CYCLONE-User-Manual.pdf - 第56页

User Manual For Cyclone LC Programmers 56 6.1.4.13 Program Serial Number This command becomes available once a programming algorithm is selected. It will instruct the Cyclone to program the serial number to the target on…

100%1 / 149
User Manual For Cyclone LC Programmers 55
6.1.4.7 Program Words
Prompts for a starting address, which must be in the module. You are then asked to enter, in
hexadecimal, a word to be programmed into the current location. Clicking the OK button will
automatically advance to the next data word location.
6.1.4.8 Program Module
This command will program the selected S-record file into EEPROM/flash. For this command to
work, you must have previously selected an S-record file.
6.1.4.9 Program Feature Data
The Program Feature Data option on the Cyclone Image Creation Utility gives the user more
options to program dynamic data programming on the target device. To use Program Feature Data
select the "PF" command when creating a programming image. A window will show you the
options for feature data to program.
Figure 6-14: Using PF Command (Dynamic Data)
The options can be 1) a string of the current date (YYYY-MM-DD), 2) a string of the current date
and time, 24-hour clock (YYYY-MM-DD HH:MM:SS), 3) run test data.
Cyclone FX only: To 4) program the barcode into the flash of the target device, BARCODESTR
should be selected. The next window contains the hex address of where the dynamic data will be
stored:
Figure 6-15: Program Feature Address Dialog (Hex)
6.1.4.10 Verify Module
This command will verify that the selected S-record file was programmed into the EEPROM/flash.
For this command to work, you must have previously selected an S-record file.
6.1.4.11 Verify Checksum
This command verifies the module content via a CRC calculation. This command is typically much
faster than performing a full Verify Module command.
6.1.4.12 Choose Serial File
This command becomes available once a programming algorithm is selected. It specifies the serial
file that holds the serial numbers to be programmed to the target.
User Manual For Cyclone LC Programmers 56
6.1.4.13 Program Serial Number
This command becomes available once a programming algorithm is selected. It will instruct the
Cyclone to program the serial number to the target once executed. As with other commands, the
serial number will not be programmed until the SAP operations are carried out.
Note:
6.1.5 Communication Mode and Rate Settings
Cyclone LC programmers support multiple communication modes and communication rates. A
user needs to select proper communication mode and rate from the drop down list after
programming operations are specified. The debug connector pin definitions are listed for
reference.
6.1.6 Target Voltage and Power Settings
A user may elect to use Cyclone to supply power to the target. In this case, the Target Voltage
specifies the target MCU I/O voltage level.
The user needs to take into account the power discharge time for the Power Down delay. The
reset driver delays, power stabilization time, and the target clock stabilization time should be
considered for the Power Up delay.
A checkbox is available for a user to instruct the Cyclone to turn off target power after SAP
operations. If unchecked, the target power will remain on.
The user has the option to provide Reset Delay if certain reset monitoring devices are used. The
Cyclone will delay for the specified time after allowing the target out of reset.
6.1.7 Image Description
The Cyclone Image Creation Utility allows the user to summarize the purpose of their current
configuration for future reference by adding text to the Image Description box. The description will
be either programmed into the Cyclone or saved into an encrypted file.
The image description will appear on the Cyclone’s touchscreen LCD for image identification. This
field will not affect the Cyclone’s operations with the target.
Tip: If your image will be encrypted, it can be helpful to indicate this as part of the Image
Description.
Figure 6-16: Image Description Box
6.1.8 ProCryption Security License Features
Cyclone FX programmers, and Cyclone LC programmers with the ProCryption Security
Activation License installed, can take advantage of the powerful security features that can be
configured in this area of the Cyclone Image Creation Utility.
6.1.8.1 SAP Image Encryption
Users can create unique ImageKeys which can be used to encrypt their programming images.
SAP images encrypted in this way can only be loaded onto a Cyclone that has been provisioned
with the identical ImageKey.
Note: Both the Cyclone and the ImageKey are needed to decrypt the image. If the ImageKey is later
removed from the Cyclone, the encrypted SAP image cannot be decrypted for programming.
Likewise, the encrypted image cannot be read on a PC.
This section will detail how to use the Cyclone Image Creation Utility to encrypt a SAP image. For
a more in-depth description of Cyclone SAP image encryption, please see CHAPTER 11 - SAP
IMAGE ENCRYPTION. For detailed information about how to use and manage encrypted
programming images during the production process, the user should refer specifically to Section
11.4 - Managing Encryption For Production Programming.
User Manual For Cyclone LC Programmers 57
6.1.8.1.1 Creating an ImageKey
If an ImageKey has not been created or a new ImageKey is required, the user should select the
“Image Encryption” combo-box in the Cyclone Image Creation Utility and choose the “Create
Image Encryption Key...” option.
Figure 6-17: Create Image Encryption Key - Drop Box
This will pop up a box asking for a descriptive ImageKey Name (this name will be used for display
in many dialogs):
Figure 6-18: Create ImageKey
After entering the name, the user should click Generate Encryption Key. This will bring up a dialog
which allows the user to choose the save location:
Figure 6-19: Save Image Encryption Key To File Dialog
The user should navigate to the desired location and then click "Save". The ImageKey will be
generated and automatically selected in the Cyclone Image Creation Utility, such that generating
an image will use this ImageKey for encrypting.
Figure 6-20: ImageKey Selected After Creation
Note: Every ImageKey created is unique and may not be recreated. This means that once generated,
the user should keep the ImageKey in a secure place. Users may also wish to keep track of which
SAP images have been encrypted with each ImageKey, as the current software does not track this
information.