DatasheetQ Logo
Electronic component search and free download site. Transistors,MosFET ,Diode,Integrated circuits

AT88SC1616C(2008) 查看數據表(PDF) - Atmel Corporation

零件编号
产品描述 (功能)
生产厂家
AT88SC1616C
(Rev.:2008)
Atmel
Atmel Corporation Atmel
AT88SC1616C Datasheet PDF : 58 Pages
1 2 3 4 5 6 7 8 9 10 Next Last
AT88SC0104/0204/0404/0808/1616/3216/6416/12816/25616C
1. Pin Configuration and Package Information
1.1 Pin Configuration
Table 1-1.
Pad
VCC
GND
SCL/CLK
SDA/IO
RST
Package Pin Configuration
Description
Supply Voltage
Ground
Serial Clock Input
Serial Data Input/Output
Reset Input
ISO Module Contact
C1
C5
C3
C7
C2
1.2 Package Information
Standard Package Pin
8
4
6
5
NC
Smart Card Module
8-lead SOIC, PDIP
VCC=C1
RST=C2
SCL/CLK=C3
NC=C4
C5=GND
NC 1
C6=NC
NC
C7=SDA/IO
2
C8=NC
NC 3
GND 4
8 VCC
7 NC
6 SCL
5 SDA
2. Description
The AT88SCxxxxC is a family of 9 high-performance secure memory devices providing 1K to
256K bits of user memory with advanced built-in security and cryptographic features. The mem-
ory is divided into 4, 8 or 16 user zones each of which may be individually set with different
security access rights or used together to provide space for one or multiple data files. Cryptom-
emory has a configuration memory that contains registers to define the security rights for each
user zone and space for passwords and secret keys used by the security logic of
CryptoMemory.
Through dynamic, symmetric mutual authentication, data encryption, and the use of encrypted
checksums, CryptoMemory provides a secure place for storage of sensitive information within a
system. With its tamper protection circuits, this information remains safe even under attack.
5210B–SMIC–11/08
CryptoMemory also provides high security, low cost and ease of implementation of host-client
type systems without the need for a microprocessor operating system. The embedded crypto-
graphic engine provides for a dynamic, symmetric mutual authentication between the device and
host, as well as performs stream encryption for all data and passwords exchanged between the
device and host. Up to four unique key sets are available for these operations.
1

Share Link: 

datasheetq.com  [ Privacy Policy ]Request Datasheet ] [ Contact Us ]