English
Language : 

M24SR16-Y Datasheet, PDF (64/89 Pages) STMicroelectronics – Support of NDEF data structure
Functional procedures
8.4
Locking an NDEF file
The RF or I²C host executes this procedure to protect an NDEF file.
1. Select the NDEF Tag Application
2. Check the right access provided by the CC file
3. Select the NDEF file
4. Transmit the NDEF file Write password by using the Verify command
5. Lock the NDEF file by sending the Enable verification command.
M24SR16-Y
8.5
Unlocking an NDEF file
The RF or I²C host executes this procedure to unlock an NDEF file which has been locked
previously.
1. Select the NDEF Tag Application
2. Select the NDEF file
3. Verify the NDEF file Write password or the I²C password by using the Verify command
4. Unlock the NDEF file by sending the Disable verification command.
8.6
Reaching the read-only state for an NDEF file
The RF or I²C host executes this procedure to reach the read-only state for an NDEF file.
1. Select the NDEF Tag Application
2. Select the NDEF file
3. Transmit the NDEF file Write password or the I²C password by using the Verify
command
4. Send an EnablePermanentState command as the Write access right of the previous
Select NDEF file.
8.7
Changing an NDEF password procedure
The RF or I²C host could use this procedure to change one NDEF password. it can be a
Read or Write password.
1. Select the NDEF Tag Application
2. Select the NDEF file
3. Transmit the NDEF file Write password or the I²C password by using the Verify
command
4. Change the password by sending a ChangeReferenceData command.
64/89
DocID024755 Rev 8