Qdatasheet_Logo
Integrated circuits, Transistor, Semiconductors Search and Datasheet PDF Download Site

SRTAG2K-D View Datasheet(PDF) - STMicroelectronics

Part Name
Description
MFG CO.
'SRTAG2K-D' PDF : 51 Pages View PDF
Functional procedures
7
Functional procedures
SRTAG2K-D
This section describes some procedure to access the memory or manage its protection.
7.1
Selection of an NDEF message
The RF host shall use this procedure to detect the NDEF message inside an SRTAG2K-D.
The NDEF detection procedure is as follows:
1. Open an RF session
2. Send the SelectNDEFTagApplication command
3. Select the CC file
4. Read the CC file
5. Select the NDEF file.
7.2
Reading of an NDEF message
The RF host executes the NDEF read procedure to read the NDEF file.
1. Detect successfully the NDEF file using the NDEF detection procedure
2. Check that the read access without any security is granted for the NDEF file from the
information provided by the CC file
3. Select the NDEF file
4. Read the NDEF file.
7.3
Reading a locked NDEF file
The RF host executes this procedure to read an NDEF file which has been locked
previously.
1. Select the NDEF Tag Application
2. Select the NDEF file
3. Verify the Read password by using the Verify command
4. Read the data in the NDEF file.
7.4
Locking an NDEF file
The RF host executes this procedure to protect an NDEF file.
1. Select the NDEF Tag Application
2. Check the right access provided by the CC file
3. Select the NDEF file
4. Transmit the NDEF file Write password by using the Verify command
5. Lock the NDEF file by sending the Enable verification command.
40/51
DocID025446 Rev 3
Share Link: GO URL

All Rights Reserved © qdatasheet.com  [ Privacy Policy ] [ Contact Us ]