LF - EN Memory EM4056 Memory EM4056 and its security J.-D. Chatelain.

Slides:



Advertisements
Similar presentations
©Contrinex JDC PPT_LF_Fieldbus Fieldbus J.-D. Chatelain.
Advertisements

Number Systems and Codes
ICS312 Set 2 Representation of Numbers and Characters.
Representing Numbers: Integers
Binary & Decimal numbers = 3* * *10 + 5*1 = 3* * * *10 0 Decimal system: Ten digits: 0,1,2,3,…,9 Example:
+======-========-========-========-========-========-========-========-========+ | Bit| 7 | 6 | 5 | 4 | 3 | 2 | 1 | 0 | |Byte | | | | | | | | | |======+=======================================================================|
What is a Computer? A device that can run under specific directions What is a Program? –A specific set of instructions given to the computer –Requires.
Representing Information as Bit Patterns Lecture 4 CSCI 1405, CSCI 1301 Introduction to Computer Science Fall 2009.
+ CS 325: CS Hardware and Software Organization and Architecture Integers and Arithmetic Part 4.
Chapter 1 Number Systems and Codes William Kleitz Digital Electronics with VHDL, Quartus® II Version Copyright ©2006 by Pearson Education, Inc. Upper Saddle.
Number Systems and Arithmetic
Number Systems and Codes In PLC
They are the same as registers since they store binary numbers. Called shifting registers since they shift (left or right) the binary number stored in.
Converting binary to decimal decimal to binary
Revision Introductory Lesson
Number Systems.
Computer Science: A Structured Programming Approach Using C Masks In many programs, bits are used as binary flags: 0 is off, and 1 is on. To set.
Programmable Logic Controllers
Data Representation Prepared by Dr P Marais (Modified by D Burford)
CSC212 – Computer Organization and Design
©Contrinex JDC PPT_LF_Interfaces Low frequency RS485 interfaces J.-D. Chatelain.
Lec 3: Data Representation Computer Organization & Assembly Language Programming.
ICS312 Set 1 Representation of Numbers and Characters.
Chapter 19 Number Systems. Irvine, Kip R. Assembly Language for Intel-Based Computers, Translating Languages English: Display the sum of A times.
©Contrinex JDC PPT_HF_Anticollision Anticollision algorithm J.-D. Chatelain.
©Contrinex JDC PPT_LF_TestList Test list J.-D. Chatelain.
Cisco Discovery Semester 1 Chapter 5 JEOPADY Q&A by R. Prensky, Template by K. Martin.
PPT_HF_AFI ©Contrinex JDC PPT_HF_ISO15693 ISO/IEC standard J.-D. Chatelain.
Two’s Complement. A system used to represent a negative number in binary A system used to represent a negative number in binary Positive numbers start.
MECH1500 Chapter 3.
©Contrinex JDC PPT_XF_RFID SystemOperation Functioning of RFID systems J.-D. Chatelain.
©Contrinex JDC PPT_HF_RWMTAGCommands HF RWM and TAG Commands J.-D. Chatelain HF RWM Commands HF TAG Commands.
CEC 220 Digital Circuit Design Decoders, Encoders, & ROM Wed, February 19 CEC 220 Digital Circuit Design Slide 1 of 18.
©Contrinex JDC PPT_HF_Status STATUS command J.-D. Chatelain.
The World Leader in High Performance Signal Processing Solutions SD/SDIO Introduction Cliff Cai.
Chapter 32 Binary Number System. Objectives After completing this chapter, you will be able to: –Describe the binary number system –Identify the place.
Cisco I Introduction to Networks Semester 1 Chapter 6 JEOPADY.
Ch2 Number systems and codes
©Contrinex JDC PPT_LF_CTX MetalTechnology Advantages of CONTRINEX technology Advantages of CONTRINEX technology J.-D. Chatelain.
Student Access Instructions
Programmable Logic Controller
Binary & Decimal numbers
Number Systems and Codes
Lec 3: Data Representation
Introduction to Chapter 2
Benefits of RFID J.-D. Chatelain.
RFID in a production line
Raise a number x to the power y
RFID - EN Transponders (TAG) Transponders (TAG) J.-D. Chatelain.
Student Access Instructions
EE345: Introduction to Microcontrollers Memory
Number Systems and Codes
By: Briley Cooper, David Chaney, Josh Martin, and Mason Branscum
RFID operating principle
Hard protection of words
Decimal System The radix or base of a number system determines
Physical address Logical address Bootload
Introduction to Abstract Data Types
RFID - EN Transponders (TAG) Transponders (TAG) J.-D. Chatelain.
Student Access Instructions
Protection codes and Comparison J.-D. Chatelain LF - EN
Topic 6 LC-3.
Binary / Hex Binary and Hex The number systems of Computer Science.
Creating Subnets – Network Requirements
Security and File Permission
ECE 331 – Digital System Design
Computer Architecture CST 250
Information Representation: Machine Instructions
Part I Data Representation and 8086 Microprocessors
Presentation transcript:

LF - EN Memory EM4056 Memory EM4056 and its security J.-D. Chatelain

MSB LSB 000 001 002 003 004 005 006 007 008 009 010 011 Laser ROM 1 0 The first three words (laser ROM) contain the transponder’s unique identification number The word at address 126 permits configuration of the soft protection activated by the password, which is found at address 127 The following three words are reserved for CONTRINEX There remain 16 usable bits per word for data OTP (One Time Programmable) Read protection of one word The memory is made up of 128 words, each of 18 bits The last two bits of each word (LSB: Least Significant Bits) are dedicated to its protection OTP Read and Write protection of one word OTP Write protection of one word 100% 0 0 0 1 75% 1 0 50% 1 1 25% 122 123 124 125 126 127

Reading a protected word without login LF - EN Memory EM4056 Reading a protected word without login Mask protected region Setting the « Mask protected region » bit Write protection Read protection TAG not logged in Its equivalent in HEX Result of a reading A memory word in binary

Reading a protected word with login LF - EN Memory EM4056 Reading a protected word with login When words are protected with a « Password », they can be accessed only with a login. When a word is protected by a « Read protection » bit, it may only be compared with a known word. TAG logged in Mask protected region Write protection Read protection Result of a reading

Comparison Result of reading transponder addresses 20 through to 24 LF - EN Memory EM4056 Comparison Result of reading transponder addresses 20 through to 24 Result of reading the same addresses after having protected addresses 21 and 22

The acknowledgment (error) code "4" after the second phase indicates that the entered data is not identical to the data stored in the memory. Complete words are to be compared The acknowledgment (error) code "0“, after the second phase, indicates that the entered data is identical to the data stored in the memory Content of the memory of the transponder

Memory EM4056 and its security End of this chapter J.-D. Chatelain LF - EN Memory EM4056 Memory EM4056 and its security End of this chapter J.-D. Chatelain