
MOTOROLA
4-16
ON-CHIP MEMORY
M68HC11
REFERENCE MANUAL
does not contain all of the programs needed to make the product function. The weak-
ness of this approach is that a software pirate can still duplicate the product after solv-
ing that one routine. The pirate also gains a development cost advantage over the
original manufacturer, because only part of the application program has to be devel-
oped.
Many application programs are modularly organized as a major loop consisting of calls
to submodules. The application relies on both the routines that are called and the order
in which they are called. A degree of security can be achieved by putting the major
loop (which calls all the subprograms) in the EEPROM. In this case, a software pirate
can decode the submodules, but the order of execution is not known. To make the pro-
gram more difficult to decipher, extra incorrect programs could be included in ROM.
The software pirate could not distinguish real routines from fake routines. There is a
useful side-effect of this approach. Since the major loop is resident in the EEPROM, it
can be changed to call a replacement or patch routine if one of the subprograms is
defective. Rather than throwing away the entire MCU, the EEPROM can be repro-
grammed to correct or replace the defective subprogram.
Another approach to software secrecy involves accessing variables indirectly through
a pointer stored in the EEPROM. The program in ROM could execute a sequence
such as loading X with the pointer value from EEPROM (LDX addr; LDAA 0,X). Since
the software pirate does not know what X points to, there is no way of knowing what
is being loaded into accumulator A. By mixing direct accesses and indirect accesses
to the same variables, the software pirate is unable to recognize that two accesses are
to the same variable.
4.4 EEPROM Application Information
Since EEPROM is a relatively new technology, very little published application infor-
mation exists. This subsection presents practices that could cause application prob-
lems and discusses several practical uses for EEPROM on an MCU. Next, there is a
discussion of the use of EEPROM in programs that adjust themselves to accommo-
date variable conditions. Many applications can benefit from this type of programming,
which is presently becoming practical because of the inclusion of EEPROM on an
MCU. The subsection concludes with a detailed look at some proposed methods to
extend the useful write-erase lifetime of the EEPROM.
4.4.1 Conditions and Practices to Avoid
When programming a new value over an old value in EEPROM without first erasing
the EEPROM location, it is very important to avoid certain data patterns. The most
common method for programming a new non-FF value to an EEPROM location con-
taining a non-FF value is to erase the location before programming the new value. This
procedure works for any combination of old and new data values. In less common sit-
uations in which an EEPROM location endures many write-erase cycles, it may be de-
sirable to program a new value over an old value without erasing the location first. This
procedure is only possible when the new value has no ones where the EEPROM lo-
cation already has a zero. A method called ‘write-more-zeros’ can be used to program
additional bits in an EEPROM location without erasing the location first, which elimi-