13.56 MHz CryptoRF EEPROM Memory 2 Kbits. Summary AT88SC0204CRF

Similar documents
AVR32138: How to optimize the ADC usage on AT32UC3A0/1, AT32UC3A3 and AT32UC3B0/1 series. 32-bit Microcontrollers. Application Note.

8-bit. Application Note. Microcontrollers. AVR282: USB Firmware Upgrade for AT90USB

Using CryptoMemory in Full I 2 C Compliant Mode. Using CryptoMemory in Full I 2 C Compliant Mode AT88SC0104CA AT88SC0204CA AT88SC0404CA AT88SC0808CA

AVR1309: Using the XMEGA SPI. 8-bit Microcontrollers. Application Note. Features. 1 Introduction SCK MOSI MISO SS

AVR1922: Xplain Board Controller Firmware. 8-bit Microcontrollers. Application Note. Features. 1 Introduction

AVR1318: Using the XMEGA built-in AES accelerator. 8-bit Microcontrollers. Application Note. Features. 1 Introduction

AVR115: Data Logging with Atmel File System on ATmega32U4. Microcontrollers. Application Note. 1 Introduction. Atmel

AVR1510: Xplain training - XMEGA USART. 8-bit Microcontrollers. Application Note. Prerequisites. 1 Introduction

256K (32K x 8) Battery-Voltage Parallel EEPROMs AT28BV256

AVR2006: Design and characterization of the Radio Controller Board's 2.4GHz PCB Antenna. Application Note. Features.

Application Note. 8-bit Microcontrollers. AVR270: USB Mouse Demonstration

AVR353: Voltage Reference Calibration and Voltage ADC Usage. 8-bit Microcontrollers. Application Note. Features. 1 Introduction

3-output Laser Driver for HD-DVD/ Blu-ray/DVD/ CD-ROM ATR0885. Preliminary. Summary. Features. Applications. 1. Description

AVR033: Getting Started with the CodeVisionAVR C Compiler. 8-bit Microcontrollers. Application Note. Features. 1 Introduction

AVR32701: AVR32AP7 USB Performance. 32-bit Microcontrollers. Application Note. Features. 1 Introduction

AVR1900: Getting started with ATxmega128A1 on STK bit Microcontrollers. Application Note. 1 Introduction

AT91SAM ARM-based Flash MCU. Application Note

AVR287: USB Host HID and Mass Storage Demonstration. 8-bit Microcontrollers. Application Note. Features. 1 Introduction

AVR32788: AVR 32 How to use the SSC in I2S mode. 32-bit Microcontrollers. Application Note. Features. 1 Introduction

AVR1301: Using the XMEGA DAC. 8-bit Microcontrollers. Application Note. Features. 1 Introduction

Application Note. Atmel ATSHA204 Authentication Modes. Prerequisites. Overview. Introduction

AVR1600: Using the XMEGA Quadrature Decoder. 8-bit Microcontrollers. Application Note. Features. 1 Introduction. Sensors

APPLICATION NOTE. Atmel AVR134: Real Time Clock (RTC) Using the Asynchronous Timer. Atmel AVR 8-bit Microcontroller. Introduction.

AVR305: Half Duplex Compact Software UART. 8-bit Microcontrollers. Application Note. Features. 1 Introduction

MF1 IC S General description. Functional specification. 1.1 Contactless Energy and Data Transfer. 1.2 Anticollision. Energy

64K (8K x 8) Parallel EEPROM with Page Write and Software Data Protection AT28C64B

Application Note. 8-bit Microcontrollers. AVR272: USB CDC Demonstration UART to USB Bridge

Atmel AVR4903: ASF - USB Device HID Mouse Application. Atmel Microcontrollers. Application Note. Features. 1 Introduction

APPLICATION NOTE. Secure Personalization with Transport Key Authentication. ATSHA204A, ATECC108A, and ATECC508A. Introduction.

Application Note. Atmel CryptoAuthentication Product Uses. Atmel ATSHA204. Abstract. Overview

Atmel AVR4920: ASF - USB Device Stack - Compliance and Performance Figures. Atmel Microcontrollers. Application Note. Features.

Tag Tuning/RFID. Application Note. Tag Tuning. Introduction. Antenna Equivalent Circuit

Atmel AVR4921: ASF - USB Device Stack Differences between ASF V1 and V2. 8-bit Atmel Microcontrollers. Application Note. Features.

Chip Card & Security ICs Mifare NRG SLE 66R35

AVR2004: LC-Balun for AT86RF230. Application Note. Features. 1 Introduction

APPLICATION NOTE. Atmel LF-RFID Kits Overview. Atmel LF-RFID Kit. LF-RFID Kit Introduction

Application Note. 8-bit Microcontrollers. AVR293: USB Composite Device

8-bit RISC Microcontroller. Application Note. AVR910: In-System Programming

AVR319: Using the USI module for SPI communication. 8-bit Microcontrollers. Application Note. Features. Introduction

Security & Chip Card ICs SLE 44R35S / Mifare

General Porting Considerations. Memory EEPROM XRAM

AT91 ARM Thumb Microcontrollers. AT91SAM CAN Bootloader. AT91SAM CAN Bootloader User Notes. 1. Description. 2. Key Features

8051 Flash Microcontroller. Application Note. A Digital Thermometer Using the Atmel AT89LP2052 Microcontroller

Application Note. C51 Bootloaders. C51 General Information about Bootloader and In System Programming. Overview. Abreviations

AVR317: Using the Master SPI Mode of the USART module. 8-bit Microcontrollers. Application Note. Features. Introduction

32-bit AVR UC3 Microcontrollers. 32-bit AtmelAVR Application Note. AVR32769: How to Compile the standalone AVR32 Software Framework in AVR32 Studio V2

Atmel AVR1017: XMEGA - USB Hardware Design Recommendations. 8-bit Atmel Microcontrollers. Application Note. Features.

AVR125: ADC of tinyavr in Single Ended Mode. 8-bit Microcontrollers. Application Note. Features. 1 Introduction

How To Use An Atmel Atmel Avr32848 Demo For Android (32Bit) With A Microcontroller (32B) And An Android Accessory (32D) On A Microcontroller (32Gb) On An Android Phone Or

How To Design An Ism Band Antenna For 915Mhz/2.4Ghz Ism Bands On A Pbbb (Bcm) Board

AVR1003: Using the XMEGA Clock System. 8-bit Microcontrollers. Application Note. Features. 1 Introduction

INTEGRATED CIRCUITS I CODE SLI. Smart Label IC SL2 ICS20. Functional Specification. Product Specification Revision 3.1 Public. Philips Semiconductors

APPLICATION NOTE. Authentication Counting. Atmel CryptoAuthentication. Features. Introduction

SL2 ICS53/SL2 ICS General description I CODE SLI-S/I CODE SLI-S HC. 1.1 Anticollision. 1.2 Contactless energy and data transfer

APPLICATION NOTE. Atmel AT02985: User s Guide for USB-CAN Demo on SAM4E-EK. Atmel AVR 32-bit Microcontroller. Features. Description.

APPLICATION NOTE. Atmel AT04389: Connecting SAMD20E to the AT86RF233 Transceiver. Atmel SAMD20. Description. Features

AVR134: Real Time Clock (RTC) using the Asynchronous Timer. 8-bit Microcontrollers. Application Note. Features. 1 Introduction

AVR055: Using a 32kHz XTAL for run-time calibration of the internal RC. 8-bit Microcontrollers. Application Note. Features.

1Mb (64K x 16) One-time Programmable Read-only Memory

APPLICATION NOTE Atmel AT02509: In House Unit with Bluetooth Low Energy Module Hardware User Guide 8-bit Atmel Microcontroller Features Description

8-bit Microcontroller. Application Note. AVR415: RC5 IR Remote Control Transmitter. Features. Introduction. Figure 1.

How To Use Atmel'S Atmel Crypto Device For A Year On A Computer Or Cell Phone

AT89LP Flash Data Memory. Application Note. AT89LP Flash Data Memory API. 1. Introduction. 2. Theory of Operation. 2.1 Flash Memory Operation

AVR151: Setup and Use of the SPI. Introduction. Features. Atmel AVR 8-bit Microcontroller APPLICATION NOTE

Securing Host Operations with a Dedicated Cryptographic IC - CryptoCompanion

8-bit RISC Microcontroller. Application Note. AVR236: CRC Check of Program Memory

512 bit Read/Write Multi-purpose Contactless Identification Device

3-output Laser Driver for HD-DVD/ Blu-ray/DVD/ CD-ROM ATR0885. Preliminary. Summary

MF0ICU2. 1. General description. MIFARE Ultralight C. 1.1 Contactless energy and data transfer. 1.2 Anticollision. Rev May

AVR1321: Using the Atmel AVR XMEGA 32-bit Real Time Counter and Battery Backup System. 8-bit Microcontrollers. Application Note.

Gemalto Mifare 1K Datasheet

AVR245: Code Lock with 4x4 Keypad and I2C LCD. 8-bit Microcontrollers. Application Note. Features. 1 Introduction

AVR030: Getting Started with IAR Embedded Workbench for Atmel AVR. 8-bit Microcontrollers. Application Note. Features.

USER GUIDE EDBG. Description

ST19NP18-TPM-I2C. Trusted Platform Module (TPM) with I²C Interface. Features

MIFARE ISO/IEC PICC

APPLICATION NOTE. Atmel AVR443: Sensor-based Control of Three Phase Brushless DC Motor. Atmel AVR 8-bit Microcontrollers. Features.

8-bit Microcontroller. Application Note. AVR105: Power Efficient High Endurance Parameter Storage in Flash Memory

AT91 ARM Thumb Microcontrollers. Application Note. Interfacing a PC Card to an AT91RM9200-DK. Introduction. Hardware Interface

AN2866 Application note

Crypto- Authentication. High Level Security Models Application Note. Description 1. SHA-256

Atmel Innovative Silicon RFID IDIC Solutions

Application Note. 1. Introduction. 2. Associated Documentation. 3. Gigabit Ethernet Implementation on SAMA5D3 Series. AT91SAM ARM-based Embedded MPU

AVR ONE!... Quick-start Guide. EVK Windows 32104B AVR ONE! 02/10

8-bit RISC Microcontroller. Application Note. AVR182: Zero Cross Detector

AT89C5131A Starter Kit... Software User Guide

Two-wire Automotive Serial EEPROM AT24C01A AT24C02 AT24C04 AT24C08 (1) AT24C16 (2)

Measurement and Analysis Introduction of ISO7816 (Smart Card)

256K (32K x 8) Paged Parallel EEPROM AT28C256

USER GUIDE. ZigBit USB Stick User Guide. Introduction

AN1304. NFC Type MIFARE Classic Tag Operation. Application note PUBLIC. Rev October Document information

MODFLEX MINI GATEWAY ETHERNET USER S GUIDE

APPLICATION NOTE. AT16268: JD Smart Cloud Based Smart Plug Getting. Started Guide ATSAMW25. Introduction. Features

AVR106: C functions for reading and writing to Flash memory. 8-bit Microcontrollers. Application Note. Features. Introduction

NTAG213/215/216. The mechanical and electrical specifications of NTAG21x are tailored to meet the requirements of inlay and tag manufacturers.

Application Note. USB Microcontrollers. USB PC Drivers Based on Generic HID Class. 1. Introduction

Using RFID Techniques for a Universal Identification Device

APPLICATION NOTE. AT07175: SAM-BA Bootloader for SAM D21. Atmel SAM D21. Introduction. Features

Two-wire Serial EEPROM AT24C1024 (1)

AT88CK490 Evaluation Kit

Transcription:

1. Features One of a Family of Devices with User Memory of 1 Kbit to 64 Kbits Contactless 13.56 MHz RF Communications Interface ISO/IEC 14443-2:2001 Type B Compliant ISO/IEC 14443-3:2001 Type B Compliant Anticollision Protocol Command Set Optimized for Multicard RF Communications Tolerant of Type A Signaling for Multiprotocol Applications Integrated 82 pf Tuning Capacitor User EEPROM Memory 2 Kbits Configured as Four 64-byte (512-bit) User Zones Byte, Page, and Partial Page Write Modes Self-timed Write Cycle 256-byte (2-Kbit) Configuration Zone User-programmable Application Family Identifier (AFI) User-defined Anticollision Polling Response User-defined Keys and Passwords High-Security Features 64-bit Mutual Authentication Protocol (under license of ELVA) Encrypted Checksum Stream Encryption Four Key Sets for Authentication and Encryption Four Sets of Two 24-bit Passwords Password and Authentication Attempts Counters Selectable Access Rights by Zone Antitearing Function Tamper Sensors High Reliability Endurance: 100,000 Write Cycles Data Retention: 10 Years Operating Temperature: 40 C to +85 C 13.56 MHz CryptoRF EEPROM Memory 2 Kbits Summary 2. Description The CryptoRF family integrates a 13.56 MHz RF interface into a CryptoMemory, resulting in a contactless smart card with advanced security and cryptographic features. This device is optimized as a contactless secure memory, for RF smart cards, and secure data storage, without the requirement of an internal microprocessor. For communications, the RF interface utilizes the ISO/IEC 14443-2 and -3 Type B bit timing and signal modulation schemes, and the ISO/IEC 14443-3 Slot-MARKER Anticollision Protocol. Data is exchanged half duplex at a 106-kbit/s rate, with a two-byte CRC_B providing error detection capability. The maximum communication range between the reader antenna and contactless card is approximately 10 cm when used with an RFID reader that transmits the maximum ISO/IEC 14443-2 RF power level. The RF interface powers the other circuits; no battery is required. Full compliance with the ISO/IEC 14443-2 and -3 standards results in anticollision interoperability with the AT88RF020 2-Kbit RFID EEPROM product and provides both a proven RF communication interface and a robust anticollision protocol. Rev.

The contains 2 Kbits of user memory and 2 Kbits of configuration memory. The 2 Kbits of configuration memory contain four sets of read/write passwords, four crypto key sets, security access registers for each user zone, and password/key registers for each zone. The CryptoRF command set is optimized for a multicard RF communications environment. A programmable AFI register allows this IC to be used in numerous applications in the same geographic area with seamless discrimination of cards assigned to a particular application during the anticollision process. 3. Block Diagram Figure 3-1. Block Diagram RF Interface AC1 Command and Response EEPROM C Over Voltage Clamp Modulator Rectifier Regulator V DD Data Transfer VSS Password Verification AC2 Clock Extraction Data Extraction Frame Formatting and Error Detection Interface Anticollision Random Number Generator Authentication Encryption and Certification Unit 2

4. Communications All personalization and communication with this device is performed through the RF interface. The IC includes an integrated tuning capacitor, enabling it to operate with only the addition of a single external coil antenna. The RF communications interface is fully compliant with the electrical signaling and RF power specifications in ISO/IEC 14443-2:2001 for Type B only. Anticollision operation and frame formatting are compliant with ISO/IEC 14443-3:2001 for Type B only. ISO/IEC 14443 nomenclature is used in this specification where applicable. The following abbreviations are utilized throughout this document. Additional terms are defined in the section in which they are used. PCD Proximity Coupling Device: the reader/writer and antenna PICC Proximity Integrated Circuit Card: the tag/card containing the IC and antenna RFU Reserved for Future Use: any feature, memory location, or bit that is held as reserved for future use $ xx Hexadecimal Number: denotes a hex number xx (Most Significant Bit on left) 4.1 Anticollision Protocol When the PICC enters the 13.56 MHz RF field of the host reader (PCD), it performs a power on reset (POR) function and waits silently for a valid Type B polling command. The CryptoRF PICC processes the antitearing registers as part of the POR process. The PCD initiates the anticollision process by issuing an REQB or WUPB command. The WUPB command activates any card (PICC) in the field with a matching AFI code. The REQB command performs the same function but does not affect a PICC in the Halt state. The CryptoRF command set is available only after the anticollision process has been completed. 4.2 CRC Error Detection A two-byte CRC_B is required in each frame transmitted by the PICC or PCD to permit transmission error detection. The CRC_B is calculated on all of the command and data bytes in the frame. The SOF, EOF, start bits, stop bits, and EGT are not included in the CRC_B calculation. The two-byte CRC_B follows the data bytes in the frame. Figure 4-1. Location of the Two CRC_B Bytes within a Frame SOF K data bytes CRC1 CRC2 EOF 4.3 Type A Tolerance The RF Interface is designed for use in multiprotocol applications. It will not latch or lock up if exposed to Type A signals and will not respond to them. The PICC may reset in the presence of Type A field modulation but is not damaged by exposure to Type A signals. 3

5. User Memory The EEPROM user memory is divided into four user zones as shown in the memory map in Table 5-1. Multiple zones allow for different types of data or files to be stored in different zones. Access to the user zones is allowed only after security requirements have been met. These security requirements are defined by the user in the configuration memory during personalization of the device. The EEPROM memory page length is 16 bytes. Table 5-1. Memory Map Zone $0 $1 $2 $3 $4 $5 $6 $7 User 0 User 1 User 2 User 3 $00 64 Bytes $38 $00 64 Bytes $38 $00 64 Bytes $38 $00 64 Bytes $38 6. Configuration Memory The configuration memory consists of 2048 bits of EEPROM memory used for storing system data, passwords, keys, codes, and security-level definitions for each user zone. Access rights to the configuration zone are defined in the control logic and may not be altered by the user. These access rights include the ability to program certain portions of the configuration memory and then lock the data written through use of the security fuses. 6.1 Security Fuses There are three fuses on the device that must be blown during the device personalization process. Each fuse locks certain portions of the configuration memory as OTP memory. Fuses are designated for the module manufacturer, card manufacturer and card issuer and must be blown in sequence. 4

7. Communication Security 7.1 Security Methodology Communication between the PICC and reader operates in three basic modes. Standard mode is the default mode for the device after power-up and anticollision. Authentication mode is activated by a successful authentication sequence. Encryption mode is activated by a successful encryption activation, following a successful authentication. Table 7-1. Configuration Security Modes Data Integrity Mode User Data Passwords Check Standard clear clear MDC (1) Authentication clear encrypted MAC (2) Encryption encrypted encrypted MAC (2) Notes: 1. Modification Detection Code 2. Message Authentication Code Figure 7-1. Security Methodology Device (card) Card Number VERIFY A Compute Challenge B Challenge B Host (reader) COMPUTE Challenge A Challenge A VERIFY B Check Password (RPW) DATA Checksum (CS) Check Password (WPW) VERIFY CS Read Password (RPW) VERIFY CS (optional) Write Password (WPW) DATA CS Write DATA 7.2 Memory Access Depending on the device configuration, the host will carry out the authentication protocol and/or present different passwords for each operation: read or write. To insure security between the different user zones (multiapplication card), each zone can use a different set of passwords. A specific attempts counter for each password and for the authentication provides protection against systematic attacks. 5

8. Security Operations 8.1 Antitearing In the event of a power loss during a write cycle, the integrity of the device s stored data may be recovered. This function is optional: the host may choose to activate the antitearing function depending on application requirements. When antitearing is active, write commands take longer to execute since more write cycles are required to complete them. Data writes are limited to 8- byte pages when antitearing is active. Data is written first to a buffer zone in EEPROM instead of to the intended destination address, but with the same access conditions. The data is then written to the required location. If this second write cycle is interrupted due to a power loss, the device will automatically recover the data from the buffer zone at the next power-up. 8.2 Password Verification Passwords may be used to protect user zone read and/or write access. When a password is presented using the Check Password command, it is memorized and active until power is removed unless a new password is presented or a valid DESELECT or IDLE command is received. Only one password is active at a time, but write passwords also give read access. 8.3 Authentication Protocol The access to a user zone may be protected by an authentication protocol in addition to password dependent rights. Passwords are encrypted in authentication mode. The authentication success is memorized and active as long as the chip is powered, unless a new authentication is initialized or a valid DESELECT or IDLE command is received. If the new authentication request is not validated, the card loses its previous authentication and it must be presented again. Only the last request is memorized. 8.4 Encryption 8.5 Checksum The data exchanged between the card and the reader during Read, Write, and Check Password commands may be encrypted to ensure data confidentiality. The issuer may choose to protect the access to a user zone with an encryption key by settings made in the configuration memory. In that case, activation of the encryption mode is required in order to read/write data in the zone. The encryption activation success is memorized and active as long as the chip is powered, unless a new initialization is initiated or a valid DESELECT or IDLE command is received. If the new encryption activation request is not validated, the card will no longer encrypt data during read operations nor will it decrypt data received during write or Check Password operations. The PICC implements a data validity check function in the form of a checksum. The checksum may function in standard or cryptographic mode. In the standard mode, the checksum is optional and may be used for transmission error detection. The cryptographic mode is more powerful since it provides data origin authentication capability in the form of a Message Authentication Code (MAC). To write data to the device, the host is required to compute a valid MAC and provide it to the device. If after an ingoing command the device computes a MAC different from the 6

MAC transmitted by the host, not only is the command abandoned but the cryptographic mode is also reset. A new authentication is required to reactivate the cryptographic mode. 8.6 Initial Device Programming CryptoRF is delivered with all security features disabled. To program the polling response or enable the security features of CryptoRF the device must be personalized by programming several registers. This is accomplished by programming the configuration memory using simple write and read commands. 8.7 Transport Password To gain access to the configuration memory, a transport password known as the secure code must be presented using the Check Password command. The secure code for is $20 C2 8B. 9. Tuning Capacitance 10. Reliability The capacitance between the coil pins AC1 and AC2 is 82 pf nominal and may vary ±10% over temperature and process variation. Table 10-1. Reliability Parameter Min Typ Max Units Write endurance 100,000 Write Cycles Data retention 10 Years 11. Mechanical 11.1 Engineering Samples Sample Code Sample Description Maximum Range -MR1 R Module, 82 pf, on 35 mm tape -L01B RF Smart Card, ID-1 size, PVC 8 10 cm -MU1 RFID Tag, 17 mm diameter, on 35 mm tape 1 3 cm -MS1 RFID Tag, 10 x 20 mm size, on 35 mm tape 10 15 mm 7

11.2 Ordering Information Ordering Code Package Tuning Capacitor Temperature Range -MR1 R Module 82 pf Commercial (0 C to 70 C) -WA1 6 mil wafer, 150 mm diameter 82 pf Industrial ( 40 C to 85 C) Package Type R Module Description 2- lead RF Smart Card Module, XOA2 style, RoHS compliant 11.3 Packaging Information Ordering Code: AT88SCxxxxCRF-MR1 Module Size: M5 Dimension: 5.06 x 8.00 [mm] Glob Top : Square - 4.8 x 5.1 [mm] Thi ckness: 0.38 [mm] Pitch: 9.5 [mm] 8

Headquarters International Atmel Corporation 2325 Orchard Parkway San Jose, CA 95131 USA Tel: 1(408) 441-0311 Fax: 1(408) 487-2600 Atmel Asia Unit 1-5 & 16, 19/F BEA Tower, Millennium City 5 418 Kwun Tong Road Kwun Tong, Kowloon Hong Kong Tel: (852) 2245-6100 Fax: (852) 2722-1369 Atmel Europe Le Krebs 8, Rue Jean-Pierre Timbaud BP 309 78054 Saint-Quentin-en- Yvelines Cedex France Tel: (33) 1-30-60-70-00 Fax: (33) 1-30-60-71-11 Atmel Japan 9F, Tonetsu Shinkawa Bldg. 1-24-8 Shinkawa Chuo-ku, Tokyo 104-0033 Japan Tel: (81) 3-3523-3551 Fax: (81) 3-3523-7581 Product Contact Web Site www.atmel.com Technical Support securerf@atmel.com Sales Contact www.atmel.com/contacts Literature Requests www.atmel.com/literature Disclaimer: The information in this document is provided in connection with Atmel products. No license, express or implied, by estoppel or otherwise, to any intellectual property right is granted by this document or in connection with the sale of Atmel products. EXCEPT AS SET FORTH IN ATMEL S TERMS AND CONDI- TIONS OF SALE LOCATED ON ATMEL S WEB SITE, ATMEL ASSUMES NO LIABILITY WHATSOEVER AND DISCLAIMS ANY EXPRESS, IMPLIED OR STATUTORY WARRANTY RELATING TO ITS PRODUCTS INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NON-INFRINGEMENT. IN NO EVENT SHALL ATMEL BE LIABLE FOR ANY DIRECT, INDIRECT, CONSEQUENTIAL, PUNITIVE, SPECIAL OR INCIDEN- TAL DAMAGES (INCLUDING, WITHOUT LIMITATION, DAMAGES FOR LOSS OF PROFITS, BUSINESS INTERRUPTION, OR LOSS OF INFORMATION) ARISING OUT OF THE USE OR INABILITY TO USE THIS DOCUMENT, EVEN IF ATMEL HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. Atmel makes no representations or warranties with respect to the accuracy or completeness of the contents of this document and reserves the right to make changes to specifications and product descriptions at any time without notice. Atmel does not make any commitment to update the information contained herein. Unless specifically provided otherwise, Atmel products are not suitable for, and shall not be used in, automotive applications. Atmel s products are not intended, authorized, or warranted for use as components in applications intended to support or sustain life. 2009 Atmel Corporation. All rights reserved. Atmel, Atmel logo and combinations thereof, Everywhere You Are, CryptoMemory, CryptoRF and others, are registered trademarks or trademarks of Atmel Corporation or its subsidiaries. Innovatron is a registered trademark of Innovatron. Other terms and product names may be trademarks of others.