Part Number Hot Search : 
XC25BS5 84NHM BYT53F PA1214 N25F40 76129S 1067659 MAU156
Product Description
Full Text Search
 

To Download SRTAG2K-D Datasheet File

  If you can't view the Datasheet, Please click here to try to view without PDF Reader .  
 
 


  Datasheet File OCR Text:
  this is preliminary information on a new product now in dev elopment or undergoing evaluati on. details are subject to change without notice. february 2014 docid025446 rev 3 1/51 1 SRTAG2K-D nfc forum type 4 tag ic with 2-kbit eeprom and rf session digital output datasheet - preliminary data features contactless interface ? nfc forum type 4 tag ? iso/iec 14443 type a ? 106 kbps data rate ? internal tuning capacitance: 25 pf memory ? 256-byte (2-kbit) eeprom ? support of ndef data structure ? data retention: 200 years ? endurance: 1 million erase-write cycles ? read up to 246 bytes in a single command ? write up to 246 bytes in a single command ? 7 bytes unique identifier (uid) ? 128 bits passwords protection package ? ufdfpn8 ecopack ? 2 digital pad ? rf session output description the SRTAG2K-D device is a dynamic nfc/rfid tag ic. it embeds an eepr om memory. it can be operated from a 13.56 mhz rfid reader or an nfc phone. the rf protocol is compatible with iso/iec 14443 type a and nfc forum type 4 tag. ufdfpn8 (mc) wafer (sb12i) www.st.com
contents SRTAG2K-D 2/51 docid025446 rev 3 contents 1 functional description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 1.1 functional modes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 1.1.1 tag mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 2 signal descriptions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 2.1 antenna coil (ac0, ac1) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 2.2 ground (vss) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 2.3 rf session output . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 2.3.1 session open configuration (rf session field = 0x11) . . . . . . . . . . . . . 10 3 SRTAG2K-D memory management . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 3.1 memory structure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11 3.1.1 file identifier . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 3.1.2 cc file layout . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 3.1.3 ndef file layout . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 3.1.4 system file layout . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 3.2 read and write access rights to the memory . . . . . . . . . . . . . . . . . . . . . . 13 3.2.1 state of the read and write access rights . . . . . . . . . . . . . . . . . . . . . . . 14 3.2.2 changing the read access right to ndef files . . . . . . . . . . . . . . . . . . . . 14 3.2.3 changing the write access right to ndef files . . . . . . . . . . . . . . . . . . . 15 3.3 access right life time . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16 3.4 ndef file passwords . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16 4 communication mechanism . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 4.1 master and slave . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 5 rf command sets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18 5.1 structure of the command sets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 5.2 i-block format . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 5.2.1 c-apdu: payload format of a command . . . . . . . . . . . . . . . . . . . . . . . . 20 5.2.2 r-apdu: payload format of a response . . . . . . . . . . . . . . . . . . . . . . . . 21 5.3 r-block format . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21 5.4 s-block format . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
docid025446 rev 3 3/51 SRTAG2K-D contents 5.5 crc of the rf frame . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23 5.6 nfc forum type 4 tag protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23 5.6.1 commands set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23 5.6.2 status and error codes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24 5.6.3 ndef tag application select command . . . . . . . . . . . . . . . . . . . . . . . . 25 5.6.4 capability container select command . . . . . . . . . . . . . . . . . . . . . . . . . . 25 5.6.5 ndef select command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26 5.6.6 system file select command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27 5.6.7 readbinary command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27 5.6.8 updatebinary command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28 5.7 iso/iec 7816-4 commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30 5.7.1 verify command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30 5.7.2 change reference data command . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31 5.7.3 enable verification requirement command . . . . . . . . . . . . . . . . . . . . . . 32 5.7.4 disable verification requirement command . . . . . . . . . . . . . . . . . . . . . 33 5.8 st proprietary command set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34 5.8.1 extendedreadbinary command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34 5.8.2 enablepermanentstate command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35 5.9 specific rf command set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36 5.9.1 anticollision command set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36 5.9.2 rats command and ats response . . . . . . . . . . . . . . . . . . . . . . . . . . . 36 5.9.3 pps command & response . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37 6 rf device operation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39 6.1 anticollision and device activation command set for the rf interface . . 39 6.2 open an rfsession . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39 6.3 close an rfsession . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39 6.4 applicative command set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39 7 functional procedures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40 7.1 selection of an ndef message . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40 7.2 reading of an ndef message . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40 7.3 reading a locked ndef file . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40 7.4 locking an ndef file . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40 7.5 unlocking an ndef file . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41 7.6 reaching the read-only state for an ndef file . . . . . . . . . . . . . . . . . . . . . 41
contents SRTAG2K-D 4/51 docid025446 rev 3 7.7 changing an ndef password procedure . . . . . . . . . . . . . . . . . . . . . . . . . 41 7.8 changing a file type procedure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41 8 uid: unique identifier . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42 9 maximum rating . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43 10 rf session pad parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45 11 rf electrical parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46 12 package mechanical data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47 12.1 mechanical data for the ufdfpn8 package . . . . . . . . . . . . . . . . . . . . . . 47 13 part numbering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49 14 revision history . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
docid025446 rev 3 5/51 SRTAG2K-D list of tables list of tables table 1. signal names . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 table 2. functional mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 table 3. file identifier . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 table 4. cc file layout for 1 ndef file . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 table 5. ndef file layout . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 table 6. field list. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 table 7. read access right . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14 table 8. write access right . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14 table 9. rf command sets. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18 table 10. i-block format . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 table 11. pcb field of the i-block format . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20 table 12. c-apdu format . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20 table 13. r-apdu format . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21 table 14. r-block format . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21 table 15. r-block detailed format . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22 table 16. s-block format . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22 table 17. s-block detailed format . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23 table 18. command set overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23 table 19. status code of the SRTAG2K-D . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24 table 20. error code of the SRTAG2K-D . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24 table 21. c-apdu of the ndef tag applic ation select command . . . . . . . . . . . . . . . . . . . . . . . . . . 25 table 22. r-apdu of the ndef tag applic ation select command . . . . . . . . . . . . . . . . . . . . . . . . . . 25 table 23. c-apdu of the capability container sele ct command . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26 table 24. r-apdu of the capability container sele ct command . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26 table 25. c-apdu of the ndef select comman d . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26 table 26. r-apdu of the ndef select comman d . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27 table 27. c-apdu of the system file sele ct command. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27 table 28. r-apdu of the system file sele ct command. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27 table 29. c-apdu of the readbinary command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28 table 30. r-apdu of the readbinary command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28 table 31. c-apdu of the updatebinary comma nd . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29 table 32. r-apdu of the updatebinary comma nd . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29 table 33. verify command format. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30 table 34. r-apdu of the verify command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31 table 35. change reference data command format . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31 table 36. r-apdu of the change reference data command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32 table 37. enable verification requirement command format . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32 table 38. r-apdu of the enable verification requirement co mmand. . . . . . . . . . . . . . . . . . . . . . . . 33 table 39. disable verification requirement command format . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33 table 40. r-apdu of the disable verification requirement command . . . . . . . . . . . . . . . . . . . . . . . 34 table 41. c-apdu of the extendedreadbinary command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34 table 42. r-apdu of the extendedreadbinary command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35 table 43. enablepermanentstate command format. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35 table 44. r-apdu table of the enablepermanentstate comman d . . . . . . . . . . . . . . . . . . . . . . . . . . 35 table 45. commands issues by the rf host . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 6 table 46. rats command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36 table 47. conversion from fdsi to fsd . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37 table 48. ats response . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
list of tables SRTAG2K-D 6/51 docid025446 rev 3 table 49. pps command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38 table 50. ascending and descending data rate coding . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38 table 51. pps response . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38 table 52. uid format . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42 table 53. absolute maximum ratings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43 table 54. dc characteristics. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44 table 55. rf session pad timings measurement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45 table 56. default operating conditions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46 table 57. rf characteristics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46 table 58. ufdfpn8 - 8-lead ultra thin fine pitch dual flat package, no lead, package data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48 table 59. ordering information scheme for packaged devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49 table 60. document revision history . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
docid025446 rev 3 7/51 SRTAG2K-D list of figures list of figures figure 1. SRTAG2K-D block diagram . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 figure 2. 8-pin package connections . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 figure 3. session open (rf session field = 0x11) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 figure 4. changing the read access right to an ndef file. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 figure 5. changing the write access right to an ndef file . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 figure 6. ufdfpn8 - 8-lead ultra thin fine pitch dual flat package, no lead, 2x3 mm, package outline. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
functional description SRTAG2K-D 8/51 docid025446 rev 3 1 functional description the SRTAG2K-D device is a dynamic nfc/rfid tag that can be accessed from the rf interface. the rf interface is based on the iso/iec 14443 type a standard. the SRTAG2K-D is compatible with the nfc forum type 4 tag specifications and supports all corresponding commands. figure 1 displays the block diagram of the SRTAG2K-D device. figure 1. SRTAG2K-D block diagram 069 5)lqwhuidfh edvhgrq ,62,(& 7\sh$ vwdqgdug 5)6hvvlrq sxooxsvxsso\ 99 $& $& 5) 6hvvlrq 9 66 3rzhu pdqdjhphqw xqlw h/?????u ? h??uu}?? $qdorj)urqwhqg edvhgrq ,62,(& 7\sh$vwdqgdug ,qwhuqdowxqlqj fdsdflwdqfh 1)&)ruxp 7\sh7dj surwrfro 'ljlwdoxqlw
docid025446 rev 3 9/51 SRTAG2K-D functional description figure 2. 8-pin package connections 1. see package mechanical data section for packa ge dimensions, and how to identify pin 1. 1.1 functional modes the SRTAG2K-D has just one functional mode available (see table 2 ). 1.1.1 tag mode the SRTAG2K-D is supplied by the rf field and can communicate with an rf host (rfid reader or an nfc phone). the user memory can only be accessed by the rf commands. table 1. signal names signal name function direction ac0, ac1 antenna coils - vss ground - rf session interrupt output (1) 1. an external pull-up > 4.7 k ? is required. open drain output 069 1& 1& 5)6hvvlrq $&         $& 1& 1& 9 66 table 2. functional mode mode supply source comments tag mode rf field only the rf interface is connected
signal descriptions SRTAG2K-D 10/51 docid025446 rev 3 2 signal descriptions 2.1 antenna coil (ac0, ac1) these inputs are used to connect the device to an external coil exclusively. it is advised not to connect any other dc or ac path to ac0 or ac1. when correctly tuned, the coil is used to access the device using nfc forum type 4 commands. 2.2 ground (v ss ) v ss , when connected, is the reference for the v cc supply voltage for all pads, even ac0 and ac1. 2.3 rf session output the rf session output pin is an open drain ou tput and must be connected to an external pull-up resistor > 4.7 kohm ( 20 kohm is recommended to save power consumption) 2.3.1 session open configurat ion (rf session field = 0x11) "session open" pad goes to the low state when an rf session is ongoing (see figure 3 ). an rf session is taken when SRTAG2K-D receiv es a valid select application. the session is released after SRTAG2K-D has received a valid deselect command, when the rf field became off. rf session pad is driven low after a delay (1) when the session is open. rf session pad is released after a delay (2) when the session is released. figure 3. session open (rf session field = 0x11) 1. cmdeoftogplow (rf command end of frame to rf session pad low) 2. cmdeoftogphz (rf command end of frame to rf session pad hz) d^????s z&^??]}v z&^??]}v ^??]}v ^??]}vk?v? v?]}oo]?]}v? e&?o? ?o? ~ ~?
docid025446 rev 3 11/51 SRTAG2K-D SRTAG2K-D memory management 3 SRTAG2K-D memory management 3.1 memory structure the SRTAG2K-D supports the ndef tag application as defined in the nfc forum type 4 tag. the SRTAG2K-D is composed of three files: ? one capability container file ? one ndef file ? one system file: this is an st-proprietary file the system file contains some information on the configuration of the SRTAG2K-D device. the cc file gives some information about the SRTAG2K-D itself and the ndef file. the ndef file contains the user data. 3.1.1 file identifier the file identifier is the value used in the select command to select a file. 3.1.2 cc file layout the cc file gives some information about the SRTAG2K-D and the ndef file. this file is a read-only file for the rf host and cannot be modified by issuing a write command. the t field, read access and write access fiel ds can be changed by the rf host by issuing a specific process (refer to section 7: functional procedures ). table 3. file identifier file identifier meaning 0xe101 system file 0xe103 cc file 0x0001 ndef file
SRTAG2K-D memory ma nagement SRTAG2K-D 12/51 docid025446 rev 3 3.1.3 ndef file layout the ndef file contains the ndef message whic h contains the user data. the rf host host can read and write data inside the file. the first two bytes named ndef message length define the size of the ndef message. the ndef message length shall be managed by the application and the SRTAG2K-D device does not check if its value is relevant vs the data written by the rf host. the SRTAG2K-D device uses the ndef message length, e. g. the standard read can be processed only inside the ndef message; otherwise, the srtag2k- d device returns an error code. for more details about the read command, refer to section 5.6.7: readbinary command . table 4. cc file layout for 1 ndef file file offset meaning value comments 0x0000 number of bytes of cc file 0x000f 15 bytes 0x0002 mapping version (1) 1. according to the reader. 0x20 or 0x10 v 2.0 or v 1.0 0x0003 maximum number of bytes that can be read 0x00f6 246 bytes 0x0005 maximum number of bytes t hat can be written 0x00f6 246 bytes 0x0007 ndef file control tlv 0x04 (2) 2. delivery state. t field 0x0008 0x06 l field 0x0009 0x0001 fileid 0x000b 0x0100 maximum ndef file size 0x000d 0x00 (2) read access 0x000e 0x00 (2) write access
docid025446 rev 3 13/51 SRTAG2K-D SRTAG2K-D memory management 3.1.4 system file layout the system file specifies the co nfiguration of the SRTAG2K-D. table 6 lists the different fields. 3.2 read and write access rights to the memory an ndef file can be locked for read or write accesses. it is also protected by a 128-bit password that the host shall present before accessing the ndef file. there are two 128-bit passwords, one for the read access and the other one for the write access. an ndef file can be permanently locked for read or write accesses. thus, the host cannot access the ndef file. table 5. ndef file layout file offset byte 0 byte 1 byte 2 byte 3 0x0000 ndef message length user data user data 0x0004 user data user data user data user data ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... 0x00ff ... ... ... user data table 6. field list file offset field name number of bytes read access write access delivery state (1) 1. the delivery state for all passwords = 0x00000000000000000000000000000000. 0x0000 length system file 2 rf - 0x0012 0x0002 st reserved 1 rf none 0x01 0x0003 st reserved 1 rf none 0x00 0x0004 rf session field 1 rf none 0x11 0x0005 st reserved 1 rf none 0x00 0x0006 st reserved 1 rf none 0x01 0x0007 ndef file number (rfu) 1 rf none 0x00 0x0008 uid 7 rf none 0x02d2 xx xx xx xx xx (2) 2. x values are defined by st to insure uid unicity. 0x000f memory size 2 rf none 0x00ff 0x0011 product code 1 rf none 0xd2
SRTAG2K-D memory ma nagement SRTAG2K-D 14/51 docid025446 rev 3 the read password shall be sent to the SRTAG2K-D device before reading a read-locked ndef file. the write password shall be present on th e SRTAG2K-D device be fore writing a write- locked ndef file. the write pa ssword shall be sent to change the read or write access. the read or write access right is defined for the ndef file. 3.2.1 state of the read and write access rights two bytes in the cc file are used to define the read and write access rights to the ndef file. for more details, refer to section 3.1.2: cc file layout . the state 0xff and 0xfe cannot be changed by using the read or write passwords. 3.2.2 changing the read access right to ndef files the state diagram on figure 4 shows how to change the access right to read an ndef file. table 7. read access right value meaning 0x00 read access without any security 0x80 locked (1) 1. the read password shall be sent before reading in the ndef file. 0xfe read not authorized table 8. write access right value meaning 0x00 write access without any security 0x80 locked (1) 1. the write password shall be sent before writing in the ndef file. 0xff write not authorized
docid025446 rev 3 15/51 SRTAG2K-D SRTAG2K-D memory management figure 4. changing the read access right to an ndef file 1. see the procedure to lock the read access ( section 7.4: locking an ndef file ). 2. see the procedure to unlock the read access ( section 7.5: unlocking an ndef file ). 3. see the procedure to permanently lock the read access ( section 7.6: reaching the read-only state for an ndef file ). 4. proprietary state, not defined by nfc forum type 4 tag. 3.2.3 changing the write access right to ndef files the state diagram on figure 5 shows how to change the write access right to an ndef file. figure 5. changing the write access right to an ndef file 1. see the procedure to lock the write access. 2. see the procedure to unlock the write access. 3. see the procedure to permanently lock the write access ( section 7.6: reaching the read-only state for an ndef file ). 4. proprietary state, not defined by nfc forum type 4 tag. 069 3hupdqhqwo\orfnwkh1'()iloh  [ [ [)) /rfnwkh1'()iloh  8qorfnwkh1'()iloh  069 [ [ [)( /rfnwkh1'()iloh  8qorfnwkh1'()iloh 
SRTAG2K-D memory ma nagement SRTAG2K-D 16/51 docid025446 rev 3 3.3 access right life time the access right life time is validated while the nd ef file is selected or until the end of the rf session. once the read or write access right is granted, the host can send one or more readbinary or updatebinary commands. at the end of a session or when the host selects another file, the read and write access rights are initialized. 3.4 ndef file passwords the ndef file passwords protect the read or write access from an rf interface from/to an ndef file. two ndef file passwords are av ailable for each ndef file: ? read password ? write password the length of a password is 128 bits (16 bytes).
docid025446 rev 3 17/51 SRTAG2K-D communication mechanism 4 communication mechanism this chapter describes the principle of communication between an rf host and the SRTAG2K-D device. 4.1 master and slave the SRTAG2K-D acts as a slave device on the rf channel and therefore waits for a command from the rf host before sending its response. the rf host shall generate the rf field and the rf commands.
rf command sets SRTAG2K-D 18/51 docid025446 rev 3 5 rf command sets this section describes the srta g2k-d command sets that can be issued by the rf host. there are th ree command families: ? the nfc forum type 4 tag command set ? the iso/iec 7816-4 command set ? the proprietary command set the nfc forum type 4 tag command set and the iso/iec 7816-4 command set use the i- block format. for more details about the i-block format, refer to section 5.2: i-block format . two other command formats exist: ? the commands using the r-block format ? the commands using the s-block format for more details about these formats, refer to the corresponding sections: section 5.3: r- block format and section 5.4: s-block format . this section gives a brief description of t he rf host commands. the format of these command sets is the i-block format. table 9 lists the rf command sets. table 9. rf command sets family command set command name class byte instruction code brief description nfc forum type 4 tag ndef tag application select 0x00 0xa4 ndef tag application select cc select 0x00 0xa4 select the cc file ndef select 0x00 0xa4 select the ndef file system select 0x00 0xa4 select the system file readbinary 0x00 0xb0 read data from file updatebinary 0x00 0xd6 write or erase data to a ndef file iso/iec 7816-4 verify 0x00 0x20 checks the right access of a ndef file or sends a password changereferencedata 0x00 0x24 change a read or write password enableverificationrequirement 0x00 0x28 activate the password security disableverificationrequirement 0x00 0x26 disable the password security st proprietary enablepermanentstate 0xa2 0x28 enables the read only or write only security state st proprietary extendedreadbinary 0xa2 0xb0 read data from file
docid025446 rev 3 19/51 SRTAG2K-D rf command sets 5.1 structure of the command sets the exchange of data between the rf host and the SRTAG2K-D uses three kinds of data formats, called blocks: ? i-block: to exchange the command and the response ? r-block: to exchange positive or negative acknowledgement ? s-block: to use either the deselect command or the frame waiting extension (wtx) command or response this section describes the structure of the i-bl ock, r-block and s-block. this format is used for the application command set. 5.2 i-block format the i-block is used to exchange data between the rf host and the SRTAG2K-D. it is composed of three fields. table 10 details the i-block format. table 10. i-block format name sod payload eod pcb did 0 crc length 1 byte 1 byte 1 to 251 bytes 2 bytes pcb field did field (optional) rf host to SRTAG2K-D: c-apdu SRTAG2K-D to rf host: r-apdu 2 crc bytes
rf command sets SRTAG2K-D 20/51 docid025446 rev 3 when the rf host sends a command to the SRTAG2K-D the format of the payload is the c- apdu. when the SRTAG2K-D sends a command to the rf host, the format of the payload is the r- apdu. 5.2.1 c-apdu: payload format of a command the c-apdu format is used by the rf host to send a command to the SRTAG2K-D. table 12 describes its format. table 11. pcb field of the i-block format b7-b6b5b4b3b2b1b0 0b00 0 0 x 0 1 x i-block rfu must be set to 0 did field, if bit is set must be set to 0 must be set to 1 block number table 12. c-apdu format name payload field cla ins p1 p2 lc data le length 1 byte 1 byte 1 byte 1 byte 1 byte lc byte 1 byte class byte 0x00: standard command 0xa2: st command instruction byte param byte 1 param byte 2 number of bytes of the data field data bytes number of bytes to be read in the SRTAG2K-D memory
docid025446 rev 3 21/51 SRTAG2K-D rf command sets 5.2.2 r-apdu: payload format of a response the SRTAG2K-D uses the i-block format to reply to a command which used the i-block format. this format is described in table 13 . 5.3 r-block format the r-block is used to convey positive or negative acknowledgment between the rf host and the SRTAG2K-D. there are two kinds of r-blocks: ? r(ack): the acknowledgement block sent by the rf host or by the SRTAG2K-D ? r( nak ): the non-acknowledgement block sent by the rf host or by the SRTAG2K-D table 13. r-apdu format name payload field data (optional) sw1 sw2 length le byte 1 byte 1 byte data status byte 1 status byte 2 table 14. r-block format pcb crc r(ack) without the did field: 0xa2 or 0xa3 r(ack) with the did field: 0xaa or 0xab r(nak) without the did field: 0xb2 0xb3 r(nak) with the did field: 0xba 0xbb 2 crc bytes
rf command sets SRTAG2K-D 22/51 docid025446 rev 3 5.4 s-block format the s-block is used to exchange control information between a reader and a contactless tag. there are two requests using the s-block format: ? s(des): the deselect command ? s(wtx): the waiting frame extension command or response. a waiting time extension request occurs, in rf or i 2 c, when the operating time needed by m24srxx is greater than 9.6 ms. the wtx field indicates the increase time factor to be used in this command execution (fdttemp = wtx * 9.6 ms). table 15. r-block detailed format b7-b6 b5 b4 b3 b2 b1 b0 0b10 1 x x 0 0 x r-block rfu 0: nak 1: ack 0: did field is not present 1: did field is present must be set to 0 rfu block number table 16. s-block format nfc frame sod eod pcb did payload crc length 1 byte 1 byte 1 to 255 bytes 2 bytes 0xc2: for s(des) when the did field is not present 0xca: for s(des) when the did field is present 0xf2: for s(wtx) when the did field is not present 0xfa: for s(wtx) when the did field is present did field (optional) wtx field (1) 2 crc bytes 1. this field is present when b5-b4 bits are set to 0b11 (s-block is a wtx). see table 17: s-block detailed format .
docid025446 rev 3 23/51 SRTAG2K-D rf command sets note: after receiving the deselect command, the session is released and SRTAG2K-D enters the standby power mode. in response to a rats command, srtag2k- d returns fwi parameter (default frame waiting time used); when sr tag2k-d needs more time fo r a command execution, it requests a frame waiting time extension by re sponding 0xf2 0xwtx (request waiting time = fwi * wtx). if the reader accepts srtag2 k-d request, it acknowledges by sending the command 0xf2 0xwtx. the frame waiting time becomes fwi * wtx for the current command only. 5.5 crc of the rf frame the two crc bytes check the data transmission between the rf host and the SRTAG2K-D. for the rf frame, the crc is computed on all th e data bits in the frame, excluding parity bits, sof and eof, and the crc itself. the crc is as defined in iso/iec 13239. the initial register content shall be 0x6363 and the register content shall not be inverted after calculation. 5.6 nfc forum type 4 tag protocol 5.6.1 commands set SRTAG2K-D command set is built to easily support the nfc forum type 4 tag protocol. table 17. s-block detailed format b7-b6 b5-b4 b3 b2 b1 b0 0b11 x x 0 1 0 s-block 0b00: deselect 0b11: wtx 0: did field is not present 1: did field is present - rfu rfu table 18. command set overview command name brief description ndef tag application select select the ndef tag application capability container select select the capability container (cc) file using the select command ndef select select the ndef file system file select select the system file
rf command sets SRTAG2K-D 24/51 docid025446 rev 3 5.6.2 status and error codes this section lists the status and the error code of the SRTAG2K-D. ---- readbinary read data from a file updatebinary write new data to a file table 18. command set overview (continued) command name brief description table 19. status code of the SRTAG2K-D sw1 sw2 comment value 0x90 0x00 command completed successfully table 20. error code of the SRTAG2K-D sw1 sw2 comment length 1 byte 1 byte value 0x62 0x80 file overflow (le error) value 0x62 0x82 end of file or record reached before reading le bytes value 0x63 0x00 password is required value 0x63 0xcx password is incorrect, x further retries allowed (x can take value 0,1, 2) value 0x65 0x81 unsuccessful updating value 0x67 0x00 wrong length value 0x69 0x81 cmd is incompatible with the file structure value 0x69 0x82 security status not satisfied value 0x69 0x84 reference data not usable value 0x6a 0x80 incorrect parameters le or lc value 0x6a 0x82 file or application not found value 0x6a 0x84 file overflow (lc error) value 0x6a 0x86 incorrect p1 or p2 values value 0x6d 0x00 ins field not supported value 0x6e 0x00 class not supported
docid025446 rev 3 25/51 SRTAG2K-D rf command sets 5.6.3 ndef tag applic ation select command the rf host shall send this command to activate the ndef tag application. to activate the ndef tag application, the rf host sends the select command (see table 21 ) in addition to the sequence define d in the nfc forum digital protocol. table 21 defines the c-apdu of the select command to select the ndef tag application (called ndef tag application select). table 22 defines the r-apdu of the ndef tag application select command. 5.6.4 capability cont ainer select command the rf host uses the capability container se lect procedure to se lect the capability container (cc) file. the cc file is selected when this command re turns "command completed" in the r-apdu. table 23 defines the c-apdu of the se lect command to select the cc file (called capability container select). table 21. c-apdu of the ndef tag application select command name cla ins p1 p2 lc data le value 0x00 0xa4 0x04 0x00 0x07 0xd27600 00850101 0x00 class byte select instruction code p1 field p2 field number of bytes of data application id le field table 22. r-apdu of the ndef tag application select command data sw1 sw2 comment length - 1 byte 1 byte - value - 0x90 0x00 command completed value - 0x6a 0x82 ndef tag application not found value - 0x6d 0x00 class not supported
rf command sets SRTAG2K-D 26/51 docid025446 rev 3 table 24 defines the r-apdu of the cc select command. 5.6.5 ndef select command the rf host uses the ndef select command to select the ndef file. the ndef file is selected when this co mmand returns "command completed" in the r- apdu. table 25 defines the c-apdu of the select comma nd to select the ndef file (called ndef select). table 23. c-apdu of the capability container select command name cla ins p1 p2 lc data le value 0x00 0xa4 0x00 0x0c 0x02 0xe103 - class byte select instruction code p1 field p2 field number of bytes of data cc file id - table 24. r-apdu of the capability container select command data sw1 sw2 comment length - 1 byte 1 byte - value - 0x90 0x00 command completed value - 0x6a 0x82 file or application not found value - 0x6d 0x00 class not supported table 25. c-apdu of the ndef select command name cla ins p1 p2 lc data le value 0x00 0xa4 0x00 0x0c 0x02 0x000x - class byte select instruction code p1 field p2 field number of bytes of data 0x0001: first ndef file -
docid025446 rev 3 27/51 SRTAG2K-D rf command sets table 26 defines the r-apdu of the ndef select command. 5.6.6 system file select command the rf host uses this command to select the system file. the system file is selected when this co mmand returns "command completed" in the r- apdu. table 27 defines the c-apdu of the command to se lect the system file (called system select). table 28 defines the r-apdu of the sy stem file select command. 5.6.7 readbinary command on receiving the readbinary command, the SRTAG2K-D reads the requested memory field and sends back its value in the r-apdu response. table 26. r-apdu of the ndef select command data sw1 sw2 comment length - 1 byte 1 byte - value - 0x90 0x00 command completed value - 0x6a 0x82 file or application not found table 27. c-apdu of the sy stem file select command name cla ins p1 p2 lc data le 0x00 0xa4 0x00 0x0c 0x02 0xe101 - class byte select instruction code p1 field p2 field number of bytes of data system file id - table 28. r-apdu of the system file select command data sw1 sw2 comment length - 1 byte 1 byte - value - 0x90 0x00 command completed value - 0x6a 0x82 capability container not found, no data is returned
rf command sets SRTAG2K-D 28/51 docid025446 rev 3 before sending a readbinary command, a file shall be selected by using a select command. the response of the readbinary command is su ccessful when the data to be read is within the selected file (a) ; in other words, when the sum of p1-p2 and le fields is equal to or lower than the selected file length. table 29 defines the readbinary command. table 30 defines the r-apdu of the readbinary command. 5.6.8 updatebinary command on receiving the updatebinary command, the SRTAG2K-D writes the data field into the selected file and sends back a status in the r- apdu response. if needed, m24sr will request a timing extension (see section 5.4 ). before sending an updatebinary command, a file shall be selected by issuing a select command. table 31 defines the updatebinary command. a. for more details about cc file, refer to section 3.1.2: cc file layout . for more details about ndef file, refer to section 3.1.3: ndef file layout . for more details about system file, refer to section 3.1.4: system file layout . table 29. c-apdu of the readbinary command name cla ins p1 & p2 lc data le 0x00 0xb0 2 bytes - - 1 byte class byte read instruction code offset in the file selected - - number of bytes to read between 0x01 le max(selected file length, 0xf6) table 30. r-apdu of the readbinary command data sw1 sw2 comment length - 1 byte 1 byte - value content read 0x90 0x00 command completed value - 0x67 0x00 wrong length value - 0x69 0x82 security status not satisfied value - 0x6a 0x82 file or application not found value - 0x6e 0x00 class not supported
docid025446 rev 3 29/51 SRTAG2K-D rf command sets table 32 defines the r-apdu of the updatebinary command. note: for further return code s and definitions, refer to status and error codes . table 31. c-apdu of the updatebinary command name cla ins p1 & p2 lc data le 0x00 0xd6 2 bytes 1 byte lc bytes - class byte write instruction code offset in the file selected number of bytes of data (0x01 lc 0xf6) data to write in the SRTAG2K-D memory - table 32. r-apdu of the updatebinary command data sw1 sw2 comment length - 1 byte 1 byte - value - 0x90 0x00 command completed value - 0x65 0x81 unsuccessful updating value - 0x67 0x00 wrong length value - 0x69 0x82 security status not satisfied value - 0x6a 0x82 file or application not found value - 0x6e 0x00 class not supported
rf command sets SRTAG2K-D 30/51 docid025446 rev 3 5.7 iso/iec 7816-4 commands the iso/iec 7816-4 command set offers some ext ended features such as the protection of the ndef file. this command set is used to ma nage the right access of the ndef file. 5.7.1 verify command the verify command has two functions: 1. check if a password is required to access to the ndef file (the lc field = 0x00). 2. check that the password embedded in the verify command allows the access to the memory (the lc field = 0x10 and the password is present). when the lc field if equal to 0x00, the verify command returns a success code (0x90 00) provided that the access to the ndef file does not require a password. when the access to the ndef file is protected, the response to the verify command returns an error code (0x63 00). when the lc field equals 0x10, on receiving the verify command, the SRTAG2K-D compares the requested password with the data contained in the request and reports whether the operation has been successful in the response. before sending this command, an ndef file shall be selected by issuing the ndef select command. thus, this command checks the righ t access condition of the last ndef file selected. after a successful command, an access is granted for the whole ndef file. table 33 defines the verify command. table 33. verify command format name cla ins p1 & p2 lc data le 0x00 0x20 2 bytes 1 byte lc bytes - class byte instruction code password identification 0x0001: read ndef password transmit 0x0002: write ndef password transmit other: rfu 0x00: the password is not present 0x10: the password is present in the data field password -
docid025446 rev 3 31/51 SRTAG2K-D rf command sets table 34 defines the r-apdu of the verify command. 5.7.2 change reference data command the change reference data command replaces the read or write password related to the ndef files previously selected. it can be perform ed only if the security status satisfies the security attributes for this command. before sending this command, the verify command with the correct ndef write password shall be issued. thus, this command changes the reference data of the ndef file. table 35 defines the change reference data command. table 35. change reference data command format table 36 defines the r-apdu of the change reference data command. table 34. r-apdu of the verify command data sw1 sw2 comment length - 1 byte 1 byte - value - 0x90 0x00 command completed, the password is correct value - 0x69 0x85 the conditions of use are not satisfied (e.g. no ndef file was selected) value - 0x69 0x81 cmd incompatib le with file structure value - 0x69 0x82 security status not satisfied value - 0x6a 0x80 incorrect para meter in cmd data field value - 0x63 0x00 a password is required value - 0x63 0xcx (1) 1. at each session, the rf host can check a password 3 times. the password transmitted is incorrect and x encodes the number of further allowed retries. value - 0x6e 0x00 class not supported name cla ins p1 & p2 lc data le 0x00 0x24 2 bytes 1 byte lc bytes - class byte instruction code password identification 0x0001: read password transmit 0x0002: write password transmit other: rfu 0x10: the password is present in the data field ndef file password -
rf command sets SRTAG2K-D 32/51 docid025446 rev 3 5.7.3 enable verification requirement command the enable verification requirement command activates the protection by password of the ndef file. when this command is successful, the read or write access to the ndef file is protected by a 128-bit password. it can be performed only if the security status satisfies the security attributes for this command. this command can update the right access of the ndef file by writing into the eeprom. in this case, the re sponse timing will be around 5 ms. before sending this command, the verify command with the correct ndef write password shall be issued. thus, this command chan ges the access right of the ndef file. table 37 defines the enable verification requirement command. the last five bits identify the pa ssword sent in the verify command. table 38 defines the r-apdu of the enable verification requirement command. table 36. r-apdu of the chan ge reference data command data sw1 sw2 comment length 0 1 byte 1 byte - value - 0x90 0x00 command completed, the access right has been changed value - 0x69 0x81 cmd is incompatible with the file structure value - 0x65 0x81 unsuccessful updating value - 0x69 0x82 security status not satisfied value - 0x6a 0x80 cc file or system file selected value - 0x6a 0x82 file or application not found value - 0x6a 0x86 incorrect p1 or p2 values value - 0x6e 0x00 class not supported table 37. enable verificati on requirement command format name cla ins p1 & p2 lc data le 0x00 0x28 2 bytes - - - class byte instruction code new security attributes 0x0001: enable the read prot ection of the ndef file 0x0002: enable the write protection of the ndef file other: rfu - - -
docid025446 rev 3 33/51 SRTAG2K-D rf command sets 5.7.4 disable verification requirement command the disable requirement command deactivates the protection by password of the ndef file. when this command is succe ssful, the read or write access to the ndef file is granted without security requirements. it can be performed only if the security status satisfies the security attributes for this command. before sending this command, the verify command with the correct ndef write password shall be issued. thus, this command chan ges the access right of the ndef file. this command can update the right access of the ndef file by writing into the eeprom. in this case, the re sponse timing will be around 6 ms. table 39 defines the disable verification requirement command. table 40 defines the r-apdu of the disable verification requirement command. table 38. r-apdu of the enable verification requirement command data sw1 sw2 comment length 0 1 byte 1 byte - value - 0x90 0x00 command completed, the password is correct value - 0x69 0x81 cmd is incompat ible with the file structure value - 0x69 0x82 security status not satisfied value - 0x6a 0x80 cc file or system file selected value - 0x6a 0x82 file or application not found value - 0x6a 0x86 incorrect p1 or p2 values table 39. disable verificati on requirement command format name cla ins p1 & p2 lc data le 0x00 0x26 2 bytes - - - class byte instruction code new security attributes 0x0001: disable the read prot ection of the ndef file 0x0002: disable the write protection of the ndef file other: rfu - - -
rf command sets SRTAG2K-D 34/51 docid025446 rev 3 5.8 st proprietary command set the rf host can be issued with the command set described in this chapter. 5.8.1 extendedreadbinary command on receiving the extendedreadbinary command, the SRTAG2K-D reads the requested memory field and sends back its value in the r-apdu response. before sending an extendedreadbinary command, a file shall be selected by issuing an ndef select command. the response of the extendedreadbinary comm and will be successful even if the data to be read is beyond the ndef message. the command returns an error code if the data to be read goes beyond the end of the file. table 42 defines the r-apdu of the read binary command. table 40. r-apdu of the disable verification requirement command data sw1 sw2 comment length 0 1 byte 1 byte - value - 0x90 0x00 command completed, the password is correct value - 0x69 0x81 cmd is incompatible with the file structure value - 0x69 0x82 security status not satisfied value - 0x6a 0x80 cc file or system file selected value - 0x6a 0x82 file or application not found value - 0x6a 0x86 incorrect p1 or p2 values value - 0x6e 0x00 class not supported value - 0x65 0x81 update failed table 41. c-apdu of the extendedreadbinary command name cla ins p1 & p2 lc data le length 0xa2 0xb0 2 bytes - - 1 byte st class byte read instruction code offset in the file selected - - - number of bytes to read between 0x01 le 0xf6
docid025446 rev 3 35/51 SRTAG2K-D rf command sets 5.8.2 enablepermanentstate command the command configures the ndef file to the readonly or to the writeonly state. this command can update the right access to the ndef file by writing into the eeprom. in this case, the re sponse timing will be around 6 ms. table 43 defines the enablepermanentstate requirement command. table 44 defines the r-apdu of the enablepermanentstate command. table 42. r-apdu of the extendedreadbinary command data sw1 sw2 comment length le bytes 1 byte 1 byte - value content read 0x90 0x00 command completed value - 0x67 0x00 wrong length value - 0x69 0x82 security status not satisfied value - 0x6a 0x82 file or application not found value - 0x6a 0x86 incorrect p1 or p2 values value - 0x6e 0x00 class not supported table 43. enablepermanentstate command format name cla ins p1 & p2 lc data le length 0xa2 0x28 2 bytes - - - class byte instruction code new security attributes 0x0001: enable the read prot ection of the ndef file 0x0002: enable the write protection of the ndef file other: rfu - - - - table 44. r-apdu table of the enablepermanentstate command data sw1 sw2 comment length - 1 byte 1 byte - value - 0x90 0x00 command completed value - 0x65 0x81 update failed value - 0x67 0x00 wrong length
rf command sets SRTAG2K-D 36/51 docid025446 rev 3 5.9 specific rf command set this section describes the command set that can be issued only by the rf host. 5.9.1 anticollision command set table 45 lists the commands that can be issued on ly by the rf host. the format of these commands is described in the nfc fo rum digital protocol specification. 5.9.2 rats comma nd and ats response rats command and ats response are used for nfc forum type 4a tag platform device activation (as defined in nfc foru m digital protocol specification). table 46 details the rats command. this command shall be se nt after the anticollision process. value - 0x69 0x82 security status not satisfied value - 0x6a 0x80 cc file or system file selected value - 0x6a 0x82 file or application not found value - 0x6a 0x86 incorrect p1 or p2 values value - 0x6e 0x00 class not supported table 44. r-apdu table of the enablepermanentstate command (continued) data sw1 sw2 comment table 45. commands issues by the rf host family command set comma nd name instruction code nfc-a technology all_req 0x52 (1) 1. code on 7 bits. sens_req 0x26 (1) sdd_req 0x93 or 0x95 or 0x97 sel_req 0x93 or 0x95 or 0x97 slp_req 0x50 table 46. rats command name ins param crc byte field 0xe0 1 byte 2 bytes bit field b7-b4 b3-b0 instruction code fsdi did (0 did 14) 2 crc bytes
docid025446 rev 3 37/51 SRTAG2K-D rf command sets the fsdi field codes the fsd that defines the maximum size that an rf host is able to receive. table 47 gives the conversion from fdsi to fsd. the did field defines the value of the addressed SRTAG2K-D. the fsci codes the fsc which stands for the maximum frame size that the SRTAG2K-D is able to receive. the SRTAG2K-D is able to re ceive up to 256 bytes of command. if the rf host sends a command with more than 256 bytes, the sr tag2k-d will not be able to treat the command and will not reply. the fwi which stands for the frame waiting time integer codes the fwt. this time corresponds to the maximum duration while an rf host shall send before sending the next command. the sfgi which stands for the start-up fram e guard time is the minimum time that the reader shall wait after receiving the response of the SRTAG2K-D. 5.9.3 pps comm and & response pps (protocol and parameter se lection) command a nd response are defined in iso/iec 14443-4, in the protocol activation of picc type a. the pps command allows to change the data ra tes of the ascending (rf host to srtag2k- d) and descending (SRTAG2K-D to rf host) data rates. table 47. conversion from fdsi to fsd fsdi 0x0 0x1 0x2 0x3 0x4 0x5 0x6 0x7 0x8 0x9h- 0xe 0xf fsd 16 24 32 40 48 64 96 128 256 rfu 256 table 48. ats response name tl t0 ta(1) tb(1) tc(1) crc byte field 0x05 0x78 1 byte 1 byte 0x02 2 bytes bit field b8-b5 b4-b1 length of the ats response fsci = 256 bytes the maximum ascending data rate is 106 kbps the maximum descending data rate is 106 kbps fwi field (9.6 ms when tb = 0x50) sfgi field (302 s when tb = 0x50) the did is supported 2 crc bytes
rf command sets SRTAG2K-D 38/51 docid025446 rev 3 the ascending and descending data rates shall be coded as described in table 50 . when the SRTAG2K-D is able to change both da ta rates, it returns the following response. the data rate of this response is 106 kbps; then, the SRTAG2K-D changes the ascending and descending data rates. table 51 gives the details sof the pps response. table 49. pps command - name ins pps0 pps1 crc byte field 0xdx 0x11 1 byte 2 bytes bit field b7-b4 b3-b0 0b0000 b3-b2 b1-b0 ins instruction code did pps1 is present pps1 rfu descending data rate ascending data rate 2 crc bytes table 50. ascending and descending data rate coding value 0b00 0b01 0b10 0b11 data rate 106 kbps rfu rfu rfu table 51. pps response name ins - pps0 byte field 0xdx - 0x11 bit field b8-b5 b4-b1 response code did field 2 crc bytes
docid025446 rev 3 39/51 SRTAG2K-D rf device operation 6 rf device operation 6.1 anticollision and device acti vation command set for the rf interface the SRTAG2K-D device supports the command set defined in the nfc-a technology and the type 4a tag platform chapters of th e nfc digital protocol v1.0 specification. 6.2 open an rfsession once the rf host has terminated the ant icollision procedure and re trieve the at s response, it shall send the selectapplication command . the SRTAG2K-D will open an rf session. at this point, the rf host can send the applicative command set. 6.3 close an rfsession the rf host can close the rf session by issuing one of these methods: ? send an s(des) command ? turn off the rf field 6.4 applicative command set the applicative command set is composed of the following command sets: ? the nfc forum type 4 tag command set ? the iso/iec 7816-4 command set ? the proprietary command set
functional procedures SRTAG2K-D 40/51 docid025446 rev 3 7 functional procedures this section describes some procedure to access the memory or manage its protection. 7.1 selection of an ndef message the rf host shall use this procedure to dete ct the ndef message inside an SRTAG2K-D. the ndef detection procedure is as follows: 1. open an rf session 2. send the selectnd eftagapplication command 3. select the cc file 4. read the cc file 5. select the ndef file. 7.2 reading of an ndef message the rf host executes the ndef re ad procedure to read the ndef file. 1. detect successfully t he ndef file using the ndef detection procedure 2. check that the read access without any security is gr anted for the ndef file from the information provided by the cc file 3. select the ndef file 4. read the ndef file. 7.3 reading a locked ndef file the rf host executes this procedure to read an ndef file which has been locked previously. 1. select the ndef tag application 2. select the ndef file 3. verify the read password by using the verify command 4. read the data in the ndef file. 7.4 locking an ndef file the rf host executes this procedure to protect an ndef file. 1. select the ndef tag application 2. check the right access provided by the cc file 3. select the ndef file 4. transmit the ndef file write password by using the verify command 5. lock the ndef file by sending the enable verification command.
docid025446 rev 3 41/51 SRTAG2K-D functional procedures 7.5 unlocking an ndef file the rf host executes this procedure to read an ndef file which has been locked previously. 1. select the ndef tag application 2. select the ndef file 3. verify the ndef file write password by using the verify command 4. unlock the ndef file by sending the disable verification command. 7.6 reaching the read-onl y state for an ndef file the rf host executes this procedure to read an ndef file which has been locked previously. 1. select the ndef tag application 2. select the ndef file 3. transmit the ndef file write password by using the verify command 4. send an enablepermanentstate command as the write access right of the previous select ndef file. 7.7 changing an ndef password procedure the rf host could use this procedure to ch ange one ndef password. it can be a read or write password. 1. select the ndef tag application 2. select the ndef file 3. transmit the ndef file write password by using the verify command 4. change the password by sending a changereferencedata command. 7.8 changing a file type procedure the rf host executes this procedure to change the file type of a file for which all access rights were previously granted. 1. select the ndef tag application 2. select the file to be modified 3. set the file length to 0x00 using the updatebinary command 4. send an updatefiletype command with the new file type as data.
uid: unique identifier SRTAG2K-D 42/51 docid025446 rev 3 8 uid: unique identifier the SRTAG2K-D is uniquely identified by a 7 by tes unique identifier (uid). the uid is a read-only code and comprises: ? the ic manufacturer code on 1 byte (0x02 for stmicroelectronics). ? the product code on 1 byte. ? a device number on 5 bytes. table 52 describes the uid format. table 52. uid format 0x02 0xd2 5 bytes ic manufacturer code SRTAG2K-D product code device number
docid025446 rev 3 43/51 SRTAG2K-D maximum rating 9 maximum rating stressing the device ab ove the rating listed in table 53 may cause permanent damage to the device. these are stress ratings only and operation of the device at these or any other conditions above those indicated in the operating sections of this specif ication is not implied. exposure to absolute maximum rating conditions for extended periods may affect the device reliability. table 53. absolute maximum ratings symbol parameter min. max. unit t a ambient operating temperature -40 85 c t stg , h stg , t stg storage conditions sawn wafer on uv tape 15 25 c 6 (1) 1. counted from st shipment date. months kept in its original packing form t stg storage temperature ufdfpn8 ?65 150 c t stg storage temperature sawn bumped wafer (kept in its antistatic bag) 15 25 c storage time 6 months t lead lead temperature during soldering ufdfpn8 see note (2) 2. compliant with jedec std j-std-020d (for small body, sn-pb or pb assembly), the st ecopack ? 7191395 specification, and the european directive on restrictions on hazardous substances (rohs directive 2011/65/eu, july 2011). c rfsession rf session pad output range -0.50 6.5 v i cc (3) 3. based on characterization, not tested in producti on. maximum absorbed power = 100 mw @ 7.5 a/m rf supply current ac0 - ac1 - 100 ma v max_1 (3) rf input voltage amplitude between ac0 and ac1, gnd pad left floating vac0-vac1 - 10 v v max_2 (3) ac voltage between ac0 and gnd, or ac1 and gnd vac0-gnd or vac1-gnd -0.5 4.5 v v esd electrostatic discharge voltage (human body model) (4) 4. aec-q100-002 (compliant with jedec std jesd22-a114a, c1 = 100 pf, r1 = 1500 , r2 = 500 ) ac0-ac1 - 1000 v v esd electrostatic discharge voltage (human body model) (4) rf session - 3500 v
maximum rating SRTAG2K-D 44/51 docid025446 rev 3 table 54. dc characteristics symbol parameter test condition min. max. unit v ol output low voltage (rf session pad) i ol = 1 ma, v cc = 2.7 to 5.5 v - 0.4 v
docid025446 rev 3 45/51 SRTAG2K-D rf session pad parameters 10 rf session pad parameters this section lists the timing of the rf se ssion pad according to its configuration. table 55. rf session pad timings measurement (1) rf session pad i/f condition command symbol typ. unit session open 0x11 rf rf session pad low when session active ndef select cmdeoftogplow 170 s rf rf session pad return hz deselect cmdeoftogphz 370 s 1. characterized only.
rf electrical pa rameters SRTAG2K-D 46/51 docid025446 rev 3 11 rf electrical parameters this section summarizes the operating and measurement conditions, and the dc and ac characteristics of the device in rf mode. the parameters in the dc and ac characterist ics tables that follow are derived from tests performed under the measurement conditi ons summarized in the relevant tables. designers should check that the operating cond itions in their circuit match the measurement conditions when relying on the quoted parameters. table 56. default operating conditions symbol parameter min. max. unit t a ambient operating temperature ?40 85 c table 57. rf characteristics (1) symbol parameter condi tion min typ max unit f c external rf signal freq uency 13.553 13.56 13.567 mhz h_iso operating field according to iso t a = 0 c to 50 c 1500 - 7500 ma/m h_extended operating field in extended temperature range t a = -40 c to 85 c 500 - 7500 ma/m mi carrier 100% carrier modulation index mi=(a-b)/(a+b) 90 - 100 % t 1 pause a length - 28/f c - 40.5/f c s t 2 pause a low time - 7/f c -t1s t 3 pause a rise time - 1.5xt4 - 16/f c s t 4 pause a rise time section - 0 - 6/f c s t min cd minimum time from carrier generation to first data from h-field min - - 5 ms w t rf write time (including internal verify) for one page --6-ms c tun internal tuning capacitor in so8 (2) f c = 13.56 mhz 22.5 25 27.5 pf t rf_off rf off time chip reset - - 5 ms 1. all timing characterizations were performed on a re ference antenna with the following characteristics: external size: 75 mm x 48 mm number of turns: 6 width of conductor: 0.6 mm space between two conductors: 0.6 mm value of the tuning capacitor in so8: 25 pf (SRTAG2K-D) value of the coil: 5 h tuning frequency: 14.2 mhz. 2. characterized only, at room temperature only, measured at vac0-vac1 = 2 v peak to peak at 13.56 mhz.
docid025446 rev 3 47/51 SRTAG2K-D package mechanical data 12 package mechanical data in order to meet environmental requirements, st offers these devices in different grades of ecopack ? packages, depending on their level of environmental compliance. ecopack ? specifications, grade definitions and prod uct status are available at: www.st.com. ecopack ? is an st trademark. 12.1 mechanical data for the ufdfpn8 package figure 6. ufdfpn8 - 8-lead ultra thin fine pitch dual flat package, no lead, 2x3 mm, package outline 1. drawing is not to scale. 2. the central pad (area e2 by d2 in the above illustration) is internally pulled to v ss . it must not be connected to any other voltage or signal line on the pcb, for example during the soldering process.   tzds?    >   ? > ? >? w]v < d
package mechanical data SRTAG2K-D 48/51 docid025446 rev 3 table 58. ufdfpn8 - 8-lead ultra thin fine pitch dual flat package, no lead, package data symbol millimeters inches (1) 1. values in inches are converted from mm and rounded to 4 decimal digits. typ min max typ min max a 0.550 0.450 0.600 0.0217 0.0177 0.0236 a1 0.020 0.000 0.050 0.0008 0.0000 0.0020 b 0.250 0.200 0.300 0.0098 0.0079 0.0118 d 2.000 1.900 2.100 0.0787 0.0748 0.0827 d2 (rev mc) - 1.200 1.600 - 0.0472 0.0630 e 3.000 2.900 3.100 0.1181 0.1142 0.1220 e2 (rev mc) - 1.200 1.600 - 0.0472 0.0630 e 0.500 - - 0.0197 - - k (rev mc) - 0.300 - - 0.0118 - l - 0.300 0.500 - 0.0118 0.0197 l1 - - 0.150 - - 0.0059 l3 - 0.300 - - 0.0118 - eee (2) 2. applied for exposed die paddle and terminals. exclude embedded part of exposed die paddle from measuring. - 0.080 - - 0.0031 -
docid025446 rev 3 49/51 SRTAG2K-D part numbering 13 part numbering table 59. ordering information scheme for packaged devices example: srtag 2k -d mc 6 t /2 device type srtag = short range tag memory size 2k = memory size in kbits device feature d = digital output package mc = ufdfpn8 sb12i = 120 m 15 m bumped and sawn inkless wafer on 8-inch frame device grade 6 = industrial: device tested with standard test flow over ?40 to 85 c (no parameter for sb12i) option t = tape and reel packing (no parameter for sb12i) capacitance /2 = 25 pf
revision history SRTAG2K-D 50/51 docid025446 rev 3 14 revision history table 60. document revision history date revision changes 31-oct-2013 1 initial release. 07-nov-2013 2 placed table 4: cc file layout for 1 ndef file in section 3.1.2: cc file layout . 24-feb-2014 3 edited the third paragraph of section 5.8.1: extendedreadbinary command . added section 7.8: changing a file type procedure . removed v esd (machine model) row from table 53: absolute maximum ratings . fixed a typo in figure 6: ufdfpn8 - 8-lead ultra thin fine pitch dual flat package, no lead, 2x3 mm, package outline title: ufdpfn8 changed into ufdfpn8. added table 54: dc characteristics .
docid025446 rev 3 51/51 SRTAG2K-D please read carefully: information in this document is provided solely in connection with st products. stmicroelectronics nv and its subsidiaries (?st ?) reserve the right to make changes, corrections, modifications or improvements, to this document, and the products and services described he rein at any time, without notice. all st products are sold pursuant to st?s terms and conditions of sale. purchasers are solely responsible for the choice, selection and use of the st products and services described herein, and st as sumes no liability whatsoever relating to the choice, selection or use of the st products and services described herein. no license, express or implied, by estoppel or otherwise, to any intellectual property rights is granted under this document. i f any part of this document refers to any third party products or services it shall not be deemed a license grant by st for the use of such third party products or services, or any intellectual property contained therein or considered as a warranty covering the use in any manner whatsoev er of such third party products or services or any intellectual property contained therein. unless otherwise set forth in st?s terms and conditions of sale st disclaims any express or implied warranty with respect to the use and/or sale of st products including without limitation implied warranties of merchantability, fitness for a particul ar purpose (and their equivalents under the laws of any jurisdiction), or infringement of any patent, copyright or other intellectual property right. st products are not designed or authorized for use in: (a) safety critical applications such as life supporting, active implanted devices or systems with product functional safety requirements; (b) aeronautic applications; (c) automotive applications or environments, and/or (d) aerospace applications or environments. where st products are not designed for such use, the purchaser shall use products at purchaser?s sole risk, even if st has been informed in writing of such usage, unless a product is expressly designated by st as being intended for ? automotive, automotive safe ty or medical? industry domains according to st product design specifications. products formally escc, qml or jan qualified are deemed suitable for use in aerospace by the corresponding governmental agency. resale of st products with provisions different from the statements and/or technical features set forth in this document shall immediately void any warranty granted by st for the st product or service described herein and shall not create or extend in any manner whatsoev er, any liability of st. st and the st logo are trademarks or registered trademarks of st in various countries. information in this document supersedes and replaces all information previously supplied. the st logo is a registered trademark of stmicroelectronics. all other names are the property of their respective owners. ? 2014 stmicroelectronics - all rights reserved stmicroelectronics group of companies australia - belgium - brazil - canada - china - czech republic - finland - france - germany - hong kong - india - israel - ital y - japan - malaysia - malta - morocco - philippines - singapore - spain - sweden - switzerland - united kingdom - united states of america www.st.com


▲Up To Search▲   

 
Price & Availability of SRTAG2K-D

All Rights Reserved © IC-ON-LINE 2003 - 2022  

[Add Bookmark] [Contact Us] [Link exchange] [Privacy policy]
Mirror Sites :  [www.datasheet.hk]   [www.maxim4u.com]  [www.ic-on-line.cn] [www.ic-on-line.com] [www.ic-on-line.net] [www.alldatasheet.com.cn] [www.gdcy.com]  [www.gdcy.net]


 . . . . .
  We use cookies to deliver the best possible web experience and assist with our advertising efforts. By continuing to use this site, you consent to the use of cookies. For more information on cookies, please take a look at our Privacy Policy. X