MAX66140
ISO 15693-Compliant Secure Memory
______________________________________________________________________________________ 15
Request Flags, Inventory_flag Bit Set
Bits 8, 7, and 4: No Function
These bits have no function. They must be transmitted as 0.
Bit 6: Slot Counter Flag (Nb_slots_flag)
This bit specifies whether the command is processed using a slot counter (bit = 0) or without using the slot counter
(bit = 1).
Bit 5: Application Family Identifier Flag (AFI_flag)
To detect only slaves with a certain AFI value, the AFI_flag bit must be 1 and the desired AFI value must be included
in the request. If the least significant nibble of the AFI in the request is 0000b, slaves process the command only if
the most significant nibble of the AFI matches. If the AFI in the request is 00h, all slaves process the command
regardless of their AFI.
Bit 3: Inventory Flag (Inventory_flag)
This bit must be 1 for the Inventory command only. For all other commands, this bit must be 0.
Bit 2: Data Rate Flag (Data_rate_flag)
This bit specifies whether the response data packet is transmitted using the low data rate (bit = 0) or the high data
rate (bit = 1).
Bit 1: Subcarrier Flag (Subcarrier_flag)
This bit specifies whether the response data packet is transmitted using a single subcarrier (bit = 0) or two subcarri-
ers (bit = 1).
Network Function Commands
The command descriptions show the data fields of the request and response data packets. To create the complete
frame, an SOF, 16-bit CRC, and EOF must be added (see Figure 5). The ISO 15693 standard defines four network
function commands: Inventory, Stay Quiet, Select, and Reset to Ready. This section describes the format of the
request and response data packets.
Inventory
This command allows the master to learn the UIDs and DSFIDs of all slaves in its RF field in an iterative process. It is
the only command for which the Inventory_flag bit must be 1. The Inventory command uses two command-specific
parameters, which are the mask length and the mask pattern. The mask allows the master to preselect slaves for
responding to the Inventory command. The LSb of the mask aligns with the LSb of the slave’s UID. The master can
choose not to use a mask, in which case all slaves qualify, provided they are not excluded by the AFI criteria (see
the
Request Flags
section). The maximum mask length is 60 (3Ch, if Nb_slots_flag = 0) or 64 (40h, if Nb_slots_flag =
1). The mask pattern defines the least significant bits (as many as specified by the mask length) that a slave’s UID
must match to qualify for responding to the Inventory command (case Nb_slots_flag = 1). If the slot counter is used
(Nb_slots_flag = 0), the value of the slot counter extends the mask pattern at the higher bits for comparison to the
slave’s UID. The slot counter starts at 0 after the inventory request frame is transmitted and increments during the
course of the Inventory command with every subsequent EOF sent by the master. The processing of an Inventory
command ends when the master sends the SOF of a new frame.
BIT 8 (MS) BIT 7 BIT 6 BIT 5 BIT 4 BIT 3 BIT 2 BIT 1 (LS)
0 0 Nb_slots_flag AFI_flag 0 Inventory_flag (= 1) Data_rate_flag Subcarrier_flag
ABRIDGED DATA SHEET
MAX66140
Request Data for the Inventory Command
Response Data for the Inventory Command (No Error)
This response is generated only if a slave qualifies to respond. In case of an error in the request, slaves do not
respond.
When receiving the Inventory command, the slave devices in the RF field enter the collision management sequence.
If a slave meets the conditions to respond, it sends out a response data packet. If multiple slaves qualify, e.g., AFI,
mask, and slot counter are not used, the response frames collide and are not readable. To receive readable
response frames with the UID and DSFID, the master must eliminate the collision.
Not knowing the slave population, the master could begin with a mask length of 0 and activate the slot counter. By
using this method and going through all 16 slots, the master has a chance to receive clean responses (i.e., the slave
is identified) as well as colliding responses. To prevent a slave that has been identified from further participating in
the collision management sequence, the master transitions it to the quiet state. Next, the master issues another
Inventory command where the slot number that previously generated a collision is now used as a 4-bit mask, and
runs again through all 16 slots. If a collision is found, another inventory command is issued, this time with a mask that
is extended at the higher bits by the slot counter value that produced the collision. This process is repeated until all
slaves are identified. For a full description of the Inventory command processing by the slave device and the timing
specifications, refer to ISO 15693 Part 3, Sections 8 to 9.
Stay Quiet
This command addresses an individual slave and transitions it to the quiet state. The request must be sent in the
addressed mode (Select_flag bit = 0, Address_flag bit = 1). The slave transitioning to the quiet state does not send a
response.
Request Data for the Stay Quiet Command
Select
This command addresses an individual slave and transitions it to the selected state. The request must be sent in the
addressed mode (Select_flag bit = 0, Address_flag bit = 1). The slave transitioning to the selected state sends a
response. If there was a slave with a different UID in the selected state, then that slave transitions to the ready state
without sending a response.
ISO 15693-Compliant Secure Memory
16 ______________________________________________________________________________________
ABRIDGED DATA SHEET
REQUEST FLAGS COMMAND
AFI
(NOTE 1)
MASK LENGTH
MASK PATTERN
(NOTE 2)
(1 Byte) 01h (1 Byte) (1 Byte) (Up to 8 Bytes)
Note 1: The AFI byte is transmitted only if the AFI_flag bit is set to 1. The AFI byte, if transmitted, narrows the range of slaves that
qualify for responding to the request.
Note 2: The mask pattern is transmitted only if the selection mask length is not 0. If the mask length is not an integer multiple of 8,
the MSB of the mask pattern must be padded with 0 bits. The LSB of the mask pattern is transmitted first.
RESPONSE FLAGS DSFID UID
00h (1 Byte) (8 Bytes)
REQUEST FLAGS COMMAND UID
(1 Byte) 02h (8 Bytes)
MAX66140
ISO 15693-Compliant Secure Memory
______________________________________________________________________________________ 17
Request Data for the Select Command*
Reset to Ready
This command addresses an individual slave and transitions it to the ready state. To address a slave in the quiet
state, the request must be sent in the addressed mode (Select_flag bit = 0, Address_flag bit = 1). To address a
slave in the selected state, the request can be sent in any address mode. The slave transitioning to the ready state
sends a response.
Request Data for the Reset to Ready Command*
Memory and Control Function Commands
The command descriptions show the data fields of the request and response data packets. To create the complete
frame, an SOF, 16-bit CRC, and EOF must be added (see Figure 5). ISO 15693 defines three address modes,
selected, addressed, and nonaddressed, which are specified through the setting of the Select_flag bit and the
Address_flag bit. The memory and control function commands can be issued in any address mode. To access
slaves in the quiet state, the addressed mode is required. The addressed mode requires that the master include the
slave’s UID in the request.
REQUEST FLAGS COMMAND UID
(1 Byte) 25h (8 Bytes)
*
If this command is processed without any error, the slave responds with a response flags byte of 00h.
REQUEST FLAGS COMMAND UID**
(1 Byte) 26h (8 Bytes)
*
If this command is processed without any error, the slave responds with a response flags byte of 00h.
**
The UID is transmitted only in the addressed mode.
ABRIDGED DATA SHEET

MAX66140K-000AA+

Mfr. #:
Manufacturer:
Maxim Integrated
Description:
RFID Transponders RFID FOB 15693 ID 1K SECURE LF
Lifecycle:
New from this manufacturer.
Delivery:
DHL FedEx Ups TNT EMS
Payment:
T/T Paypal Visa MoneyGram Western Union

Products related to this Datasheet