HT-CM400 NXP Semiconductors, HT-CM400 Datasheet - Page 103

no-image

HT-CM400

Manufacturer Part Number
HT-CM400
Description
Ht Cm400; Ht Rm440 Family; Ht Rm800 Family Interface Protocol Reader - Host
Manufacturer
NXP Semiconductors
Datasheet
98-02-10
Rev. 1.0
Security Considerations
6.2 Data Privacy
The use of cryptography (Stream Cypher), mutual authentication, and password verification
prevents monitoring and copying the data channel. Therefore, the area of the transponder that
only can be accessed enciphered is called “secret area“.
To make use of cryptography you need secret data: keys (HITAG 1 and HITAG 2 transponders)
and logdata (HITAG 1 transponders).
The transponders and the read/write device are provided with identical transport keys and
transport logdata by Philips Semiconductors so that you can start operating them right away.
In order to offer our OEM clients high flexibility, the configuration of the transponder memory,
password, keys and logdata can be changed.
We strictly recommend to rigorously restrict these possibilities for the end customers (e.g. for
HITAG 1 transponders by setting the Configuration Page to read only, setting password, keys and
logdata to neither read nor write).
Page 103 (104)
Htswp.doc/HS

Related parts for HT-CM400