRINGEMENT. IN NO EVENT SHALL ATMEL BE LIABLE FOR ANY DIRECT, INDIRECT,  
CONSEQUENTIAL, PUNITIVE, SPECIAL OR INCIDEN-TAL DAMAGES (INCLUDING, WITHOUT LIMITATION, DAMAGES FOR LOSS OF PROFITS, BUSINESS  
INTERRUPTION, OR LOSS OF INFORMATION) ARISING OUT OF THE USE OR INABILITY TO USE THIS DOCUMENT, EVEN IF ATMEL HAS BEEN ADVISED  
OF THE POSSIBILITY OF SUCH DAMAGES. Atmel makes no representations or warranties with respect to the accuracy or completeness of the contents of this  
document and reserves the right to make changes to specifications and product descriptions at any time without notice. Atmel does not make any commitment to  
update the information contained herein. Unless specifically provided otherwise, Atmel products are not suitable for, and shall not be used in, automotive  
applications. Atmel’s products are not intended, authorized, or warranted for use as components in applications intended to support or sustain life.  
© 2009 Atmel Corporation. All rights reserved. Atmel®, logo and combinations thereof, Everywhere You Are®, CryptoMemory®, CryptoRF® and others, are  
registered trademarks or trademarks of Atmel Corporation or its subsidiaries. Innovatron® is a registered trademark of Innovatron. Other terms and  
product names may be trademarks of others.  
5026DS–CRRF–03/09  

相关型号:

AT88SC1616CRF-MR1

CryptoRF Specification
ATMEL

AT88SC1616CRF-MVA1

Telecom Circuit
MICROCHIP

AT88SC1616CRF-MX1

CryptoRF Specification
ATMEL

AT88SC1616CRF-MY1

CryptoRF Specification
ATMEL

AT88SC1616CRF-WA1

CryptoRF Specification
ATMEL

AT88SC1616CRF_09

13.56 MHz CryptoRF® EEPROM Memory 16 Kbits
ATMEL

AT88SC1616C_07

CryptoMemory 16 Kbit
ATMEL

AT88SC1616C_09

CryptoMemory 16 Kbit
ATMEL

AT88SC1616C_11

Atmel CryptoMemory, 16Kbit
ATMEL

AT88SC1616C_JYP

CryptoMemory 16 Kbit
ATMEL
ETC

AT88SC200-JC

Memory Circuit, 2KX1, CMOS, PQCC8, PLASTIC, LCC-8
ATMEL