ATMEL ATA555814-DDB

Features
•
•
•
•
•
•
•
•
•
Contactless Read/Write Data Transmission
Radio Frequency fRF:
100 kHz to 200 kHz
User Memory (1024 Bits): 32 Write Protectable 32-bit Blocks of Data
Deterministic Anticollision: Detection Rate ~ 20 Tags/s with 40-bit Tag ID, RF/32
On-chip CRC Generator: 16-bit CRC-CCITT Compliant to ISO/IEC 11785
Downlink Transmission:
Enhanced 1 out of 4 Pulse Interval Encoding (~ 5 kbps)
Uplink Transmission:
ASK Modulated, NRZ, Manchester or Bi-phase Encoding
Integrated Tuning Capacitor: 80 pF ±12%, 210 pF ±12% as Mask Option
System Memory (320 bits):
– 10 Write and Password Protectable 32 Bit Blocks of Data
– Tag ID (96 Bits Maximum)
– Traceability Data with Inherent Manufacturer Serial Number
– Write Password (32 Bits) and Read Password (32 Bits),
with Page Orientated Memory Protection Areas
– Configuration Register for Setup of:
• Selectable Data Bit Rate: RF/2 .. RF/64
• Selectable Tag ID Length to Optimize Anticollision Detection Rate
• Start of Frame with Variable Preamble Length to Simplify Interrogator Design
• Public Mode (PM) for Read Only Tag Emulation
• Electrical Article Surveillance (EAS) Mode
• Direct Data (NRZ), Bi-phase (FDX-B) or Manchester Data Encoding
1 kbit R/W IDIC
with
Deterministic
Anticollision
ATA5558
1. General Description
The ATA5558 is a contactless, two-terminal R/W-Identification IC (IDIC®) for multi- or
single tag applications in the low frequency (≈ 125 kHz) range. The passive tag uses
the external RF signal to generate it’s own power supply and internal clock reference.
Figure 1-1.
RFID System Using an ATA5558 Tag
Reader or
Interrogator
Data
*
Controller
Power
Coil interface
Transponder
Memory
ATA5558
* Mask option
It contains an EEPROM which is subdivided into 1024 bits of user memory and
320 bits of system memory. Both memory sections are organized in data blocks of
32 bits, each equipped with an associated lock bit for block write protection. The user
memory, which is intended for storage of recallable user data, is made of 32 such
blocks. The 10 block system memory section is reserved for system parameter and
configuration settings. Two of these blocks include a 32 bit read and a 32 bit write
password to prevent unauthorized read and/or write access to protected user definable memory pages.
4681D–RFID–08/08
The ATA5558 receives commands from the interrogator (downlink) as a 1 out of 4 pulse interval
encoded, amplitude modulated signal. Return data transmission from the tag to the interrogator
(uplink) utilizes either Manchester, Bi-phase or NRZ encoded amplitude modulation. This is
achieved by controlled damping of the interrogator’s RF field with an on-chip resistive load
between the two tag terminals, Coil 1 and Coil 2. Multi-Tag identification is implemented using a
deterministic anticollision algorithm which requires unique tag identification information (Tag
ID’s). Three blocks within the system memory are reserved for storage of the Tag ID, the length
of which is user configurable up to a maximum of 96 bits.
Figure 1-2.
System Block Diagram
Modulator
Analog front-end
*
Coil 2
POR
PPM signal Binary bitrate
generator
decoder
System memory
Coil 1
Mode register
User memory
(1 kbit EEPROM)
Controller
Input register
Anticollision logic
HV generator
* mask option
2. Functional Blocks
2.1
Analog Front End
The analog front end (AFE) includes all circuitry directly associated with the coil interface. It generates the internal power supply and handles the data communication with the interrogator. It
consists of the following blocks:
• Rectifier to generate a DC supply voltage from the AC coil voltage
• Low-voltage regulator to provide an on-chip stabilized DC voltage
• Charge pump to generate the high voltage required for EEPROM programming
• On-chip tuning capacitor (mask option)
• Field clock extractor
• Field gap detector for data transmission from interrogator to tag
• Load switching between Coil 1/Coil 2 for data transmission from tag to interrogator
• Electrostatic discharge protection (ESD)
2
ATA5558
4681D–RFID–08/08
ATA5558
2.2
Power-On Reset (POR) and Initialization
The Power-On-Reset circuit (POR) maintains the circuit in a reset state until an adequate internal operating voltage threshold level has been reached, whereupon a default start-up delay
sequence is started. During this period of 200 field clock cycles, the configuration and security
setup is initialized from the System Configuration and Page Security blocks.
2.3
Control Logic
The control logic is responsible for the following functions:
• Initialization and reloading of the configuration from EEPROM
• Control of read and write memory access operations
• Data transmission and command decoding
• CRC check, error detection and error handling
2.4
Modulator
The modulator output circuitry controls the switching of a resistive load between the Coil 1 and
Coil 2 pads to transmit data from the tag to the interrogator (uplink). The ASK load modulator is
driven from the Manchester, Bi-phase encoder or directly from the EEPROM memory data
stream (NRZ) according to the uplink encoding configuration.
Table 2-1.
Types of Modulation
Uplink Mode
Manchester Encoding
Bi-phase Encoding(1)
NRZ – Direct Data
ASK-coded
0 = falling edge on mid bit
0 = rising or falling edge
0 = modulation off
modulation
1 = rising edge on mid bit
1 = no edge on mid bit
1 = modulation on
Note:
1. Since Bi-phase encoding is data dependent the following definitions apply to the ATA5558
implementation.
- The tag modulates the first (half) bit period after SOF.
- If the last bit of a data stream is a logical 1 it is possible that this bit period is non-modulated and therefore is not detectable directly by the reader.
Figure 2-1.
Manchester Timing Diagram
1
Data rate = FRF/16
0
0
1
NRZ data stream
Manchester
coded Modulator
signal
Manchester coded
RF field
3
4681D–RFID–08/08
Figure 2-2.
Bi-phase Timing Diagram
1
0
Data rate = FRF/8
0
1
1
1
1
0
NRZ data stream
Biphase coded
RF field
Bi-phase coded
Modulator signal
2.5
Binary Bit Rate Generator
The tag’s data rate is binary programmable in the configuration register to operate at any bit rate
between RF/2 and RF/64.
RF
Data rate = --------------------2(n + 1)
2.6
2.6.1
Memory Section
Memory Map
The physical memory is subdivided into two logical sections (see Figure 2-3). The first logical
memory section contains the 1024 bits of user data. The second logical memory section contains 320 bits of system/configuration data. Both memories are organized in 32-bit data blocks,
each block being equipped with a single lock bit, with which the associated block can be write
protected. Command controlled programming and reading always takes place on a serial MSB
first block basis so that a block constitutes the smallest directly accessible data unit. The user
memory is further subdivided into 8 pages, each of 4 blocks in size. This provides the basis of
the page security scheme (“Password Protection” on page 6).
Figure 2-3.
Memory Map Structure
User memory
31
30
31
29
28
27
:
7
6
5
4
3
2
1
0
L
L
L
L
L
:
L
L
L
L
L
L
L
L
User data block31/page7
User data block30/page7
User data block29/page7
User data block28/page7
User data block27/page6
1Fh
1Eh
1Dh
1Ch
1Bh
:
User data block7/page1
User data block6/page1
User data block5/page1
User data block4/page1
User data block3/page0
User data block2/page0
User data block1/page0
User data block0/page0
L 31 30 29
4
System memory
bit position
2
07h
06h
05h
04h
03h
02h
01h
00h
1
0
63
62
61
60
59
58
57
56
55
54
L
L
L
L
L
L
L
L
L
L
Configuration
Password/Page Security
Traceability 3
Traceability 2
Traceability 1
Tag ID 3
Tag ID 2
Tag ID 1
Password - Write
Password - Read
L 31 30 29
bit position
2
3Fh
3Eh
3Dh
3Ch
3Bh
3Ah
39h
38h
37h
36h
1
0
Lock bits
ATA5558
4681D–RFID–08/08
ATA5558
A valid Write command can be used for programming a data block of 33 bits – including the
associated lock bit – into an addressed location of either memory section. Once locked
(lock bit = 1), the entire block including the lock bit itself can no longer be reprogrammed
selectively.
The system memory section is situated at the upper end of the (6-bit) memory address range
and contains all system parameters and configuration settings. This area has restricted access
(see Figure 2-5 on page 7) and the majority of blocks can only be read or written after the successful execution of the appropriate Password Login command (see Table 7-1 on page 24).
All the configuration settings are allocated in block 63 (see Figure 2-7 on page 9) and the password protection security information in block 62 (see Figure 2-6 on page 7).
2.6.2
Traceability Data
The traceability information is programmed and locked into the traceability blocks (59-61) by
Atmel during the production test(1).
Note:
1. This is not valid for -DDW (tested die on unsawn wafer) delivery.
Figure 2-4.
Tag ID and Traceability Structure
Traceability
31 ................................. 16
15 ......... 8
7 ............. 0
IC code
ACL
MFC
Block 60
RFU
Block 61
wafer # 5bit
die on wafer 18 bit
ICR
LotID
7... 4
3 ... 0
LotID
31
Block 59
30 .............. 26
25 ........................ 8
TagID
Block 58
TagID(msb-64).......TagID(msb-79)
TagID(msb-80)........TagID(msb-95)
Block 57
TagID(msb-32).......TagID(msb-48)
TagID(msb-49)........TagID(msb-63)
Block 56
TagID(msb)...........TagID(msb-16)
TagID(msb-17)........TagID(msb-31)
31
...................
16
15
.....................
0
Anticollison detection starts with this bit
IC code
ACL
MFC
ICR
DPW
Wafer#
Lot ID
RFU
4-digit Atmel IC reference number, e.g. ’5558’
Allocation class as defined in ISO/IEC TDR 15963-1 = E0h
Manufacturer code of Atmel Corp. as defined in ISO/IEC 7816-6/AM1 = 15h
4-bit Atmel IC revision code
18-bit binary encoded die number on wafer
5-bit binary wafer number
9-digit lot number
Reserved for Future Use
5
4681D–RFID–08/08
The blocks 59, 60 and 61 contain Atmel’s manufacturer’s serial number (MSN). The top 4 digits
of block 61 specifiy the IC code of this product. The following byte of block 61 is fixed to E0h
which is the allocation class (ACL) for registered IC manufacturers as defined in TDR 15963-1;
followed by the manufacturer code (MFC), which compliant with ISO/IEC 7816-6/AM1, is defined
as 15h for Atmel. The remaining two blocks contain a 64-bit Atmel unique traceability code. The
data is divided in several sub-groups, a 36-bit lot ID code, a 5-bit wafer number and a 18-bit
sequential die number which represents the physical location of the chip on the processed wafer.
The ICR nibble (4 bits) of this manufacturer serial number (MSN) is used for the IC reference/version (ICR).
The unique tag identifier (Tag ID) blocks provide an address code with which each tag can be
individually identified and interrogated. These codes are programmed by either the tag system
administrator or the tag manufacturer into blocks 56 to 58. The allocation of individual Identification codes must be handled so that an interrogator can never be confronted with two tags with
identical Tag IDs. This is an important issue as the Tag ID is used as the basis for accessing and
sorting tags during anticollision commands GetID, Select and SelectGroup.
The Atmel traceability code (blocks 60 and 59) itself provides a means of unique chip identification so that this data content can be used as the Tag ID or a part of the Tag ID by copying it or
part of it into blocks 56 and 57.
The Tag ID code is located in blocks 56 to 58. It is MSB aligned so that it may occupy between
16 and 96 bits (see Figure 2-4 on page 5). This Tag ID length is set in the configuration block
(see Figure 2-7 on page 9) and has an impact on the time required to complete the anticollision
detection loop so it should be adjusted to suit system requirements. The default preprogrammed
Tag ID length is 64 bits. The anticollision algorithm is based on a bit by bit binary tree elimination,
carried out in parallel on all the Tag IDs within the interrogator field. This starts with the MSB of
the Tag ID (always in bit position 31 of block 56) and continues through to bit position 0 of block
58 or until the Tag ID LSB, indicated by the configuration Tag ID length, is reached.
2.7
Security Levels
The ATA5558 has three levels of security. Firstly, the restricted password access which prevents unauthorized access to both user and system data but allows authorized access using the
correct password. Then a block orientated absolute write lock protection (lock bits) and finally
the Master Key with a security code which has to be set in the configuration block accordingly
(see Table 2-2 on page 8 and Figure 2-7 on page 9).
2.7.1
6
Password Protection
The user memory is subdivided into continuous page areas which can be configured so that
write or read/write operations on blocks within these pages can only be carried out after the
appropriate password has been transmitted to the tag (LoginRead or LoginWrite command). The
read and write password protections are independent and user definable. The read and write
passwords are found in blocks 54 and 55 and the page security levels are defined in the Page
Security register of block 62 (see Figure 2-6 on page 7).
ATA5558
4681D–RFID–08/08
ATA5558
To access a protected memory block, a Login command with the corresponding read or write
password had to be executed once per session. During the login procedure the 32-bit password
field of the login command is compared with the contents of the corresponding password in the
system memory. If the passwords match, the ATA5558 tag will return an SOF pattern as an
acknowledge signal. If they do not match, the tag will respond with an SOF followed by the
appropriate error code. Writing to a protected memory address which has not been enabled with
the correct LoginWrite password, will result in an error code on completion of the interrogator
command. Reading a password protected memory address which has not been enabled with
the correct LoginRead password, returns a block of all 0 data and no error code.
Figure 2-5.
System Memory Access
Read Access
Figure 2-6.
Write Access
Configuration
63
Configuration
Block Name
Page Security
62
Page Security
Unlimited Access
Traceability 3
61
Traceability 3
Traceability 2
60
Traceability 2
Traceability 1
59
Traceability 1
Block Name
Tag ID 3
58
Tag ID 3
Password Access
Tag ID 2
57
Tag ID 2
Tag ID 1
56
Tag ID 1
Password - Write
55
Password - Write
Block Name
Password - Read
54
Password - Read
No Access
Page Security Register
MSB.............
...........LSB
L 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 0
P7a P7b P6a P6b P5a P5b P4a P4b P3a P3b P2a P2b P1a P1b P0a P0b
reserved
Code
Pxa Pxb
0
0
1
0
0
1
1
1
2.7.2
Password required for
write
read
no
no
yes
no
yes
yes
reserved
reserved
Page 0
Page 7
Page 1
Page 6
Page 5
Page 2
Page 4
Page 3
Page Security Data
Lock Bit
Each memory block, consists of 32 data bits and an associated lock bit (see Figure 2-3 on page
4). Once a block is locked (lock bit = 1), the entire block including the lock bit itself can no longer
be reprogrammed
7
4681D–RFID–08/08
2.7.3
Master Key
The Master Key controls various operating modes as described in Table 2-2. For production test
purposes, other Master Key codes are used, but once the Configuration block has been double
locked these test functions can never be reactivated.
If the Master Key is set to 0110, the blocks within the system memory section have different
access protection (see Figure 2-5 on page 7). These access rights are fixed and not influenced
by the Page Security Register. Access to password protected system memory blocks can only
be performed after the corresponding LoginWrite or LoginRead has been successfully executed.
The password blocks themselves are non-readable. Traceability and configuration can always be
read but the traceability data cannot be altered.
Table 2-2.
Master Key Related Functions
Enables
Protection Scheme
Master Key
DDR
PM
EAS
User Memory
Clear
Page
Security
System
Memory
6
yes
yes
yes
no
yes
yes
9
yes
yes
yes
yes
yes
yes
others
no
no
no
yes
no
no
A new ATA5558 device, when received by the customer can be considered as being unprogrammed (all 0 state), the only exception to this being the preprogrammed non-alterable
traceability information. For the tag manufacturer to be able to easily set up the tag passwords, it
is possible to provisionally switch the password protection off. i.e Master Key = 0. In this state, it
is possible to read and write all non-locked (lock bits = 0) memory blocks irrespective of the
page security. In this way, new tag passwords or Tag ID’s can be defined and written. Blocks,
which have once been locked (block lock bit = 1) can however not be rewritten. When the customer has completed the tag configuration, the Master Key is set to the “safe” state (= 6) thus
enabling the full password protection, and then finally the configuration block itself may be
locked. In this double locked condition, the configuration and all other locked blocks are irreversibly set and cannot be changed. This applies to both the user and the majority of the system
memory blocks.
8
ATA5558
4681D–RFID–08/08
ATA5558
2.8
Tag Configuration Register
The internal tag configuration register holds a shadow copy of the configuration settings stored
in the system memory’s block 63. It is refreshed after every POR cycle (RF field on), Reset to
Ready or Write to block 63.
Figure 2-7.
Configuration Register
MSB...
...LSB
L 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 0
0 1 1 0 R R
p2 p1 p0
n4 n3 n2 n1 n0 R
R
0 0 a4 a3 a2 a1 a0
Lock Bit
0 = Unlocked
Uplink
1 = Locked
SOF
Preamble
Master Key * )
Downlink Data Rate
(DDR)
Operating
Mode * )
x 0 = ITF
0 1 = PM
1 1 = EAS
Length
( bit periods )
0
0
.
.
1
0
0
.
.
1
0 =1
1 =2
.
.
.
.
1 =8
TagID
Length
Data Bit Rate
RF/2(n+1)
Uplink
Encoding
Max. Block
0 0 = Manchester
0 0 0 = 16 bit
0 0 1 = 32 bit
0 1 = NRZ (Direct Coding)
1 0 = FDX-B (Biphase)
0 1 0 = 48 bit
0 1 1 = 64 bit
1 1 = Reserved
1 0 0 = 80 bit
1 0 1 = 96 bit
1 1 0 = 40 bit
1 = Downlink CRC check
mandatory
1 1 1 = 56 bit
Notes:
* ) see Master Key section
R = reserved for future use, should be set to '0'
x = don't care state
ITF =Interrogator Talks First Mode
PM = Public Mode (Tag Talks First - TTF)
EAS = Electrical Article Surveillance
NRZ = Non Return to Zero
3. Transmission Protocol
The transmission protocol defines the mechanism to exchange commands and data between
the interrogator and the tags. In all but the Public and EAS Mode, the interrogator has complete
control over the communication flow – all data transmission being synchronized to interrogator
commands and the interrogator field clock – “Interrogator Talks First” (ITF) principle. This means
that a tag does not transmit data, unless it has received and properly decoded an interrogator
command.
The protocol is based on an exchange of
• commands from the interrogator to the tag (Downlink mode)
• and response from the tag to the interrogator (Uplink mode)
9
4681D–RFID–08/08
3.1
Tag to Interrogator Communication
All transmissions from the tag to the interrogator utilize amplitude modulation (ASK) of the RF
carrier. This takes place by controlled switching of a resistive load between the coil pads which in
turn modulates the RF field generated by the interrogator.
The tag is capable of communicating with the interrogator via inductive coupling. Typical examples of the incorporated amplitude modulation is shown in Figure 3-1:
• Manchester encoded data signal
• Bi-phase encoded data signal
• NRZ direct data encoding
• Dual pattern data coding is used during the anticollision loop and for an error code response
Figure 3-1.
Tag to Interrogator - Load Modulation Coding
NRZ
Data
Normal Manchester
data coding
Normal Biphase
data coding
Anticollision dual pattern
data coding
Td
Td
Td
Td
Td
load on
Data "1"
or
load off
Td
load off
load off
load on
load on
Td
Data "0"
load off
load on
3.1.1
10
load off
load on
or
load off
load on
Td
load off
load on
Start of Frame (SOF) Encoding
After the reception of a valid interrogator command the tag will reply immediately with a Start of
Frame (SOF) pattern. The SOF pattern is made up of a variable length preamble and a fixed
2-bit (Manchester) code violation followed by a half bit duration of unmodulated carrier. The preamble length as set in the configuration block defines the number of (Manchester coded) zero
initialization data bits. If the preamble length in the configuration register is set to zero, a single
start bit will precede on the code violation.
ATA5558
4681D–RFID–08/08
ATA5558
Figure 3-2.
SOF Pattern
SOF
Example with
Preamble length = 4
3.1.2
2 bit period
code
violation
Public Mode
1. In Public Mode the cyclic data stream will be preceded by a single SOF pattern after the
completion of the POR delay.
2. The variable number of preamble data bits is aimed at easing the interrogator design
and optimizing system performance.
3. Within any closed identification system the preamble length for all tags must be
identical.
3.2
Interrogator to Tag Communication
All commands and data bit streams from the interrogator to the tag are 100% (OOK –
On-Off-Key) modulated using a modified 1 out of 4 pulse position coding. Depending on the
data, the continuous RF field is interspersed with short field gaps of constant duration and variable separation. The time from one gap to the next may take on one of four discrete values.
Each of these represent one of four possible dual bit downlink data codes (00 .. 11) in the data
stream (see Figure 3-3). The downlink data transfer speed is dependent on the downlink data
rate (DDR) bit set in the tag configuration block, so that selected tags can always understand the
interrogator. The minimum write data coding (maximum data rate) is 9 field clocks. This corresponds with the d00 (dref) parameter in Figure 3-3 and Table 3-1 on page 12.
Figure 3-3.
Interrogator to Tag - Modified 1 out of 4 Pulse Position Coding
Uplink mode
Downlink mode
d01
Sgap
dref
d11
Wgap
d10
d00
11
4681D–RFID–08/08
3.2.1
Start Gap
The first command gap is usually slightly longer (~20 field clocks) than the following data gaps.
This is referred to as the start gap. All interrogator to tag commands are initiated by such a start
gap. As soon as the clock extractor detects a start gap, the tag’s receive damping is switched
on. This serves to improve the gap detection of all following data gaps.
A start gap can be detected at any time after the completion of the tag’s power on reset delay
sequence (RF field-on plus ~3 ms). If a gap is received during this delay sequence, irrespective
of whether it is part of a command or a start gap, the delay will restarted. Commands or partial
command sequences occurring during the power on reset sequence will not executed.
3.2.2
4PPM Command Encoding
The timing between data gaps depends on the Downlink Data Rate (DDR) in the configuration
register and is nominally 9 or 13 field clocks for a 00, 17 or 29 field clocks for a 01, 25 or 46 field
clocks for a 10 and 33 or 61 field clocks for a 11. The duration of the field gaps lie between 8 and
20 field clocks. Should no gap be detected for more than the maximum 11 gap separation (see
Table 3-1), the tag(s) will terminate the present command decoding mode and, if enabled
release the receive damping. If an error is detected within the command sequence (e.g. incorrect number of bits received, CRC check failed etc.) the tag will return a dual pattern coded error
to the interrogator and ignore the command. The first two bits of every command constitute the
Start of Command (SOC) and is always 00. This SOC is used as a timing reference for all following data (see Table 3-1), thus providing an auto-adjustment to allow for varying environmental
conditions.
Table 3-1.
Modified Pulse Position Modulation - Timing Parameters
DDR = 1 and
Master Key = 6 or 9
Parameter
Remark
Start gap
Write gap
Min.
Typ.
Max.
Min.
Typ.
Max.
Unit
Sgap
8
10
50
8
10
50
Tc
Wgap
8
10
20
8
10
20
Tc
Reference data 00
dref
9
–
68
13
–
72
Tc
00 data
d00
dref – 3
dref
dref + 4
dref – 7
dref
dref + 8
Tc
01 data
d01
dref + 5
dref + 8
dref + 12
dref + 9
dref + 16
dref + 24
Tc
10 data
d10
dref + 13
dref + 16
dref + 20
dref + 25
dref + 32
dref + 40
Tc
11 data
d11
dref + 21
dref + 24
1. All absolute times assume TC = 1/fC = 8 µs (fC = 125 kHz)
dref + 28
dref + 41
dref + 48
dref + 56
Tc
Write data
coding (gap
separation)
Notes:
Symbol
DDR = 0 or
Master key ≠ 6 or 9
2. All the above timing data is that which should appear on the device terminals so that the device can operate correctly.
Depending on the coil used (e.g. Q factor etc.) and the transmission medium, the values implemented in the interrogator
could vary slightly.
12
ATA5558
4681D–RFID–08/08
ATA5558
Figure 3-4.
Command “Read Block #23”
cmd
00
block addr
01
01
01
11
Interrogator command "Read single block 23"
S Gap
SOF
32 bit data
CRC - 16
Tag reply
Figure 3-5.
No
Modulation
Command “Write Block #12”
cmd
00
SGap
01
lock
bit
block addr
00
11
00
01
32 bits data
bit31 bit30
bit1 bit0
11
10
Interrogator command "Write single
block 12"
Program
delay
( 5 ms)
11
00
CRC - 16
No
Modulation
00
Tag reply
13
4681D–RFID–08/08
4. CRC Error Checking
The CRC error checking circuitry generates a 16-bit CRC to ensure the integrity of transmitted
and received data packets. The ATA5558 uses the CRC-CCITT (Consultative Committee for
International Telegraph and Telephone) for error detection. The 16 bit cyclic redundancy code is
calculated using the following polynomial with an initial value of 0x0000:
P(X) = x
16
+x
12
5
+x +x
0
The implemented version of the CRC check has the following characteristics:
• Reverse CRC-CCITT 16 as described in ISO/IEC 11785
• The CRC 16-bit shift register is initialized to all zeros at the beginning of a command
• The incoming data bits are XOR-ed with the MSB of the CRC register and is shifted into the
register’s LSB
• After all data bits have been processed, the CRC register contains the CRC-16 code.
• Reversibility - The original data together with associated CRC, when fed back into the same
CRC generator will regenerate the initial value (all zero’s).
Should a CRC be required, both the tag and interrogator must use the above CRC polynomial.
During read/write operations, a CRC can be attached to information by either the interrogator
and/or the tag
In the case of downlink communication, a CRC (CRC_d) can be attached to information transmitted from the interrogator to the tag(s) (see Figure 4-2 on page 15). This is evaluated by the
tag(s) to ensure correct transmission.
During the uplink phase of the read commands the tag replies with the requested data block(s)
followed by an uplink CRC (CRC_u). This CRC_u is generated in the tag’s CRC generator, from
the downlink address, CRC_d (if used) and the returned data (see Figure 4-3 on page 16 a, b,
c). So by initializing the interrogator’s CRC generator with the same address and CRC_d (if
used), then subsequently updating it with the returned data and uplink CRC_u, the integrity of
both the address understood by the tag and data itself can be verified. On receiving a response
from the tag which includes a CRC_u, it is recommended that the interrogator verifies this. If it is
found to be incorrect, the interrogator should take the appropriate actions. These actions are left
to the discretion of the system designer.
During the anticollision detection, the CRC can also be used as a means of tag identification. A
tag which is successfully selected by one of the select commands or as the result of an anticollision elimination cycle, will always reply with a CRC. This is generated from it’s own Tag ID (see
Figure 4-3 on page 16 d) and is always preceded by an SOF pattern. This also provides an additional means of double checking whether the intended tag has been selected.
For any write command, if the bit 10 of the configuration register = 1, the usage of the CRC for
this communication is mandatory. Failure to include or verify a CRC results in the tag aborting
the command execution and returning an error code. If the configuration register bit 10 = 0, the
Write CRC usage is optional. In this case, the CRC is handled in the same manner as a read
command i.e. the CRC is only evaluated if attached. Should no CRC be transmitted and the configuration register bit 10 = 0, then the command will always be executed.
14
ATA5558
4681D–RFID–08/08
ATA5558
Figure 4-1.
Schematic Diagram of CRC Generation
Data in
P (X) = X0 X1 X2 X3 X4
X5 X6 X7 X8 X9 X10 X11
X12 X13 X14 X15
lsb
Figure 4-2.
msb
Examples of Downlink CRC Generation
(a) Read Multiple Blocks
lsb .......... msb
11 11 10
lsb ........... msb
0110
0 0
end
address
start
address
(1F hex)
(06 hex)
lsb .............................................. msb
1110
0110
1000
0010
Interrogator CRC Generator
after 12 shift operations
CRC_d = 4167hex
(b) Read Single Block
lsb .............. msb
0110
0 0
address
lsb .................................................. msb
0110
0011
0000
0110
Interrogator CRC generator
after 6 shift operations
(06 hex)
CRC_d = 60C6hex
lsb .............. msb
lsb .................................................. msb
(c) Write
lsb .................................................. msb
0110
000 0
0000
1010
data (32 bits)
(5000 0006 hex)
Data from interrogator
10
1 1 0 0
10
address
lock bit
(locked)
(13 hex)
1111
0111
1010
0100
Interrogator CRC generator
after 40 shift operations
CRC_d = 25EF hex
CRC Generator tag or interrogator
15
4681D–RFID–08/08
Figure 4-3.
Examples of Uplink CRC Generation
(a) Read Multiple Blocks using downlink CRC
lsb .................................................................... msb
lsb ................................................................... msb
1110 0110 1010 0010 1100 0100 1000 0000
1111 0111 1011 0011 1101 0101 1001 0001
Data from address 06h
Data from address 07h
(0123 4567 hex)
(89ABCDEF hex)
lsb .......................................... msb
lsb .......... msb
0111
11 10 00
1010
0100
1011
lsb ........... msb
0110
end
address
CRC_d from interrogator
1010
0 0
start
address
(07hex)
(D25E hex)
lsb ................................................ msb
1010
1001
0101
Tag CRC Generator
after 92 shift operations
(06hex)
CRC_u = A955hex
(b) Read Single Block without downlink CRC
lsb ............................................................... msb
lsb ............ msb
0110
0000 0000 0000 0000 0011 0011 0011 0011
Data from address 06h
lsb .................................................. msb
1010
0 0
0100
0110
Tag CRC Generator
after 38 shift operations
address
(CCCC 0000hex)
0001
(06hex)
CRC_u = 6285hex
lsb .............................................................. msb
(c) Read Single Block with downlink CRC
1010 1010 1010 1010 0101 0101 0101 0101
Data from address 07h
(AAAA 5555 hex)
lsb .......................................... msb
0010
1001
0100
lsb ........... msb
0010
1010
1001
1100
0000
start
address
Tag CRC generator
after 54 shift operations
(4294 hex)
(15hex)
CRC_u = 039Ahex
lsb ........................msb
1100 0100 1000 0000
TagID
( 0123hex)
16
0101
CRC_d from interrogator
(d) Select Tag (16 bit TagID)
Data from tag
1 0
lsb .................................................. msb
Data from interrogator
lsb ................................................. msb
0000
1100
1110
0100
Tag CRC Generator
after 16 shift operations
CRC_u = 2730hex
CRC Generator tag or interrogator
ATA5558
4681D–RFID–08/08
ATA5558
5. Operating Modes
After initialization, the Operating Mode (Configuration block bits 23 and 24) is interrogated and
depending on it’s state, the device will go into either the READY state of the “Interrogator Talks
First” (ITF) mode or the Public Mode’s PM READY state if the PM bit is set or the “Electronic
Article Surveillance” (EAS) mode is selected.
5.1
Interrogator Talks First Mode (ITF)
For multi-tag applications, the ATA5558 is used in the “Interrogator Talks First” (ITF) mode with
anticollision handling capability. In this mode, the tag starts up in the READY state, where it
remains silent and waits for further interrogator commands before communication can take
place.
5.2
Tag State Machine
Any tag can find itself in one of the following states:
• POWER DOWN
• PM READY (for PM or EAS modes only)
• READY (ITF mode)
• SELECTED
• QUIET
In the state diagram shown in Figure 5-1 on page 18, a state transition takes place by applying
or removing the field (power on/off) or via one of the commands Select, SelectAll, SelectGroup,
ResetSelected or ResetToReady. When a tag is unable to decode or process an interrogator
command (e.g. CRC or bit frame error), it will remain in the current state. Depending on the
state, tag(s) will only accept certain commands.
5.3
Power Down State
The tag is in the Power Down state when there is not enough energy in the interrogator field to
activate the tag. The ATA5558 commences a power-on initialization delay with an activated
weak damping level to achieve a field strength threshold for stable operation.
5.4
READY State (ITF)
The ATA5558 tag enters the READY state after it has been activated by the interrogator
(RF-field on) or after receiving either a ResetToReady or ResetSelected command (the EAS and
PM deactivated). The READY state is the initial anticollision state, and in general all tags on this
state are unidentified.
5.5
Selected State
Before a tag can in any way be accessed, it must first be selected. Tag selection can take place
individually in which case they find themselves within the Selected state. They can enter the
Selected state as a result of receiving an explicit Select command with the matching Tag ID. In
this way, only one tag can theoretically be in the Selected state at any one time. If a tag should
find itself in the Selected state and a second tag is selected by a subsequent Select command,
the first tag will automatically proceed into the Quiet state.
17
4681D–RFID–08/08
It is possible to carry out commands simultaneously on more than one tag. To do this they must
all first be selected by specifying a group of tags within the READY state and putting the group
into the Selected state. This is performed by using a SelectGroup command with a matching
partial Tag ID pattern. A group of tags in the Selected state may be written simultaneously with
identical blocks of data. Data verification and checksum errors are reported by the tags using a
special dual pattern code. Tags within the Selected state will automatically drop into the Quiet
state and be excluded from subsequent anticollision detection, if a subsequent Select or GetID
command is received.
Selection can also take place on tag groups with non-matching Tag ID patterns using the SelectNGroup command. This could be useful for example, to check a storage crate for items which do
not match a certain selection criteria (e.g. color or dispatch destination), so a SelectNGroup
command with the Tag ID mask set to the color black will GroupSelect all non-black items. If no
tag responds with a SOF pattern, then there are no black items present.
Figure 5-1.
Tag State Diagram
PM READY
Power On
(PM or EAS only)
(continuous data
transmission)
ResetToReady or invalid
command (PM or EAS only)
Start Gap
POWER DOWN
Arbitration lost/
TagID eliminated
READY
(ITF mode )
Power On
(ITFMode )
GetID
Anticollision
detection loop
All sucessfull select
commands
ResetToReady
ResetToReady,
Reset Selected
TagID
Identified
Select or
GroupSelect
with matching TagID
or SelectAll
QUIET
SELECTED
Select, GroupSelect
or GetID opcode
Implicit state change
Command initated state transition
Read/Write/Login
18
ATA5558
4681D–RFID–08/08
ATA5558
5.6
Quiet State
The tag goes into the Quiet state from the Selected state when a new selection takes place i.e. a
Select or a GetID command is received. Unlike the READY state, the tag’s Tag ID in this state is
known. Tags in the Quiet state are excluded from subsequent anticollision detection.
5.7
Public Mode (PM) and PM READY State
In the Public Mode, communication commences with a single “Start of Frame” pattern (SOF), followed by a continuous stream of serialized user data which is read cyclically from the user
memory. This starts with block 0, bit 31 and continues sequentially through to bit 0 of the final
block address defined by the configuration parameter MAXBLOCK. After reaching the MAXBLOCK address, data transmission repeats with block 0, bit 31. If, for example MAXBLOCK
were set to 1, block 0 and 1 would be continuously transmitted. This transmission process continues indefinitely until terminated by either switching the field off or on the receipt of a valid
interrogator command.
On the start of a new command the tag will proceed temporarily from the PM READY state into
the (ITF) READY state. If the command is valid, it will be executed and the tag state changes as
if in the ITF mode (see Figure 5-1 on page 18). If the command is invalid, then it will drop back
into the PM READY state and continue to transmit data. To restart the public mode transmission, the tag must be re-initialized by reapplying the field (POR) or by using a ResetToReady
command.
Figure 5-2.
Public Mode Start Up
POR
initialisation
delay
Start of Frame
(SOF)
Continue from
Data Block 0
Data Block
(Maxblock )
Data Block 0
Bit position
31 30 29 28 27 26 25
1
POR
5.8
Check Operating
Mode (= PM)
0
0
1
1
0
0
4
3
2
1
0
31 30 29 28 27 26
1
0
0
1
1
1
0
0
1
1
0
Example data values
Electronic Article Surveillance (EAS)
The EAS Mode is intended for retail article surveillance whereby the device will be physically
attached to retail articles in a store or supermarket. The device will be preprogrammed into an
”unpaid state” before entering the sales area by programming the block 0 to MAXBLOCK of the
user memory to all 0s. For convenience reasons MAXBLOCK should be set to 0 in the configuration word. To increase security, the memory pages containing block 0 to MAXBLOCK should
be assigned a write password security level (see password protection). Once the article has
been purchased at the cash desk, the device is programmed into a “paid state” by writing the
block 0 with all 1 s, using the appropriate password (if necessary). As soon as an “unpaid”
device enters an interrogator field, it will modulate the interrogator field with an RF/2 signal. This
can be detected by the surveillance interrogator and used to trigger an appropriate audio or
visual warning. A “paid” device will remain silent. As in the Public Mode, the device will revert to
ITF mode READY state as soon as it receives a valid interrogator command. By reapplying the
field (POR) or using a ResetToReady command, the device returns to EAS mode.
19
4681D–RFID–08/08
Figure 5-3.
EAS Startup
POR
initialisation
delay
POR
initialisation
delay
"Unpaid" Device
(Block 0 = all '0's)
POR
Check Operating
Mode (= EAS)
"Paid" Device
(Block 0 = all '1's)
POR
Check Operating
Mode (= EAS)
6. Anticollision Protocol
The aim of the anticollision protocol and associated arbitration process is to detect and identify
the Tag ID’s of all tags within the READY state which are present within range of the interrogator
field.
The interrogator masters all communication with single or multiple tags. Tag arbitration communication is initiated by issuing the GetID command. All tags in the READY state will then enter
the anticollision detection loop and synchronously start to transmit an identification response
that represents the tag’s individual unique Tag ID code. Using an iterative bit-wise sorting algorithm on these Tag ID’s, the interrogator is capable of eliminating all but one tag. This remaining
tag is thus selected and can be accessed directly by following commands. Tags eliminated during the detection loop are muted, drop back into the READY state to participate in the next
detection cycle.
A typical anticollision procedure is illustrated in the following scheme:
a) The interrogator starts the anticollision detection by sending a GetID command.
Any previously eliminated and muted tag will be put into the READY state. All tags in the
READY state participate initially in the anticollision detection loop.
If nothing is known of the Tag ID’s within range, then the GetID command includes no further
parameters and the detection group encompasses all tags. After a predefined number of
field clock cycles, all tags within range reply by synchronously transmitting a SOF pattern
followed by their own respective Tag ID(MSB).
Anticollision detection can be reduced to a subgroup of tags by passing a partial Tag ID pattern as Tag ID command parameter. These bits represent the most significant bits of the
Tag ID subgroup. Anticollision detection will then be carried out on this subgroup, continuing
as above with the synchronous reply from all constituent tags, followed by their most significant unknown Tag ID bit(s).
20
ATA5558
4681D–RFID–08/08
ATA5558
b) The interrogator can detect whether any tag is present.
If no SOF pattern is returned then there is no tag present within the detection group so the
process continues with (a).
c) The interrogator checks the tag responses bit-wise within the anticollision loop.
If one or more active tags are within range, the interrogator will sequentially scan the Tag ID
bits from the most significant through to the least significant bits. Each time slot corresponds
to a particular Tag ID bit position. All tags reply simultaneously with dual pattern modulated
data, the response signals being superimposed on one another. A damped signal will thus
overwrite a non-damped signal so that a logical 1 Tag ID bit will prevail over a logical 0 bit.
d) The interrogator checks and eliminates tags.
If the interrogator detects a Tag ID logical 1 bit, it acknowledges reception by broadcasting a
gap in the field signal. This can be monitored and evaluated by all tags within the detection
group. Otherwise a Tag ID logical 0 bit induces no reaction from the interrogator.
On observing an acknowledge gap, any individual tag can, by checking the state of it’s own
current Tag ID bit, deduce whether it should remain in the current anticollision detection loop
(Tag ID bit = 1) or whether it should eliminate itself from the detection group (Tag ID bit = 0).
Eliminated tags will be muted and fall back into the READY state where they take no further
part in the current detection loop. They remain in this state until the next anticollision loop is
started by a new GetID command. Continue to (a)
Non eliminated tags remain in the detection loop and if the final Tag ID bit has not been
reached then the next Tag ID bit is interrogated in (c) otherwise (e).
e) End of a single anticollision loop
By the time the final Tag ID bit has been interrogated, there will be only one remaining active
tag within range – all others having been eliminated during the previous interactions.
Assuming no new tags have entered the interrogation since the start of the anticollision loop
and that all the signals have been correctly interpreted, the interrogator should at this stage
be able to identify the associated Tag ID. This active tag is set automatically into the
Selected state and replies with the anticollision response which consists of an SOF followed
a 16 bit CRC generated from it’s own Tag ID. If the received CRC matches the Tag ID the
interrogator may continue with (a) or (f).
If the received CRC is corrupted or does not match the calculated 16 bit value the interrogator will issue a ResetSelected command to transfer this improperly selected tag back into the
READY state. Continue to (a).
f) The interrogator communicates directly with tag in Selected state.
At this stage the single identified and selected tag can undergo direct communication with
the interrogator and can be read and written with either Read, Write or Login commands.
This tag remains selected until the interrogator starts a new anticollision loop with a new
GetID command, or if other tags are addressed directly using a Select or GroupSelect command. The selected tag then drops into the Quiet state where it is excluded from all future
anticollision detection loops. Continue to (a).
21
4681D–RFID–08/08
Figure 6-1.
Anticollision Loop
Tag
(one of
many
slaves)
Interrogator
(single
master)
Start
Start
READY state
N
Partial TagID
Transmit GetID
command
Y
N
Transmit GetID
command/
parameters
GetID
command?
GetID command
No Tag
Y
Parameters
received?
Mask bit parameters
Y
Select Subgroup
x=N
N
N
SOF?
(Tag present?)
SOF
Transmit
SOF
TagID(x)bit
Transmit
TagID(x)
Y
N
TagID(x)=1?
Y
Gap
Y
N
Gap?
Transmit Gap
(Acknowledge)
N
Selected
TagID(x) = 0
N
TagID(x) = 1?
Selected
TagID(x) = 1
TagID(x) = 0?
Y
Y
x=x+1
(next bit)
x=x+1
(next bit)
N
N
Last TagID bit?
Last TagID bit?
Y
Y
N
Selected CRC
correct?
SOF + CRC
Transmit SOF +
CRC of selected
Tag
Y
Detection Error
22
Selected TagID
found
SELECT state
ATA5558
4681D–RFID–08/08
ATA5558
Figure 6-2.
GetID Command with Partially Known Tag ID
SOC GetID even
00
TIR
Figure 6-3.
00
00
S Gap
A
2
10
10
00
3
10
00
11
Interrogator command GetID (TagIDpart = "A23")
TTag
Subsequent Tag Responses in Anticollision Loop (Two Alternative Tag IDs)
Anticollision response from all tags
Anticollision response
from all tags.
'0'
'0'
2 bit period
SOF
with '1' in current TagID bit position
'1'
2 bit period
(TagID = A233 and/or A232)
2 bit period
SOF
Interrogator acknowledge gap
subsequent TagID bits
Tack
Tag response for TagID's "A232" or "A233"
T Tag
second anticollision cycle (TagB only)
first anticollision cycle (TagA and TagB)
Anticollision response from remaining
TagA (TagID = "A233")
Tag A with '1' in last TagID bit
position (TagID = A233)
'0'
'1'
'1'
‘1'
'0'
'1'
'1'
'0'
'0'
'1'
'0'
'1'
SOF
final TagID
Interrogator acknowledge gap
bit('1')
(TagA->Active)
16 bit CRC (="7D2C" )
Tack
Final Tag response for TagID "A233"+ CRC
Anticollision response from remaining
Tag B with '0' in last TagID position
TagB (TagID = "A232")
(TagID = A232)
T0
final TagID
bit('0')
SOF
'0'
'1'
'1'
'0'
'0'
'1'
Final Bit
(TagB->Active)
16 bit CRC (="6D0D" )
Final Tag response from TagID "A232"+ CRC
23
4681D–RFID–08/08
Table 6-1.
Anti-collision Timing
Parameter
Remark
Tag reaction time
End of start gap to start of tag
command processing
Symbol
Formular
Formular
Example:
Tbit = 32 / fc, dref = 24 × Tc
≥ 0 × Tc
TIR
Tag to Interrogator response End of final command gap to
time
start of Tag SOF
TTag
Anticollision Aknowledge
response time
End of Interrogator acknowledge
gap to start of Tag SOF
Tack
Anticollision final zero bit
response time
Overlap of final zero bit and SOF
T0
d11 max + 65 × Tc
(See Table 3-1 on page 12)
DDR = 1
117 × Tc
DDR = 0
145 × Tc
DDR = 1
134 × Tc
134 × Tc
DDR = 0
138 × Tc
138 × Tc
½ × Tbit
½ × Tbit
16 × Tc
7. Command Set
The first two bits of any interrogator command are called Start Of Command (SOC) and are
always 00. This pulse interval is used for auto calibration purposes. The following series of dual
bit packets define the interrogator command opcodes and the command dependant parameter
information. A command overview is given in Table 7-1 below
Table 7-1.
List of ATA5558 Supported Commands
Command
SOC
Opcode
Number of Parameter bits
Read Single Block
00
01
6 (+ 16 CRC_d)
Read single 32 bit data block and CRC_u
(+ optional downlink CRC_d)
Read Multiple Blocks
00
01
12 (+ 16 CRC_d)
Read multiple data blocks and CRC_u
(+ optional downlink CRC_d)
Write Single Block
00
01
40 (+ 16 CRC_d)
Write a single block
(+ optional downlink CRC_d)
Login Write
00
01 11 01 11 10
32
Login Read
00
01 11 01 10 10
32
GetID
00
00 00
None
Starts a complete new anticollision loop
GetID (Tag ID-part, even)
00
00 00
Length of partial Tag ID
Anticollision loop with partial Tag ID, with
even number of matching Tag ID bits.
GetID (Tag ID-part, odd)
00
00 1
Length of partial Tag ID
Anticollision loop with partial Tag ID, with odd
number of matching Tag ID bits.
Select (Tag ID)
00
00 00
Length of Tag ID
SelectAll
00
10 00
None
Selects all tags in the RF field
SelectGroup
00
10 0[0]n 1
Length of Tag ID mask
Select a specific group of tags
SelectNGroup
00
10 1[0]n 1
Length of Tag ID mask
Select all tags which are NOT members of
the specified group
ResetSelected
00
11 10 00 00
None
Reset selected tag to READY state without
reloading configuration register
ResetToReady
00
11 00 00 00
None
Reset all tags in the RF field to READY state
and reload configuration register from system
memory (block #63)
ArmClear
00
11 00 10 00
6× 0
Arms tag for ClearAll command
ClearAll
00
01 01 11 11
34 × 0 (+ 16 CRC_d)
24
Description
Login for write PWD protected access
Login for read PWD protected access
Puts specified tag into Selected state
Clears memory except traceability data
(with optional constant CRC_d = 96ADh)
ATA5558
4681D–RFID–08/08
ATA5558
Figure 7-1.
Command Format
Command
cmd
Read
multiple
blocks
0
0
0
1
start addr
OK Response
end addr
X X X X X X X X X X X X
CRC_d
Read single
block
0
0
0
1
X X X X X X
SOF
CRC_d
fn (addr)
0
0
0
1
Data
CRC_u
SOF
Error code
dual
pattern
SOF
Error code
dual
pattern
SOF
Error code
dual
pattern
addr
cmd
Write single
block
SOF
fn(start addr,end
addr,(CRC_d),data
fn (start addr,end addr)
cmd
Error Response
addr
Data
CRC_u
fn(addr,data,(CRC_d))
lock
X X X X X X 0
data bits
L 31............0
CRC_d
SOF
fn (addr,lock,data)
cmd
Select
0
0
0
0 0
SOF
TagID
0
cmd
SelectCRC
0
0
0
0
0
CRC_u
None
fn (TagID)
SOF
CRC(TagID)
1
None
cmd
0
0
0
GetID
cmd
0
0
even
0
odd
cmd
None
Anticollision
Response
None
partial_TagID
0 0 0 0 0 0 TagID[msb],TagID[msb-1]..TagID[msb-(n-1)]
GetID
(Even partial TagID)
0 n Length(TagID)
where n : even
Anticollision
Response
partial_TagID
0 0 0 0 1
GetID
(Odd partial TagID)
TagID[msb],TagID[msb-1]...TagID[msb-(n-1)]
Anticollision
Response
None
0 n Length(TagID)-1
where n : odd
Select All
SelectGroup
0
0 1
0
0
m+n: even
0 m+n Length(TagID)
1
0
0
0
0 0 [(0)m 1] TagID(msb-m) ... TagID(msb-m-n)
variable length mask positioning pattern(1)
SelectNGroup
0
m+n: even
0 m+n Length(TagID)
0
1
0
1 [(0)m
variable length mask positioning pattern(1)
SOF
SOF
Error code
dual
pattern
SOF
SOF
Error code
dual
pattern
SOF
SOF
Error code
dual
pattern
variable length (n) TagID Select pattern(2)
1] TagID(msb-m) ... TagID(msb-m-n)
variable length (n) TagID Select pattern(2)
Note:
1. The leftmost position of the TagID select mask is determined by m '0' bits followed by a single '1' bit.
These bit positions can be regarded as don't care bit positions.
Note:
2. The TagID select mask is a variable (n) bits long. It starts immediately after the positioning pattern
and can be terminated as required with the end of the command. All TagID lsb bits not defined are don't care.
25
4681D–RFID–08/08
Figure 7-2.
Command Format (Continued)
Command
cmd Read PWD addr
Login Read
Error Response
Read PWD
0 0 0 1 1 1 0 1 1 0 1 0 PWD(31)...PWD(0)
cmd Write PWD addr
Login Write
OK Response
SOF
SOF
Error code
dual
pattern
SOF
SOF
Error code
dual
pattern
SOF
SOF
Error code
dual
pattern
SOF
SOF
Error code
dual
pattern
Write PWD
0 0 0 1 1 1 0 1 1 1 1 0 PWD(31)...PWD(0)
cmd
ResetToReady
0 0 1 1 0 0 0 0 0 0
cmd
Reset
Selected
0 0 1 1 1 0 0 0 0 0
cmd
ArmClear
0 0 1 1 1 0 1 0 0 0 0 0 0 0 0 0
32 '0'
cmd
data bits
SOF
SOF
Error code
dual
pattern
ClearAll
0 0 0 1 0 1 1 1 1 1 0 0 0 0......0 0 CRC_d
SOF
SOF
Error code
dual
pattern
constant CRC (96ADh)
7.1
Error Response
If a command sequence is in any case invalid, the tag answers immediately with one of the error
codes (see Table 7-2). This is made up of an SOF pattern followed by a 4-bit dual pattern coded
data word.
Table 7-2.
Error Code
26
Error Codes
Description
0111
Command format error – incorrect number of bits
1110
Corrupt command (1 out of 4) encoding
0010
Attempt to write a locked block – write command aborted
0100
Attempt to write a protected block without a login – write command aborted
1000
Login/Write command format error
1101
Incorrect Login password
1011
CRC error in command stream – command aborted
1010
Program 0 verification error – unreliable zero level (degraded data retention)
0110
Program 1 verification error – unreliable one level (degraded data retention)
others
Reserved for future use
ATA5558
4681D–RFID–08/08
ATA5558
7.2
Read Single Block
A Read Single Block command is executed on a tag in the Selected state. It serially reads a
complete 32-bit tag data block. A downlink CRC (CRC_d) can be optionally included. This acts
as a check for the block address. If included, the tag will always check the CRC_d and abort the
command if it not compatible with the received address. If omitted, the tag will perform no downlink CRC check.
The tag responds to a single block read command with the requested 32-bit data block which is
always followed by a 16-bit uplink CRC (CRC_u) to ensure data and address integrity. A read
protected or non-existent memory block will return a block of 1 data bits (FFFF FFFF). A successful execution of a LoginRead command is necessary before reading a protected memory
block.
It should be noted that the 16-bit CRC_u is generated from both the block address parameter
and retrieved data. So that it acts as a check for the complete command transaction. From the
received CRC_u, the interrogator can ensure that the data is correct and that it was read from
the correct requested block address.
Table 7-3.
Command
Parameter 1
CRC (optional)
Read Single Block = 00 01
Block Address
CRC_d (Block Addr)
4 bits
6 bits (MSB first)
16 bits (MSB first)
Table 7-4.
Tag Response
SOF
Data
CRC
Start of Frame
Data Block
CRC_u (Block Addr + [CRC_d(1)] +Data)
3 .. 10-bit periods
32 bits (MSB first)
16 bits (MSB first)
Note:
7.3
Interrogator Command Parameters
1. optional
Read Multiple Blocks
A Read Multiple Blocks command is executed on a tag in the Selected state. It serially reads an
array of consecutive 32-bit tag data blocks from a start address through to and including an end
address. A downlink CRC (CRC_d) can be optionally included. This acts as a check for both
block address parameters. If included the tag will always check the CRC_d and abort the command if it is not compatible with the received addresses. If omitted, the tag will perform no
downlink CRC check.
The tag responds to a read command with the requested 32-bit data blocks which are always
followed by a single 16-bit uplink CRC (CRC_u) to ensure data and address integrity. A read
protected or non-existent memory block will return a block of 1 data bits (FFFF FFFF). A successful execution of a LoginRead command is necessary before reading a memory array
including protected memory blocks.
It should be noted that the 16 bit CRC_u is generated from both the address parameters and
retrieved data so that it acts as a check for the complete command transaction. From the
received CRC_u, the interrogator can ensure that the data is correct and that it was read from
the correct requested block address range.
27
4681D–RFID–08/08
Table 7-5.
Interrogator Command Parameters
Command
Parameter 2
CRC (optional)
Read = 00 01
Start Block Address
End Block Address
CRC_d (Start Block Addr +
End Block Addr)
4 bit
6 bits (MSB first)
6 bits (MSB first)
16 bits (MSB first)
Table 7-6.
7.4
Parameter 1
Tag Response
SOF
Data
CRC
Start of Frame
Multiple Data Blocks
CRC_u (Start Block Addr +
End Block Addr + [CRC_d*] + Data)
3 .. 10-bit period
((EndAddr – StartAddr + 1) × 32) bits
(MSB first)
16 bits (MSB first)
Write Single Block
The Write Single Block command only effects tag(s) which have been previously been put in the
Selected state. It performs the programming of a specific block address with a 32-bit block of
data and associated lock bit. For password protected memory blocks the LoginWrite command
has to be executed first, otherwise the programming will fail and an error code will be returned.
Memory blocks which have a 1 in the lock bit are locked and cannot be written. The command
protocol includes downlink CRC (CRC_d) which is used to check the downlink address and
data. This CRC_d can be mandatory or optional depending on the state of bit 10 of the configuration register. If set to 1, the CRC_d must always be included and correct for the data
programming to take place. If set to 0, the CRC_d is optional i.e. it is only checked if the CRC
data is present.
On receiving the Write command, and if necessary checking the CRC_d, the tag will start the
EEPROM programming sequence. The maximum EEPROM program time per block (including
the lock bit) is 6 ms. This programming cycle includes an automatic read verification phase
which makes sure that the data has been programmed securely thus ensuring satisfactory long
term data retention. To signal the completion of a successful programming cycle, the tag returns
a single SOF pattern.
If for any reason the programming of the data block fails, the tag will generate the corresponding
error code. The error code bits are dual pattern coded (see Figure 3-1 on page 10) and preceded by a SOF pattern. An attempt to write to a locked block address or a downlink CRC error
causes an immediate abort of the programming cycle followed by the transmission of the corresponding error response. In the case of an EEPROM data verification failure, the error response
is returned after the completion of the programming cycle.
Table 7-7.
Command
Parameter 1
Parameter 2
Parameter 3
CRC(1)
Write Single Block
= 00 01
Block Address
0 + Lock bit
Write Data
CRC_d (Block Addr
+ Lock + Data)
4 bits
6 bits (MSB first)
2 bits
32 bits (MSB first)
16 bits (MSB first)
Note:
28
Interrogator Command Parameters
1. The downlink CRC (CRC_d) must be appended if bit 10 of the configuration register = 1, otherwise it is optional.
ATA5558
4681D–RFID–08/08
ATA5558
Table 7-8.
7.5
Tag Response
SOF
Error Flags
Start of Frame
Present on error only
3 .. 10-bit period
4-bit – dual pattern code
LoginRead
The purpose of the LoginRead command is to release the read protection on all read protected
data blocks within the user memory. A tag in the Selected state will respond with a SOF pattern
if the transmitted read password matches the data stored in the tag’s system memory block
36hex (Read PWD). In the case of a non-matching read password the tag will reply with a SOF
pattern followed by an error code. After a successful LoginRead command, all read protected
memory blocks may be read normally. This positive login status remains valid until a new tag is
selected or the tag is reset.
Table 7-9.
Command
Parameter 1
Parameter 2
Parameter 3
LoginRead = 00 01
11 01 10 (36hex)
10
Read Password
4 bits
6 bits (MSB first)
2 bits
32 bit (MSB first)
Table 7-10.
7.6
Interrogator Command Parameters
Tag Response
SOF
Error Flags
Start of Frame
Present on error only
3 .. 10-bit period
4-bit – dual pattern code
LoginWrite
The purpose of the LoginWrite command is to release the write protection on all write protected
data blocks within the user memory. A tag in the Selected state responds with a SOF pattern if
the transmitted write password matches the data stored in the tag’s system memory block 37hex
(Write PWD). In the case of a non-matching write password the tag will reply with an SOF followed by an error code. After a successful LoginWrite command any write protected memory
block may be modified, as long as the addressed memory block is not already locked. The positive login status is valid until a new tag is selected or the tag is reset.
Table 7-11.
Interrogator Command Parameters
Command
Parameter 1
Parameter 2
Parameter 3
LoginWrite = 00 01
11 01 11 (37hex)
10
Write Password
4 bits
6 bits (MSB first)
2 bits
32 bits (MSB first)
Table 7-12.
Tag Response
SOF
Error Flags
Start of Frame
Present on error only
3 .. 10-bit period
4-bit – dual pattern code
29
4681D–RFID–08/08
7.7
ResetSelected
A ResetSelected command will set all currently selected tag(s) back into the ITF mode’s READY
state. The tag(s) answers with a SOF pattern and will be able to participate in future anticollision
sequences.
If either PM or EAS is enabled, this command will not return a selected back into public Mode
Ready State ,i.e., the device will not start to transmit public mode data.
Table 7-13.
Interrogator Command
Command
ResetSelected = 00 11 10 00 00
10 bits
Table 7-14.
Tag Response
SOF
Start of Frame
3 .. 10 bit-period
7.8
ResetToReady
In ITF mode, a ResetToReady command will set all tags within range of the RF field back into
the Ready state. If either PM or EAS is enabled, the ResetToReady will set the tag back into the
PM Ready state where it will start to transmit PM data. All tags will answer with the SOF pattern.
In READY state they can then participate in future anticollision sequences.
The ResetToReady command reloads the configuration register from system memory block #63.
Table 7-15.
Interrogator Command
Command
ResetToReady = 00 11 00 00 00
10 bits
Table 7-16.
Tag response
SOF
Start of Frame
3 .. 10-bit period
7.9
Select
When receiving a Select command, the addressed tag responds with the 16 bit CRC of the Tag
ID and immediately enters the Selected state.
After selection, the interrogator may communicate with the selected tag using any valid Read,
Write or Login commands. If the interrogator sends a new GetID or Select (another tag) command, the currently selected tag enters the Quiet state automatically.
30
ATA5558
4681D–RFID–08/08
ATA5558
Table 7-17.
Interrogator Command Parameters
Command
Parameter
Select = 00 00 00
Tag ID
6 bits
<Length (Tag ID)> bits (MSB first)
Table 7-18.
7.10
Tag Response
SOF
CRC
Start of Frame
CRC_u (Tag ID)
3 .. 10-bit period
16 bits (MSB first)
GetID
When receiving a general GetID command, all tags in the READY state will enter the anticollision loop and take part in the deterministic arbitration sequence All activated tags will reply
synchronously with the same anticollision response. This specific anticollision signature consists
of a SOF pattern followed by subsequent dual pattern coded Tag ID bit(s) as illustrated in Figure
3-1 on page 10 and Figure 6-3 on page 23.
Table 7-19.
Interrogator Command
Command
GetID = 00 00 00
6 bits
Table 7-20.
7.11
Tag Response
SOF
Subsequent Tag ID Bit(s)
Start of Frame
Dual pattern code
3 .. 10-bit period
<n> × 2 bits periods (MSB first)
Get_ID (Partial Tag ID)
Any anticollision loop starts with the interrogator’s GetID command. All tags in the READY state
with a matching partial Tag ID will reply synchronously with their own personal anticollision
response. This consists of an initial SOF pattern followed by the Tag ID bit(s) in dual pattern
coding which continue until the complete Tag ID has been sent or until the tag is eliminated from
the search.
Table 7-21.
Interrogator Command Parameters (Even Number of (n) Known Tag ID Bits)
Command
Parameter
GetID (Tag ID) = 00 00 00
Tag ID [MSB], Tag ID [MSB-1],.......Tag ID[MSB-(n-1)]
6 bits
<n> bits (MSB first); where n = 2, 4, 6, 8....
31
4681D–RFID–08/08
Table 7-22.
Command
Parameter
GetID (Tag ID) = 00 00 1
Tag ID[msb], Tag ID[msb-1],.........Tag ID[MSB-(n-1)]
5 bits
<n> bits (MSB first); where n = 1, 3, 5, 7, ..
Table 7-23.
7.12
Interrogator Command Parameters (Odd Number of (n) Known Tag ID Bits)
Tag Response
SOF
Subsequent Tag ID bit(s)
Start of Frame
Dual pattern code
3 .. 10-bit period
<m – n> × 2 bits periods
SelectAll
When receiving the SelectAll command, all tags in the READY state will enter the Selected state
and answer with the SOF pattern. This allows the rapid global configuration and personalization
of a collection of tags without having to select and program each tag sequentially.
Table 7-24.
Interrogator Command
Command
SelectAll = 00 10 00
6 bits
Table 7-25.
Tag Response
SOF
Start of Frame
3 .. 10-bit period
32
ATA5558
4681D–RFID–08/08
ATA5558
7.13
SelectGroup
When receiving the SelectGroup command, all tags in the READY state with the matching partial Tag ID will enter the Selected state and answer with the SOF pattern. The partial Tag ID can
vary in length. It’s pattern position relative to the Tag ID is set by the first (leftmost) 1 in the command parameter. The preceeding 0 bits act solely as “don’t care” spacer bits. This “mask
header” is not part of the actual partial Tag ID. The mask pattern follows the mask header and is
terminated by the end of command.
Example of SelectGroup Parameters:
Sample Tag ID 6CB9 :
01 10 11 00 10 11 10 01
The above Tag ID would be selected by all the following GroupSelect command parameters:
1) Command Parameter:
Partial Tag ID:
0 00 00 00 10 10 11
XX XX XX X0 10 11 XX XX
2) Command Parameter:
Partial Tag ID:
0 00 00 00 00 01 11 10
XX XX XX XX XX 11 10 XX
3) Command Parameter:
Partial Tag ID:
0 00 00 00 00 00 00 00 11
XX XX XX XX XX XX XX X1
4) Command Parameter:
Partial Tag ID:
1 01 10 11 00
01 10 11 00 XX XX XX
Leading 0 don’t care mask bits + 1 = mask header (not part of Partial Tag ID)
X = don’t care mask bits
Table 7-26.
Interrogator Command Parameters
Command
Parameter 1
Parameter 2
SelectGroup = 00 10 0
Mask header: <m–1> × 0 + 1
Partial Tag ID
5 bits
<m> bits, (m = 1 .. Tag ID length)
<n> bits, (1 .. Tag IDTag ID
length)
Table 7-27.
Tag Response
SOF
Start of Frame
3 .. 10-bit period
33
4681D–RFID–08/08
7.14
SelectNGroup
When receiving the SelectNGroup command, all tags in the READY state which do not match
the partial Tag ID will enter the Selected state and answer with the SOF pattern. The partial Tag
ID can vary length. It’s pattern position relative to the Tag ID is set by the first (leftmost) 1 in the
command parameter. The preceeding 0 bits act solely as ”don’t care” spacer bits. This “mask
header” is not part of the actual partial Tag ID. The mask pattern follows the mask header and is
terminated by the end of command.
Example of SelectNGroup Parameters:
Sample Tag ID 6CB9 :
01 10 11 00 10 11 10 01
The above Tag ID would be selected by all the following GroupNSelect command parameters:
1) Command Parameter:
Partial Tag ID:
0 00 00 00 10 00 11
XX XX XX X0 00 11 XX XX
2) Command Parameter:
Partial Tag ID:
0 00 00 00 00 01 11 11
XX XX XX XX XX 11 11 XX
3) Command Parameter:
Partial Tag ID:
0 00 00 00 00 00 00 00 10
XX XX XX XX XX XX XX X0
4) Command Parameter:
Partial Tag ID:
1 00 10 11 00 10 11 10 01
00 10 11 00 10 11 10 01
Leading 0 don’t care mask bits + 1 = mask header (not part of Partial Tag ID)
X = don’t care mask bits
Table 7-28.
Interrogator Command Parameters
Command
Parameter 1
Parameter 2
SelectGroup = 00 10 1
Mask header: <m–1> × 0 + 1
Matching pattern section of Tag
ID
5 bits
<m> bits; m = 1 .. Tag ID length – 2
<n> bits; n = 2 ..
Table 7-29.
Tag Response
SOF
Start of Frame
3 .. 10-bit period
34
ATA5558
4681D–RFID–08/08
ATA5558
7.15
ArmClear
A selected tag, when receiving the ArmClear command with the Master Key NOT set to 6 will
prepare the device for a subsequent ClearAll command.
If this command is followed by any command other than a ClearAll, it will become disarmed. In
which case the ArmClear must be repeated before a ClearAll can be successfully executed.
Table 7-30.
Interrogator Command
Command
Parameter
ArmClear = 00 11 00 10 00
00 00 00
10 bits
6 bits
Table 7-31.
Tag Response
SOF
Start of Frame
3 .. 10-bit period
7.16
ClearAll
Tags in the Selected state, if previously armed by the ArmClear command will clear all memory
blocks and their lock bits with the exception of the traceability data blocks (see Figure 2-3 on
page 4 in “Memory” section).
The ClearAll command includes an EEPROM programming sequence. The maximum EEPROM
programming time is 6 ms. On completion of a successful clear the tag replies with a single SOF
pattern.
If for any reason the clear operation fails, the tag will generate the corresponding error code. The
error code bits are dual pattern coded (see Figure 3-2 on page 11 and Table 7-2 on page 26)
and are preceded by a SOF pattern. If the constant downlink checksum CRC_d (if appended) is
incorrect, the clear operation is aborted and an error response is returned immediately.
Table 7-32.
Interrogator Command Parameters
Command
Parameter 1
Parameter 2
Parameter 3
CRC (Optional)
ClearAll = 00 01
01 11 11
00
32 × 0 bits
CRC_u = 96ADh
4 bits
6 bits
2 bits
32 bits
16 bits
Table 7-33.
Tag Response
SOF
Error Flags
Start of Frame
Present on error only
3 .. 10-bit period
4-bit – dual pattern code
35
4681D–RFID–08/08
8. Absolute Maximum Ratings
Stresses beyond those listed under “Absolute Maximum Ratings” may cause permanent damage to the device. This is a stress rating
only and functional operation of the device at these or any other conditions beyond those indicated in the operational sections of this
specification is not implied. Exposure to absolute maximum rating conditions for extended periods may affect device reliability.
Parameters
Symbol
Value
Unit
Maximum DC current into Coil 1/Coil 2
Icoil
20
mA
Maximum AC current into Coil 1/Coil 2 f = 125 kHz
Icoil p
20
mA
Power dissipation (dice) (free-air condition, time of application: 1 s)
Ptot
100
mW
Electrostatic discharge maximum to MIL–Standard 883 C method 3015
Vmax
2000
V
Operating ambient temperature range
Tamb
–40 to +85
°C
Storage temperature range (data retention reduced)
Tstg
–40 to +150
°C
9. Electrical Characteristics
Tamb = +25°C; fcoil = 125 kHz; unless otherwise specified
No.
1
2.1
2.2
2.3
3.1
Parameters
Test Conditions
RF frequency range
Tamb = 25°C(3)
(see Figure 9-1 on page 37)
Supply current
(without current consumed
Read – full temperature
by the external LC tank
range
circuit)
Program EEPROM
Coil voltage (AC supply)
Min.
Typ.
Max.
Unit
fRF
100
125
200
kHz
3
5
µA
T
4
7
µA
Q
25
40
µA
Q
Vclamp
V
Q
IDD
Read, Select, Login
command(2)
6
Write/program EEPROM(2)
3.2
4
Start-up time
Vcoil pp = 6V
5
Clamp voltage
10 mA current into
Coil 1/Coil 2
Modulation parameters
Vcoilpp = 6V on test circuit
generator and modulation
ON(4)
6.1
6.2
Symbol
6
tstartup
Vclamp pp
2.5
14
Vclamp/Tamb
–7.5
Vmod pp
4.2
Imod pp
2
Type*
Vclamp
V
Q
3
ms
Q
18
V
T
mV/K
Q
V
T
mA
T
5
*) Type means: T: directly or indirectly tested during production; Q: guaranteed based on initial product qualification data
Notes:
1. EEPROM device performance can be influenced by subsequent customer assembly processes especially if subjected to
high temperatures or mechanical stress conditions. So Atmel confirms these parameters only for devices as they leave the
Atmel production, as sawn wafers on foil or diced wafers in tray, etc.
2. Current into Coil 1/Coil 2 is limited to 10 mA. The damping characteristics are defined by the internally limited supply voltage (= minimum AC coil voltage).
3. IDD measurement setup R = 100 kΩ; VCLK = 3V: EEPROM programmed to 00 ... 000 (erase all); NRZ, public mode.
IDD = (VOUTmax – VCLK)/R
4. Vmod measurement setup: R = 1 kΩ; VCLK = 3 V; setup with modulation enabled (see Figure 9-1 on page 37).
5. The tolerance of the on-chip resonance capacitor is ±12% at 3s over whole production. The capacitor tolerance is
±3% at 3σ on a wafer basis.
36
ATA5558
4681D–RFID–08/08
ATA5558
9. Electrical Characteristics (Continued)
Tamb = +25°C; fcoil = 125 kHz; unless otherwise specified
No.
Parameters
Test Conditions
7
Programming time
8
Endurance
Typ.
Max.
Unit
Type*
From last command gap to
SOF pattern
(36 + 648 internal clocks)
Tprog
5
5.7
6
ms
T
Erase all/Write all (1)
ncycle
100000
Cycles
Q
tretention
10
(1)
Top = 150° C
tretention
96
hrs
T
Top = 250° C(1)
tretention
24
hrs
Q
Mask option(5)
Cr
Top = 55° C
Data retention
9.3
10
Min.
(1)
9.1
9.2
Symbol
Resonance capacitor
20
50
Years
70
80
90
pF
T
185
210
235
pF
T
*) Type means: T: directly or indirectly tested during production; Q: guaranteed based on initial product qualification data
Notes:
1. EEPROM device performance can be influenced by subsequent customer assembly processes especially if subjected to
high temperatures or mechanical stress conditions. So Atmel confirms these parameters only for devices as they leave the
Atmel production, as sawn wafers on foil or diced wafers in tray, etc.
2. Current into Coil 1/Coil 2 is limited to 10 mA. The damping characteristics are defined by the internally limited supply voltage (= minimum AC coil voltage).
3. IDD measurement setup R = 100 kΩ; VCLK = 3V: EEPROM programmed to 00 ... 000 (erase all); NRZ, public mode.
IDD = (VOUTmax – VCLK)/R
4. Vmod measurement setup: R = 1 kΩ; VCLK = 3 V; setup with modulation enabled (see Figure 9-1 on page 37).
5. The tolerance of the on-chip resonance capacitor is ±12% at 3s over whole production. The capacitor tolerance is
±3% at 3σ on a wafer basis.
Figure 9-1.
Measurement Setup for Vmod
R
BAT68
Coil 1
750
+
ATA5558
750
Coil 2
V CLK
Substrate
BAT68
37
4681D–RFID–08/08
10. Ordering Information
ATA5558
ab
- xxx
Package
- DDB
ATA5558
ab
- DDT
6” sawn wafer on blue foil with ring, thickness 150 µm
(approx. 6 mil)
Die in waffle pack, 150 µm (approx. 6 mil), planned
Type
11
Standard pads without on-chip C
-DDT
6” sawn wafer on blue foil with ring, thickness 150 µm
(approx. 6 mil)
6” sawn wafer on blue foil with ring and Goldbumps
25 µm, thickness 150 µm (approx. 6 mil)
Die in waffle pack, 150 µm (approx. 6 mil), planned
Type
12
14
Mega Pads with on-chip 80 pF
Mega Pads with on-chip 210 pF
- DBB
ab
See Figure 10-3 on page 41
- xxx
Package
- DDB
ATA5558
Drawing
See Figure 10-2 on page 40
Drawing
See Figure 10-4 on page 42
See Figure 10-5 on page 43
See Figure 10-6 on page 44
and Figure 10-7 on page 45
- xxx
Package
- PP
- PAE
Plastic transponder
Drawing
See Figure 10-9 on page 47
NOA3 micromodule with 330 pF lead-free, planned
See Figure 10-8 on page 46
Type
15
10.1
Available Order Codes
ATA555811-DDB
ATA555812-DDB
ATA555812-DBB
ATA555814-DDB
ATA555814-DBB
ATA555815-PP
10.2
Engineering Samples
Die-samples are supplied 50 pcs. Each in waffle pack, with standard part number applied.
38
ATA5558
4681D–RFID–08/08
ATA5558
10.3
Delivery Pre-configuration
The ATA5558 is delivered in a pre-programmed state. The traceability blocks (59-61) contain
unique non erasable traceability data as described in section “Traceability Data” on page 5. The
remaining memory contains erasable demonstration data which can be replaced by customer
data after having been cleared using a sequence of Select, ArmClear and ClearAll commands.
the demonstration data represents the following device configuration:
Block 63 contains configuration data representing Public Mode, FDX-B Modulation, a data rate
of RF/32, a Tag ID length of 64 bits, preamble value of 7 and a maximum public mode block
value (Maxblock) of 3.
Blocks 0-3 contain an FDX-B encoded animal ID code in accordance with ISO 11784 representing a National ID code 000123456789 and country code 999.
The Tag ID blocks 56-57 contain a direct copy of the unique traceability data held in blocks
59-60 thus each delivered device will have it’s own 64 bit unique Tag ID code with which anticollision arbitration can be demonstrated.
All other blocks are erased.
10.4
Ordering Examples (Recommended)
ATA555811 - Tested dice on unsawn 6” wafer, thickness 300 µm, no on-chip capacitor, no
damping during POR initialization.
10.5
Package Information
Figure 10-1. 2 Pad Layout for Wire Bonding
Dimensions in µm
70
C1
186
1300
100
1630
C2
ATA5558
72
274
650
186
39
4681D–RFID–08/08
Figure 10-2. 6” Sawn Wafer on Blue Foil with Ring (Type 11, Standard Pads)
40
ATA5558
4681D–RFID–08/08
ATA5558
Figure 10-3. Die in Waffle Pack (Type 11, Standard Pads)
41
4681D–RFID–08/08
Figure 10-4. 6” Sawn Wafer on Blue Foil with Ring (Type 12/14, Mega Pads)
42
ATA5558
4681D–RFID–08/08
ATA5558
Figure 10-5. 6” Sawn Wafer on Blue Foil with Ring and Goldbumps 25 µm (Type 12/14, Mega Pads)
43
4681D–RFID–08/08
Figure 10-6. Die in Waffle Pack (Type 12/14, Mega Pads)
44
ATA5558
4681D–RFID–08/08
ATA5558
Figure 10-7. Die in Waffle Pack and Goldbumps 25 µm (Type 12/14, Mega Pads)
45
4681D–RFID–08/08
Figure 10-8. NOA3 Micromodule
9.5±0.03
4.75+0.02
4.625
1.42±0.05
0.03 A B
1.42±0.05
31.83
25.565
21.815
∅ 2±0.05
Note 1
15.915
12.165
6.265
B
technical drawings
according to DIN
specifications
2.515
0
1.585
A
Dimensions in mm
X
2.375
2.375
0.05 A
0.38-0.035
Note 3
5.15±0.03
Note 2
8-0.02
Note 4
0.03 B
8.1±0.03
Note 2
Note:
1. Reject hole by testing device
2. Punching cutline
recommendation for singulation
3. Total package thickness
exclusive punching burr
4. Module dimension
after electrical disconnection
R1.5±0.03
0.09-0.01
R0.2 max.
0.05 B
4.8±0.05
5.1±0.05
X5:1
R1.1±0.03 (4x)
Drawing-No.: 6.549-5035.01-4
Issue: 1; 28.04.06
Subcontractor: NedCard
Drawing refers to following types: Micromodule NOA-3
46
5.06±0.03
Note 4
ATA5558
4681D–RFID–08/08
ATA5558
Figure 10-9. Plastic Transponder
Package: Transponder
Dimensions in mm
4.4±0.1
3±0.1
1.1±0.1
4.2±0.1
4.9±0.2
11.9±0.1
12.1±0.1
7
˚ ±2˚
7˚ ±2˚
5.7±0.1
7
˚ ±2˚
7
˚ ±2˚
1±0.2 ×45˚
5.9±0.1
technical drawings
according to DIN
specifications
Drawing-No.: 6.549-5030.01-4
Issue: 1; 14.07.97
47
4681D–RFID–08/08
Headquarters
International
Atmel Corporation
2325 Orchard Parkway
San Jose, CA 95131
USA
Tel: 1(408) 441-0311
Fax: 1(408) 487-2600
Atmel Asia
Room 1219
Chinachem Golden Plaza
77 Mody Road Tsimshatsui
East Kowloon
Hong Kong
Tel: (852) 2721-9778
Fax: (852) 2722-1369
Atmel Europe
Le Krebs
8, Rue Jean-Pierre Timbaud
BP 309
78054
Saint-Quentin-en-Yvelines Cedex
France
Tel: (33) 1-30-60-70-00
Fax: (33) 1-30-60-71-11
Atmel Japan
9F, Tonetsu Shinkawa Bldg.
1-24-8 Shinkawa
Chuo-ku, Tokyo 104-0033
Japan
Tel: (81) 3-3523-3551
Fax: (81) 3-3523-7581
Technical Support
rfid@atmel.com
Sales Contact
www.atmel.com/contacts
Product Contact
Web Site
www.atmel.com
Literature Requests
www.atmel.com/literature
Disclaimer: The information in this document is provided in connection with Atmel products. No license, express or implied, by estoppel or otherwise, to any
intellectual property right is granted by this document or in connection with the sale of Atmel products. EXCEPT AS SET FORTH IN ATMEL’S TERMS AND CONDITIONS OF SALE LOCATED ON ATMEL’S WEB SITE, ATMEL ASSUMES NO LIABILITY WHATSOEVER AND DISCLAIMS ANY EXPRESS, IMPLIED OR STATUTORY
WARRANTY RELATING TO ITS PRODUCTS INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR
PURPOSE, OR NON-INFRINGEMENT. IN NO EVENT SHALL ATMEL BE LIABLE FOR ANY DIRECT, INDIRECT, CONSEQUENTIAL, PUNITIVE, SPECIAL OR INCIDENTAL DAMAGES (INCLUDING, WITHOUT LIMITATION, DAMAGES FOR LOSS OF PROFITS, BUSINESS INTERRUPTION, OR LOSS OF INFORMATION) ARISING OUT OF
THE USE OR INABILITY TO USE THIS DOCUMENT, EVEN IF ATMEL HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. Atmel makes no
representations or warranties with respect to the accuracy or completeness of the contents of this document and reserves the right to make changes to specifications
and product descriptions at any time without notice. Atmel does not make any commitment to update the information contained herein. Unless specifically provided
otherwise, Atmel products are not suitable for, and shall not be used in, automotive applications. Atmel’s products are not intended, authorized, or warranted for use
as components in applications intended to support or sustain life.
© 2008 Atmel Corporation. All rights reserved. Atmel ®, logo and combinations thereof, IDIC® and others are registered trademarks or trademarks of Atmel Corporation or its subsidiaries. Other terms and product names may be trademarks of others.
4681D–RFID–08/08