Part Number Hot Search : 
42010 N3292X ET206 BF246A WR1210 AC100 DPO4034B BA2771
Product Description
Full Text Search
 

To Download TB003 Datasheet File

  If you can't view the Datasheet, Please click here to try to view without PDF Reader .  
 
 


  Datasheet File OCR Text:
  1996 microchip technology inc. ds91002a-page 1 introduction remote control systems remote control via rf or ir is popular for many appli- cations, including vehicle alarms and automatic garage doors. conventional remote control systems are based on unidirectional transmission and have limited secu- rity. more sophisticated devices based on bi-directional transmission are also available but, because of their high cost and certain practical disadvantages, they are not widely used in commercial remote control devices. the popular unidirectional transmission systems cur- rently have two very important security shortcomings: the codes they transmit are usually ?ed and the num- ber of possible code combinations is relatively small. either of these shortcomings can lead to unauthorized access. code scanning the limited number of possible combinations available in most remote control systems makes it possible to trans- mit all possible combinations in a relatively short time. a hand held microprocessor-based system for this pur- pose (called a code scanner) can easily be constructed. in systems using eight dip switches (256 combina- tions), this scanning process can typically be accom- plished in less than 32 seconds (when trying eight combinations per second). even in systems using 16-bit keys (yielding roughly 65,000 combinations), only 2.25 hours would be required to try all possible combinations. it should also be noted that the scanner may gain access in far less than this maximum time the average time would in fact be half of the total time. scanning is counteracted by increasing the number of possible code combinations. a 66-bit code will yield 7.3 x 10 19 combination and will take 2.3 x 10 11 years to scan. code grabbing a far easier way of gaining unauthorized access to a security system is freely available?uch a unit is being advertised as a tool for the ?egal repossession of vehi- cles. to understand its operation, it is useful to know something about remote controls. author: kobus marneweck microchip technology inc. a remote control transmitter of the type normally used in vehicle security systems, is nothing but a small radio transmitter that transmits a code number on a certain frequency. this code number is normally generated by an integrated circuit encoder. the transmit frequency is normally ?ed by legislation within a particular country, enabling anybody to build a simple receiver that can receive signals from all such transmitters. it is a simple matter to build a circuit to record such transmissions captured by the receiver. such a device is known as a code or key grabber. a would-be vehicle thief would typically lurk in a parking lot, waiting until a vehicle owner arms his alarm with a remote control. the key grabber would capture the transmitted code, enabling the thief to retransmit this code as soon as the owner leaves the parking lot. typically, this would leave the alarm and/or immobilizer disabled and even the central locking unlocked. the solution it is apparent that secure remote control systems can only be implemented if two conditions are met. the k ee l oq code hopping system meets both these con- ditions with ease. a large number of possible combinations must be available. a 66-bit transmission code is used to make scan- ning impossible. the 32-bit encrypted portion pro- vides for more than 4 billion code combinations. a complete scan would take 17 years! if the 34-bit ?ed portion is taken into account, the time required for a complete scan jumps to 5,600 bil- lion years! the system may never respond twice to the same transmitted code. the random code algorithm will never respond to the same code twice over several lifetimes of a typical system. every time a remote control button is pushed, the sys- tem will transmit a different code. these codes appear random to an outsider ?there is no apparent relation- ship between any code and the previous or next code. TB003 an introduction to k ee l oq code hopping k eeloq is a registered trademark of microchip technology, inc. microchips secure data products are covered by some or all of the following patents: code hopping encoder patents issued in europe, u.s.a., and r.s.a. ?u.s.a.: 5,517,187; europe: 0459781; r.s.a.: za93/4726 secure learning patents issued in the u.s.a. and r.s.a. ?u.s.a.: 5,686,904; r.s.a.: 95/5429
TB003 ds91002a-page 2 1996 microchip technology inc. once the system has responded to a valid code, about 65,000 valid codes will have to be received before the same code will be used again. if the remote control is used eight times daily, 22 years will pass before the system responds to the same code again - once! therefore, a retransmitted code (like when a code grabber is used) will never activate the system. the k ee l oq algorithm also features sophisticated syn- chronization techniques. the system will continue to function even if the transmitter is activated repeatedly while not in range of the receiver (as would happen if a child played with the remote control). if a button is pressed out of range more than 16 times, synchroniza- tion will be lost. however, two successive transmis- sions in range will restore synchronization. when no response occurs to a transmitter operation, the user's natural reaction is to press the button a second time. synchronization will be restored when he does. opera- tion is totally transparent ?the user may not even become aware that synchronization has been lost and restored. these obvious security bene?s are attainable at a cost comparable to existing ?ed code systems. the revolu- tionary nature of the k ee l oq algorithm, full custom ic implementation, and reduced external component requirements help to make this level of cost effective- ness possible. the k ee l oq algorithm k ee l oq is a proprietary block cipher based on a block length of 32 bits and a key length of 64 bits. the algo- rithm is characterized by a very economical hardware implementation, while retaining a level of security com- parable to data encryption standards (des). this level of security makes it eminently suitable for code commu- nication applications such as code hopping antitheft or access control devices. information regarding transmitter identity and synchro- nization is encoded so as to render it unintelligible to an outsider. for decoding, it is necessary to have the same 64-bit key originally used for encoding. there- fore, even though the decoder (which has the key) can identify the transmitter unambiguously, an outsider (who does not have access to the key and/or the algo- rithm) can glean no information at all from the transmis- sions. as it is impossible to insert information into the system from outside, strategies used to attack feal and other des-like ciphers are not usable against this system. the k ee l oq algorithm is designed to make it impossi- ble for a potential assailant to predict the next code that will be transmitted by a valid transmitter. even if the assailant makes a reasonable guess regarding the way in which transmitted information changes with each transmission, the algorithm obscures this information suf?iently that the next code can not be anticipated. in particular, even if the transmitted information (before encoding) differs only in one bit from the information in the previous transmission, the next transmission will be totally different. checks exist that can be used to verify the security characteristics of an encoding algorithm and, in this instance, to determine whether the next transmitted code is predictable to any degree. the avalanche effect and a subset thereof, the strict avalanche crite- rion, have been tested on the k ee l oq algorithm. the results give a good indication of the security offered by the system. avalanche effect (ae) a block cipher satis?s the ae if changing one bit of the information causes, on average, half of the bits in the transmission to change. in the k ee l oq algorithm, this implies that changing one bit in the function and/or synchronization information will cause an average of 16 of the 32 bits in the trans- mitted code to change. strict avalanche criterion (sac) the sac requires that, if one bit of the encoded information is changed, each bit in the output must have a chance of 0.5 of changing as well. consequently, the probability of guessing any one bit correctly is 0.5, and the probability of guessing an entire 32-bit string correctly is one in about 4,300,000,000! the tests involved using a random 64-bit key and a gray counter (starting at zero) as input to the algorithm. in each case, the output was compared with a reference (sac) or with the previous code (ae). in both cases, the results were as expected: for the ae, the average number of bits changed was 16.0 (50%), with a standard deviation of 2.83 (8.8%). for the sac, each individual bit changed an average of 50% of the time, with a standard deviation of 8.8%.
1996 microchip technology inc. ds91002a-page 3 TB003 definitions used in code hopping transmitter serial number each transmitter is programmed with a unique 28- or 32-bit serial number at the time of transmitter manufacture. this ensures that each transmitter will be unique within a system. secret key this 64-bit secret key is generated by a key generation function from the 28- or 32-bit serial number or the 32- or 48-bit seed and 64-bit manufacturer's key as inputs. a manufacturers key can be used to control the key generation func- tion. the secret key is not readable and is never transmitted. seed the seed is a 32- or 48-bit value that is programmed into the encoder. this can be programmed to be the same as one half of the key or be used in key gener- ation. it is only transmitted when a speci? button combination is activated and can be disabled once learning is completed. key generation the key generation function is used to generate a unique key for each trans- mitter from the serial number or seed value. it is preferable that the function is nonlinear. this function is performed by the programming station to generate keys to be programmed into transmitters. manufacturer's key the manufacturers key is necessary in the receiver if a key generation func- tion with a manufacturers was used to generate the secret keys. the manufac- turer's key must be programmed into the receiver during manufacture. normal learn (serial number derived) the receiver uses the same information that is transmitted during normal oper- ation to derive the transmitters secret key, decrypt the discrimination value and the synchronization counter. all the transmitter information is then stored. secure learn (seed derived) the transmitter is activated through a special button combination to transmit a stored 32- or 48-bit value (seed) that can be used for key generation or be part of the key. transmission of the random seed can be disabled after learning is completed. discrimination value the discrimination value is a 12-bit ?ed portion of the encrypted word. it is used as a post decryption check. synchronization counter a16-bit counter that is incremented on every activation of the encoder. it is stored on the receiver controller and compared to determine if a transmission is a previously received transmission, in which case it is ignored or falls within a forward window in which case it is accepted.
TB003 ds91002a-page 4 1996 microchip technology inc. features a full perspective of the capabilities of the k ee l oq sys- tem would involve describing the unique features of each device separately. however, the entire product range has certain characteristics that may or may not be applicable to a speci? member of the product range. the most important characteristics are listed to enable the prospective user to get a global view of the k ee l oq system. the speci?ations for a particular encoder or decoder should be consulted to determine the applicability of these features to that device. encoders security programmable 28/32-bit serial number programmable 64-bit encryption key each transmission is unique 66/67 bit transmission length 32-bit hopping code 34/35-bit ?ed code (28/32-bit serial number, 4/0-bit function, v low , rpt/2-bit crc) encryption key is read protected operating one (3.0v) or two (6.0v) lithium battery operation one (9.0v or 12.0v) alkaline battery operation 3 or 4 button inputs - 7 or 15 functions selectable baud rate automatic power down after transmission battery low signal transmitted nonvolatile synchronization data ir modulation capability other on-chip eeprom on-chip oscillator and timing components on-chip reset circuit button inputs have internal pull-down resistors current limiting on led output decoders security ? ee l oq code hopping technology secure storage of manufacturers key secure storage of transmitters keys normal learning mode and secure learning mode four or more transmitters can be learned operating 2.0v to 6.0v operation 4 mhz rc oscillator learning indication auto baud rate detection decoder single chip decoder available on-chip eeprom four binary function outputs - 15 functions one or two wire serial interface battery low indication typical applications automotive remote entry systems automotive alarm systems automotive immobilizers gate and garage openers electronic door locks identity tokens burglar alarm systems remote control toys/?ed code applications encoder functions general description the k ee l oq code hopping remote control encoders are intended for secure remote control systems. they are suitable for use in remote control applications using infrared (ir), microwave or other radio frequency (rf) transmitters. the encoders have several basic modes of operation. some of these modes may be combined in a particular device, and the means of selecting the mode may dif- fer, but the principle of operation remains the same. unidirectional authentication unidirectional authentication is used where it is imprac- tical or cost prohibitive to use a bi-directional link such as remote keyless entry. in this mode, an encoder func- tions as a code generator for a transmitter. a suitable transmission medium (rf, ultrasonic, microwave, infra- red, or magnetic coupling) must be provided in addition to the k ee l oq encoder to implement a complete link. the encoder is activated by a push button or by a mag- netic ?ld in the case of a transponder. bi-directional authentication bi-directional authentication is used where a bi-direc- tional link such as a direct connection is available. bi- directional authentication mode implements an iff (identi?ation friend or foe) system. in this mode, a 16/32-bit string (the challenge) is sent to the k ee l oq device. in the device, an encryption operation is per- formed on the challenge, using a 64-bit key. the result- ant 16/32-bit string (the response) is then transmitted. this 32-bit string is unique for a given challenge and key. k ee l oq devices may contain several keys. transmission format the k ee l oq devices use a 66/67-bit transmission for- mat. a 66-bit transmission is composed of a 32-bit encrypted string, a 28-bit ?ed string, 4-bit function code, battery low indicator, and a repeat indicator. a 67-bit transmission is available on high-end encoders and is composed of a 32-bit encrypted string, a 28- or 32-bit ?ed string, 4- or 0-bit function code, battery low indicator, and a 2-bit crc. the ?ed string is the serial number of the encoder and remains constant for all transmissions from a particular transmitter. however, the 32-bit encrypted string is unique for each transmis- sion.
1996 microchip technology inc. ds91002a-page 5 TB003 transmitter activation the encoder has an internal power switch which turns on when any of the button inputs are taken high. when a button is pressed, the encoder is turned on and the inputs are sampled after a debounce delay. the encoder then transmits a code, based on the correct key, synchronization information, and function codes. if the time-out option is selection, the encoder will shut- down after a complete transmission. this mode pre- vents battery depletion when a push button is inadvertently activated for an extended period. to acti- vate the device again, the buttons have to be released and activated again. with 28-bit serial number selected: with 32-bt serial number selected: three data rates are used: 833, 1667, and 3333 bits per second. at the lower transmission rate, a complete transmission requires approximately 100ms, at the higher rate 50ms, and at the highest rate 25ms. all encoders will transmit the codes repeatedly while the transmitter is activated. hop code serial number function status/crc lsb 32 bits msb lsb 28 bits msb 4 bits 2/3 bits hop code serial number status/crc lsb 32 bits msb lsb 32 bits msb 2/3 bits
TB003 ds91002a-page 6 1996 microchip technology inc. special features code w or d completion code word completion is an automatic feature that makes sure that the entire code word is transmitted, even if the button is released before the transmission is complete. a k ee l oq encoder powers itself up when a button is pushed and powers itself down after the com- mand is ?ished, if the user has already released the button. if the button is held down beyond the time for one transmission, then multiple transmissions will result. if another button is activated during a transmis- sion, the active transmission will be aborted and the new code will be generated using the new button infor- mation. blank alternate code w or d federal communications commission (fcc) part 15 rules specify the limits on fundamental power and har- monics that can be transmitted. power is calculated on the worst case average power transmitted in a 100ms window. it is therefore advantageous to minimize the duty cycle of the transmitted word. this can be achieved by minimizing the duty cycle of the individual bits and by blanking out consecutive words. blank alternate code word (bacw) is used for reducing the average power of a transmission. this is a selectable feature that is determined in conjunction with the baud rate selection bits. using the bacw allows the user to transmit a higher amplitude transmission if the trans- mission length is shorter. the fcc puts constraints on the average power that can be transmitted by a device, and bacw effectively prevents continuous transmis- sion by only allowing the transmission of every second or every fourth code word. this reduces the average power transmitted and hence, assists in fcc approval of a transmitter device. en velope encr yption option envelope encryption is a user selectable option which is meant to offer a higher level of security for a code hopping system. during a normal transmission with the envelope encryption turned off, the 28-bit serial num- ber and 4-bit function code is transmitted in the clear (unencrypted). if envelope encryption is selected, then the serial number is also encrypted before transmis- sion. the encryption for the serial number and 4-bit function code is done using a different algorithm than the transmission algorithm. the envelope encryption scheme is not nearly as complex as the k ee l oq algo- rithm and, hence, not as secure. when the envelope encryption is used, the serial number must be decrypted using the envelope key and envelope decryption. after the serial number is obtained, the nor- mal decryption method can be used to decrypt the hop- ping code. all transmitters in a system must use the same envelope key. a uto-shutoff the auto-shutoff function automatically stops the device from transmitting if a button inadvertently gets pressed for a long period of time. this will prevent the device from draining the battery if a button gets pressed while the transmitter is in a pocket or purse. this function can be enabled or disabled and is selected by setting or clearing the auto-shutoff bit. time-out period is approximately 25 seconds. v low : v olta g e lo w indicator the v low bit is transmitted with every transmission and will be transmitted as a one if the operating voltage has dropped below the low voltage trip point. the trip point is selectable between two values, based on the battery voltage being used. this v low signal is trans- mitted so the receiver can give an indication to the user that the transmitter battery is low.
1996 microchip technology inc. ds91002a-page 7 TB003 decoder functions general description the k ee l oq decoders can be used for secure remote control systems. to gain a full understanding of the modes of k ee l oq decoder operation, several concepts have to be understood. decoder features output activ ation the function information contains information on the buttons that were activated. the function code is embedded in the encrypted portion of the transmission and is also transmitted in the clear if selected. the decoder will activate the switch outputs corresponding to the switch inputs on the encoder as long as the trans- mitter is activated. a minimum activation time of 500ms is used to allow for dropout in the signal. buttons are usually assigned to different functions. in a vehicle alarm system one button might be used for arming and locking, another for disarming and unlocking and a third for trunk release. if any button is activated for more than say 2 seconds a panic siren can be activated. k e y mana g ement for a decoder to respond to an encoder's transmis- sions, the decoder has to have access to several items of information: the serial number which is unique for each trans- mitter. k ee l oq encoders feature 28- or 32-bit serial numbers. the synchronization history of that transmitter. this information is used to determine whether the transmission is a valid one, or whether it has been transmitted by a code grabber. the form in which this history is maintained makes it possible to re- synchronize the decoder with the transmitter, even if the transmitter has been pressed repeat- edly out of range of the receiver. the buttons used to activate the transmitter. the key being used by that transmitter. all k ee l oq devices use 64-bit keys. this information is essential to enable the decoder to decrypt the transmission and gain access to the information contained in the encrypted code portion. - single key system in a single key system the decoder stores a single key and uses that key for interpreting the transmis- sions from all transmitters. it follows that all trans- mitters to be used with that decoder, must be set up with the same key. a single key system is not very secure but the program is simpli?d and the storage requirements are less. the serial number is used to distinguish between different transmitters. the decoder still has to maintain separate synchronization information for each transmitter. this information is maintained in a separate location in the eeprom memory for each transmitter. the history record for a particular transmitter is updated every time a valid transmis- sion is received, enabling the decoder to keep track of each transmitter independently. even if one transmitter is used regularly while another is stored away (with or without power), both transmit- ters will work the ?st time when activated. - independent key system an independent key system is much more secure as the preferred method and is used in all k ee l oq decoders. in independent key systems, the decoder maintains a separate key for each trans- mitter. the serial number or derivative is used to locate the correct key. once the correct location has been determined, the key is retrieved and used to decrypt the 32-bit encrypted portion. the correct history record is then retrieved and used to determine whether a valid code has been received. learning learning is a feature of k ee l oq decoders that allows the addition of new transmitters to the system without having to reprogram the system from outside. the decoder's learning capability simpli?s replace- ment of lost transmitters. when a transmitter is lost, the user can ?each the decoder the key of a new transmit- ter. the previous transmitter's key will be written over, thereby excluding that transmitter from the system. once the self learning procedure has been followed, the receiver has learned the new transmitter's identity and (if applicable) the output functions that have to be activated for that transmitter. the new transmitter may then be used normally to activate the decoder.
TB003 ds91002a-page 8 1996 microchip technology inc. normal learning mode (serial number derived) transmission format in normal learn mode. with 28-bit serial number selected: with 32- bit serial number selected: operation the user places the decoder in learning mode. when the ?st code word is received, the serial number is used to generate the transmitters secret key that was programmed into the transmitter during the production stage. the secret key is used to decrypt the hopping code. the decoder then waits for a second transmission (must be acti- vated a second time). the serial number is compared to the ?st received serial number. if equal the hopping code is decrypted and the validation checks performed. the ?al check is to check that the codes are sequential. all the transmitter information is then stored. secure learn mode (seed derived) transmission format in secure learn mode with 32 bit serial number selected: with 32 bit serial number selected: operation the user places the decoder in learning mode. during the ?st stage of learn, the user must press a speci? button. the hopping code part of the transmission will be replaced by the 32/48-bit seed stored in the encoder. the key is derived from the seed instead of the serial number in this case. during the second stage of learning, any other but- ton combination can be pressed. a normal hopping code transmission is sent during the second stage. the gener- ated key is used to decrypt the hopping code, and all the transmitter information is stored. since the seed is only transmitted during the learning process, and is required to generate the key a normal trans- mission cannot be intercepted, a key generated and the hopping code decrypted to predict the next hopping code. as a further security measure, the transmission of the random seed can be disabled after 1 to 128 operations of the transmitter once the transmitter has been learned. that means that even if someone had physical access to the encoder, it would not be possible to get the random seed which is needed for key generation. the disadvantage is that a transmitter cannot be relearned at a later stage. hop code serial number function status/crc lsb 32 bits msb lsb 28 bits msb 4 bits 2/3 bits hop code serial number status/crc lsb 32 bits msb lsb 32 bits msb 2/3 bits seed serial number function status/crc lsb 32 or 48 bits msb lsb 28 or 12 bits msb 4 bits 2/3 bits seed serial number status/crc lsb 32 or 48 bits msb lsb 32 or 24 bits msb 2/3 bits
1996 microchip technology inc. ds91002a-page 9 TB003 memor y requirements a code hopping system typically requires nonvolatile memory such as an eeprom to store transmitter infor- mation. this allows information to be changed when a transmitter is learned and operated but ensures that the information will not be lost if power is removed. since the receiver needs to store information on each transmitter, the number of transmitters is determined by the available memory size. a typical system requires 16 bytes to be stored for each transmitter. memory map: a learning pointer can be used to point to the next avail- able learning position. once position n is reached, the pointer will wrap to position 1. t ransmitter replacement the replacement of transmitters is a system implemen- tation dependent. all transmitters can be erased by activating the learn input for 10 seconds. the wanted transmitters can then be relearned. another method is to use a rotating buffer. transmitters will be learned into sequential positions until the last position is reached. the next learn will then overwrite the ?st transmitter. transmitter 1 learned 2 learned 3 ? next learn position ~ n
TB003 ds91002a-page 10 1996 microchip technology inc. notes:
1996 microchip technology inc. ds91002a-page 11 TB003 notes:
information contained in this publication regarding device applications and the like is intended for suggestion only and may be superseded by updates. no representation or warranty is given and no liability is assumed by microchip technology incorporated with respect to the accuracy or use of such information, or infringement of patents or oth er intellectual property rights arising from such use or otherwise. use of microchip?s products as critical components in life support systems is not authorized except with express written approval by microchip. no licenses are conveyed, implicitly or otherwise, under any intellectual property rights. the microchip logo and name are registered trademarks of microchip technology inc. in the u.s.a. and other countries. all rights reserved. al l other trademarks mentioned herein are the property of their respective companies. ? 1999 microchip technology inc. all rights reserved. ? 1999 microchip technology incorporated. printed in the usa. 11/99 printed on recycled paper. americas corporate office microchip technology inc. 2355 west chandler blvd. chandler, az 85224-6199 tel: 480-786-7200 fax: 480-786-7277 technical support: 480-786-7627 web address: http://www.microchip.com atlanta microchip technology inc. 500 sugar mill road, suite 200b atlanta, ga 30350 tel: 770-640-0034 fax: 770-640-0307 boston microchip technology inc. 5 mount royal avenue marlborough, ma 01752 tel: 508-480-9990 fax: 508-480-8575 chicago microchip technology inc. 333 pierce road, suite 180 itasca, il 60143 tel: 630-285-0071 fax: 630-285-0075 dallas microchip technology inc. 4570 westgrove drive, suite 160 addison, tx 75248 tel: 972-818-7423 fax: 972-818-2924 dayton microchip technology inc. two prestige place, suite 150 miamisburg, oh 45342 tel: 937-291-1654 fax: 937-291-9175 detroit microchip technology inc. tri-atria office building 32255 northwestern highway, suite 190 farmington hills, mi 48334 tel: 248-538-2250 fax: 248-538-2260 los angeles microchip technology inc. 18201 von karman, suite 1090 irvine, ca 92612 tel: 949-263-1888 fax: 949-263-1338 new york microchip technology inc. 150 motor parkway, suite 202 hauppauge, ny 11788 tel: 631-273-5305 fax: 631-273-5335 san jose microchip technology inc. 2107 north first street, suite 590 san jose, ca 95131 tel: 408-436-7950 fax: 408-436-7955 americas (continued) toronto microchip technology inc. 5925 airport road, suite 200 mississauga, ontario l4v 1w1, canada tel: 905-405-6279 fax: 905-405-6253 asia/pacific hong kong microchip asia pacific unit 2101, tower 2 metroplaza 223 hing fong road kwai fong, n.t., hong kong tel: 852-2-401-1200 fax: 852-2-401-3431 beijing microchip technology, beijing unit 915, 6 chaoyangmen bei dajie dong erhuan road, dongcheng district new china hong kong manhattan building beijing 100027 prc tel: 86-10-85282100 fax: 86-10-85282104 india microchip technology inc. india liaison office no. 6, legacy, convent road bangalore 560 025, india tel: 91-80-229-0061 fax: 91-80-229-0062 japan microchip technology intl. inc. benex s-1 6f 3-18-20, shinyokohama kohoku-ku, yokohama-shi kanagawa 222-0033 japan tel: 81-45-471- 6166 fax: 81-45-471-6122 korea microchip technology korea 168-1, youngbo bldg. 3 floor samsung-dong, kangnam-ku seoul, korea tel: 82-2-554-7200 fax: 82-2-558-5934 shanghai microchip technology rm 406 shanghai golden bridge bldg. 2077 yan?an road west, hong qiao district shanghai, prc 200335 tel: 86-21-6275-5700 fax: 86 21-6275-5060 asia/pacific (continued) singapore microchip technology singapore pte ltd. 200 middle road #07-02 prime centre singapore 188980 tel: 65-334-8870 fax: 65-334-8850 taiwan microchip technology taiwan 10f-1c 207 tung hua north road taipei, taiwan tel: 886-2-2717-7175 fax: 886-2-2545-0139 europe united kingdom arizona microchip technology ltd. 505 eskdale road winnersh triangle wokingham berkshire, england rg41 5tu tel: 44 118 921 5858 fax: 44-118 921-5835 denmark microchip technology denmark aps regus business centre lautrup hoj 1-3 ballerup dk-2750 denmark tel: 45 4420 9895 fax: 45 4420 9910 france arizona microchip technology sarl parc d?activite du moulin de massy 43 rue du saule trapu batiment a - ler etage 91300 massy, france tel: 33-1-69-53-63-20 fax: 33-1-69-30-90-79 germany arizona microchip technology gmbh gustav-heinemann-ring 125 d-81739 mnchen, germany tel: 49-89-627-144 0 fax: 49-89-627-144-44 italy arizona microchip technology srl centro direzionale colleoni palazzo taurus 1 v. le colleoni 1 20041 agrate brianza milan, italy tel: 39-039-65791-1 fax: 39-039-6899883 11/15/99 w orldwide s ales and s ervice microchip received qs-9000 quality system certification for its worldwide headquarters, design and wafer fabrication facilities in chandler and tempe, arizona in july 1999. the company?s quality system processes and procedures are qs-9000 compliant for its picmicro ? 8-bit mcus, k ee l oq ? code hopping devices, serial eeproms and microperipheral products. in addition, microchip ? s quality system for the design and manufacture of development systems is iso 9001 certified.


▲Up To Search▲   

 
Price & Availability of TB003

All Rights Reserved © IC-ON-LINE 2003 - 2022  

[Add Bookmark] [Contact Us] [Link exchange] [Privacy policy]
Mirror Sites :  [www.datasheet.hk]   [www.maxim4u.com]  [www.ic-on-line.cn] [www.ic-on-line.com] [www.ic-on-line.net] [www.alldatasheet.com.cn] [www.gdcy.com]  [www.gdcy.net]


 . . . . .
  We use cookies to deliver the best possible web experience and assist with our advertising efforts. By continuing to use this site, you consent to the use of cookies. For more information on cookies, please take a look at our Privacy Policy. X