
Rev. F - 12 March, 2001
33
T87C5101
T83C5101/02
8. T83C5101/02 ROM
8.1. ROM Structure
The T83C5101/02 ROM memory is divided in three different arrays:
the code array
T83C5101: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16 Kbytes.
T83C5102: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 Kbytes.
the encryption array: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64 bytes.
the signature array:. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 bytes.
8.2. ROM Lock System
The program Lock system, when programmed, protects the on-chip program against software piracy.
8.2.1. Encryption Array
Within the ROM array are 64 bytes of encryption array. Every time a byte is addressed during program verify, 6
address lines are used to select a byte of the encryption array. This byte is then exclusive-NOR’ed (XNOR) with
the code byte, creating an encrypted verify byte. The algorithm, with the encryption array in the unprogrammed
state, will return the code in its original, unmodified form.
When using the encryption array, one important factor needs to be considered. If a byte has the value FFh, verifying
the byte will produce the encryption byte value. If a large block (>64 bytes) of code is left unprogrammed, a
verification routine will display the content of the encryption array. For this reason all the unused code bytes
should be programmed with random values.
8.2.2. Program Lock Bits
The lock bits when programmed according to
Table 15. will provide different level of protection for the on-chip
code and data.
U: unprogrammed
P: programmed
8.2.3. Signature bytes
The T8xC5101/02 family contains 4 factory programmed signatures bytes. To read these bytes, perform the process
8.2.4. Verify Algorithm
Table 15. Program Lock bits
Program Lock Bits
Protection description
Security
level
LB1
LB2
LB3
1
U
No program lock features enabled. Code verify will still be encrypted by the encryption
array if programmed.
2
P
U
Not applicable as usually this protection deals with executing MOVC from external memory
(impossible) and sampling EA pin (doesn’t exist any more)
3
U
P
U
Verify disable.
This security level is available because ROM integrity will be veried thanks to another
method.