Top

DeepCover Secure Authenticator with SHA-256 and RFID Reader

Industry's First HF RFID Transceiver IC with SHA-256 Engine for Secure Challenge-Response Authentication

Product Details

Key Features

Parametric specs for NFC/RFID Products
Protocol ISO15693
Functions Reader
End Equipment Asset Tracking
Handheld Reader Modules
Identification Systems
RFID/NFC General Purpose
Secure Access Control
Memory Type Flash
Memory Size 1K bits
1K x 1
Security Features Four Master Secrets
SHA-256
Oper. Temp. (°C) -40 to +85
Package/Pins TQFN HYBRID/56
Budgetary
Price (See Notes)
0
Parametric specs for Secure Authenticators
Crypto Engine Symmetric
Bus Type ISO 15693
Deep Cover Yes
Package/Pins TQFN HYBRID/56
Budgetary
Price (See Notes)
0
View Less

Simplified Block Diagram

Technical Docs

Support & Training

Search our knowledge base for answers to your technical questions.

Filtered Search

Our dedicated team of Applications Engineers are also available to answer your technical questions. Visit our support portal .

Parameters

Parametric specs for NFC/RFID Products
Protocol ISO15693
Functions Reader
End Equipment Asset Tracking
Handheld Reader Modules
Identification Systems
RFID/NFC General Purpose
Secure Access Control
Memory Type Flash
Memory Size 1K bits
1K x 1
Security Features Four Master Secrets
SHA-256
Oper. Temp. (°C) -40 to +85
Package/Pins TQFN HYBRID/56
Budgetary
Price (See Notes)
0
Parametric specs for Secure Authenticators
Crypto Engine Symmetric
Bus Type ISO 15693
Deep Cover Yes
Package/Pins TQFN HYBRID/56
Budgetary
Price (See Notes)
0

Key Features

  • Secure, Contactless Host Authenticator
    • ISO/IEC 15693 and 14443 Type A Standard Compliant
    • SHA-256 Engine to Run a Symmetric Key-Based Bidirectional Secure Authentication
    • Four 32-Byte Pages of User Memory
    • Four Master Secrets with Multiple Programmable Protection Options
    • 76-Byte Scratchpad in SRAM
    • True Hardware Random-Number Generator
    • Unique 64-Bit Serial Number
  • Design Flexibility Supports Diverse Applications
    • UART and SPI Interface Ports
    • Power-Down Mode by an Input Pin (Low, Standby Power)
    • Antenna Short-Circuit Protection
    • Compatible with 3.3V or 5V Supply Voltages
    • ±2kV HBM ESD Protection
  • Scalable 13.56MHz Analog Front-End Provides Support for Multiple Antenna Configurations
    • Single- or Double-Antenna Driver Using On-Off Keying (OOK) Modulation
    • User-Selectable ASK Uplink Modulations Index Adjustable from 7% Up to 30%
    • High Output RF Power of Up to 200mW
    • Multiple Receiver Inputs for High-Communication Reliability
    • Built-In Receiver Lowpass-Filter Cutoff Frequencies Selectable Between 400kHz and 1MHz
    • Built-In Receiver Highpass-Filter Cutoff Frequency Selectable Among 100kHz, 200kHz, and 300kHz
    • Selectable Receive Gain from 0dB up to 40dB
    • Multiple Subcarrier Receiving Compatibility (212kHz and 424kHz)
  • Antenna Short-Circuit Protection Enhances System Ruggedness

Applications/Uses

  • Asset-Tracking Readers
  • Authentication of Consumables
  • Blood Glucose Meters/Monitors
  • Handheld Reader Modules
  • Readers in Printers (Ink Cartridge)
  • Secure Access Control

Description

DeepCover® embedded security solutions cloak sensitive data under multiple layers of advanced physical security to provide the most secure key storage possible.

The DeepCover Secure Authenticator (MAX66300) combines a highly integrated RFID reader for contactless communication at 13.56MHz and a SHA-256 secure authenticator coprocessor. The RFID IC reader covers both the ISO 14443 Type A and the ISO 15693 standard. The authenticator coprocessor’s engine is based on the FIPS 180-4 standard and supports secure challenge-and-response authentication when paired with peripherals such as the Maxim MAX66240/ MAX66242 family of tag solutions. An embedded host processor can easily interface with the MAX66300 using its UART or SPI interface.

Simplified Block Diagram

MAX66300: Typical Application Circuit MAX66300: Typical Application Circuit Zoom icon

Technical Docs

Support & Training

Search our knowledge base for answers to your technical questions.

Filtered Search

Our dedicated team of Applications Engineers are also available to answer your technical questions. Visit our support portal .