2001 Oct 04 7
Philips Semiconductors Product specification
HITAG proximity reader module
hardware
HTRM440 family
7.2 Reader module software
Software commands mentioned in this data sheet are fully
described in document
“HTCM400, HTRM440 Family,
HTRM800 Family Interface Protocol Reader - Host”
.
7.3 Reader module hardware
7.3.1 CORE MODULE
The EEPROM on the core module HTCM400 (see Fig.1)
is used to store non-volatile data such as personalization
data, keys, passwords, configurations and status
information.
The microcontroller processes the protocol for the
communication between the transponders and the reader
module. The interface signals are converted in such a way
that HITAG 1 and HITAG 2 transponders are able to
process them and the outgoing signals from the
transponder are converted into interface-compatible
signals. The second essential microcontroller function is
its control function. The microcontroller activates and
deactivates the transmitter, switches the receiver between
the modes for the different transponders reception and
selects the EEPROM.
The transmitter receives data from the microcontroller and
modulates the carrier.
The receiver demodulates the received data and passes
on the data to the microcontroller for further processing.
7.3.2 INTERFACE MICROCONTROLLER TO HOST
The device communicates with the host
(e.g. microcontroller or PC) via a serial interface using a
baud rate of 9600 baud. Data transfer details are: 1 start
bit, 8 data bits, 1 stop bit, no parity bit and the least
significant bit is sent first.
7.3.3 VOLTAGE REGULATION FILTERING
Disturbances on the supply pins may reduce the
performance of the system. For that reason the supply
voltage is filtered but also to limit the spurious emissions at
the supply connections caused by the digital parts of the
module.
7.4 Postal approval
The postal approval can only be granted for final products,
not just for modules like the HTRM440. But the reader
module is designed in a way that it is possible to get the
postal approval for a system including the HTRM440.
Electromagnetic emissions comply with the guidelines in
FTZ 17 TR 2100 and ETS 300 683 and electromagnetic
immunity complies with the guidelines in ETS 300 683.
7.5 Security considerations
Developing the HTRM440 special consideration was given
to aspects of security. The following items represent the
fundamental framework of the security concept:
Cryptography
Mutual authentication
Password verification
Cyclic Redundancy Check (CRC).
7.5.1 DATA STREAM BETWEEN READER MODULE AND
HITAG 1 TRANSPONDERS
All the commands and data transferred from the reader
module to the transponder are secured by Cyclic
Redundancy Check (CRC). This check is carried out on
the transponder.
Every data stream sent (commands, addresses, user
data) from the proximity reader module to the transponder
is first checked for data errors by the transponder by
means of an integrated 8-bit CRC generator and then
executed. Normally the transponder responds to each
data stream from the proximity reader module with an
acknowledgement signal or with a data block. The CRC is
formed over commands and addresses or the plain data
respectively and in case of crypto mode it is also
encrypted. The generator polynomial of the transponder
CRC generator reads: u
8
+u
4
+u
3
+u
2
+1 = 0x1D.
The CRC pre assignment is 0xFF.
Detailed instructions how to use and calculate CRC are
available at Philips in the following application note
“HT1 (resp. HT2) Transponder family, reliability and
integrity of data transmission”
.
7.5.2 DATA STREAM BETWEEN READER MODULE AND
HITAG 2 TRANSPONDERS
Every command sent from the reader module to the
transponder is checked for data errors by the transponder.
Standard commands transferred from the reader module
to the transponder are divided into two bit streams. The
second bit stream is generated by inverting the bits of the
first bit stream. This redundancy increases data security.
2001 Oct 04 8
Philips Semiconductors Product specification
HITAG proximity reader module
hardware
HTRM440 family
7.5.3 CHECKING USER DATA
This check is carried out on the HTRM440.
Security of the data read from the transponder by the
reader module remains with the user for reasons of
flexibility. Therefore, you can choose flexible check sums
and store them in the transponder memory together with
the data. You can protect sensitive data better than less
sensitive data, thus permitting optimized operation times.
7.5.4 DATA PRIVACY
The use of cryptography (stream cypher), mutual
authentication, and password verification prevents
monitoring and copying the data channel. Therefore, the
area of the transponder that only can be accessed
enciphered is called ‘secret area’.
To make use of cryptography for HITAG 1 transponders
you need:
Keys to be used for initializing of the crypto block
Logdata to be used for mutual authentication.
To make use of cryptography for HITAG 2 transponders
you need:
A key which is used to initialize the crypto block using
HITAG 2 in crypto mode
Passwords which are used for authentication for
HITAG 2 in password mode.
The transponders and the HTRM440 are provided with
identical transport keys and transport logdata so that you
can start operating them right away (see Table 1).
In order to offer our OEM clients high flexibility, the
configuration of the transponder memory, password, keys
and logdata can be changed. We strictly recommend to
rigorously restrict these possibilities for the end customers
(by setting the configuration page to read only, setting
password, keys and logdata to neither read nor write).
7.6 Operating security
The following mechanisms ensure the operating security
of the HITAG system:
Anticollission mode
Monitoring the supply voltage
Detection of antenna rupture and antenna short-circuit.
7.6.1 ANTICOLLISION
In proximity reader applications using HITAG 1 or
HITAG 2 transponders, only one transponder is handled
even if there are several transponders within the
communication field of the antenna. In this case either no
communication takes place or the ‘stronger’ or closer
transponder takes over. By muting a selected transponder
(HALT mode) another transponder that is to be found in
the communication field of the antenna can be recognised.
7.6.2 MONITORING THE SUPPLY VOLTAGE
The supply voltage is controlled by a watchdog circuit
which triggers a system reset if the supply voltage drops
below 4.75 V or if the microcontroller fails.
7.6.3 DETECTION OF ANTENNA RUPTURE AND ANTENNA
SHORT
-CIRCUIT
The HTRM440 does not get permanently damaged in case
of an antenna rupture or a brief antenna short-circuit.
Table 1 Transport values predefined by Philips.
SYSTEM PARAMETER VALUE
HITAG 1 keyinit password 0x00000000
keys 0x00000000
logdata 0x00000000
HITAG 2 keyinit password 0x00000000
key 0x4D494B524F4E
password TAG 0xAA4854
password RWD 0x4D494B52
2001 Oct 04 9
Philips Semiconductors Product specification
HITAG proximity reader module
hardware
HTRM440 family
8 ELECTRICAL SPECIFICATIONS
Notes
1. Modulation ratio depending on the distance between transponder and reader module.
2. Depending on antenna and type of transponder; three-wire cable, shielded.
SYMBOL PARAMETER CONDITION MIN. TYP. MAX. UNIT
External power supply
V
P
DC supply voltage 9 16 V
I
P
DC supply current −−150 mA
Modulation
m
TX
modulation ratio of reader module
to transponder
Amplitude Shift Keying (ASK) 100 %
m
RX
modulation ratio of transponder to
reader module
Amplitude Shift Keying (ASK);
note 1
−−−%
Interface to host
f
t
transmission speed 9600 baud
Antenna
d operating distance note 2 200 mm
Temperature
T
oper
operating temperature 25 +85 °C
T
stg
storage temperature 40 +85 °C

HTRM440/AIE,122

Mfr. #:
Manufacturer:
NXP Semiconductors
Description:
RFID READER R/W 125KHZ MODULE
Lifecycle:
New from this manufacturer.
Delivery:
DHL FedEx Ups TNT EMS
Payment:
T/T Paypal Visa MoneyGram Western Union

Products related to this Datasheet