DatasheetQ Logo
Electronic component search and free download site. Transistors,MosFET ,Diode,Integrated circuits

M29W640DB90N6T(2004) 查看數據表(PDF) - STMicroelectronics

零件编号
产品描述 (功能)
生产厂家
M29W640DB90N6T
(Rev.:2004)
ST-Microelectronics
STMicroelectronics 
M29W640DB90N6T Datasheet PDF : 49 Pages
First Prev 41 42 43 44 45 46 47 48 49
M29W640DT, M29W640DB
APPENDIX D. BLOCK PROTECTION
Block protection can be used to prevent any oper-
ation from modifying the data stored in the memo-
ry. The blocks are protected in groups, refer to
APPENDIX A., Table 19. and Table 20. for details
of the Protection Groups. Once protected, Pro-
gram and Erase operations within the protected
group fail to change the data.
There are three techniques that can be used to
control Block Protection, these are the Program-
mer technique, the In-System technique and Tem-
porary Unprotection. Temporary Unprotection is
controlled by the Reset/Block Temporary Unpro-
tection pin, RP; this is described in the Signal De-
scriptions section.
Programmer Technique
The Programmer technique uses high (VID) volt-
age levels on some of the bus pins. These cannot
be achieved using a standard microprocessor bus,
therefore the technique is recommended only for
use in Programming Equipment.
To protect a group of blocks follow the flowchart in
Figure 16., Programmer Equipment Group Protect
Flowchart. To unprotect the whole chip it is neces-
sary to protect all of the groups first, then all
groups can be unprotected at the same time. To
unprotect the chip follow Figure 17., Programmer
Equipment Chip Unprotect Flowchart. Table
28., Programmer Technique Bus Operations,
BYTE = VIH or VIL, gives a summary of each oper-
ation.
The timing on these flowcharts is critical. Care
should be taken to ensure that, where a pause is
specified, it is followed as closely as possible. Do
not abort the procedure before reaching the end.
Chip Unprotect can take several seconds and a
user message should be provided to show that the
operation is progressing.
In-System Technique
The In-System technique requires a high voltage
level on the Reset/Blocks Temporary Unprotect
pin, RP(1). This can be achieved without violating
the maximum ratings of the components on the mi-
croprocessor bus, therefore this technique is suit-
able for use after the memory has been fitted to
the system.
To protect a group of blocks follow the flowchart in
Figure 18., In-System Equipment Group Protect
Flowchart. To unprotect the whole chip it is neces-
sary to protect all of the groups first, then all the
groups can be unprotected at the same time. To
unprotect the chip follow Figure 19., In-System
Equipment Chip Unprotect Flowchart.
The timing on these flowcharts is critical. Care
should be taken to ensure that, where a pause is
specified, it is followed as closely as possible. Do
not allow the microprocessor to service interrupts
that will upset the timing and do not abort the pro-
cedure before reaching the end. Chip Unprotect
can take several seconds and a user message
should be provided to show that the operation is
progressing.
Note: 1. RP can be either at VIH or at VID when using the In-Sys-
tem Technique to protect the Extended Block.
Table 28. Programmer Technique Bus Operations, BYTE = VIH or VIL
Operation
EG
W
Address Inputs
A0-A21
Block (Group)
Protect(1)
VIL VID VIL Pulse
A9 = VID, A12-A21 Block Address
Others = X
Chip Unprotect
VID VID VIL Pulse
A9 = VID, A12 = VIH, A15 = VIH
Others = X
Block (Group)
Protection Verify
VIL VIL
A0 = VIL, A1 = VIH, A6 = VIL, A9 = VID,
VIH
A12-A21 Block Address
Others = X
Block (Group)
Unprotection Verify
VIL VIL
A0 = VIL, A1 = VIH, A6 = VIH, A9 = VID,
VIH
A12-A21 Block Address
Others = X
Note: 1. Block Protection Groups are shown in APPENDIX A., Tables 19 and 20.
Data Inputs/Outputs
DQ15A–1, DQ14-DQ0
X
X
Pass = XX01h
Retry = XX00h
Retry = XX01h
Pass = XX00h
43/49

Share Link: 

datasheetq.com  [ Privacy Policy ]Request Datasheet ] [ Contact Us ]