123 Main Street, New York, NY 10001

Prox/IC/QR/NFC Reader Hardware: AFE, Secure Element, PoE I/O

← Back to: Security & Surveillance

A Prox/IC/QR/NFC reader is the “front-door evidence engine”: it reliably captures credentials (RF + QR), protects keys in a secure element, and outputs authenticated events over RS-485/Ethernet/PoE. This page focuses on the measurable proof chain—field strength, SE status, interface counters, and power-rail logs—so real-world failures can be isolated and fixed without scope creep.

H2-1 • Definition + Boundary • “Owns / Referenced / Banned”

What This Reader Owns (Definition + Boundary + Non-Goals)

One-sentence definition. A multi-credential access reader that acquires Prox/IC/NFC and/or QR credentials, keeps keys inside an SE/SAM trust boundary, and outputs authenticated results over RS-485 or Ethernet (often powered by PoE PD).

Owns (must be delivered by this page)

  • RF front-end + antenna: field generation, receive demod, tuning/matching, detuning robustness.
  • Secure Element / SAM: key ladder, mutual-auth primitives (high level), anti-tear behavior, safe personalization/update boundaries.
  • QR scan module: camera + illumination + decode-latency budget (QR-only constraints).
  • Physical I/O + power: RS-485/Ethernet/PoE PD entry, reader-side protections, rails and reset behavior.
  • Tamper + UI: tamper switch inputs, LED/buzzer feedback mapping to states.
  • Validation + field debug evidence: what to measure first, what logs/counters prove each hypothesis.

Referenced only (name it, don’t deep-dive)

  • Host/controller decisions: access policy lives elsewhere; reader only reports credential + status.
  • OSDP/Wiegand/etc.: mention as interface surface if present; no controller protocol strategy.
  • Site infrastructure: PoE switch/PSE, timing networks, NVR/VMS, cloud/app are out of scope.

Non-goals (hard boundaries)

  • Not lock actuation (motor/solenoid) and not door mechanics/safety interlocks.
  • Not access panel architecture, database, user management, or cloud/mobile app workflows.
  • Not general camera imaging/ISP topics beyond QR scanning constraints.

Evidence-first promise (EEAT, engineering style). Every claim on this page should map to a measurable node (RF field sense / Rx envelope), a log/counter (auth fail reason / retries), or a power event record (reset reason / rail droop) — so “works on bench” can be separated from “works on door frame” using data.

Figure F1 — Prox/IC/QR/NFC Reader: Scope Boundary Block Diagram A reader boundary box containing RF AFE and antenna, secure element/SAM, QR camera and LED, and host interfaces RS-485/Ethernet/PoE. External controller/panel is shown outside scope. Prox/IC/QR/NFC Reader — In-Scope Boundary Reader (In Scope) RF AFE + Antenna Tuning / Q VANT RX ENV Secure Element / SAM Keys stay inside Auth / Anti-tear QR Camera + LED Latency / Glare Tdecode Host I/O + PoE PD RS-485 Ethernet PoE PD VIN 5V 3V3 Controller / Panel (Out of scope) Policy / DB Door logic Auth result Evidence taps shown: VANT / RX ENV / Tdecode • Reader-side power rails and interfaces only
Figure F1. In-scope boundary for a multi-credential reader: RF AFE + antenna, SE/SAM trust boundary, QR scan module, and RS-485/Ethernet/PoE PD interfaces.
H2-2 • Credential Surfaces • Hardware knobs + Evidence mapping

Credential Landscape & Protocol Surfaces (Only What a Reader Must Support)

Goal of this chapter. Explain what changes electrically and firmware-wise across Prox / HF NFC / optional UHF / QR — without turning into a standards lecture. The rule is simple: each credential family maps to a different set of hardware knobs and measurable evidence.

Credential families → what they imply for hardware

  • LF 125 kHz Prox: coil size and coupling dominate; simpler modulation/demod; range is sensitive to coil geometry and installation metal.
  • HF 13.56 MHz (ISO14443 / NFC-A/B/F): field generation + tiny load modulation reception; the Rx chain must survive Tx self-interference; anti-collision/time budget matters.
  • UHF (optional): if the product includes UHF, treat it as a separate RF chain (antenna + PA/LNA + filtering). If not included, keep UHF as a one-line “not applicable”.
  • QR: optics + illumination + decode latency; failures often come from flicker, glare, motion blur, and low light (not “RF tuning”).

Surface checklist (minimum you must pin down)

  • Band & coupling: LF/HF/UHF or optical; determines antenna/driver vs sensor/LED.
  • Range target: typical distance and allowed detuning conditions (metal frame, hand, moisture).
  • Time budget: target transaction time (e.g., P95/P99) under single-tag and multi-tag conditions.
  • Anti-collision: whether multi-card presence must be supported and how retries are bounded.
  • Crypto presence: whether mutual auth exists and where keys must live (SE/SAM vs MCU).
  • Primary field failure mode: detuning vs Rx saturation vs optical glare vs power droop — define upfront.

Evidence mapping (how you keep it engineering-grade). For each credential family, bind the “knobs” to first-order measurements. This prevents vague conclusions like “RF is weak” or “QR is slow” by forcing a concrete discriminator.

Credential Hardware knobs (what you can tune) What to measure (first evidence) What it proves (discriminator)
LF Prox
125 kHz
Coil geometry, matching, Tx drive level, demod threshold Field strength proxy, demod envelope, retry count Detuning/metal coupling vs noise floor vs thresholding margin
HF NFC
13.56 MHz
Matching/Q window, Tx current limit, Rx AGC behavior, anti-collision timing VANT amplitude, Rx envelope margin, AGC state, time-to-UID histogram Tx leakage saturation vs insufficient field vs collision/retry amplification
UHF (if present)
separate chain
Antenna + PA/LNA, filtering, duty cycle, regional constraints RSSI, backscatter decode success rate, thermal limit counters Link budget limitation vs interference vs thermal derating
QR
optical
FOV/focus, illumination current, exposure clamp, decode retry policy Decode latency (P95/P99), exposure time, LED current waveform, retry reason Flicker/glare/motion blur vs insufficient illumination vs CPU scheduling
Figure F2 — Credential Families: Hardware Knobs and What to Measure A four-column comparison for LF Prox, HF NFC, optional UHF, and QR, showing key hardware knobs and measurement evidence icons for each. Credential Surfaces — Knobs vs Evidence LF Prox 125 kHz Hardware knobs Coil size Matching Demod thr What to measure Field proxy # Retries HF NFC 13.56 MHz Hardware knobs Q / tuning Tx current Rx AGC What to measure VANT RX ENV T UID UHF optional Hardware knobs Separate chain PA / LNA Filtering What to measure RSSI Limits QR optical Hardware knobs FOV / focus LED current Exposure What to measure Tdecode I_LED Use this chart to keep scope tight: knobs → evidence → discriminator (no standards lecture needed)
Figure F2. Four credential surfaces (LF/HF/UHF/QR) mapped to tunable knobs and first evidence signals/counters.
H2-3 • RF AFE Chain • Tx self-interference vs load modulation • Evidence taps

RF Front-End Architecture: Tx Field, Rx Demod, and Why Readers Fail in the Real World

Why this chapter matters. Most real failures are not “protocol issues”; they are physics + dynamic range problems: the reader must generate a strong field while detecting a tiny load-modulation signal in the presence of its own Tx leakage, detuning, and power/EMI stress. The engineering goal is to map each failure to one measurement and a first fix.

Generic HF reader chain (signal + energy path)

  • PA/DriverAntenna MatchingVANT/Field Sense (energy delivered)
  • Load ModulationRx Front-EndDemodADC/ComparatorDigital Framing (information recovered)

The hard part is that the information signal is orders of magnitude smaller than the Tx field, so Rx margin is often lost to detuning or Tx self-interference.

Critical design knobs (what actually moves the needle)

  • Antenna geometry + Q + matching: sets field strength and sensitivity to metal/hand/moisture detuning.
  • Tx current limit + duty cycle + thermal: sets range vs heating/derating; affects EMI and supply droop risk.
  • Rx dynamic range: surviving Tx leakage while resolving load modulation (AGC, filters, limiters, demod threshold).

Failure signatures tied to physics (fast discriminators).

  • Range collapses near metal: often detuning/Q loss. Evidence: VANT drops or resonance shifts; Rx envelope shrinks.
  • Intermittent reads / “sometimes works”: often marginal Rx envelope vs AGC/threshold. Evidence: AGC state toggling; retries spike.
  • Bench OK, door-frame fails: installation detunes the coil and changes return paths. Evidence: VANT/Field Sense changes after mounting; new noise on supplies or Rx envelope.

Debug hooks (minimum-instrument strategy)

  • First 2 measurements: (1) VANT or ITX (energy delivered) + (2) Rx Envelope or Demod Out (information margin).
  • Optional discriminators: Modulation index estimate, AGC state, retry/time-to-UID histogram.

If VANT/ITX is stable but reads fail, suspect Rx dynamic range/thresholding. If VANT collapses after installation, suspect detuning/Q loss.

First fixes (small actions with high ROI)

  • Detune dominated: adjust matching, add ferrite/spacer, enforce keep-out, fix cable routing and metal proximity.
  • Rx margin dominated: reduce Tx leakage coupling, verify AGC/limiter settings, tighten demod filter/threshold stability.
  • Power/EMI dominated: improve rail decoupling and return path, limit Tx bursts, verify brownout/reset reasons.
Figure F3 — HF RFID/NFC Reader RF AFE Architecture with Measurement Taps Block diagram showing PA/Driver, matching network and coil, field sense, Rx front-end, AGC, demodulator, and digital framing. Measurement taps include I_TX, V_ANT, Field Sense, Rx Envelope, AGC state, and Demod Out. RF AFE Chain (HF) — Knobs & Measurement Taps PA / Driver Tx current Matching + Coil Q / detune Field Sense Field proxy Rx Front-End Dynamic range AGC / Limiter State tap Demod + Slicer Demod out Digital Framing Retry / timing I_TX V_ANT Field Sense Rx Envelope AGC Demod Out Debug minimalism: measure energy (I_TX/V_ANT) + information margin (Rx Envelope/Demod Out) before changing firmware or “protocol settings”.
Figure F3. HF reader RF AFE chain with measurement taps: I_TX, V_ANT, Field Sense, Rx Envelope, AGC, and Demod Out.
H2-4 • Tuning SOP • Detuning sources • Production tolerance

Antenna & Matching Network: Tuning, Detuning, and Manufacturing Tolerance

Purpose of this chapter. “Antenna tuning” cannot be a vague statement. It must become a repeatable checklist with acceptance criteria, because the #1 field complaint (“works in lab, fails on door frame”) is often a tuning/tolerance problem.

What “tuned” means in production (acceptance thinking)

  • Resonance target: resonance stays within an allowed window around the operating band after final assembly.
  • Q window: Q is high enough for range but not so high that small detuning collapses reads (avoid “knife-edge tuning”).
  • Impedance/match intent: the driver can deliver stable VANT/ITX without abnormal heating or rail droop.

A practical definition: mounted product maintains VANT and Rx envelope margin across expected metal/hand/environment conditions.

Detuning sources (field-priority list)

  • Metal backplate / door frame: shifts resonance and increases loss → range collapse.
  • Cable routing & return path: changes coupling and injects noise → intermittent demod margin.
  • Enclosure + assembly tolerance: coil-to-metal spacing variation → unit-to-unit variability.
  • User hand / moisture: adds loss and dielectric change → seasonal or humidity-sensitive failures.

Practical mitigation (mechanical first, then electrical)

  • Ferrite sheet: reduces metal coupling loss; improves consistency across mounting surfaces.
  • Shield spacing: enforce a controlled coil-to-metal distance; avoid “touching metal” stack-ups.
  • Keep-out zones: reserve space for the coil; keep screws, brackets, and cables out of the near-field region.
  • Stable cable route: lock the harness path; uncontrolled routing can behave like an antenna detune knob.
  • Adaptive tuning (only if supported): optional, but should not be a crutch for poor mechanics.

Production test concept (fast, scalable, traceable)

  • Quick check: measure a proxy of amplitude/phase (or resonance indicator) at the operating frequency using VANT/field-sense circuitry.
  • Go/No-Go limits: define limits on VANT stability and a resonance proxy after final assembly (not on bare PCB).
  • Traceability: log tuning outcome + assembly revision to correlate field failures with production drift.
  • Per-unit calibration table: only when mechanical tolerance cannot be controlled economically.

Do / Don’t (to avoid over-claiming)

  • Do: validate tuning in the final enclosure on a representative metal mount and with a standardized “hand” proximity condition.
  • Do: treat “range” as a distribution (P95/P99) and track retries/time-to-UID as early warning signals.
  • Don’t: optimize for peak range on a single bench setup if it increases sensitivity to small detuning.
  • Don’t: assume firmware can fix a physically collapsed Rx envelope margin.
Figure F4 — Antenna Detuning: Mechanical Stack-Up and Mitigations Mechanical cross-section style diagram showing enclosure, coil, ferrite sheet, metal backplate, cable route, and external influences like hand and moisture. Keep-out and shield spacing are highlighted. Antenna Detuning — Stack-Up, Influences, and Keep-Out Front Bezel / Enclosure Antenna Coil Keep-out zone (no screws/cables) Ferrite Sheet Controlled spacing Metal Backplate / Door Frame Shield spacing Fixed cable route Hand proximity Moisture Metal shifts resonance and increases loss → range collapse Build robustness mechanically: ferrite + spacing + keep-out + fixed cable route before relying on “adaptive tuning”.
Figure F4. Mechanical stack-up and environmental influences that detune the coil; mitigations highlighted: ferrite, controlled spacing, keep-out, and fixed cable routing.
H2-5 • Secure Element / SAM • Key ownership • Anti-tear • Update safety

Secure Element / SAM: Key Ownership, Mutual Auth, Anti-Tear, and Update Safety

Security spine (without scope creep). A reader is trusted only when keys have a clear home, authentication results are auditable, and power-loss or updates cannot silently corrupt secure state. This chapter defines trust boundaries and the minimum evidence to prove correctness in the field.

What belongs in SE/SAM vs in MCU (ownership matrix)

  • SE/SAM owns: key storage (keys never leave in plaintext), cryptographic operations (auth/MAC/enc), secure-session state, secure counters/monotonic counters (if used), anti-tear protected records (last-good).
  • MCU owns: RF framing orchestration, UI/indicators, interface packaging (RS-485/Ethernet), timeout/retry policy, non-sensitive event logging (timestamps, error codes, histograms).
  • Hard boundary: MCU must not persist key material; any credential verification uses SE result + status, not secrets.

Common high-level flows (only the skeleton that matters)

  • Mutual authentication: prove card/credential is genuine and reader is authorized (outputs success/failure with status words).
  • Session key derivation: per-transaction session isolates replay and limits exposure (no long-lived secrets in MCU).
  • Secure messaging: protect command/response integrity; failure must map to a precise SE status or reader error code.
  • Replay protection basics: nonce/counter-based checks; a mismatch must be observable (counter not advanced, explicit failure code).

Anti-tear / power-loss safety (what must stay consistent)

  • Transaction atomicity: a secure update is either fully committed or safely rolled back to last-known-good.
  • Commit policy: secure counters or state advance only after the transaction reaches a defined “commit point”.
  • Journaling / recovery: a minimal protected record enables deterministic recovery after brownout.
  • Field discriminator: counter advanced but auth not committed is a red flag; recovery flag + status words must expose it.

Firmware update boundaries (who verifies what)

  • MCU secure boot: verifies signed firmware and enforces rollback rules for the MCU image (reader platform integrity).
  • SE/SAM lifecycle: governs applets/keys; any SE update must be authenticated and leave an auditable result.
  • Do not conflate: MCU update success does not imply SE applet/key state is valid; both sides need explicit status checks.

Evidence hooks (minimum observability to debug securely)

  • SE status words (SW): auth/secure-channel failure reason, anti-tear/recovery indication.
  • Counter / monotonic increments: detect replay attempts and “half-commits” across power loss.
  • Audit log entry: timestamp + credential type + result code + latency; store non-sensitive summaries only.
  • Update proof: boot-verify status + firmware/app version IDs + SE applet state (pass/fail + reason code).
Figure F5 — Trust Boundary: MCU vs Secure Element/SAM in a Multi-Credential Reader Trust-boundary diagram showing RF AFE, MCU, and Secure Element/SAM. Keys remain inside SE/SAM. MCU performs secure boot for signed firmware, and exchanges only authentication results and secure-session handles with SE/SAM. Evidence taps include status words, counters, audit log, and boot verify. Trust Boundary — Keys in SE/SAM, Signed FW on MCU, Auditable Results Reader Boundary RF AFE Field + demod MCU Orchestration + logs Signed FW Boot verify SE / SAM Keys + crypto Keys Counter Host Interfaces RS-485 / Ethernet RS-485 Ethernet PoE Card / Tag Controller/Panel (out of scope) RF field frames secure ops auth result ID + status SW Counter Audit log Boot verify Keys remain inside SE/SAM; MCU receives only authenticated results and auditable status (SW/counter/logs) across power loss and updates.
Figure F5. Trust boundary for reader security: keys in SE/SAM, signed firmware on MCU, and auditable evidence points (SW/counter/audit log/boot verify).
H2-6 • QR subsystem • Illumination • Decode latency budget • Evidence

QR Camera Module Integration: Optics, Illumination, and Decode Latency Budget

QR as a reader subsystem. The QR path exists to deliver a credential packet quickly and reliably. The focus is scan success rate, time-to-decode, and diagnosability—not full camera ISP image quality.

Minimal QR scanning pipeline (only necessary steps)

  • Sensor → exposure control (simple AE/AGC policy appropriate for QR)
  • Frame grab → buffer (stable capture path and deterministic timing)
  • QR decode (decode engine produces payload + reason codes)
  • Credential packet (ID + status → RS-485/Ethernet output)

Engineering priority: reduce “silent failures” by making each stage observable (exposure, illumination, decode time, retry reason).

Design constraints that dominate real-world success

  • Rolling shutter × flicker: LED PWM or ambient lighting can create banding → decode time spikes and retries.
  • Glare on glossy screens: localized overexposure removes QR modules → “looks bright but unreadable”.
  • Low light / motion blur: longer exposure causes smear → unstable detection and user frustration.

Illumination strategy (QR-first, not camera-first)

  • Visible vs IR: visible improves user feedback; IR can reduce perceived glare but must still ensure reliable contrast.
  • Driver current + thermal: peak current, duty cycle, and derating must keep light stable across temperature and PoE/power transients.
  • Safety high-level: keep peak intensity and duty cycle within applicable eye-safety constraints; avoid “unbounded boost” policies.

Decode latency budget (what to measure, not just what to hope)

  • Time-to-decode distribution: track P50/P95/P99 rather than a single “typical” value.
  • Retry policy: define a capped sequence (adjust illumination → adjust exposure → prompt user) to avoid infinite loops.
  • User feedback mapping: LED/buzzer states should correspond to pipeline stages (capture / decode / output).

Evidence hooks (field-debuggable metrics)

  • Decode time histogram: Tdecode (P50/P95/P99) and timeout count.
  • Exposure settings: exposure/gain per attempt, plus a compact “failure reason” code.
  • Illumination waveform: ILED (peak + duty) to confirm flicker-safe behavior.
  • Retry reason codes: glare / blur / low-contrast / timeout (reader-side taxonomy, not camera-grade analytics).
Figure F6 — QR Subsystem: Capture → Decode → Output Timing Path Block diagram of QR subsystem including sensor and lens, exposure control, frame buffer, decode engine, and credential packet output. LED driver provides illumination. Timing arrows show capture, decode, and output stages with evidence taps for exposure settings, LED current, decode time, and retry reason. QR Subsystem — Capture → Decode → Output (Latency Budget + Evidence) Sensor + Lens QR capture Exposure Ctrl AE/AGC Frame Buffer grab/store Decode Engine QR decode Credential Packet Output payload + status → RS-485 / Ethernet ID + result code Retry reason Latency LED Driver I_LED illumination Latency Budget Capture Decode Output Exposure I_LED Tdecode Retry QR reliability improves when exposure + illumination + decode time + retry reasons are logged as evidence, not guessed from “image looks OK”.
Figure F6. QR capture/decode/output pipeline with illumination and evidence taps (Exposure, I_LED, Tdecode, Retry reason) to control latency and success rate.
H2-7 • Host Interfaces & Wiring • RS-485 / Ethernet / PoE (Reader-side Only)

Host Interfaces & Wiring: RS-485/Ethernet/PoE (Reader-side Only)

This chapter focuses on reader-side ports and wiring behaviors that determine installation success on long cables and noisy sites. The scope is limited to what the reader can implement and verify: termination/bias options, port protection, PD power-up behavior, and diagnostic evidence.

RS-485 (multi-drop) — reader-side checklist

  • Termination: provide an optional end-termination (jumper/DIP) so the reader can act as an end node when needed (do not force by default).
  • Biasing: offer optional fail-safe biasing on the reader only if the bus otherwise floats; keep it configurable for multi-vendor installs.
  • Isolation trigger: long outdoor runs, unknown ground reference, or repeated CRC storms → use isolated RS-485 on the reader side.
  • Shield/FG handling: treat cable shield as an EMI return path; avoid turning it into a DC current path through the reader ground.

Ethernet — what matters on the reader

  • Entry protection: TVS + common-mode choke near the connector (reader-side only) to prevent PHY upsets and latent damage.
  • Link diagnostics: track link up/down count, CRC/align errors, and packet drops to distinguish wiring/EMI from application issues.
  • “Works on bench” failure: field problems often show as link flap bursts or CRC spikes during nearby switching (LED burst, RF field, relay noise).

PoE PD (reader-side) — budgeting, inrush, cold start

  • Power budget: allocate headroom for RF field burst and QR illumination; treat peak current as a first-class constraint.
  • Inrush control: PD input + bulk caps can cause repeated power-up retries; enforce soft-start / inrush limiting on the reader.
  • Cold-start sequencing: bring up digital + SE state deterministically before enabling high-disturbance loads (RF/LED).
  • Brownout record: log PD re-negotiate events and rail droop so “credential accepted but not reported” can be proven or ruled out.

Output data model — integration-friendly and debuggable

  • Credential ID (UID/token) + auth result (pass/fail/uncertain)
  • Timestamp + reader status (supply OK / RF margin / QR OK)
  • Tamper status (cover / wiring tamper) + quality flags (retry count, decode-time bucket)
  • Evidence mapping: each field corresponds to a measurable counter/log so failures are not “mystery wiring problems”.

Evidence hooks (minimum set)

  • RS-485: CRC error count, timeout count, frame rate; optional scope snapshot at A/B during failures.
  • Ethernet: PHY link counters, link flap count, CRC/align errors.
  • PoE: PD class/negotiation result, power-up retry count, brownout log + rail ramp time.
Figure F7 — Reader Interface Panel: RS-485, Ethernet, and PoE PD (Reader-side) Reader-side interface panel diagram showing RS-485 transceiver with optional isolation and selectable termination/bias, Ethernet PHY with magnetics and protection blocks, and PoE PD front-end with inrush limiting and DC/DC tree. Evidence taps indicate CRC counters, link counters, PD class result, and brownout logs. Reader Interfaces — RS-485 / Ethernet / PoE PD (Protection + Evidence) Reader Boundary RS-485 Transceiver A/B driver + receiver ISO (optional) TERM BIAS Cable / Terminal A B SHIELD CRC errors Ethernet TVS CMC PHY link + counters MAG RJ45 Link counters PoE PD PD front-end class + detect Inrush DC/DC Power rails 5V 3V3 1V8 PD class Brownout log Keep integration reader-side: selectable term/bias, port protection, PD inrush/cold-start, and counters/logs that prove where failures occur.
Figure F7. Reader-side interface panel: RS-485 (optional isolation, selectable termination/bias), Ethernet (TVS/CMC/PHY/MAG), and PoE PD (class, inrush, rails) with evidence taps.
H2-8 • Power Tree & Robustness • Cold start • Brownout • Surge/ESD (Reader-side)

Power Tree & Robustness: Cold Start, Brownout, Surge/ESD at the Reader

Readers fail in the field less from “bad credentials” and more from power and cable reality: long runs, outdoor surges, inrush retries, and load bursts (RF + QR LED) that collapse rails. The goal is deterministic behavior: clean boot, safe brownout, and observable evidence.

Power domains (why partitioning matters)

  • Input domain: PoE input → PD front-end → hot-swap/inrush limiting.
  • Digital domain: MCU + memory + interfaces (needs clean sequencing and stable reset behavior).
  • Secure domain: SE/SAM state should never be left “half-committed” across droops.
  • RF + QR domains: RF field burst and LED burst are high-disturbance loads; isolate/sequence to avoid pulling digital/SE rails down.

Cold start (reader-side sequencing rules)

  • Bring up stable rails first: digital + secure rails should reach valid thresholds before enabling RF/LED bursts.
  • Reset policy: define what resets on undervoltage and what remains latched as “recover required”.
  • Startup evidence: record rail ramp time, PD negotiation result, and first link status to correlate with field failures.

Brownout behavior (prevent “accepted but not reported”)

  • Consistency rule: if a brownout occurs mid-transaction, the system must either complete safely or roll back to a known-good state.
  • Reporting rule: avoid acknowledging a credential unless the output path is known-good (or the event is safely buffered with recovery markers).
  • Post-brownout proof: reset reason + rail droop + SE status must expose recovery events and prevent silent state corruption.

Surge/ESD entry points (where spikes actually enter)

  • Ports: RJ45/RS-485/PoE input are primary entry points; protection must stop both damage and PHY/MCU upsets.
  • Shield/ground reference: cable shield transients can shift local ground and trigger brownouts even without “visible damage”.
  • Antenna coupling: nearby ESD events can couple into the RF front-end and disturb rails through internal paths.

Evidence hooks (measure here first)

  • First 2 measurements: (1) input/primary rail droop waveform during the failure, (2) MCU reset reason + SE status after recovery.
  • Supporting counters: PoE renegotiation/retry count, Ethernet link flap counters, transaction retry spikes, rail ramp time logs.
  • Discriminator: if link flaps with stable rails → wiring/EMI; if rails droop with LED/RF bursts → power partition/sequencing/inrush/hold-up issue.
Figure F8 — Power Tree and Fault Arrows: Brownout, Surge/ESD, and Load Bursts Power tree diagram from PoE input to PD front-end and DC/DC rails (12V to 5V to 3.3V to 1.8V). Branches feed RF, Digital/SE, and QR/LED domains. Fault arrows indicate surge/ESD entry points, brownout events, and LED/RF burst coupling. Measure-first points are marked. Power Tree — Cold Start + Brownout + Surge/ESD (Measure Here First) PoE Input VIN / cable PD + Inrush soft-start 12V primary 5V logic + loads 3V3 digital 1V8 core RF Domain field burst Digital / SE reset + recovery SE state QR / LED Domain illumination burst Surge/ESD Brownout LED burst Measure VIN Measure 5V Measure 3V3 Reset reason Diagnose by evidence: rail droop + reset reason + SE status, then correlate with link flaps and retry spikes to separate EMI from power collapse.
Figure F8. Reader-side power tree with fault arrows (surge/ESD, brownout, LED burst coupling) and “measure here first” points for fast field diagnosis.
H2-9 • System Validation Plan • SOP • Pass/Fail • Production Checks

System Validation Plan: What to Test, Pass/Fail Criteria, and Production Checks

This validation SOP is scoped to the reader itself and its measurable behaviors. Each test item is defined by setup, stimulus, metrics, pass/fail, and evidence, so failures flow directly into the field debug playbook.

RF validation (HF/LF as implemented)

  • Range curve: distance stepping per credential type; record success rate and retry count per step.
  • Detuning robustness: repeat under metal plate, hand proximity, and moisture-like conditions.
  • Multi-tag: increasing tag count; track anti-collision completion time and failure rate.
  • Evidence: V_ANT/field sense proxy, AGC state, Rx envelope/noise floor, transaction time histogram.

Security validation (SE/SAM behaviors)

  • Provisioning flow: personalization success, key version binding, lock state, and audit markers.
  • Negative tests: replay/rollback attempts must be rejected with stable error codes and logged evidence.
  • Tamper response: trigger → status flag → output frame → recovery policy must be consistent.
  • Evidence: SE status words, secure session result codes, monotonic counter deltas (if used), anti-tear markers.

QR validation (screen / glare / motion / low light)

  • Screen brightness sweep: low/medium/high; record decode latency and retry count.
  • Reflective surfaces: glossy protector/glare angles; verify stable decode rate.
  • Motion blur: controlled movement; confirm decode completion within target latency budget.
  • Low light: illumination on/off; record exposure time, LED current, and decode histogram.
  • Evidence: exposure time, illumination current waveform, decode retries, latency distribution.

Interfaces + power validation (reader-side only)

  • RS-485 matrix: cable length × termination × bias; track CRC/timeout counts and frame stability.
  • Ethernet disturbance: controlled ESD/surge-like events in lab; track link flaps and PHY error counters.
  • PoE robustness: repeated cold start; record PD negotiation, inrush retry count, rail ramp time.
  • Evidence: CRC counters, link counters, PD class/negotiation logs, reset reason + rail droop snapshots.

Pass/Fail criteria (how to write it so it’s actionable)

  • Success rate: define minimum success rate per distance/condition (not a single “range number”).
  • Latency: define typical and worst-case bounds for credential transaction and QR decode time.
  • Error rate: bound CRC/timeout/link flap counts within a fixed test window.
  • Recovery: after brownout, reader must re-enter a known-good state with visible recovery evidence.

Production checks (fast, repeatable, traceable)

  • Antenna tune check: quick field-sense / amplitude proxy check against a window.
  • SE personalization check: key version / lock state / self-test result recorded per unit.
  • QR smoke test: standard code + low-light or reflective code; record decode time bucket.
  • Trace fields: unit ID, test timestamp, key version, tune result, QR bucket, interface self-test.
Deliverable style: keep each test item measurable and reader-owned. Every validation output should map to a counter, waveform, or status field that the field playbook can use.
Figure F9 — Validation Matrix for Reader Subsystems Matrix diagram with rows for RF, Secure Element, QR, Interfaces, and Power. Columns represent key test categories: range, latency, error rate, robustness, and production check. Each cell uses icons to indicate metric type and evidence outputs. Validation Matrix — Subsystems × Tests (Metrics + Evidence) Range Latency Error rate Robust Prod RF SE QR IF PWR K Evidence outputs: V_ANT/AGC (RF) • status/counter (SE) • exposure/retries (QR) • CRC/link (IF) • droop/reset reason (PWR)
Figure F9. Validation matrix mapping reader subsystems to measurable tests and evidence outputs (range, latency, error rate, robustness, production checks).
H2-10 • Field Debug Playbook • Symptom → Evidence → Isolate → Fix

Field Debug Playbook: Symptom → Evidence → Isolate → Fix

This playbook targets fast diagnosis with minimal tools. Each symptom branch begins with first 2 checks (one waveform + one counter/log), then uses a simple discriminator to isolate likely causes and first fixes. Scope stays reader-side: RF chain, SE/SAM state, QR pipeline, interfaces, and power integrity.

Playbook rules (repeatable)

  • Start with 2 checks only: choose the highest-separation measurements first (avoid “measure everything”).
  • Log the evidence: store counters/status words alongside the symptom so the fix is traceable.
  • First fix is minimal: apply the smallest change that proves the hypothesis before redesigning hardware.

Symptom A — short range / intermittent reads

  • First 2 checks: V_ANT amplitude + Rx envelope / noise floor.
  • Discriminator: V_ANT droops → detuning/matching/power; V_ANT stable but noisy → EMI/AGC saturation/self-interference.
  • Isolate: detuning source (metal/hand/moisture) vs Rx headroom/AGC behavior.
  • First fix: retune matching window, ferrite/shield spacing, limit Tx burst/duty, improve grounding and cable routing.

Symptom B — reads but controller rejects

  • Evidence: SE status words, mutual-auth result codes, counter/anti-tear markers, audit entry (if enabled).
  • Discriminator: auth failure → key mismatch/personalization; replay/rollback flags → counter/time policy; anti-tear markers → interrupted commit.
  • Isolate: provisioning mismatch vs recovery state vs transaction log corruption after droop.
  • First fix: re-personalize with version binding, enforce safe commit policy, recover counter/time markers and re-validate.

Symptom C — QR slow / certain screens fail

  • Evidence: exposure time, LED current waveform, decode retry count, latency histogram.
  • Discriminator: long exposure + retries → low light/glare; fails on specific screens → flicker/PWM + rolling shutter interaction.
  • Isolate: illumination strategy vs exposure clamp vs optics/angle constraints.
  • First fix: adjust LED drive scheme, clamp exposure, add retry strategy, improve angle guidance and glare handling.

Symptom D — random reboot / link drop

  • First 2 checks: rail droop waveform + reset reason; then PHY link counters / CRC spike correlation.
  • Discriminator: rails droop → inrush/UVLO/hold-up/load burst; rails stable but link flaps → EMI/port protection/ground reference.
  • Isolate: which domain causes droop (RF burst vs LED burst) and which entry point triggers upsets (ports/shield).
  • First fix: improve inrush/UVLO/hold-up, strengthen ESD clamps/CMC, correct cable shielding and grounding guidance.
Figure F10 — Field Debug Decision Tree (4 Symptom Branches) Decision tree graphic with four symptom branches: RF short range, reads but rejected, QR slow/screen-specific, and random reboot/link drop. Each branch shows first two checks, a discriminator, likely causes, and a first fix. Designed for minimal tools and reader-side evidence. Field Debug — Symptom → 2 Checks → Likely Cause → First Fix A. Short range / intermittent reads Check 1: V_ANT Check 2: Rx envelope / noise Discriminator: droop vs stable+noisy Cause: detune / match Cause: EMI / AGC sat First fix: retune + ferrite/shield + limit burst + grounding B. Reads but rejected Check 1: SE status Check 2: auth/counter log Discriminator: key mismatch vs replay/rollback vs anti-tear Key mismatch Replay flag Anti-tear First fix: re-personalize + safe commit + recover markers C. QR slow / screen-specific fail Check 1: exposure time Check 2: retries + LED current Discriminator: low-light/glare vs flicker/PWM Cause: glare/blur Cause: flicker/PWM First fix: LED scheme + exposure clamp + angle guidance D. Random reboot / link drop Check 1: rail droop Check 2: reset reason + PHY Discriminator: droop vs stable rails + link flaps Cause: inrush/UVLO Cause: EMI/protection First fix: hold-up/inrush + clamps/CMC + grounding Keep it reader-side: waveforms + counters + status words → isolate fast → apply smallest fix that proves the cause.
Figure F10. Decision-tree playbook: four symptom branches, each with “first 2 checks”, discriminators, likely causes, and first fixes (reader-side evidence).

H2-11. Reference BOM Buckets (Example MPNs + Selection Criteria)

This chapter lists example components (MPNs) by functional bucket, plus selection criteria tied to the reader’s real failure modes: short read range, intermittent auth, QR decode latency spikes, brownout resets, and long-cable / outdoor ESD events. The goal is not to “recommend brands,” but to make the BOM auditable and testable.

Bucket A NFC / HF RFID Front-End Range + Robust Reads

Reader AFE / Transceiver (13.56 MHz) — what to choose and why

  • When this bucket dominates: read range, anti-collision stability, “works on bench but fails on metal door frame,” and immunity to detuning / hand effects.
  • Key specs to compare: Tx driver current capability, Rx sensitivity & dynamic range (self-interference tolerance), field-sense / amplitude measurement support, temperature drift of tuning, and support for target protocols (ISO14443A/B, NFC-A/B/F as needed).
  • Integration traps: insufficient measurement nodes (no field-sense), too little Rx headroom under strong Tx field, and poor diagnostic visibility (hard to correlate failures with VANT, ITX, AGC state).
Fast selection rule: prefer a front-end that exposes field-sense / amplitude or internal ADC readings, so validation and field debug can correlate range collapse with detuning vs saturation vs power droop.

Example MPNs (HF 13.56 MHz)

  • PN5180A0HN/C1Y (NXP) — NFC front-end for 13.56 MHz
  • ST25R3916B-AQWT (ST) — NFC/RFID reader IC
  • TRF7970ARHBR (TI) — 13.56 MHz NFC/RFID transceiver
  • SLRC61003HN (NXP, CLRC663/SLRC family) — low-power NFC front-end

LF 125 kHz Prox note: if a product truly includes LF Prox, it typically becomes a separate LF analog path and coil geometry problem. Keep the LF chain isolated in schematics and bring out measurement nodes early.

Bucket B Secure Element / SAM Keys + Anti-tear

Secure Element / SAM — keep keys inside, keep state consistent

  • Own the trust boundary: long-term keys, cryptographic operations, secure messaging, and (when used) monotonic counters should remain inside the SE/SAM.
  • Anti-tear requirement: after a brownout, the system must not enter “credential accepted but not reported” or “accepted once, then forever rejected.” This depends on atomic commit behavior and clear error reporting.
  • Field evidence hooks: status words / error codes, secure counter deltas, last-transaction markers, and “provisioning ok” flags readable by the MCU.
Selection checklist: lifecycle/provisioning flow, secure channel capability, documented power-loss behavior, and clear failure codes that map to debug playbooks.

Example MPNs (SE / SAM)

  • MF4SAM3HN/9BA659SZ (NXP) — MIFARE SAM AV3 secure access module
  • SE050C2HQ1/Z01SDZ (NXP) — IoT secure element
  • STSAFA110S8SPL02 (ST) — STSAFE-A110 secure element
  • SLS32AIA010MLUSON10XTMA2 (Infineon) — OPTIGA™ Trust M secure element
  • ATECC608B (Microchip) — crypto authentication IC (fits “identity + secure ops” use cases)
Bucket C MCU / MPU Determinism + Logging

Main MCU/MPU — secure boot + deterministic I/O + forensic logs

  • Primary job: schedule RF transactions, manage SE sessions, drive UI/tamper, capture QR frames (if used), and output a consistent “credential event record” over RS-485/Ethernet.
  • Must-have capabilities: secure boot support, enough RAM for protocol stacks and buffering, reliable timers (latency budgets), and non-volatile storage policy (logs/config with wear strategy).
  • Debug-first requirement: reset-reason capture, brownout counters, link error counters, and a way to export “last N events” without a cloud dependency.

Example MPNs (MCU)

  • STM32H563ZIT6 (ST) — Cortex-M33 class MCU
  • LPC55S69JBD100 (NXP) — Cortex-M33 class MCU
  • SAME70Q21B (Microchip) — high-performance MCU family example
  • RA6M5 (Renesas) — industrial MCU family example
Selection hint: choose the MCU based on “worst-day behavior”: long cable, cold start, ESD events, and RF detuning conditions — not just nominal throughput.
Bucket D RS-485 Long Cable Reality

RS-485 transceiver (reader-side) — noise, ground shifts, and isolation options

  • Key specs: ESD robustness, common-mode range, failsafe/bias behavior, and data-rate vs cable-length margin.
  • Isolation decision: if the install environment has ground potential differences or outdoor cabling, an isolated solution can prevent repeated PHY damage and “ghost CRC errors.”
  • Evidence hooks: CRC error counters, framing errors, and oscilloscope captures at A/B lines under worst-case cable runs.

Example MPNs (RS-485)

  • THVD1450 (TI) — RS-485/RS-422 transceiver family
  • SN65HVD1781 (TI) — robust RS-485 transceiver
  • MAX3485E (Analog Devices / Maxim) — low-power RS-485 transceiver
  • ADM2587E (Analog Devices) — isolated RS-485 transceiver
  • ISO1410 (TI) — isolated RS-485 transceiver
Bucket E Ethernet PHY ESD + Link Health

Ethernet PHY + magnetics (reader-side) — link stability as a diagnostic signal

  • Key specs: ESD rating, EMI behavior with magnetics, link-down recovery time, and counters/diagnostics (link flaps matter in field debug).
  • Protection pairing: magnetics + TVS + common-mode choke choices should align with the expected surge environment; otherwise readers become “random reboot / random link drop” machines.
  • Evidence hooks: PHY link status, error counters, and timestamped link flap logs correlated with power droop.

Example MPNs (Ethernet PHY)

  • DP83825IRMQR (TI) — 10/100 Ethernet PHY
  • KSZ8081RNA (Microchip) — 10/100 Ethernet PHY
  • ADIN1100 (Analog Devices) — industrial 10/100 Ethernet PHY
Bucket F PoE PD Cold Start + Inrush

PoE PD controller (reader-side) — power negotiation + startup correctness

  • Why this bucket matters: many “unstable reader” complaints are actually PoE startup, inrush, or brownout behavior under load steps (RF Tx burst + LED flash + Ethernet activity).
  • Key specs: supported PoE class / power level, inrush control behavior, UVLO thresholds, and power-good signaling into the MCU.
  • Evidence hooks: PoE classification result, rail ramp waveforms, reset reasons, and “power-good vs event loss” correlation.

Example MPNs (PoE PD)

  • TPS2373-4RGWR (TI) — PoE PD interface (802.3at/bt)
  • TPS23730RMTR (TI) — PoE PD + DC/DC controller (802.3bt type-3)
  • SI3402-B-GM (Skyworks/Silicon Labs) — PoE PD controller
Bucket G DC/DC + LDO RF & QR Rail Hygiene

Power conversion — keep RF quiet, keep QR consistent, keep logs intact

  • Partition rails by behavior: RF Tx bursts and LED pulses should not share the same “quiet” rail feeding AFE references or sensitive analog nodes.
  • Key specs: load-step response, ripple/EMI profile, enable/PG behavior for sequencing, and efficiency vs thermal limits inside sealed enclosures.
  • Failure patterns: intermittent reads + QR decode slowdown + Ethernet flaps often point to rail droop and poor domain separation.

Example MPNs (DC/DC + LDO)

  • TPS62130 (TI) — 3A step-down converter
  • TLV75533PDRVR (TI) — 500mA LDO (3.3V option)
  • LTC3639 (Analog Devices) — buck converter family example
  • MCP16331 (Microchip) — buck converter family example
Bucket H eFuse / Protection Surge + Miswiring

eFuse / OVP / reverse protection — stop “mystery bricking” on real installs

  • What to protect against: long-cable surges, wiring mistakes, and repeated ESD hits that cause latent damage (not immediate failure).
  • Key specs: current limit/inrush control, reverse current blocking, fast OVP response, and fault signaling for “event logs that explain the failure.”
  • Evidence hooks: fault pins into MCU, latch vs retry behavior, and captured “power fault reason” in logs.

Example MPNs (Protection)

  • TPS25947 (TI) — eFuse with reverse protection
  • LTC4365 (Analog Devices) — OV/UV/reverse protection controller
  • SMBJ58A (generic) — TVS example (choose per interface/rail)
Bucket I QR Camera + Illumination Decode Latency

QR subsystem — camera sensor + lens + LED driver as one timing budget

  • Key specs: low-light performance, rolling-shutter behavior vs LED PWM/flicker, exposure control hooks, and interface compatibility with the chosen MCU/MPU.
  • Illumination rule: LED current waveforms should be measurable and repeatable; uncontrolled pulses create decode jitter and thermal drift.
  • Evidence hooks: decode time histogram, exposure settings logs, LED current capture, and “retry reason” counters.

Example MPNs (QR)

  • OV5640 (OmniVision) — image sensor family commonly used in QR modules
  • OV09281-H64A (OmniVision) — image sensor (example order code)
  • TPS61165 (TI) — white LED driver (illumination)
  • MPQ3302 (MPS) — LED driver family example
Figure F11 BOM Map 3:2 Inline SVG
Figure F11 — Reader BOM Buckets Map Prox / IC / QR / NFC Reader Reader Boundary RF AFE / TxRx 13.56MHz (HF) Field-sense / Demod Antenna + Match Coil • C/L network Detune control Secure Element / SAM Keys stay inside Anti-tear state MCU / MPU Scheduling • Logs Secure boot QR Camera Sensor • Lens Decode budget Host Interfaces RS-485 • Ethernet PoE PD input Bucket A NFC Front-end Bucket A2 Match Parts Bucket I QR + LED Bucket D/E RS-485 / PHY Bucket F PoE PD Bucket G/H DC/DC + eFuse Bucket B SE / SAM Bucket C MCU / MPU Map intent: show how BOM buckets attach to subsystems, so validation + field debug can trace failures back to a bucket.
Cite this figure
Use the on-page anchor: #fig-f11 (copy the URL after publishing).
F11 highlights the “bucket-to-subsystem” mapping used by validation and field debug: RF range/robust reads (Bucket A/A2), key custody/anti-tear (Bucket B), deterministic event records (Bucket C), long-cable interfaces (Bucket D/E/F), and power/protection (Bucket G/H), plus QR capture timing (Bucket I).

ALT (for the cover/figure image): Prox/IC/QR/NFC reader BOM map showing RF AFE, secure element/SAM, MCU, QR camera, RS-485/Ethernet/PoE, DC/DC rails and protection buckets around the reader boundary.

Request a Quote

Accepted Formats

pdf, csv, xls, xlsx, zip

Attachment

Drag & drop files here or use the button below.

H2-12. FAQs ×12 (Accordion)

Each answer stays strictly on the reader side and points back to measurable evidence: antenna/field nodes, Rx envelope/AGC, SE status words, interface error counters, and power-rail/reset logs.

Reads fine on bench, fails on a metal door frame—detuning or grounding? +
Start by comparing VANT/field-sense amplitude and Rx envelope shape before vs after mounting. If amplitude collapses and resonance shifts, it is primarily detuning (metal proximity, ferrite, spacing). If amplitude is similar but noise spikes or waveform distorts during cable events, suspect grounding/reference issues. First fix: add ferrite/keep-out and re-tune matching, then harden the reader-side ground/shield entry.
Mapped: H2-4Mapped: H2-3
Range suddenly drops in humid weather—coil Q drift or enclosure moisture? +
Humidity problems usually show up as a repeatable shift in tuning and reduced effective Q. Check a fixed “golden tag” at a fixed distance while logging field-sense/VANT and success rate. If performance degrades gradually with humidity and recovers after drying, moisture is changing dielectric losses or detuning the coil region. First fix: improve sealing/venting strategy and reserve matching margin; add a quick production/field check to flag Q/tuning drift.
Mapped: H2-4
Tag is detected but UID is inconsistent—Rx saturation or protocol collision? +
First, reproduce with one tag only and log frame error counters plus Rx envelope/AGC state. Saturation typically worsens at very close range: Rx envelope clips, AGC hits limits, and CRC errors rise. Collision issues appear mainly when multiple tags are present and transaction time/retry count increases. First fix: reduce Tx drive or improve Rx dynamic range for saturation; for collision, tighten anti-collision timing/retry policy and verify field strength is not excessive.
Mapped: H2-3Mapped: H2-2
Two cards near the reader cause random failure—anti-collision or field strength? +
Measure two things: transaction time/retry count and Rx envelope integrity. If time and retries explode with two cards while envelope stays clean, it points to anti-collision handling. If failures happen mainly at close range and the envelope shows clipping/overload, field strength or self-interference is dominating. First fix: cap Tx power and validate modulation depth at close range; then optimize reader-side polling and retry limits so multi-tag behavior is predictable rather than “random.”
Mapped: H2-2Mapped: H2-3
Reader beeps “OK” but the panel reports reject—where to look first? +
Treat this as an evidence split: (1) did the reader truly authenticate, and (2) did it report the same event. First check SE/SAM status words (mutual-auth result, secure messaging state). Then check the reader’s outgoing record: frame CRC, event fields (UID/credential ID, auth result, tamper bit), and timestamp/sequence. First fix: version the output frame and log both “auth result” and “report status” so mismatches become diagnosable without touching panel logic.
Mapped: H2-5Mapped: H2-7
After a power glitch, secure auth fails until reboot—anti-tear or SE state? +
Capture three signals together: rail droop waveform, MCU reset reason/brownout counter, and the first SE transaction’s status words. If the SE returns consistent “state/transaction” errors after glitches, anti-tear/commit handling is likely incomplete. If the SE behaves unpredictably depending on ramp shape, the power/Reset sequence is marginal. First fix: harden UVLO/hold-up and ensure the SE has a clean reset + re-init path; then enforce atomic commit rules for secure transactions.
Mapped: H2-5Mapped: H2-8
QR scans slow only for phone screens—flicker/PWM or glare? +
Phone screens introduce two common failure modes: rolling-band artifacts from PWM/flicker and specular glare. Log exposure time, decode retries, and inspect frames for banding. If slow scans correlate with banding at specific brightness levels, flicker is the driver. If changing angle quickly fixes it, glare dominates. First fix: clamp exposure and adjust illumination strategy (avoid harsh PWM interactions); add a simple user guidance cue (angle/stand-off) and use an optical hood/geometry to reduce reflections.
Mapped: H2-6
QR works in daylight but fails at night—illumination current or exposure clamp? +
Measure LED current waveform and confirm the camera’s exposure/gain is allowed to rise at night. If LED current never reaches the intended level (or sags during bursts), illumination is under-driving or the rail is drooping. If LED is correct but exposure is capped, decode will time out in low light. First fix: stabilize the LED supply (separate rail, soft-start, adequate headroom) and set an explicit low-light policy for exposure limits; verify night-mode latency histogram in validation.
Mapped: H2-6Mapped: H2-8
RS-485 CRC errors spike when a door strike activates—cable coupling or reference ground? +
Correlate the strike activation with (1) an oscilloscope capture of RS-485 A/B (and common-mode) and (2) the reader’s rail droop/reset logs. If differential spikes appear on A/B at the strike edge, coupling/EMI is injecting errors. If the common-mode shifts beyond receiver tolerance, ground/reference issues dominate and isolation often helps. First fix: improve reader-side termination/bias, reroute or shield the cable path near the strike wiring, and add isolation or stronger ESD/surge protection where required.
Mapped: H2-7Mapped: H2-8
Ethernet link flaps during thunderstorms—ESD/surge at PHY or PoE brownout? +
Separate “link-only” events from “power” events. Check PHY link/down counters and magnetics-side protection condition, then compare with PoE PD logs: classification result, UVLO triggers, and rail droop captures. If the link flaps while rails stay stable and the MCU keeps running, it is likely surge/ESD at the PHY front-end. If link flaps coincide with resets or UVLO, PoE brownout dominates. First fix: strengthen reader-side Ethernet surge/ESD entry protection and improve PD inrush/hold-up for brownout resilience.
Mapped: H2-7Mapped: H2-8
Firmware update succeeded but keys “vanished”—were they in SE or MCU? +
Keys should persist across MCU firmware updates if they are owned by the SE/SAM and never exported. First check whether the reader’s “secure identity” is derived from SE-held keys or MCU flash/EEPROM. Then verify update logs for any “factory reset/personalization wipe” step and inspect SE application lifecycle status (applet present, personalization flag). First fix: formalize key ownership (SE only), separate “config update” from “personalization,” and require explicit authorization to erase secure state so accidental updates cannot silently remove credentials.
Mapped: H2-5
How to production-test antenna tuning quickly without a VNA? +
Use repeatable, reader-native proxies instead of full impedance plots. A practical method is: drive a controlled Tx level, sample field-sense/VANT amplitude (or internal ADC readings), and measure success rate/transaction time with a fixed “golden tag” at a fixed stand-off. Add a small, known “test capacitor” option on the PCB to detect resonance direction during debugging, then lock a pass window for production. First fix: define a simple pass/fail threshold (amplitude + timing) and store the measurement for traceability; escalate to VNA only for outliers.
Mapped: H2-4Mapped: H2-9