Intel UPI-L42, UPI-C42 specifications Quick-Pulse Programming Algorithm, Verify, Security BIT

Page 10

UPI-C42/UPI-L42

290414 – 14

Figure 6. Quick-Pulse Programming Algorithm

Quick-Pulse Programming Algorithm

As previously stated, the UPI-C42 will be pro- grammed using the Quick-Pulse Programming Algo- rithm, developed by Intel to substantially reduce the thorughput time in production programming.

The Quick-Pulse Programming Algorithm uses initial pulses of 100 ms followed by a byte verification to determine when the address byte has been suc- cessfully programmed. Up to 25 100 ms pulses per byte are provided before a failure is recognized. A

flow chart of the Quick-Pulse Programming Algo- rithm is shown in Figure 6.

The entire sequence of program pulses and byte verifications is performed at VCC e 6.25V and VDD e 12.75V. When programming has been com- pleted, all bytes should be compared to the original data with VCC e VDD e 5V.

A verify should be performed on the programmed bits to ensure that they have been correctly pro- grammed. The verify is performed with T0 e 5V, VDD e 5V, EA e 12.75V, SSÝ e 5V, PROG e 5V, A0 e 0V, and CSÝ e 5V.

In addition to the Quick-Pulse Programming Algo- rithm, the UPI-C42 OPT is also compatible with In- tel’s Inteligent Programming Algorithm which is used to program the NMOS UPI-42AH OTP devices.

The entire sequence of program pulses and byte verifications is performed at VCC e 6.25V and VDD e 12.75V. When the inteligent Programming cycle has been completed, all bytes should be com- pared to the original data with VCC e 5.0, VDD e 5V.

Verify

A verify should be performed on the programmed bits to determine that they have been correctly pro- grammed. The verify is performed with T0 e 5V, VDD e 5V, EA e 12.75V, SS e 5V, PROG e 5V,

A0 e 0V, and CS e 5V.

SECURITY BIT

The security bit is a single EPROM cell outside the EPROM array. The user can program this bit with the appropriate access code and the normal program- ming procedure, to inhibit any external access to the EPROM contents. Thus the user’s resident program is protected. There is no direct external access to this bit. However, the security byte in the signature row has the same address and can be used to check indirectly whether the security bit has been programmed or not. The security bit has no effect on the signature mode, so the security byte can always be examined.

SECURITY BIT PROGRAMMING/ VERIFICATION

Programming

a. Read the security byte of the signature mode. Make sure it is 00H.

10

Image 10
Contents Configuration DIP PinUPI-C42/UPI-L42 Pin DescriptionBlock Diagram Intel 82C42 UPI-C42 Low power Chmos version of the UPI-42UPI-C42/L42 Product Selection Guide UPI-L42 The low voltage 3.3V version of the UPI-C42Bits of Status UPI-42 Compatible FeaturesIBF OBF UPI-C42 Features Program Memory Bank SwitchInterrupt Routines Suspend Mode Summary SuspendRDÝ, WRÝ NEW UPI-C42 InstructionsNew Instructions XTAL1, XTAL2BUS Programming and Verifying the UPI-C42Xtal ProgSecurity BIT Quick-Pulse Programming AlgorithmVerify Security BIT PROGRAMMING/ VerificationSync Mode Signature ModeVerification Access Code Sync Mode Timing Diagrams ApplicationsUPI-C42-8243 Keyboard Scanner UPI-C42 80-Column Matrix Printer InterfaceAbsolute Maximum Ratings XTAL2, ResetRESET, SS UPI-C42 UPI-L42DC Characteristics DBB Read AC CharacteristicsDBB Write AC Characteristics Port AC Characteristics DMAClock AC CHARACTERISTICS-PROGRAMMING UPI-C42 and UPI-L42 AC Testing INPUT/OUTPUT Waveform AC Testing Load CircuitLC Oscillator Mode Crystal Oscillator Mode Driving from AN External SourceWrite OPERATION-DATA BUS Buffer Register WaveformsRead OPERATION-DATA BUS Buffer Register Clock TimingVerify Mode Combination PROGRAM/VERIFY ModeWaveforms DMA Port Timing During External Access EAPort UPI Instruction Set AccumulatorRevision Summary Jmpp @A