DS2775G+T&R Maxim Integrated Products, DS2775G+T&R Datasheet - Page 34

IC FUEL GAUGE LI+ 2CELL 14-TDFN

DS2775G+T&R

Manufacturer Part Number
DS2775G+T&R
Description
IC FUEL GAUGE LI+ 2CELL 14-TDFN
Manufacturer
Maxim Integrated Products
Datasheet

Specifications of DS2775G+T&R

Function
Fuel, Gas Gauge/Monitor
Battery Type
Lithium-Ion (Li-Ion), Lithium-Polymer (Li-Pol)
Voltage - Supply
4 V ~ 9.2 V
Operating Temperature
-20°C ~ 70°C
Mounting Type
Surface Mount
Package / Case
14-TDFN
Lead Free Status / RoHS Status
Lead free / RoHS Compliant
2-Cell, Stand-Alone, Li+ Fuel-Gauge IC with
Protector and Optional SHA-1 Authentication
Challenge command. The host then issues the Compute
MAC or Compute MAC with ROM ID command. The
MAC is computed per FIPS 180, and then returned as a
160-bit serial stream, beginning with the LSb.
This command writes the 64-bit challenge to the
DS2776/DS2778. The LSB of the 64-bit data argument
can begin immediately after the MSB of the command
has been completed. If more than 8 bytes are written,
the final value in the Challenge register is indetermi-
nate. The Write Challenge command must be issued
prior to every Compute MAC or Compute Next Secret
command for reliable results.
This command initiates an SHA-1 computation without
including the ROM ID in the message block. Because
the ROM ID is not used, this command allows the use
of a master secret and MAC response independent of
the ROM ID. The DS2776/DS2778 computes the MAC
in t
After the MAC computation is complete, the host must
write eight write-zero time slots and then issue 160 read
time slots to receive the 20-byte MAC. See Figure 25 for
command timing.
This command is structured the same as the Compute
MAC without ROM ID, except that the ROM ID is includ-
ed in the message block. With the ROM ID unique to
each DS2776/DS2778 included in the MAC computation,
use of a unique secret in each token and a master secret
in the host device is allowed. Refer to Application Note
1099: White Paper 4: Glossary of 1-Wire SHA-1 Terms for
more information. See Figure 25 for command timing.
Table 10. Authentication Function Commands
34
Write Challenge
Compute MAC without ROM ID (and
Return MAC for the DS2776 only)
Compute MAC with ROM ID (and Return
MAC for the DS2776 only)
Read ROM ID (DS2778 only)
Read MAC (DS2778 only)
SHA
______________________________________________________________________________________
DS2776/DS2778 Authentication
after receiving the last bit of this command.
Compute MAC Without ROM ID [36h]
Compute MAC with ROM ID [35h]
COMMAND
Write Challenge [0Ch]
Commands
HEX
0Ch
3Ah
36h
35h
39h
Writes 64-bit challenge for SHA-1 processing. Required prior to issuing
Compute MAC and Compute Next Secret commands.
Computes hash of the message block with logical 1s in place of the ROM
ID. (Returns the 160-bit MAC for the DS2776 only.)
Computes hash of the message block including the ROM ID. (Returns the
160-bit MAC for the DS2776 only.)
Returns the ROM ID (DS2778 only).
Returns the 160-bit MAC (DS2778 only).
Table 10 summarizes SHA-1-related commands used
while authenticating a battery or peripheral device. The
Secret Management Function Commands section
describes four additional commands for clearing, com-
puting, and locking of the secret.
Table 11 summarizes all the secret management func-
tion commands.
This command sets the 64-bit secret to all 0s (0000
0000 0000 0000h). The host must wait for t
DS2776/DS2778 to write the new secret value to
EEPROM. See Figure 28 for command timing.
This command initiates an SHA-1 computation of the
MAC and uses a portion of the resulting MAC as the
next or new secret. The MAC computation is performed
with the current 64-bit secret and the 64-bit challenge.
Logical 1s are loaded in place of the ROM ID. The out-
put MAC’s 64 bits are used as the new secret value.
The host must allow t
the SHA calculation to complete, then wait t
DS2776/DS2778 to write the new secret value to
EEPROM. See Figure 26 for command timing.
This command initiates an SHA-1 computation of the
MAC and uses a portion of the resulting MAC as the
next or new secret. The MAC computation is performed
with the current 64-bit secret, the 64-bit ROM ID, and
the 64-bit challenge. The output MAC’s 64 bits are used
as the new secret value. The host must allow t
issuing this command for the SHA calculation to com-
plete, then wait t
Compute Next Secret with ROM ID [33h]
Secret Management Function
FUNCTION
Compute Next Secret Without
EEC
SHA
for the DS2776/DS2778 to write
after issuing this command for
Clear Secret [5Ah]
Commands
ROM ID [30h]
EEC
EEC
SHA
for the
for the
after

Related parts for DS2775G+T&R