Prox/IC/QR/NFC Reader Hardware: AFE, Secure Element, PoE I/O
← Back to: Security & Surveillance
A Prox/IC/QR/NFC reader is the “front-door evidence engine”: it reliably captures credentials (RF + QR), protects keys in a secure element, and outputs authenticated events over RS-485/Ethernet/PoE. This page focuses on the measurable proof chain—field strength, SE status, interface counters, and power-rail logs—so real-world failures can be isolated and fixed without scope creep.
What This Reader Owns (Definition + Boundary + Non-Goals)
One-sentence definition. A multi-credential access reader that acquires Prox/IC/NFC and/or QR credentials, keeps keys inside an SE/SAM trust boundary, and outputs authenticated results over RS-485 or Ethernet (often powered by PoE PD).
Owns (must be delivered by this page)
- RF front-end + antenna: field generation, receive demod, tuning/matching, detuning robustness.
- Secure Element / SAM: key ladder, mutual-auth primitives (high level), anti-tear behavior, safe personalization/update boundaries.
- QR scan module: camera + illumination + decode-latency budget (QR-only constraints).
- Physical I/O + power: RS-485/Ethernet/PoE PD entry, reader-side protections, rails and reset behavior.
- Tamper + UI: tamper switch inputs, LED/buzzer feedback mapping to states.
- Validation + field debug evidence: what to measure first, what logs/counters prove each hypothesis.
Referenced only (name it, don’t deep-dive)
- Host/controller decisions: access policy lives elsewhere; reader only reports credential + status.
- OSDP/Wiegand/etc.: mention as interface surface if present; no controller protocol strategy.
- Site infrastructure: PoE switch/PSE, timing networks, NVR/VMS, cloud/app are out of scope.
Non-goals (hard boundaries)
- Not lock actuation (motor/solenoid) and not door mechanics/safety interlocks.
- Not access panel architecture, database, user management, or cloud/mobile app workflows.
- Not general camera imaging/ISP topics beyond QR scanning constraints.
Evidence-first promise (EEAT, engineering style). Every claim on this page should map to a measurable node (RF field sense / Rx envelope), a log/counter (auth fail reason / retries), or a power event record (reset reason / rail droop) — so “works on bench” can be separated from “works on door frame” using data.
Credential Landscape & Protocol Surfaces (Only What a Reader Must Support)
Goal of this chapter. Explain what changes electrically and firmware-wise across Prox / HF NFC / optional UHF / QR — without turning into a standards lecture. The rule is simple: each credential family maps to a different set of hardware knobs and measurable evidence.
Credential families → what they imply for hardware
- LF 125 kHz Prox: coil size and coupling dominate; simpler modulation/demod; range is sensitive to coil geometry and installation metal.
- HF 13.56 MHz (ISO14443 / NFC-A/B/F): field generation + tiny load modulation reception; the Rx chain must survive Tx self-interference; anti-collision/time budget matters.
- UHF (optional): if the product includes UHF, treat it as a separate RF chain (antenna + PA/LNA + filtering). If not included, keep UHF as a one-line “not applicable”.
- QR: optics + illumination + decode latency; failures often come from flicker, glare, motion blur, and low light (not “RF tuning”).
Surface checklist (minimum you must pin down)
- Band & coupling: LF/HF/UHF or optical; determines antenna/driver vs sensor/LED.
- Range target: typical distance and allowed detuning conditions (metal frame, hand, moisture).
- Time budget: target transaction time (e.g., P95/P99) under single-tag and multi-tag conditions.
- Anti-collision: whether multi-card presence must be supported and how retries are bounded.
- Crypto presence: whether mutual auth exists and where keys must live (SE/SAM vs MCU).
- Primary field failure mode: detuning vs Rx saturation vs optical glare vs power droop — define upfront.
Evidence mapping (how you keep it engineering-grade). For each credential family, bind the “knobs” to first-order measurements. This prevents vague conclusions like “RF is weak” or “QR is slow” by forcing a concrete discriminator.
| Credential | Hardware knobs (what you can tune) | What to measure (first evidence) | What it proves (discriminator) |
|---|---|---|---|
| LF Prox 125 kHz |
Coil geometry, matching, Tx drive level, demod threshold | Field strength proxy, demod envelope, retry count | Detuning/metal coupling vs noise floor vs thresholding margin |
| HF NFC 13.56 MHz |
Matching/Q window, Tx current limit, Rx AGC behavior, anti-collision timing | VANT amplitude, Rx envelope margin, AGC state, time-to-UID histogram | Tx leakage saturation vs insufficient field vs collision/retry amplification |
| UHF (if present) separate chain |
Antenna + PA/LNA, filtering, duty cycle, regional constraints | RSSI, backscatter decode success rate, thermal limit counters | Link budget limitation vs interference vs thermal derating |
| QR optical |
FOV/focus, illumination current, exposure clamp, decode retry policy | Decode latency (P95/P99), exposure time, LED current waveform, retry reason | Flicker/glare/motion blur vs insufficient illumination vs CPU scheduling |
RF Front-End Architecture: Tx Field, Rx Demod, and Why Readers Fail in the Real World
Why this chapter matters. Most real failures are not “protocol issues”; they are physics + dynamic range problems: the reader must generate a strong field while detecting a tiny load-modulation signal in the presence of its own Tx leakage, detuning, and power/EMI stress. The engineering goal is to map each failure to one measurement and a first fix.
Generic HF reader chain (signal + energy path)
- PA/Driver → Antenna Matching → VANT/Field Sense (energy delivered)
- Load Modulation → Rx Front-End → Demod → ADC/Comparator → Digital Framing (information recovered)
The hard part is that the information signal is orders of magnitude smaller than the Tx field, so Rx margin is often lost to detuning or Tx self-interference.
Critical design knobs (what actually moves the needle)
- Antenna geometry + Q + matching: sets field strength and sensitivity to metal/hand/moisture detuning.
- Tx current limit + duty cycle + thermal: sets range vs heating/derating; affects EMI and supply droop risk.
- Rx dynamic range: surviving Tx leakage while resolving load modulation (AGC, filters, limiters, demod threshold).
Failure signatures tied to physics (fast discriminators).
- Range collapses near metal: often detuning/Q loss. Evidence: VANT drops or resonance shifts; Rx envelope shrinks.
- Intermittent reads / “sometimes works”: often marginal Rx envelope vs AGC/threshold. Evidence: AGC state toggling; retries spike.
- Bench OK, door-frame fails: installation detunes the coil and changes return paths. Evidence: VANT/Field Sense changes after mounting; new noise on supplies or Rx envelope.
Debug hooks (minimum-instrument strategy)
- First 2 measurements: (1) VANT or ITX (energy delivered) + (2) Rx Envelope or Demod Out (information margin).
- Optional discriminators: Modulation index estimate, AGC state, retry/time-to-UID histogram.
If VANT/ITX is stable but reads fail, suspect Rx dynamic range/thresholding. If VANT collapses after installation, suspect detuning/Q loss.
First fixes (small actions with high ROI)
- Detune dominated: adjust matching, add ferrite/spacer, enforce keep-out, fix cable routing and metal proximity.
- Rx margin dominated: reduce Tx leakage coupling, verify AGC/limiter settings, tighten demod filter/threshold stability.
- Power/EMI dominated: improve rail decoupling and return path, limit Tx bursts, verify brownout/reset reasons.
Antenna & Matching Network: Tuning, Detuning, and Manufacturing Tolerance
Purpose of this chapter. “Antenna tuning” cannot be a vague statement. It must become a repeatable checklist with acceptance criteria, because the #1 field complaint (“works in lab, fails on door frame”) is often a tuning/tolerance problem.
What “tuned” means in production (acceptance thinking)
- Resonance target: resonance stays within an allowed window around the operating band after final assembly.
- Q window: Q is high enough for range but not so high that small detuning collapses reads (avoid “knife-edge tuning”).
- Impedance/match intent: the driver can deliver stable VANT/ITX without abnormal heating or rail droop.
A practical definition: mounted product maintains VANT and Rx envelope margin across expected metal/hand/environment conditions.
Detuning sources (field-priority list)
- Metal backplate / door frame: shifts resonance and increases loss → range collapse.
- Cable routing & return path: changes coupling and injects noise → intermittent demod margin.
- Enclosure + assembly tolerance: coil-to-metal spacing variation → unit-to-unit variability.
- User hand / moisture: adds loss and dielectric change → seasonal or humidity-sensitive failures.
Practical mitigation (mechanical first, then electrical)
- Ferrite sheet: reduces metal coupling loss; improves consistency across mounting surfaces.
- Shield spacing: enforce a controlled coil-to-metal distance; avoid “touching metal” stack-ups.
- Keep-out zones: reserve space for the coil; keep screws, brackets, and cables out of the near-field region.
- Stable cable route: lock the harness path; uncontrolled routing can behave like an antenna detune knob.
- Adaptive tuning (only if supported): optional, but should not be a crutch for poor mechanics.
Production test concept (fast, scalable, traceable)
- Quick check: measure a proxy of amplitude/phase (or resonance indicator) at the operating frequency using VANT/field-sense circuitry.
- Go/No-Go limits: define limits on VANT stability and a resonance proxy after final assembly (not on bare PCB).
- Traceability: log tuning outcome + assembly revision to correlate field failures with production drift.
- Per-unit calibration table: only when mechanical tolerance cannot be controlled economically.
Do / Don’t (to avoid over-claiming)
- Do: validate tuning in the final enclosure on a representative metal mount and with a standardized “hand” proximity condition.
- Do: treat “range” as a distribution (P95/P99) and track retries/time-to-UID as early warning signals.
- Don’t: optimize for peak range on a single bench setup if it increases sensitivity to small detuning.
- Don’t: assume firmware can fix a physically collapsed Rx envelope margin.
Secure Element / SAM: Key Ownership, Mutual Auth, Anti-Tear, and Update Safety
Security spine (without scope creep). A reader is trusted only when keys have a clear home, authentication results are auditable, and power-loss or updates cannot silently corrupt secure state. This chapter defines trust boundaries and the minimum evidence to prove correctness in the field.
What belongs in SE/SAM vs in MCU (ownership matrix)
- SE/SAM owns: key storage (keys never leave in plaintext), cryptographic operations (auth/MAC/enc), secure-session state, secure counters/monotonic counters (if used), anti-tear protected records (last-good).
- MCU owns: RF framing orchestration, UI/indicators, interface packaging (RS-485/Ethernet), timeout/retry policy, non-sensitive event logging (timestamps, error codes, histograms).
- Hard boundary: MCU must not persist key material; any credential verification uses SE result + status, not secrets.
Common high-level flows (only the skeleton that matters)
- Mutual authentication: prove card/credential is genuine and reader is authorized (outputs success/failure with status words).
- Session key derivation: per-transaction session isolates replay and limits exposure (no long-lived secrets in MCU).
- Secure messaging: protect command/response integrity; failure must map to a precise SE status or reader error code.
- Replay protection basics: nonce/counter-based checks; a mismatch must be observable (counter not advanced, explicit failure code).
Anti-tear / power-loss safety (what must stay consistent)
- Transaction atomicity: a secure update is either fully committed or safely rolled back to last-known-good.
- Commit policy: secure counters or state advance only after the transaction reaches a defined “commit point”.
- Journaling / recovery: a minimal protected record enables deterministic recovery after brownout.
- Field discriminator: counter advanced but auth not committed is a red flag; recovery flag + status words must expose it.
Firmware update boundaries (who verifies what)
- MCU secure boot: verifies signed firmware and enforces rollback rules for the MCU image (reader platform integrity).
- SE/SAM lifecycle: governs applets/keys; any SE update must be authenticated and leave an auditable result.
- Do not conflate: MCU update success does not imply SE applet/key state is valid; both sides need explicit status checks.
Evidence hooks (minimum observability to debug securely)
- SE status words (SW): auth/secure-channel failure reason, anti-tear/recovery indication.
- Counter / monotonic increments: detect replay attempts and “half-commits” across power loss.
- Audit log entry: timestamp + credential type + result code + latency; store non-sensitive summaries only.
- Update proof: boot-verify status + firmware/app version IDs + SE applet state (pass/fail + reason code).
QR Camera Module Integration: Optics, Illumination, and Decode Latency Budget
QR as a reader subsystem. The QR path exists to deliver a credential packet quickly and reliably. The focus is scan success rate, time-to-decode, and diagnosability—not full camera ISP image quality.
Minimal QR scanning pipeline (only necessary steps)
- Sensor → exposure control (simple AE/AGC policy appropriate for QR)
- Frame grab → buffer (stable capture path and deterministic timing)
- QR decode (decode engine produces payload + reason codes)
- Credential packet (ID + status → RS-485/Ethernet output)
Engineering priority: reduce “silent failures” by making each stage observable (exposure, illumination, decode time, retry reason).
Design constraints that dominate real-world success
- Rolling shutter × flicker: LED PWM or ambient lighting can create banding → decode time spikes and retries.
- Glare on glossy screens: localized overexposure removes QR modules → “looks bright but unreadable”.
- Low light / motion blur: longer exposure causes smear → unstable detection and user frustration.
Illumination strategy (QR-first, not camera-first)
- Visible vs IR: visible improves user feedback; IR can reduce perceived glare but must still ensure reliable contrast.
- Driver current + thermal: peak current, duty cycle, and derating must keep light stable across temperature and PoE/power transients.
- Safety high-level: keep peak intensity and duty cycle within applicable eye-safety constraints; avoid “unbounded boost” policies.
Decode latency budget (what to measure, not just what to hope)
- Time-to-decode distribution: track P50/P95/P99 rather than a single “typical” value.
- Retry policy: define a capped sequence (adjust illumination → adjust exposure → prompt user) to avoid infinite loops.
- User feedback mapping: LED/buzzer states should correspond to pipeline stages (capture / decode / output).
Evidence hooks (field-debuggable metrics)
- Decode time histogram: Tdecode (P50/P95/P99) and timeout count.
- Exposure settings: exposure/gain per attempt, plus a compact “failure reason” code.
- Illumination waveform: ILED (peak + duty) to confirm flicker-safe behavior.
- Retry reason codes: glare / blur / low-contrast / timeout (reader-side taxonomy, not camera-grade analytics).
Host Interfaces & Wiring: RS-485/Ethernet/PoE (Reader-side Only)
This chapter focuses on reader-side ports and wiring behaviors that determine installation success on long cables and noisy sites. The scope is limited to what the reader can implement and verify: termination/bias options, port protection, PD power-up behavior, and diagnostic evidence.
RS-485 (multi-drop) — reader-side checklist
- Termination: provide an optional end-termination (jumper/DIP) so the reader can act as an end node when needed (do not force by default).
- Biasing: offer optional fail-safe biasing on the reader only if the bus otherwise floats; keep it configurable for multi-vendor installs.
- Isolation trigger: long outdoor runs, unknown ground reference, or repeated CRC storms → use isolated RS-485 on the reader side.
- Shield/FG handling: treat cable shield as an EMI return path; avoid turning it into a DC current path through the reader ground.
Ethernet — what matters on the reader
- Entry protection: TVS + common-mode choke near the connector (reader-side only) to prevent PHY upsets and latent damage.
- Link diagnostics: track link up/down count, CRC/align errors, and packet drops to distinguish wiring/EMI from application issues.
- “Works on bench” failure: field problems often show as link flap bursts or CRC spikes during nearby switching (LED burst, RF field, relay noise).
PoE PD (reader-side) — budgeting, inrush, cold start
- Power budget: allocate headroom for RF field burst and QR illumination; treat peak current as a first-class constraint.
- Inrush control: PD input + bulk caps can cause repeated power-up retries; enforce soft-start / inrush limiting on the reader.
- Cold-start sequencing: bring up digital + SE state deterministically before enabling high-disturbance loads (RF/LED).
- Brownout record: log PD re-negotiate events and rail droop so “credential accepted but not reported” can be proven or ruled out.
Output data model — integration-friendly and debuggable
- Credential ID (UID/token) + auth result (pass/fail/uncertain)
- Timestamp + reader status (supply OK / RF margin / QR OK)
- Tamper status (cover / wiring tamper) + quality flags (retry count, decode-time bucket)
- Evidence mapping: each field corresponds to a measurable counter/log so failures are not “mystery wiring problems”.
Evidence hooks (minimum set)
- RS-485: CRC error count, timeout count, frame rate; optional scope snapshot at A/B during failures.
- Ethernet: PHY link counters, link flap count, CRC/align errors.
- PoE: PD class/negotiation result, power-up retry count, brownout log + rail ramp time.
Power Tree & Robustness: Cold Start, Brownout, Surge/ESD at the Reader
Readers fail in the field less from “bad credentials” and more from power and cable reality: long runs, outdoor surges, inrush retries, and load bursts (RF + QR LED) that collapse rails. The goal is deterministic behavior: clean boot, safe brownout, and observable evidence.
Power domains (why partitioning matters)
- Input domain: PoE input → PD front-end → hot-swap/inrush limiting.
- Digital domain: MCU + memory + interfaces (needs clean sequencing and stable reset behavior).
- Secure domain: SE/SAM state should never be left “half-committed” across droops.
- RF + QR domains: RF field burst and LED burst are high-disturbance loads; isolate/sequence to avoid pulling digital/SE rails down.
Cold start (reader-side sequencing rules)
- Bring up stable rails first: digital + secure rails should reach valid thresholds before enabling RF/LED bursts.
- Reset policy: define what resets on undervoltage and what remains latched as “recover required”.
- Startup evidence: record rail ramp time, PD negotiation result, and first link status to correlate with field failures.
Brownout behavior (prevent “accepted but not reported”)
- Consistency rule: if a brownout occurs mid-transaction, the system must either complete safely or roll back to a known-good state.
- Reporting rule: avoid acknowledging a credential unless the output path is known-good (or the event is safely buffered with recovery markers).
- Post-brownout proof: reset reason + rail droop + SE status must expose recovery events and prevent silent state corruption.
Surge/ESD entry points (where spikes actually enter)
- Ports: RJ45/RS-485/PoE input are primary entry points; protection must stop both damage and PHY/MCU upsets.
- Shield/ground reference: cable shield transients can shift local ground and trigger brownouts even without “visible damage”.
- Antenna coupling: nearby ESD events can couple into the RF front-end and disturb rails through internal paths.
Evidence hooks (measure here first)
- First 2 measurements: (1) input/primary rail droop waveform during the failure, (2) MCU reset reason + SE status after recovery.
- Supporting counters: PoE renegotiation/retry count, Ethernet link flap counters, transaction retry spikes, rail ramp time logs.
- Discriminator: if link flaps with stable rails → wiring/EMI; if rails droop with LED/RF bursts → power partition/sequencing/inrush/hold-up issue.
System Validation Plan: What to Test, Pass/Fail Criteria, and Production Checks
This validation SOP is scoped to the reader itself and its measurable behaviors. Each test item is defined by setup, stimulus, metrics, pass/fail, and evidence, so failures flow directly into the field debug playbook.
RF validation (HF/LF as implemented)
- Range curve: distance stepping per credential type; record success rate and retry count per step.
- Detuning robustness: repeat under metal plate, hand proximity, and moisture-like conditions.
- Multi-tag: increasing tag count; track anti-collision completion time and failure rate.
- Evidence: V_ANT/field sense proxy, AGC state, Rx envelope/noise floor, transaction time histogram.
Security validation (SE/SAM behaviors)
- Provisioning flow: personalization success, key version binding, lock state, and audit markers.
- Negative tests: replay/rollback attempts must be rejected with stable error codes and logged evidence.
- Tamper response: trigger → status flag → output frame → recovery policy must be consistent.
- Evidence: SE status words, secure session result codes, monotonic counter deltas (if used), anti-tear markers.
QR validation (screen / glare / motion / low light)
- Screen brightness sweep: low/medium/high; record decode latency and retry count.
- Reflective surfaces: glossy protector/glare angles; verify stable decode rate.
- Motion blur: controlled movement; confirm decode completion within target latency budget.
- Low light: illumination on/off; record exposure time, LED current, and decode histogram.
- Evidence: exposure time, illumination current waveform, decode retries, latency distribution.
Interfaces + power validation (reader-side only)
- RS-485 matrix: cable length × termination × bias; track CRC/timeout counts and frame stability.
- Ethernet disturbance: controlled ESD/surge-like events in lab; track link flaps and PHY error counters.
- PoE robustness: repeated cold start; record PD negotiation, inrush retry count, rail ramp time.
- Evidence: CRC counters, link counters, PD class/negotiation logs, reset reason + rail droop snapshots.
Pass/Fail criteria (how to write it so it’s actionable)
- Success rate: define minimum success rate per distance/condition (not a single “range number”).
- Latency: define typical and worst-case bounds for credential transaction and QR decode time.
- Error rate: bound CRC/timeout/link flap counts within a fixed test window.
- Recovery: after brownout, reader must re-enter a known-good state with visible recovery evidence.
Production checks (fast, repeatable, traceable)
- Antenna tune check: quick field-sense / amplitude proxy check against a window.
- SE personalization check: key version / lock state / self-test result recorded per unit.
- QR smoke test: standard code + low-light or reflective code; record decode time bucket.
- Trace fields: unit ID, test timestamp, key version, tune result, QR bucket, interface self-test.
Field Debug Playbook: Symptom → Evidence → Isolate → Fix
This playbook targets fast diagnosis with minimal tools. Each symptom branch begins with first 2 checks (one waveform + one counter/log), then uses a simple discriminator to isolate likely causes and first fixes. Scope stays reader-side: RF chain, SE/SAM state, QR pipeline, interfaces, and power integrity.
Playbook rules (repeatable)
- Start with 2 checks only: choose the highest-separation measurements first (avoid “measure everything”).
- Log the evidence: store counters/status words alongside the symptom so the fix is traceable.
- First fix is minimal: apply the smallest change that proves the hypothesis before redesigning hardware.
Symptom A — short range / intermittent reads
- First 2 checks: V_ANT amplitude + Rx envelope / noise floor.
- Discriminator: V_ANT droops → detuning/matching/power; V_ANT stable but noisy → EMI/AGC saturation/self-interference.
- Isolate: detuning source (metal/hand/moisture) vs Rx headroom/AGC behavior.
- First fix: retune matching window, ferrite/shield spacing, limit Tx burst/duty, improve grounding and cable routing.
Symptom B — reads but controller rejects
- Evidence: SE status words, mutual-auth result codes, counter/anti-tear markers, audit entry (if enabled).
- Discriminator: auth failure → key mismatch/personalization; replay/rollback flags → counter/time policy; anti-tear markers → interrupted commit.
- Isolate: provisioning mismatch vs recovery state vs transaction log corruption after droop.
- First fix: re-personalize with version binding, enforce safe commit policy, recover counter/time markers and re-validate.
Symptom C — QR slow / certain screens fail
- Evidence: exposure time, LED current waveform, decode retry count, latency histogram.
- Discriminator: long exposure + retries → low light/glare; fails on specific screens → flicker/PWM + rolling shutter interaction.
- Isolate: illumination strategy vs exposure clamp vs optics/angle constraints.
- First fix: adjust LED drive scheme, clamp exposure, add retry strategy, improve angle guidance and glare handling.
Symptom D — random reboot / link drop
- First 2 checks: rail droop waveform + reset reason; then PHY link counters / CRC spike correlation.
- Discriminator: rails droop → inrush/UVLO/hold-up/load burst; rails stable but link flaps → EMI/port protection/ground reference.
- Isolate: which domain causes droop (RF burst vs LED burst) and which entry point triggers upsets (ports/shield).
- First fix: improve inrush/UVLO/hold-up, strengthen ESD clamps/CMC, correct cable shielding and grounding guidance.
H2-11. Reference BOM Buckets (Example MPNs + Selection Criteria)
This chapter lists example components (MPNs) by functional bucket, plus selection criteria tied to the reader’s real failure modes: short read range, intermittent auth, QR decode latency spikes, brownout resets, and long-cable / outdoor ESD events. The goal is not to “recommend brands,” but to make the BOM auditable and testable.
Reader AFE / Transceiver (13.56 MHz) — what to choose and why
- When this bucket dominates: read range, anti-collision stability, “works on bench but fails on metal door frame,” and immunity to detuning / hand effects.
- Key specs to compare: Tx driver current capability, Rx sensitivity & dynamic range (self-interference tolerance), field-sense / amplitude measurement support, temperature drift of tuning, and support for target protocols (ISO14443A/B, NFC-A/B/F as needed).
- Integration traps: insufficient measurement nodes (no field-sense), too little Rx headroom under strong Tx field, and poor diagnostic visibility (hard to correlate failures with VANT, ITX, AGC state).
Example MPNs (HF 13.56 MHz)
PN5180A0HN/C1Y(NXP) — NFC front-end for 13.56 MHzST25R3916B-AQWT(ST) — NFC/RFID reader ICTRF7970ARHBR(TI) — 13.56 MHz NFC/RFID transceiverSLRC61003HN(NXP, CLRC663/SLRC family) — low-power NFC front-end
LF 125 kHz Prox note: if a product truly includes LF Prox, it typically becomes a separate LF analog path and coil geometry problem. Keep the LF chain isolated in schematics and bring out measurement nodes early.
Secure Element / SAM — keep keys inside, keep state consistent
- Own the trust boundary: long-term keys, cryptographic operations, secure messaging, and (when used) monotonic counters should remain inside the SE/SAM.
- Anti-tear requirement: after a brownout, the system must not enter “credential accepted but not reported” or “accepted once, then forever rejected.” This depends on atomic commit behavior and clear error reporting.
- Field evidence hooks: status words / error codes, secure counter deltas, last-transaction markers, and “provisioning ok” flags readable by the MCU.
Example MPNs (SE / SAM)
MF4SAM3HN/9BA659SZ(NXP) — MIFARE SAM AV3 secure access moduleSE050C2HQ1/Z01SDZ(NXP) — IoT secure elementSTSAFA110S8SPL02(ST) — STSAFE-A110 secure elementSLS32AIA010MLUSON10XTMA2(Infineon) — OPTIGA™ Trust M secure elementATECC608B(Microchip) — crypto authentication IC (fits “identity + secure ops” use cases)
Main MCU/MPU — secure boot + deterministic I/O + forensic logs
- Primary job: schedule RF transactions, manage SE sessions, drive UI/tamper, capture QR frames (if used), and output a consistent “credential event record” over RS-485/Ethernet.
- Must-have capabilities: secure boot support, enough RAM for protocol stacks and buffering, reliable timers (latency budgets), and non-volatile storage policy (logs/config with wear strategy).
- Debug-first requirement: reset-reason capture, brownout counters, link error counters, and a way to export “last N events” without a cloud dependency.
Example MPNs (MCU)
STM32H563ZIT6(ST) — Cortex-M33 class MCULPC55S69JBD100(NXP) — Cortex-M33 class MCUSAME70Q21B(Microchip) — high-performance MCU family exampleRA6M5(Renesas) — industrial MCU family example
RS-485 transceiver (reader-side) — noise, ground shifts, and isolation options
- Key specs: ESD robustness, common-mode range, failsafe/bias behavior, and data-rate vs cable-length margin.
- Isolation decision: if the install environment has ground potential differences or outdoor cabling, an isolated solution can prevent repeated PHY damage and “ghost CRC errors.”
- Evidence hooks: CRC error counters, framing errors, and oscilloscope captures at A/B lines under worst-case cable runs.
Example MPNs (RS-485)
THVD1450(TI) — RS-485/RS-422 transceiver familySN65HVD1781(TI) — robust RS-485 transceiverMAX3485E(Analog Devices / Maxim) — low-power RS-485 transceiverADM2587E(Analog Devices) — isolated RS-485 transceiverISO1410(TI) — isolated RS-485 transceiver
Ethernet PHY + magnetics (reader-side) — link stability as a diagnostic signal
- Key specs: ESD rating, EMI behavior with magnetics, link-down recovery time, and counters/diagnostics (link flaps matter in field debug).
- Protection pairing: magnetics + TVS + common-mode choke choices should align with the expected surge environment; otherwise readers become “random reboot / random link drop” machines.
- Evidence hooks: PHY link status, error counters, and timestamped link flap logs correlated with power droop.
Example MPNs (Ethernet PHY)
DP83825IRMQR(TI) — 10/100 Ethernet PHYKSZ8081RNA(Microchip) — 10/100 Ethernet PHYADIN1100(Analog Devices) — industrial 10/100 Ethernet PHY
PoE PD controller (reader-side) — power negotiation + startup correctness
- Why this bucket matters: many “unstable reader” complaints are actually PoE startup, inrush, or brownout behavior under load steps (RF Tx burst + LED flash + Ethernet activity).
- Key specs: supported PoE class / power level, inrush control behavior, UVLO thresholds, and power-good signaling into the MCU.
- Evidence hooks: PoE classification result, rail ramp waveforms, reset reasons, and “power-good vs event loss” correlation.
Example MPNs (PoE PD)
TPS2373-4RGWR(TI) — PoE PD interface (802.3at/bt)TPS23730RMTR(TI) — PoE PD + DC/DC controller (802.3bt type-3)SI3402-B-GM(Skyworks/Silicon Labs) — PoE PD controller
Power conversion — keep RF quiet, keep QR consistent, keep logs intact
- Partition rails by behavior: RF Tx bursts and LED pulses should not share the same “quiet” rail feeding AFE references or sensitive analog nodes.
- Key specs: load-step response, ripple/EMI profile, enable/PG behavior for sequencing, and efficiency vs thermal limits inside sealed enclosures.
- Failure patterns: intermittent reads + QR decode slowdown + Ethernet flaps often point to rail droop and poor domain separation.
Example MPNs (DC/DC + LDO)
TPS62130(TI) — 3A step-down converterTLV75533PDRVR(TI) — 500mA LDO (3.3V option)LTC3639(Analog Devices) — buck converter family exampleMCP16331(Microchip) — buck converter family example
eFuse / OVP / reverse protection — stop “mystery bricking” on real installs
- What to protect against: long-cable surges, wiring mistakes, and repeated ESD hits that cause latent damage (not immediate failure).
- Key specs: current limit/inrush control, reverse current blocking, fast OVP response, and fault signaling for “event logs that explain the failure.”
- Evidence hooks: fault pins into MCU, latch vs retry behavior, and captured “power fault reason” in logs.
Example MPNs (Protection)
TPS25947(TI) — eFuse with reverse protectionLTC4365(Analog Devices) — OV/UV/reverse protection controllerSMBJ58A(generic) — TVS example (choose per interface/rail)
QR subsystem — camera sensor + lens + LED driver as one timing budget
- Key specs: low-light performance, rolling-shutter behavior vs LED PWM/flicker, exposure control hooks, and interface compatibility with the chosen MCU/MPU.
- Illumination rule: LED current waveforms should be measurable and repeatable; uncontrolled pulses create decode jitter and thermal drift.
- Evidence hooks: decode time histogram, exposure settings logs, LED current capture, and “retry reason” counters.
Example MPNs (QR)
OV5640(OmniVision) — image sensor family commonly used in QR modulesOV09281-H64A(OmniVision) — image sensor (example order code)TPS61165(TI) — white LED driver (illumination)MPQ3302(MPS) — LED driver family example
#fig-f11 (copy the URL after publishing).ALT (for the cover/figure image): Prox/IC/QR/NFC reader BOM map showing RF AFE, secure element/SAM, MCU, QR camera, RS-485/Ethernet/PoE, DC/DC rails and protection buckets around the reader boundary.
H2-12. FAQs ×12 (Accordion)
Each answer stays strictly on the reader side and points back to measurable evidence: antenna/field nodes, Rx envelope/AGC, SE status words, interface error counters, and power-rail/reset logs.