CN116301963A - Upgrading method, device, equipment and storage medium of system firmware - Google Patents

Upgrading method, device, equipment and storage medium of system firmware Download PDF

Info

Publication number
CN116301963A
CN116301963A CN202310029200.9A CN202310029200A CN116301963A CN 116301963 A CN116301963 A CN 116301963A CN 202310029200 A CN202310029200 A CN 202310029200A CN 116301963 A CN116301963 A CN 116301963A
Authority
CN
China
Prior art keywords
new firmware
firmware
new
cyclic redundancy
upgrade
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310029200.9A
Other languages
Chinese (zh)
Inventor
杨正传
孟勤海
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Sugar Technology Co ltd
Original Assignee
Shanghai Sugar Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Sugar Technology Co ltd filed Critical Shanghai Sugar Technology Co ltd
Priority to CN202310029200.9A priority Critical patent/CN116301963A/en
Publication of CN116301963A publication Critical patent/CN116301963A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/60Software deployment
    • G06F8/65Updates
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/08Error detection or correction by redundancy in data representation, e.g. by using checking codes
    • G06F11/10Adding special bits or symbols to the coded information, e.g. parity check, casting out 9's or 11's
    • G06F11/1004Adding special bits or symbols to the coded information, e.g. parity check, casting out 9's or 11's to protect a block of data words, e.g. CRC or checksum
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1402Saving, restoring, recovering or retrying
    • G06F11/1446Point-in-time backing up or restoration of persistent data
    • G06F11/1448Management of the data involved in backup or backup restore
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Abstract

The invention relates to the field of data processing, and discloses a method, a device, equipment and a storage medium for upgrading system firmware. The method comprises the following steps: when an upgrade instruction is detected, downloading new firmware to the backup area according to the upgrade instruction; determining whether the new firmware is complete; when the new firmware is complete, performing cyclic redundancy check on the new firmware; and when the result of the cyclic redundancy check is correct, transferring the new firmware to the main partition and running. The invention reduces the maintenance cost of the system firmware.

Description

Upgrading method, device, equipment and storage medium of system firmware
Technical Field
The present invention relates to the field of data processing, and in particular, to a method, an apparatus, a device, and a storage medium for upgrading system firmware.
Background
With the increasing popularity of software and hardware combined products in national economy, such devices need to be functionally upgraded or some device problems repaired in the service cycle, so that the system firmware of the device needs to be upgraded in time. Conventional upgrade methods, when a problem occurs in the upgrade process, often require manual upgrade, and the upgrade method brings a lot of after-sales maintenance and equipment replacement costs and high maintenance cost of system firmware.
Disclosure of Invention
The invention mainly aims to solve the technical problem of high maintenance cost of system firmware.
The first aspect of the present invention provides a method for upgrading system firmware, where the method for upgrading system firmware includes:
when an upgrade instruction is detected, downloading new firmware to a backup area according to the upgrade instruction;
determining whether the new firmware is complete;
when the new firmware is complete, performing cyclic redundancy check on the new firmware;
and when the result of the cyclic redundancy check is correct, transferring the new firmware to a main partition and operating.
Optionally, in a first implementation manner of the first aspect of the present invention, when the upgrade instruction is detected, the step of downloading new firmware to the backup area according to the upgrade instruction includes:
when the upgrade instruction is detected, downloading the new firmware to the RAM according to the upgrade instruction;
writing the size of the new firmware into the last four bytes of Flash and transferring the new firmware to the backup area;
the step of performing cyclic redundancy check on the new firmware when the new firmware is complete includes:
and when the new firmware is complete, performing cyclic redundancy check on the new firmware according to the last four bytes of the Flash.
Optionally, in a second implementation manner of the first aspect of the present invention, when the upgrade instruction is detected, the step of downloading new firmware to the backup area according to the upgrade instruction includes:
when the upgrade instruction is detected, downloading the new firmware to the backup area according to the upgrade instruction and writing the new firmware into the last four bytes of Flash;
the step of performing cyclic redundancy check on the new firmware when the new firmware is complete includes:
and when the new firmware is complete, performing cyclic redundancy check on the new firmware according to the last four bytes of the Flash.
Optionally, in a third implementation manner of the first aspect of the present invention, the step of determining whether the new firmware is complete includes:
identifying whether the new firmware is broken;
when the new firmware is damaged, continuing to run the historical firmware of the main partition;
and when the new firmware is not damaged, executing the step of determining whether the new firmware is complete.
Optionally, in a fourth implementation manner of the first aspect of the present invention, the step of determining whether the new firmware is complete includes:
identifying whether the new firmware is broken;
when the new firmware is damaged, returning to execute the step of downloading the new firmware to the backup area according to the upgrading instruction;
and when the new firmware is not damaged, executing the step of determining whether the new firmware is complete.
Optionally, in a fifth implementation manner of the first aspect of the present invention, the step of transferring the new firmware to the main partition when the result of the cyclic redundancy check is correct includes:
copying the new firmware to the main partition when the result of the cyclic redundancy check is correct;
and erasing the new firmware of the backup area.
Optionally, in a sixth implementation manner of the first aspect of the present invention, after the step of performing cyclic redundancy check on the new firmware when the new firmware is complete, the method further includes:
when the result of the cyclic redundancy check is an error, erasing the new firmware of the backup area and returning to execute the step of downloading the new firmware to the backup area according to the upgrading instruction;
and outputting prompt information of verification problem of the firmware security packet when the result of the cyclic redundancy check is in secondary error.
The second aspect of the present invention provides an upgrade apparatus for system firmware, including:
the downloading module is used for downloading the new firmware to the backup area according to the upgrading instruction when the upgrading instruction is detected;
a determining module, configured to determine whether the new firmware is complete;
the verification module is used for carrying out cyclic redundancy verification on the new firmware when the new firmware is complete;
and the transfer module is used for transferring the new firmware to the main partition when the result of the cyclic redundancy check is correct.
A third aspect of the present invention provides an upgrade apparatus for system firmware, including: a memory and at least one processor, the memory having instructions stored therein, the memory and the at least one processor being interconnected by a line; the at least one processor invokes the instructions in the memory to cause the upgrade apparatus of the system firmware to execute the upgrade method of the system firmware described above.
A fourth aspect of the present invention provides a computer readable storage medium having instructions stored therein which, when run on a computer, cause the computer to perform the method of upgrading system firmware described above.
In the embodiment of the invention, when an upgrade instruction is detected, new firmware is downloaded to a backup area according to the upgrade instruction; determining whether the new firmware is complete; when the new firmware is complete, performing cyclic redundancy check on the new firmware; and when the result of the cyclic redundancy check is correct, transferring the new firmware to a main partition and operating. Because the upgrade equipment of the system firmware is firstly placed in the backup area to carry out the integrity check and the cyclic redundancy check in the firmware upgrade process, the probability of upgrade failure caused by the occurrence of problems of the new firmware can be reduced, the possibility that the upgrade equipment of the system firmware is abnormal in the upgrade of the system firmware is effectively avoided, the normal upgrade of products is ensured to avoid the equipment cannot be used because of the abnormal upgrade of the system firmware, and further, the cost and the cost of a large amount of after-sale maintenance and equipment replacement are prevented, the use effect of the equipment can be continuously upgraded, and the maintenance cost of the system firmware is reduced.
Drawings
FIG. 1 is a schematic diagram of an embodiment of a method for upgrading system firmware according to an embodiment of the present invention;
FIG. 2 is a reference diagram of a method for upgrading system firmware according to an embodiment of the present invention;
FIG. 3 is another reference diagram of a method for upgrading system firmware according to an embodiment of the present invention
FIG. 4 is a schematic diagram of an embodiment of an upgrade apparatus for system firmware according to an embodiment of the present invention;
FIG. 5 is a schematic diagram of an embodiment of an upgrade apparatus for system firmware according to an embodiment of the present invention.
Detailed Description
The embodiment of the invention provides a method, a device, equipment and a storage medium for upgrading system firmware.
The terms "first," "second," "third," "fourth" and the like in the description and in the claims and in the above drawings, if any, are used for distinguishing between similar objects and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used may be interchanged where appropriate such that the embodiments described herein may be implemented in other sequences than those illustrated or otherwise described herein. Furthermore, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed or inherent to such process, method, article, or apparatus.
For easy understanding, the following describes a specific flow of an embodiment of the present invention, referring to fig. 1, and an embodiment of a method for upgrading system firmware in an embodiment of the present invention includes:
101. when an upgrade instruction is detected, downloading new firmware to a backup area according to the upgrade instruction;
specifically, the upgrade instruction may be initiated by the general server, and detected by the upgrade device of the system firmware, and when the upgrade instruction is detected, a new firmware is downloaded based on the upgrade instruction by presetting a download address, where the new firmware is stored in the backup area. Further, the upgrade instruction is analyzed to obtain a file download address, and the new firmware is downloaded to the backup area according to the file download address.
Alternatively, the downloading of the new firmware is divided into Uboot downloading and WebUI/OTA downloading.
Optionally, when the upgrade instruction is detected, downloading the new firmware to the RAM according to the upgrade instruction; writing the size of the new firmware into the last four bytes of Flash and transferring the new firmware to the backup area; the step of performing cyclic redundancy check on the new firmware when the new firmware is complete includes: and when the new firmware is complete, performing cyclic redundancy check on the new firmware according to the last four bytes of the Flash.
Optionally, when the upgrade instruction is detected, downloading the new firmware to the backup area according to the upgrade instruction and writing the new firmware into the last four bytes of Flash; the step of performing cyclic redundancy check on the new firmware when the new firmware is complete includes: and when the new firmware is complete, performing cyclic redundancy check on the new firmware according to the last four bytes of the Flash.
Optionally, each product of the combination of software and hardware has a storage component that stores system firmware, where the storage component may divide a plurality of areas, and in this embodiment, the area division of the storage component is divided into a Uboot, an auxiliary area, a backup area, and a main partition, with reference to fig. 2.
The partitions function as follows:
uboot: the area stores the program executed first after the equipment is powered on, and has the function of checking whether the backup area has the newly downloaded firmware, and if so, identifying the newly downloaded firmware to ensure that the newly downloaded firmware is not abnormal;
auxiliary area: auxiliary data required for the operation of the regional storage device;
main partition: the area stores actually executed system firmware, namely the system firmware used when the equipment normally operates;
backup area: the area stores newly downloaded system firmware to be upgraded and auxiliary data areas used for the upgrade.
The internal structure of the backup area is referred to in fig. 3.
Wherein, each part is described as follows:
firmware area: storing firmware to be upgraded used for actual operation;
and (3) checksum: following the four byte region of the firmware, each byte value of the firmware is summed in turn to a resulting four byte value. Checksum (checksum) is used in the field of data processing and data communications to check the sum of a set of data items at a destination. It is typically in the form of a hexadecimal representation of a number system. If the value of the checksum exceeds hexadecimal FF, i.e., 255, its complement is required as the checksum. Are commonly used to ensure data integrity and accuracy in communications, particularly in long-range communications.
Firmware size: the last four bytes of the backup area, the value is the firmware size plus the checksum area size (4 bytes).
102. Determining whether the new firmware is complete;
specifically, the file integrity of the new firmware is checked. The file integrity check is the "validation" of the file. An attacker may add malicious code to the software and when such tampered software is downloaded and used, a computer virus or Trojan horse program may silently enter the user's computer. The integrity of the file is checked, i.e. whether the downloaded software has been tampered with.
A common method of file integrity verification is to use a "hash function" based verification algorithm. Before releasing the software, a software developer uses a certain verification algorithm to calculate the characteristic value of the exe file, and then releases the characteristic value and the exe file together on a network. The user uses the same verification algorithm to calculate the feature value downloaded to the exe file and compares the feature value with the feature value issued by the software developer. If the two eigenvalues are the same, the downloaded exe file is considered correct. If the two characteristic values are different, the downloaded exe file is considered tampered.
Optionally, identifying whether the new firmware is broken; when the new firmware is damaged, continuing to run the historical firmware of the main partition; and when the new firmware is not damaged, executing the step of determining whether the new firmware is complete.
Optionally, identifying whether the new firmware is broken; when the new firmware is damaged, returning to execute the step of downloading the new firmware to the backup area according to the upgrading instruction; and when the new firmware is not damaged, executing the step of determining whether the new firmware is complete.
103. When the new firmware is complete, performing cyclic redundancy check on the new firmware;
specifically, cyclic redundancy check (Cyclic redundancy check, collectively referred to as "CRC") is a hash function that generates a short fixed-bit check code based on data such as network packets or computer files, and is used to detect or check errors that may occur after data transmission or storage. The generated numbers are calculated before transmission or storage and appended to the data, and then the recipient checks to determine if the data has changed.
CRC is one of the checksums, which is the remainder of a division of two byte data streams by binary division (no carry, XOR instead of subtraction). Wherein the dividend is a binary representation of the information data stream requiring the checksum to be calculated; the divisor is a predefined (short) binary number of length (n+1), typically represented by the coefficients of a polynomial. N 0 s are added to the information data before division.
Optionally, when the new firmware is complete, determining whether the Kernel CRC32 value of the new firmware is correct, so as to perform cyclic redundancy check on the new firmware. CRC32 means that a 32bit (8 bit hexadecimal number) check value is generated. Since each bit of the source data block participates in the calculation when the CRC32 generates the check value, a different CRC32 value is obtained even if only one bit of the data block is changed. CRC32 means that 32 bits are used to hold error checking information, and when new firmware is created, the details of CRC32 will be embedded in the file to ensure that it can be detected if it has been corrupted when the file is restored to disk. Indicating that CRC32 is in error, the new firmware may be corrupted.
Optionally, when the result of the cyclic redundancy check is an error, erasing the new firmware in the backup area and returning to execute the step of downloading the new firmware to the backup area according to the upgrade instruction; and outputting prompt information of verification problem of the firmware security packet when the result of the cyclic redundancy check is in secondary error. In this alternative embodiment, based on the result of the cyclic redundancy check, multiple error determinations are performed, so as to effectively determine whether a problem occurs locally or whether a problem exists in the new firmware itself, so as to quickly check out the core cause of the upgrade failure.
104. And when the result of the cyclic redundancy check is correct, transferring the new firmware to a main partition and operating.
Optionally, when the result of the cyclic redundancy check is correct, copying the new firmware to the main partition; and erasing the new firmware of the backup area.
In the embodiment of the invention, when an upgrade instruction is detected, new firmware is downloaded to a backup area according to the upgrade instruction; determining whether the new firmware is complete; when the new firmware is complete, performing cyclic redundancy check on the new firmware; and when the result of the cyclic redundancy check is correct, transferring the new firmware to a main partition and operating. Because the upgrade equipment of the system firmware is firstly placed in the backup area to carry out the integrity check and the cyclic redundancy check in the firmware upgrade process, the probability of upgrade failure caused by the occurrence of problems of the new firmware can be reduced, the possibility that the upgrade equipment of the system firmware is abnormal in the upgrade of the system firmware is effectively avoided, the normal upgrade of products is ensured to avoid the equipment cannot be used because of the abnormal upgrade of the system firmware, and further, the cost and the cost of a large amount of after-sale maintenance and equipment replacement are prevented, the use effect of the equipment can be continuously upgraded, and the maintenance cost of the system firmware is reduced.
The method for upgrading the system firmware in the embodiment of the present invention is described above, and the device for upgrading the system firmware in the embodiment of the present invention is described below, referring to fig. 4, where an embodiment of the device for upgrading the system firmware in the embodiment of the present invention includes:
the downloading module 301 is configured to, when an upgrade instruction is detected, download new firmware to a backup area according to the upgrade instruction;
a determining module 302, configured to determine whether the new firmware is complete;
a checking module 303, configured to perform cyclic redundancy check on the new firmware when the new firmware is complete;
and the transferring module 304 is configured to transfer the new firmware to the main partition when the result of the cyclic redundancy check is correct.
Optionally, the verification module 303 may be further specifically configured to:
when the upgrade instruction is detected, downloading the new firmware to the RAM according to the upgrade instruction;
writing the size of the new firmware into the last four bytes of Flash and transferring the new firmware to the backup area;
the step of performing cyclic redundancy check on the new firmware when the new firmware is complete includes:
and when the new firmware is complete, performing cyclic redundancy check on the new firmware according to the last four bytes of the Flash.
Optionally, the verification module 303 may be further specifically configured to:
when the upgrade instruction is detected, downloading the new firmware to the backup area according to the upgrade instruction and writing the new firmware into the last four bytes of Flash;
the step of performing cyclic redundancy check on the new firmware when the new firmware is complete includes:
and when the new firmware is complete, performing cyclic redundancy check on the new firmware according to the last four bytes of the Flash.
Optionally, the determining module 302 may be further specifically configured to:
identifying whether the new firmware is broken;
when the new firmware is damaged, continuing to run the historical firmware of the main partition;
and when the new firmware is not damaged, executing the step of determining whether the new firmware is complete.
Optionally, the downloading module 301 may be further specifically configured to:
identifying whether the new firmware is broken;
when the new firmware is damaged, returning to execute the step of downloading the new firmware to the backup area according to the upgrading instruction;
and when the new firmware is not damaged, executing the step of determining whether the new firmware is complete.
Optionally, the transfer module 304 may be further specifically configured to:
copying the new firmware to the main partition when the result of the cyclic redundancy check is correct;
and erasing the new firmware of the backup area.
Optionally, the transfer module 304 may be further specifically configured to:
when the result of the cyclic redundancy check is an error, erasing the new firmware of the backup area and returning to execute the step of downloading the new firmware to the backup area according to the upgrading instruction;
and outputting prompt information of verification problem of the firmware security packet when the result of the cyclic redundancy check is in secondary error.
In the embodiment of the invention, when an upgrade instruction is detected, new firmware is downloaded to a backup area according to the upgrade instruction; determining whether the new firmware is complete; when the new firmware is complete, performing cyclic redundancy check on the new firmware; and when the result of the cyclic redundancy check is correct, transferring the new firmware to a main partition and operating. Because the upgrade equipment of the system firmware is firstly placed in the backup area to carry out the integrity check and the cyclic redundancy check in the firmware upgrade process, the probability of upgrade failure caused by the occurrence of problems of the new firmware can be reduced, the possibility that the upgrade equipment of the system firmware is abnormal in the upgrade of the system firmware is effectively avoided, the normal upgrade of products is ensured to avoid the equipment cannot be used because of the abnormal upgrade of the system firmware, and further, the cost and the cost of a large amount of after-sale maintenance and equipment replacement are prevented, the use effect of the equipment can be continuously upgraded, and the maintenance cost of the system firmware is reduced.
The upgrade apparatus of the system firmware in the embodiment of the present invention is described in detail above in fig. 4 from the point of view of the modularized functional entity, and the upgrade device of the system firmware in the embodiment of the present invention is described in detail below from the point of view of hardware processing.
Fig. 5 is a schematic structural diagram of an upgrade apparatus for system firmware, where upgrade apparatus 500 for system firmware may have a relatively large difference due to configuration or performance, and may include one or more processors (central processing units, CPU) 510 (e.g., one or more processors) and memory 520, and one or more storage media 530 (e.g., one or more mass storage devices) storing applications 533 or data 532 according to an embodiment of the present invention. Wherein memory 520 and storage medium 530 may be transitory or persistent storage. The program stored in the storage medium 530 may include one or more modules (not shown), each of which may include a series of instruction operations in the upgrade apparatus 500 for system firmware. Still further, the processor 510 may be configured to communicate with the storage medium 530 and execute a series of instruction operations in the storage medium 530 on the upgrade apparatus 500 of the system firmware.
The system firmware based upgrade apparatus 500 may also include one or more power supplies 540, one or more wired or wireless network interfaces 550, one or more input/output interfaces 560, and/or one or more operating systems 531, such as Windows Serve, mac OS X, unix, linux, freeBSD, and the like. Those skilled in the art will appreciate that the upgrade apparatus structure of the system firmware illustrated in fig. 5 does not constitute a limitation of the upgrade apparatus based on the system firmware, and may include more or fewer components than illustrated, or may combine certain components, or may be a different arrangement of components.
The present invention also provides a computer readable storage medium, which may be a non-volatile computer readable storage medium, or may be a volatile computer readable storage medium, where instructions are stored in the computer readable storage medium, which when executed on a computer, cause the computer to perform the steps of the method for upgrading system firmware.
It will be clearly understood by those skilled in the art that, for convenience and brevity of description, the specific working process of the system or apparatus and unit described above may refer to the corresponding process in the foregoing method embodiment, which is not repeated herein.
The integrated units, if implemented in the form of software functional units and sold or used as stand-alone products, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present invention may be embodied essentially or in part or all of the technical solution or in part in the form of a software product stored in a storage medium, including instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to perform all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a read-only memory (ROM), a random access memory (random access memory, RAM), a magnetic disk, or an optical disk, or other various media capable of storing program codes.
The above embodiments are only for illustrating the technical solution of the present invention, and not for limiting the same; although the invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical scheme described in the foregoing embodiments can be modified or some technical features thereof can be replaced by equivalents; such modifications and substitutions do not depart from the spirit and scope of the technical solutions of the embodiments of the present invention.

Claims (10)

1. The upgrading method of the system firmware is characterized by comprising the following steps of:
when an upgrade instruction is detected, downloading new firmware to a backup area according to the upgrade instruction;
determining whether the new firmware is complete;
when the new firmware is complete, performing cyclic redundancy check on the new firmware;
and when the result of the cyclic redundancy check is correct, transferring the new firmware to a main partition and operating.
2. The method for upgrading system firmware according to claim 1, wherein the step of downloading new firmware to the backup area according to the upgrade instruction when the upgrade instruction is detected comprises:
when the upgrade instruction is detected, downloading the new firmware to the RAM according to the upgrade instruction;
writing the size of the new firmware into the last four bytes of Flash and transferring the new firmware to the backup area;
the step of performing cyclic redundancy check on the new firmware when the new firmware is complete includes:
and when the new firmware is complete, performing cyclic redundancy check on the new firmware according to the last four bytes of the Flash.
3. The method for upgrading system firmware according to claim 1, wherein the step of downloading new firmware to the backup area according to the upgrade instruction when the upgrade instruction is detected comprises:
when the upgrade instruction is detected, downloading the new firmware to the backup area according to the upgrade instruction and writing the new firmware into the last four bytes of Flash;
the step of performing cyclic redundancy check on the new firmware when the new firmware is complete includes:
and when the new firmware is complete, performing cyclic redundancy check on the new firmware according to the last four bytes of the Flash.
4. The method of upgrading system firmware according to claim 1, wherein the step of determining whether the new firmware is complete comprises:
identifying whether the new firmware is broken;
when the new firmware is damaged, continuing to run the historical firmware of the main partition;
and when the new firmware is not damaged, executing the step of determining whether the new firmware is complete.
5. The method of upgrading system firmware according to claim 1, wherein the step of determining whether the new firmware is complete comprises:
identifying whether the new firmware is broken;
when the new firmware is damaged, returning to execute the step of downloading the new firmware to the backup area according to the upgrading instruction;
and when the new firmware is not damaged, executing the step of determining whether the new firmware is complete.
6. The method for upgrading system firmware according to claim 1, wherein the step of transferring the new firmware to the main partition when the result of the cyclic redundancy check is correct includes:
copying the new firmware to the main partition when the result of the cyclic redundancy check is correct;
and erasing the new firmware of the backup area.
7. The method for upgrading system firmware according to claim 1, wherein after the step of performing cyclic redundancy check on the new firmware when the new firmware is complete, the method further comprises:
when the result of the cyclic redundancy check is an error, erasing the new firmware of the backup area and returning to execute the step of downloading the new firmware to the backup area according to the upgrading instruction;
and outputting prompt information of verification problem of the firmware security packet when the result of the cyclic redundancy check is in secondary error.
8. An upgrade apparatus for system firmware, wherein the upgrade apparatus for system firmware comprises:
the downloading module is used for downloading the new firmware to the backup area according to the upgrading instruction when the upgrading instruction is detected;
a determining module, configured to determine whether the new firmware is complete;
the verification module is used for carrying out cyclic redundancy verification on the new firmware when the new firmware is complete;
and the transfer module is used for transferring the new firmware to the main partition when the result of the cyclic redundancy check is correct.
9. An upgrade apparatus for system firmware, characterized in that the upgrade apparatus for system firmware comprises: a memory and at least one processor, the memory having instructions stored therein, the memory and the at least one processor being interconnected by a line;
the at least one processor invoking the instructions in the memory to cause an upgrade apparatus of the system firmware to perform the upgrade method of the system firmware of any of claims 1-7.
10. A computer readable storage medium having stored thereon a computer program, wherein the computer program when executed by a processor implements a method of upgrading system firmware according to any of claims 1-7.
CN202310029200.9A 2023-01-09 2023-01-09 Upgrading method, device, equipment and storage medium of system firmware Pending CN116301963A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310029200.9A CN116301963A (en) 2023-01-09 2023-01-09 Upgrading method, device, equipment and storage medium of system firmware

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310029200.9A CN116301963A (en) 2023-01-09 2023-01-09 Upgrading method, device, equipment and storage medium of system firmware

Publications (1)

Publication Number Publication Date
CN116301963A true CN116301963A (en) 2023-06-23

Family

ID=86794934

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310029200.9A Pending CN116301963A (en) 2023-01-09 2023-01-09 Upgrading method, device, equipment and storage medium of system firmware

Country Status (1)

Country Link
CN (1) CN116301963A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116932006A (en) * 2023-08-30 2023-10-24 上海合芯数字科技有限公司 Firmware updating operation method and system of BMC
CN117880789A (en) * 2024-03-13 2024-04-12 四川九通智路科技有限公司 Bluetooth-based remote information upgrading method for Internet of things on-vehicle dimming system

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116932006A (en) * 2023-08-30 2023-10-24 上海合芯数字科技有限公司 Firmware updating operation method and system of BMC
CN117880789A (en) * 2024-03-13 2024-04-12 四川九通智路科技有限公司 Bluetooth-based remote information upgrading method for Internet of things on-vehicle dimming system
CN117880789B (en) * 2024-03-13 2024-05-03 四川九通智路科技有限公司 Bluetooth-based remote information upgrading method for Internet of things on-vehicle dimming system

Similar Documents

Publication Publication Date Title
CN116301963A (en) Upgrading method, device, equipment and storage medium of system firmware
US8504904B2 (en) Validating objects in a data storage system
CN109831487B (en) Fragmented file verification method and terminal equipment
US8196110B2 (en) Method and apparatus for verifying a suspect return pointer in a stack
US7536540B2 (en) Method of hardware driver integrity check of memory card controller firmware
US9002812B2 (en) Checksum and hashing operations resilient to malicious input data
US8266691B2 (en) Renewable integrity rooted system
US11163886B2 (en) Information handling system firmware bit error detection and correction
US20030226021A1 (en) Data comparison process
US8977902B2 (en) Integrity checking including side channel monitoring
CN1926518A (en) Autonomous memory checker for runtime security assurance and method therefore
WO2011142095A1 (en) Information processing device and information processing method
EP2088529A2 (en) System and method for securing and executing a flash routine
WO2014203031A1 (en) Device and method for executing a program, and method for storing a program
US11232194B2 (en) Method for executing a binary code of a secure function with a microprocessor
CN101901316B (en) Data integrity protection method based on Bloom filter
US10489244B2 (en) Systems and methods for detecting and correcting memory corruptions in software
US8839062B2 (en) Incremental modification of an error detection code background of the invention
CN111045856A (en) Method, apparatus and computer program product for managing application systems
US8196026B2 (en) Method and computer unit for error detection and logging in a memory
CN108959915B (en) Rootkit detection method, rootkit detection device and server
US11263313B2 (en) Securing execution of a program
US7954034B1 (en) Method of and system for protecting data during conversion from an ECC protection scheme to a parity protection scheme
CN108572882B (en) Data storage method and storage device
CN112416891B (en) Data detection method, device, electronic equipment and readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination