All ICs
SoCs
Realtek offers highly integrated, reliable, low-power and secure wireless SoCs.
Highlights
In addition to integrating essential peripheral interfaces for IoT development, Secure Boot, AES/SHA hardware encryption engine, authenticated debug access, Wi-Fi 4 2.4GHz, BLE, and other important functions, this IC also supports the following features:
Integrates various security features including TrustZone, secure boot, symmetric encryption, asymmetric encryption, TRNG, HUK, OTP storage, Flash XIP decryption, etc., providing PSA Level 2 and above security protection for customer products
Incorporating advanced technologies such as OFDMA, MU-MIMO, Extended Range and TWT effectively alleviates wireless resource congestion, enhances weak signal coverage, significantly improves transmission quality, reduces latency and extends the battery life of IoT devices through ultra-long sleep cycles
2.4GHz for Wall-Penetrating Coverage, 5GHz for High-Speed Transmission, Adapting to complex environments, this dual-band synergy comprehensively upgrades the IoT device experience
Multi-hop, Multi-branch Intelligent Networking, Rapid Fault Self-Healing, Ultra-Low Latency, and High Stability comprehensively overcome traditional Mesh network bottlenecks, redefining the wireless experience across all scenarios
UI rendering hardware accelerator provides smooth and fast interface animations, enhancing the human-machine interaction experience of smart panels. Supports standard display interfaces, flexibly adaptable from small LCDs to HD screens.
Supporting ultra-low-power WoWLAN and enabling rapid restoration of the original runtime context, empowering battery-powered devices with network listening wake-up functionality
Integrates DMIC/I2S, USB 2.0 Full-Speed Device, SDIO Device
System Architecture
- Armv8.1-M Architecture
- Arm Cortex®-M55 ISA compatible
- Up to 345MHz, 3-stage pipeline
- 16KB I-Cache
- 16KB D-Cache
- FPU/DSP instruction extensions
- Arm TrustZone®-M
- Armv8-M Architecture
- Arm Cortex®-M23 ISA compatible
- Up to 115MHz, 2-stage pipeline
- 16KB I-Cache
- 16KB D-Cache
- 512KB SRAM
- QSPI NOR Flash: Up to 104MHz
- DQ8 DDR PSRAM: Up to 200MHz
IC Selection
| Part number | RTL8721DAF-VA2-CG | RTL8721DAF-VT2-CG | RTL8721DAM-VA2-CG | RTL8721DCF-VA2-CG | RTL8721DCM-VA2-CG | RTL8721DCM-VA3-CG | RTL8721DGF-VW2-CG | RTL8721DGM-VW2-CG |
|---|---|---|---|---|---|---|---|---|
| Real-M300 | 345MHz | 345MHz | 345MHz | 345MHz | 345MHz | 345MHz | 345MHz | 345MHz |
| Real-M200 | 115MHz | 115MHz | 115MHz | 115MHz | 115MHz | 115MHz | 115MHz | 115MHz |
| On-chip SRAM | 512KB | 512KB | 512KB | 512KB | 512KB | 512KB | 512KB | 512KB |
| TrustZone | Y | Y | Y | Y | Y | Y | Y | Y |
| NOR Flash | 4MB | 4MB | X | 4MB | X | X | 4MB | X |
| PSRAM | X | X | 4MB | X | 4MB | 8MB | X | 4MB |
| Wi-Fi | Wi-Fi 4 (2.4GHz + 5GHz) | Wi-Fi 4 (2.4GHz + 5GHz) | Wi-Fi 4 (2.4GHz + 5GHz) | Wi-Fi 4 (2.4GHz + 5GHz) | Wi-Fi 4 (2.4GHz + 5GHz) | Wi-Fi 4 (2.4GHz + 5GHz) | Wi-Fi 4 (2.4GHz + 5GHz) | Wi-Fi 4 (2.4GHz + 5GHz) |
| Bluetooth | LE | LE | LE | LE | LE | LE | LE | LE |
| Operating voltage | 2.97V ~ 3.63V | 2.97V ~ 3.63V | 2.97V ~ 3.63V | 2.97V ~ 3.63V | 2.97V ~ 3.63V | 2.97V ~ 3.63V | 1.71V ~ 3.63V | 1.71V ~ 3.63V |
| Operating temperature | -20°C ~ 85°C | -40°C ~ 105°C | -20°C ~ 85°C | -20°C ~ 85°C | -20°C ~ 85°C | -20°C ~ 85°C | -20°C ~ 85°C | -20°C ~ 85°C |
| Package (mm) | QFN48 (6 x 6) | QFN48 (6 x 6) | QFN48 (6 x 6) | QFN68 (8 x 8) | QFN68 (8 x 8) | QFN68 (8 x 8) | BGA100 (5.1 x 5.1) | BGA100 (5.1 x 5.1) |
Peripheral Interfaces
| Function | Quantity | Notes |
|---|---|---|
| GPIO | 56 | pcs |
| SPI | 2 | pcs |
| UART | 4 | pcs |
| I2C | 2 | pcs |
| Key-Scan | 64 | keys |
| IR (Infrared Trnaseiver) | 1 | pcs |
| RTC | 1 | pcs |
| General Timer | 10 | pcs |
| PWM | 8 | channels |
| Capture Timer | 1 | pcs |
| 12-bit ADC | 7 | channels |
| Dedicated Battery ADC | 1 | channel |
| Touch Keys | 4 | keys |
| GDMA | 8 | channels |
| Independent Watchdog | 1 | pcs |
| Secure Watchdog | 1 | pcs |
| Normal Watchdog | 2 | pcs |
| USB 2.0 | 1 | pcs |
| SDIO Device | 1 | pcs |
| Serial LED Controller | 1 | pcs |
| Pixel Processing Engine | 1 | For fast image data processing |
| OSPI Display Interface | 1 | Supports OSPI, QSPI, SPI interface screens |
| Audio Codec | 1 | Includes 2-channel digital microphones (DMIC) |
| I2S | 2 | Up to 192kHz, supports up to 8-channel data TX/RX |
Security Features
We consistently prioritize security as the core of our products, offering our customers a rich array of security features through hardware design and providing exceptional hardware-based attack resistance, helping to create IoT products with ultimate security.
| Features | Support | Comment |
|---|---|---|
| Symmetric Encryption Engine | ||
| Asymmetric Encryption Engine | ||
| Secure Boot | ||
| Flash OTF Decryption | ||
| Arm TrustZone®-M | ||
| OTP Secure Storage | ||
| Debug Password Protection | ||
| HUK Derivation Mechanism | ||
| True Random Number Generator (TRNG) |
Provide a laboratory evaluation of the PSA Root of Trust (PSA-RoT) to demonstrate its resilience against scalable software attacks.
Based on asymmetric encryption and digital signature mechanisms, it verifies public key hashes and firmware signatures. This process can prevent tampering and rollback attacks, ensuring that the device only runs trusted firmware
Supports both embedded and external Flash, with independent key encryption for multiple firmware. When the CPU executes encrypted firmware, it is decrypted in real-time by hardware, with nearly imperceptible performance impact. Supports unique encryption for each device, preventing injection and cloning attacks
Based on the Arm TrustZone® architecture, coupled with a dedicated hardware access control unit, it achieves strong isolation protection for secure memory areas and secure peripherals. Meanwhile, secure firmware is decrypted by the security encryption engine and loaded into the secure RAM area, ensuring protection against leakage and tampering throughout the entire process
Physical-level anti-extraction, key area locked for access only by the security engine, tamper-resistant and read-proof. Supports independent secure zones and CRC verification
Generates high-security random numbers based on physical entropy sources. Certified by NIST for randomness. Provides unpredictability to the system, resistant to prediction attacks
Hardware Unique Key (HUK) with physical isolation protection, unreadable and unclonable, used for secure derivation of application keys
Strict control over debug interface access through authentication mechanisms. Supports authorized access and permanent closure, eliminating physical debug attacks. Meets security management requirements at different stages of the product lifecycle, effectively enhancing overall security
Security Certifications Support
We offer support for multiple security certifications. By providing these advanced security features and certification support, we aim to assist our customers in efficiently meeting various market entry requirements, ensuring the security and competitiveness of their products.
- PSA
- NIST STS
- NIST CAVP
- FIPS 140-3
- RED (EN 18031)
Most of our chips are capable of achieving PSA Certified Level 2 and Level 3, with some chips already having completed PSA Certified Level 2 certification.
Wireless Connectivity
| Wi-Fi Features | ||
|---|---|---|
| Features | Support | Comment |
| Frequency | 2.4GHz/5GHz | |
| Wi-Fi 6 | ||
| Bandwidth | 40MHz | |
| MaximumPHY rate | 150Mbps | HT MCS7 |
| Main Protocols | 802.11 a/b/g/n | |
| Sub-protocols | 802.11 e/i/w/d/k/v/r | |
| Other Key Protocols | WMM/WPA1~3/WPS/802.1X/EAP/P2P/NAN | |
| UL LDPC | UL Low-Density Parity-Check Code | |
| DL STBC | DL Space-Time Block Coding | |
| Auto Antenna Diversity | ||
| CSI | Channel State Information | |
| MCC | Multi-Channel Concurrency | |
| R-MESH | Realtek MESH | |
| Wi-Fi Card Mode | ||
| BT Features | ||
| Features | Support | Comment |
| Bluetooth LE | Bluetooth Low Energy | |
| Scatternet | Scatternet concurrent central/peripheral operation | |
| LE 2Mpbs PHY | ||
| LE Long Range | LE Coded PHY long-range mode (125kbps/500kbps) | |
| LE Advertising Extensions | Support multiple advertising sets | |
| SIG Mesh | Certified for SIG Mesh v1.1 | |
Power Consumption
| Mode | Wi-Fi | Power Consumption | Unit | Comment |
|---|---|---|---|---|
| Deep-Sleep | OFF | 13.9 | µA | Flash package |
| Sleep | OFF | 37.7 | µA | Flash package |
| Active | OFF | 6.56 | mA | 0.9v WFI mode, CPU=240MHz |
| WoWLAN | DTIM=3 | 165 | µA | 2.4G mode |
| WoWLAN | DTIM=10 | 84 | µA | 2.4G mode |
NOTICE:
- Test conditions: 3.3V, 25°C
- WoWLAN: System average power consumption
Application Scenarios
- Dolby Atmos Speaker
- Wi-Fi Card Mode
- BLE gateway
- Smart POS
- Smart home
- Smart thermostat
- Smart door lock
- Battery camera
- Smart remote controller
Development Resources
Software Resources
![]() |
FreeRTOS SDK Download | Link |
![]() |
FreeRTOS SDK Guide | Link |
![]() |
Development Tools | Link |
![]() |
VS Code Extension | Link |
Hardware Resources
![]() |
Datasheet | Link |
![]() |
Pinmux Table | Link |
![]() |
Pinmux Auto-Layout | Link |
![]() |
Schematic & PCB Design | Link |
EVB Purchase
![]() |
PKE8721DAF-C13-F10 (Taobao) | Link |
![]() |
PKE8721DAF-C13-F10 (Amazon) | Link |
Highlights
In addition to essential features for IoT development like peripheral interfaces, secure boot, AES/SHA hardware crypto engine, and authenticated debug access, as well as Wi-Fi 4 2.4G and BLE, this IC also supports the following functions:
Integrates two processors, Armv8.1-M and RISC-V, both running up to 400MHz. Integrates 768KB SRAM and supports DQ8 DDR PSRAM.
Integrates various security features including TrustZone, secure boot, symmetric encryption, asymmetric encryption, TRNG, HUK, OTP storage, Flash XIP decryption, etc., providing PSA Level 2 and above security protection for customer products
Incorporating advanced technologies such as OFDMA, MU-MIMO, Extended Range and TWT effectively alleviates wireless resource congestion, enhances weak signal coverage, significantly improves transmission quality, reduces latency and extends the battery life of IoT devices through ultra-long sleep cycles
Built-in audio codec supports audio input and output, reducing dependency on external components and adaptation costs, facilitating voice interaction and audio playback
System Architecture
- Armv8.1-M Architecture (Arm Cortex®-M55 ISA compatible)
- Up to 400MHz clock frequency, 3-stage pipeline
- 16KB I-Cache
- 16KB D-Cache
- Integrated FPU/DSP instruction extensions
- Hardware-level isolation with Arm TrustZone®-M
- RISC-V RV32IMAFC Architecture
- 400MHz Single-Issue In-Order Pipeline
- 16KB I-Cache
- 16KB D-Cache
- Open-source ISA architecture, supports custom extensions
- 768KB SRAM
- QSPI NOR Flash: Up to 100MHz
- DQ8 DDR PSRAM: Up to 200MHz
IC Selection
| Part number | RTL8720EAF-VA2-CG | RTL8720EAF-VA3-CG | RTL8720EAM-VA2-CG | RTL8720EAM-VT2-CG |
|---|---|---|---|---|
| Real-M300 | 400MHz | 400MHz | 400MHz | 400MHz |
| KR4 | 400MHz | 400MHz | 400MHz | 400MHz |
| DSP | X | X | X | X |
| On-chip SRAM | 768KB | 768KB | 768KB | 768KB |
| TrustZone | Y | Y | Y | Y |
| NOR Flash | 4MB | 8MB | X | X |
| PSRAM | X | X | 4MB | 4MB |
| Wi-Fi | Wi-Fi 6 (2.4GHz) | Wi-Fi 6 (2.4GHz) | Wi-Fi 6 (2.4GHz) | Wi-Fi 6 (2.4GHz) |
| Bluetooth | LE | LE | LE | LE |
| Operating voltage | 2.97V ~ 3.63V | 2.97V ~ 3.63V | 2.97V ~ 3.63V | 2.97V ~ 3.63V |
| Operating temperature | -20°C ~ 85°C | -20°C ~ 85°C | -20°C ~ 85°C | -40°C ~ 105°C |
| Package (mm) | QFN48 (6 x 6) | QFN48 (6 x 6) | QFN48 (6 x 6) | QFN48 (6 x 6) |
Peripheral Interfaces
| Function | Quantity | Notes |
|---|---|---|
| GPIO | 27 | pcs |
| SPI | 2 | pcs |
| UART | 5 | pcs |
| I2C | 2 | pcs |
| IR (Infrared Transceiver) | 1 | pcs |
| RTC | 1 | pcs |
| General Timer | 15 | pcs |
| PWM | 8 | channels |
| Capture Timer | 1 | pcs |
| 12-bit ADC | 6 | channels |
| Touch Key | 9 | keys |
| GDMA | 8 | channels |
| Independent Watchdog | 1 | pcs |
| Secure Watchdog | 1 | pcs |
| Normal Watchdog | 2 | pcs |
| Serial LED Controller | 1 | pcs |
| On-chip Temperature Sensor | 1 | pcs |
| Digital Microphone | 4 | channels |
| I2S | 2 | Up to 192kHz sampling rate, up to 8-channel data transmission |
| VAD | 1 | Supports voice activity detection |
| PDM Output | 1 | Mono channel |
Security Features
We consistently prioritize security as the core of our products, offering our customers a rich array of security features through hardware design and providing exceptional hardware-based attack resistance, helping to create IoT products with ultimate security.
| Features | Support | Comment |
|---|---|---|
| Symmetric Encryption Engine | ||
| Asymmetric Encryption Engine | ECDSA | |
| Secure Boot | ||
| Flash OTF Decryption | ||
| Arm TrustZone®-M | ||
| OTP Secure Storage | ||
| Debug Password Protection | ||
| HUK Derivation Mechanism | ||
| True Random Number Generator (TRNG) |
Based on asymmetric encryption and digital signature mechanisms, it verifies public key hashes and firmware signatures. This process can prevent tampering and rollback attacks, ensuring that the device only runs trusted firmware
Supports both embedded and external Flash, with independent key encryption for multiple firmware. When the CPU executes encrypted firmware, it is decrypted in real-time by hardware, with nearly imperceptible performance impact. Supports unique encryption for each device, preventing injection and cloning attacks
Based on the Arm TrustZone® architecture, coupled with a dedicated hardware access control unit, it achieves strong isolation protection for secure memory areas and secure peripherals. Meanwhile, secure firmware is decrypted by the security encryption engine and loaded into the secure RAM area, ensuring protection against leakage and tampering throughout the entire process
In addition to the essential symmetric encryption engines like AES for IoT, we also provide computationally more intensive asymmetric encryption algorithms such as ECDSA, EdDSA, and RSA. This greatly alleviates the computational burden on the CPU and improves encryption and decryption speeds
Physical-level anti-extraction, key area locked for access only by the security engine, tamper-resistant and read-proof. Supports independent secure zones and CRC verification
Generates high-security random numbers based on physical entropy sources. Certified by NIST for randomness. Provides unpredictability to the system, resistant to prediction attacks
Hardware Unique Key (HUK) with physical isolation protection, unreadable and unclonable, used for secure derivation of application keys
Strict control over debug interface access through authentication mechanisms. Supports authorized access and permanent closure, eliminating physical debug attacks. Meets security management requirements at different stages of the product lifecycle, effectively enhancing overall security
Security Certifications Support
We offer support for multiple security certifications. By providing these advanced security features and certification support, we aim to assist our customers in efficiently meeting various market entry requirements, ensuring the security and competitiveness of their products.
- PSA
- NIST STS
- NIST CAVP
- FIPS 140-3
- RED (EN 18031)
Most of our chips are capable of achieving PSA Certified Level 2 and Level 3, with some chips already having completed PSA Certified Level 2 certification.
Wireless Connectivity
| Wi-Fi Features | ||
|---|---|---|
| Features | Support | Comment |
| Frequency | 2.4GHz | |
| Wi-Fi 6 | ||
| Bandwidth | 20MHz | |
| Maximum PHY rate | 114.7Mbps | HE MCS9 |
| Main Protocols | 802.11 b/g/n/ax | |
| Sub-protocols | 802.11 e/i/w/d/k/v/r | |
| Other Key Protocols | WMM/WPA1~3/WPS/802.1X/EAP/P2P/NAN | |
| UL/DL OFDMA & DL MU-MIMO | ||
| SU/MU Beamformee | ||
| TWT | Target Wake Time | |
| UL LDPC | UL Low-Density Parity-Check Code | |
| DL STBC | DL Space-Time Block Coding | |
| Auto Antenna Diversity | ||
| CSI | Channel State Information | |
| MCC | Multi-Channel Concurrency | |
| Wi-Fi Card Mode | ||
| BT Features | ||
| Features | Support | Comment |
| Bluetooth LE | Bluetooth Low Energy | |
| Scatternet | Scatternet concurrent central/peripheral operation | |
| LE 2Mpbs PHY | ||
| LE Long Range | LE Coded PHY long-range mode (125kbps/500kbps) | |
| LE Advertising Extensions | Support multiple advertising sets | |
| LE Periodic Advertising | ||
| LE Periodic Advertising Sync Transfer | ||
| Direction Finding (AoA/AoD) | Support Angle of Arrival and Angel of Departure | |
| LE Power Control | ||
| SIG Mesh | Certified for SIG Mesh v1.1 | |
System Power Consumption
| Mode | Wi-Fi | Power Consumption | Unit | Comment |
|---|---|---|---|---|
| Deep-Sleep | OFF | 57.4 | µA | PSRAM package |
| Sleep | OFF | 700 | µA | PSRAM package |
| Active | OFF | 20.0 | mA | 1.25v WFI mode, CPU=400MHz |
| WoWLAN | DTIM=3 | 1.48 | mA | 2.4G mode |
| WoWLAN | DTIM=10 | 1.36 | mA | 2.4G mode |
NOTICE:
- Test conditions: 3.3V, 25°C
- WoWLAN: System average power consumption
Application Scenarios
- Home appliance
- Industrial control
- Energy storage
- Smart thermostat
- BLE gateway
- Micro inverter
Highlights
In addition to essential features for IoT development like peripheral interfaces, secure boot, AES/SHA hardware crypto engine, and authenticated debug access, as well as Wi-Fi 4 2.4G and BLE, this IC also supports the following functions:
Integrates two processors, Armv8.1-M and RISC-V, both running up to 400MHz. Integrates 512KB SRAM and supports DQ8 DDR PSRAM.
Integrates various security features including secure boot, symmetric encryption, asymmetric encryption, TRNG, HUK, OTP storage, Flash XIP decryption, etc., providing PSA Level 2 and above security protection for customer products
Incorporating advanced technologies such as OFDMA, MU-MIMO, Extended Range and TWT effectively alleviates wireless resource congestion, enhances weak signal coverage, significantly improves transmission quality, reduces latency and extends the battery life of IoT devices through ultra-long sleep cycles
Built-in audio codec supports audio input and output, reducing dependency on external components and adaptation costs, facilitating voice interaction and audio playback
System Architecture
- Armv8.1-M Architecture (Arm Cortex®-M55 ISA compatible)
- Up to 400MHz clock frequency, 3-stage pipeline
- 16KB I-Cache
- 16KB D-Cache
- Integrated FPU/DSP instruction extensions
- RISC-V RV32IMAFC Architecture
- 400MHz Single-Issue In-Order Pipeline
- 16KB I-Cache
- 16KB D-Cache
- Open-source ISA architecture, supports custom extensions
- 512KB SRAM
- QSPI NOR Flash: Up to 100MHz
- DQ8 DDR PSRAM: Up to 250MHz
IC Selection
| Package number | RTL8710ECF-VA2-CG | RTL8710ECF-VA3-CG | RTL8710ECM-VA2-CG |
|---|---|---|---|
| Real-M300 | 400MHz | 400MHz | 400MHz |
| KR4 | 400MHz | 400MHz | 400MHz |
| DSP | X | X | X |
| On-chip SRAM | 512KB | 512KB | 512KB |
| TrustZone | X | X | X |
| NOR Flash | 4MB | 8MB | X |
| PSRAM | X | X | 4MB |
| Wi-Fi | Wi-Fi 6 (2.4GHz) | Wi-Fi 6 (2.4GHz) | Wi-Fi 6 (2.4GHz) |
| Bluetooth | LE | LE | LE |
| Operating voltage | 2.97V ~ 3.63V | 2.97V ~ 3.63V | 2.97V ~ 3.63V |
| Operating temperature | -20°C ~ 85°C | -20°C ~ 85°C | -20°C ~ 85°C |
| Package (mm) | QFN48 (6 x 6) | QFN48 (6 x 6) | QFN48 (6 x 6) |
Peripheral Interfaces
| Function | Quantity | Notes |
|---|---|---|
| GPIO | 27 | pcs |
| SPI | 2 | pcs |
| UART | 5 | pcs |
| I2C | 2 | pcs |
| IR (Infrared Transceiver) | 1 | pcs |
| RTC | 1 | pcs |
| General Timer | 15 | pcs |
| PWM | 8 | channels |
| Capture Timer | 1 | pcs |
| 12-bit ADC | 6 | channels |
| Touch Key | 9 | keys |
| GDMA | 8 | channels |
| Independent Watchdog | 1 | pcs |
| Normal Watchdog | 3 | pcs |
| Serial LED Controller | 1 | pcs |
| On-chip Temperature Sensor | 1 | pcs |
| Digital Microphone | 4 | channels |
| I2S | 2 | Up to 192kHz sampling rate, up to 8 channels data transfer |
| VAD | 1 | Supports Voice Activity Detection |
| PDM Output | 1 | Mono channel |
Security Features
We consistently prioritize security as the core of our products, offering our customers a rich array of security features through hardware design and providing exceptional hardware-based attack resistance, helping to create IoT products with ultimate security.
| Features | Support | Comment |
|---|---|---|
| Symmetric Encryption Engine | ||
| Asymmetric Encryption Engine | ECDSA | |
| Secure Boot | ||
| Flash OTF Decryption | ||
| Arm TrustZone®-M | ||
| OTP Secure Storage | ||
| Debug Password Protection | ||
| HUK Derivation Mechanism | ||
| True Random Number Generator (TRNG) |
Based on asymmetric encryption and digital signature mechanisms, it verifies public key hashes and firmware signatures. This process can prevent tampering and rollback attacks, ensuring that the device only runs trusted firmware
Supports both embedded and external Flash, with independent key encryption for multiple firmware. When the CPU executes encrypted firmware, it is decrypted in real-time by hardware, with nearly imperceptible performance impact. Supports unique encryption for each device, preventing injection and cloning attacks
In addition to the essential symmetric encryption engines like AES for IoT, we also provide computationally more intensive asymmetric encryption algorithms such as ECDSA, EdDSA, and RSA. This greatly alleviates the computational burden on the CPU and improves encryption and decryption speeds
Physical-level anti-extraction, key area locked for access only by the security engine, tamper-resistant and read-proof. Supports independent secure zones and CRC verification
Generates high-security random numbers based on physical entropy sources. Certified by NIST for randomness. Provides unpredictability to the system, resistant to prediction attacks
Hardware Unique Key (HUK) with physical isolation protection, unreadable and unclonable, used for secure derivation of application keys
Strict control over debug interface access through authentication mechanisms. Supports authorized access and permanent closure, eliminating physical debug attacks. Meets security management requirements at different stages of the product lifecycle, effectively enhancing overall security
Security Certifications Support
We offer support for multiple security certifications. By providing these advanced security features and certification support, we aim to assist our customers in efficiently meeting various market entry requirements, ensuring the security and competitiveness of their products.
- PSA
- NIST STS
- NIST CAVP
- FIPS 140-3
- RED (EN 18031)
Most of our chips are capable of achieving PSA Certified Level 2 and Level 3, with some chips already having completed PSA Certified Level 2 certification.
Wireless Connectivity
| Wi-Fi Features | ||
|---|---|---|
| Features | Support | Comment |
| Frequency | 2.4GHz | |
| Wi-Fi 6 | ||
| Bandwidth | 20MHz | |
| Maximum PHY rate | 114.7Mbps | HE MCS9 |
| Main Protocols | 802.11 b/g/n/ax | |
| Sub-protocols | 802.11 e/i/w/d/k/v/r | |
| Other Key Protocols | WMM/WPA1~3/WPS/802.1X/EAP/P2P/NAN | |
| UL/DL OFDMA & DL MU-MIMO | ||
| SU/MU Beamformee | ||
| TWT | Target Wake Time | |
| UL LDPC | UL Low-Density Parity-Check Code | |
| DL STBC | DL Space-Time Block Coding | |
| Auto Antenna Diversity | ||
| CSI | Channel State Information | |
| MCC | Multi-Channel Concurrency | |
| Wi-Fi Card Mode | ||
| BT Features | ||
| Features | Support | Comment |
| Bluetooth LE | Bluetooth Low Energy | |
| Scatternet | Scatternet concurrent central/peripheral operation | |
| LE 2Mpbs PHY | ||
| LE Long Range | LE Coded PHY long-range mode (125kbps/500kbps) | |
| LE Advertising Extensions | Support multiple advertising sets | |
| LE Periodic Advertising | ||
| LE Periodic Advertising Sync Transfer | ||
| Direction Finding (AoA/AoD) | Support Angle of Arrival and Angel of Departure | |
| LE Power Control | ||
| SIG Mesh | Certified for SIG Mesh v1.1 | |
System Power Consumption
| Mode | Wi-Fi | Power Consumption | Unit | Comment |
|---|---|---|---|---|
| Deep-Sleep | OFF | 57.4 | µA | PSRAM package |
| Sleep | OFF | 700 | µA | PSRAM package |
| Active | OFF | 20.0 | mA | 1.25v WFI mode, CPU=400MHz |
| WoWLAN | DTIM=3 | 1.48 | mA | 2.4G mode |
| WoWLAN | DTIM=10 | 1.36 | mA | 2.4G mode |
NOTICE:
- Test conditions: 3.3V, 25°C
- WoWLAN: System average power consumption
Application Scenarios
- Home appliance
- Industrial control
- Energy storage
- Smart thermostat
- BLE gateway
- Micro inverter
Development Resources
Software Resources
![]() |
FreeRTOS SDK Download | Link |
![]() |
FreeRTOS SDK Guide | Link |
![]() |
Development Tools | Link |
![]() |
VS Code Extension | Link |
Hardware Resources
![]() |
Datasheet | Link |
![]() |
Pinmux Table | Link |
![]() |
Pinmux Auto-Layout | Link |
![]() |
Schematic & PCB Design | Link |
EVB Purchase
![]() |
PKE8710ECF-C53-F20 (Taobao) | Link |
![]() |
PKE8710ECF-C53-F20 (Amazon) | Link |
Highlights
In addition to essential features for IoT development like peripheral interfaces, secure boot, AES/SHA hardware crypto engine, and authenticated debug access, as well as Wi-Fi 4 2.4G and BLE, this IC also supports the following functions:
Integrated HiFi-5 DSP, architecturally optimized for AI computing, voice wake-up and noise reduction applications. Multi-channel MAC computing capability ensures faster processing. Working with independent application core and network core, three-core collaboration ensures stable low-latency voice applications.
Integrates various security features including TrustZone, secure boot, symmetric encryption, asymmetric encryption, TRNG, HUK, OTP storage, Flash XIP decryption, etc., providing PSA Level 2 and above security protection for customer products
Incorporating advanced technologies such as OFDMA, MU-MIMO, Extended Range and TWT effectively alleviates wireless resource congestion, enhances weak signal coverage, significantly improves transmission quality, reduces latency and extends the battery life of IoT devices through ultra-long sleep cycles
Built-in audio codec supports audio input and output, reducing dependency on external components and adaptation costs, facilitating voice interaction and audio playback
Bluetooth Classic and Bluetooth Low Energy concurrent, fully compatible with Bluetooth Classic profiles such as A2DP/HFP, achieving seamless coordination of high-definition stereo audio and low-latency call control, enjoying better wireless audio experience
System Architecture
- Armv8.1-M Architecture (Arm Cortex®-M55 ISA compatible)
- Up to 400MHz clock frequency, 3-stage pipeline
- 16KB I-Cache
- 16KB D-Cache
- Integrated FPU/DSP instruction extensions
- Hardware-level isolation with Arm TrustZone®-M
- RISC-V RV32IMAFC Architecture
- 400MHz Single-Issue In-Order Pipeline
- 16KB I-Cache
- 16KB D-Cache
- Open-source ISA architecture, supports custom extensions
- 500MHz 5-slot VLIW architecture
- 8 x 32-bit MACs/cycle
- 8 x SP-FMACs/cycle
- 32 x 8-bit MACs/cycle
- 256KB dedicated DTCM
- 32KB I-Cache
- 48KB D-Cache
- 512KB SRAM
- QSPI NOR Flash: Up to 100MHz
- DQ8 DDR PSRAM: Up to 250MHz
IC Selection
| Package number | RTL8726EAM-VA4-CG |
|---|---|
| Real-M300 | 400MHz |
| KR4 | 400MHz |
| DSP | 500MHz |
| On-chip SRAM | 512KB |
| TrustZone | Y |
| NOR Flash | X |
| PSRAM | 16MB |
| Wi-Fi | Wi-Fi 6 (2.4GHz) |
| Bluetooth | Dual Mode |
| Operating voltage | 2.97V ~ 3.63V |
| Operating temperature | -20°C ~ 85°C |
| Package (mm) | QFN68 (8 x 8) |
Peripheral Interfaces
| Function | Quantity | Notes |
|---|---|---|
| GPIO | 43 | pcs |
| SPI | 2 | pcs |
| UART | 5 | pcs |
| I2C | 2 | pcs |
| IR (Infrared Transceiver) | 1 | pcs |
| RTC | 1 | pcs |
| General Timer | 15 | pcs |
| PWM | 8 | channels |
| Capture Timer | 1 | pcs |
| 12-bit ADC | 6 | channels |
| Touch Key | 9 | keys |
| GDMA | 8 | channels |
| Independent Watchdog | 1 | pcs |
| Secure Watchdog | 1 | pcs |
| Normal Watchdog | 3 | pcs |
| Serial LED Controller | 1 | pcs |
| On-chip Temperature Sensor | 1 | pcs |
| Digital Microphone | 4 | channels |
| I2S | 2 | Up to 192kHz sampling rate, up to 8-channel data transmission |
| Audio ADC | 3 | channels |
| VAD | 1 | Supports voice activity detection |
| PDM Output | 1 | Mono channel |
| Audio DAC | 1 | Mono channel, supports linear output |
Security Features
We consistently prioritize security as the core of our products, offering our customers a rich array of security features through hardware design and providing exceptional hardware-based attack resistance, helping to create IoT products with ultimate security.
| Features | Support | Comment |
|---|---|---|
| Symmetric Encryption Engine | ||
| Asymmetric Encryption Engine | ECDSA | |
| Secure Boot | ||
| Flash OTF Decryption | ||
| Arm TrustZone®-M | ||
| OTP Secure Storage | ||
| Debug Password Protection | ||
| HUK Derivation Mechanism | ||
| True Random Number Generator (TRNG) |
Based on asymmetric encryption and digital signature mechanisms, it verifies public key hashes and firmware signatures. This process can prevent tampering and rollback attacks, ensuring that the device only runs trusted firmware
Supports both embedded and external Flash, with independent key encryption for multiple firmware. When the CPU executes encrypted firmware, it is decrypted in real-time by hardware, with nearly imperceptible performance impact. Supports unique encryption for each device, preventing injection and cloning attacks
Based on the Arm TrustZone® architecture, coupled with a dedicated hardware access control unit, it achieves strong isolation protection for secure memory areas and secure peripherals. Meanwhile, secure firmware is decrypted by the security encryption engine and loaded into the secure RAM area, ensuring protection against leakage and tampering throughout the entire process
In addition to the essential symmetric encryption engines like AES for IoT, we also provide computationally more intensive asymmetric encryption algorithms such as ECDSA, EdDSA, and RSA. This greatly alleviates the computational burden on the CPU and improves encryption and decryption speeds
Physical-level anti-extraction, key area locked for access only by the security engine, tamper-resistant and read-proof. Supports independent secure zones and CRC verification
Generates high-security random numbers based on physical entropy sources. Certified by NIST for randomness. Provides unpredictability to the system, resistant to prediction attacks
Hardware Unique Key (HUK) with physical isolation protection, unreadable and unclonable, used for secure derivation of application keys
Strict control over debug interface access through authentication mechanisms. Supports authorized access and permanent closure, eliminating physical debug attacks. Meets security management requirements at different stages of the product lifecycle, effectively enhancing overall security
Security Certifications Support
We offer support for multiple security certifications. By providing these advanced security features and certification support, we aim to assist our customers in efficiently meeting various market entry requirements, ensuring the security and competitiveness of their products.
- PSA
- NIST STS
- NIST CAVP
- FIPS 140-3
- RED (EN 18031)
Most of our chips are capable of achieving PSA Certified Level 2 and Level 3, with some chips already having completed PSA Certified Level 2 certification.
Wireless Connectivity
| Wi-Fi Features | ||
|---|---|---|
| Features | Support | Comment |
| Frequency | 2.4GHz | |
| Wi-Fi 6 | ||
| Bandwidth | 20MHz | |
| Maximum PHY rate | 114.7Mbps | HE MCS9 |
| Main Protocols | 802.11 b/g/n/ax | |
| Sub-protocols | 802.11 e/i/w/d/k/v/r | |
| Other Key Protocols | WMM/WPA1~3/WPS/802.1X/EAP/P2P/NAN | |
| UL/DL OFDMA & DL MU-MIMO | ||
| SU/MU Beamformee | ||
| TWT | Target Wake Time | |
| UL LDPC | UL Low-Density Parity-Check Code | |
| DL STBC | DL Space-Time Block Coding | |
| Auto Antenna Diversity | ||
| CSI | Channel State Information | |
| MCC | Multi-Channel Concurrency | |
| Wi-Fi Card Mode | ||
| BT Features | ||
| Features | Support | Comment |
| Bluetooth Dual Mode | Bluetooth Classic and Bluetooth Low Energy | |
| Bluetooth BR/EDR | Bluetooth basic rate and enhanced data rate | |
| Scatternet | Scatternet concurrent central/peripheral operation | |
| LE 2Mpbs PHY | ||
| LE Long Range | LE Coded PHY long-range mode (125kbps/500kbps) | |
| LE Advertising Extensions | Support multiple advertising sets | |
| LE Periodic Advertising | ||
| LE Periodic Advertising Sync Transfer | ||
| Direction Finding (AoA/AoD) | Support Angle of Arrival and Angel of Departure | |
| LE Power Control | ||
| SIG Mesh | Certified for SIG Mesh v1.1 | |
System Power Consumption
| Mode | Wi-Fi | Power Consumption | Unit | Comment |
|---|---|---|---|---|
| Deep-Sleep | OFF | 57.4 | µA | PSRAM package |
| Sleep | OFF | 700 | µA | PSRAM package |
| Active | OFF | 12.7 | mA | 0.9v WFI mode, CPU=300MHz, DSP=400MHz |
| WoWLAN | DTIM=3 | 1.48 | mA | 2.4G mode |
| WoWLAN | DTIM=10 | 1.36 | mA | 2.4G mode |
NOTICE:
- Test conditions: 3.3V, 25°C
- WoWLAN: System average power consumption
Application Scenarios
- Home appliance
- Smart voice assistant
- Smart bluetooth speaker
- Energy storage
- Intelligent device
- Smart audio
- BLE gateway
- Micro inverter
Highlights
In addition to essential features for IoT development like peripheral interfaces, secure boot, AES/SHA hardware crypto engine, and authenticated debug access, as well as Wi-Fi 4 2.4G and BLE, this IC also supports the following functions:
Integrated HiFi-5 DSP, architecturally optimized for AI computing, voice wake-up and noise reduction applications. Multi-channel MAC computing capability ensures faster processing. Working with independent application core and network core, three-core collaboration ensures stable low-latency voice applications.
Integrates various security features including secure boot, symmetric encryption, asymmetric encryption, TRNG, HUK, OTP storage, Flash XIP decryption, etc., providing PSA Level 2 and above security protection for customer products
Incorporating advanced technologies such as OFDMA, MU-MIMO, Extended Range and TWT effectively alleviates wireless resource congestion, enhances weak signal coverage, significantly improves transmission quality, reduces latency and extends the battery life of IoT devices through ultra-long sleep cycles
Built-in audio codec supports audio input and output, reducing dependency on external components and adaptation costs, facilitating voice interaction and audio playback
Bluetooth Classic and Bluetooth Low Energy concurrent, fully compatible with Bluetooth Classic profiles such as A2DP/HFP, achieving seamless coordination of high-definition stereo audio and low-latency call control, enjoying better wireless audio experience
System Architecture
- Armv8.1-M Architecture (Arm Cortex®-M55 ISA compatible)
- Up to 400MHz clock frequency, 3-stage pipeline
- 16KB I-Cache
- 16KB D-Cache
- Integrated FPU/DSP instruction extensions
- RISC-V RV32IMAFC Architecture
- 400MHz Single-Issue In-Order Pipeline
- 16KB I-Cache
- 16KB D-Cache
- Open-source ISA architecture, supports custom extensions
- 500MHz 5-slot VLIW architecture
- 8 x 32-bit MACs/cycle
- 8 x SP-FMACs/cycle
- 32 x 8-bit MACs/cycle
- 256KB dedicated DTCM
- 32KB I-Cache
- 48KB D-Cache
- 512KB SRAM
- QSPI NOR Flash: Up to 100MHz
- DQ8 DDR PSRAM: Up to 250MHz
IC Selection
| Package number | RTL8713ECM-VA4-CG | RTL8713ECM-VA3-CG |
|---|---|---|
| Real-M300 | 400MHz | 400MHz |
| KR4 | 400MHz | 400MHz |
| DSP | 500MHz | 500MHz |
| On-chip SRAM | 512KB | 512KB |
| TrustZone | X | X |
| NOR Flash | X | X |
| PSRAM | 16MB | 8MB |
| Wi-Fi | Wi-Fi 6 (2.4GHz) | Wi-Fi 6 (2.4GHz) |
| Bluetooth | Dual Mode | Dual Mode |
| Operating voltage | 2.97V ~ 3.63V | 2.97V ~ 3.63V |
| Operating temperature | -20°C ~ 85°C | -20°C ~ 85°C |
| Package (mm) | QFN68 (8 x 8) | QFN68 (8 x 8) |
Peripheral Interfaces
| Function | Quantity | Notes |
|---|---|---|
| GPIO | 43 | pcs |
| SPI | 2 | pcs |
| UART | 5 | pcs |
| I2C | 2 | pcs |
| IR (Infrared Transceiver) | 1 | pcs |
| RTC | 1 | pcs |
| General Timer | 15 | pcs |
| PWM | 8 | channels |
| Capture Timer | 1 | pcs |
| 12-bit ADC | 6 | channels |
| Touch Keys | 9 | keys |
| GDMA | 8 | channels |
| Independent Watchdog | 1 | pcs |
| Normal Watchdog | 3 | pcs |
| Serial LED Controller | 1 | pcs |
| On-chip Temperature Sensor | 1 | pcs |
| Digital Microphone | 4 | channels |
| I2S | 2 | Up to 192kHz sampling rate, up to 8-channel data transfer |
| Audio ADC | 3 | channels |
| VAD | 1 | Supports Voice Activity Detection |
| PDM Output | 1 | Mono channel |
| Audio DAC | 1 | Mono channel, supports linear output |
Security Features
We consistently prioritize security as the core of our products, offering our customers a rich array of security features through hardware design and providing exceptional hardware-based attack resistance, helping to create IoT products with ultimate security.
| Features | Support | Comment |
|---|---|---|
| Symmetric Encryption Engine | ECDSA | |
| Asymmetric Encryption Engine | ||
| Secure Boot | ||
| Flash OTF Decryption | ||
| Arm TrustZone®-M | ||
| OTP Secure Storage | ||
| Debug Password Protection | ||
| HUK Derivation Mechanism | ||
| True Random Number Generator (TRNG) |
Based on asymmetric encryption and digital signature mechanisms, it verifies public key hashes and firmware signatures. This process can prevent tampering and rollback attacks, ensuring that the device only runs trusted firmware
Supports both embedded and external Flash, with independent key encryption for multiple firmware. When the CPU executes encrypted firmware, it is decrypted in real-time by hardware, with nearly imperceptible performance impact. Supports unique encryption for each device, preventing injection and cloning attacks
In addition to the essential symmetric encryption engines like AES for IoT, we also provide computationally more intensive asymmetric encryption algorithms such as ECDSA, EdDSA, and RSA. This greatly alleviates the computational burden on the CPU and improves encryption and decryption speeds
Physical-level anti-extraction, key area locked for access only by the security engine, tamper-resistant and read-proof. Supports independent secure zones and CRC verification
Generates high-security random numbers based on physical entropy sources. Certified by NIST for randomness. Provides unpredictability to the system, resistant to prediction attacks
Hardware Unique Key (HUK) with physical isolation protection, unreadable and unclonable, used for secure derivation of application keys
Strict control over debug interface access through authentication mechanisms. Supports authorized access and permanent closure, eliminating physical debug attacks. Meets security management requirements at different stages of the product lifecycle, effectively enhancing overall security
Security Certifications Support
We offer support for multiple security certifications. By providing these advanced security features and certification support, we aim to assist our customers in efficiently meeting various market entry requirements, ensuring the security and competitiveness of their products.
- PSA
- NIST STS
- NIST CAVP
- FIPS 140-3
- RED (EN 18031)
Most of our chips are capable of achieving PSA Certified Level 2 and Level 3, with some chips already having completed PSA Certified Level 2 certification.
Wireless Connectivity
| Wi-Fi Features | ||
|---|---|---|
| Features | Support | Comment |
| Frequency | 2.4GHz | |
| Wi-Fi 6 | ||
| Bandwidth | 20MHz | |
| Maximum PHY rate | 114.7Mbps | HE MCS9 |
| Main Protocols | 802.11 b/g/n/ax | |
| Sub-protocols | 802.11 e/i/w/d/k/v/r | |
| Other Key Protocols | WMM/WPA1~3/WPS/802.1X/EAP/P2P/NAN | |
| UL/DL OFDMA & DL MU-MIMO | ||
| SU/MU Beamformee | ||
| TWT | Target Wake Time | |
| UL LDPC | UL Low-Density Parity-Check Code | |
| DL STBC | DL Space-Time Block Coding | |
| Auto Antenna Diversity | ||
| CSI | Channel State Information | |
| MCC | Multi-Channel Concurrency | |
| Wi-Fi Card Mode | ||
| BT Features | ||
| Features | Support | Comment |
| Bluetooth Dual Mode | Bluetooth Classic and Bluetooth Low Energy | |
| Bluetooth BR/EDR | Bluetooth basic rate and enhanced data rate | |
| Scatternet | Scatternet concurrent central/peripheral operation | |
| LE 2Mpbs PHY | ||
| LE Long Range | LE Coded PHY long-range mode (125kbps/500kbps) | |
| LE Advertising Extensions | Support multiple advertising sets | |
| LE Periodic Advertising | ||
| LE Periodic Advertising Sync Transfer | ||
| Direction Finding (AoA/AoD) | Support Angle of Arrival and Angel of Departure | |
| LE Power Control | ||
| SIG Mesh | Certified for SIG Mesh v1.1 | |
System Power Consumption
| Mode | Wi-Fi | Power Consumption | Unit | Comment |
|---|---|---|---|---|
| Deep-Sleep | OFF | 57.4 | µA | PSRAM package |
| Sleep | OFF | 700 | µA | PSRAM package |
| Active | OFF | 12.7 | mA | 0.9v WFI mode, CPU=300MHz, DSP=400MHz |
| WoWLAN | DTIM=3 | 1.48 | mA | 2.4G mode |
| WoWLAN | DTIM=10 | 1.36 | mA | 2.4G mode |
NOTICE:
- Test conditions: 3.3V, 25°C
- WoWLAN: System average power consumption
Application Scenarios
- Home appliance
- Smart voice assistant
- Smart bluetooth speaker
- Energy storage
- Intelligent device
- Smart audio
- BLE gateway
- Micro inverter
Development Resources
Software Resources
![]() |
HiFi DSP SDK Download | Link |
![]() |
HiFi DSP SDK Guide | Link |
![]() |
FreeRTOS SDK Download | Link |
![]() |
FreeRTOS SDK Guide | Link |
![]() |
Development Tools | Link |
![]() |
VS Code Extension | Link |
Hardware Resources
![]() |
Datasheet | Link |
![]() |
Pinmux Table | Link |
![]() |
Pinmux Auto-Layout | Link |
![]() |
Schematic & PCB Design | Link |
EVB Purchase
![]() |
PKE8713ECM-VA4-N43 (Taobao) | Link |
![]() |
PKE8713ECM-VA4-N43 (Amazon) | Link |
Highlights
In addition to essential features for IoT development like peripheral interfaces, secure boot, AES/SHA hardware crypto engine, and authenticated debug access, as well as Wi-Fi 4 2.4G and BLE, this IC also supports the following functions:
Arm Cortex®-A32 dual-core application processor supports hardware FPU and NEON instruction set, paired with high-speed DDR or PSRAM, providing powerful computing capabilities for multimedia applications, speech recognition, and AI computations
Integrates various security features including TrustZone, secure boot, symmetric encryption, asymmetric encryption, TRNG, HUK, OTP storage, Flash XIP decryption, etc., providing PSA Level 2 and above security protection for customer products
Incorporating advanced technologies such as OFDMA, MU-MIMO, Extended Range and TWT effectively alleviates wireless resource congestion, enhances weak signal coverage, significantly improves transmission quality, reduces latency and extends the battery life of IoT devices through ultra-long sleep cycles
2.4GHz for Wall-Penetrating Coverage, 5GHz for High-Speed Transmission, Adapting to complex environments, this dual-band synergy comprehensively upgrades the IoT device experience
Supports standard display interfaces, flexibly adaptable from small LCDs to HD screens
Built-in audio codec supports audio input and output, reducing dependency on external components and adaptation costs, facilitating voice interaction and audio playback
Bluetooth Classic and Bluetooth Low Energy concurrent, fully compatible with Bluetooth Classic profiles such as A2DP/HFP, achieving seamless coordination of high-definition stereo audio and low-latency call control, enjoying better wireless audio experience
Independent antenna design for Wi-Fi and Bluetooth, separating Wi-Fi and Bluetooth transmission links, avoiding traditional single-antenna coexistence issues. This simultaneously ensures high-speed Wi-Fi transmission and Bluetooth connection stability, significantly improving coexistence performance and user experience
USB 2.0 High-Speed Host/Device, SD card/eMMC
System Architecture
- Armv8-A architecture (ISA)
- Up to 1.2GHz, 8-stage in-order pipeline
- 32KB I-Cache
- 32KB D-Cache
- 256KB L2 Cache
- Arm TrustZone® security for secure/non-secure domain isolation
- Armv8.1-M architecture
- Arm Cortex®-M55 ISA compatible
- Up to 333MHz, 3-stage pipeline
- 64KB I-Cache
- 32KB D-Cache
- Integrated FPU/DSP/MVE extensions
- Arm TrustZone®-M hardware isolation
- Armv8-M architecture
- Arm Cortex®-M23 ISA compatible
- Optimized for power-critical applications
- Up to 40MHz
- 16KB I-Cache
- 8KB D-Cache
- 256KB SRAM
- QSPI NOR/NAND Flash:up to 100MHz
- DQ8 DDR PSRAM:up to 250MHz
- DQ16 DDR2/DDR3L:up to 533MHz
IC Selection
| Package number | RTL8730EAH-VA3-CG | RTL8730EAH-VD3-CG | RTL8730EAH-VH6-CG | RTL8730EAM-VA6-CG | RTL8730ELH-VA3-CG | RTL8730ELM-VA7-CG | RTL8730ELM-VA8-CG |
|---|---|---|---|---|---|---|---|
| CA32 | 1.2GHz | 1.2GHz | 1.2GHz | 1.2GHz | 1.2GHz | 1.2GHz | 1.2GHz |
| Real-M300 | 333MHz | 333MHz | 333MHz | 333MHz | 333MHz | 333MHz | 333MHz |
| Real-M200 | 40MHz | 40MHz | 40MHz | 40MHz | 40MHz | 40MHz | 40MHz |
| On-chip SRAM | 256KB | 256KB | 256KB | 256KB | 256KB | 256KB | 256KB |
| TrustZone | |||||||
| NOR Flash | 8MB | 16MB | 32MB | 8MB | |||
| PSRAM | 8MB | 8MB | 8MB | ||||
| DDR | 64MB (DDR2) | 64MB (DDR2) | 128MB (DDR2) | 256MB (DDR3L) | |||
| Linux | |||||||
| Wi-Fi | Wi-Fi 6 (2.4GHz + 5GHz) | Wi-Fi 6 (2.4GHz + 5GHz) | Wi-Fi 6 (2.4GHz + 5GHz) | Wi-Fi 6 (2.4GHz + 5GHz) | Wi-Fi 6 (2.4GHz + 5GHz) | Wi-Fi 6 (2.4GHz + 5GHz) | Wi-Fi 6 (2.4GHz + 5GHz) |
| Bluetooth | Dual Mode | Dual Mode | Dual Mode | Dual Mode | Dual Mode | Dual Mode | Dual Mode |
| Operating voltage | 2.97V ~ 3.63V | 2.97V ~ 3.63V | 2.97V ~ 3.63V | 2.97V ~ 3.63V | 2.97V ~ 3.63V | 2.97V ~ 3.63V | 2.97V ~ 3.63V |
| Operating temperature | -20°C ~ 85°C | -20°C ~ 85°C | -20°C ~ 85°C | -20°C ~ 85°C | -20°C ~ 85°C | -20°C ~ 85°C | -20°C ~ 85°C |
| Package (mm) | QFN100 (10 x 10) | QFN100 (10 x 10) | QFN100 (10 x 10) | QFN100 (10 x 10) | DR-QFN144 (11 x 11) | DR-QFN144 (11 x 11) | DR-QFN144 (11 x 11) |
Peripheral Interfaces
| Function | Quantity | Notes |
|---|---|---|
| GPIO | 61 | pcs |
| SPI | 2 | pcs |
| UART | 5 | pcs |
| I2C | 3 | pcs |
| IR (Infrared Transceiver) | 1 | pcs |
| RTC | 1 | 个 |
| General Timer | 12 | pcs |
| PWM | 6 | channels |
| Capture Timer | 1 | pcs |
| 12-bit ADC | 6 | channels |
| Battery Measurement Dedicated ADC | 1 | channel |
| Touch Key | 9 | keys |
| GDMA | 8 | channels |
| Independent Watchdog | 1 | pcs |
| Secure Watchdog | 2 | pcs |
| Normal Watchdog | 2 | pcs |
| USB 2.0 | 1 | pcs |
| SD Host Controller | 1 | Support SD card/eMMC/SDIO device |
| Serial LED Controller | 1 | pcs |
| MIPI-DSI Display Interface | 1 | Dual channels, integrated D-PHY, single channel rate 1Gbps |
| On-chip Temperature Sensor | 1 | pcs |
| Digital Microphone | 8 | channels |
| I2S | 2 | Up to 384kHz sampling rate, up to 8 channels data transfer |
| Audio ADC | 5 | channels |
| VAD | 1 | Supports Voice Activity Detection |
| PDM Output | 1 | Dual channel |
| Audio DAC | 2 | Dual channel, supports line-out or headphone amplifier |
Security Features
We consistently prioritize security as the core of our products, offering our customers a rich array of security features through hardware design and providing exceptional hardware-based attack resistance, helping to create IoT products with ultimate security.
| Features | Support | Comment |
|---|---|---|
| Symmetric Encryption Engine | ||
| Asymmetric Encryption Engine | ECDSA/EdDSA/RSA | |
| Secure Boot | ||
| Flash OTF Decryption | ||
| Arm TrustZone®-M | ||
| OTP Secure Storage | ||
| Debug Password Protection | ||
| HUK Derivation Mechanism | ||
| True Random Number Generator (TRNG) |
Based on asymmetric encryption and digital signature mechanisms, it verifies public key hashes and firmware signatures. This process can prevent tampering and rollback attacks, ensuring that the device only runs trusted firmware
Supports both embedded and external Flash, with independent key encryption for multiple firmware. When the CPU executes encrypted firmware, it is decrypted in real-time by hardware, with nearly imperceptible performance impact. Supports unique encryption for each device, preventing injection and cloning attacks
Based on the Arm TrustZone® architecture, coupled with a dedicated hardware access control unit, it achieves strong isolation protection for secure memory areas and secure peripherals. Meanwhile, secure firmware is decrypted by the security encryption engine and loaded into the secure RAM area, ensuring protection against leakage and tampering throughout the entire process
In addition to the essential symmetric encryption engines like AES for IoT, we also provide computationally more intensive asymmetric encryption algorithms such as ECDSA, EdDSA, and RSA. This greatly alleviates the computational burden on the CPU and improves encryption and decryption speeds
Physical-level anti-extraction, key area locked for access only by the security engine, tamper-resistant and read-proof. Supports independent secure zones and CRC verification
Generates high-security random numbers based on physical entropy sources. Certified by NIST for randomness. Provides unpredictability to the system, resistant to prediction attacks
Hardware Unique Key (HUK) with physical isolation protection, unreadable and unclonable, used for secure derivation of application keys
Strict control over debug interface access through authentication mechanisms. Supports authorized access and permanent closure, eliminating physical debug attacks. Meets security management requirements at different stages of the product lifecycle, effectively enhancing overall security
Security Certifications Support
We offer support for multiple security certifications. By providing these advanced security features and certification support, we aim to assist our customers in efficiently meeting various market entry requirements, ensuring the security and competitiveness of their products.
- PSA
- NIST STS
- NIST CAVP
- FIPS 140-3
- RED (EN 18031)
Most of our chips are capable of achieving PSA Certified Level 2 and Level 3, with some chips already having completed PSA Certified Level 2 certification.
Wireless Connectivity
| Wi-Fi Features | ||
|---|---|---|
| Features | Support | Comment |
| Frequency | 2.4GHz/5GHz | |
| Wi-Fi 6 | ||
| Bandwidth | 20MHz | |
| MaximumPHY rate | 114.7Mbps | HE MCS9 |
| Main Protocols | 802.11 a/b/g/n/ac/ax | |
| Sub-protocols | 802.11 e/i/w/d/k/v/r | |
| Other Key Protocols | WMM/WPA1~3/WPS/802.1X/EAP/P2P/NAN | |
| UL/DL OFDMA & DL MU-MIMO | ||
| SU/MU Beamformee | ||
| TWT | Target Wake Time | |
| UL LDPC | UL Low-Density Parity-Check Code | |
| DL STBC | DL Space-Time Block Coding | |
| Auto Antenna Diversity | ||
| CSI | Channel State Information | |
| MCC | Multi-Channel Concurrency | |
| BT Features | ||
| Features | Support | Comment |
| Bluetooth Dual Mode | Bluetooth Classic and Bluetooth Low Energy | |
| Bluetooth BR/EDR | Bluetooth basic rate and enhanced data rate | |
| Scatternet | Scatternet concurrent central/peripheral operation | |
| LE 2Mpbs PHY | ||
| LE Long Range | LE Coded PHY long-range mode (125kbps/500kbps) | |
| LE Advertising Extensions | Support multiple advertising sets | |
| LE Periodic Advertising | ||
| LE Periodic Advertising Sync Transfer | ||
| Direction Finding (AoA/AoD) | Support Angle of Arrival and Angel of Departure | |
| LE Isochronous Channels (CIS/BIS) | Support Connected Isochronous Stream and Broadcast Isochronous Stream | |
| LE Power Control | ||
| SIG Mesh | Certified for SIG Mesh v1.1 | |
| LE Audio | Support Auracast Broadcast Audio | |
| Dedicated antenna for Bluetooth | Wi-Fi and Bluetooth each use their own RF and antenna, significantly improving coexistence performance | |
System Power Consumption
| Mode | Wi-Fi | Power Consumption | Unit | Comment |
|---|---|---|---|---|
| Deep-Sleep | OFF | 23.1 | µA | RTL8730EAH-VA3 |
| Sleep | OFF | 345 | µA | RTL8730EAH-VA3 |
| Active | OFF | 17.6 | mA | 0.9v WFI mode, CA32=460MHz |
| WoWLAN | DTIM=3 | 691 | µA | 2.4G mode |
| WoWLAN | DTIM=10 | 470 | µA | 2.4G mode |
NOTICE:
- Test conditions: 3.3V, 25°C
- WoWLAN: System average power consumption
Application Scenarios
- Smart speaker
- Industrial gateway
- Voice-controlled appliance
- Smart thermostat
- Smart panel
- Smart home
- Wearable devices
- Centralized control system
- Ethernet to Wi-Fi dongle
Highlights
In addition to integrating the essential peripheral interfaces, secure boot, hardware encryption engine AES/SHA, authenticated debug access, Wi-Fi 4 2.4GHz, BLE, and other important functions for IoT development, this IC also supports the following features:
Integrates various security features including TrustZone, secure boot, symmetric encryption, asymmetric encryption, TRNG, HUK, OTP storage, Flash XIP decryption, etc., providing PSA Level 2 and above security protection for customer products
Incorporating advanced technologies such as OFDMA, MU-MIMO, Extended Range and TWT effectively alleviates wireless resource congestion, enhances weak signal coverage, significantly improves transmission quality, reduces latency and extends the battery life of IoT devices through ultra-long sleep cycles
2.4GHz for Wall-Penetrating Coverage, 5GHz for High-Speed Transmission, Adapting to complex environments, this dual-band synergy comprehensively upgrades the IoT device experience
Multi-hop, Multi-branch Intelligent Networking, Rapid Fault Self-Healing, Ultra-Low Latency, and High Stability comprehensively overcome traditional Mesh network bottlenecks, redefining the wireless experience across all scenarios
Equipped with a UI rendering hardware accelerator and an MJPEG hardware decoder to enhance HMI performance on smart panels; supports standard display interfaces for flexible adaptation from small LCDs to high‑definition screens.
Integrated Ethernet interface ensures reliable transmission of critical data in industrial environments and high-interference scenarios. Suitable for applications with stringent network stability requirements such as industrial automation and security monitoring
Supporting ultra-low-power WoWLAN and enabling rapid restoration of the original runtime context, empowering battery-powered devices with network listening wake-up functionality
Integrates USB 2.0 High-Speed Host/Device, SDIO Host/Device, SD card/eMMC, DMIC/I2S
System Architecture
- Armv8.1-M Architecture
- Arm Cortex®-M55 ISA compatible
- Up to 334MHz, 3-stage pipeline
- 16KB I-Cache
- 16KB D-Cache
- Arm TrustZone®-M hardware-level isolation
- Armv8.1-M Architecture
- Arm Cortex®-M55 ISA compatible
- Up to 334MHz, 3-stage pipeline
- 16KB I-Cache
- 16KB D-Cache
- 512KB SRAM
- QSPI NOR Flash: Up to 104MHz
- DQ8/DQ16 DDR PSRAM: Up to 200MHz
- Bus Architecture: Multi-layer AXI bus for parallel access
IC Selection
| Part number | RTL8721FAF-VT2-CG | RTL8721FAF-VA3-CG | RTL8721FAM-VT2-CG | RTL8721FCM-VA2-CG | RTL8721FCM-VA3-CG | RTL8721FCM-VA4-CG | RTL8721FLM-VA4-CG |
|---|---|---|---|---|---|---|---|
| Real-M300 (KM4TZ) | 320MHz | 320MHz | 320MHz | 320MHz | 320MHz | 320MHz | 320MHz |
| Real-M300 (KM4NS) | 320MHz | 320MHz | 320MHz | 320MHz | 320MHz | 320MHz | 320MHz |
| On-chip SRAM | 512KB | 512KB | 512KB | 512KB | 512KB | 512KB | 512KB |
| TrustZone | Y | Y | Y | Y | Y | Y | Y |
| NOR Flash | 4MB | 8MB | X | X | X | X | X |
| PSRAM | X | X | 4MB | 4MB | 8MB | 16MB | 16MB |
| Wi-Fi | Wi-Fi 6 (2.4GHz + 5GHz) | Wi-Fi 6 (2.4GHz + 5GHz) | Wi-Fi 6 (2.4GHz + 5GHz) | Wi-Fi 6 (2.4GHz + 5GHz) | Wi-Fi 6 (2.4GHz + 5GHz) | Wi-Fi 6 (2.4GHz + 5GHz) | Wi-Fi 6 (2.4GHz + 5GHz) |
| Bluetooth | LE | LE | LE | LE | LE | LE | LE |
| Operating voltage | 2.97V ~ 3.63V | 2.97V ~ 3.63V | 2.97V ~ 3.63V | 2.97V ~ 3.63V | 2.97V ~ 3.63V | 2.97V ~ 3.63V | 2.97V ~ 3.63V |
| Operating temperature | -40°C ~ 105°C | -20°C ~ 85°C | -40°C ~ 105°C | -20°C ~ 85°C | -20°C ~ 85°C | -20°C ~ 85°C | -20°C ~ 85°C |
| Package (mm) | QFN48 (6 x 6) | QFN48 (6 x 6) | QFN48 (6 x 6) | QFN68 (8 x 8) | QFN68 (8 x 8) | QFN68 (8 x 8) | QFN100 (10 x 10) |
Peripheral Interfaces
| Function | Quantity | Notes |
|---|---|---|
| GPIO | 68 | pcs |
| SPI | 2 | pcs |
| UART | 5 | pcs |
| I2C | 2 | pcs |
| I2C-like | 1 | pcs |
| IR (Infrared Transceiver) | 1 | pcs |
| RTC | 1 | pcs |
| General Timer | 4 | pcs |
| PWM | 16 | channels |
| Capture Timer | 1 | pcs |
| PMC Timer | 2 | groups |
| 12-bit ADC | 12 | channels |
| Touch Key | 9 | keys |
| GDMA | 8 | channels |
| Independent Watchdog | 1 | pcs |
| Secure Watchdog | 1 | pcs |
| General Watchdog | 2 | pcs |
| USB 2.0 | 1 | pcs |
| SDIO Device | 1 | pcs |
| SD Host Controller | 1 | Support SD card/eMMC/SDIO device |
| Pixel Processing Engine | 1 | For fast image data processing |
| LCDC | 1 | pcs |
| MJPEG | 1 | pcs |
| A2C | 2 | pcs, Compatible with ISO11898-1 |
| Ethernet MAC | 1 | pcs |
| Audio Codec | 1 | Includes 2-channel digital microphone (DMIC) |
| I2S | 1 | Up to 192kHz sampling, up to 8-channel Tx/Rx |
| On-chip Temperature Sensor | 1 | pcs |
Security Features
We consistently prioritize security as the core of our products, offering our customers a rich array of security features through hardware design and providing exceptional hardware-based attack resistance, helping to create IoT products with ultimate security.
| Features | Support | Comment |
|---|---|---|
| Symmetric Encryption Engine | ||
| Asymmetric Encryption Engine | ECDSA/EdDSA/RSA | |
| Secure Boot | ||
| Flash OTF Decryption | ||
| Arm TrustZone®-M | ||
| OTP Secure Storage | ||
| Debug Password Protection | ||
| HUK Derivation Mechanism | ||
| True Random Number Generator (TRNG) |
Based on asymmetric encryption and digital signature mechanisms, it verifies public key hashes and firmware signatures. This process can prevent tampering and rollback attacks, ensuring that the device only runs trusted firmware
Supports both embedded and external Flash, with independent key encryption for multiple firmware. When the CPU executes encrypted firmware, it is decrypted in real-time by hardware, with nearly imperceptible performance impact. Supports unique encryption for each device, preventing injection and cloning attacks
Based on the Arm TrustZone® architecture, coupled with a dedicated hardware access control unit, it achieves strong isolation protection for secure memory areas and secure peripherals. Meanwhile, secure firmware is decrypted by the security encryption engine and loaded into the secure RAM area, ensuring protection against leakage and tampering throughout the entire process
In addition to the essential symmetric encryption engines like AES for IoT, we also provide computationally more intensive asymmetric encryption algorithms such as ECDSA, EdDSA, and RSA. This greatly alleviates the computational burden on the CPU and improves encryption and decryption speeds
Physical-level anti-extraction, key area locked for access only by the security engine, tamper-resistant and read-proof. Supports independent secure zones and CRC verification
Generates high-security random numbers based on physical entropy sources. Certified by NIST for randomness. Provides unpredictability to the system, resistant to prediction attacks
Hardware Unique Key (HUK) with physical isolation protection, unreadable and unclonable, used for secure derivation of application keys
Strict control over debug interface access through authentication mechanisms. Supports authorized access and permanent closure, eliminating physical debug attacks. Meets security management requirements at different stages of the product lifecycle, effectively enhancing overall security
Security Certifications Support
We offer support for multiple security certifications. By providing these advanced security features and certification support, we aim to assist our customers in efficiently meeting various market entry requirements, ensuring the security and competitiveness of their products.
- PSA
- NIST STS
- NIST CAVP
- FIPS 140-3
- RED (EN 18031)
Most of our chips are capable of achieving PSA Certified Level 2 and Level 3, with some chips already having completed PSA Certified Level 2 certification.
Wireless Connectivity
| Wi-Fi Features | ||
|---|---|---|
| Features | Support | Comment |
| Frequency | 2.4GHz/5GHz | |
| Wi-Fi 6 | ||
| Bandwidth | 20MHz | |
| MaximumPHY rate | 114.7Mbps | HE MCS9 |
| Main Protocols | 802.11 a/b/g/n/ac/ax | |
| Sub-protocols | 802.11 e/i/w/d/k/v/r | |
| Other Key Protocols | WMM/WPA1~3/WPS/802.1X/EAP/P2P/NAN | |
| UL/DL OFDMA & DL MU-MIMO | ||
| SU/MU Beamformee | ||
| TWT | Target Wake Time | |
| UL LDPC | UL Low-Density Parity-Check Code | |
| DL STBC | DL Space-Time Block Coding | |
| Auto Antenna Diversity | ||
| CSI | Channel State Information | |
| MCC | Multi-Channel Concurrency | |
| R-MESH | Realtek MESH | |
| Wi-Fi Card Mode | ||
| BT Features | ||
| Features | Support | Comment |
| Bluetooth LE | Bluetooth Low Energy | |
| Scatternet | Scatternet concurrent central/peripheral operation | |
| LE 2Mpbs PHY | ||
| LE Long Range | LE Coded PHY long-range mode (125kbps/500kbps) | |
| LE Advertising Extensions | Support multiple advertising sets | |
| SIG Mesh | Certified for SIG Mesh v1.1 | |
System Power Consumption
| Mode | Wi-Fi | Power Consumption | Unit | Comment |
|---|---|---|---|---|
| Deep-Sleep | OFF | 11.3 | µA | Flash package |
| Sleep | OFF | 48.2 | µA | Flash package |
| Active | OFF | 13.1 | mA | 0.9v WFI mode, CPU=266MHz |
| WoWLAN | DTIM=3 | 185 | µA | 2.4G mode |
| WoWLAN | DTIM=10 | 100 | µA | 2.4G mode |
NOTICE:
- Test conditions: 3.3V, 25°C
- WoWLAN: System average power consumption
Application Scenarios
- Smart home
- Lighting (dimming) control, switch and plugs
- Home and kitchen appliances
- Industrial 4.0
- Low-power IoT devices
- Smart door lock
- Low-power Wi-Fi camera
- HMI smart display
- Health-care devices
- Wearables
- Portable devices
- Gaming accessories
- Wireless audio
- New energy field
- Ethernet to Wi-Fi dongle
Highlights
In addition to essential features for IoT development like peripheral interfaces, secure boot, AES/SHA hardware crypto engine, and authenticated debug access, as well as Wi-Fi 4 2.4G and BLE, this IC also supports the following functions:
Integrates two Armv8-M processors, running up to 200MHz and 20MHz respectively. Supports FPU/DSP extension instructions, integrates 512KB SRAM, and supports DQ8 DDR PSRAM.
Integrates various security features including TrustZone, secure boot, symmetric encryption, EFUSE storage, Flash XIP decryption, etc., to safeguard the security of customer products
2.4GHz for Wall-Penetrating Coverage, 5GHz for High-Speed Transmission, Adapting to complex environments, this dual-band synergy comprehensively upgrades the IoT device experience
Supports standard display interfaces, flexibly adaptable from small LCDs to HD screens
Built-in audio codec supports audio input and output, reducing dependency on external components and adaptation costs, facilitating voice interaction and audio playback
Supporting ultra-low-power WoWLAN and enabling rapid restoration of the original runtime context, empowering battery-powered devices with network listening wake-up functionality
Integrates USB 2.0 High-Speed Host/Device, SD card/eMMC, and Key-scan.
System Architecture
- Armv8-M Architecture
- Arm Cortex®-M33 ISA compatible
- Integrated FPU/DSP instruction extensions
- Up to 200MHz
- 32KB I-Cache
- 4KB D-Cache
- Armv8-M Architecture
- Arm Cortex®-M23 ISA compatible
- Up to 20MHz
- 16KB I-Cache
- 4KB D-Cache
- Real-300: 512KB SRAM
- Real-300: 4MB PSRAM, 8-bit DDR
- Real-200: 64KB SRAM
- Real-200: 1KB retention SRAM, retains data in power-saving mode
IC Selection
| Part number | RTL8720DN-VA1-CG | RTL8720DN-VT1-CG | RTL8720DM-VA1-CG | RTL8720DF-VA1-CG | RTL8720DF-VT1-CG | RTL8721DM-VA1-CG | RTL8722DM-VA1-CG | RTL8722DM-VP1-CG |
|---|---|---|---|---|---|---|---|---|
| Real-M300 | 200MHz | 200MHz | 200MHz | 200MHz | 200MHz | 200MHz | 200MHz | 200MHz |
| Real-M200 | 200MHz | 200MHz | 200MHz | 200MHz | 200MHz | 200MHz | 200MHz | 200MHz |
| On-chip SRAM | 512KB | 512KB | 512KB | 512KB | 512KB | 512KB | 512KB | 512KB |
| TrustZone | Y | Y | Y | Y | Y | Y | Y | Y |
| NOR Flash | X | X | X | 4MB | 4MB | X | X | X |
| PSRAM | X | X | 4MB | X | X | 4MB | 4MB | 4MB |
| Wi-Fi | Wi-Fi 4 (2.4GHz + 5GHz) | Wi-Fi 4 (2.4GHz + 5GHz) | Wi-Fi 4 (2.4GHz + 5GHz) | Wi-Fi 4 (2.4GHz + 5GHz) | Wi-Fi 4 (2.4GHz + 5GHz) | Wi-Fi 4 (2.4GHz + 5GHz) | Wi-Fi 4 (2.4GHz + 5GHz) | Wi-Fi 4 (2.4GHz + 5GHz) |
| Bluetooth | LE | LE | LE | LE | LE | LE | LE | LE |
| Operating voltage | 2.97V ~ 3.63V | 2.97V ~ 3.63V | 2.97V ~ 3.63V | 2.97V ~ 3.63V | 2.97V ~ 3.63V | 2.97V ~ 3.63V | 2.97V ~ 3.63V | 2.97V ~ 3.63V |
| Operating temperature | -20°C ~ 85°C | -40°C ~ 105°C | -20°C ~ 85°C | -20°C ~ 85°C | -40°C ~ 105°C | -20°C ~ 85°C | -20°C ~ 85°C | -20°C ~ 85°C |
| Package (mm) | QFN48 (6 x 6) | QFN48 (6 x 6) | QFN48 (6 x 6) | QFN48 (6 x 6) | QFN48 (6 x 6) | QFN68 (8 x 8) | QFN88 (10 x 10) | QFN88 (10 x 10) |
Peripheral Interfaces
| Function | Quantity | Notes |
|---|---|---|
| GPIO | 58 | pcs |
| SPI | 2 | pcs |
| UART | 4 | pcs |
| I2C | 1 | pcs |
| USI | 1 | pcs |
| Key-Scan | 36 | keys |
| Quad-Decoder | 1 | pcs |
| IR (Infrared Transceiver) | 1 | pcs |
| SDIO Device | 1 | pcs |
| SD Host Controller | 1 | Supports SD Card/eMMC/SDIO Device |
| USB 2.0 | 1 | pcs |
| RTC | 1 | pcs |
| PWM | 18 | channels |
| Touch Key | 5 | keys |
| GDMA | 6 | channels |
| 12-bit ADC | 7 | channels |
| Battery Measurement Dedicated ADC | 1 | channel |
| LCDC | 1 | Supports RGB interface and I8080 interface |
| AES/SHA Encryption Engine | 1 | Supports AES256/192/128 and SHA256 |
| Normal Watchdog | 1 | pcs |
| Audio ADC | 2 | channels |
| Digital Microphone | 2 | channels |
| I2S | 1 | Up to 192kHz sampling rate, up to 6-channel data transfer |
| Audio DAC | 2 | Stereo, supports linear output or headphone amplifier |
Security Features
We consistently prioritize security as the core of our products, offering our customers a rich array of security features through hardware design and providing exceptional hardware-based attack resistance, helping to create IoT products with ultimate security.
| Features | Support | Comment |
|---|---|---|
| Symmetric Encryption Engine | ||
| Asymmetric Encryption Engine | ||
| Secure Boot | ||
| Flash OTF Decryption | ||
| Arm TrustZone®-M | ||
| OTP Secure Storage | EFUSE Secure Storage | |
| Debug Password Protection | ||
| HUK Derivation Mechanism | ||
| True Random Number Generator (TRNG) |
Based on asymmetric encryption and digital signature mechanisms, it verifies public key hashes and firmware signatures. This process can prevent tampering and rollback attacks, ensuring that the device only runs trusted firmware
Supports both embedded and external Flash, with independent key encryption for multiple firmware. When the CPU executes encrypted firmware, it is decrypted in real-time by hardware, with nearly imperceptible performance impact. Supports unique encryption for each device, preventing injection and cloning attacks
Based on the Arm TrustZone® architecture, coupled with a dedicated hardware access control unit, it achieves strong isolation protection for secure memory areas and secure peripherals. Meanwhile, secure firmware is decrypted by the security encryption engine and loaded into the secure RAM area, ensuring protection against leakage and tampering throughout the entire process
After locking the key area, access is limited to the security engine, preventing tampering and unauthorized reading
Strict control over debug interface access through authentication mechanisms. Supports authorized access and permanent closure, eliminating physical debug attacks. Meets security management requirements at different stages of the product lifecycle, effectively enhancing overall security
Wireless Connectivity
| Wi-Fi Features | ||
|---|---|---|
| Features | Support | Comment |
| Frequency | 2.4GHz/5GHz | |
| Wi-Fi 6 | ||
| Bandwidth | 40MHz | |
| MaximumPHY rate | 150Mbps | HT MCS7 |
| Main Protocols | 802.11 a/b/g/n | |
| Sub-protocols | 802.11 e/i/w/d/k/v/r | |
| Other Key Protocols | WMM/WPA1~3/WPS/802.1X/EAP | |
| UL LDPC | UL Low-Density Parity-Check Code | |
| DL STBC | DL Space-Time Block Coding | |
| Auto Antenna Diversity | ||
| BT Features | ||
| Features | Support | Comment |
| Bluetooth LE | Bluetooth Low Energy | |
| Scatternet | Scatternet concurrent central/peripheral operation | |
| LE 2Mpbs PHY | ||
| SIG Mesh | Certified for SIG Mesh v1.1 | |
| High-Power Mode | 8dBm | |
System Power Consumption
| Mode | Wi-Fi | Power Consumption | Unit | Comment |
|---|---|---|---|---|
| Deep-Sleep | OFF | 10 | µA | |
| Sleep | OFF | 75 | µA | |
| Active | OFF | 20 | mA | |
| WoWLAN | DTIM=3 | µA | ||
| WoWLAN | DTIM=10 | µA |
NOTICE:
- Test conditions: 3.3V, 25°C
- WoWLAN: System average power consumption
Application Scenarios
- Home appliance control panel
- Smart door lock
- Smart toy
- Smart voice
- Smart remote controller
- Wi-Fi headset
- Wi-Fi gamepad
- BLE gateway
- Smart POS
Highlights
Realtek RTL8735B series is a new generation of highly integrated Wi-Fi/Bluetooth/Image ISP eight-in-one single-chip solution, featuring a 10mm x 10mm QFN package. Its low power consumption design significantly extends the system's battery life. The single chip also provides rich I/O interfaces and has successfully assisted customers in designing compact IoT doorbells, portable AI cameras, home appliances with AIoT camera video requirements, applications for edge AI audio-visual recognition, and IoT devices that can be powered by batteries.
Integrates an NPU engine with up to 0.4TOPS computing power, and also integrates an Armv8-M processor, up to 500MHz.
Supports 2K/FHD high-definition video, 1080p@30fps + 720p@30fps, 2K@24fps, and supports millisecond-level fast boot-up to ensure no footage is missed.
Integrates various security features including TrustZone, secure boot, symmetric encryption, asymmetric encryption, TRNG, HUK, OTP storage, Flash XIP decryption, etc., to safeguard the security of customer products
2.4GHz for Wall-Penetrating Coverage, 5GHz for High-Speed Transmission, Adapting to complex environments, this dual-band synergy comprehensively upgrades the IoT device experience
Built-in audio codec supports audio input and output, reducing dependency on external components and adaptation costs, facilitating voice interaction and audio playback
Integrates H.264/H.265 video encoding, supports AI model conversion: yolov3/4/7-tiny and CNN Gray/RGB.
System Architecture
- Armv8M architecture
- Up to 500MHz
- 32KB I-Cache
- 32KB D-Cache
- 0.4TOPS@INT8/INT16 (NPU) computing power
- Embedded 64MB/128MB/256MB DDR2/DDR3 memory: 533MHz
- Internal 768KB ROM: 250MHz
- Internal 512KB SRAM: 250MHz
- Supports SPI NOR Flash or NAND Flash
IC Selection
| Part number | RTL8735BDM-VA4-CG | RTL8735BM-VA4-CG | RTL8735BDM-VA9-CG |
|---|---|---|---|
| Real-M500 | 500MHz | 500MHz | 500MHz |
| NPU | 0.4TOPS@INT8/INT16 | 0.4TOPS@INT8/INT16 | 0.4TOPS@INT8/INT16 |
| ISP/Video Processor | Up to 2K/FHD | Up to 2K/FHD | Up to 2K/FHD |
| On-chip SRAM | 512KB | 512KB | 512KB |
| TrustZone | Y | Y | Y |
| DDR | 128MB (DDR2) | 128MB (DDR2) | 256MB (DDR3) |
| Wi-Fi | Wi-Fi 4 (2.4GHz + 5GHz) | Wi-Fi 4 (2.4GHz) | Wi-Fi 4 (2.4GHz + 5GHz) |
| Bluetooth | LE | LE | LE |
| Operating voltage | 3.135V ~ 3.465V | 3.135V ~ 3.465V | 3.135V ~ 3.465V |
| Operating temperature | -20°C ~ 85°C | -20°C ~ 85°C | -20°C ~ 85°C |
| Package (mm) | QFN128 (10 x 10) | QFN128 (10 x 10) | QFN128 (10 x 10) |
Video/ISP Features
- Multi-stream real-time H.265/H.264/JPEG encoding
- Supports 5-megapixel (2592x1944) sensor
- 1080p@45fps; 2K@24fps
- Supports 12bit Bayer pattern input and 8bit YUY2 input from CMOS sensor
- Supports MIPI CSI-2 four data lane
- CBR/VBR/CVBR/FIXQP/AVBR rate control, ROI/GDR, rotation/cropping
- Supports Auto Banding, Auto Exposure, Auto White Balance
- Advanced temporal and spatial noise reduction(3DNR)
- Lens shading compensation/ Black level compensation and dead pixel cancellation/ horizontal lens distortion correction/ High dynamic range fusion and tone mapping for HDR sensor input
- Programmable gamma table
- Digital WDR
- Image enhancement(brightness, contrast, saturation, hue and sharpness)
- ISP tool for easy image quality tuning
Peripheral Interfaces
| Function | Quantity | Notes |
|---|---|---|
| GPIO | 59 | pcs |
| SPI | 2 | pcs |
| UART | 4 | pcs |
| I2C | 2 | pcs |
| PWM | 12 | channels |
| ADC | 8 | channels |
| GDMA | 12 | channels |
| USB 2.0 | 1 | pcs |
| SD Host Controller | 1 | Supports SD card/eMMC/SDIO devices |
| Audio DAC | 1 | channel |
| Audio ADC | 1 | channel |
| Digital Microphone | 2 | channels |
Security Features
We consistently prioritize security as the core of our products, offering our customers a rich array of security features through hardware design and providing exceptional hardware-based attack resistance, helping to create IoT products with ultimate security.
| Features | Support | Comment |
|---|---|---|
| Symmetric Encryption Engine | ||
| Asymmetric Encryption Engine | ECDSA/EdDSA/RSA | |
| Secure Boot | ||
| Flash OTF Decryption | ||
| Arm TrustZone®-M | ||
| OTP Secure Storage | ||
| Debug Password Protection | ||
| HUK Derivation Mechanism | ||
| True Random Number Generator (TRNG) |
Based on asymmetric encryption and digital signature mechanisms, it verifies public key hashes and firmware signatures. This process can prevent tampering and rollback attacks, ensuring that the device only runs trusted firmware
Supports both embedded and external Flash, with independent key encryption for multiple firmware. When the CPU executes encrypted firmware, it is decrypted in real-time by hardware, with nearly imperceptible performance impact. Supports unique encryption for each device, preventing injection and cloning attacks
Based on the Arm TrustZone® architecture, coupled with a dedicated hardware access control unit, it achieves strong isolation protection for secure memory areas and secure peripherals. Meanwhile, secure firmware is decrypted by the security encryption engine and loaded into the secure RAM area, ensuring protection against leakage and tampering throughout the entire process
In addition to the essential symmetric encryption engines like AES for IoT, we also provide computationally more intensive asymmetric encryption algorithms such as ECDSA, EdDSA, and RSA. This greatly alleviates the computational burden on the CPU and improves encryption and decryption speeds
Physical-level anti-extraction, key area locked for access only by the security engine, tamper-resistant and read-proof. Supports independent secure zones and CRC verification
Generates high-security random numbers based on physical entropy sources. Certified by NIST for randomness. Provides unpredictability to the system, resistant to prediction attacks
Hardware Unique Key (HUK) with physical isolation protection, unreadable and unclonable, used for secure derivation of application keys
Strict control over debug interface access through authentication mechanisms. Supports authorized access and permanent closure, eliminating physical debug attacks. Meets security management requirements at different stages of the product lifecycle, effectively enhancing overall security
Wireless Connectivity
| Wi-Fi Features | ||
|---|---|---|
| Features | Support | Comment |
| Frequency | 2.4GHz/5GHz | |
| Wi-Fi 6 | ||
| Bandwidth | 20MHz | |
| MaximumPHY rate | 72Mbps | HT MCS7 |
| Main Protocols | 802.11 a/b/g/n | |
| Sub-protocols | 802.11 e/i/w/d/k/v/r | |
| Other Key Protocols | WMM/WPA1~3/WPS/802.1X/EAP | |
| UL LDPC | UL Low-Density Parity-Check Code | |
| DL STBC | DL Space-Time Block Coding | |
| Auto Antenna Diversity | ||
| BT Features | ||
| Features | Support | Comment |
| Bluetooth LE | Bluetooth Low Energy | |
| Scatternet | Scatternet concurrent central/peripheral operation | |
| LE 2Mpbs PHY | ||
| LE Long Range | LE Coded PHY long-range mode (125kbps/500kbps) | |
| LE Advertising Extensions | Support multiple advertising sets | |
Application Scenarios
- IoT doorbell
- Portable AI camera
- Home appliances with AIoT camera
- Edge AI audio-visual recognition demands
- Battery-powered IoT devices




