EasyManua.ls Logo

Renesas PG-FP6 V1.06

Renesas PG-FP6 V1.06
188 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
PG-FP6 V1.06 4. Usage of the FP6 Terminal
R20UT4469EJ0800 Rev.8.00 Page 61 of 188
Oct.01.21
(C) Restrict FP6 Operations
This area is for restricting the operation of the FP6.
Limit Target Programming Count
The number of times the target device can be programmed is set (0 to 100000).
Once the set number has been reached, programming and verifying facilities are not available.
To enable the facilities again, set a larger number or disable this facility.
Restrict Upload from FP6
This box is for prohibiting the uploading of settings files included in program files from the FP6 main unit.
Restrict Setup
This box is for prohibiting the downloading of settings files and program files to the FP6 main unit.
Restrict Unique Code Function
This box is for prohibiting programming of the unique code (serno command) and setting of the ID code
with the specification of the <ID Code> option (of the sid command).
For details on programming of the unique code, refer to section 7.4.15, serno command. For setting of the
ID code, refer to section 7.5.28, sid command.
Restrict Read Command
This box is for prohibiting execution of the following reading commands of the FP6 main unit.
gdi command, gid command, gos command, and read command
Caution: These are not security functions of the target device. Although this makes execution of the above
commands from the FP6 main unit impossible, use the security functions of the target device to avoid
reading by other tools.
(D) Encryption Settings
Encrypt Program File Data in FP6
Program file data to be downloaded to the FP6 main unit are always encrypted (AES; 128-bit block
length). If this setting is enabled, programming the device and the verification time will be slightly
increased.
Caution: Data are encrypted and saved in the flash memory in the FP6. During programming, data are
decrypted for use in communications with the target device.

Table of Contents

Related product manuals