AT88SC1616CRF-MX1

AT88SC1616CRF [Summary Datasheet]
Atmel-5026GS-CryptoRF-AT88SC1616CRF-Datasheet-Summary_012014
4
4. User Memory
The EEPROM user memory is divided into 16 user zones as shown Table 4-1. Multiple zones allow for different types of
data or files to be stored in different zones. Access to the user zones is allowed only after security requirements have
been met. These security requirements are defined by the user in the configuration memory during personalization of the
device. The EEPROM memory page length is 16 bytes.
Table 4-1. Memory Map
5. Configuration Memory
The configuration memory consists of 2048 bits of EEPROM memory used for storing system data, passwords, keys,
codes, and security-level definitions for each user zone. Access rights to the configuration zone are defined in the control
logic and may not be altered by the user. These access rights include the ability to program certain portions of the
configuration memory and then lock the data written through use of the security fuses.
5.1 Security Fuses
There are three fuses on the device that must be blown during the device personalization process. Each fuse locks
certain portions of the configuration memory as OTP memory. Fuses are designated for the module manufacturer, card
manufacturer, and card issuer and must be blown in sequence.
Zone $0 $1 $2 $3 $4 $5 $6 $7
User 0
$00
128 bytes
$78
User 1
User 14
$00
$78
User 15
$00
128 bytes
$78
AT88SC1616CRF [Summary Datasheet]
Atmel-5026GS-CryptoRF-AT88SC1616CRF-Datasheet-Summary_012014
5
6. Communication Security
Communication between the PICC and reader operates in three basic modes:
Standard Communication Security Mode — The default mode for the device after power-up and anticollision.
Authentication Communication Security Mode — Activated by a successful authentication sequence.
Encryption Communication Security Mode — Activated by a successful encryption activation sequence,
following a successful authentication.
Table 6-1. Configuration Security Modes
Notes: 1. Modification Detection Code.
2. Message Authentication Code.
6.1 Security Methodology
Figure 6-1. Security Methodology
6.2 Memory Access
Depending on the device configuration, the host will carry out the authentication protocol and/or present different
passwords for each operation: Read or Write. To insure security between the different user zones (multi-application
card), each zone can use a different set of passwords. A specific attempts counter for each password and for the
authentication provides protection against systematic attacks.
Communication Mode User Data Passwords Data Integrity Check
Standard Clear Clear MDC
(1)
Authentication Clear Encrypted MAC
(2)
Encryption Encrypted Encrypted MAC
(2)
Device (Card)
Card Number
VERIFY A
Compute Challenge B
Challenge B
Check Password (RPW)
DATA
Checksum (CS)
Check Password (WPW)
VERIFY CS
Write DATA
Host (Reader)
COMPUTE Challenge A
Challenge A
VERIFY B
Read Password (RPW)
VERIFY CS (optional)
Write Password (WPW)
DATA
CS
AT88SC1616CRF [Summary Datasheet]
Atmel-5026GS-CryptoRF-AT88SC1616CRF-Datasheet-Summary_012014
6
7. Security Operations
7.1 Anti-tearing
In the event of a power loss during a write cycle, the integrity of the device’s stored data may be recovered. This function
is optional — The host may choose to activate the anti-tearing function depending on application requirements.
When anti-tearing is active, Write commands take longer to execute since more write cycles are required to
complete them.
Data writes are limited to 8-byte pages when anti-tearing is active.
Data is written first to a buffer zone in EEPROM instead of to the intended destination address, but with the same access
conditions. The data is then written to the required location. If this second write cycle is interrupted due to a power loss,
the device will automatically recover the data from the buffer zone at the next power-up.
7.2 Password Verification
Passwords may be used to protect user zone Read and/or Write access. When a password is presented using the Check
Password command, it is memorized and active until power is removed unless a new password is presented or a valid
DESELECT or IDLE command is received. Only one password is active at a time, but Write passwords also give Read
access.
7.3 Authentication Protocol
The access to a user zone may be protected by an authentication protocol in addition to password dependent rights.
Passwords are encrypted in authentication mode.
The authentication success is memorized and active as long as the chip is powered, unless a new authentication is
initialized or a valid DESELECT or IDLE command is received. If the new authentication request is not validated, the card
loses its previous authentication and it must be presented again. Only the last request is memorized.
7.4 Encryption
The data exchanged between the card and the reader during Read, Write, and Check Password commands may be
encrypted to ensure data confidentiality.
The issuer may choose to protect the access to a user zone with an encryption key by settings made in the configuration
memory. In that case, activation of the encryption mode is required in order to read/write data in the zone.
The encryption activation success is memorized and active as long as the chip is powered, unless a new initialization is
initiated or a valid DESELECT or IDLE command is received. If the new encryption activation request is not validated, the
card will no longer encrypt data during Read operations nor will it decrypt data received during Write or Check Password
operations.
7.5 Checksum
The PICC implements a data validity check function in the form of a checksum. The checksum may function in standard
or cryptographic mode. In the standard mode, the checksum is optional and may be used for transmission error
detection. The cryptographic mode is more powerful since it provides data origin authentication capability in the form of a
Message Authentication Code (MAC). To write data to the device, the host is required to compute a valid MAC and
provide it to the device. If after an in going command the device computes a MAC different from the MAC transmitted by
the host, not only is the command abandoned but the cryptographic mode is also reset. A new authentication is required
to reactivate the cryptographic mode.

AT88SC1616CRF-MX1

Mfr. #:
Manufacturer:
Microchip Technology / Atmel
Description:
RFID Transponders CRYPTORF 16K, 13mm
Lifecycle:
New from this manufacturer.
Delivery:
DHL FedEx Ups TNT EMS
Payment:
T/T Paypal Visa MoneyGram Western Union