|
If you can't view the Datasheet, Please click here to try to view without PDF Reader . |
|
Datasheet File OCR Text: |
1 features ? one of a family of devices with u ser memories from 1-kbit to 1-mbit 64-kbit (8-kbyte) eeprom user memory ? sixteen 512-byte (4-kbit) zones ? self-timed write cycle (5 ms) ? single byte or 128-byte page write mode ? programmable access rights for each zone 2-kbit configuration zone ? 37-byte otp area for user-defined codes ? 160-byte area for user-defined keys and passwords high security features ? 64-bit patented dynamic symetric mutual authenti cation protocol (under exclusive patent license from elva) ? encrypted checksum ? stream encryption ? four key sets for authen tication and encryption ? eight sets of two 24-bit passwords ? anti-tearing function ? voltage and frequency monitor smart card features ? iso 7816 class a (5v) or class b (3v) operation ? iso 7816-3 asynchronous t = 0 protocol (gemplus patent) ? supports protocol and parameters selection for faster operation ? multiple zones, key sets and p asswords for multi-application use ? synchronous 2-wire serial interf ace for faster device initialization ? programmable 8-byte answer-to-reset register ? iso 7816-2 comp liant modules embedded application features ? low voltage operation: 2.7v to 5.5v ? secure nonvolatile storage for sensitive system or user information ? 2-wire serial interface ? 1.5 mhz compatibility for fast operation ? standard 8-lead plastic packages ? same pinout as 2-wire serial eeproms high reliability ? endurance: 100,000 cycles ? data retention: 10 years ? esd protection: 4,000v min table 1. pin configuration pad description iso module contact standard package pin vcc supply voltage c1 8 gnd ground c5 4 scl/clk serial clock input c3 6 sda/io serial data input/output c7 5 rst reset input c2 nc cryptomemory ? 64 kbit at88sc6416c summary rev. 5015ds?smem?7/04 note: this is a summary document. a complete document is available under nda. for more in formation, please contact your local atmel sales office. 1 2 3 4 8 7 6 5 1 2 3 4 8 7 6 5 bottom view smart card module vcc=c1 rst=c2 scl/clk=c3 nc=c4 c5=gnd c6=nc c7=sda/io c8=nc 8-lead soic, pdip nc nc nc gnd vcc nc scl sda 8-lead sap vcc nc scl sda nc nc nc gnd
2 at88sc6416c 5015ds?smem?7/04 description the at88sc6416c member of the cryptomemory family is a high-performance secure memory providing 64 kbits of user memory with advanced security and cryptographic features built in. the user memory is divi ded into 16 512-byte zones, each of which may be individually set with different security access rights or combined together to provide space for one to four data files. smart card applications the at88sc6416c provides high security, low cost, and ease of implementation with- out the need for a microprocessor operating system. the embedded cryptographic engine provides for dynamic, symmetric-mu tual authentication between the device and host, as well as performing stream encryption for all data and passwords exchanged between the device and host. up to four unique key sets may be used for these opera- tions. the at88sc6416c offers the ability to communicate with virt ually any smart card reader using the asynchronous t = 0 protocol (gemplus patent) defined in iso 7816-3. communication speeds up to 153,600 baud are supp orted by utilizing iso 7816-3 pro- tocol and parameter selection. embedded applications through dynamic, symmetric-mutual authent ication, data encryption, and the use of encrypted checksums, the at88sc6416c provid es a secure place fo r storage of sensi- tive information within a system. with its tamper detection circuits, this information remains safe even under attack. a 2-wire serial interface running at 1.5 mhz is used for fast and efficient communications with up to 15 devices that may be individually addressed. the at88sc6416c is available in industry standard 8-lead packages with the same familiar pinout as 2-wire serial eeproms. figure 1. block diagram pin descriptions supply voltage (v cc ) the v cc input is a 2.7v to 5.5v positive voltage supplied by the host. clock (scl/clk) in the asynchronous t = 0 protocol, the sc l/clk input is used to provide the device with a carrier frequency f . the nominal length of one bit emitted on i/o is defined as an ?elementary time unit? (etu) and is equal to 372/ f . when the synchronous protocol is used, the scl/clk input is used to positive edge clock data into the device and negative edge clock data out of the device. random generator authentication, encryption and certification unit eeprom answer to reset data transfer password verification reset block asynchronous iso interface synchronous interface power management vcc gnd scl/clk sda/io rst 3 at88sc6416c 5015ds?smem?7/04 serial data (sda/io) the sda pin is bidirectional for serial data transfer. this pin is open-drain driven and may be wired with any number of other open drain or open collector devices. an exter- nal pull-up resistor should be connected between sda and v cc . the value of this resistor and the system capacitance loading the sda bus will determine the rise time of sda. this rise time will determine the ma ximum frequency during read operations. low value pull-up resistors will allo w higher frequency operations while drawing higher aver- age power supply current. reset (rst) the at88sc6416c provides an iso 7816-3 compliant asynchronous answer to reset sequence. when the reset seque nce is activated, the device will output the data pro- grammed into the 64-bit answer-to-reset register. an internal pull-up on the rst input pad allows the device to be used in synchronous mode without bonding rst. the at88sc6416c does not support the synchronous answer-to-reset sequence. device architecture user zones the eeprom user memory is divided into 16 zones of 4,096 bits each. multiple zones allow for different types of data or files to be stored in different zones. access to the user zones is allowed only after security re quirements have been met. these security requirements are defined by the user during the personalization of the device in the con- figuration zone. if the same security require ments are selected for multiple zones, then these zones may effectively be accessed as one larger zone. control logic access to the user zones occurs only through the control logic built into the device. this logic is configurable through ac cess registers, key registers and keys programmed into the configuration zone during device personalization. also implemented in the control logic is a cryptographic engine for performing the various higher-level security functions of the device. table 2. user zones zone $0 $1 $2 $3 $4 $5 $6 $7 user 0 $000 512 bytes ? ? $1f8 user 1 - - - user 14 $000 ? ? ? $1f8 user 15 $000 512 bytes ? ? $1f8 4 at88sc6416c 5015ds?smem?7/04 configuration zone the configuration zone consists of 2048 bits of eeprom memory used for storing pass- words, keys and codes and defining security levels to be used for each user zone. access rights to the configuration zone are defined in the control logic and may not be altered by the user. security fuses there are three fuses on the device that must be blown during the device personaliza- tion process. each fuse locks certain por tions of the configuration zone as otp memory. fuses are designed for the module manufacturer, card manufacturer and card issuer and should be blown in sequence, although all programming of the device and blowing of the fuses may be performed at one final step. table 3. configuration zone component address answer to reset $00 fab code memory test zone card manufacturers code lot history code device configuration register $18 identification number access registers password/key registers issuer code authentication attempts counters $50 cryptograms session encryption keys secret seeds password attempts counters $b0 write passwords read passwords reserved 5 at88sc6416c 5015ds?smem?7/04 protocol selection the at88sc6416c supports two different communication protocols. smart card applications : the asynchronous t = 0 protocol defined by iso 7816-3 is used for compatibility with the indu stry?s standard smart card readers. embedded applications : a 2-wire serial interface is used for fast and efficient communication with logic or controllers. the power-up sequence determines which of the two communication protocols will be used. asynchronous t = 0 protocol this power-up sequence complies with iso 7816-3 for a cold reset in smart card applications. v cc goes high; rst, i/o-sda and clk-scl are low. set i/o-sda in receive mode. provide a clock signal to clk-scl. rst goes high after 400 clock cycles. the device will respond with a 64-b it atr code, including histor ical bytes to indicate the memory density within the cryptomemory family. once the asynchronous mode has been selected, it is not possible to switch to the synchronous mode without powering off the device. figure 2. asynchronous t = 0 protocol (gemplus patent) after a successful atr, the protocol and pa rameter selection (pps) protocol, as defined by iso 7816-3, may be used to negotiate the communications speed with cryptomemory devices 32 kbits and larger. cryptomemory suppor ts d values of 1, 2, 4, 8, 12, and 16 for an f value of 372. also supported are d values of 8 and 16 for f = 512. this allows selec- tion of 8 communications speeds ranging from 9600 baud to 153,600 baud. synchronous 2-wire serial interface the synchronous mode is the default after powering up v cc due to the internal pull-up on rst. for embedded applications using cryptomemory in standard plastic packages, this is the only communication protocol. power-up v cc , rst goes high also. after stable v cc , clk-scl and i/o-sda may be driven. figure 3. synchronous 2-wire protocol (gemplus patent)l note: five clock pulses must be sent before the first command is issued. v cc i/o-sda rst clk-scl at r v cc i/o-sda rst clk-scl 1 2 3 45 6 at88sc6416c 5015ds?smem?7/04 communication security modes communications between the device and host operate in three basic modes. standard mode is the default mode for the device after power-up. authentication mode is acti- vated by a successful authentication sequence. encryption mode is activated by a successful encryption activation following a successful authentication. note: 1. configuration data include viewable areas of the configuration zone except the passwords: mdc: modification detection code mac: message authentication code. security options anti-tearing in the event of a power loss during a write cycle, the integrity of the device?s stored data may be recovered. this function is optional: the host may choose to activate the anti- tearing function, depending on application requi rements. when anti-tearing is active, write commands take longer to execute, since more write cycles are required to com- plete them, and data are limited to eight bytes. data are written first to a buffer zone in eeprom instead of the intended destination address, but with the same access conditions. the data are then written in the required location. if this second write cycle is interrupted due to a power loss, the device will automatically recover the data from the system buffer zone at the next power-up. in 2-wire mode, the host is required to perform ack polling for up to 20 ms after write commands when anti-tearing is active. at power-up, the host is required to perform ack polling, in some ca ses for up to 10 ms, in the event that the device needs to carry out the data recovery process. write lock if a user zone is configured in the write lock mode, the lowest address byte of an 8-byte page constitutes a write access byte for the bytes of that page. example : the write lock byte at $080 controls the bytes from $080 to $087. the write lock byte may also be locked by writing its least signifi cant (rightmost) bit to ?0?. moreover, when write lock mode is activated, the write lock byte can only be pro- grammed ? that is, bits written to ?0? cannot return to ?1?. in the write lock configuration, only one byte can be written at a time. even if several bytes are received, only the first byte will be taken into acco unt by the device. table 4. communication security modes (1) mode configuration data user data passwords data integrity check standard clear clear clear mdc authentication clear clear encrypted mac encryption clear encrypted encrypted mac $080 $081 $082 $083 $084 $085 $086 $087 @ 11011001 xxxx xxxx locked xxxx xxxx locked xxxx xxxx xxxx xxxx xxxx xxxx locked xxxx xxxx xxxx xxxx $80 7 at88sc6416c 5015ds?smem?7/04 password verification passwords may be used to protect read and/or write access of any user zone. when a valid password is presented, it is memorized and active until power is turned off, unless a new password is presented or rst becomes active. there are eight password sets that may be used to protect any user zone. only one password is active at a time, but write passwords give read access also. authentication protocol the access to a user zone may be protected by an authentication protocol. any one of four keys may be selected to use with a user zone. the authentication success is memorized and active as long as the chip is powered, unless a new authentication is initialized or rst becomes active. if the new authentica- tion request is not validated, the card loses its previous authentication and it should be presented again. only the last request is memorized. note: password and authentication may be presente d at any time and in any order. if the trials limit has been reached (after four consecutiv e incorrect attempts), the password verifica- tion or authentication process will not be taken into account. figure 4. password and authentication operations checksum the at88sc6416c implements a data validity check function in the form of a check- sum, which may function in standard, authentication or encryption modes. in the standard mode, the checksum is implemented as a modification detection code (mdc), in which the host may read a mdc from the device in order to verify that the data sent was received correctly. in the authentication and encryption modes, the checksum becomes more powerful since it provides a bidirectional data integrity check and data origin authentication capa- bility in the form of a mess age authentication code (mac) . only the ho st/device that carried out a valid authentication is capable of computing a valid mac. while operating in the authentication or encryption modes, the use of a mac is required. for an ingoing command, if the device calculates a mac different from the mac transmitted by the host, not only is the command abandoned but the mode is also reset. a new authentica- tion and/or encryption activation will be required to reactivate the mac. cs verify cs write data verify rpw data checksum (cs) verify cs 8 at88sc6416c 5015ds?smem?7/04 encryption the data exchanged between the device and the host during read, write and verify password commands may be encrypted to ensure data confidentiality. the issuer may choose to require encryption for a user zone by settings made in the configuration zone. any one of four keys may be selected for use with a user zone. in this case, activation of the encryption mode is required in order to read/write data in the zone and only encrypted data will be transmitted. even if not required, the host may elect to activate encryption provided the proper keys are known. supervisor mode enabling this feature allows the holder of one specific password to gain full access to all eight password sets, including the ability to ch ange passwords. modify forbidden no write access is allowed in a user zone protected with this feature at any time. the user zone must be written during device personalization prior to blowing the security fuses. program only for a user zone protected by this feature, data within the zone may be changed from a ?1? to a ?0?, but never from a ?0? to a ?1?. initial device programming to enable the security features of cryptomemory, the device must first be personalized to set up several registers and load in the appropriate passwords and keys. this is accomplished through programming the configuration zone of cryptomemory using sim- ple write and read commands. to gain access to the configuration zone, the secure code must first be successfully presented . for the at88sc6416c device, the secure code is $f7 62 0b. after writing and verfiying data in the configuration zone, the security fuses must be blown to lock this information in the device. for additional information on personalizing cryptomemory, please see the application notes programming cryptom- emory for embedded applications and initializing cryptome mory for smart card applications (at www.atmel.com). 9 at88sc6416c 5015ds?smem?7/04 ordering information note: 1. formal drawings may be obtained from an atmel sales office. ordering code package voltage range temperature range at88sc6416c-mj at88sc6416c-mb m2 ? j module m2 ? b module 2.7v?5.5v commercial (0c?70c) at88sc6416c-pi at88sc6416c-si AT88SC6416C-Y4I 8p3 8s1 8y4 2.7v?5.5v industrial ( ? 40c?85c) at88sc6416c-pu at88sc6416c-su at88sc6416c-y4u 8p3 8s1 8y4 2.7v?5.5v lead-free/halogen-free/industrial ( ? 40c?85c) at88sc6416c-wi 7 mil wafer 2.7v?5.5v industrial ( ? 40c?85c) package type (1) description m2 ? j module m2 iso 7816 smart card module m2 ? b module m2 iso 7816 smart card module with atmel logo 8p3 8-lead, 0.300? wide, plastic dual inline package (pdip) 8s1 8-lead, 0.150? wide, plastic gull wing small outline package (jedec soic) 8y4 8-lead, 6.00 mm x 4.90 mm body, soic array package (sap) 10 at88sc6416c 5015ds?smem?7/04 packaging information mod u le s ize: m2 dimen s ion * : 12.6 x 11.4 [mm] glo b top: squa re ? 9.0 x 9.0 [mm] thickne ss : 0.5 8 [mm] pitch: 14.25 mm ordering code: mb orderin g code: mj * note: the mod u le dimen s ion s li s ted refer to the dimen s ion s of the expo s ed met a l cont a ct a re a . the a ct ua l dimen s ion s of the mod u le a fter exci s e or p u nching from the c a rrier t a pe a re gener a lly 0.4 mm gre a ter in b oth direction s (i.e., a p u nched m2 mod u le will yield 1 3 .0 x 11. 8 mm). mod u le s ize: m2 dimen s ion * : 12.6 x 11.4 [mm] glo b top: ro u nd ? thickne ss : 0.5 8 [mm] pitch: 14.25 mm 8.5 [mm] ? 11 at88sc6416c 5015ds?smem?7/04 ordering code: si, su 8-lead soic 1150 e. cheyenne mtn. blvd. colorado springs, co 80906 title drawing no. r rev. note: 10/7/03 8s1 , 8-lead (0.150" wide body), plastic gull wing small outline (jedec soic) 8s1 b common dimensions (unit of measure = mm) symbol min nom max note a1 0.10 ? 0.25 these drawings are for general information only. refer to jedec drawing ms-012, variation aa for proper dimensions, tolerances, datums, etc. a 1.35 ? 1.75 b 0.31 ? 0.51 c 0.17 ? 0.25 d 4.80 ? 5.00 e1 3.81 ? 3.99 e 5.79 ? 6.20 e 1.27 bsc l 0.40 ? 1.27 ? 0? ? 8? ? top view end view side view e b d a a1 n e 1 c e1 l 12 at88sc6416c 5015ds?smem?7/04 ordering code: pi, pu 8-lead pdip 2325 orchard parkway san jose, ca 95131 title drawing no. r rev. 8p3 , 8-lead, 0.300" wide body, plastic dual in-line package (pdip) 01/09/02 8p3 b notes: 1. this drawing is for general information only; refer to jedec drawing ms-001, variation ba for additional information. 2. dimensions a and l are measured with the package seated in jedec seating plane gauge gs-3. 3. d, d1 and e1 dimensions do not include mold flash or protrusions. mold flash or protrusions shall not exceed 0.010 inch. 4. e and ea measured with the leads constrained to be perpendicular to datum. 5. pointed or rounded lead tips are preferred to ease insertion. 6. b2 and b3 maximum dimensions do not include dambar protrusions. dambar protrusions shall not exceed 0.010 (0.25 mm). common dimensions (unit of measure = inches) symbol min nom max note d d1 e e1 e l b2 b a2 a 1 n ea c b3 4 plcs a 0.210 2 a2 0.115 0.130 0.195 b 0.014 0.018 0.022 5 b2 0.045 0.060 0.070 6 b3 0.030 0.039 0.045 6 c 0.008 0.010 0.014 d 0.355 0.365 0.400 3 d1 0.005 3 e 0.300 0.310 0.325 4 e1 0.240 0.250 0.280 3 e 0.100 bsc ea 0.300 bsc 4 l 0.115 0.130 0.150 2 top view side view end view 13 at88sc6416c 5015ds?smem?7/04 1150 e. cheyenne mtn. blvd. colorado springs, co 80817 title drawing no. r rev. 8y4 , 8-lead (6.00 x 4.90 mm body) soic array package (sap) y4 a 8y4 5/24/04 common dimensions (unit of measure = mm) symbol min nom max note a ? ? 0.90 a1 0.00 ? 0.05 d 5.80 6.00 6.20 e 4.70 4.90 5.10 d1 2.85 3.00 3.15 e1 2.85 3.00 3.15 b 0.35 0.40 0.45 e 1.27 typ e1 3.81 ref l 0.50 0.60 0.70 a e a1 b pin 1 index area d a pin 1 id e1 d1 l e e1 ordering code: y4i, y4u 8-lead sap printed on recycled paper. ? atmel corporation 2003. atmel corporation makes no warranty for the use of its products , other than those expressly c ontained in the company?s standard warranty which is detailed in atmel?s terms and conditions located on the company?s web site. the company assumes no responsibility for any errors which may appear in this document, reserves the right to change devi ces or specifications detailed herein at any time without n otice, and does not make any commitment to update the information contained herein . no licenses to patents or other intellectual property of at mel are granted by the company in connection with the sale of atmel products, ex pressly or by implication. at mel?s products are not authorized for use as critical components in life support devices or systems. atmel headquarters atmel operations corporate headquarters 2325 orchard parkway san jose, ca 95131 tel 1(408) 441-0311 fax 1(408) 487-2600 europe atmel sarl route des arsenaux 41 case postale 80 ch-1705 fribourg switzerland tel (41) 26-426-5555 fax (41) 26-426-5500 asia room 1219 chinachem golden plaza 77 mody road tsimhatsui east kowloon hong kong tel (852) 2721-9778 fax (852) 2722-1369 japan 9f, tonetsu shinkawa bldg. 1-24-8 shinkawa chuo-ku, tokyo 104-0033 japan tel (81) 3-3523-3551 fax (81) 3-3523-7581 memory 2325 orchard parkway san jose, ca 95131 tel 1(408) 441-0311 fax 1(408) 436-4314 microcontrollers 2325 orchard parkway san jose, ca 95131 tel 1(408) 441-0311 fax 1(408) 436-4314 la chantrerie bp 70602 44306 nantes cedex 3, france tel (33) 2-40-18-18-18 fax (33) 2-40-18-19-60 asic/assp/smart cards zone industrielle 13106 rousset cedex, france tel (33) 4-42-53-60-00 fax (33) 4-42-53-60-01 1150 east cheyenne mtn. blvd. colorado springs, co 80906 tel 1(719) 576-3300 fax 1(719) 540-1759 scottish enterprise technology park maxwell building east kilbride g75 0qr, scotland tel (44) 1355-803-000 fax (44) 1355-242-743 rf/automotive theresienstrasse 2 postfach 3535 74025 heilbronn, germany tel (49) 71-31-67-0 fax (49) 71-31-67-2340 1150 east cheyenne mtn. blvd. colorado springs, co 80906 tel 1(719) 576-3300 fax 1(719) 540-1759 biometrics/imagin g/hi-rel mpu/ high speed converters/rf datacom avenue de rochepleine bp 123 38521 saint-egreve cedex, france tel (33) 4-76-58-30-00 fax (33) 4-76-58-34-80 e-mail literature@atmel.com web site http://www.atmel.com 5015ds?smem?7/04 at m e l ? is a registered trademark of atmel; cryptomemory ? is a trademark of atmel. other terms and product names may be the trademarks of others. |
Price & Availability of AT88SC6416C-Y4I |
|
|
All Rights Reserved © IC-ON-LINE 2003 - 2022 |
[Add Bookmark] [Contact Us] [Link exchange] [Privacy policy] |
Mirror Sites : [www.datasheet.hk]
[www.maxim4u.com] [www.ic-on-line.cn]
[www.ic-on-line.com] [www.ic-on-line.net]
[www.alldatasheet.com.cn]
[www.gdcy.com]
[www.gdcy.net] |