Philips Semiconductors Product data
P80C3xX2; P80C5xX2;
P87C5xX2
80C51 8-bit microcontroller family
4K/8K/16K/32K ROM/OTP, low voltage (2.7 to 5.5 V),
low power, high speed (30/33 MHz)
2003 Jan 24
49
EPROM CHARACTERISTICS
The OTP devices described in this data sheet can be programmed
by using a modified Improved Quick-Pulse Programming
algorithm. It differs from older methods in the value used for V
PP
(programming supply voltage) and in the width and number of the
ALE/PROG
pulses.
The family contains two signature bytes that can be read and used
by an EPROM programming system to identify the device. The
signature bytes identify the device as being manufactured by
Philips.
Table 9 shows the logic levels for reading the signature byte, and for
programming the program memory, the encryption table, and the
security bits. The circuit configuration and waveforms for quick-pulse
programming are shown in Figures 40 and 41. Figure 42 shows the
circuit configuration for normal program memory verification.
Quick-Pulse Programming
The setup for microcontroller quick-pulse programming is shown in
Figure 40. Note that the device is running with a 4 to 6 MHz
oscillator. The reason the oscillator needs to be running is that the
device is executing internal address and program data transfers.
The address of the EPROM location to be programmed is applied to
ports 1 and 2, as shown in Figure 40. The code byte to be
programmed into that location is applied to port 0. RST, PSEN
and
pins of ports 2 and 3 specified in Table 9 are held at the ‘Program
Code Data’ levels indicated in Table 9. The ALE/PROG
is pulsed
low 5 times as shown in Figure 41.
To program the encryption table, repeat the 5 pulse programming
sequence for addresses 0 through 1FH, using the ‘Pgm Encryption
Table’ levels. Do not forget that after the encryption table is
programmed, verification cycles will produce only encrypted data.
To program the security bits, repeat the 5 pulse programming
sequence using the ‘Pgm Security Bit’ levels. After one security bit is
programmed, further programming of the code memory and
encryption table is disabled. However, the other security bits can still
be programmed.
Note that the EA
/V
PP
pin must not be allowed to go above the
maximum specified V
PP
level for any amount of time. Even a narrow
glitch above that voltage can cause permanent damage to the
device. The V
PP
source should be well regulated and free of glitches
and overshoot.
Program Verification
If security bits 2 and 3 have not been programmed, the on-chip
program memory can be read out for program verification. The
address of the program memory locations to be read is applied to
ports 1 and 2 as shown in Figure 42. The other pins are held at the
‘Verify Code Data’ levels indicated in Table 9. The contents of the
address location will be emitted on port 0. External pull-ups are
required on port 0 for this operation.
If the 64 byte encryption table has been programmed, the data
presented at port 0 will be the exclusive NOR of the program byte
with one of the encryption bytes. The user will have to know the
encryption table contents in order to correctly decode the verification
data. The encryption table itself cannot be read out.
Reading the Signature bytes
The signature bytes are read by the same procedure as a normal
verification of locations 030h and 031h, except that P3.6 and P3.7
need to be pulled to a logic low. The values are:
(030h) = 15h; indicates manufacturer (Philips)
(031h) = 92h/97h/BBh/BDh; indicates P87C51X2/52X2/54X2/
58X2.
Program/Verify Algorithms
Any algorithm in agreement with the conditions listed in Table 9, and
which satisfies the timing specifications, is suitable.
Security Bits
With none of the security bits programmed the code in the program
memory can be verified. If the encryption table is programmed, the
code will be encrypted when verified. When only security bit 1 (see
Table 10) is programmed, MOVC instructions executed from
external program memory are disabled from fetching code bytes
from the internal memory, EA
is latched on Reset and all further
programming of the EPROM is disabled. When security bits 1 and 2
are programmed, in addition to the above, verify mode is disabled.
When all three security bits are programmed, all of the conditions
above apply and all external program memory execution is disabled.
Encryption Array
64 bytes of encryption array are initially unprogrammed (all 1s).
Trademark phrase of Intel Corporation.
Philips Semiconductors Product data
P80C3xX2; P80C5xX2;
P87C5xX2
80C51 8-bit microcontroller family
4K/8K/16K/32K ROM/OTP, low voltage (2.7 to 5.5 V),
low power, high speed (30/33 MHz)
2003 Jan 24
50
Table 9. EPROM Programming Modes
MODE RST PSEN ALE/PROG EA/V
PP
P2.7 P2.6 P3.7 P3.6 P3.3
Read signature 1 0 1 1 0 0 0 0 X
Program code data 1 0 0* V
PP
1 0 1 1 X
Verify code data 1 0 1 1 0 0 1 1 X
Pgm encryption table 1 0 0* V
PP
1 0 1 0 X
Pgm security bit 1 1 0 0* V
PP
1 1 1 1 X
Pgm security bit 2 1 0 0* V
PP
1 1 0 0 X
Pgm security bit 3 1 0 0* V
PP
0 1 0 1 X
Program to 6-clock mode 1 0 0* V
PP
0 0 1 0 0
Verify 6-clock
4
1 0 1 1 e 0 0 1 1
Verify security bits
5
1 0 1 1 e 0 1 0 X
NOTES:
1. ‘0’ = Valid low for that pin, ‘1’ = valid high for that pin.
2. V
PP
= 12.75 V ±0.25 V.
3. V
CC
= 5 V±10% during programming and verification.
4. Bit is output on P0.4 (1 = 12x, 0 = 6x).
5. Security bit one is output on P0.7.
Security bit two is output on P0.6.
Security bit three is output on P0.3.
* ALE/PROG
receives 5 programming pulses for code data (also for user array; 5 pulses for encryption or security bits) while V
PP
is held at
12.75 V. Each programming pulse is low for 100 µs (±10 µs) and high for a minimum of 10 µs.
Table 10. Program Security Bits for EPROM Devices
PROGRAM LOCK BITS
1,
2
SB1 SB2 SB3 PROTECTION DESCRIPTION
1 U U U No Program Security features enabled. (Code verify will still be encrypted by the Encryption Array if
programmed.)
2 P U U MOVC instructions executed from external program memory are disabled from fetching code bytes
from internal memory, EA is sampled and latched on Reset, and further programming of the EPROM
is disabled.
3 P P U Same as 2, also verify is disabled.
4 P P P Same as 3, external execution is disabled. Internal data RAM is not accessible.
NOTES:
1. P – programmed. U – unprogrammed.
2. Any other combination of the security bits is not defined.
Philips Semiconductors Product data
P80C3xX2; P80C5xX2;
P87C5xX2
80C51 8-bit microcontroller family
4K/8K/16K/32K ROM/OTP, low voltage (2.7 to 5.5 V),
low power, high speed (30/33 MHz)
2003 Jan 24
51
A0–A7
1
1
1
4–6MHz
+5V
PGM DATA
+12.75V
5 PULSES TO GROUND
0
1
0
A8–A12
P1
RST
P3.6
P3.7
XTAL2
XTAL1
V
SS
V
CC
P0
EA
/V
PP
ALE/PROG
PSEN
P2.7
P2.6
P2.0–P2.5
OTP
SU01488
Figure 40. Programming Configuration
ALE/PROG:
ALE/PROG:
1
0
1
0
5 PULSES
t
GLGH
= 100µs±10µs
t
GHGL
= 10µs MIN
SU00875
12345
SEE EXPLODED VIEW BELOW
1
Figure 41. PROG Waveform
A0–A7
1
1
1
+5V
PGM DATA
1
1
0
0 ENABLE
0
A8–A12
P1
RST
P3.6
P3.7
XTAL2
XTAL1
V
SS
V
CC
P0
EA
/V
PP
ALE/PROG
PSEN
P2.7
P2.6
P2.0–P2.5
OTP
SU01489
4–6MHz
Figure 42. Program Verification

P87C54X2BBD,157

Mfr. #:
Manufacturer:
NXP Semiconductors
Description:
Microcontrollers - MCU 8-bit Microcontrollers - MCU 80C51 16K/256 OTP
Lifecycle:
New from this manufacturer.
Delivery:
DHL FedEx Ups TNT EMS
Payment:
T/T Paypal Visa MoneyGram Western Union