Documente Academic
Documente Profesional
Documente Cultură
HCS360
• Four button inputs S1 2 7 LED
- 15 functions available
S2 3 6 DATA
• Selectable baud rate
• Automatic code word completion VSS
S3 4 5
• Battery low signal transmitted to receiver
• Nonvolatile synchronization data
• PWM and Manchester modulation
BLOCK DIAGRAM
Other Oscillator
Power
latching
• Easy-to-use programming interface RESET circuit Controller and
switching
• On-chip EEPROM LED
• On-chip oscillator and timing components LED driver
• Button inputs have internal pull-down resistors
• Current limiting on LED output
• Minimum component count EEPROM Encoder
Typical Applications S3 S2 S1 S0
Production HCS360
Programmer Transmitter
Serial Number EEPROM Array
Serial Number
Crypt Key
Sync Counter
Key .
Manufacturer’s Generation Crypt .
Code Algorithm Key .
The 16-bit synchronization counter is the basis behind A transmitter must first be ‘learned’ by the receiver
the transmitted code word changing for each transmis- before its use is allowed in the system. Learning
sion; it increments each time a button is pressed. Due includes calculating the transmitter’s appropriate crypt
to the code hopping algorithm’s complexity, each incre- key, decrypting the received hopping code and storing
ment of the synchronization value results in greater the serial number, synchronization counter value and
than 50% of the bits changing in the transmitted code crypt key in EEPROM.
word. In normal operation, each received message of valid
Figure 1-2 shows how the key values in EEPROM are format is evaluated. The serial number is used to deter-
used in the encoder. Once the encoder detects a button mine if it is from a learned transmitter. If from a learned
press, it reads the button inputs and updates the syn- transmitter, the message is decrypted and the synchro-
chronization counter. The synchronization counter and nization counter is verified. Finally, the button status is
crypt key are input to the encryption algorithm and the checked to see what operation is requested. Figure 1-3
output is 32 bits of encrypted information. This data will shows the relationship between some of the values
change with every button press, its value appearing stored by the receiver and the values received from
externally to ‘randomly hop around’, hence it is referred the transmitter.
to as the hopping portion of the code word. The 32-bit
hopping code is combined with the button information
and serial number to form the code word transmitted to
the receiver. The code word format is explained in
greater detail in Section 4.2.
A receiver may use any type of controller as a decoder,
but it is typically a microcontroller with compatible firm-
ware that allows the decoder to operate in conjunction
with an HCS360 based transmitter. Section 7.0
provides detail on integrating the HCS360 into a sys-
tem.
EEPROM Array
KEELOQ®
Crypt Key Encryption
Algorithm
Sync Counter
Serial Number
Transmitted Information
1 Received Information
EEPROM Array
Button Press Serial Number 32 Bits of Manufacturer Code
Information Encrypted Data
3
KEELOQ®
Decryption
Algorithm
Decrypted
Synchronization Check for
4 Match
Counter
Perform Function
5 Indicated by
button press
Tx out
Update Sync Info
S2 DATA
S3 VSS
Encrypt With
Crypt Key
Five button remote control (Note1)
TABLE 3-1: EEPROM MEMORY MAP 3.3 SEED_0, SEED_1, and SEED_2
(Seed Word)
WORD
MNEMONIC DESCRIPTION The three word (48 bits) seed code will be transmitted
ADDRESS
when seed transmission is selected. This allows the sys-
0 KEY_0 64-bit crypt key tem designer to implement the Secure Learn feature or
(word 0) LSb’s use this fixed code word as part of a different key genera-
1 KEY_1 64-bit crypt key tion/tracking process or purely as a fixed code transmis-
(word 1) sion.
2 KEY_2 64-bit crypt key
(word 2) Note: Since SEED2 and SYNC_B share the
same memory location, Secure Learn and
3 KEY_3 64-bit crypt key
Independent mode transmission (including
(word 3) MSb’s
IR mode) are mutually exclusive.
4 SYNC_A 16-bit synch counter
5 SYNC_B/ 16-bit synch counter B 3.4 SER_0, SER_1
SEED_2 or Seed value (word 2)
(Encoder Serial Number)
6 RESERVED Set to 0000H
7 SEED_0 Seed Value SER_0 and SER_1 are the lower and upper words of
(word 0) LSb’s the device serial number, respectively. There are 32
8 SEED_1 Seed Value bits allocated for the Serial Number and a selectable
(word 1) MSb’s configuration bit determines whether 32 or 28 bits will
9 SER_0 Device Serial Number be transmitted. The serial number is meant to be
(word 0) LSb’s unique for every transmitter.
10 SER_1 Device Serial Number
(word 1) MSb’s
11 CONFIG Configuration Word
The Configuration Word is a 16-bit word stored in TABLE 3-4: BAUD RATE SELECTION
EEPROM array that is used by the device to store
information used during the encryption process, as well MOD BSEL 1 BSEL 0 TE Unit
as the status of option configurations. Further
1 0 0 800 us
explanations of each of the bits are described in the
following sections. 1 0 1 400 us
1 1 0 400 us
TABLE 3-2: CONFIGURATION WORD. 1 1 1 200 us
3.5.2 BSEL 1, 0
BAUD RATE SELECTION
BSEL 1 and BSEL 0 determine the baud rate according
to Table 3-3 when PWM modulation is selected.
67 bits
of Data
XSER=1 Transmitted
Fixed Code Portion of Transmission Encrypted Portion of Transmission
Encrypt
Number of Code
Time Before Delay Mode Time Before Delay Mode
BSEL 1 BSEL 0 Words before Delay
(MOD = 0) (MOD = 1)
Mode
0 0 28 ≈ 2.9s ≈ 5.1s
0 1 56 ≈ 3.1s ≈ 6.4s
1 0 28 ≈ 1.5s ≈ 3.2s
1 1 56 ≈ 1.7s ≈ 4.5s
3.5.11 TIMO: TIME-OUT the LED is turned off. Current consumption will be
OR AUTO-SHUTOFF higher than in Standby mode since current will flow
through the activated input resistors. This state can be
If TIMO = 1, the time-out is enabled. Time-out can be exited only after all inputs are taken low. TIMO = 0, will
used to terminate accidental continuous transmissions. enable continuous transmission (Table 3-7).
When time-out occurs, the PWM output is set low and
Maximum Number of
Time Before Time-out Time Before Time-out
BSEL 1 BSEL 0 Code Words
(MOD = 0) (MOD = 1)
Transmitted
0 0 256 ≈ 26.5s ≈ 46.9
0 1 512 ≈ 28.2s ≈ 58.4
1 0 256 ≈ 14.1s ≈ 29.2
1 1 512 ≈ 15.7s ≈ 40.7
Counter
1 0 0 0 1 A A
2 0 0 1 0 A A
3 0 0 1 1 A A If SEED = 1, transmit seed after delay.
4 0 1 0 0 A A
5 0 1 0 1 A A
6 0 1 1 0 A A
7 0 1 1 1 A A
8 1 0 0 0 A B
9 1 0 0 1 A B If SEED = 1, transmit seed immediately.
10 1 0 1 0 A B
11 1 0 1 1 A B
12 1 1 0 0 A B(1)
13 1 1 0 1 A B(1)
14 1 1 1 0 A B(1)
15 1 1 1 1 A B(1)
Note 1: IR mode
TE TE TE
LOGIC "0"
1 16
TE TE
LOGIC "0"
LOGIC "1"
5.6 LED Output Operation TABLE 5-1: VLOW AND LED VS. VDD
During normal transmission the LED output is LOW Approximate VLOW Bit LED Operation*
while the data is being transmitted and high during the Supply Voltage
guard time. Two voltage indications are combined into
Max →3.8V 0 Normal
one bit: VLOW. Table 5-1 indicates the operation value
of VLOW while data is being transmitted. 3.8V →2.2V 1 Flashing
2.2V →Min 0 Normal
Note 1: Unused button inputs to be held to ground during the entire programming sequence.
The VDD pin must be taken to ground after a program/verify cycle.
2: The VDD pin must be taken to ground after a Program/Verify cycle.
S1
Note: A Verify sequence is performed only once immediately after the Program cycle.
TTD
TDB
PWM Code Code Code Code Code
Output Word Word Word Word Word
1 2 3 4 n
TTO
Button
Input
Sn
LOGIC "0"
LOGIC "1"
50% Duty Cycle
Preamble TBP
1 16
Bit 0 Bit 1 Bit 30 Bit 31 Bit 32 Bit 33 Bit 58 Bit 59 Bit 60 Bit 61 Bit 62 Bit 63 Bit 64 Bit 65 Bit 66
LOGIC "0"
LOGIC "1"
4 x TE Data Word
31 x TE Preamble Header Transmission
1.0
0.9
0.8
0.7
TE Min.
0.6
-50 -40 -30 -20 -10 0 10 20 30 40 50 60 70 80 90
Temperature ° C
XXXXXXXX HCS360
XXXXXNNN XXXXXNNN
YYWW 0025
XXXXXXX HCS360
XXXYYWW XXX0025
NNN NNN
Note: In the event the full Microchip part number cannot be marked on one line, it will
be carried over to the next line thus limiting the number of available characters
for customer specific information.
* Standard PIC MCU device marking consists of Microchip part number, year code, week code, and
traceability code. For PIC MCU device marking beyond this, certain price adders apply. Please check
with your Microchip Sales Office. For QTP devices, any special marking adders are included in QTP
price.
3
&'
!&" &4# *!(!!&
4%&
&#&
&&255***'
'54
NOTE 1
E1
1 2 3
D
E
A A2
A1 L
c
e
b1 eB
b
6&! 7,8.
'!
9'&! 7 7: ;
7"')
%! 7 <
& 1,
&
& = =
##4
4!! -
1!&
& = =
"# &
"# >#& . - -
##4>#& . <
: 9& -< -?
&
& 9 -
9#
4!! <
6 9#>#& ) ?
9
* 9#>#& ) <
:
*+ 1 = = -
!"#$%&" ' ()"&'"!&)
&#*&&&#
+%&, & !&
- '!
!#.#
&"#'
#%!
& "!
!
#%!
& "!
!!
&$#/ !#
'!
#&
.0
1,21!'!
&$& "!
**&
"&&
!
* ,<1
Note: For the most current package drawings, please see the Microchip Packaging Specification located at
http://www.microchip.com/packaging
Note: For the most current package drawings, please see the Microchip Packaging Specification located at
http://www.microchip.com/packaging
!
""#$%& !'
3
&'
!&" &4# *!(!!&
4%&
&#&
&&255***'
'54
From: Name
Company
Address
City / State / ZIP / Country
Telephone: (_______) _________ - _________ FAX: (______) _________ - _________
Application (optional):
Would you like a reply? Y N
Questions:
2. How does this document meet your hardware and software development needs?
3. Do you find the organization of this document easy to follow? If not, why?
4. What additions to the document do you think would enhance the structure and subject?
5. What deletions from the document could be made without affecting the overall usefulness?
HCS360 — /P
Package: P = Plastic DIP (300 mil Body), 8-lead
SN = Plastic SOIC (150 mil Body), 8-lead
Temperature Blank = 0°C to +70°C
Range: I = –40°C to +85°C
Device: HCS360 Code Hopping Encoder
HCS360T Code Hopping Encoder (Tape and Reel)
• Microchip believes that its family of products is one of the most secure families of its kind on the market today, when used in the
intended manner and under normal conditions.
• There are dishonest and possibly illegal methods used to breach the code protection feature. All of these methods, to our
knowledge, require using the Microchip products in a manner outside the operating specifications contained in Microchip’s Data
Sheets. Most likely, the person doing so is engaged in theft of intellectual property.
• Microchip is willing to work with the customer who is concerned about the integrity of their code.
• Neither Microchip nor any other semiconductor manufacturer can guarantee the security of their code. Code protection does not
mean that we are guaranteeing the product as “unbreakable.”
Code protection is constantly evolving. We at Microchip are committed to continuously improving the code protection features of our
products. Attempts to break Microchip’s code protection feature may be a violation of the Digital Millennium Copyright Act. If such acts
allow unauthorized access to your software or other copyrighted work, you may have a right to sue for relief under that Act.
ISBN: 978-1-61341-224-4