CN103207797A - Capsule type customized updating method based on universal extensible firmware interface firmware system - Google Patents

Capsule type customized updating method based on universal extensible firmware interface firmware system Download PDF

Info

Publication number
CN103207797A
CN103207797A CN2013100839591A CN201310083959A CN103207797A CN 103207797 A CN103207797 A CN 103207797A CN 2013100839591 A CN2013100839591 A CN 2013100839591A CN 201310083959 A CN201310083959 A CN 201310083959A CN 103207797 A CN103207797 A CN 103207797A
Authority
CN
China
Prior art keywords
firmware
capsule
uefi
file
fixer
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2013100839591A
Other languages
Chinese (zh)
Other versions
CN103207797B (en
Inventor
杜振龙
沙光侠
李晓丽
吴彦君
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing Tech University
Original Assignee
Nanjing Tech University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing Tech University filed Critical Nanjing Tech University
Priority to CN 201310083959 priority Critical patent/CN103207797B/en
Publication of CN103207797A publication Critical patent/CN103207797A/en
Application granted granted Critical
Publication of CN103207797B publication Critical patent/CN103207797B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Stored Programmes (AREA)

Abstract

The invention provides a Capsule type customized updating method based on a universal extensible firmware interface firmware system, which is based on a Capsule mechanism of a universal extensible firmware interface UEFI firmware system, gets rid of the dependence of the current mainstream firmware updating technology on system management interrupt SMI drive, obtains a firmware volume FV module to be updated by analyzing the Capsule, identifies the FV module, and writes the acquired data into a target address of a firmware file system, thereby realizing the updating of the selected FV and getting rid of the conventional method of updating the whole BIOS. The Capsule mechanism solves the problem that the updating tools cannot be unified on different hardware platforms and operating systems. The firmware updating method has the advantages of flexibility and high application value. The method can be applied to the aspects of firmware remote refreshing, firmware automatic recovery and the like.

Description

Capsule-type customization update method based on general Extensible Firmware Interface fixer system
Technical field
The invention belongs to the software upgrading technical field of computer software engineering technology, specifically refer to the capsule-type customization update method based on general Extensible Firmware Interface fixer system.
Background technology
Along with cloud computing etc. is used deeply based on the related service of internet, the client firmware customization becomes new application focus in the fields such as card Securities, finance, telecommunications.Such as embedded products such as the network equipment and self-assistant information service terminals, need make equipment have unique function rather than as multi-purpose computer, come work.Therefore the system development merchant seeks just day by day by increasing more characteristic, so that product has differentiation and obtain competitive edge, and fixer system is strengthen this specific character desirable local.As user interface, guide fast and increase special function etc.But the problem that the singularity of these industries is brought thereupon is that the firmware renewal is more frequent, yet present firmware renewal technology refreshes at whole Basic Input or Output System (BIOS) (BIOS).And in the actual application, only need be to certain part drives among the BIOS, application module upgrades or add and just can meet the demands, traditional firmware update mode inefficiency that seems in this case.
Present update mechanism needs CPU to support SMM (System Management Mode) System Management Mode.Entering the SMM pattern is to be caused by look-at-me SMI, and SMI by processor SMI# pin signal effectively or receive the message of advanced programmable controller APIC bus.It is maskable external interrupt and be independent of other interruption and abnormality processing not.When processor is checked through SMI, wait for that all instructions are carried out and memory access deposits the current processor context in after finishing and cuts SMM pattern execution SMI handling procedure among the SMRAM then.Adopt the support that SMI drives among the BIOS that places one's entire reliance upon of the method for refreshing of this technology, so the success ratio that refreshes of the reliability effect firmware of SMI driver.
The prior art feature introduction that the present invention relates to:
UEFI: be used for software interface between defining operation system and the system firmware, the interface of being responsible for Power-On Self-Test, attended operation system and attended operation system and hardware being provided.The UEFI framework has the advantages such as support of the programming of C language, modular design, graphic interface, file system.The UEFI technology has incorporated many characteristics of embedded OS, the device drives development model (EFI Driver Model) that oneself is arranged as UEFI, reduced the burden that hardware vendor's development equipment drives on the one hand, on the other hand, for different hardware devices provides extendible interface.In addition, UEFI has own shell (UEFI Shell), and the developer can develop application program miscellaneous.The UEFI standard is divided into before the os starting: safeguard protection stage (SEC), context initialization phase (PEI), driving execution environment stage (DXE) and guiding device choice phase (BDS) four-stage; describe in detail system from power up, processor initialization, hardware initialization, judgement start the path, system strategy is set, user's configuration interface, to the detailed process that enters operating system.
Capsule: the skimble-scamble problem of interface when carrying out data transmission in order to solve different operating system and fixer system, UEFI has defined a kind of data structure of variable-length.Allow in operating system, data to be passed to the UEFI firmware by it, realize as functions such as modification BIOS parameters.The UEFI standard calls Capsule to the data structure of this type of variable-length.
Firmware binaries file after UEFI firmware file system (Firmware File System): the UEFI compiling is called FD (Firmware Device) file, and it is made up of a series of firmware volume FV (Firmware Volume).FV mainly contains two types: system FV, and its purpose is mainly deposited firmware code, as hardware driving, application program; Non-volatile memories FV is mainly used in storage system variable, configuration file, daily record etc.The appearance of firmware file system make can be in limited firmware stores space memory module driving file more effectively.
EDK II: be up-to-date BIOS development platform framework.
Flash: the storer of preserving UEFI firmware file system.
Tradition firmware renewal technology exists hardware platform, refresh tool and can't unify between different platform, can not customize renewal to specifying firmware driving, firmware application programs; The conventional brush new mechanism depends critically upon system management interrupt SMI(System Management Interrupt among the BIOS) support that drives, so the success ratio that refreshes of the reliability effect firmware of SMI driver.
Summary of the invention
Technical matters to be solved by this invention is to overcome the deficiencies in the prior art, proposes the capsule-type customization update method based on general Extensible Firmware Interface fixer system; The Capsule standard that described method utilizes UEFI to provide is identified firmware volume FV module in firmware layer, the data of obtaining is write the method for firmware file aims of systems address, and do not need entire flash is upgraded.This technology can solve traditional firmware hardware, operating system are relied on problem, realizes the renewal of appointed function module, and practicality is stronger.
In order to solve the problems of the technologies described above, the technical solution adopted in the present invention is:
Based on the capsule-type customization update method of general Extensible Firmware Interface fixer system, described capsule Capsule formula customization update method is divided into two parts: refresh routine in refresh routine, the UEFI fixer system under the operating system; Described method comprises the steps:
Steps A is utilized Extensible Firmware Interface Development Framework EDK II compiling standard, and the firmware volume FV module that needs are upgraded compiles, and firmware volume FV is packaged into capsule Capsule;
Step B, refresh routine finds the position of firmware volume FV among the Capsule under the operating system by capsule Capsule header structure body, judge whether that according to the current free memory situation of system needs carry out piecemeal to Capsule, piecemeal then is divided into littler data cell capsule SubCapsule if desired, and is each capsule SubCapsule storage allocation space, unit;
Step C, refresh routine arranges computing machine and enters the S3 sleep state under the operating system, wakes up by the real-time clock setting, enters the UEFI fixer system, utilize the characteristics that internal storage data is not lost in the computing machine sleep state, the unit capsule SubCapsule in the UEFI fixer system access memory;
Step D, the UEFI fixer system was identified and merge cells capsule SubCapsule in the context initialization PEI stage, obtain complete capsule Capsule, location address and the relevant information such as size of the Capsule after merging in internal memory write handing-over piece HOB (Hand-off Block) chained list;
Step e, the UEFI fixer system is driving the execution environment DXE stage, utilizes handing-over piece HOB chained list to resolve Capsule, extracts the FV module that is kept at wherein, the verification by FV and judge whether FV is legal, and read wherein driving or application program;
Step F is called the driving that drives the execution environment DXE stage among the UEFI and is distributed loading Dispatch to serve, and the dependence between judgement drives is found and execution UEFI firmware renewal driving according to correct order;
Step G, the UEFI firmware upgrades to drive and reads firmware image location of content figure Flash map, obtain firmware volume FV to be updated positional information in firmware binaries file FD, last UEFI firmware upgrades to drive firmware volume FV module to be updated in the internal memory is write among the firmware binaries file FD.
In the described steps A, described Extensible Firmware Interface Development Framework EDK II compiling standard is the FD file by the firmware binaries file after this standard compiling, and described FD file comprises firmware volume FV, and described FV is the elementary cell of storage code and data; The position of each FV in the firmware binaries file is described by firmware image location of content figure Flash Map.
Among the described step C, described handing-over piece HOB chained list is one group of data block, and this data block is used for data are delivered to the execution environment DXE stage that drives from the initialization preparation layer PEI stage.
The invention has the beneficial effects as follows: the present invention proposes the capsule-type customization update method based on general Extensible Firmware Interface fixer system, described method is based on the capsule Capsule mechanism of general Extensible Firmware Interface UEFI fixer system, break away from present main flow firmware renewal technology and relied on system management interrupt SMI driving, by Capsule is resolved, obtain firmware volume FV module to be updated, and the FV module identified, the data of obtaining are write firmware file aims of systems address, thereby realize selected FV is upgraded, broken away from needs whole BIOS method for updating in the past.Capsule mechanism has solved the problem that more new tool can't be unified on different hardware platforms, operating system.This firmware update has more dirigibility, using value height.Can be applicable to aspects such as firmware remote reflash, the automatic recovery of firmware.
 
Description of drawings
Fig. 1 is renewal process flow diagram of the present invention.
Fig. 2 is renewal frame diagram of the present invention.
Embodiment
Below in conjunction with accompanying drawing, the capsule-type customization update method based on general Extensible Firmware Interface fixer system that the present invention is proposed is elaborated:
The present invention is based on the capsule-type customization update method of general Extensible Firmware Interface fixer system, Fig. 1 is the renewal process flow diagram of described method, and by EDK II compiling standard, the FV module that needs are upgraded compiles, and FV is packaged into Capsule.In UEFI fixer system start-up course, Capsule is resolved, and obtain start address and the size of FV in Flash, thereby reach the designing requirement that selected FV is upgraded.Concrete steps are as follows:
Step (1): according to EDK II compiling standard, the FV module that needs are upgraded compiles, and FV is packaged into Capsule.
Step (2): refresh routine finds the position of firmware volume FV among the Capsule under the operating system by Capsule header structure body member, judge whether needs are carried out piecemeal to Capsule according to the current free memory situation of system, then be divided into littler data cell SubCapsule if desired, and be each data cell SubCapsule storage allocation space.
Step (3): computing machine is set enters the S3 sleep state, utilize the characteristics that internal storage data is not lost in the sleep state, wake back PC up and enter the UEFI fixer system.
Step (4): utilize the characteristics that internal storage data is not lost in the sleep state, wake back PC up and enter the UEFI fixer system, and merging the SubCapsule piece in the stage at subsequently PEI, make its recovery become a complete Capsule, location address and the size of the Capsule after merging in internal memory write handing-over piece HOB (Hand-off Block) chained list.
Step (5): the UEFI fixer system enters into the DXE stage.Remove to handle Capsule by parameters such as address in internal memory of the Capsule that from the HOB chained list, obtains, sizes, the FV that is kept at is wherein therefrom separated.Call the power function of UEFI FV is further resolved, effect and CheckSum by verification FV judge whether FV is legal, and reading and saving driving, application program therein.
Step (6): call DXE service Dispatch among the UEFI, this driving is added in the doubly linked list, and by judging the dependence between driving, the UEFI firmware that satisfies service requirement is upgraded driving add in the driving chained list of UEFI system, calculate entry address and the operation of driving by the traversal chained list.
Step (7): the UEFI firmware upgrades to drive and reads firmware image location of content figure Flash map, obtain FV to be updated relevant information such as position in Flash, and call the Device ID that FLASH chip supported protocol removes to attempt reading Flash, obtain corresponding Flash read-write and drive, call UEFI firmware renewal driving at last FV module to be updated in the internal memory is write Flash.
Transmission has following advantage based on the Capsule specification data: transmission mode between different operating system and the fixer system is unified; Data read is finished in fixer system, prevents unwarranted operational access under the operating system, improves security; Being not limited to variable informations such as systematic parameter in the data in the Capsule bag, also can be the executive routine in the UEFI fixer system, and it is more flexible that it is compared with other transmission modes.
Fig. 2 has provided the process synoptic diagram of this update method from operating system to the UEFI fixer system, as shown in the figure: under the operating system more new tool Capsule is carried out piecemeal, be each unit capsule SubCapsule storage allocation; Refresh routine arranges computing machine and enters the S3 sleep state under the operating system, and by real-time clock waking-up, computing machine enters the UEFI fixer system; Identify and merge cells capsule SubCapsule in the PEI stage of UEFI fixer system, obtain complete capsule Capsule; The UEFI fixer system enters the DXE stage, and resolve Capsule and extract the firmware volume FV module that is kept at wherein, and driving, the application program of reading and saving in firmware volume; Load and move the UEFI firmware that reads and upgrade driving, firmware volume FV module to be updated in the internal memory is write firmware binaries file FD.
The present invention can utilize Capsule mechanism to solve the problem that more new tool can't be unified on different hardware platforms, operating system effectively to specifying the FV module to upgrade.This firmware update has more dirigibility, using value height.Can be applicable to aspects such as firmware remote reflash, the automatic recovery of firmware.

Claims (3)

1. based on the capsule-type customization update method of general Extensible Firmware Interface fixer system, it is characterized in that this capsule-type customization update method comprises two parts: refresh routine in refresh routine, the UEFI fixer system under the operating system; Described method comprises the steps:
Steps A is utilized Extensible Firmware Interface Development Framework EDK II compiling standard, and the firmware volume FV module that needs are upgraded compiles, and firmware volume FV is packaged into capsule Capsule;
Step B, refresh routine finds the position of firmware volume FV among the Capsule under the operating system by capsule Capsule header structure body, judge whether that according to the current free memory situation of system needs carry out piecemeal to Capsule, piecemeal then is divided into littler data cell capsule SubCapsule if desired, and is each capsule SubCapsule storage allocation space, unit;
Step C, refresh routine arranges computing machine and enters the S3 sleep state under the operating system, wakes up by the real-time clock setting, enters the UEFI fixer system, the unit capsule SubCapsule in the UEFI fixer system access memory;
Step D, the UEFI fixer system enters the context initialization PEI stage, and identification and merge cells capsule SubCapsule obtain complete capsule Capsule, and location address and the size of the Capsule after merging in internal memory write handing-over piece HOB chained list;
Step e, the UEFI fixer system is driving the execution environment DXE stage, utilizes handing-over piece HOB chained list, resolves Capsule, extracts the FV module that is kept at wherein, the verification by FV and judge whether FV is legal, and read wherein driving or application program;
Step F is called the driving that drives the execution environment DXE stage among the UEFI and is distributed loading Dispatch to serve, and the dependence between judgement drives is found and execution UEFI firmware renewal driving according to correct order;
Step G, UEFI firmware upgrade to drive and read firmware image location of content figure Flash map, obtain the positional information of firmware volume FV to be updated in firmware binaries file FD, and firmware volume FV module to be updated in the internal memory is write among the firmware binaries file FD.
2. the capsule-type based on general Extensible Firmware Interface fixer system according to claim 1 customizes update method, it is characterized in that, in the steps A, described Extensible Firmware Interface Development Framework EDK II compiling standard, be the FD file by the firmware binaries file after the compiling of this standard, described FD file comprises firmware volume FV, and described FV is the elementary cell of storage code and data; The position of each FV in the firmware binaries file described by firmware image location of content figure Flash Map.
3. the capsule-type based on general Extensible Firmware Interface fixer system according to claim 1 customizes update method, it is characterized in that, among the step C, described handing-over piece HOB chained list is one group of data block, and this data block is used for data are delivered to the execution environment DXE stage that drives from the initialization preparation layer PEI stage.
CN 201310083959 2013-03-15 2013-03-15 Capsule type customized updating method based on universal extensible firmware interface firmware system Active CN103207797B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN 201310083959 CN103207797B (en) 2013-03-15 2013-03-15 Capsule type customized updating method based on universal extensible firmware interface firmware system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN 201310083959 CN103207797B (en) 2013-03-15 2013-03-15 Capsule type customized updating method based on universal extensible firmware interface firmware system

Publications (2)

Publication Number Publication Date
CN103207797A true CN103207797A (en) 2013-07-17
CN103207797B CN103207797B (en) 2013-11-27

Family

ID=48755028

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 201310083959 Active CN103207797B (en) 2013-03-15 2013-03-15 Capsule type customized updating method based on universal extensible firmware interface firmware system

Country Status (1)

Country Link
CN (1) CN103207797B (en)

Cited By (25)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104573529A (en) * 2015-01-28 2015-04-29 加弘科技咨询(上海)有限公司 BIOS firmware dividing and updating method and system
CN104572165A (en) * 2014-03-21 2015-04-29 中电科技(北京)有限公司 UEFI (Unified Extensible Firmware Interface) firmware implementation method based on Feiteng server
CN104572061A (en) * 2014-03-21 2015-04-29 中电科技(北京)有限公司 UEFI (Unified Extensible Firmware Interface) firmware implementation method based on Loongson server
CN104572166A (en) * 2014-03-21 2015-04-29 中电科技(北京)有限公司 UEFI (Unified Extensible Firmware Interface) firmware implementation method based on Feiteng desk computer
CN104572164A (en) * 2014-03-21 2015-04-29 中电科技(北京)有限公司 UEFI (Unified Extensible Firmware Interface) firmware implementation method based on Feiteng portable computer
CN104915280A (en) * 2015-06-03 2015-09-16 浪潮集团有限公司 Method for acquiring computer hardware information based on UEFI (unified extensible firmware interface) driving mode
CN106201608A (en) * 2016-07-01 2016-12-07 南京百敖软件有限公司 Computer UEFI firmware update
CN106909351A (en) * 2015-12-22 2017-06-30 中电科技(北京)有限公司 A kind of implementation method of the EXT file system based on UEFI firmwares
CN107423068A (en) * 2017-07-31 2017-12-01 山东超越数控电子有限公司 The method that a variety of file system are realized in UEFI BIOS
CN107463412A (en) * 2017-08-17 2017-12-12 郑州云海信息技术有限公司 A kind of method and device of upgrading BIOS
CN107463408A (en) * 2017-08-11 2017-12-12 郑州云海信息技术有限公司 The method and device of clearing password is prevented during a kind of upgrading BIOS
CN108399076A (en) * 2018-03-02 2018-08-14 山东超越数控电子股份有限公司 A kind of firmware update and device based on UEFI
CN108536453A (en) * 2017-03-03 2018-09-14 台湾聚引移动有限公司 The method of the unified Extensible Firmware Interface firmware of update
CN108845834A (en) * 2018-06-01 2018-11-20 上海兆芯集成电路有限公司 Computer installation
CN109478135A (en) * 2016-07-28 2019-03-15 微软技术许可有限责任公司 The UEFI of optimization reboots process
CN109472131A (en) * 2018-11-09 2019-03-15 济南浪潮高新科技投资发展有限公司 A kind of capsule-type UEFI firmware remote-control method based on BMC with safety certification
CN109992517A (en) * 2019-04-03 2019-07-09 中电科技(北京)有限公司 Firmware module adjustment method and system based on UEFI
CN110363011A (en) * 2019-07-19 2019-10-22 腾讯科技(深圳)有限公司 Method and apparatus for verifying the safety of the BIOS based on UEFI
WO2020000947A1 (en) * 2018-06-29 2020-01-02 郑州云海信息技术有限公司 Method, apparatus, and device for refreshing encapsulated bios data
CN112231477A (en) * 2020-10-20 2021-01-15 淮阴工学院 Text classification method based on improved capsule network
WO2022036670A1 (en) * 2020-08-21 2022-02-24 Intel Corporation Methods and apparatus to perform an enhanced s3 protocol to update firmware with a boot script update
CN114611109A (en) * 2022-01-06 2022-06-10 四川大学 UEFI (unified extensible firmware interface) firmware security audit method based on single classification
CN114911488A (en) * 2022-04-27 2022-08-16 北京计算机技术及应用研究所 UEFI (unified extensible firmware interface) firmware LOGO replacing and recovering method based on domestic processor platform
CN115328629A (en) * 2022-08-11 2022-11-11 江苏卓易信息科技股份有限公司 Method for performing real-time embedded management by expanding UEFI (unified extensible firmware interface) firmware on bare metal
WO2023102799A1 (en) * 2021-12-09 2023-06-15 Intel Corporation Firmware apparatus, device, method and computer program

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070300050A1 (en) * 2006-06-08 2007-12-27 Zimmer Vincent J Maintaining early hardware configuration state
CN102541606A (en) * 2011-12-31 2012-07-04 曙光信息产业股份有限公司 Method and device for remote management of BIOS (basic input/output system) configuration based on UEFI (unified extensible firmware interface
CN102567550A (en) * 2011-12-31 2012-07-11 曙光信息产业股份有限公司 Method and device for collecting data of emergency event in operating system (OS)

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070300050A1 (en) * 2006-06-08 2007-12-27 Zimmer Vincent J Maintaining early hardware configuration state
CN102541606A (en) * 2011-12-31 2012-07-04 曙光信息产业股份有限公司 Method and device for remote management of BIOS (basic input/output system) configuration based on UEFI (unified extensible firmware interface
CN102567550A (en) * 2011-12-31 2012-07-11 曙光信息产业股份有限公司 Method and device for collecting data of emergency event in operating system (OS)

Cited By (30)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104572165B (en) * 2014-03-21 2017-10-27 中电科技(北京)有限公司 A kind of UEFI firmware implementation methods based on FT server
CN104572165A (en) * 2014-03-21 2015-04-29 中电科技(北京)有限公司 UEFI (Unified Extensible Firmware Interface) firmware implementation method based on Feiteng server
CN104572061A (en) * 2014-03-21 2015-04-29 中电科技(北京)有限公司 UEFI (Unified Extensible Firmware Interface) firmware implementation method based on Loongson server
CN104572166A (en) * 2014-03-21 2015-04-29 中电科技(北京)有限公司 UEFI (Unified Extensible Firmware Interface) firmware implementation method based on Feiteng desk computer
CN104572164A (en) * 2014-03-21 2015-04-29 中电科技(北京)有限公司 UEFI (Unified Extensible Firmware Interface) firmware implementation method based on Feiteng portable computer
CN104573529A (en) * 2015-01-28 2015-04-29 加弘科技咨询(上海)有限公司 BIOS firmware dividing and updating method and system
CN104915280A (en) * 2015-06-03 2015-09-16 浪潮集团有限公司 Method for acquiring computer hardware information based on UEFI (unified extensible firmware interface) driving mode
CN106909351A (en) * 2015-12-22 2017-06-30 中电科技(北京)有限公司 A kind of implementation method of the EXT file system based on UEFI firmwares
CN106201608A (en) * 2016-07-01 2016-12-07 南京百敖软件有限公司 Computer UEFI firmware update
CN109478135A (en) * 2016-07-28 2019-03-15 微软技术许可有限责任公司 The UEFI of optimization reboots process
CN108536453A (en) * 2017-03-03 2018-09-14 台湾聚引移动有限公司 The method of the unified Extensible Firmware Interface firmware of update
CN107423068A (en) * 2017-07-31 2017-12-01 山东超越数控电子有限公司 The method that a variety of file system are realized in UEFI BIOS
CN107463408A (en) * 2017-08-11 2017-12-12 郑州云海信息技术有限公司 The method and device of clearing password is prevented during a kind of upgrading BIOS
CN107463412A (en) * 2017-08-17 2017-12-12 郑州云海信息技术有限公司 A kind of method and device of upgrading BIOS
CN108399076A (en) * 2018-03-02 2018-08-14 山东超越数控电子股份有限公司 A kind of firmware update and device based on UEFI
CN108845834A (en) * 2018-06-01 2018-11-20 上海兆芯集成电路有限公司 Computer installation
WO2020000947A1 (en) * 2018-06-29 2020-01-02 郑州云海信息技术有限公司 Method, apparatus, and device for refreshing encapsulated bios data
CN109472131A (en) * 2018-11-09 2019-03-15 济南浪潮高新科技投资发展有限公司 A kind of capsule-type UEFI firmware remote-control method based on BMC with safety certification
CN109992517A (en) * 2019-04-03 2019-07-09 中电科技(北京)有限公司 Firmware module adjustment method and system based on UEFI
CN109992517B (en) * 2019-04-03 2023-12-26 昆仑太科(北京)技术股份有限公司 UEFI-based firmware module debugging method and system
CN110363011A (en) * 2019-07-19 2019-10-22 腾讯科技(深圳)有限公司 Method and apparatus for verifying the safety of the BIOS based on UEFI
CN110363011B (en) * 2019-07-19 2024-05-07 腾讯科技(深圳)有限公司 Method and apparatus for verifying security of UEFI-based BIOS
WO2022036670A1 (en) * 2020-08-21 2022-02-24 Intel Corporation Methods and apparatus to perform an enhanced s3 protocol to update firmware with a boot script update
CN112231477A (en) * 2020-10-20 2021-01-15 淮阴工学院 Text classification method based on improved capsule network
CN112231477B (en) * 2020-10-20 2023-09-22 淮阴工学院 Text classification method based on improved capsule network
WO2023102799A1 (en) * 2021-12-09 2023-06-15 Intel Corporation Firmware apparatus, device, method and computer program
CN114611109A (en) * 2022-01-06 2022-06-10 四川大学 UEFI (unified extensible firmware interface) firmware security audit method based on single classification
CN114911488A (en) * 2022-04-27 2022-08-16 北京计算机技术及应用研究所 UEFI (unified extensible firmware interface) firmware LOGO replacing and recovering method based on domestic processor platform
CN114911488B (en) * 2022-04-27 2024-04-09 北京计算机技术及应用研究所 UEFI firmware LOGO replacement and recovery method based on domestic processor platform
CN115328629A (en) * 2022-08-11 2022-11-11 江苏卓易信息科技股份有限公司 Method for performing real-time embedded management by expanding UEFI (unified extensible firmware interface) firmware on bare metal

Also Published As

Publication number Publication date
CN103207797B (en) 2013-11-27

Similar Documents

Publication Publication Date Title
CN103207797B (en) Capsule type customized updating method based on universal extensible firmware interface firmware system
CN102236621B (en) Computer interface information configuration system and method
US9558016B2 (en) Platform system, method for changing support hardware configuration of universal extensible firmware interface basic input output system and computer program product
CN105579953B (en) Flexible boot code framework
CN109478135A (en) The UEFI of optimization reboots process
CN105814541B (en) The method of computer equipment and computer equipment internal storage starting
CN101573687B (en) Reconfiguring a secure system
CN102073520A (en) Dynamic management system and method for C++ application program version
CN105930186B (en) The method for loading software of multi -CPU and software loading apparatus based on multi -CPU
CN104572164A (en) UEFI (Unified Extensible Firmware Interface) firmware implementation method based on Feiteng portable computer
US20160210141A1 (en) Hot-Swapping Operating Systems Using Inter-Partition Application Migration
CN102662717A (en) Bootstrap starting method of embedded system
CN103853586A (en) Method of realizing wireless card driver in UEFI (unified extensible firmware interface) layer
CN104572165A (en) UEFI (Unified Extensible Firmware Interface) firmware implementation method based on Feiteng server
CN104156234A (en) Multi-core processor starting and bootloader big-little endian mode adapting method device
CN104111857A (en) Method for automatically configuring parameters of multi-model BIOS
CN108874458A (en) A kind of the firmware starting method and multicore SoC device of multicore SoC
CN106201608A (en) Computer UEFI firmware update
CN108021405A (en) The driving method and device of storage medium in a kind of SOC system starting process
CN104137074A (en) Optimization of resource usage in a multi-environment computing system
CN110515671A (en) Initial method, apparatus for initializing, terminal device and readable storage medium storing program for executing
CN104714792A (en) Multi-process shared data processing method and device
CN106126211A (en) A kind of MCU In-circuit programming system supporting debugging interface
CN106155682A (en) A kind of linux system based on SDMA controller starts method and system
CN105354066A (en) OTA (over the air) downloading method and device and intelligent terminal

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant