2.1 TA100 Configuration

The following is the minimum recommended configuration that is required to support WPC authentication. The complete configuration varies if the WPC use case is stand-alone or combined with other use cases.

TA100 WPC Handles

A total of five handles are required to support WPC Slot 0 authentication.

Table 2-1. TA100 WPC Slot 0 Handles
Handle NameHandle IDPurposeFeatures Description
WpcCARootDigest0x8050The Root Digest handle stores the digest of the WPC Root Certificate. This will be common for all devices.
  • Always readable
  • It is lockable once written
  • Non-deletable
WpcDevicePrivateKey_00x8051This is the ECC P-256 private key. This key will be automatically generated by Microchip and is unique for each device.
  • Never readable
  • Never writable
  • It can always be used without an authentication session
  • It is lockable
  • It cannot be deleted
WpcSignerCertData_00x8600Signer certificate associated with the manufacturer. It will be common for a given manufacturer but will differ between manufacturers. The certificate must follow the format as defined in the WPC authentication specification.
  • Always readable
  • It is lockable once written
WpcDeviceCertData_00x8601The device certificate uniquely identifies a given device and is only valid for a single device. The certificate must follow the format as defined in the WPC authentication specification.
  • Always readable
  • It is lockable once written
  • It cannot be deleted
WpcChainDigest_00x8602The WPC Slot 0 chain digest is a SHA-256 digest of the entire WPC Slot 0 certificate chain. This digest can be used to speed up WPC authentication and is unique for each SSS.
  • Always readable
  • It is lockable once written
  • It cannot be deleted
Note: It is recommended that all slots be locked once configured so as to prevent Denial-of-Service Attacks from occurring due to changed data.
Attention: For support of WPC Slots beyond Slot 0, contact Microchip Sales to determine what capabilities are available.

Additional Configuration Options

The following recommendations are made for stand-alone WPC authentication devices. These options can all be selected with the TA Configurator tool included in the TPDS Tools. For devices that combine multiple use cases, these may differ.

  • Package options: may select the 8-pin SOIC SPI, 8-pin SOIC I2C or 24-pin VQFN, which supports both I2C and SPI.
  • If the 24-pin VQFN package option is selected, then select the Advanced Crypto Engine (ACE) interface value, I2C or SPI. The Fast Crypto Engine interface cannot be used with WPC authentication use cases.
  • Microchip will provide the group number value that is used to uniquely identify a customer.
  • If an I2C interface is used, the customer must specify the 7-bit I2C address. The default value for the TA100 is 0x17.
  • Due to the slow authentication time, it is recommended that the Idle Timer be disabled. Once authentication is complete, the device can be put to sleep using the Power command.
  • It is recommended that the GPIO signals be left at their default state as they are not required for operation.
  • Leave pull-up configuration for all pins at their default values.
  • It is recommended that all other features not specifically called out be left disabled.