5秒后页面跳转
AT88SC0104C-09NT-XX PDF预览

AT88SC0104C-09NT-XX

更新时间: 2024-01-15 01:18:22
品牌 Logo 应用领域
爱特美尔 - ATMEL 可编程只读存储器电动程控只读存储器电可擦编程只读存储器
页数 文件大小 规格书
13页 141K
描述
EEPROM,

AT88SC0104C-09NT-XX 技术参数

生命周期:Active包装说明:,
Reach Compliance Code:compliant风险等级:5.61
Base Number Matches:1

AT88SC0104C-09NT-XX 数据手册

 浏览型号AT88SC0104C-09NT-XX的Datasheet PDF文件第4页浏览型号AT88SC0104C-09NT-XX的Datasheet PDF文件第5页浏览型号AT88SC0104C-09NT-XX的Datasheet PDF文件第6页浏览型号AT88SC0104C-09NT-XX的Datasheet PDF文件第8页浏览型号AT88SC0104C-09NT-XX的Datasheet PDF文件第9页浏览型号AT88SC0104C-09NT-XX的Datasheet PDF文件第10页 
AT88SC0104C  
Password Verification  
Authentication Protocol  
Passwords may be used to protect read and/or write access of any user zone. When a  
valid password is presented, it is memorized and active until power is turned off, unless  
a new password is presented or RST becomes active. There are eight password sets  
that may be used to protect any user zone. Only one password is active at a time, but  
write passwords give read access also.  
The access to a user zone may be protected by an authentication protocol. Any one of  
four keys may be selected to use with a user zone.  
The authentication success is memorized and active as long as the chip is powered,  
unless a new authentication is initialized or RST becomes active. If the new authentica-  
tion request is not validated, the card loses its previous authentication and it should be  
presented again. Only the last request is memorized.  
Note:  
Password and authentication may be presented at any time and in any order. If the trials  
limit has been reached (after four consecutive incorrect attempts), the password verifica-  
tion or authentication process will not be taken into account.  
Figure 4. Password and Authentication Operations  
VERIFY RPW  
DATA  
Checksum (CS)  
VERIFY CS  
CS  
VERIFY CS  
Write DATA  
Checksum  
The AT88SC0104C implements a data validity check function in the form of a check-  
sum, which may function in standard, authentication or encryption modes.  
In the standard mode, the checksum is implemented as a Modification Detection Code  
(MDC), in which the host may read a MDC from the device in order to verify that the data  
sent was received correctly.  
In the authentication and encryption modes, the checksum becomes more powerful  
since it provides a bidirectional data integrity check and data origin authentication capa-  
bility in the form of a Message Authentication Code (MAC). Only the host/device that  
carried out a valid authentication is capable of computing a valid MAC. While operating  
in the authentication or encryption modes, the use of a MAC is required. For an ingoing  
command, if the device calculates a MAC different from the MAC transmitted by the  
host, not only is the command abandoned but the mode is also reset. A new authentica-  
tion and/or encryption activation will be required to reactivate the MAC.  
7
2021BS–SMEM–10/02