SDAA136 December   2025 AM62L , AM62P

 

  1.   1
  2.   Abstract
  3.   Trademarks
  4. 1Introduction
  5. 2HS Device Flashing With Boot Mode Switch
  6. 3HS Device Flashing Without Boot Mode Switch
    1. 3.1 Design 1: Booting from Backup Boot Media
    2. 3.2 Design 2: Booting from Primary Boot Media
  7. 4 Summary

Abstract

In automotive and industry applications, to protect system security and functional privacy, and to prevent application images from being maliciously tampered with, copied, or deleted, mass-produced products generally utilize high-security chips, unlike those used in general purpose development. The Sitara processors offer general purpose (GP) and high security (HS) chip types to address this issue. The Sitara HS chip incorporates an OTP identifier eFuse and multiple hardware security accelerators, adding encryption and decryption capabilities for system images and signature verification during the boot process, protecting the system from external malicious tampering.

The HS device also has two subtypes that represent the state of the HS device: high security-field securable (HS-FS) and high security-security enforced (HS-SE). All security features are enabled in the HS-SE device. During the development process, customers must use the TI-provided Keywriter tool to program a key into the chip, converting the chip from HS-FS to HS-SE.

This programming process typically involves different approaches. This application note summarizes common programming methods and proposes several new approaches that are more efficient and reduce manual intervention on the production line. These new methods eliminate the need to switch boot modes. Key programming can be performed within a single boot mode.