Blog area

Implementation of IMMO function

I. Overview

        Car keys are generally powered by button batteries, and the battery will definitely run out of power. IMMO is to realize the normal start of the vehicle when the key is out of power.

Second, the implementation process

        The realization process of the IMMO function is to communicate SPI through the main control board (KEA128) and the low frequency board (PJF7992), in order to drive the external antenna to communicate with the 3D antenna on the key (NCF29A1) at a frequency of 125KHz, obtain the key ID, and complete the HT3 encryption authentication, you canDrive related peripherals to realize the start of the vehicle; the whole process can be divided into the following steps.

(1) Drive antenna

        Based on the DataSheet of PJF7992 (as shown in Figure 2.1.1), there must be a corresponding wake-up waveform before SPI communication with the low-frequency board, that is, the CS pin is pulled down by about 350us and then pulled up. After the delay is 10ms, the main control board can communicate with the low-frequency board SPI.

Figure 2.1.1 Wake-up waveform

        Description: Twup = 10ms; Trem, min = 150 us;

        After the SPI communication is realized, the two registers DRVCON and DCON1 can be configured through the SPI communication to realize the antenna drive. The specific waveform is shown in Figure 2.1.2 below.

Figure 2.1.2 Waveform of the driving antenna

(2) Get IDE

        The acquisition of keychain can be achieved by sending “11100“ through the drive antenna. Before that, configure the registers PHMEAS, SMPLC, and TXCON to control the antenna phase, sampling time, and drive the TX1/TX2 channels, and then use the WR_RD_BUF command to write ”11100“.

        It is recommended to find and send at +90°, -90°, and 180° in the normal phase, respectively, to prevent the key from not responding. The specific waveform is shown in Figure 2.2.1 below.



Figure 2.2.1 Acquisition of key IDEs

(3) Send 64-bit challenge+16-bit MAC for encryption and authentication

        The HT3 encryption authentication process of NCF29A1: The low-frequency board first drives the antenna to send a 64-bit random number (for convenience of testing, I sent a 64-bit ‘0’), the main control board calculates a 16-bit MAC based on the 96-bit key, the 64-bit random number, and the ID of the key, and then drives the antenna to send this. For a 16-bit MAC, if the 48-bit response sent by the key is obtained and the calculated data is correct, it proves that the handshake is successful. The specific waveform is shown in Figure 2.3.1 and Figure 2.3.2 below.

Figure 2.3.1 64-bit random number


Figure 2.3.2 Obtained EQ+Response

        By observing the waveforms of the external antenna (yellow) of the low-frequency board and the key (green), it can be seen that when the antenna transmits data, the waveform of the key will also fluctuate. This is the external antenna of the low-frequency board and then charge the key with mutual inductance. Based on the distance limit, the IMMO function isIt is achieved under the condition that the key is 3cm~5cm away from the external antenna of the low-frequency board.

        In addition, after IMMO's HT3 encryption authentication is passed, the ULP-EEPROM of the key can also be read and written through relevant commands, which can change the relevant configuration of the key.

3. Reference materials

[1] ds489211 - Product Data Sheet - HT3-Family_Transponder - MRK III (1.1).pdf

[2] f7992A_2015.pdf

► Related videos

Realization of PKE/PKG and IMMO functions in PEPS applications

        This video mainly explains the functions of PKE/PKG and IMMO in PEPS applications based on the NXP KEA128 main control board and the NXP NCK2913 UHF receiving board, combined with the NXP PJF7992 low frequency receiving board and key (NXP NCF29A1). Among them, the PKE/PKG function is mainly used to realize the keyless opening of the door and the start of the vehicle. The application scenario of the IMMO function is to realize the start of the vehicle when the key is out of power. Due to limited conditions, this solution uses the OLED screen and RGB lights on the sensor board to simulate the opening/closing of the door and the start of the vehicle.
        I believe there must be many friends who are curious about how the functions of PKE/PKG and IMMO are implemented? The following is a detailed description of the implementation of PKE/PKG and IMMO functions:
       The specific process of implementing the IMMO function: press the button on the KEA128 main control board, the KEA128 main control board starts to communicate with the PJF7992 low-frequency receiving board through SPI, drive the external antenna on the low-frequency board, and send data (including random numbers and encrypted data) at a frequency of 125KHz to communicate with the key for HT.-3 certification, finally, the KEA128 main control board will reflect the 32-bit IDE (device identifier) of the key and the certification result to the OLED display of the sensor board.
        The specific process of implementing the PKE/PKG function : The implementation of PKE/PKG consists of two parts: one is the low-frequency wake-up of the key, and the other is the return of high-frequency data by the key. By pressing the buttons on the KEA128 main control board (simulating the action of the person opening the door handle and pressing the rotating start button), the KEA128 main control board starts to communicate with the PJF7992 low-frequency receiving board through SPI, driving an external antenna to send data at a frequency of 125KHz to wake up the key, and the key starts to calculate the RSSI value (equivalent toThe distance between the key and the external antenna), and sends the RSSI value to the NCK2913 UHF receiving board through a frequency of 433.92 MHz, the KEA128 main control board communicates with the NCK2913 UHF receiving board through the serial port, obtains the RSSI value, and realizes the opening and closing of the door and the vehicle according to the size of the RSSI value.start.

提示信息

★The content of the blog posts is provided by individuals and has nothing to do with the platform. If there is any violation or infringement, please contact the website administrator.

★Go online in a civilized manner, please speak rationally. The content was reported 5 times in a week, and the writer entered the little black house~

Reference source

comment