
AT88RF1354 SPI User Guide For CryptoRF
®
2.5.2
Example
String Decode > O0003 Host sends three bytes thru microcontroller to AT88RF1354 serial port.
>
01
AT88RF1354 POLL SINGLE command. Poll once for Type B PICC's.
>
00
To PICC: AFI. A $00 activiates all Type B PICC's.
>
08
To PICC: PARAM. Specify a WUPB when bit [3] is 1b, and 2N anti-collision slots where N is bits [2:0].
The AT88RF1354 automatically appends RF communication CRC bytes to the transmitted data stream.
Wait for AT88RF1354 ISTAT pin state.
ISTAT goes High.
The AT88RF1354 buffer has data ready. Data must be read before the next command can be issued.
String Decode > I000D Host gets thirteen bytes from AT88RF1354 buffer.
>
00
AT88RF1354 Response: $00 (No RF communication error bits set in the EREG register).
>
50
PICC Response: $50 (Success).
>
FF
PICC Response: PUPI 0 -- CryptoRF System Zone Byte $00
>
FF
PICC Response: PUPI 1 -- CryptoRF System Zone Byte $01
>
FF
PICC Response: PUPI 2 -- CryptoRF System Zone Byte $02
>
FF
PICC Response: PUPI 3 -- CryptoRF System Zone Byte $03
>
FF
PICC Response: APP 0 -- CryptoRF System Zone Byte $04
>
FF
PICC Response: APP 1 -- CryptoRF System Zone Byte $05
>
FF
PICC Response: APP 2 -- CryptoRF System Zone Byte $06
>
22
PICC Response: APP 3 -- CryptoRF System Zone Byte $07 (22 = AT88SC0404CRF density code)
>
00
PICC Response: Protocol 1 -- $00
>
10
PICC Response: Protocol 2 -- CryptoRF System Zone byte $08
>
51
PICC Response: Protocol 3 -- $51
The AT88RF1354 automatically strips the RF communication CRC bytes.
ISTAT stays Low.
The AT88RF1354 buffer is empty. The AT88RF1354 will now accept a new command.
2.5.3
Operation
This command performs one polling sequence with “N” slots using the ISO/IEC14443-3 Type B
commands REQB, WUPB, and Slot-MARKER. The CPR0 default Communication Protocol
settings are used by this command.
A polling sequence consists of either an REQB or WUPB command, followed by the number of
Slot-MARKER commands indicated by “N”. When a card response not containing a CRC error is
received, then the polling sequence is stopped and the response is returned to the host.
Subsequent commands will require the PUPI data read from the PICC. A user should expect
each PICC will contain a unique PUPI.
A system should also utilize the density code stored in APP byte 3. The density code information
can easily be used to identify different CryptoRF user memory sizes. Refer to the
CryptoRF
Specification
for a complete list of CryptoRF density codes.
2-10
8586A—RFID—5/09