鈥?/div>
2.8
Comparison unsuccessful
Wrong command
Wrong number of command clock pulses
Write/erase access to already protected bytes
Rewriting and erasing of a bit in the protection memory
Coding of the Chip
Due to security purposes every chip is irreversibly coded by a scheme. By this way fraud and
misuse is excluded. The relevant data are programmed in the memory area from address 0 to 31.
Afterwards the associated protection bits are programmed. As an example,
figures 12
and
13
show
ATR and Directory Data of Structure 1. When delivered, ATR header, ICM and ICT are
programmed. Siemens programs also the AID. The AID (Application IDentifier) consists of 5 byte
RID (Registered application provider IDentifier) administered by a national registration authority and
of up to 11 byte PIX (Proprietary application Identifier eXtension). There are two possibilities: the
customers AID or Siemens AID (only for sample quantities). Depending on the agreement between
the customer and Siemens ICCF can be also programmed before delivery.
Semiconductor Group
23