product description
Secure Programming
Separation of Admin & User Functions
Encrypted Environment File
At the outset of a programming run, the owner creates an environment file that includes hex data, configuration information, and an optional counter that limits the number of successfully programmed devices. Secure Programming encrypts the environment file using strong encryption algorithms. This file can only be decoded by a programmer that has been initialized with the correct password and ID number.
Anti-Spoofing Counter
An optional counter, stored in non-volatile memory of the programmer, ensures that the number of programmed devices does not exceed a pre-defined value. This limits the number of devices that can be programmed from a particular environment file, thus preventing gray/black marketing of “spoofed” products.
Key Features
- "Invisible" secure buffer up to 64 bytes in ICP2 protected memory
- Configurable destination of secure buffer (Flash memory or EEPROM)
- Configurable destination address and size of the secure buffer
- Remote update
Download Information