TB001 MICROCHIP [Microchip Technology], TB001 Datasheet - Page 6

no-image

TB001

Manufacturer Part Number
TB001
Description
Manufacturer
MICROCHIP [Microchip Technology]
Datasheet

Available stocks

Company
Part Number
Manufacturer
Quantity
Price
Part Number:
TB001(TC4847)-7R8
Quantity:
100 150
AN665
Software Implementation
The software is composed of three short code
segments:
• Receive routine for the K
• Keyboard Emulation Routines
• Main loop routine.
Receive Routine for the HCS300 Encoder
( RECEIVE )
The RECEIVE routine gathers the first 64 bits transmit-
ted by the HCS300, ignoring the last two bits (repeat
and battery status) as they carry no useful information
for this application, and packs them into a 8-bytes
buffer (Buffer0…Buffer7).
Keyboard Emulation Routines
( Sendbit, SendKey )
These implement the transmission of the key scan
codes according to the IBM-PC/AT keyboard protocol.
Main Loop
While the CMOS switch connects the PC to the key-
board clock and data lines, the LED output line is con-
tinuously polled to detect the activation of the HCS300
When the LED line goes low, the CMOS switch is acti-
vated to isolate the clock and data lines from the key-
board. The RECEIVE routine is called.
Upon successfully receiving a transmission, a loop is
entered where 16 hex digits from the receive buffer are
transmitted as a sequence of key press and key
release messages, separated by appropriate delays
repetitively calling the SENDKEY subroutine.
The software has been developed in the simplest pos-
sible form and, therefore, is open to a number of opti-
mizations. For example:
• The PIC12C508 could be put to “sleep” to further
• The encoder could be removable and its pres-
• For simplicity, the presented RECEIVE routine
• A second code word could be compared with the
DS00665A-page 6
Note:
reduce power consumption.
ence/activation should be properly detected.
requires a 400 m s transmission speed being con-
figured in the encoder, while a more flexible multi-
baud rate routine can be used as presented in
various other application notes.
first code word received to recognize transmission
errors (although highly improbable when the
encoder is wired to the PIC12508), since there is
no decryption, there is no other means to tell that
the transmission has not been corrupted.
Any combination of its four input lines after
debouncing activates the encoder.
EE
L
OQ
HCS300 Encoder
Decoding Options
A code hopping password can be used to validate
access to a wide variety of electronic services provid-
ing the recipient application (typically, it will be some
software running on a server) is capable of following
some simple decryption and verification steps. The
fixed unencrypted part of the code (last 8 digits) can be
used to identify the user (7 digits) and the function acti-
vated on the encoder (1 out of 15, corresponding to the
last digit).
The hopping part has to be decrypted using the appro-
priate 64-bit decryption key. Depending on the desired
level of security, many different key generation and
management techniques can be adopted. For exam-
ple, the key could be deduced by the User ID and a
Manufacturer’s Key, by the “seed” code of the encoder
or could simply be a fixed 64-bit constant.
Learning techniques can also be applied so that the
application
required keys and builds a database of users, ID codes,
and decryption keys. For a further analysis, consult the
following literature:
.
AN645
AN662
AN663
TB001
TB003
PIC16C57 Based Code Hopping Secu-
rity System (DS00645)
K
Secure Learn (DS00662)
K
(DS00663)
An Introduction to KeeLoq Code Hopping
(DS91000A)
An Introduction to K
(DS91002A).
EE
EE
actually
L
L
OQ
OQ
Code Hopping Decoder Using
Simple Code Hopping Decoder
autonomously
ã 1997 Microchip Technology Inc.
EE
L
OQ
Code Hopping
acquires
the

Related parts for TB001