User Manual For Cyclone LC Programmers
120
refuse to load the image unless the appropriate ImageKey resides on the Cyclone. If the ImageKey
is present, the Cyclone will load the eSAP File and automatically decrypt it using both the matching
ImageKey and the Cyclone's internal decryption mechanism.
A user may create and use multiple ImageKeys and corresponding eSAP images on a single
Cyclone.
The decryption process is transparent to the user when the Cyclone goes to program the target.
The decrypted programming image appears as usual on the Cyclone menu screen. The user can
now program devices using the unencrypted SAP Image.
Figure 11-10: Decryption Occurs Automatically For Programming
11.4.4
Encryption Status of SAP Images
In the Images tab of the Cyclone Control Suite GUI the user can view the encryption status of SAP
images that reside on the connected Cyclone.
shows the Cyclone Control GUI with
the Images tab selected.
Figure 11-11: SAP Image Listing for Connected Cyclone
The rightmost column, labeled Encryption, displays whether each SAP image is unencrypted
(“None”), encrypted with the required ImageKey present (“Encrypted”), or encrypted but missing
the ImageKey required to decrypt (“Encrypted No Key”).
Содержание Cyclone LC Series
Страница 1: ...Cyclone LC Programmers User Manual...
Страница 8: ...17 6 Debug Ports CYCLONE LC UNIV 149 17 7 International Shipping 149 17 8 Compliances Standards 149...
Страница 41: ...User Manual For Cyclone LC Programmers 41 Figure 5 2 Main Menu Structure...
Страница 134: ...User Manual For Cyclone LC Programmers 134 4 Click the Add New License button Figure 13 2 Add New License Button...