Part Number Hot Search : 
836915 M68HC128 SEL1013M RT9266PE 186VLA IN74AC 6004B CZRL4755
Product Description
Full Text Search
 

To Download E5561 Datasheet File

  If you can't view the Datasheet, Please click here to try to view without PDF Reader .  
 
 


  Datasheet File OCR Text:
 E5561
Standard Read/Write Crypto Identification IC
Description
The E5561 is a member of the Atmel Wireless & Microcontrollers IDentification IC (IDIC) family for applications where information has to be transmitted contactlessly. The IDIC is connected to a tuned LC circuit for power supply and bidirectional data communication (Read/Write) to a base station. Atmel Wireless & Microcontrollers offers LC circuit and chip assembled in form of a transponder or tag. These units are small, smart and rugged data storage units. The E5561 is a Read/Write crypto IC for applications which demand higher security levels than standard R/W transponder ICs can offer. For that purpose, the E5561 has an encryption algorithm block which enables a base station to authenticate the transponder. The base station transmits a random number to the E5561. This challenge is encrypted by both IC and base station. The E5561 sends back the result to the base station for comparison. As both should possess the same secret key, the results of this encryption are expected to be equal. Any attempt to fake the base station with a wrong transponder will be recognized immediately. The on-chip 320-bit EEPROM (10 blocks of 32 bits each) can be read and written blockwise by a base station. Two or four blocks contain the ID code and six memory blocks are used to store the crypto key as well as the read/write options. The crypto key and the ID code can be protected individually against overwriting. Likewise, the crypto key can not be read out. 125 kHz is the typical operational frequency of a system using the E5561. Two read data rates are programmable. Reading occurs through damping the incoming RF field with an on-chip load. This damping is detected by the field-generating base station. Data transmission starts after power-up with the transmission of the ID code and continues as long as the E5561 is powered. Writing is carried out with Atmel Wireless & Microcontrollers' writing method. To transmit data to the E5561, the base station has to interrupt the RF for a short time to create a field gap. The information is encoded in the number of clock cycles between two subsequent gaps.
Features
D Low-power, low-voltage CMOS IDIC D Contactless power supply, data transmission and programming of EEPROM D Radio Frequency (RF): 100 kHz to 150 kHz, typically 125 kHz D Automatic programmable adaptation of resonance frequency D Easy synchronization with special terminators D High-security method unilink challenge response authentication by AUT64 crypto algorithm
Power Coil interface Challenge Base station Response Data
D Encryption time < 10 ms, optional < 30 ms programmable at 125 kHz D 320-bit EEPROM memory in 10 blocks of 32 bits each D Programmable read/write protection D Extensive protection against contactless malprogramming of the EEPROM D Programming time for one block of the EEPROM 16 ms typically D Main options set by EEPROM: Bitrate [bit/s]: RF/32, RF/64 Encoding: Manchester, Biphase
Transponder Controller Memory Crypto
E5561
Figure 1. Transponder system example using E5561
Rev. A3, 04-Oct-00
1 (26)
Preliminary Information
E5561
Table of Contents
1 Internal Modes of the E5561 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1.1 Start-up . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1.2 ID Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1.3 Programming Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1.4 Direct-Access Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1.5 Crypto Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1.6 Stop Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1.7 Password Function . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1.8 Mode Transitions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Building Blocks of the E5561 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2.1 Analog Front End (AFE) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2.2 Controller . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2.3 Power-On Reset (POR) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2.4 Configuration Register . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2.5 Adapt . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2.6 Bitrate Generator . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2.7 Bit Decoder . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2.8 Modulator . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2.9 HV Generator . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2.10 Memory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2.11 Crypto Circuit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Protection Mechanisms of the E5561 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3.1 Password Protection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3.2 Lockbit Protection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3.3 Stop Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Operating the E5561 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4.1 General . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4.2 Supply . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4.3 Start-up . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4.4 Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4.5 Data Transmission to the Base Station (Read) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4.5.1 ID Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4.5.2 Modulation and Bitrate . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4.5.3 Data Streams . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4.5.4 Terminators . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4.6 Data Transmission to the E5561 (Write) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4.6.1 Start Gap . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4.6.2 Bit Decoder . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4.6.3 OP Codes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4.6.4 Programming Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4.6.5 Direct-Access Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4.6.6 Software Reset . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4.6.7 Crypto Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 4 4 4 5 5 5 5 6 7 7 7 7 7 7 8 8 8 8 8 9 9 9 9 10 10 10 10 10 11 12 12 12 13 13 14 14 14 14 15 16 16 16
2
3
4
2 (26)
Rev. A3, 04-Oct-00
Preliminary Information
E5561
Table of Contents (continued)
4.6.8 Stop Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4.6.9 Password Function . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4.7 Error Handling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4.7.1 Errors During Writing Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4.7.2 Errors During Programming Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4.7.3 Errors During Direct-Access Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4.7.4 Errors During Crypto Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4.7.5 Error Handling in Password Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4.8 Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4.8.1 Initialization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4.8.2 Starting the Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4.8.3 Challenge . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4.8.4 Checksum . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4.8.5 Encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4.8.6 Response . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Technical Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5.1 Absolute Maximum Ratings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5.2 Operating Characteristics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Application Example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 18 18 18 18 18 18 18 20 21 21 21 21 21 21 24 24 24 25
5
6
Rev. A3, 04-Oct-00
3 (26)
Preliminary Information
E5561
Ordering Information
Extended Type Number E5561A-DOW Package DOW Remarks
Pads
Name Coil 1 Coil 2 VDD VSS Pad Window 136 x 136 m2 136 x 136 m2 78 x 78 m2 Function 1st coil pad 2nd coil pad Positive supply voltage Negative supply voltage (gnd)
1.2
ID Mode
In the ID mode the E5561 transmits an identification datastream (ID code) to the base station. As the base station reads out data coming from the transponder, this direction of data transmission will be designated as `read'. The ID code is sent in loop as long as the RF field is applied. The single parts of the datastream and the type of modulation depend on the configuration loaded during start-up. The following options are available during ID mode: D Two different bitrates and modulations D Two possible lengths of ID code (64 bit or 128 bit) D Two different terminators D 4-bit preburst followed by terminator 1 between start-up and sending the first data bits of the ID-code
82 x 82 m2
For normal (coil-driven) operation, the E5561 needs only Coil 1 and Coil 2.
Chip Dimensions
Test pads Coil 1
E5561
Coil 2 V SS 4930 m
VDD
1600m
1.3
Programming Mode
1
Internal Modes of the E5561
The E5561 must be programmed before being used in a security system. The E5561 contains a 320-bit EEPROM which is arranged in 10 blocks of 32 bits each. Programming the E5561 is carried out blockwise, i.e., every single block has to be programmed separately. The blocks of the EEPROM are divided into 4 sections: D Configuration D ID code D Crypto key D Customer configuration Every section consists of one or more block of the EEPROM. Programming is carried out by sending the programming data sequence to the E5561. As the base station sends data to the transponder this direction of data transmission will be designated as `write'. After the base station has sent the data sequence and the specified block has been programmed, the E5561 transmits the content of the programmed EEPROM block. The content is always sent in loop with terminator 1. The beginning of the datastream is indicated by a preburst. During programming, the E5561 monitors several fault and protection mechanisms. If a fault or a protection violation is detected, the E5561 enters the ID mode.
The E5561 can be operated in several internal modes, each providing a special function. These are: D Start-up D ID mode D Programming mode D Direct-access mode D Crypto mode D Stop mode D Password function The following section gives a short functional description of each mode. A more detailed description is given in the section: "Operating the E5561".
1.1
Start-up
After the power-on reset (POR) has reset the entire circuit, the E5561 is configured by reading out the configuration data bits of the EEPROM.
4 (26)
Rev. A3, 04-Oct-00
Preliminary Information
E5561
1.4 Direct-Access Mode
the AUT64 result by sending another data sequence (e.g., if the checksum was found to be wrong). During the crypto mode, the E5561 monitors several fault and protection mechanisms. If a fault or a protection violation is detected, the E5561 enters the ID mode. If the base station transmits a special data sequence to the E5561, it will enter the direct-access mode. The base station can activate two different functions: D Read the content of a single block of the EEPROM: In this case, the E5561 transmits the block's content in loop, starting with a preburst followed by the terminator which is also used to indicate the beginning of the transmission of the specified block data. D Reset the E5561 in case of all modes: During the direct-access mode, the E5561 monitors several fault and protection mechanisms. If a fault or a protection violation is detected, the E5561 enters the ID mode.
1.6
Stop Mode
If two or more transponders are used simultaneously (e.g., in a manufacturing step), it might be useful to be able to set the transponders in a passive state. To avoid a communication conflict, the base station has to transmit a special data sequence to the active transponder(s) forcing them to enter the stop mode. In the stop mode, the E5561 switches off the damping as long as the RF field is applied. After a power-on reset, or after receiving the software-reset command the E5561 enters the start-up and the ID mode again. During the data sequence of the stop mode, the E5561 monitors fault mechanisms. If a fault is detected, the E5561 enters the ID mode. The stop command can be disabled. Note: For correct operation of the stop-mode it is necessary that the field is switched off instantly.
1.5
Crypto Mode
In crypto mode, a non-linear high-security encryption algorithm called AUT64 is used to authenticate the E5561. After the base station has identified the E5561 (i.e., read the ID code), the base station may authenticate the transponder by transmitting it a challenge. Receiving this data sequence, the E5561 enters the crypto mode. This initiates the following actions: D During calculating the AUT64 result, the transponder transmits the checksum of the challenge D The E5561 generates the response from the calculated result of the AUT64 D As soon as the calculation is finished, the E5561 interrupts the transmission of the checksum by sending a terminator D The E5561 transmits the response in loop with a terminator back to the base station The base station can read the response and authentify the transponder. It is possible to interrupt the calculation of
1.7
Password Function
The password function is a separate protection mechanism to avoid that a base station can read or manipulate the internal configuration and data blocks of the E5561 without knowing the password. Only a transition to the crypto-mode is enabled. If the password function is active, the base station has to send the password before any other operations are possible. During the password mode, the E5561 monitors several fault and protection mechanism. If a fault or a protection violation is detected, the E5561 enters the ID mode.
Rev. A3, 04-Oct-00
5 (26)
Preliminary Information
E5561
1.8 Mode Transitions
A transition to and from all other modes (except the ID mode) is possible by sending the corresponding write sequence. Once the ID mode is left, returning is only possible by sending an uncorrect data sequence to the transponder. If the E5561 is in ID mode and the base station transmits a write sequence by interrupting the RF field, the internal mode changes according to the received write sequence. If an error has been detected or the password function has been enabled, the E5561 remains in ID mode.
Reset
Start-up
ID mode Gap Sequence received
Password function
Error
Direct-access mode
Programming mode
Crypto mode
Stop mode
Transmit data Gap
Transmit data
Transmit data
12717
Figure 2. State diagram of the E5561 (overview)
Note: This picture is only an overview. In reality, more transitions are possible.
6 (26)
Rev. A3, 04-Oct-00
Preliminary Information
E5561
2 Building Blocks of the E5561
MODULATOR CRYPTO CIRCUIT ANALOG FRONT END Coil1 ADAPT
BIT DECODER
CONF. REGISTER CONTROLLER Configuration data Transmission EEPROM control Error detection Encryption TEST LOGIC 64- or 128-bit code Input register HV GENERATOR POR
EEPROM MEMORY Crypto key
Coil2
VDD VSS
BITRATE GENERATOR
Test pads
Figure 3. Block diagram
12718
2.1
Analog Front End (AFE)
2.3
Power-On Reset (POR)
The AFE includes all circuits directly connected to the coil. It generates the IC's power supply and handles the bidirectional data communication with the base station. It consists of the following blocks: D Rectifier to generate a DC supply voltage from the AC coil voltage D Clock extractor D Switchable load between Coil1/Coil2 for data transmission from the IC to the base station (read) D Field gap detector for data transmission from the base station to the IC (write)
The power-on reset is a delay reset which is triggered when the supply voltage is applied.
2.4
Configuration Register
The configuration register stores the configuration data read out from EEPROM blocks 0 and 9. It is continuously refreshed which increases the reliability of the device (if the initially loaded configuration was wrong or modified, it will be corrected by subsequent refresh cycles).
2.5
Adapt
2.2
Controller
The controller has following functions: D Initialize and refresh configuration register from EEPROM D Control memory access (read, program) D Handle correct write data transmission D Error detection and error handling D Control encryption operation D Control adaptation of resonance frequency
The E5561 is able to minimize the tolerance of the resonance frequency between the base station and the transponder by switching on-chip capacitors in parallel to the LC circuit of the transponder. By using a coil of approximately 4 mH for a resonance frequency of 125 kHz it is possible to tune the resonance frequency in a range of about 5%. The active value of adapt is carried out automatically every time if the E5561 enters the RF field or the EEPROM is read out. This depends on a control bit. The automatic adaptation stops at this moment when the optimized adaptation is reached. This time is between 1.0 ms and 5.0 ms (125 kHz) depending on the capacitance value required. The voltage at Coil 1/Coil 2 after start-up is shown in figure 8.
Rev. A3, 04-Oct-00
7 (26)
Preliminary Information
E5561
Adapt bits: Details In addition to the adapt mode which is executed during start up phase by the IC itself, it is possible to set the adapt bits in EEPROM manually. Before using manual setting of adapt bits, the one bit A in block 0 must be set to 1 (see figure 9). This content of the three bits to be defined, are determining the response frequency of the transponder in a limitted range. Bits are set by microcontroller programming of block 0.
2.9
HV Generator
Voltage pump which generates about 18 V for programming of the EEPROM.
2.10 Memory
The memory of the E5561 is a 320-bit EEPROM which is arranged in 10 blocks of 32 bits each. All 32 bits of a block are programmed simultaneously. The programming voltage is generated on-chip. Block 0 is reserved for basic configuration data. Blocks 1 to 9 are freely programmable. Blocks 1 to 4 are used for the ID code, blocks 5 to 8 contain the crypto key. In password mode, bits 4 to 31 of block 9 contain the password; bits 0 to 3 of block 9 contain the customer-configuration data. If no password is required, the corresponding bits can be programmed freely. NOTE: Data from the memory is transmitted serially, starting with the least significant bit #0. The basic configuration data in block 0 contains the following information (see figure 9): D Type of modulation and bitrate D Length of ID code D Several lockbits D Terminator set The customer-configuration data in block 9 contains (see figure 10): D Lockbit for ID code (blocks 1 and 4/ 1 to 4) D Lockbit for crypto key (block 5 to 8) D Lockbit for block 9 D Password mode enable
2.6
Bitrate Generator
The bitrate generator can deliver bitrates of RF/32 and RF/64 for data transmission from the E5561 to the base station.
2.7
Bit Decoder
The bit decoder forms the signals needed for write operation and decodes the received data bits in the write data stream.
2.8
Modulator
The modulator consists of two data encoders and the terminator generator. There are two kinds of modulation: D Manchester mid-bit rising edge = data H; mid-bit falling edge = data L D Biphase every bit creates a change, a data "0" creates an additional mid-bit change
By using biphase modulation, data transmission always starts damping on.
DataClk ReadData Biphase Manchester
start of transmission Figure 4. Types of modulation
0
1
0
0
1
1
0 damping off damping on
12719
8 (26)
Rev. A3, 04-Oct-00
Preliminary Information
E5561
31 Password Crypto key 0 3 4 bit conf. Block 9
Blocks 5 to 8
ID code Configuration data 32 bits
Figure 5. Memory map
Blocks 1 to 4 Block 0
12720
2.11 Crypto Circuit
The crypto circuit uses the certified AUT64-algorithm to encrypt the challenge which is written to the E5561. The computed result can be read by the base station. Comparing the encryption results of the base station and the E5561, a high-security authentification procedure is established. This procedure requires the crypto key of the E5561 and the base station to be equal. The crypto key is stored in the blocks 5 to 8 of the EEPROM and can be locked by the user to avoid read-out or changes.
3.2
Lockbit Protection
A lockbit is a physical part of the EEPROM's content and is controlled as well as by the customer. The lockbit protection mechanism has two different effects: D Avoid programming EEPROM's blocks (modifying data) of the
3
Protection Mechanisms of the E5561
D Avoid reading out the crypto key from the EEPROM using direct-access mode If the base station tries to read out the crypto key and the corresponding lockbit is set, the E5561 will enter the ID mode immediately. Once the crypto key lockbit is set, the crypto key can neither be modified nor read out any more. There are several lockbits available, each affecting a special data region of the EEPROM. The main groups of lockbits are: D Lockbits to inhibit programming of the specified blocks of the EEPROM D Lockbits to inhibit programming of the specified blocks of a specific address range In both cases, an attempt to modify a data region protected by a lockbit will cause an error handling procedure (i.e., the E5561 enters ID mode)
Several protection mechanisms are implemented into the E5561. The two main groups are: D Error mechanisms to detect a fault. These mechanisms are always enabled. D Programmable protection mechanisms. These mechanisms are optional. When used, they provide protection against attempts to break the security system.
3.1
Password Protection
If the password protection is enabled, the E5561 remains in ID mode even if it has received a correct write sequence. The only possible operation is to modify the content of block 9 by sending the correct password bits. In all other cases, an error handling procedure is started and the E5561 enters ID mode.
Rev. A3, 04-Oct-00
9 (26)
Preliminary Information
E5561
3.3 Stop Mode
D Stop mode: the E5561 stops modulation An additional password function enables the E5561 to be operated only by a person who knows the password programmed in the EEPROM memory. The stop mode can also be used as a protection mechanism, e.g., during configuration at manufacturing. The base station can configure the transponders one by one, forcing them into stop mode after programming. In this way, transponders can be programmed even if there are other transponders in the RF field at the same time.
4.2
Supply
4
4.1
Operating the E5561
General
The basic functions of the E5561 are: supply the IC from the coil, read data from the EEPROM to the base station, authenticate the IC, receive commands from the base station and program the received data into the EEPROM. Several write errors can be detected to protect the memory from being overwritten with uncorrect data. A password function is implemented ensuring that only authorized people can operate the IC. Operating modes: D ID mode: the E5561 sends ID code to the base station D Programming mode: the E5561 programs the EEPROM with data bits received from the base station D Direct-access mode: the E5561 sends the content of single block of the EEPROM to the base station D Crypto mode: the E5561 computes a response according to the challenge received from the base station and sends the response to the base station Coil of base station Energy 125 kHz
The E5561 is supplied via a tuned LC circuit which is connected to the Coil1 and Coil2 pads. The incoming RF (actually a magnetic field) induces a current into the coil which powers the chip. The on-chip rectifier generates the DC supply voltage (VDD, VSS pads). Overvoltage protection prevents the IC from damage due to high field strengths (depending on the coil, the open-circuit voltage across the LC circuit can reach more than 100 V). The first occurrence of RF triggers a power-on reset pulse, ensuring a defined start-up state.
4.3
Start-up
The various modes of the E5561 are activated after the first read-out of the configuration. The modulation is on during power-on reset and is off while the configuration is read. After this initialization period of 128 + POR time FCs the E5561 starts the automatic adaptation of the resonance frequency. After the adaptation is carried out, the E5561 enters the ID mode immediately if the terminator 2 is selected, otherwise a data value of Fh in the selected configuration (modulation, bitrate) is sent followed by the optionally specified terminator 1 (see figure 8).
Tuned LC Coil 1 E5561 Data Coil 2 VSS V DD
14095
Figure 6. Application circuit
10 (26)
Rev. A3, 04-Oct-00
Preliminary Information
E5561
VCoil1-Coil2
Damping off Damping on
Load config. (190 FCs) Power-on reset
Automatic adaption
Read Fh
Term. 1
Read data with selected modulation and bitrate
12722
Figure 7. Voltage at Coil1/Coil2 after start-up (e.g., RF/32, Manchester, Terminator 1)
4.4
Configuration
The configuration data of the E5561 is stored in block 0 of the EEPROM which contains the following information (see figure 9): D Type of modulation and bitrate D Length of ID code D Several lockbits D Selected terminator D Stop mode selection for short / long authentication time D Adaptation of resonance frequency (if auto-adapt is not used) The configuration may be changed by programming block 0. However, this is only possible if the lockbit L_0 in block 0 has not been set.
31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 20 bit Supplier Chip ID (SCID) 8 7 6 5 4 3 2 1 0
111
adapt bits L_0 AUT A S T [1] [0] BC BR MOD
MOD BR BC T S A
Modulation ('0' = Manchester, '1' = Biphase) Bitrate ('0' = RF/32, '1' = RF/64) Bitcount ('0' = 128 bit, '1' = 64 bit) ID Terminator Stop mode (0 = off, 1 = on) Adapt (0 = automatic, 1 = value according to user programmed adapt bit setting AUT Number of AUT64-times, 0 = 24 times, 1 = 8 times L_0 Lockbit for block 0 ('1`= active) adapt bits Tuning bits
Test only Terminator 1 Terminator 2 No terminator
0 1 0 1
0 0 1 1
14096
Figure 8. Configuration data in block 0
Block 9 contains the customer configuration and the password (if password function is enabled). The customer-configuration data in block 9 includes (see figure 10): D lockbit for ID code (blocks 1 and 4/ 1 to 4) D lockbit for crypro key (block 5 to 8) D lockbit for block 9 D password function enable If the password function has been enabled, bits 4 to 31 represent the password of the E5561. Rev. A3, 04-Oct-00 11 (26)
Preliminary Information
E5561
31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 28 bit Password PWD L_9 L_K L_ID Password enable ('1` = active) Lockbit for block 9 ('1` = active) Lockbit for blocks 5 to 8 (crypto key) ('1` = active) Lockbit for blocks 1 and 4/ 1 to 4 (ID code) ('1` = active) 8 7 6 5 4 3 2 1 0
L_9 L_ID PWD L_K
12724
Figure 9. Customer configuration data in block 9
4.5
Data Transmission to the Base Station (Read)
Data transmission from the E5561 to the base station is carried out by switching a load between the coil pads on (damping) and off. This changes the current through the IC coil which can be detected by the base station.
Coil voltage of the e5560
Coil voltage of the base station
12725
Figure 10. Signals from the transponder during reading
4.5.1
ID Mode
The ID mode is the default mode after starting-up. The ID code is read out of the EEPROM and sent to the base station.
4.5.2
Modulation and Bitrate
The different bitrates and modulators of the E5561 can be selected using the appropriate bit in block 0. Available bitrates are RF/32 and RF/64; the E5561 provides biphase and manchester modulation.
DataClk ReadData Biphase Manchester
start of transmission Figure 11. Types of modulation
12726
0
1
0
0
1
1
0
12 (26)
Rev. A3, 04-Oct-00
Preliminary Information
E5561
4.5.3 Data Streams
Reading begins with block 1 (LSB first). Depending on the selected bitcount, block 1 is followed by block 2, 3 and 4 (128-bit bitcount) or just by block 4 (64-bit bitcount). The ID code is transmitted in loop or interrupted by the selected terminator, respectively. To avoid malfunction, the mode register is refreshed continuously with the content of EEPROM blocks 0 and 9 during reading of block 4. The data streams of the ID mode are shown in figure 13. 128-bit bitcount with terminator block 1 block 2 block 3 block 4 Terminator block 1 block 2 block 3 block 4 Terminator 64-bit bitcount with terminator block 1 block 4 Terminator block 1 block 4 Terminator
128-bit bitcount without terminator block 1 block 2 block 3 block 4 block 1 block 2 block 3 block 4
64-bit bitcount without terminator block 1 block 4 block 1 block 4
12727
Figure 12. ID mode data streams
4.5.4
Terminators
Terminators are a special pattern to mark the beginning and end of the code. The terminators may be used to synchronize the base station. They can be detected reliably since they are a violation of the modulation scheme. After a terminator is sent, transmission of the first bit of the ID-code starts with damping on for a certain detection (if biphase modulation is used). Note: Terminator 2 is only available in ID mode; all other modes make use of terminator 1. Atmel Wireless & Microcontrollers' terminator 1 Terminator [3 bit period] bit period
last bit
1.5 bit period (damping = off)
first bit
bit period
Atmel Wireless & Microcontrollers' terminator 2 Terminator if bitrate = RF / 64 [416 FCs] last bit 16 16 16 128 FCs 208 FCs (damping = off) first bit
64 bit period 32
Terminator if bitrate = RF / 32 [384 FCs] last bit 16 16 16 128 FCs 176 FCs (damping = off) first bit
12728
Figure 13. Terminators
Rev. A3, 04-Oct-00
13 (26)
Preliminary Information
E5561
4.6 Data Transmission to the E5561 (Write)
Data transmission from the base station to the E5561 is carried out by using the Atmel Wireless & Microcontrollers write method. It is based on interrupting the RF field with short gaps. The number of field clock cycles (FC) of two consecutive gaps encodes the `0/1' bit-information to be transmitted.
4.6.1
Start Gap
The first gap is the start gap which triggers writing. During writing the damping is permanently enabled which simplifies gap detection. The start gap has to be longer than the subsequent gaps in order to be reliably detected. By default, a start gap will be detected at any time after start-up intialization has been finished (field-on plus approx. 2 ms). >64 FCs = EOT RF_Field Gap Field clock reading writing
Figure 14. Signals to the transponder during writing
Start
1
0
1
1
0
reading
12729
4.6.2
Bit Decoder
The duration of the gaps is usually 50s - 150s. The time between two gaps is nominally 24 field clocks for a `0' and 56 field clocks for a `1'. The bit will be interpreted as `0' if there are 16 to 32 field clocks since the last field gap; it will be interpreted as `1' if the number of field clock cycles is in a range of 48 to 64. When there is no gap for more than 64 field clocks, writing is carried out (EOT). If there is a wrong number of field clocks between two gaps- i.e., one or more data sent were not a valid '0' or '1' - the E5561 will detect an error (see `Error handling'). 1 Bit decoder fail 0 fail 1 EOT
12730
16
32
48
64
Figure 15. Bit decoding scheme (number of FCs between two consecutive gaps)
4.6.3
OP Codes
The OP code is defined as the first two bits of a writing sequence. It is used for changing the operational modes of the E5561. There are three valid OP codes: The programming mode and direct-access mode are entered with the `10' OP code, `01' is used to initiate the authentication of the E5561, and the OP code `00' disables modulation until a POR occurs. Programming mode Direct-access mode "10"
1
Start gap
0
more data...
Crypto mode "01"
0
1
more data...
Stop mode "11"
Figure 16. OP codes
1
1
> 64 clocks
14097
14 (26)
Rev. A3, 04-Oct-00
Preliminary Information
E5561
4.6.4 Programming Mode
Programming the EEPROM of the E5561 is carried out blockwise, i.e., every single block has to be programmed separately. The programming-mode write sequence is shown in figure 18. After the OP code `10', the 32 data bits have to be sent followed by the four address bits specifiying the block to be programmed (each LSB first). The sequence is completed by sending an EOT (end of transmission), i.e., more than 64 field clocks without any gap.
OP code data bits block address
10 0
Data bits
31 0 ADR 3
0 . . . . . .9
EOT
12732
Figure 17. Programming mode write sequence
When the entire write sequence is written to the E5561, programming may proceed. There is a 64-clock delay between the end of writing and the start of programming. During this time, the EEPROM's programming voltage VPP is measured and the lockbit for the block to be programmed is examined. Further, VPP is continually monitored throughout the programming cycle. If Vpp is too low, the chip starts error handling. The programming time is 16 ms (including erase) with a field clock frequency of 125 kHz. EOT received Write mode programming Check VPP 16 ms 0.512 ms programming starts VPP on Operation write VPP & lock ok? erase EEPROM program EEPROM read
12733
Figure 18. Programming
After programming is carried out, the E5561 sends an Fh preburst followed by the terminator 1. After that, the just programmed data is read out of the EEPROM and sent in loop with the terminator 1. This enables the base station to detect a malprogramming by comparing the data transmitted with the data read out after programming. This mode remains until a POR occurs or another gap is detected. write sequence program block read Fh Terminator 1 read block Terminator 1 read block
Figure 19. Programming mode datastream
VCoil1-Coil2
End of programming sequence
16 ms programming
read Fh
Term.
read block
Term.
read block
12734
Figure 20. Coil voltage in programming mode
4.6.5
Direct-Access Mode
The direct-access mode is typically used to read out the content of a single block of the EEPROM. The write sequence is shown in figure 22. Following the OP code `10', the address of the block to be read has to be sent (LSB first). Rev. A3, 04-Oct-00 15 (26)
Preliminary Information
E5561
10 0 ADR 3 EOT
12735
Figure 21. Direct-access mode write sequence
Reading the content of block 0 and the four blocks of the ID code is always possible. The blocks containing the cryptokey (blocks 5 to 8) can only be accessed when the corresponding lockbit in block 9 is not set. Therefore, there is no possibility for a non-authorized person to read out or modify the crypto key if it is locked. Figure 23 shows the direct-access-mode data stream. After the write sequence, an FFh preburst is sent followed by the terminator 1. After that, the addressed block and the terminator 1 are sent in loop. write sequence read FFh Terminator 1 read block Terminator 1 read block
12736
Figure 22. Direct-access mode datastream
VCoil1-Coil2
End of direct access sequence
read FFh
Term.
read block
Term.
read block
12737
Figure 23. Coil voltage in direct-access mode
4.6.6
Software Reset
To set up the ICs in a defined state, a software reset command can be executed by sending a pseudo block address Fh. The write sequence is shown in figure 25. The Reset command is also accepted during stop mode. 10 1 1 1 1 EOT
Figure 24. Software reset
4.6.7
Crypto Mode
The crypto mode enables the high-security authentication of the E5561. For this purpose, a certified algorithm called AUT64 is used. The crypto-mode write sequence is shown in figure 26. After the OP code `01', the challenge is sent to the E5561 (LSB first). 01 0 Challenge bits 63 EOT
12738
Figure 25. Crypto mode write sequence
After the write sequence, the AUT64-algorithm is started. The computation of the response takes about 30/10 ms (125 kHz). During this time, a checksum - the number of the challenge bits set to `1' - can be read by the base station. Once the response has been computed, the base station can read the response in loop with the terminator 1. This remains until a POR occurs or another gap is detected. The datastream of the crypto-mode is shown in figure 27. write sequence read FFh read 00b checksum Terminator 1 response Terminator 1
12739
Figure 26. Crypto mode datastream
16 (26)
Rev. A3, 04-Oct-00
Preliminary Information
E5561
During the encryption calculation, the checksum is sent in loop with a special pattern (see figure 28). The bits of the checksum are sent with LSB first. If the base station detects an error by comparing the checksum, the calculation of the response can be interrupted by sending a new challenge. This will start the authentication procedure again. Data FFh
1 1 1 1 1 1 1 1
Data
0 0 0
6-bit checksum
5 1 1 1
Data FFh
1 1 1 1 1
Data
0 0
12740
Figure 27. Checksum
VCoil1-Coil2
Response calculated
End of programming sequence
read FFh
read 00b
checksum
read FFh
Term.
response
Term.
12741
Figure 28. Coil voltage in crypto mode
The encryption time is programmable in two options: The entire algorithm AUT64 is executed 8 or 24 times. This feature can be set at block 0, bit 7.
4.6.8
Stop Mode
If several transponders enter the RF field of the base station one after the other (e.g., in a manufactoring step), it might be useful to be able to set the transponder in a passive state. In this case, the transponder may be collected one by one and disabled after being read out. To avoid a communication conflict, the base station has to transmit a special data sequence to the active transponder(s) forcing them to enter the stop mode. In the stop mode, the E5561 switches off the damping as long as the RF field is applied. After a power-on reset, the E5561 enters the start-up und the ID mode again. An other possibility to leave the stop mode is to send the software reset (see figure 30). This command results in a new initialization of the IC. 11 EOT
14098
Figure 29. Stop mode data sequence
10 XXXX
4
Password
31 1 0 0 1
EOT
12743
X = do not care (both 0 or 1 acceptable)
Figure 30. Write sequence to disable password function
4.6.9
Password Function
The password function is a separate protection mechanism to avoid that a base station can read or manipulate the internal configuration and data blocks of the E5561 without knowing the password.
The password function may be used to prevent unauthorized programming or reading via direct-access mode. If the password bit in block 9 of the EEPROM is set, only certain operations are posible, i.e., reading the ID code in ID mode or authentication.
Rev. A3, 04-Oct-00
17 (26)
Preliminary Information
E5561
For programming or direct-access mode, the password function has to be disabled by receiving the password. If this function is enabled, the customer configuration can only be changed by an authorized person using the correct password of the E5561. During password mode, the E5561 monitors several fault and protection mechanism. If a fault or a protection violation is detected, the E5561 enters the ID mode. D The programming voltage VPP is too low, i.e., the field strength is not high enough D The lockbit of the adressed block is set D The password function is enabled In these cases, the procedure stops immediately after the error is detected and the IC reverts to ID mode.
4.7.3
Errors During Direct-Access Mode
4.7
Error Handling
Several error conditions can be detected to ensure that only valid operations have effect on the E5561.
In addition to the possible errors mentioned before, two errors may occur in direct-access mode: D The lock bit of the addressed block 5 to 8 is set D The password function is enabled In these cases, the enters the ID mode after the end of the writing sequence.
4.7.1
Errors During Writing Data
There are four detectable errors possible during writing data to the E5561: D Field gap was not detected D Wrong number of field clocks between two gaps, e.g., 37 FCs D The OP code is not valid (`11') D The number of bits received is incorrect; valid bit counts are: programming mode 38 bits direct-access mode 6 bits crypto mode 66 bits stop mode 2 bits If any of these four conditions is detected, the E5561 stops writing and enters ID mode. This can easily be analyzed using the damping which is usually on during writing. It changes according to the selected modulation scheme in ID mode.
4.7.4
Errors During Crypto Mode
In crypto mode, ONE error mechanism is active, that may prevent the E5561 from sending the correct response: D Error during the crypto writing sequence The E5561 will enter ID mode immediately if an error in the writing sequence is detected. If the password function is enabled, the E5561 enters ID mode after having completed the writing sequence.
4.7.5
Error Handling in Password Mode
4.7.2
Errors During Programming Mode
If the writing sequence has been transmitted successfully, there are three errors that may prevent the E5561 from programming the data to the EEPROM:
If password function is enabled and the password transmitted does not match the programmed password, the full programming sequence is performed but without programming block 9. This makes it more difficult to find out the correct password by trial and error because in each case the result of the operation can only be recognized after the whole sequence has been processed. This increases the time needed to check a certain number of combinations.
18 (26)
Rev. A3, 04-Oct-00
Preliminary Information
E5561
Power-on reset
Start-up
Send ID code
Receive OP code ok Receive data EOT Password function Password ok or disabled Number of bits ok Lockbit ok V PP ok Program
fail
fail
fail
fail
Error handling
fail
fail
fail
12744
Figure 31. Simplified error handling of the E5561
Rev. A3, 04-Oct-00
19 (26)
Preliminary Information
E5561
4.8 Authentication
Therefore, a high-security data transmission and encryption as well as a short authentication time is achieved. For further information, some additional documentation and programms are available: D The encryption process of the E5561 D Key generating program D Algorithm program E5561 Especially for applications with high-security demands such as immobilizer systems, the E5561 contains an optimized authentication procedure with the following advantages: D Secure and fast authentication (< 100 ms) D Application-optimized high-security algorithm D Customer-specific generation of unique keys Base station generate RF field receive the ID code and select the crypto key generation of random number R calculation of the challenge R' (encrypted random number R) transmit the challenge Challenge receive the datastream decryption of R' to R receive the checksum Checksum in loop transmit the checksum ID code
transmit ID code
AUT64 with R as input value
AUT64 with R as input value
calculate the valid response
calculation of the response interrupt transmission of checksum
receive the response generated by the E5561 authenticate by comparing the responses of E5561 to its own result
Response in loop transmit response
14099
Figure 32. Authentication procedure
20 (26)
Rev. A3, 04-Oct-00
Preliminary Information
E5561
4.8.1 Initialization
number R', it recovers the random number R originally generated by the base station. Both devices, the base station as well as the transponder, then start with the encryption of this number. If the number of received bits is incorrect, the E5561 leaves the crypto mode and enters read mode immediatly, transmitting the ID code. Before using the E5561 in crypto mode it has to be initialized. First, the crypto key to be used by the crypto algorithm has to be generated by the key-generating program. This program guarantees that each crypto key is unique, no other E5561 has the same key. This key has to be stored in the memory (block 5 - block 8) of the E5561 via the programming mode. Once the crypto key is locked, it can not be overwritten or read out anymore with direct-access mode. For correct authentication it is necessary that base station and transponder both use the same key. Therefore, the base station needs to know which transponder is currently in the field. Only then the base station can select the key corresponding to this particular transponder. For this identification the E5561 sends a string of data after it is powered up. This ID code also has to be stored in the E5561.
4.8.4
Checksum
For verification of the received challenge, the E5561 sends a checksum (representing the number of `1' of the challenge) with a special pattern in loop until the encryption is finished (less than 10 ms - optionally 30 ms).
4.8.5
Encryption
4.8.2
Starting the Authentication
After power-up the various modes (bitrate, encoding) are read out of block 0. Then, the E5561 transmits the ID code to identify itself. Thereby, the base station can identify the transponder and knows which crypto key to use. The base station forces the E5561 in crypto mode by sending the OP code `01' followed by a 64-bit string, the challenge.
For encryption, the optimized high-security algorithm AUT64 is used. The elementary parts of this 64-bit block cipher are transposition and substitution (figure 34). For more detailed information on this algorithm additional documentation is provided. The entire algorithm AUT64 is executed 24 times. At each of these 8/24 times, another key is generated out of the crypto key. Therefore, the algorithm keeps changing and a high-security level is achieved. This is confirmed by statistical analysis. For more detailed information, the description `The Encryption Process of the E5561' can be provided.
4.8.3
Challenge
4.8.6
Response
The base station generates a 64-bit random number R. This number is the starting value of the actual encryption algorithm. To improve security, this random number is not sent directly to the transponder, but is encrypted by means of a part of the crypto key. The encoded result R' is then transmitted as challenge to the transponder. Once the transponder has received the encoded random
The 64-bit result of the algorithm is reduced to 32 bits using logical operations. This 32-bit response is sent back to the base station for comparison. If the correct keys were used, the result generated inside the base station is identical to the result sent by the E5561. The response is transmitted in loop including the terminator until the IC is powered by the RF field. This gives the base station enough time for checking the validation of the response.
Rev. A3, 04-Oct-00
21 (26)
Preliminary Information
E5561
a0 a1 a2 a3 a4 a5 a6 a7 Input of AUT64 in round n
Byte permutation
a0
a1
a2
a3
a4
a5
a6
a7
Function f
Substitution
Bit permutation
Substitution
a0
a1
a2
a3
a4
a5
a6
a7
Input of AUT64 in round n+1
12746
Figure 33. Atmel Wireless & Microcontrollers' crypto algorithm AUT64
22 (26)
Rev. A3, 04-Oct-00
Preliminary Information
E5561
5 ms
Power-on reset
Read ID code
20 ms
Start-up
ID mode
(if 64 bit ID used, <10 ms posible)
Send challenge
30 ms
ID mode
Challenge
ENCRYPTION
(AUT64)
Checksum & Encrypt
& Checksum
<10 ms (8 times of AUT64) 30 ms option (24 times of AUT64)
Response
10 ms
Checksum & Encrypt Response
t <65 ms (8 times of AUT64 and reduced ID used) t <75 ms (8 times of AUT64) t <95 ms (24 times AUT64)
12747
Figure 34. Authentication example
Rev. A3, 04-Oct-00
23 (26)
Preliminary Information
E5561
5
5.1
Technical Data
Absolute Maximum Ratings
Parameters Symbol VDD VIN IC1/C2 Ptot Tamb Tstg Tass Value -0.3 to +7.0 VSS -0.3 VIN VDD +0.3 10 100 -40 to +85 -40 to +125 170 Unit V V mA mW C C C
All voltage are given corresponding to VSS.
AAAAA A AA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA A AA AAAAA A AA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAA AA AAAAA A AA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAA AA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA A AA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA A A AA AA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA A AA AAAAA A AA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA A AAAAAAAA AA AA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAA A
Supply voltage Input voltage Current into Coil1/Coil2 Power dissipation (dice) (1) Operating temperature range Storage temperature range (2) Assembly temperature (t 5 min) Notes: (1) (2) Free-air condition. Time of application: 1s Data retention reduced Stresses above those listed under "Absolute Maximum Ratings" may cause permanent damage to the device.
5.2
Operating Characteristics
Parameter Test Conditions Symbol fRF fRF = 125 kHz, read & write fRF = 125 kHz, programming No clock IDD IDD IDD Vcl C1,2 VPP fRF = 125 kHz tPP tretention ncycle Vmfs 10 100 000 1.8 15 100 7.5 Min 100 Typ 125 15 100 250 9.0 30 16 16 19 500 10.2 Max 150 . Unit kHz A A nA V pF V ms years V
Tambient = 25C; reference terminal is VSS; DC operating voltage VDD - VSS = 2 V (unless otherwise noted)
RF frequency range Supply current
Clamp voltage Equivalent coil input capacitance (without self-adapt) Programming voltage Programming time Data retention Programming cycles Lowest operating voltage for programming
Current into Coil1/2 = 5 mA
24 (26)
Rev. A3, 04-Oct-00
Preliminary Information
E5561
6 Application Example
from oscillator 125 kHz 4.2 mH Energy 4.2 mH 386 pF Coil 1 E5561
to base station
Data
Coil 2
f res +
386 pF
1 + 125 kHz 2p LC
Rev. A3, 04-Oct-00
25 (26)
Preliminary Information
E5561
Ozone Depleting Substances Policy Statement
It is the policy of Atmel Germany GmbH to 1. Meet all present and future national and international statutory requirements. 2. Regularly and continuously improve the performance of our products, processes, distribution and operating systems with respect to their impact on the health and safety of our employees and the public, as well as their impact on the environment. It is particular concern to control or eliminate releases of those substances into the atmosphere which are known as ozone depleting substances (ODSs). The Montreal Protocol (1987) and its London Amendments (1990) intend to severely restrict the use of ODSs and forbid their use within the next ten years. Various national and international initiatives are pressing for an earlier ban on these substances. Atmel Germany GmbH has been able to use its policy of continuous improvements to eliminate the use of ODSs listed in the following documents. 1. Annex A, B and list of transitional substances of the Montreal Protocol and the London Amendments respectively 2. Class I and II ozone depleting substances in the Clean Air Act Amendments of 1990 by the Environmental Protection Agency (EPA) in the USA 3. Council Decision 88/540/EEC and 91/690/EEC Annex A, B and C (transitional substances) respectively. Atmel Germany GmbH can certify that our semiconductors are not manufactured with ozone depleting substances and do not contain such substances.
7.
We reserve the right to make changes to improve technical design and may do so without further notice. Parameters can vary in different applications. All operating parameters must be validated for each customer application by the customer. Should the buyer use Atmel Wireless & Microcontrollers products for any unintended or unauthorized application, the buyer shall indemnify Atmel Wireless & Microcontrollers against all claims, costs, damages, and expenses, arising out of, directly or indirectly, any claim of personal damage, injury or death associated with such unintended or unauthorized use. Data sheets can also be retrieved from the Internet: http://www.atmel-wm.com
Atmel Germany GmbH, P.O.B. 3535, D-74025 Heilbronn, Germany Telephone: 49 (0)7131 67 2594, Fax number: 49 (0)7131 67 2423
26 (26)
Rev. A3, 04-Oct-00
Preliminary Information


▲Up To Search▲   

 
Price & Availability of E5561

All Rights Reserved © IC-ON-LINE 2003 - 2022  

[Add Bookmark] [Contact Us] [Link exchange] [Privacy policy]
Mirror Sites :  [www.datasheet.hk]   [www.maxim4u.com]  [www.ic-on-line.cn] [www.ic-on-line.com] [www.ic-on-line.net] [www.alldatasheet.com.cn] [www.gdcy.com]  [www.gdcy.net]


 . . . . .
  We use cookies to deliver the best possible web experience and assist with our advertising efforts. By continuing to use this site, you consent to the use of cookies. For more information on cookies, please take a look at our Privacy Policy. X