Motorola Semiconductor Engineering Bulletin EB422 Enhanced
Motorola Semiconductor Engineering Bulletin EB422 Enhanced
Motorola Semiconductor Engineering Bulletin EB422 Enhanced
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Freescale <strong>Semiconductor</strong>, Inc...<br />
MC68HC(7)11E20/32 Bootstrap Modes<br />
<strong>EB422</strong><br />
Freescale <strong>Semiconductor</strong>, Inc.<br />
<strong>Engineering</strong> <strong>Bulletin</strong><br />
MC68HC(7)11E20/32 Bootstrap Modes<br />
These devices are derivatives of the popular MC68HC(7)11E9 devices.<br />
The EPROM versions have two enhanced features:<br />
• A revised security mode to protect EPROM<br />
• An embedded PCbug11 talker<br />
A standard security mode exists on many M68HC11 MCUs. This<br />
protects internal EEPROM and RAM from access by erasing them<br />
before the MCU enters bootstrap mode. The user enables this feature<br />
by clearing the NOSEC bit in the CONFIG register on the MCU.<br />
On the MC68HC711E20 (711E20) and MC68HC711E32 (711E32)<br />
MCUs, the same control bit activates the security mode. However, the<br />
new security mode protects the internal EPROM as well as EEPROM<br />
and RAM. The new protection takes the form of a blank check on the<br />
entire EPROM array. If any EPROM cell is not blank ($FF), then the CPU<br />
enters an infinite loop doing nothing. While this enhancement greatly<br />
improves the security of customer information, it also brings greater<br />
responsibility. In particular, users should take great care before clearing<br />
the NOSEC bit on one-time programmable (OTP) devices. Since these<br />
devices are not erasable, it is impossible to re-enter bootstrap mode<br />
again. In addition, the order in which the CPU checks internal memory<br />
means that the user may be unable to use the MCU again. For erasable<br />
devices with quartz window, the mode is re-usable once the user erases<br />
the internal EPROM. Of course, if the EPROM is blank, then there is no<br />
security breach anyway, and the NOSEC bit being cleared will erase the<br />
internal EEPROM as normal in bootstrap mode.<br />
The enhanced security mode secures memory in this order:<br />
1. EEPROM<br />
2. RAM<br />
3. EPROM<br />
4. CONFIG register<br />
This means that MCU erases its internal EEPROM and RAM before<br />
checking the internal EPROM. For applications with internal variables or<br />
MOTOROLA 7<br />
For More Information On This Product,<br />
Go to: www.freescale.com