CN111488168B - Weapon system control software safety upgrading method based on boot secondary loading - Google Patents

Weapon system control software safety upgrading method based on boot secondary loading Download PDF

Info

Publication number
CN111488168B
CN111488168B CN201911357463.2A CN201911357463A CN111488168B CN 111488168 B CN111488168 B CN 111488168B CN 201911357463 A CN201911357463 A CN 201911357463A CN 111488168 B CN111488168 B CN 111488168B
Authority
CN
China
Prior art keywords
boot
control
program
monitoring program
software
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201911357463.2A
Other languages
Chinese (zh)
Other versions
CN111488168A (en
Inventor
罗壹文
刘龙
杨红岸
郭军
李风雷
李斌
晏资湘
方姗
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hubei Institute Of Aerospacecraft
Original Assignee
Hubei Institute Of Aerospacecraft
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hubei Institute Of Aerospacecraft filed Critical Hubei Institute Of Aerospacecraft
Priority to CN201911357463.2A priority Critical patent/CN111488168B/en
Publication of CN111488168A publication Critical patent/CN111488168A/en
Application granted granted Critical
Publication of CN111488168B publication Critical patent/CN111488168B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/60Software deployment
    • G06F8/65Updates
    • G06F8/654Updates using techniques specially adapted for alterable solid state memories, e.g. for EEPROM or flash memories
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/08Error detection or correction by redundancy in data representation, e.g. by using checking codes
    • G06F11/10Adding special bits or symbols to the coded information, e.g. parity check, casting out 9's or 11's
    • G06F11/1004Adding special bits or symbols to the coded information, e.g. parity check, casting out 9's or 11's to protect a block of data words, e.g. CRC or checksum
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/4401Bootstrapping
    • G06F9/4403Processor initialisation
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02PCLIMATE CHANGE MITIGATION TECHNOLOGIES IN THE PRODUCTION OR PROCESSING OF GOODS
    • Y02P90/00Enabling technologies with a potential contribution to greenhouse gas [GHG] emissions mitigation
    • Y02P90/02Total factory control, e.g. smart factories, flexible manufacturing systems [FMS] or integrated manufacturing systems [IMS]

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Quality & Reliability (AREA)
  • Stored Programmes (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a weapon control system security upgrading method based on boot secondary loading, which comprises the following steps: s1: the weapon control system is electrified, the main control program loads a monitoring program boot in the FLASH memory to a boot area in the RAM memory, the monitoring program boot guides the monitoring program to other areas in the RAM memory, and the monitoring program is started to run; s2, entering a software jump flow, importing a control boot to a boot area in the RAM through a monitoring program, covering the monitoring program boot of the boot area, controlling the boot to import the control program to other areas in the RAM, and covering the monitoring program of the other areas; s3: the weapon control system executes a control program in RAM memory. The control program is led into other areas in the RAM through the control boot, and the monitoring program of the other areas is covered, so that the monitoring program does not occupy the memory space of the RAM, the problem of insufficient memory is effectively solved, the memory conflict is avoided, and the system fluency of the weapon system is better.

Description

Weapon system control software safety upgrading method based on boot secondary loading
Technical Field
The invention belongs to the field of embedded software, and particularly relates to a weapon system control software security upgrading method based on boot secondary loading.
Background
The weapon system control software is solidified and stored in a FLASH memory of the embedded chip assembly, after the device is electrified, the embedded chip copies the control software from the FLASH memory to a chip RAM memory, then starts the software to run, and controls the whole weapon system according to a preset flow. Control software within the embedded chip, when it is running, partitions the RAM memory space into three parts, boot, ARAM, IRAM. Wherein the boot area stores a boot code control module, and the inside of the boot area contains part of hardware configuration functions, namely EMIF control register configuration and the like; the ARAM area stores a program interrupt vector table, an uninitialized global variable and a static variable; the IRAM area holds the rest of the code of the program.
Typically weapon system control software is provided with a need for self-upgrade. In order to avoid damage to weapon equipment caused by frequent disassembly and reduce labor cost, weapon system control software updates and maintains the software by an online upgrade method based on some external communication mode. Currently, a weapon system control software security boot upgrade scheme exists for online security upgrade of weapon system control software. The FLASH memory is changed into three sectors of a monitoring program area, a control software area and a data storage area by only distributing control software in the traditional scheme; after the weapon system is electrified, the control chip loads the monitoring program from the FLASH memory, and if the external online upgrade command is not received for a plurality of times, the control chip jumps to the control software from the monitoring program, and starts the control software to run; if the external online upgrade command is received within the waiting time, stopping jumping the control software logic, entering an online upgrade process, enabling the monitoring program to erase the corresponding sector of the control software, receiving the corresponding data frame of the external control software, writing the corresponding data frame into the control software sector, and completing the online update process of the control software code.
In the safety guiding upgrading scheme, a monitoring program erases a corresponding sector of control software and writes the control software to finish the online updating process of the control software code. However, the written control software does not include a boot code control module, and the boot module used by the control software is still a monitoring program, so that the control software lacks its own hardware configuration, and compatibility problems may be caused. Secondly, when the control software is started in a skip mode, the scheme directly skips the IRAM area, only codes are covered on the ARAM area, the problem that partial software configuration of the ARAM area is not started exists, and logic potential safety hazards exist. Meanwhile, when the control software is operated, the monitoring program in the RAM memory of the embedded chip occupies part of the memory space, so that memory conflict is caused, and the design problem of insufficient memory is easily caused.
In this case, in order to further reduce the risk of the control software during online upgrade, and improve the reliability and safety of the operation of the control software of the on-board weapon system, a safer weapon system control software security upgrade scheme needs to be developed.
Disclosure of Invention
Aiming at the defects and improvement requirements of the prior art, the invention aims to provide a weapon system control software safety upgrading scheme based on boot secondary loading, which is applied to missile-borne weapon system control software, effectively solves the problem that the hardware configuration and the software configuration of the control software are inconsistent and the problem of memory conflict in a safety guiding upgrading method, eliminates the potential safety hazard of the control software and improves the safety of safety guiding upgrading.
In order to achieve the above purpose, the invention provides a weapon control system security upgrading method based on boot secondary loading, which comprises the following steps:
s1: the weapon control system is electrified, the main control program loads a monitoring program boot in the FLASH memory to a boot area in the RAM memory, the monitoring program boot guides the monitoring program to other areas in the RAM memory, and the monitoring program is started to run;
s2, entering a software jump flow, importing a control boot to a boot area in the RAM through a monitoring program, covering the monitoring program boot of the boot area, controlling the boot to import the control program to other areas in the RAM, and covering the monitoring program of the other areas; starting a control boot to complete control program hardware configuration and software configuration;
s3: the weapon control system executes a control program in RAM memory.
Further, the other areas include an ARAM area and an IRAM area, the ARAM area is used for storing a program interrupt vector table, uninitialized global variables and static variables, and the IRAM area is used for storing a logic function control module, a time sequence control module and a data processing module.
Further, in step S1, after the control program starts to run the boot of the monitor program and the monitor program, in a time specified by the program, it is determined whether to enter the upgrade process, and if not, the software jump process is entered.
Still further, the program specifies a time of 5S.
Further, in step S1, an upgrade process is entered, where the upgrade step includes:
a. entering an upgrading process through a monitoring program, and erasing a control boot and a designated address of the control program in a FLASH memory;
b. writing the upgrading control boot and the upgrading control program into the designated address through the monitoring program;
further, in step S2, a control boot is imported to a boot area in the RAM memory, and after a monitor boot of the boot area is covered;
the check code of the control boot in the boot area is calculated as follows: judging whether the check code is consistent with a control boot check code in the FLASH memory; if the check codes are consistent, jumping to a control boot, and executing the step S2: and controlling boot to import a control program to other areas and covering the monitoring programs of the other areas.
Further, the method for calculating the check code of the control boot in the boot area comprises the following steps: a check calculation in bytes and multiples of bytes is used.
Further, the verification calculation method comprises the following steps: the sum check is calculated by byte sequence addition, the exclusive or check is calculated by byte sequence exclusive or, and the check calculation is performed by any one of the CRC check and the CRC check in the CRC8 or CRC16 mode.
Still further preferably, the checksum is calculated by byte-sequential addition, and the checksum for controlling boot summation in the boot area is calculated by reading the data of the boot area and byte-sequential addition.
Further, if the verification codes are inconsistent, a fault is fed back, and the control program is failed to start.
Further, before entering the software jump procedure, step S2 adds a jump software selection module, where the jump software selection module is used to securely match multiple pieces of software with a single system.
Further, the monitoring program receives an externally-transmitted software selection instruction, or selects software to be skipped according to an internally-preset software selection instruction.
Further, the monitoring program copies the selected boot code control module from the FLASH memory to a boot area in the RAM memory to cover the original boot code control module in the RAM memory.
Further, after the boot code control module covers the original monitoring boot in the RAM memory,
calculating the check code of the boot code control module, and judging whether the check code is consistent with the check code of the selected software boot code control module in the FLASH memory;
if the check codes are consistent, jumping to the position of a boot code control module in the RAM, running the boot code control module, and importing a module program corresponding to the boot code control module by the boot code control module, wherein the module program covers a monitoring program in other areas in the RAM;
if the check codes are inconsistent, a fault is fed back, and the selected module program is failed to start.
In general, the following beneficial effects can be achieved by the above technical solutions contemplated by the present invention:
1. the boot is controlled to import the control program to other areas in the RAM, and the monitoring program of the other areas is covered, so that the monitoring program does not occupy the memory space of the RAM any more, the problem of insufficient memory is effectively solved, the memory is prevented from generating conflict, and the system fluency of the weapon system is better;
2. in the upgrading process, a new control boot and a new control program are completely written into the FLASH memory, so that the problem of compatibility caused by the fact that the control program lacks own hardware configuration is avoided, safer guiding and upgrading of weapon system control software is realized, and the risk coefficient of using the weapon system is reduced;
3. the updated control program is imported through the updated control boot, so that the situation that the software configuration of the ARAM area is not started, no logic safety hidden trouble exists, and the reliability is high;
4. the jump software selection function is added, the boot code control module of the corresponding software in the FLASH memory is copied to the boot area of the RAM memory according to a preset selection instruction or an externally transmitted selection instruction, the problem that a single system is safely matched with a plurality of software can be solved, and the method is applicable to different use scenes.
Drawings
FIG. 1 is a schematic diagram of a spatial distribution structure in a RAM memory;
FIG. 2 is a schematic diagram of a security upgrade method for an embedded device according to an embodiment of the present invention;
FIG. 3 is a schematic diagram of an upgrade process according to an embodiment of the present invention;
FIG. 4 is a schematic diagram of a control software jump procedure according to an embodiment of the present invention;
fig. 5 is a flowchart illustrating a process of adding a jump software selection module according to an embodiment of the invention.
Detailed Description
The present invention will be described in further detail with reference to the drawings and examples, in order to make the objects, technical solutions and advantages of the present invention more apparent. It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the scope of the invention. In addition, the technical features of the embodiments of the present invention described below may be combined with each other as long as they do not collide with each other.
Example 1:
a weapon control system security upgrading method based on boot secondary loading comprises the following steps:
s1: the weapon control system is electrified, the main control program loads a monitoring program boot in the FLASH memory to a boot area in the RAM memory, the monitoring program boot guides the monitoring program to other areas in the RAM memory, and the monitoring program is started to run;
s2, entering a software jump flow, importing a control boot to a boot area in the RAM through a monitoring program, covering the monitoring program boot of the boot area, controlling the boot to import the control program to other areas in the RAM, covering the monitoring program of the other areas, executing the control boot, and completing the hardware configuration and the software configuration of the control program;
s3: the weapon control system executes a control program in RAM memory.
In step S2, control boot is executed to complete control program hardware configuration and software configuration, so that the security problem that the hardware and software configuration of the DSP chip is inconsistent with the operation requirement of the control program is solved.
As shown in fig. 1, the RAM memory space is divided into a boot area (i.e., a boot code control module) and other areas (i.e., other modules), where the other areas include an ARAM area and an IRAM area, the ARAM area is used for storing a program interrupt vector table and uninitialized global variables and static variables, and the IRAM area is used for storing a logic function control module, a timing control module and a data processing module.
The control program is used for controlling the weapon system, and the monitoring program is used for controlling program upgrading and starting the control program. After the upgrading is failed, the weapon system is powered on again and started, the control program can be continuously upgraded through the monitoring program, so that the safe and reliable guiding upgrading of the control program in the weapon system is realized, the risk coefficient is reduced, and the reliability reduction of the structural performance of the weapon system caused by disassembling the weapon system is avoided; the control program is used for controlling real-time control and adjustment of the weapon running process.
By controlling boot to import control programs to other areas in the RAM, the monitoring programs in the other areas are covered, so that the monitoring programs do not occupy the memory space of the RAM any more, the problem of insufficient memory is effectively solved, the memory collision is avoided, and the system fluency of the weapon system is better
As shown in fig. 2, in step S1, after the control program starts to run the monitor program boot and the monitor program, in the time specified by the program, it is determined whether to enter the upgrade process, and if not, the software jump process is entered.
In this embodiment, the time specified by the program is 5S, and if the upgrade process instruction is not received in 5S, the control program enters the software jump process, and the control program executes the step S2.
As shown in fig. 3, if an upgrade process instruction is received, the system enters an upgrade process, and the upgrade steps include:
a. entering an upgrading process through a monitoring program, and erasing a control boot and a designated address of the control program in a FLASH memory;
b. writing the upgrading control boot and the upgrading control program into the designated address through the monitoring program;
after the system receives the upgrading completion result, the system is powered off, is restarted, waits for a period of time, enters a jump procedure, and can start a new control program, a monitoring program loads an upgrading control boot from a FLASH memory to a boot area in a RAM memory, the upgrading control boot covers the monitoring boot in the RAM memory, the upgrading control boot leads the upgrading control program to other areas in the RAM memory, and covers the monitoring programs of the other areas; the upgrade control program writes the operation code of the remaining control software modules in the designated address, namely the drawing; the weapon control system executes an upgrade control program in RAM memory.
The upgrading process is completely written into the boot module, so that preparation is made for running control boot in the jump process and starting hardware and software configuration. The upgrade control program is imported through the upgrade control boot, so that partial software configuration of the ARAM area is prevented from being not started, logic safety hidden danger is avoided, and the system reliability is higher.
Example 2:
as shown in fig. 4, a weapon control system security upgrading method based on boot secondary loading includes the following steps:
s1: the weapon control system is electrified, the main control program loads a monitoring program boot in the FLASH memory to a boot area in the RAM memory, the monitoring program boot guides the monitoring program to other areas in the RAM memory, and the monitoring program is started to run;
s2, entering a software jump flow, importing a control boot to a boot area in the RAM through a monitoring program, covering the monitoring program boot of the boot area, controlling the boot to import the control program to other areas in the RAM, covering the monitoring program of the other areas, executing the control boot, and completing the hardware configuration and the software configuration of the control program;
s3: the weapon control system executes a control program in RAM memory.
The other areas comprise an ARAM area and an IRAM area, the ARAM area is used for storing a program interrupt vector table, uninitialized global variables and static variables, and the IRAM area is used for storing a logic function control module, a time sequence control module and a data processing module.
In step S1, after the control program starts to run the boot and the monitor program, it is determined whether to enter the upgrade process within a time specified by the program, and if not, the control program enters the software jump process.
And if the program set time is 5S and the program set time does not receive the upgrade flow instruction, automatically entering a software jump flow.
If an upgrade flow instruction is received, the system enters an upgrade flow, and the upgrade steps comprise:
a. entering an upgrading process through a monitoring program, and erasing a control boot and a designated address of the control program in a FLASH memory;
b. writing the upgrading control boot and the upgrading control program into the designated address through the monitoring program;
in the step S2, a control boot is imported to a boot area in the RAM memory, and after a monitoring program boot of the boot area is covered;
in this embodiment, the check code for controlling the boot in the boot area is calculated as: the method comprises the steps of obtaining a check code for controlling boot summation in a boot area through reading data of the boot area and adding the data according to byte sequence, and judging whether the check code is consistent with the control boot check code in a FLASH memory; if the check codes are consistent, jumping to a control boot, and executing the step S2: and controlling boot to import a control program to other areas and covering the monitoring programs of the other areas.
If the verification codes are inconsistent, a fault is fed back, and the control program is failed to start.
Example 3:
a weapon control system security upgrading method based on boot secondary loading comprises the following steps:
s1: the weapon control system is electrified, the main control program loads a monitoring program boot in the FLASH memory to a boot area in the RAM memory, the monitoring program boot guides the monitoring program to other areas in the RAM memory, and the monitoring program is started to run;
s2, entering a software jump flow, importing a control boot to a boot area in the RAM through a monitoring program, covering the monitoring program boot of the boot area, controlling the boot to import the control program to other areas in the RAM, covering the monitoring program of the other areas, executing the control boot, and completing the hardware configuration and the software configuration of the control program;
s3: the weapon control system executes a control program in RAM memory.
The other areas comprise an ARAM area and an IRAM area, the ARAM area is used for storing a program interrupt vector table, uninitialized global variables and static variables, and the IRAM area is used for storing a logic function control module, a time sequence control module and a data processing module.
In step S1, after the control program starts to run the boot and the monitor program, it is determined whether to enter the upgrade process within a time specified by the program, and if not, the control program enters the software jump process.
The program specifies a time of 5S.
Step S1, an upgrading process is entered, and the upgrading step comprises the following steps:
a. entering an upgrading process through a monitoring program, and erasing a control boot and a designated address of the control program in a FLASH memory;
b. and writing the upgrading control boot and the upgrading control program into the designated address through the monitoring program.
In the step S2, a control boot is imported to a boot area in the RAM memory, and after a monitoring program boot of the boot area is covered;
calculating a control boot check code in the boot area, and judging whether the check code is consistent with the control boot check code in the FLASH memory; if the check codes are consistent, jumping to a control boot, and executing the step S2: and controlling boot to import a control program to other areas and covering the monitoring programs of the other areas. In this embodiment, the check code for controlling the boot in the boot area is calculated as: and reading the data of the boot area, performing exclusive OR according to byte sequence, calculating exclusive OR, and checking.
If the verification codes are inconsistent, a fault is fed back, and the control program is failed to start.
As shown in fig. 5, before entering the software jump procedure, step S2 adds a jump software selection module, where the jump software selection module is used for securely matching multiple pieces of software with a single system.
The monitoring program receives an externally-transmitted software selection instruction or selects software to be skipped according to an internally preset software selection instruction.
And the monitoring program copies the selected boot code control module from the FLASH memory to a boot area in the RAM memory to cover the original boot code control module in the RAM memory.
After the boot code control module covers the original monitoring boot in the RAM memory,
calculating the check code of the boot code control module, and judging whether the check code is consistent with the check code of the selected software boot code control module in the FLASH memory;
if the check codes are consistent, jumping to the position of a boot code control module in the RAM, running the boot code control module, and importing a module program corresponding to the boot code control module by the boot code control module, wherein the module program covers a monitoring program in other areas in the RAM;
if the check codes are inconsistent, a fault is fed back, and the selected module program is failed to start. If the verification fails, feeding back the fault to the display unit, powering up the system again, resetting the program, entering the system again, and receiving an externally transmitted software selection instruction by the monitoring program or selecting the software needing to be jumped again according to the internally preset software selection instruction. The software to be jumped is weapon system control software using TI 6000 series DSP platform, and is missile flight control software, ground emission control software, unmanned plane flight control software and the like.

Claims (7)

1. A weapon control system safety upgrading method based on boot secondary loading is characterized by comprising the following steps:
s1: the weapon control system is electrified, a monitoring program boot in the FLASH memory is loaded to a boot area in the RAM memory, the monitoring program boot guides the monitoring program to other areas in the RAM memory, and the monitoring program is started to run;
s2, entering a software jump flow, importing a control boot to a boot area in the RAM through a monitoring program, covering the monitoring program boot of the boot area, controlling the boot to import the control program to other areas in the RAM, covering the monitoring program of the other areas, executing the control boot, and completing the hardware configuration and the software configuration of the control program;
s3: the weapon control system executes the control program in the RAM memory;
the other areas comprise an ARAM area and an IRAM area;
in step S1, after a weapon control system starts to run a monitoring program boot and a monitoring program, judging whether to enter an upgrading process or not within a time specified by the program;
step S1, an upgrading process is entered, and the upgrading step comprises the following steps:
a. entering an upgrading process through a monitoring program, and erasing a control boot and a designated address of the control program in a FLASH memory;
b. and writing the upgrading control boot and the upgrading control program into the designated address through the monitoring program.
2. The method for safely upgrading a weapon control system based on boot secondary loading according to claim 1, wherein in step S2, a control boot is imported to a boot area in a RAM memory, and after a monitoring program boot of the boot area is covered;
calculating a control boot check code in the boot area, and judging whether the check code is consistent with the control boot check code in the FLASH memory; if the check codes are consistent, jumping to a control boot, and executing the step S2: and controlling boot to import a control program to other areas and covering the monitoring programs of the other areas.
3. The method for safely upgrading the weapon control system based on boot secondary loading according to claim 2, wherein if the check codes are inconsistent, a feedback failure occurs, and the start control program fails.
4. The method for safely upgrading a weapon control system based on boot reloading according to claim 1, wherein a jump software selection module is added before entering a software jump procedure in step S2, and the jump software selection module is used for single-system safe matching of a plurality of software.
5. The method for safely upgrading a weapon control system based on boot reloading according to claim 4, wherein the monitoring program receives an externally transmitted software selection instruction or selects software to be skipped according to an internally preset software selection instruction.
6. The method for safely upgrading a weapon control system based on boot secondary loading according to claim 5, wherein the monitoring program copies the selected boot code control module from the FLASH memory to a boot area in the RAM memory to cover the original boot code control module in the RAM memory.
7. The method for safely upgrading a weapon control system based on boot reloading according to claim 6, wherein after the boot code control module covers the original monitoring boot in the RAM memory,
calculating the check code of the boot code control module, and judging whether the check code is consistent with the check code of the selected software boot code control module in the FLASH memory;
if the check codes are consistent, jumping to the position of a boot code control module in the RAM, running the boot code control module, and importing a module program corresponding to the boot code control module by the boot code control module, wherein the module program covers a monitoring program in other areas in the RAM;
if the check codes are inconsistent, a fault is fed back, and the selected module program is failed to start.
CN201911357463.2A 2019-12-25 2019-12-25 Weapon system control software safety upgrading method based on boot secondary loading Active CN111488168B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911357463.2A CN111488168B (en) 2019-12-25 2019-12-25 Weapon system control software safety upgrading method based on boot secondary loading

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911357463.2A CN111488168B (en) 2019-12-25 2019-12-25 Weapon system control software safety upgrading method based on boot secondary loading

Publications (2)

Publication Number Publication Date
CN111488168A CN111488168A (en) 2020-08-04
CN111488168B true CN111488168B (en) 2023-09-12

Family

ID=71797587

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911357463.2A Active CN111488168B (en) 2019-12-25 2019-12-25 Weapon system control software safety upgrading method based on boot secondary loading

Country Status (1)

Country Link
CN (1) CN111488168B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112115017B (en) * 2020-08-07 2022-07-12 航天科工空间工程发展有限公司 Logic code monitoring method and device of satellite-borne software program

Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH0954700A (en) * 1995-08-11 1997-02-25 Fujitsu Ltd Saving system for main memory data
WO2002042903A1 (en) * 2000-11-24 2002-05-30 Mitsubishi Chemical Corporation Rewritable information recording medium, and boot-strap method
US6615404B1 (en) * 1999-05-13 2003-09-02 Tadiran Telecom Business Systems Ltd. Method and apparatus for downloading software into an embedded-system
EP1372068A2 (en) * 2002-06-11 2003-12-17 Seiko Epson Corporation System, method and program for rewriting a flash memory
CN1567195A (en) * 2003-06-20 2005-01-19 华为技术有限公司 Method for implementing hot-update of bootstrap program in flush bonding system
CN1928821A (en) * 2006-09-26 2007-03-14 北京飞天诚信科技有限公司 Online updating method for electronic appliances
WO2012077604A1 (en) * 2010-12-08 2012-06-14 三洋電機株式会社 Processing device, program update method, and program
KR101640207B1 (en) * 2015-01-20 2016-07-15 주식회사 뉴티씨 (Newtc) Bootloader and embedded system upgrade method
CN106648803A (en) * 2016-12-30 2017-05-10 南京科远自动化集团股份有限公司 Online upgrading method for DSP chip
CN107015833A (en) * 2017-04-14 2017-08-04 湖南威胜信息技术有限公司 The self-recovery method of embedded device application program
CN109710320A (en) * 2018-12-11 2019-05-03 中国航空工业集团公司西安航空计算技术研究所 A kind of starting guidance BootLoader method of two-stage drive
CN109766116A (en) * 2018-12-11 2019-05-17 湖北航天飞行器研究所 A kind of multicore control assembly based on CAN communication guides upgrade method online

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030056071A1 (en) * 2001-09-18 2003-03-20 Triece Joseph W. Adaptable boot loader
US10289399B2 (en) * 2014-01-22 2019-05-14 Hewlett-Packard Development Company, L.P. System firmware configuration data

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH0954700A (en) * 1995-08-11 1997-02-25 Fujitsu Ltd Saving system for main memory data
US6615404B1 (en) * 1999-05-13 2003-09-02 Tadiran Telecom Business Systems Ltd. Method and apparatus for downloading software into an embedded-system
WO2002042903A1 (en) * 2000-11-24 2002-05-30 Mitsubishi Chemical Corporation Rewritable information recording medium, and boot-strap method
EP1372068A2 (en) * 2002-06-11 2003-12-17 Seiko Epson Corporation System, method and program for rewriting a flash memory
CN1567195A (en) * 2003-06-20 2005-01-19 华为技术有限公司 Method for implementing hot-update of bootstrap program in flush bonding system
CN1928821A (en) * 2006-09-26 2007-03-14 北京飞天诚信科技有限公司 Online updating method for electronic appliances
WO2012077604A1 (en) * 2010-12-08 2012-06-14 三洋電機株式会社 Processing device, program update method, and program
KR101640207B1 (en) * 2015-01-20 2016-07-15 주식회사 뉴티씨 (Newtc) Bootloader and embedded system upgrade method
CN106648803A (en) * 2016-12-30 2017-05-10 南京科远自动化集团股份有限公司 Online upgrading method for DSP chip
CN107015833A (en) * 2017-04-14 2017-08-04 湖南威胜信息技术有限公司 The self-recovery method of embedded device application program
CN109710320A (en) * 2018-12-11 2019-05-03 中国航空工业集团公司西安航空计算技术研究所 A kind of starting guidance BootLoader method of two-stage drive
CN109766116A (en) * 2018-12-11 2019-05-17 湖北航天飞行器研究所 A kind of multicore control assembly based on CAN communication guides upgrade method online

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
C加人生.双UBOOT启动及升级设计.《CSDN》.2019,全文. *

Also Published As

Publication number Publication date
CN111488168A (en) 2020-08-04

Similar Documents

Publication Publication Date Title
CN108052355B (en) Satellite-borne load unit software on-orbit weight composing method
CN109358887B (en) On-line upgrading method, device and system for single chip microcomputer program
CN105354063B (en) Program on-line upgrading method and system
CN104572206A (en) Application program self updating and backup recovery method
CN108182078B (en) Optimized missile-borne device non-dismantling software online upgrading method
CN109710320B (en) Two-stage driving boot loader starting and guiding method
CN106598654B (en) Method for updating PowerPC mainboard boot chip on line
CN103106083B (en) A kind of loading method of firmware and device
CN111488168B (en) Weapon system control software safety upgrading method based on boot secondary loading
CN103677923A (en) BOOT bootstrap program run protection method
CN102156647B (en) Advanced safety setting method and advanced safety setting device for main chip of set-top box
CN104407878A (en) On-line upgrading method of C6000 digital signal processor
CN109597635A (en) A kind of primary control program is safe to guide upgrade method, embedded device and memory
CN112540780A (en) System and method for realizing batch firmware upgrade of formation unmanned aerial vehicles
CN108920168B (en) Bootloader method supporting simultaneous upgrading of multiple similar ECUs and having function of preventing program mismatching
CN110308920B (en) Method for modifying on-orbit product software without affecting normal operation
CN109766116B (en) Multi-core control assembly online guiding and upgrading method based on CAN communication
CN101384063A (en) Method and system for terminal equipment repairing and updating, system manufacturing method
CN104793942A (en) Method for developing client software
CN111273928B (en) Bootloader design method for self-upgrading
CN114741091A (en) Firmware loading method and device, electronic equipment and computer readable storage medium
CN111061500A (en) bootloader program updating method and bootloader program updating device
CN102520992B (en) Embedded system start method and device
CN113051007B (en) Star software rapid guiding device and method
CN111158660B (en) Multi-mode on-orbit programming method for on-board software EEPROM (electrically erasable programmable read-Only memory)

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant