Exte n d ed Me mory Blo ck M29W 640FT, M29W640F B
62/71
Appendix C Extended Memory Block
The M29W640F has an extra block, the Extended Block, that can be accessed using a
dedicated command.
This Extended Block is 128 Words in x16 mode and 256 Bytes in x8 mode. It is used as a
security block to provide a permanent security identification number) or to store additional
information.
The Extended Block is either Factory Locked or Customer Lockable, its status is indicated
by bit DQ7. This bit is permanently set to either ‘1’ or ‘0’ at the factory and cannot be
changed. When set to ‘1’, it indicates that the device is factory locked and the Extended
Block is protected. When set to ‘0’, it indicates that the device is customer lockable and the
Extended Block is unprotected. Bit DQ7 being permanently locked to either ‘1’ or ‘0’ is
another security feature which ensures that a customer lockable device cannot be used
instead of a factory locked one.
Bit DQ7 is the most significant bit in the Extended Block Verify Code and a specific
procedure must be followed to read it. See “Extended Memory Block Verify Code” in Table 4:
Bu s opera tions, BYTE = VIL and Table 5: Bus operations, BYTE = VIH, for details of how to
read bit DQ7.
The Extended Block can only be accessed when the device is in Extended Block mode. For
details of how the Extended Block mode is entered and exited, refer to the Section 4.3.1:
Enter Extended Block command and Section 4.3.2: Exit Extended Block command, and to
Table 6 and Table 7: Commands, 8-b it mode, BYTE = VIL.
C.1 Factory Locked Extended Block
In devices where the Extended Block is factory locked, the Security Identification Number is
written to the Extended Block address space (see Table 29: Exten ded Bl ock address and
data) in the factory. The DQ7 bit is set to ‘1’ and the Extended Block cannot be unprotected.
C.2 Customer Lockable Extended Block
A device where the Extended Block is customer lockable is delivered with the DQ7 bit set to
‘0’ and the Extended Block unprotected. It is up to the customer to program and protect the
Extended Block but care must be taken because the protection of the Extended Block is not
reversible.
There are two ways of protecting the Extended Block:
■Issue the Enter Extended Block command to place the device in Extended Block mode,
then use the In-System Technique with RP either at VIH or at VID (refer to Append i x D,
Sectio n D.2: In-Syste m tec hni que and to the corresponding flowcharts, Figure 18 and
Figure 19, for a detailed explanation of the technique).
■Issue the Enter Extended Block command to place the device in Extended Block mode,
then use the Programmer Technique (refer to Appendix D, Section D.1: Programmer
technique and to the corresponding flowcharts, Figure 16 and Figure 17, for a detailed
explanation of the technique).
Once the Extended Block is programmed and protected, the Exit Extended Block command
must be issued to exit the Extended Block mode and return the device to Read mode.