Slide 1 Slide 2 Slide 3 Slide 4 Slide 5 Slide 6 Slide 7 Slide 8 Slide 9 Slide 10 Slide 11 Slide 12 Slide 13 Slide 14 Slide 15 Slide 16 Slide 17 Slide 18 Slide 19 Slide 20 Slide 21 Slide 22 Slide 23 Slide 24 Product List
MSP460FR5969 Low Power FRAM MCU Slide 13

As mentioned in the previous slide, users may select any one method of securing JTAG access depending on their application. In cases where security is a primary concern, it is preferable to lock the JTAG w/o password. Once this is accomplished the device can be accessed only via the BSL. This involves knowing the BSL password which is longer in length making it inherently more secure. In this case however, the user must make the two VSL lines available if the ability to update firmware is required. The second option is securing JTAG with a password, which involves generating a unique password that is stored in the IDE such as CCS or IAR. When the device is accessed from an authorized source that is able to provide the IDE password, JTAG access is made available once again.

PTM Published on: 2014-06-24