CN109947439A - The firmware updating method of closed storage device - Google Patents

The firmware updating method of closed storage device Download PDF

Info

Publication number
CN109947439A
CN109947439A CN201711353533.8A CN201711353533A CN109947439A CN 109947439 A CN109947439 A CN 109947439A CN 201711353533 A CN201711353533 A CN 201711353533A CN 109947439 A CN109947439 A CN 109947439A
Authority
CN
China
Prior art keywords
application program
memory
program
storage device
closed storage
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201711353533.8A
Other languages
Chinese (zh)
Other versions
CN109947439B (en
Inventor
庄佑邦
欧仕迈
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Treasury Technology Co Ltd
Coolbitx Ltd
Original Assignee
Treasury Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Treasury Technology Co Ltd filed Critical Treasury Technology Co Ltd
Priority to CN201711353533.8A priority Critical patent/CN109947439B/en
Publication of CN109947439A publication Critical patent/CN109947439A/en
Application granted granted Critical
Publication of CN109947439B publication Critical patent/CN109947439B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Stored Programmes (AREA)

Abstract

The invention discloses a kind of firmware updating methods of closed storage device, it comprises the steps of: and an electronic device is connected to the interior closed storage device for having two memories and start-up loading device, and wherein a memory is equipped with first application program for being preset as startup program;Electronic device loads one second application program, will be the one locking pattern of memory transformation for having the first application program when which detects the second application program;Electronic device is by the second application transfer to another memory, make the second application program that another memory be written and be updated, then, second application setting is that subsequent closure formula storage device operates the startup program executed by start-up loading device, whereby, there are two types of the application programs of different editions to replace update in turn for meeting inside closed storage device, and when new application program update failure, start-up loading device is still executed using original application program as startup program to operate.

Description

The firmware updating method of closed storage device
Technical field
The present invention is about a kind of firmware updating method, and after especially one kind detects different application, energy will wherein One memory switches to the locking mode that can not be updated, and another memory is written in new application program again and is updated Firmware updating method.
Background technique
With the development of science and technology many transaction and the means of payment gradually by integrated circuit (Integrated Circuit, IC) replaced card, for example, credit card, fiscard, phonecard, stored value card etc. are all IC card common at present, and general institute The IC card used is broadly divided into contact interface, non-contact interface and combined type according to the mode for depositing, reading data and connects Three kinds of mouth.
The IC card of so-called contact interface is the access of data to be carried out using metallic contact, such as general chip is financial Card etc., the IC card of so-called non-contact interface is that the accesses of data is carried out in the way of incuding, such as suitable for public traffic Stored value card or electronic money packet of means of transport etc., later, due to occurring a variety of different types of cards on the market, because This, also develops the IC card of so-called Combined type interface, and all credits card, fiscard, electronic money packet, stored value card etc. is various not Function with demand is integrated in single IC card, and the service of diversification can be enjoyed by allowing user that must only hold single card.
IC card used in general at present has a microprocessor and a memory, and have one can be by micro- for the memory The application program that processor executes when using IC card generating program mistake (Bug) the case where or has the effect for improving program When energy demand, need to carry out the application program movement of tough body renewal, and the application program usually carries out tough body renewal When, usually by the firmware image file (Image) of new edition by entity transmission medium (such as: Portable disk, CD, memory Card ... etc.) or by the Internet transport protocol (such as: Hypertext Transport Protocol (Hype Text Transport Protocol, HTTP), Simple File Transfer Protocol (Trivial File Transfer Protocol, TFTP) ... etc.) transmission To the memory, so that last time memory is updated operation to the application program according to the firmware image shelves of new edition, institute is allowed It states application program and is changed into application program after a update.
However, when the firmware image shelves of the memory refreshing new edition fail there is a situation where updating, after the update Application program can then lack least a portion of program code, so that the microprocessor can not execute application program after the update, into And so that the IC card is can not be successfully running, cause in order to allow the IC card can smooth operation, then can allow the memory again according to It is updated according to the firmware image shelves of new edition, still, then the IC card must be subjected to reduction setting when situation is serious, allowed described Application program is restored to initial pattern, then re-starts more new job, is caused whereby using upper inconvenience.
Summary of the invention
It is a primary object of the present invention to can have the application program wheel there are two types of different editions inside closed storage device Stream replacement updates, and when so that program error occur when new edition answers program to run and can not be traded, start-up loading device energy will be old Version application setting is startup program to trade, and then is avoided that and occurs what closed storage device can not trade Situation.
Secondary objective of the present invention is the start-up loading device meeting when the failure of one of application program update can not operate Another application program is executed, closed storage device is allowed still to can be carried out transaction movement, and then is avoided that generation because updating Fail and closed storage device can not be carried out the case where trading or application program is returned to initial pattern, causing to reach To the purpose for being easy to use closed storage device.
To realize that foregoing purpose, the present invention include following about a kind of firmware updating method of closed storage device Step: an electronic device network on-line is provided in a closed storage device, there is the closed storage device starting to add Carry device, one first memory and one second memory, the first application that the start-up loading device deposits in first memory for one Program setting is startup program, and can execute first application program, is different from however, the electronic device loads a version Second application program of first application program, so that the electronic device detects the version of first application program not It is same as second application program, and then make the electronic device that first memory is switched to one not carrying out program update Locking mode.
Second application program and an Electronic Signature are transferred to the start-up loading device by the electronic device, described The Electronic Signature is transferred to one again and is located at by second application passes to second memory by start-up loading device Safety chip inside the closed storage device, wherein described in all having when both first memory and the second memory When the first application program, by both first memory and second memory, one of them is switched to the locking to the electronic device State, so that the start-up loading device is by second application passes to both first memory and second memory The other of.
It is updated finally, second application program is written into second memory, makes the start-up loading device by institute Stating the second application setting is startup program, and executes second application program, wherein when second application program is write Enter second memory after the completion of updating, second memory forms a characteristic value letter for being transferred to the start-up loading device Breath, and the start-up loading device stores the characteristic value information, and the characteristic value information is transferred to the safety chip, makes The start-up loading device will by the electronic device be transferred to it is described closing storage device Electronic Signature pass through the feature Value information calculates, and the safety chip can be tested the Electronic Signature after calculation by the characteristic value information Card, in addition, the start-up loading device is applied described first when the failure of the second application program described in second memory refreshing Program setting is startup program, and executes first application program, in this embodiment, when the safety chip have it is described When characteristic value information and the Electronic Signature, second application setting is startup program by the start-up loading device.
The method have the characteristics that being updated before operation, electronic device detects first and is different from the version of program Second application program, so that the memory equipped with the first application program is switched to the locking mould that can not be updated by electronic device Formula, and then the second application program can be written into another memory and is updated by start-up loading device, allows start-up loading device specified the Two application settings are startup program, and whereby, closed storage device can then have that there are two types of the application programs of different editions (the One, two application program), and be updated in turn for two application programs, so that second there is program error when program being answered to run When can not accidentally be traded, start-up loading device can trade the first application setting is startup program, Jin Erneng Avoid that there is a situation where closed storage devices to trade.
In addition, start-up loading device can specify the first application program when updating the failure of the second application program and be unable to run It is set as startup program to trade, and then is avoided that generation and because failure is updated closed storage device can not be carried out Transaction or the case where application program is returned to initial pattern causes to allow closed storage device to reach to facilitate and handed over Easy purpose.
Detailed description of the invention
Fig. 1 is the step flow diagram of the firmware updating method of inventive closure formula storage device;
Fig. 2 is the module diagram of tough body renewal device;
Fig. 3 is by forecast updates step to the flow diagram for executing step;
Fig. 4 is the schematic diagram that preparation updates step in Fig. 1;
Fig. 5 is the schematic diagram of preparation checking step in Fig. 1;
Fig. 6 is the schematic diagram that transmitting step is compared in Fig. 1.
Description of symbols: 1- firmware updating method;2- tough body renewal device;20- electronic device;201- application software; The closed storage device of 21-;211- microprocessor;The first memory of 211a-;The second memory of 211b-;211c- start-up loading device; 212- safety chip;212a- processing unit;The internet 22-;S1- preparation updates step;S2- lock step;S3- transmitting step; S4- updates step;S5- executes step.
Specific embodiment
The present invention is further described with attached drawing combined with specific embodiments below, the advantages and features of the present invention will be with Description and it is apparent.
It please refers to shown in Fig. 1 and Fig. 2, the firmware updating method 1 of closed storage device provided by the invention is tough with unifying Body updating device 2 uses, and tough body renewal device 2 has an electronic device 20 and a closed storage device 21, electronic device 20 one application software 201 of installation, wherein electronic device 20 can be set as mobile phone, computer or plate.
Closed storage device 21 can be selectively online by network, bluetooth or infrared ray or breaks in electronic device 20, Enable closed storage device 21 online by electronic device 20 or broken string is in application software 201, and closed storage fills Setting 21 has a microprocessor 211 and a safety chip 212, and the microprocessor 211 is equipped with one first memory 211a, one the A two memory 211b and start-up loading device 211c, microprocessor 211 are electrically connected at safety chip 212, and the first memory 211a stores one first application program, in addition, safety chip 212 has a processing unit 212a, wherein start-up loading device 211c It is startup program by first application setting, and first application program can be executed to trade, in addition, when answers When being installed on electronic device 20 with software 201, application software 201 can show an electronics on the touch screen of electronic device 20 Stamped signature, also, when initial online when closed storage device 21,201 meeting of application software of electronic device 20 of application software 201 The Electronic Signature is stored in safety chip 212, wherein the Electronic Signature for being stored in safety chip 212 is used for as judgement Whether verification can be carried out the information of transaction or software upgrading.
It please refers to shown in Fig. 1, Fig. 3 and Fig. 4, when closed storage device 21 wants more new job, 20 net of electronic device Network is connected to an internet 22, and concurrent connections are in closed storage device 21, and electronic device 20 is from the downloading of internet 22 one Version is different from the second application program of first application program, when electronic device 20 has second application program, It completes a preparation and updates step S1, in this embodiment, the version of second application program is newly in first application Program.
It please refers to shown in Fig. 1, Fig. 3 and Fig. 5, completes to carry out a lock step S2 after preparation updates step S1, work as electronics When device 20 has second application program, the application software 201 of electronic device 20 can according to first application program with Second application program and obtain a first version serial number and a serial number is not identical to the second of the first version serial number Version serial number, so that the detecting of application software 201 learns that the version of first application program is relatively older than second application program, And then application software 201 is made to form a locking information for being transferred to the first memory 211a, allow the first memory 211a to switch to a nothing Method carries out the lock state of program update, and then, user carries out on the touch screen of electronic device 20 to form an electronics Stamped signature, at this point, the Electronic Signature is to authorize the information being updated.
It please refers to shown in Fig. 1, Fig. 3 and Fig. 6, followed by a transmitting step S3, electronic device 20 is answered described second With program and to authorize the Electronic Signature being updated to be transferred to the start-up loading device 211c of closed storage device 21, Also, since the lock state is presented in the first memory 211a, enable start-up loading device 211c by second application program It is transferred to the second memory 211b, and the Electronic Signature is transferred to safety chip 212 again.
In this embodiment, since first application program is only stored in the first memory 211a, and it is not stored in Second memory 211b, so that electronic device 20 can incite somebody to action after electronic device 20 loads second application program by internet 22 First memory 211a is switched to lock state, and then by the second application passes to the second memory 211b, still, if the One, in the case that both two memory 211a, 211b all store first application program, when electronic device 20 is by internet 22 When loading second application program, 201 property of can choose of application software of electronic device 20 by the first memory 211a with One of them switches to the lock state to both second memory 211b, and second application program is sent to described the again The another one of both one memory 211a and the second memory 211b wherein.
As shown, after the second memory 211b receives second application program, when safety chip 212 receives use When authorizing the Electronic Signature being updated, the meeting of safety chip 212 will be to authorize the Electronic Signature being updated It is compared with the interior Electronic Signature for being stored in safety chip 212, and then works as and be updated the Electronic Signature to authorize When mutually meeting with interior both the Electronic Signatures for being stored in safety chip 212, second application program can be written into second Memory 211b whereby, completes one and updates step S4, conversely, when using so that the second memory 211b has second application program Both the Electronic Signature and the interior Electronic Signature for being stored in safety chip 212 is updated with authorization not meet mutually When, second application program cannot be written into the second memory 211b, so that the second memory 211b can not have described second Application program, and then be unable to complete and update step S4.
When completing to update step S4, the second memory 211b will form a characteristic value letter for being transferred to start-up loading device 211c Breath, and start-up loading device can store the characteristic value information, and the characteristic value information is transferred to safety chip 212, allow peace Full chip 212 stores the characteristic value information, at this point, safety chip 212 has the characteristic value information and the electricity Second application setting is startup program by sub- stamped signature, start-up loading device 211c, wherein the characteristic value information is one The operation method that kind can calculate to information and be verified, in this embodiment, the characteristic value information is set as a Hash Function.
It completes to carry out an execution step S5 after updating step S4, when wanting to be traded, user passes through electronic device 20 one Transaction Informations of input (such as: both parties' trading account, buyer purchase the amount of money, the seller sells the amount of money), and filled in electronics It sets and is inputted on 20 touch screen to form the Electronic Signature, at this point, the Electronic Signature is carried out to authorize The information of transaction, and being verified with the Electronic Signature for being stored in safety chip 212, then, electronic device 20 is by institute State Transaction Information with to authorize the Electronic Signature traded to be transferred to closed storage device 21, and microprocessor 211 can execute second application program, so that the start-up loading device 211c of microprocessor 211 will trade to authorize The Electronic Signature is calculated by the characteristic value information, and safety chip 212 is sent to after calculation, at this point, safety The processing unit 212a of chip 212 can verify the Electronic Signature after calculation by the characteristic value information, wherein It is identical to when the verifying of safety chip 212 is stored in the internal Electronic Signature to authorize the Electronic Signature traded When, so that a digital asset will do it transfer to complete to trade.
However, start-up loading device 211c can be by described first when the second memory 211b can not be written in the second application program Application setting is startup program, so that microprocessor 211 can execute first application program to carry out transaction movement.
Above explanation and examples are merely exemplary, it is not intended to limit the scope of the present invention in any way.This field Technical staff should be understood that without departing from the spirit and scope of the invention can details to technical solution of the present invention and Form is modified or is replaced, but these modifications and replacement are fallen within the protection scope of the present invention.

Claims (4)

1. a kind of firmware updating method of closed storage device, which comprises the following steps:
An electronic device network on-line is provided in a closed storage device, the closed storage device has a start-up loading Device, one first memory and one second memory, the start-up loading device deposit in the first of first memory for one and apply journey Sequence is set as startup program, and can execute first application program, and there is the electronic device version to be different from described the Second application program of one application program;
The version that the electronic device detects first application program is different from second application program, and then will be described First memory, which switches to one, can not carry out the locking mode of program update;
Second application program and an Electronic Signature are transferred to the start-up loading device, the starting by the electronic device The Electronic Signature is transferred to one positioned at described by second application passes to second memory, and again by loader Safety chip inside closed storage device;
Second application program is written into second memory and is updated, and applies the start-up loading device by described second Program setting is startup program, and executes second application program.
2. the firmware updating method of closed storage device according to claim 1, it is characterised in that: in described first Deposit when all having first application program with both second memories, the electronic device by first memory with it is described One of them is switched to the lock state to both second memories, so that the start-up loading device passes second application program It is handed to the other of both described first memory and second memory.
3. the firmware updating method of closed storage device according to claim 1, it is characterised in that: answer when described second Second memory is written into program after the completion of updating, and second memory forms one and is transferred to the start-up loading device Characteristic value information, and the start-up loading device stores the characteristic value information, and the characteristic value information is transferred to the peace Full chip, so that the start-up loading device passes through the Electronic Signature for being transferred to the closing storage device by the electronic device The characteristic value information calculates, and the safety chip can be believed the Electronic Signature after calculation by the characteristic value Breath is verified.
4. the firmware updating method of closed storage device according to claim 3, it is characterised in that: in described second When depositing update second application program failure, first application setting is startup program by the start-up loading device, And execute first application program.
CN201711353533.8A 2017-12-15 2017-12-15 Firmware updating method for closed storage device Active CN109947439B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711353533.8A CN109947439B (en) 2017-12-15 2017-12-15 Firmware updating method for closed storage device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711353533.8A CN109947439B (en) 2017-12-15 2017-12-15 Firmware updating method for closed storage device

Publications (2)

Publication Number Publication Date
CN109947439A true CN109947439A (en) 2019-06-28
CN109947439B CN109947439B (en) 2022-04-08

Family

ID=67004872

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711353533.8A Active CN109947439B (en) 2017-12-15 2017-12-15 Firmware updating method for closed storage device

Country Status (1)

Country Link
CN (1) CN109947439B (en)

Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1297547A (en) * 1998-02-20 2001-05-30 英特尔公司 Automatic update of camera firmware
US20060129795A1 (en) * 2004-12-10 2006-06-15 Intel Corporation Interleaved boot block to support multiple processor architectures and method of use
US20080256363A1 (en) * 2007-04-13 2008-10-16 Boris Balacheff Trusted component update system and method
CN101452689A (en) * 2007-12-04 2009-06-10 佳世达科技股份有限公司 Firmware updating system for updating display firmware and method thereof
TW201025008A (en) * 2008-12-31 2010-07-01 Askey Computer Corp System of updating firmware and method thereof, and method of creating firmware
CN101770372A (en) * 2008-12-31 2010-07-07 亚旭电脑股份有限公司 Firmware update system, method and building method of firmware of firmware update system
CN101807154A (en) * 2009-02-16 2010-08-18 技嘉科技股份有限公司 Electronic device and starting method thereof
CN103136010A (en) * 2011-11-25 2013-06-05 环旭电子股份有限公司 Firmware update method and firmware update device capable of being used by firmware update method
US20150074420A1 (en) * 2013-09-11 2015-03-12 Kyocera Document Solutions Inc. Embedded system, information processing unit, and image forming apparatus
US20160015004A1 (en) * 2014-07-21 2016-01-21 Nicholas Jay Bonge, JR. Wireless animal training, monitoring and remote control system
TW201617861A (en) * 2014-11-04 2016-05-16 創見資訊股份有限公司 Firmware updating method and electronic apparatus using the same
CN105988844A (en) * 2015-03-02 2016-10-05 营邦企业股份有限公司 Control module of endpoint server and firmware update method thereof
US20170277897A1 (en) * 2012-12-06 2017-09-28 S-Printing Solution Co., Ltd. System on chip to perform a secure boot, an image forming apparatus using the same, and method thereof

Patent Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1297547A (en) * 1998-02-20 2001-05-30 英特尔公司 Automatic update of camera firmware
US20060129795A1 (en) * 2004-12-10 2006-06-15 Intel Corporation Interleaved boot block to support multiple processor architectures and method of use
US20080256363A1 (en) * 2007-04-13 2008-10-16 Boris Balacheff Trusted component update system and method
CN101452689A (en) * 2007-12-04 2009-06-10 佳世达科技股份有限公司 Firmware updating system for updating display firmware and method thereof
TW201025008A (en) * 2008-12-31 2010-07-01 Askey Computer Corp System of updating firmware and method thereof, and method of creating firmware
CN101770372A (en) * 2008-12-31 2010-07-07 亚旭电脑股份有限公司 Firmware update system, method and building method of firmware of firmware update system
CN101807154A (en) * 2009-02-16 2010-08-18 技嘉科技股份有限公司 Electronic device and starting method thereof
CN103136010A (en) * 2011-11-25 2013-06-05 环旭电子股份有限公司 Firmware update method and firmware update device capable of being used by firmware update method
US20170277897A1 (en) * 2012-12-06 2017-09-28 S-Printing Solution Co., Ltd. System on chip to perform a secure boot, an image forming apparatus using the same, and method thereof
US20150074420A1 (en) * 2013-09-11 2015-03-12 Kyocera Document Solutions Inc. Embedded system, information processing unit, and image forming apparatus
US20160015004A1 (en) * 2014-07-21 2016-01-21 Nicholas Jay Bonge, JR. Wireless animal training, monitoring and remote control system
TW201617861A (en) * 2014-11-04 2016-05-16 創見資訊股份有限公司 Firmware updating method and electronic apparatus using the same
CN105988844A (en) * 2015-03-02 2016-10-05 营邦企业股份有限公司 Control module of endpoint server and firmware update method thereof

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
SAMET TONYALI: "An Attribute-based Reliable Multicast-over-Broadcast Protocol for Firmware Updates in Smart Meter Networks", 《2017 IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS》 *
李荣冰等: "用串行方式实现微小型导航计算机应用软件的快速更新研究", 《小型微型计算机系统》 *

Also Published As

Publication number Publication date
CN109947439B (en) 2022-04-08

Similar Documents

Publication Publication Date Title
US11106476B2 (en) Helper software developer kit for native device hybrid applications
CN109716342B (en) System and method for biometric identity authentication
CA2878813C (en) System and method for verifying a financial instrument
US10147077B2 (en) Financial transaction method and system having an update mechanism
CN105164694B (en) Trusted terminal platform
US20130001304A1 (en) Payment system and method of ic card and a multi-application ic card as well as a payment terminal
US20150363785A1 (en) Systems and methods for consumer authentication using behavioral biometrics
AU2001271968A1 (en) System and method for verifying a financial instrument
US10635820B1 (en) Update policy-based anti-rollback techniques
US8510228B2 (en) Transfer method of electronic cash
CN108140081A (en) Biometric verification method and system
CN113129016B (en) Medical insurance payment method, device and equipment
CN115398457A (en) System and method for evaluating digital interactions using a digital third party account service
CN109478286A (en) No bank account is safely loaded with
US20140136408A1 (en) Know your customer (kyc)
US20240177167A1 (en) Extra security element on cards to protect against fraud
US20150081545A1 (en) Secure payment by mobile phone
US20100312675A1 (en) Systems and Methods for Reporting Chargebacks
CN109947439A (en) The firmware updating method of closed storage device
US20220414652A1 (en) Prioritizing Holds When Selecting Transactions for Transaction-Based Knowledge-Based Authentication
US20150324796A1 (en) Device-based payment authorization
US20220292497A1 (en) Transaction Based Authentication with Refunded Transactions Removed
US20220292505A1 (en) Eliminating Transactions from Connected Accounts from False Answer Choices in Transaction Questions
RU2696885C2 (en) Method of transmitting extended data set from contactless payment device to terminal
JP6473527B1 (en) Software update method for closed storage device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant