Tag Evaluation Kit for the MAX66240, Requires NFC Reader

Please check latest availability status for a specific part variant.


The MAX66240 evaluation kit (EV kit) reference board is a ready-to-use PCB that showcases one of Maxim’s MAX662xx family of secure HF ICs. The board is built with a hexagonal-shaped antenna construction (see the EV Kit Photo and Figure 3 in the full data sheet) tuned to 13.56MHz.

The EV kit is a platform that allows designers, test, and systems engineers to evaluate our MAX66240 tag solution. The EV kit allows users to evaluate the performance and capabilities of certain key features of the part and is a great platform to get started on a new NFC/RFID tag design.

MAX66240EVKIT Photo MAX66240EVKIT Photo Enlarge+

Key Features

  • HF Interface at 13.56MHz
  • User EEPROM Authenticated Memory Page Read/Write Transactions
  • User EEPROM Page/Block Read/Write Transactions
  • Secure Transaction that Writes “Secret Keys” and Computes Message Authentication Code


  • Access Control
  • Asset Tracking
  • Medical Sensor Authentication and Calibration
  • Printer Cartridge Configuration and Monitoring
  • System Intellectual Property Protection
Device   Fab Process   Technology   Sample size   Rejects   FIT at 25°C   FIT at 55°C   Material Composition  

Note : The failure rates are summarized by technology and mapped to the associated material part numbers. The failure rates are highly dependent on the number of units tested.

Quality Management System >
Environmental Management System >


Related Resources

1-Wire Dual-Port Link

  • Two-Contact Solution Enables Advance TWS Features
  • Full Range of Capabilities for Earbud and Charging Case Detection
  • Minimalist Dual 1-Wire Interface Reduces Cost and Complexity

1-Wire® to I2C/SPI Bridge with Command Sequencer

  • Operate Remote I2C or SPI Devices Using Single-Contact 1-Wire Interface
  • No External Power Required
  • Flexible 1-Wire and I2C/SPI Master Operational Modes
  • Easy to Integrate

I²C Low-Voltage SHA-3 Authenticator

  • Robust Countermeasures Protect Against Security Attacks
  • Efficient Secure Hash Algorithm Authenticates Peripherals
  • Supplemental Features Enable Easy Integration into End Applications