CN102662706A - Method for remotely reliably upgrading XIP (execute in place) chip software - Google Patents
Method for remotely reliably upgrading XIP (execute in place) chip software Download PDFInfo
- Publication number
- CN102662706A CN102662706A CN2012100928942A CN201210092894A CN102662706A CN 102662706 A CN102662706 A CN 102662706A CN 2012100928942 A CN2012100928942 A CN 2012100928942A CN 201210092894 A CN201210092894 A CN 201210092894A CN 102662706 A CN102662706 A CN 102662706A
- Authority
- CN
- China
- Prior art keywords
- firmware
- xip
- upgrading
- chip
- app
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Landscapes
- Stored Programmes (AREA)
Abstract
The invention discloses a method for remotely reliably upgrading XIP (execute in place) chip software. The method aims to upgrade products designed on the basis of an XIP chip and provided with a GPRS (general packet radio service) or 3G (third generation) network or a WIFI (wireless fidelity) module. When upgrading firmware of the products, the firmware can be upgraded directly remotely through the network, and upgrading failure caused by power outage or other factors during upgrading can be avoided, and reliable upgrading can be guaranteed. Meanwhile, by the method, BOOT function definition is simplified, and downloading the firmware from a server in the BOOT area is omitted. The method can remotely reliably upgrade the XIP chip, and cost for field upgrading by operators can be evidently reduced, and the problem that the firmware cannot be reset caused by power outage during upgrading is avoided.
Description
Technical field
The invention belongs to electronic information technical field, relate to a kind of method of the XIP of upgrading chip software, especially a kind of method of long-range reliable upgrading XIP chip software.
Background technology
At automotive electronics or industrial control field; For safe and reliable; Use has a large amount of XIP chips; Because the software of XIP (execute in place) chip directly moves in Flash, can't guarantee reliable read write flash upgrading in the operational process, major part need be upgraded in 4S shop maintenance process.Legacy network upgrading is through retreating to BOOT district, and download and upgrade requires equipment internal battery or device power supply (DPS) to stablize again.
Therefore, a kind of mode that can long-range reliable upgrading is continued in this area, realizes that the long-range reliable upgrading of this series products can significantly reduce the cost of operating personnel to field upgrade, and avoids because the problem that the firmware that outage causes in the escalation process can't recover.
Summary of the invention
The objective of the invention is to overcome the shortcoming of above-mentioned prior art; A kind of method of long-range reliable upgrading XIP chip software is provided; This method can realize the long-range reliable upgrading of XIP chip and can significantly reduce the cost of operating personnel to field upgrade, avoid because the problem that the firmware that outage causes in the escalation process can't recover.
The objective of the invention is to solve through following technical scheme:
The method of this long-range reliable upgrading XIP chip software may further comprise the steps:
1) downloads redaction APP firmware through wireless network;
2) subregion marks two isolated areas that can deposit the APP firmware in external storage medium, and wherein zone 1 is used for the firmware updating of redaction, and zone 2 is used to store the firmware of current version; With redaction APP firmware stores in external storage medium;
3) backup to the APP firmware of current version in the zone 2 of external storage medium and check errorless;
4) the upgrading sign is set;
5) restart the XIP chip and get into BOOT;
6) detect the upgrading sign, if then jump to the 7th) step; Then jump to the 9th if not) step;
7) begin to detect in the external storage medium whether the APP firmware in zone 1 complete, whether version than new in the XIP chip; If firmware is complete and newly then jump to the 8th than APP firmware in the XIP chip) step; Then redirect the 9th if not) step;
8) firmware of redaction is write in the XIP chip, and detection writes success;
9) remove the upgrading sign;
Whether the APP software that 10) detects in the XIP chip is complete, if then jump to the 12nd) step;
11) the APP firmware of backup is write in the XIP chip, and detection writes success;
12) jump to the operation of APP firmware.
Above-mentioned wireless network is GPRS, 3G network or WIFI module.
Above-mentioned external storage medium is EEPROM, SPI Flash or N or Flash.
The integrality detection method of the APP firmware in the above method is: define the file layout of APP firmware, need deposit in fixing position the CRC check code of identifier, firmware length, firmware in the APP firmware, utilize the CRC check sign indicating number to guarantee that firmware is errorless.
Above-mentioned CRC check sign indicating number is with MD5 check code, SHA1 check code or self-defined reliable check code replacement.
Compared with prior art, the present invention has following beneficial effect:
The method of long-range reliable upgrading XIP chip software of the present invention is based on the remote upgrade method of disaster tolerance Flash backup, though need take the certain space of external storage medium in the equipment.But directly through the network remote upgrading, this upgrade method is simplified the BOOT functional definition, need be in the BOOT district from the downloaded firmware for it.Through to the long-range reliable upgrading of XIP chip, effectively avoided because the unit exception that outage causes in the escalation process has significantly reduced the cost of upgrade maintenance personnel to field upgrade.
Description of drawings
Fig. 1 is a FB(flow block) of the present invention.
Embodiment
Below in conjunction with accompanying drawing the present invention is done and to describe in further detail:
Referring to Fig. 1; The method of long-range reliable upgrading XIP chip software of the present invention; Can be described as remote upgrade method based on disaster tolerance Flash backup; Be that it is to the product based on the XIP chip design, and have GPRS or 3G or network or WIFI module, need take the certain space of external storage medium in the equipment.It specifically carries out according to following steps:
1) downloads redaction APP firmware through wireless network; Said wireless network can be GPRS, 3G network or WIFI module.
2) subregion marks two isolated areas that can deposit the APP firmware in external storage medium, and wherein zone 1 is used for the firmware updating of redaction, and zone 2 is used to store the firmware of current version; With redaction APP firmware stores in external storage medium; Said external storage medium can be EEPROM, SPI Flash or Nor Flash.
3) backup to the APP firmware of current version in the zone 2 of external storage medium and check errorless;
4) the upgrading sign is set;
5) restart the XIP chip and get into BOOT;
6) detect the upgrading sign, if then jump to the 7th) step; Then jump to the 9th if not) step;
7) begin to detect in the external storage medium whether the APP firmware in zone 1 complete, whether version than new in the XIP chip; If firmware is complete and newly then jump to the 8th than APP firmware in the XIP chip) step; Then redirect the 9th if not) step;
8) firmware of redaction is write in the XIP chip, and detection writes success;
9) remove the upgrading sign;
Whether the APP software that 10) detects in the XIP chip is complete, if then jump to the 12nd) step;
11) the APP firmware of backup is write in the XIP chip, and detection writes success;
12) jump to the operation of APP firmware.
Should note some key link in the remote upgrade method of the present invention:
A) integrity detection of firmware: need the file layout of definition APP firmware, need to deposit the CRC check sign indicating number of identifier, firmware length, firmware in the APP firmware, utilize the CRC check sign indicating number to guarantee that firmware is errorless in fixing position; The CRC check sign indicating number, available MD5 check code, SHA1 check code or other self-defined reliable check code replacement.
B) mark two isolated areas that can deposit the APP firmware at external Flash medium subregion, wherein zone 1 is used for the firmware updating of redaction, and zone 2 is used to store the firmware of current version;
C) XIP chip production firmware divides two types of zone: BOOT and APP, wherein the regional zone of at first moving for the XIP chip power of BOOT.Its two allomeric function flow process is shown in the following figure, and the left side is the BOOT flow process, and the right side is the APP flow process; BOOT zone require to dispatch from the factory back firmware and the sector added the protection sign;
D) through GPRS or 3G or network or WIFI module download redaction APP firmware, and be saved in zone 1, backup current version firmware arrives zone 2 before starting upgrading.
Claims (5)
1. the method for a long-range reliable upgrading XIP chip software is characterized in that, may further comprise the steps:
1) downloads redaction APP firmware through wireless network;
2) subregion marks two isolated areas that can deposit the APP firmware in external storage medium, and wherein zone 1 is used for the firmware updating of redaction, and zone 2 is used to store the firmware of current version; With redaction APP firmware stores in external storage medium;
3) backup to the APP firmware of current version in the zone 2 of external storage medium and check errorless;
4) the upgrading sign is set;
5) restart the XIP chip and get into BOOT;
6) detect the upgrading sign, if then jump to the 7th) step; Then jump to the 9th if not) step;
7) begin to detect in the external storage medium whether the APP firmware in zone 1 complete, whether version than new in the XIP chip; If firmware is complete and newly then jump to the 8th than APP firmware in the XIP chip) step; Then redirect the 9th if not) step;
8) firmware of redaction is write in the XIP chip, and detection writes success;
9) remove the upgrading sign;
Whether the APP software that 10) detects in the XIP chip is complete, if then jump to the 12nd) step, then carry out the 11st if not) step;
11) the APP firmware of backup is write in the XIP chip, and detection writes success;
12) jump to the operation of APP firmware.
2. the method for long-range reliable upgrading XIP chip software according to claim 1 is characterized in that said wireless network is GPRS, 3G network or WIFI module.
3. the method for long-range reliable upgrading XIP chip software according to claim 1 is characterized in that said external storage medium is EEPROM, SPI Flash or N or Flash.
4. the method for long-range reliable upgrading XIP chip software according to claim 1; It is characterized in that; The integrality detection method of APP firmware is: the file layout of definition APP firmware; Need to deposit the CRC check sign indicating number of identifier, firmware length, firmware in the APP firmware, utilize the CRC check sign indicating number to guarantee that firmware is errorless in fixing position.
5. the method for long-range reliable upgrading XIP chip software according to claim 4 is characterized in that, said CRC check sign indicating number is with MD5 check code, SHA1 check code or self-defined reliable check code replacement.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2012100928942A CN102662706A (en) | 2012-04-01 | 2012-04-01 | Method for remotely reliably upgrading XIP (execute in place) chip software |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2012100928942A CN102662706A (en) | 2012-04-01 | 2012-04-01 | Method for remotely reliably upgrading XIP (execute in place) chip software |
Publications (1)
Publication Number | Publication Date |
---|---|
CN102662706A true CN102662706A (en) | 2012-09-12 |
Family
ID=46772207
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2012100928942A Pending CN102662706A (en) | 2012-04-01 | 2012-04-01 | Method for remotely reliably upgrading XIP (execute in place) chip software |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN102662706A (en) |
Cited By (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102955710A (en) * | 2012-11-23 | 2013-03-06 | 深圳市航盛电子股份有限公司 | Method for upgrading vehicle-mounted terminal firmware based on GPRS (General Packet Radio Service) channel |
CN103530146A (en) * | 2013-09-16 | 2014-01-22 | 成都交大光芒科技股份有限公司 | Low-power-consumption embedded device remote wireless updating method |
CN103853565A (en) * | 2012-11-28 | 2014-06-11 | 京信通信系统(中国)有限公司 | Method and device for firmware upgrading based on ARM |
CN103902309A (en) * | 2012-12-27 | 2014-07-02 | 龙尚智联通信科技(上海)有限公司 | Method for remotely upgrading wireless module firmware |
CN104166450A (en) * | 2014-08-20 | 2014-11-26 | 浪潮电子信息产业股份有限公司 | Method for distinguishing FW versions of VR chip |
CN104331312A (en) * | 2014-11-24 | 2015-02-04 | 东软熙康健康科技有限公司 | Firmware updating method and embedded device |
CN104484200A (en) * | 2014-12-09 | 2015-04-01 | 小米科技有限责任公司 | Method and device for updating firmware |
CN104536796A (en) * | 2015-01-28 | 2015-04-22 | 浪潮电子信息产业股份有限公司 | VR Firmware remote out-of-band burn method based on BMC |
CN105117251A (en) * | 2015-08-25 | 2015-12-02 | 浪潮电子信息产业股份有限公司 | Design method for remotely refreshing power supply FIRMWARE in add-on chip |
CN105302599A (en) * | 2015-10-15 | 2016-02-03 | 珠海格力电器股份有限公司 | Display board program updating method and apparatus |
CN106095474A (en) * | 2015-04-28 | 2016-11-09 | 罗伯特·博世有限公司 | For the method and apparatus updating the software in means of transport |
CN106897092A (en) * | 2017-02-23 | 2017-06-27 | 深圳市英威腾电气股份有限公司 | A kind of remote software upgrade method and controller |
CN107196810A (en) * | 2017-07-10 | 2017-09-22 | 苏州德铂思电子科技有限公司 | It is a kind of can with Remote configuration and upgrading interchanger communication apparatus |
CN109710458A (en) * | 2018-12-13 | 2019-05-03 | 北京长城华冠汽车技术开发有限公司 | Software rollback method and system after a kind of upgrading failure of communication module |
CN109901867A (en) * | 2019-02-14 | 2019-06-18 | 浙江中控太阳能技术有限公司 | BOOT area code online upgrading method and heliostat controller and heliostat |
CN111258600A (en) * | 2019-11-21 | 2020-06-09 | 华立科技股份有限公司 | Mirror image type embedded program firmware upgrading method |
US11442718B2 (en) | 2020-09-29 | 2022-09-13 | Realtek Semiconductor Corp. | Embedded system and method of controlling non-volatile memory to perform firmware update |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050144616A1 (en) * | 2003-10-27 | 2005-06-30 | Hammond Brad T. | System and method for updating a software program |
CN101436138A (en) * | 2007-11-16 | 2009-05-20 | 苏州科达通信技术发展有限公司 | Control device and control method for software upgrade and dynamic rolling back |
CN101807149A (en) * | 2009-02-18 | 2010-08-18 | 联咏科技股份有限公司 | Firmware updating method capable of restoring firmware safely and embedded electronic device of firmware |
-
2012
- 2012-04-01 CN CN2012100928942A patent/CN102662706A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050144616A1 (en) * | 2003-10-27 | 2005-06-30 | Hammond Brad T. | System and method for updating a software program |
CN101436138A (en) * | 2007-11-16 | 2009-05-20 | 苏州科达通信技术发展有限公司 | Control device and control method for software upgrade and dynamic rolling back |
CN101807149A (en) * | 2009-02-18 | 2010-08-18 | 联咏科技股份有限公司 | Firmware updating method capable of restoring firmware safely and embedded electronic device of firmware |
Cited By (21)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102955710A (en) * | 2012-11-23 | 2013-03-06 | 深圳市航盛电子股份有限公司 | Method for upgrading vehicle-mounted terminal firmware based on GPRS (General Packet Radio Service) channel |
CN103853565A (en) * | 2012-11-28 | 2014-06-11 | 京信通信系统(中国)有限公司 | Method and device for firmware upgrading based on ARM |
CN103902309A (en) * | 2012-12-27 | 2014-07-02 | 龙尚智联通信科技(上海)有限公司 | Method for remotely upgrading wireless module firmware |
CN103530146B (en) * | 2013-09-16 | 2016-09-07 | 成都交大光芒科技股份有限公司 | Low-power-consumption embedded equipment remote radio upgrade method |
CN103530146A (en) * | 2013-09-16 | 2014-01-22 | 成都交大光芒科技股份有限公司 | Low-power-consumption embedded device remote wireless updating method |
CN104166450A (en) * | 2014-08-20 | 2014-11-26 | 浪潮电子信息产业股份有限公司 | Method for distinguishing FW versions of VR chip |
CN104331312A (en) * | 2014-11-24 | 2015-02-04 | 东软熙康健康科技有限公司 | Firmware updating method and embedded device |
CN104331312B (en) * | 2014-11-24 | 2018-04-27 | 东软熙康健康科技有限公司 | A kind of firmware upgrade method and embedded device |
CN104484200A (en) * | 2014-12-09 | 2015-04-01 | 小米科技有限责任公司 | Method and device for updating firmware |
CN104536796A (en) * | 2015-01-28 | 2015-04-22 | 浪潮电子信息产业股份有限公司 | VR Firmware remote out-of-band burn method based on BMC |
CN106095474A (en) * | 2015-04-28 | 2016-11-09 | 罗伯特·博世有限公司 | For the method and apparatus updating the software in means of transport |
CN105117251A (en) * | 2015-08-25 | 2015-12-02 | 浪潮电子信息产业股份有限公司 | Design method for remotely refreshing power supply FIRMWARE in add-on chip |
CN105302599A (en) * | 2015-10-15 | 2016-02-03 | 珠海格力电器股份有限公司 | Display board program updating method and apparatus |
CN106897092A (en) * | 2017-02-23 | 2017-06-27 | 深圳市英威腾电气股份有限公司 | A kind of remote software upgrade method and controller |
CN107196810A (en) * | 2017-07-10 | 2017-09-22 | 苏州德铂思电子科技有限公司 | It is a kind of can with Remote configuration and upgrading interchanger communication apparatus |
CN109710458A (en) * | 2018-12-13 | 2019-05-03 | 北京长城华冠汽车技术开发有限公司 | Software rollback method and system after a kind of upgrading failure of communication module |
CN109901867A (en) * | 2019-02-14 | 2019-06-18 | 浙江中控太阳能技术有限公司 | BOOT area code online upgrading method and heliostat controller and heliostat |
CN109901867B (en) * | 2019-02-14 | 2022-07-26 | 浙江可胜技术股份有限公司 | BOOT area code online upgrading method, heliostat controller and heliostat |
CN111258600A (en) * | 2019-11-21 | 2020-06-09 | 华立科技股份有限公司 | Mirror image type embedded program firmware upgrading method |
US11442718B2 (en) | 2020-09-29 | 2022-09-13 | Realtek Semiconductor Corp. | Embedded system and method of controlling non-volatile memory to perform firmware update |
TWI805946B (en) * | 2020-09-29 | 2023-06-21 | 瑞昱半導體股份有限公司 | Embedded system and method of controlling non-volatile memory |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102662706A (en) | Method for remotely reliably upgrading XIP (execute in place) chip software | |
CN103176824B (en) | A kind of method and device of system upgrade | |
CN104007996B (en) | The authentic firmware upgrading of a kind of dcs realizes method | |
EP2456257B1 (en) | Method and system for upgrading wireless data card | |
CN103777983A (en) | Satellite-borne software in-orbit maintaining and upgrading method | |
CN106610840A (en) | FOTA (Firmware Over-The-Air) upgrade method and system | |
RU2012134261A (en) | VEHICLE SOFTWARE UPDATE SYSTEM | |
CN104144466A (en) | Access method for sensor in Internet of Things, Internet of Things system and server | |
CN103957244A (en) | Remote program upgrading method and server | |
CN102693139A (en) | Method and system for wirelessly upgrading mobile phone software | |
CN104199706A (en) | Firmware upgrade method and device for eMMC | |
CN103218242B (en) | A kind of method of automatic renewal | |
KR101327680B1 (en) | Apparatus, system and method for upgrading firmware of energy device | |
CN101867916A (en) | Method for realizing air update of vehicle terminal | |
CN104714811A (en) | Method and device for manufacturing difference upgrade package and system difference upgrade method and device | |
CN104461654A (en) | OBD equipment function unit and firmware classification optional upgrading method | |
CN103296633B (en) | Digital protective relay and safeguard the method for its firmware | |
KR20100063474A (en) | Method and system for providing fota service | |
CN102404366A (en) | Method for achieving long-distance wireless file-upgrading system | |
CN109582337A (en) | A kind of method, apparatus and computer readable storage medium of firmware upgrade | |
CN102326150A (en) | Signal conditioning package, information handling system, information processing method and program recorded medium | |
CN103108024A (en) | Incremental downloading method for multi-media self-service terminal | |
CN102883309A (en) | Method and device for machine-to-machine (M2M) communication | |
CN105590061A (en) | Updating method of safety operation system for credible execution environment | |
CN107222527B (en) | Method for controlling internet of things equipment to operate in different modes through configuration file |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C02 | Deemed withdrawal of patent application after publication (patent law 2001) | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20120912 |