0
登录后你可以
  • 下载海量资料
  • 学习在线课程
  • 观看技术视频
  • 写文章/发帖/加入社区
创作中心
发布
  • 发文章

  • 发资料

  • 发帖

  • 提问

  • 发视频

创作活动
DS1961S-F3#

DS1961S-F3#

  • 厂商:

    AD(亚德诺)

  • 封装:

    -

  • 描述:

    Memory Card EEPROM 128B

  • 数据手册
  • 价格&库存
DS1961S-F3# 数据手册
DS1961S 1kb Protected EEPROM iButton With SHA-1 Engine www.maxim-ic.com SPECIAL FEATURES § § § § § § § § § § 1128 Bits of 5V EEPROM Memory Partitioned into Four Pages of 256 Bits, a 64Bit Write-Only Secret, and up to Five General-Purpose Read/Write Registers Write Access Requires Knowledge of the Secret and the Capability of Computing and Transmitting a 160-Bit MAC (Message Authentication Code) as Authorization Secret and Data Memory can be WriteProtected (All or Page 0 Only) or put in EPROM-Emulation Mode (“Write to 0”, Page 1) On-Chip, 512-Bit SHA-1 Engine to Compute 160-Bit MACs and Generate Secrets Reads and Writes Over a Wide 2.8V to 5.25V Voltage Range from -40°C to +85°C Communicates to Host with a Single Digital Signal at 14.1kbps using 1-Wire® Protocol On-Chip, 16-Bit Cyclic Redundancy Check (CRC) Generator for Safeguarding Data Transfers Overdrive Mode Boosts Communication Speed to 125kbps Operating Temperature Range from -40°C to +85°C Minimum 10 Years of Data Retention at +85°C § § § § § F5 MicroCan 5.89 0.36 § § § § Unique, Factory-Lasered and Tested 64-Bit Registration Number (8-Bit Family Code + 48-Bit Serial Number + 8-Bit CRC Tester) Assures Absolute Traceability Because No Two Parts are Alike Multidrop Controller for 1-Wire Net Digital Identification and Information by Momentary Contact Chip-Based Data Carrier Compactly Stores Information Data can be Accessed While Affixed to Object iButton, 1-Wire, and MicroCan are registered trademarks of Dallas Semiconductor. 0.51 © 1993 YYWW REGISTERED 16.25 RR 33 xx 17.35 000000FBD8B3 IO GND F3 MicroCan 3.10 COMMON iButton FEATURES § Button Shape is Self-Aligning with CupShaped Probes Durable Stainless-Steel Case Engraved with Registration Number Withstands Harsh Environments Easily Affixed with Self-Stick Adhesive Backing, Latched by its Flange, or Locked with a Ring Pressed onto its Rim Presence Detector Acknowledges when Reader First Applies Voltage Meets UL#913 (4th Edit.). Intrinsically Safe Apparatus: Approved Under Entity Concept for use in Class I, Division 1, Groups A, B, C, and D Locations (Application Pending) 0.36 0.51 © 1993 YYWW REGISTERED xx 16.25 RR 33 17.35 000000FBC52B IO GND All dimensions are shown in millimeters. 1 of 36 092302 DS1961S ORDERING INFORMATION EXAMPLES OF ACCESSORIES DS1961S-F5 DS1961S-F3 DS1963S DS9096P DS9101 DS9093RA DS9093A DS9092 F5 iButton F3 iButton SHA Coprocessor and Button Self-Stick Adhesive Pad Multipurpose Clip Mounting Lock Ring Snap-In Fob iButton Probe iButton DESCRIPTION The DS1961S combines 1024 bits of EEPROM, a 64-bit secret, an 8-byte register/control page with up to five user-read/write bytes, a 512-bit SHA-1 engine, and a fully featured 1-Wire interface in a rugged iButton. Data is transferred serially through the 1-Wire protocol, which requires only a single data lead and a ground return. The DS1961S has an additional memory area called the scratchpad that acts as a buffer when writing to the main memory, the register page, or when installing a new secret. Data is first written to the scratchpad from where it can be read back. After the data has been verified, a copy scratchpad command transfers the data to its final memory location, provided that the DS1961S receives a matching 160-bit MAC. The computation of the MAC involves the secret and additional data stored in the DS1961S including the device’s identity register. Only a new secret can be loaded without providing a MAC. The SHA-1 engine can also be activated to compute 160-bit MACs when reading a memory page or to compute a new secret, instead of loading it. The DS1961S understands a unique command "Refresh Scratchpad." Proper use of a refresh sequence after a copy scratchpad operation reduces the number of weak bit failures in a touch environment (see the Writing with Verification section). The refresh sequence also provides a means to restore functionality in a device with bits in a weak state. Each DS1961S has its own 64-bit ROM registration number that is factory lasered into the chip to provide a guaranteed unique identity for absolute traceability. The durable stainless-steel package is highly resistant to environmental hazards such as dirt, moisture, and shock. Its compact coin-shaped profile is self-aligning with mating receptacles, allowing the DS1961S to be easily used by human operators. Accessories permit the DS1961S to be mounted on almost any surface including plastic key fobs and photo-ID badges. APPLICATIONS The DS1961S can be used for different purposes such as secure access control, user/product authentication, after-market management of consumables, and as monetary tokens in electronic payment systems. As carrier of electronic cash (eCash), the DS1961S can store up to three monetary files or "purses" of a single service provider, which make the device well suited for company-sized single-secret applications such as cafeteria, copy machines, and access control at entertainment parks or private clubs. For increased security or if the processing power of the host microcontroller is insufficient, a DS1963S can be used as secure coprocessor to verify MACs generated by the DS1961S or to compute MACs needed for writing to the DS1961S. OVERVIEW The block diagram in Figure 1 shows the relationships between the major control and memory sections of the DS1961S. The DS1961S has five main data components: 1) 64-bit lasered ROM, 2) 64-bit scratchpad, 3) four 32-byte pages of EEPROM, 4) 64-bit register page, 5) 64-bit secrets memory, and 6) a 512-bit 2 of 36 DS1961S SHA-1 (Secure Hash Algorithm) engine. The hierarchical structure of the 1-Wire protocol is shown in Figure 2. The bus master must first provide one of the seven ROM function commands, 1) Read ROM, 2) Match ROM, 3) Search ROM, 4) Skip ROM, 5) Resume Communication, 6) Overdrive-Skip ROM, or 7) Overdrive-Match ROM. Upon completion of an overdrive ROM command byte executed at standard speed, the device enters overdrive mode where all subsequent communication occurs at a higher speed. The protocol required for these ROM function commands is described in Figure 9. After a ROM function command is successfully executed, the memory functions become accessible and the master can provide any one of the eight memory and SHA function commands. The protocol for these memory and SHA function commands is described in Figure 7. All data is read and written LSB first. Figure 1. DS1961S BLOCK DIAGRAM Parasite Power 1-Wire Net 1-Wire Function Control Memory and SHA Function Control Unit 64-bit Lasered ROM 512-bit Secure Hash Algorithm Engine CRC16 Generator 64-bit Scratchpad Data Memory 4 Pages of 256 bits Each Register Page 64-bit Secrets Memory 64-bit 64-BIT LASERED ROM Each DS1961S contains a unique ROM code that is 64 bits long. The first eight bits are a 1-Wire family code. The next 48 bits are a unique serial number. The last eight bits are a CRC of the first 56 bits (see Figure 3). The 1-Wire CRC is generated using a polynomial generator consisting of a shift register and XOR gates as shown in Figure 4. The polynomial is X8 + X5 + X4 + 1. Additional information about the Dallas 1-Wire CRC is available in The Book of DS19xx iButton Standards from Dallas Semiconductor. The shift register bits are initialized to zero. Then starting with the LSB of the family code, one bit at a time is shifted in. After the 8th bit of the family code has been entered, then the serial number is entered. After the 48th bit of the serial number has been entered, the shift register contains the CRC value. Shifting in the eight bits of CRC should return the shift register to all zeros. 3 of 36 DS1961S Figure 2. HIERARCHICAL STRUCTURE FOR 1-WIRE PROTOCOL 1-Wire Net Bus Master Other Devices DS1961S Command Level: 1-Wire ROM Function Commands (See Figure 9) DS1961S-Specific Memory Function Commands (See Figure 7) Available Commands: Data Field Affected: Read ROM Match ROM Search ROM Skip ROM Resume Overdrive Skip Overdrive Match 64-bit Reg. #, RC-Flag 64-bit Reg. #, RC-Flag 64-bit Reg. #, RC-Flag RC-Flag RC-Flag 64-bit Reg. #, RC-Flag, OD-Flag 64-bit Reg. #, RC-Flag, OD-Flag Write Scratchpad Read Scratchpad Load First Secret 64-bit Scratchpad, Flags 64-bit Scratchpad Secret, Flags; Data Memory (after Refresh Scratchpad) Secret, Data Memory, Scratchpad Data Memory or Register Page, Secret, Flags, 64-Bit Reg. #, Data Memory, Secret, 64-bit Reg. #, 3-Byte Challenge in Scratchpad Data Memory, Register Page, Reg. # 64-bit Scratchpad, Data Memory, Flags Compute Next Secret Copy Scratchpad Read Authenticated Page Read Memory Refresh Scratchpad Figure 3. 64-BIT LASERED ROM MSB LSB 8-Bit CRC Code MSB 48-Bit Serial Number LSB MSB 8-Bit Family Code (33h) LSB 4 of 36 MSB LSB DS1961S Figure 4. 1-WIRE CRC GENERATOR 8 5 4 Polynomial = X + X + X + 1 1st STAGE X 0 2nd STAGE X 1 3rd STAGE X 2 4th STAGE X 3 5th STAGE X 4 6th STAGE X 5 7th STAGE X 6 8th STAGE X 7 X 8 INPUT DATA MEMORY MAP The DS1961S has four memory areas: data memory, secrets memory, register page with special function registers and user-bytes, and a scratchpad. The data memory is organized in pages of 32 bytes. Secret, register page, and scratchpad are 8 bytes each. The scratchpad acts as a buffer when writing to the data memory, loading the initial secret or when writing to the register page. Data memory, secrets memory, and the register page are located in a linear address space, as shown in Figure 5. The data memory and the register page have unrestricted read access. Writing to the data memory and the register page requires knowledge of the secret. Figure 5. DS1961S MEMORY MAP ADDRESS RANGE DESCRIPTION NOTE 0000h to 001Fh Data Memory Page 0 No Write-Access Without Secret 0020h to 003Fh Data Memory Page 1 No Write-Access Without Secret 0040h to 005Fh Data Memory Page 2 No Write-Access Without Secret 0060h to 007Fh Data Memory Page 3 No Write-Access Without Secret 0080h to 0087h Secrets Memory No Read Access; No Secret Needed for Write Access 0088h 1) Write-Protect Secret, 008Ch to 008Fh Protection Activated by Code AAh or 55h 0089h 1) Write-Protect Pages 0 to 3 Protection Activated by Code AAh or 55h 008Ah 1) User Byte, Self-Protecting Protection Activated by Code AAh or 55h Factory Byte (Read Only) Reads Either AAh or 55h; See Text User Byte/EPROM Mode Control for Page 1 Mode Activated by Code AAh or 55h User Byte/Write-Protect Page 0 Only Protection Activated by Code AAh or 55h 008Eh to 008Fh User Bytes/Manufacturer ID Function Depends on Factory Byte 0090h to 0097h 64-Bit Identity Register Read-Only Access 008Bh 008Ch 1) 008Dh 1) 1) Once programmed to AAh or 55h this address becomes read-only. All other codes can be stored but will neither write-protect the address nor activate any function. 5 of 36 DS1961S The secret can be installed either by copying data from the scratchpad to the secrets memory or by computation using the current secret and the scratchpad contents as partial secret. The secret cannot be read directly; only the SHA engine has access to it for computing message authentication codes. The address range 0088h to 008Fh, also referred to as the Register Page, contains special function registers as well as general-purpose user-bytes and one factory byte. Once programmed to AAh or 55h, most of these bytes become write-protected and can no longer be altered. All other codes neither writeprotect the address nor activate the special function associated to that particular byte. Special functions are: 1) write-protecting only the secret, 2) write-protecting all four data memory pages simultaneously, 3) activating EPROM mode for data memory page 1 only, and 4) write-protecting data memory page 0 only. Once EPROM mode is activated, bits in the address range 0020h through 003Fh can only be altered from a logic 1 to a logic 0, provided that the data memory is not write protected. The factory byte either reads 55H or AAh. Typically, this address reads 55h, indicating that the addresses 008E and 008F are read/write user-bytes without any special function or locking mechanism. The code of AAh indicates that these two bytes are programmed with a 16-bit manufacturer ID and then writeprotected at the factory. The manufacturer ID can be a customer-supplied identification code that assists the application software in identifying the product the DS1961S is associated with and in faster selection of the applicable secret. To setup and register a manufacturer ID contact the factory. The address range 0090h to 0097h is called the identity register. Typically, the identity register contains a copy of the device’s ROM registration number. The family code is stored at the lower address followed by the 48-bit serial number and the 8-bit CRC, which is stored at address 0097h. In reading through these addresses (0090h to 0097h) the bus master receives the individual bits of the registration number in exactly the same sequence as with a ROM function command. With customized versions, the content of the identity register can be any customer-specified constant pattern. For more information on customization contact the factory. Figure 6. ADDRESS REGISTERS Bit Number 7 6 5 4 3 2 1 0 Target Address (TA1) T7 T6 T5 T4 T3 T2 (0) T1 (0) T0 (0) Target Address (TA2) T15 T14 T13 T12 T11 T10 T9 T8 Ending Address with Data Status (E/S) (Read Only) AA 1 PF 1 1 E2 (1) E1 (1) E0 (1) ADDRESS REGISTERS AND TRANSFER STATUS The DS1961S employs three address registers: TA1, TA2, and E/S (Figure 6). These registers are common to many other 1-Wire devices but operate slightly differently with the DS1961S. Registers TA1 and TA2 must be loaded with the target address to which the data is written or from which data is read. Register E/S is a read-only transfer-status register, used to verify data integrity with write commands. Since the scratchpad of the DS1961S is designed to accept data in blocks of eight bytes only, the lower three bits of TA1 are forced to 0 and the lower three bits of the E/S register (ending offset) always read 1. 6 of 36 DS1961S This indicates that all the data in the scratchpad is used for a subsequent copying into main memory or secret. Bit 5 of the E/S register, called PF or partial byte flag, is a logic-1 if the number of data bits sent by the master is not an integer multiple of eight or if the data in the scratchpad is not valid due to a loss of power. A valid write to the scratchpad clears the PF bit. Bits 3, 4, and 6 have no function; they always read 1. The partial flag supports the master checking the data integrity after a write command. The highest valued bit of the E/S register is called the AA or authorization accepted flag, which indicates that the data stored in the scratchpad has already been copied to the target memory address. Writing data to the scratchpad clears this flag. WRITING WITH VERIFICATION To write data to the DS1961S, the scratchpad has to be used as intermediate storage. First the master issues the write scratchpad command, which specifies the desired target address and the data to be written to the scratchpad. Note that writes to data memory must be performed on 8-byte boundaries with the three LSBs of the target address T2–T0 equal to 000b. Therefore, if T2–T0 are sent with non-zero values, the device sets these bits to zero and uses the modified address as the target address. The master should always send eight complete data bytes. After the eight bytes of data have been transmitted, the master can elect to receive an inverted CRC16 of the write scratchpad command, the address as sent by the master, and the data as sent by the master. The master can compare the CRC to the value it has calculated itself in order to determine if the communication was successful. After the scratchpad has been written, the master should always perform a read scratchpad to verify that the intended data was in fact written. During a read scratchpad, the DS1961S repeats the target address TA1 and TA2 and sends the contents of the E/S register. The partial flag (bit 5 of the E/S register) is set to 1 if the last data byte the DS1961S received during a write scratchpad or refresh scratchpad command was incomplete, or if there was a loss of power since data was last written to the scratchpad. The authorization-accepted (AA) flag (bit 7 of the E/S register) is normally cleared by a write scratchpad or refresh scratchpad; therefore, if it is set to 1, it indicates that the DS1961S did not understand the proceeding write (or refresh) scratchpad command. In either of these cases, the master should rewrite the scratchpad. After the master receives the E/S register, the scratchpad data is received. The descriptions of write scratchpad and refresh scratchpad provide clarification of what changes can occur to the scratchpad data under certain conditions. An inverted CRC of the read scratchpad command, target address, E/S register, and scratchpad data follows the scratchpad data. As with the write scratchpad command, this CRC can be compared to the value the master has calculated itself in order to determine if the communication was successful. After the master has verified the data, it can send the copy scratchpad to copy the scratchpad to memory. Alternatively, the load first secret or compute next secret command can be issued to change the secret. See the descriptions of these commands for more information. In a touch environment the quality of the electrical contact cannot be guaranteed. With poor or intermittent contact it is possible for a copy scratchpad command to complete with insufficient energy, leaving the floating gate voltage of an EEPROM bit in the area of the threshold between 0 and 1. When this occurs, the logical value of the bit is not assured. Depending on voltage and/or temperature conditions, the same bit can be read by the host as one polarity and then by the internal SHA-1 engine as the opposite polarity. This becomes a fatal lockup mode because the host cannot formulate a proper SHA1 MAC to enable the bit to be rewritten. To repair poorly written bits and thereby restore the device to functionality, the refresh scratchpad command was introduced. Combined with the load first secret command, refresh scratchpad provides a means to restore the EEPROM bits to normal values, removing lockup conditions and allowing the device to be written again. To prevent the occurrence of poorly written bits, a refresh sequence should be performed after each copy scratchpad command. A refresh sequence is defined as a refresh scratchpad (to the same target address as the previous copy scratchpad), followed by a load first secret. The EN_LFS flag is set by the refresh 7 of 36 DS1961S scratchpad command. The EN_LFS flag enables the use of load first secret to addresses 0000h–007Fh. Using load first secret allows the master to copy the scratchpad to memory without the MAC computation necessary during a copy scratchpad. If the master attempts any command after refresh scratchpad that could change the scratchpad data or the target address, EN_LFS is reset to 0. This prevents the use of load first secret to load any data other than the refreshed memory data to any location other than the one specified during refresh scratchpad. Refresh scratchpad behaves exactly as write scratchpad does for target addresses 0080h and above. In this case the EN_LFS flag is not set, so it is not possible to refresh the data in the secret (0080h) or in the register page (0088h). This prevents the secret from being revealed by a refresh scratchpad followed by a read scratchpad. MEMORY AND SHA FUNCTION COMMANDS Due to its design as a secure device, the DS1961S has to behave differently from other memory iButtons. Although most of the memory of the DS1961S can be read the same way as any other memory iButton, attempts to read the secret results in FFh-bytes rather than real data. The Memory and SHA Function Flow Chart (Figure 7) describes the protocols necessary for accessing the memory and operating the SHA engine. The communication between master and DS1961S takes place either at regular speed (default, OD = 0) or at overdrive speed (OD = 1). If not explicitly set into overdrive mode the DS1961S assumes regular speed. Write Scratchpad [0Fh] The write scratchpad command applies to the data memory, the secret and the writeable addresses in the register page. If the bus master sends a target address higher than 90h, the command is not executed. After issuing the write scratchpad command, the master must first provide the 2-byte target address, followed by the data to be written to the scratchpad. The data is written to the scratchpad starting at the beginning of the scratchpad. Note that the ending offset (E2..E0, see Figure 6) is always 111b regardless of the number of bytes that the master has transmitted. For this reason the master should always send eight bytes, especially if the data is to be loaded as a secret. If the master sends less than eight data bytes and does not read back the scratchpad for verification, parts of the new secret can be random data that is unknown to the master. Only full data bytes are accepted. If the last data byte is incomplete its content is ignored and the partial byte flag (PF) is set. When executing the write scratchpad command the CRC generator inside the DS1961S (see Figure 12) calculates a CRC of the entire data stream, starting at the command code and ending at the last data byte as sent by the master. This CRC is generated using the CRC16 polynomial by first clearing the CRC generator and then shifting in the command code (0Fh) of the write scratchpad command, the target addresses (TA1 and TA2), and all the data bytes. Note that the CRC16 calculation is performed with the actual TA1 sent by the master even though the DS1961S sets TA1 bits T2..T0 to 000b for the actual write scratchpad command. The master can end the write scratchpad command at any time. However, if the scratchpad is filled to its capacity, the master can send 16 read-time slots and receives the CRC generated by the DS1961S. If the master continues reading after the CRC all data is be FFh. After receiving the target addresses (TA1 and TA2), the DS1961S clears the EN_LFS flag. If EPROM mode is active and a write scratchpad is attempted within page 1 (0020h–003Fh), the scratchpad is loaded with the logical AND of the scratchpad data sent by the master and the current content of the target memory location. If a write scratchpad is attempted to the register page (0088h–008Fh), any bytes that are write-protected overwrite the corresponding scratchpad data byte sent by the master with the existing value. In all other cases, the data sent by the master is written to the scratchpad unaltered. 8 of 36 DS1961S Read Scratchpad [AAh] The read scratchpad command allows verifying the target address and the integrity of the scratchpad data. After issuing the command code, the master begins reading. The first two bytes is the target address with T2 to T0 = 0. The next byte is the ending offset/data status byte (E/S) followed by the scratchpad data, which may be different from what the master has originally sent. This is of particular importance if the target address is the secret, the register page, page 1 (in EPROM mode), or if refresh was used to load the scratchpad. In these cases, the scratchpad can contain data other than that which was sent during either the write scratchpad or refresh scratchpad commands. The master should read through the end of the scratchpad after which it receives the inverted CRC that is computed with the data as sent by the DS1961S. If the master continues reading after the CRC all data is FFh. The scratchpad can be loaded using the write scratchpad or refresh scratchpad command. The data found in the scratchpad depends on the command used, the target address, and whether or not EPROM mode is active. See the descriptions of write scratchpad and refresh scratchpad for clarification. Load First Secret [5Ah] The load first secret command has two modes of operation, which are controlled by the EN_LFS flag. With EN_LFS = 0, the command replaces the device’s current secret with the contents of the scratchpad, provided that the secret is not write-protected. With EN_LFS = 1, the command allows to rewrite memory data (addresses 0000h to 007Fh), bypassing the SHA-1 computation that is required when doing the same through the copy scratchpad command. The EN_LFS flag is 0 unless it has been set to 1 by executing the refresh scratchpad command prior to load first secret. Case EN_LFS = 0 Before the load first secret command can be used in this mode, the master must have written the new secret to the scratchpad using the starting address of the secret (0080h). After issuing the load first secret command, the master must provide a 3-byte authorization pattern (TA1, TA2, E/S, in that order), that should have been obtained by an immediately preceding read scratchpad command. This 3-byte pattern must exactly match the data contained in the three address registers (see Figure 6). If the pattern matches and the secret is not write-protected, the AA flag is set and the copy begins. All eight bytes of scratchpad contents are copied to the secret’s memory location. Case EN_LFS = 1 To use the load first secret command in this mode, the refresh scratchpad command must have been executed to load eight bytes of memory data (address range 0000h to 007Fh) into the scratchpad, which sets the EN_LFS flag to 1. After issuing the load first secret command, the master must provide a 3-byte authorization pattern (TA1, TA2, E/S, in that order), that can be obtained by an immediately preceding read scratchpad command without affecting the EN_LFS flag. This 3-byte pattern must exactly match the data contained in the three address registers (see Figure 6). If the pattern matches and the memory is not write-protected, the AA flag is set and the copy begins. All eight bytes of scratchpad contents are copied to the memory location. Regardless of the mode used, the duration of the copy operation is tPROG during which the voltage on the 1-Wire bus must not fall below 2.8V. The master should read at least one byte at the conclusion of the copy delay. Reading AAh indicates that the copy was successful, while reading FFh indicates that the copy was not successful. Instead of using load first secret with EN_LFS = 0, a new secret can alternatively be loaded with the copy scratchpad command. However, this approach requires the knowledge of the current secret and the computation of a 160-bit MAC. 9 of 36 DS1961S Figure 7-1. MEMORY AND SHA FUNCTIONS FLOW CHART From ROM Functions Flow Chart (Figure 9) Bus Master TX Memory Function Command 0Fh Write Scratchpad ? To Figure 7 2nd Part N Y Bus Master TX TA1 (T7:T0), TA2 (T15:T8) DS1961S Sets EN_LFS = 0 N Y Address < 90h ? DS1961S Sets Scratchpad Byte Counter = 0, Clears PF, AA, Sets T2:T0 = 0, 0, 0, Sets E2:E0 = 1, 1, 1 Bus Master RX “1”s Master TX Reset ? Note: See the Write Scratchpad Description for Additional Information. Master TX Data Byte To Scratchpad N DS1961S Increments Byte Counter Master TX Reset ? Y Partial Byte ? N Y N Byte Counter =7? Y N Y PF = 1 DS1961S TX CRC16 of Command, Address, Data Bytes as They Were Sent by the Bus Bus Master RX “1”s N Master TX Reset ? Y To ROM Functions Flow Chart (Figure 9) 10 of 36 From Figure 7 2nd Part DS1961S Figure 7-2. MEMORY AND SHA FUNCTIONS FLOW CHART (continued) From Figure 7 1st Part AAh Read ScratchPad ? N To Figure 7 3rd Part Y Bus Master RX TA1 (T7:T0), TA2 (T15:T8) and E/S Byte DS1961S Sets Scratchpad Byte Counter = 0 Bus Master RX Data Byte from Scratchpad DS1961S Increments Byte Counter Master TX Reset ? Note: See the Read Scratchpad Description for Additional Information. Y N N Byte Counter =7? Y Bus Master RX CRC16 of Command, Address, E/S Byte, Data Bytes as Sent by the DS1961S Bus Master RX “1”s N Master TX Reset ? Y To Figure 7 1st Part From Figure 7 3rd Part 11 of 36 DS1961S Figure 7-3. MEMORY AND SHA FUNCTIONS FLOW CHART (continued) From Figure 7 2nd Part 5Ah Load First Secret ? To Figure 7 4th Part N Y Bus Master TX TA1 (T7:T0), TA2 (T15:T8) and E/S Byte Note: The 8-Byte Secret Must First be Written to the Scratchpad. Y Auth. Code Match ? N Address of Secret ? N N Address
DS1961S-F3# 价格&库存

很抱歉,暂时无法提供与“DS1961S-F3#”相匹配的价格&库存,您可以联系我们找货

免费人工找货