Block protection M29F800DT
46/53
Appendix C Block protection
Bloc k protect ion can be used to preven t an y oper at ion from modif ying the data stored in th e
Flash. Each Block can be protected individually. Once protected, Program and Erase
operations on the block fail to change the data.
There are three techniques that can be used to control Block Protection, these are the
Programmer technique, the In-System technique and Temporary Unprotection. Tempor ary
Unprotection is controlled by the Reset/Block Temporary Unprotection pin, RP; this is
descr ibe d in th e S ign al De scriptions section.
Unlike the Command Interface of the Program/Erase Controller, the techniques for
protecting and unprotecting blocks change between different Flash memory suppliers. For
example, the techniques for AMD parts will not work on STMicroelectronics parts. Care
should be taken when changing drivers for one part to work on another.
9.1 Programmer technique
The Programmer technique uses high (VID) voltag e levels on some of the bus pins. These
cannot be achieved using a standard microprocessor b us, therefore the technique is
recommended only for use in Programming Equipment.
To protect a block follow the flowchart in Figure 16: Programmer Equipment Block Protect
flowchart. To unprote ct the whole chip it is necessary to protect all of th e bl oc ks first, then all
bl ocks can be unprotected at the same time. To unprotect the chip follow Figure 17:
Programmer Equipment Chip Unprotect flowchart. Table 27: Programmer technique bus
operations, BYTE = VIH or VIL, gives a summary of each oper ation.
The timing on these flowcharts is critical. Care should be taken to ensure that, where a
pause is specified, it is followed as closely as possible. Do not abort the procedure before
reaching the end. Chip Unprotect can take several seconds and a user message should be
provided to show that the operation is progressing.
9.2 In-System technique
The In-System technique requires a high voltage level on the Reset/Blocks Temporary
Unprotect pin, RP. This can be achieved without violating the maximum ratings of the
components on the micro processor b us , ther ef or e this technique is suit ab le for use after the
Flash has been fitted to the system.
To protect a block follow the flowchart in Figure 18: In-System Equipment Block Protect
flowchart. To unprote ct the whole chip it is necessary to protect all of th e bl oc ks first, then all
the blocks can be unprotected at the same time. To unprotect the chip follow Figure 19: In-
System Equipment Chip Unprotect flowchart.
The timing on these flowcharts is critical. Care should be taken to ensure that, where a
pause is specified, it is followed as closely as possibl e. Do not allow the microproces so r to
service interrupts that will upset the timing and do not abort the procedure before reaching
the end. Chip Unprote ct can take several seconds and a user message should be provided
to show that the operation is progressing.