CN103455354B - Method and equipment for preventing hardware update from failing - Google Patents
Method and equipment for preventing hardware update from failing Download PDFInfo
- Publication number
- CN103455354B CN103455354B CN201310400667.6A CN201310400667A CN103455354B CN 103455354 B CN103455354 B CN 103455354B CN 201310400667 A CN201310400667 A CN 201310400667A CN 103455354 B CN103455354 B CN 103455354B
- Authority
- CN
- China
- Prior art keywords
- firmware
- module
- equipment
- renewable
- hardware
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Abstract
The invention provides a method and equipment for preventing hardware update from failing. The method comprises the following steps: 1, starting the equipment; 2, if file contents pass validation of legality and consistency, exiting a hardware validation program; 3, if the file contents do not pass validation of legality and consistency, selecting a better version from updatable hardware and original hardware and executing the hardware validation program; 4, after the hardware validation program is completed, restarting the equipment, and repeating the step 1. The method and the equipment have the advantages that legality validation is carried out before updating, so that hardware with damaged files, hardware with unmatched version numbers or hardware being unmatched with the equipment type is eliminated, therefore the success rate of updating is improved; consistency validation is carried out every time when the equipment is started, so that applications can be automatically recovered after being accidentally modified, damaged or deleted; when the updating process is interrupted due to power failure or forced restart, the updating can be automatically recovered, and even the worst situation occurs, a protected minimum system can be started for updating again, so that the condition that the equipment cannot run is not caused.
Description
Technical field
The present invention relates to a kind of method and apparatus for preventing firmware upgrade failure, belongs to digital information transmission technical neck
Domain.
Background technology
Firmware is a kind of software being embedded in hardware device, is usually located at ASIC(ASIC)Or can compile
Journey logical device(PLD)In flash memory, Electrically Erasable Read Only Memory(EEPROM)Or programmable read only memory
(PROM)In, the user that can allow having updates.
With making rapid progress for related-art technology and user's request, manufacturer typically can be carried by regularly firmware upgrade
The performance and reliability of the equipment of liter, repair existing procedural problem or increase new function for equipment, so that equipment keeps
In optimal working condition.
For the firmware of updating apparatus, prior art generally adopts following steps:1. by new firmware packet replication to need rise
In the device memory of level;2. equipment is verified to new firmware bag, confirms the integrality of new firmware bag;3. pair new firmware bag is carried out
De-packaging operation, with original firmware content in the file content covering system in new firmware bag.It is seen that, such scheme step
In 3 de-packaging operation, if occurring power-off in write or forcing the mode restarted to interrupt escalation process, then be likely to cause
File corruption, firmware content is imperfect, causes equipment normally to start, or needs to be brushed again into solid using unconventional mode
Part.Complete this not interruptable operating process on some storage mediums than relatively time-consuming, no matter odds size, Gu
The consequence caused after part upgrading failure is very serious, there is larger risk.
The content of the invention
Proposed by the present invention is a kind of method and apparatus for preventing firmware upgrade failure, and its purpose aims to solve the problem that prior art
Existing above-mentioned defect, effectively prevents firmware upgrade from failing.
The technical solution of the present invention:A kind of method for preventing firmware upgrade failure, comprises the steps of:
1)Starting device, start is entered after operating system, into firmware checking routine, in the file in renewable firmware
Hold and mounted application file content carries out legitimacy and consistency desired result;
2)Pass through legitimacy and consistency desired result, then exited firmware checking routine, perform mounted application program;
3)Not by legitimacy and consistency desired result, then a preferably version is selected in renewable firmware and original firmware
This, performs firmware upgrade procedure;
4)After the completion of firmware upgrade procedure, equipment, repeat step 2 are restarted)Into firmware checking routine.
A kind of equipment for preventing firmware upgrade failure, is characterized in that comprising read-only memory device and read-write storage device,
Described read-only memory device, comprising with lower module:A. operating system module, the hardware and software for management equipment is provided
Source, for other modules running environment is provided;B. firmware is verified and upgraded module, for damaging or needing in application program module
In the case of renewal, according to the content of renewable firmware memory module, automatic repairing applications module, so that it is guaranteed that using journey
Sequence module always can work, or automatic updating application program module so as to be maintained at optimal working condition, and the module is also
In the case of damaging in renewable firmware memory module, renewable firmware is replaced automatically using original firmware memory module and is deposited
Storage module, so that it is guaranteed that the basic function of restorer, to upgrade again;C. original firmware memory module, for preserving
The firmware of one version that necessarily can normally run, itself not can perform;
Described read-write storage device, comprising with lower module:A. renewable firmware memory module, for preserving new edition
This firmware, itself not can perform;B. application program module, for providing the actual functional capability of equipment, application program can be
Operating system module is performed in the environment of providing, and is started after by the verification of firmware correction verification module, answering described in this module
With program from renewable firmware memory module.
Compared with prior art, the main distinction and its effect are the present invention:
Legitimacy verifies are carried out before upgrading, firmware, the incongruent firmware of version number or and the equipment of file corruption is excluded
The unmatched firmware of model, improves success rate for upgrading;
Consistency desired result is all carried out when starting per secondary device, can after application program is by unexpected modification, damage or deletion
Automatically recover;
When escalation process due to power-off or pressure restart cause in have no progeny, can recover automatically upgrading, worst situation(Such as
Firmware after verification is still damaged for some reason)Occur, it is also possible to start a shielded minimum system for
Again upgrade, the equipment of not resulting in cannot run.
Description of the drawings
Fig. 1 is the flow chart of A embodiments of the present invention.
Fig. 2 is the flow chart of B embodiments of the present invention.
Fig. 3 is a kind of device structure schematic diagram for preventing firmware upgrade failure.
Specific embodiment
A kind of method for preventing firmware upgrade failure, comprises the following steps:
1)Starting device, start is entered after operating system, into firmware checking routine, in the file in renewable firmware
Hold and mounted application file content carries out legitimacy and consistency desired result;
2)Pass through legitimacy and consistency desired result, then exited firmware checking routine, perform mounted application program;
3)Not by legitimacy and consistency desired result, then a preferably version is selected in renewable firmware and original firmware
This, performs firmware upgrade procedure;
4)After the completion of firmware upgrade procedure, equipment, repeat step 2 are restarted)Into firmware checking routine.
Described operating system, firmware checking routine and original firmware and firmware upgrade procedure, renewable firmware are all protected
In depositing read-only storage in a device, its content can be changed by program or user operation.
Described is stored in readable and writable memory, and its content all is from renewable firmware or original firmware.
Described legitimacy and conforming verification, comprise the steps of:A. check whether renewable firmware can prop up
Whether the model or intrinsic identifier for holding the equipment be legal;B. redundancy check algorithm CRC, MD5 or SHA1 are used;
C. the file in renewable firmware and mounted application file are compared one by one, if mounted
Any one file of application program loses or check results are not inconsistent, then consistency desired result does not pass through.
Described original firmware, it be the ordinary firmware with complete function or in order to reduce memory space take depending on
The simple version of system, the simple version should be able at least provide the function of firmware upgrade.
It is described in the case of renewable firmware is unspoiled, the renewable firmware of prioritizing selection otherwise selects original firmware.
It is described in the running environment that present claims are related to, it is impossible to by way of application program or user operation
Change content therein, read-only storage is realized using the hardware of solidification, or realized using the mode of bottom software virtual protection.
Embodiment 1
As shown in figure 1,
In step s 110, user is by the firmware bag of redaction is with HTTP POST, FTP, TFTP, SCP or reads outside
The mode of storage card uploads to the temporary memory space in equipment(Such as RAM)In.
Then, in step S111, the firmware bag to uploading carries out completeness check, in the present embodiment, firmware bag
It is to be packed through tar by application file, along with the standard compression bag being fabricated to after the compression of gz, bz2 scheduling algorithm, by firmware
The file content of bag is decompressed to temporary memory space, if it is possible to correct decompressed, then illustrates that firmware bag is complete, connects
, with this existing renewable firmware of firmware cladding lid, into step S112;If can not correct decompressed, delete
This firmware bag, stops ROMPaq, into step S116.
In step S112, equipment is restarted, into firmware checking routine, firmware bag is decompressed to deposits temporarily again
Storage space, using redundancy check algorithm(Such as CRC, MD5 or SHA1, the accuracy of algorithms of different is variant, but can realize one
The function of cause property verification)File content to decompressing is calculated, and obtains check value A.
Then, in step S113, the file content of existing application is calculated using redundancy check algorithm, obtains school
Test value B.
Then, in step S114, check value A is compared with check value B one by one, if the A check values of All Files
All meet with B check values, into step S116, otherwise into upgrade step S115.
In step sl 15, the file for being decompressed using step S112 covers application program, upgrading is completed, into step
S116, if causing escalation process to interrupt it should be noted that restarting due to power-off or pressure in this step implementation procedure, then
The step of performing after restarting equipment in S114, will be unable to, by verification, cause to reenter this step.
In step S116, start application program.
Embodiment 2
Present embodiment is improved on the basis of first embodiment, is mainly theed improvement is that, in this enforcement
In mode, the method for calibration of first embodiment is improved, using the software package management system in linux system(Such as DEB or
RPM)Application program is installed automatically, configured, unloaded and is upgraded.
As shown in Fig. 2 in step S210, user to be wrapped the temporary memory space in the equipment of passing to by the firmware of redaction
In.
Then, in step S211, the firmware bag to uploading carries out completeness check, in the present embodiment, firmware bag
It is standard installation kit that operating system is capable of identify that, following functions can be provided:According to the version number of renewable firmware(Generally have
Major version number, secondary version number and revision number)Judge whether existing application program needs upgrading;According to renewable firmware
Dependence, prevents the firmware of the setup error on equipment, if the verification for passing through this step, into step S212, otherwise deletes
Except this firmware bag, stop ROMPaq, into step S216.
In step S212, equipment is restarted, into firmware checking routine, extract the verification of All Files in firmware bag
Value(Typically it is stored in standard installation kit in text mode), as check value A.
Then, in step S213, the file content of existing application is calculated using redundancy check algorithm, obtains school
Test value B.
Then, in step S214, check value A is compared with check value B one by one, if the A check values of All Files
All meet with B check values, into step S216, otherwise into upgrade step S216.
In step S215, start software package management system installing firmware bag, if existing legacy version, system can be deleted first
Legacy version installs again redaction, and the garbage files in such legacy version will not be remained in a device, upgrading is completed, into step
S216, if causing escalation process to interrupt it should be noted that restarting due to power-off or pressure in this step implementation procedure, then
The step of performing after restarting equipment in S214, will be unable to, by verification, cause to reenter this step.
In step S216, start application program.
As shown in figure 3, a kind of equipment for preventing firmware upgrade failure, the equipment is included:Read-only memory device A and read-write
Storage device B.Wherein, the realization of read-only memory device can use special hardware ROM, but for cost-effective, this reality
Apply used in scheme one piece of common 1GB storage card to realize above-mentioned two device.
Specifically, two subregions are divided on this storage card, the first subregion is used to realize read-only memory device, first point
The size in area needs to be determined according to specific operating system size;The residual capacity of storage card is distributed to into the second subregion, is used for
Realize read-write storage device.
Wherein, operating system A1 needs program such as firmware checking routine A2 and ROMPaq A3 and original to be protected with other
Beginning firmware A4 is stored in the first subregion, and the file system format of the first subregion should adopt the form of system kernel inherently support, adopt
With Windows PE or the linux system after cutting, 100MB is typically at least needed, if equipment needs more comprehensive figure
Interface support, then need 300MB, less operating system to be suitably based on the embedded device of semiconductor memory.
Wherein, renewable firmware B1 and application program module B2 are stored in the second subregion, there are multiple optional schemes
In the case of, the second subregion should prioritizing selection can support the file system format of operating system specific function, so as to
Using corresponding function, such as Linux can use the Ext3 forms for supporting symbol connection, Windows then can using FAT32 or
Person's NTFS format.
It should be noted that start-up operation system has following steps from read-only medium:
S310. bootstrap (boot loader) is loaded into, briefly, bootstrap was transported before operating system
One section of capable program, it can take the hardware environment of system to a proper states, be that operation operating system is ready.
S311. operating system nucleus is loaded into internal memory by bootstrap, then control is handed to into kernel.
S312. then, the other systems file needed for kernel is loaded into, completes os starting.These system files lead to
Be often compression process and can the virtual image file of carry form, such as WIM of Windows systems, linux system
SquashFS, is greatly reduced required memory space.
It should be noted that required other systems file is loaded into described in S312, can be with using following two modes:
S312a. system file is fully loaded in internal memory, is started from internal memory, this mode memory size require compared with
Height, toggle speed is fast.
S312b. directly from read-only medium activation system file, requirement of this mode to memory size is relatively low, but can increase
Plus starting time, on some low speed storage mediums, the overall operation speed of system may be undesirable.
Further, after the system file belonging to S312 is loaded into, the subregion that these system files are located can enter virtual
Write-protect pattern, under its running environment, it is impossible to which actual write is carried out to operating system file and other read-only memory devices
Operation, so data therein will not be damaged, system after restarting, all lose by the interim change in internal memory, and system is recovered
To initial conditions.
The step of above-mentioned embodiment, is considered the series of instructions list for realizing logic function, its complete
Portion or partial function can be realized using software, firmware, hardware or its combination.For example, software or firmware are stored in into machine
On computer-readable recording medium, performed by corresponding system program.
Wherein, machine readable media can be realized using following manner:Including semiconductor random access chip(Such as RAM)、
Floating gate transistor memory(Such as flash memory, Erasable Programmable Read Only Memory EPROM EPROM, Electrically Erasable Read Only Memory
EEPROM), disk, CD and network memory.
Claims (1)
1. a kind of equipment for preventing firmware upgrade failure, is characterized in that comprising read-only memory device and read-write storage device, institute
The read-only memory device stated, comprising with lower module:
A1. operating system module, for the hardware and software resource of management equipment, for other modules running environment is provided;
B1. firmware verification and upgraded module, in the case of damaging or needing to update in application program module, according to can be more
The content of new firmware memory module, automatic repairing applications module, so that it is guaranteed that application program module always can work, or
Person's automatic updating application program module so as to be maintained at optimal working condition, the module is additionally operable to be stored in renewable firmware
In the case of module damage, renewable firmware memory module is replaced automatically using original firmware memory module, so that it is guaranteed that recovering
The basic function of equipment, to upgrade again;
C1. original firmware memory module, for preserving the firmware of a version that necessarily can normally run, can not hold in itself
OK;
Described read-write storage device, comprising with lower module:
A2. renewable firmware memory module, for preserving the firmware of redaction, not can perform in itself;
B2. application program module, for providing the actual functional capability of equipment, what application program can be provided in operating system module
Perform under environment, the startup after by firmware verification and the verification of upgraded module, the application program described in this module is from can
Update firmware memory module;
The method for preventing firmware upgrade failure, comprises the following steps:
1)Starting device, start is entered after operating system, into firmware checking routine, to the file content in renewable firmware and
Mounted application file content carries out legitimacy and consistency desired result;
2)Pass through legitimacy and consistency desired result, then exited firmware checking routine, perform mounted application program;
3)Not by legitimacy and consistency desired result, then a preferably version is selected in renewable firmware and original firmware,
Perform firmware upgrade procedure;
4)After the completion of firmware upgrade procedure, equipment, repeat step 1 are restarted)Into firmware checking routine;
Described operating system, firmware checking routine and original firmware and firmware upgrade procedure, renewable firmware are all stored in
In read-only storage in equipment, its content is changed by program or user operation;
In the described read-write storage device for preserving in a device, its content all is from renewable firmware or original solid
Part;
Described legitimacy and conforming verification, comprise the steps of:
A3. check whether renewable firmware can support whether the model or intrinsic identifier of the equipment are legal;
B3. redundancy check algorithm CRC, MD5 or SHA1 are used;
C3. the file in renewable firmware and mounted application file are compared one by one, if mounted should
Lost with any one file of program or check results are not inconsistent, then consistency desired result does not pass through;
Described original firmware, it is the ordinary firmware with complete function or customizes to reduce memory space to take
Simple version, the simple version should be able at least provide the function of firmware upgrade;
In the case of renewable firmware is unspoiled, the renewable firmware of prioritizing selection otherwise selects original firmware;
Described running environment, it is impossible to content therein, read-only storage are changed by way of application program or user operation
Device is realized using the hardware of solidification, or is realized using the mode of bottom software virtual protection.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310400667.6A CN103455354B (en) | 2013-09-06 | 2013-09-06 | Method and equipment for preventing hardware update from failing |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310400667.6A CN103455354B (en) | 2013-09-06 | 2013-09-06 | Method and equipment for preventing hardware update from failing |
Publications (2)
Publication Number | Publication Date |
---|---|
CN103455354A CN103455354A (en) | 2013-12-18 |
CN103455354B true CN103455354B (en) | 2017-04-12 |
Family
ID=49737761
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201310400667.6A Active CN103455354B (en) | 2013-09-06 | 2013-09-06 | Method and equipment for preventing hardware update from failing |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103455354B (en) |
Families Citing this family (30)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103823723B (en) * | 2014-02-19 | 2017-08-08 | 惠州Tcl移动通信有限公司 | The touch-screen firmware restorative procedure and device of a kind of mobile terminal |
CN104090802A (en) * | 2014-07-14 | 2014-10-08 | 深圳市欧林克科技有限公司 | Protection method for network camera power failure |
CN104320279B (en) * | 2014-10-31 | 2017-12-15 | 新华三技术有限公司 | A kind of method and system of upgrading service |
CN104281479B (en) * | 2014-10-31 | 2019-01-08 | 深圳市大疆创新科技有限公司 | A kind of firmware upgrade method and device |
CN105045671B (en) * | 2015-08-17 | 2018-04-03 | 广东欧珀移动通信有限公司 | The method for upgrading system and device of a kind of intelligent terminal |
CN105337782A (en) * | 2015-11-27 | 2016-02-17 | 上海斐讯数据通信技术有限公司 | Method and device for automatic upgrading after boot failure of network equipment firmware |
JP2017156938A (en) * | 2016-03-01 | 2017-09-07 | ヤンマー株式会社 | Terminal device and software rewriting program |
CN106293622B (en) * | 2016-08-10 | 2020-12-22 | 高新兴物联科技有限公司 | Power failure self-recovery air upgrading method and device |
CN108170444B (en) * | 2016-12-06 | 2021-06-29 | 佛山市顺德区顺达电脑厂有限公司 | Firmware update error detection system |
CN106815050B (en) * | 2016-12-30 | 2020-06-09 | 深圳怡化电脑股份有限公司 | Firmware management method and device of embedded equipment |
CN106850342B (en) * | 2017-01-20 | 2020-11-24 | 苏州浪潮智能科技有限公司 | Method and device for testing compatibility and stability of switch |
CN106775778B (en) * | 2017-02-06 | 2021-03-16 | 山东鲁能软件技术有限公司智能电气分公司 | Program updating identification method and system in embedded program development |
CN106919423B (en) * | 2017-02-22 | 2021-03-23 | 新华三技术有限公司 | Firmware upgrading method and device |
CN107423080A (en) * | 2017-04-06 | 2017-12-01 | 大连网月科技股份有限公司 | A kind of autosynchronous method and device of main preparation system firmware |
CN107957880A (en) * | 2017-11-30 | 2018-04-24 | 广东美的暖通设备有限公司 | Air-conditioning firmware upgrade method, device, air-conditioning and computer equipment |
CN109992289A (en) * | 2017-12-29 | 2019-07-09 | 深圳市优必选科技有限公司 | Sensor firmware upgrade method, device and equipment |
CN108595198B (en) * | 2018-04-18 | 2022-02-22 | 山东方寸微电子科技有限公司 | Safe firmware updating method |
CN109002317B (en) * | 2018-06-27 | 2022-01-18 | 上海有个机器人有限公司 | PCBA firmware upgrading method and system and PCBA |
CN111199039B (en) * | 2018-11-20 | 2023-02-28 | 成都鼎桥通信技术有限公司 | Application security verification method and device and terminal equipment |
CN109766207A (en) * | 2019-01-04 | 2019-05-17 | 日立楼宇技术(广州)有限公司 | Restoration methods, device, monitoring device and the storage medium of firmware remote upgrade |
CN112804071A (en) * | 2019-11-13 | 2021-05-14 | 中兴通讯股份有限公司 | On-line upgrading method, upgrading file providing method, equipment and storage medium |
CN110888759A (en) * | 2019-11-19 | 2020-03-17 | 深圳来电科技有限公司 | Firmware upgrade protection method and mobile power supply leasing equipment |
CN111240885A (en) * | 2019-12-28 | 2020-06-05 | 杭州拓深科技有限公司 | Embedded online upgrade error-proofing detection method |
CN113543181B (en) * | 2020-04-22 | 2024-02-13 | 大唐移动通信设备有限公司 | Method and device for self-recovery of base station equipment |
CN112596749A (en) * | 2020-12-28 | 2021-04-02 | 厦门亿联网络技术股份有限公司 | Method and device for system power-on self-test and self-repair |
CN113064611B (en) * | 2021-03-16 | 2024-02-02 | 太仓市同维电子有限公司 | Method for realizing data analysis software upgrading aiming at wireless equipment and updating method thereof |
CN113407211A (en) * | 2021-06-20 | 2021-09-17 | 杭州登虹科技有限公司 | Embedded equipment-based upgrading method without redundant space |
CN113626792B (en) * | 2021-07-09 | 2023-07-14 | 苏州浪潮智能科技有限公司 | PCIe Switch firmware secure execution method, device, terminal and storage medium |
CN114721731B (en) * | 2022-03-24 | 2023-07-14 | 苏州浪潮智能科技有限公司 | Storage device upgrading method and device, storage device and storage medium |
CN117055928B (en) * | 2023-10-09 | 2024-01-26 | 深圳市好盈科技股份有限公司 | Method and device for detecting firmware errors of electronic speed regulator of target model airplane |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101526908A (en) * | 2008-03-06 | 2009-09-09 | 晨星半导体股份有限公司 | Device and method for firmware updating |
CN101770372A (en) * | 2008-12-31 | 2010-07-07 | 亚旭电脑股份有限公司 | Firmware update system, method and building method of firmware of firmware update system |
US8010958B2 (en) * | 2006-08-11 | 2011-08-30 | Sharp Kabushiki Kaisha | Data processing apparatus, program managing apparatus, control program updating method, program managing method, program managing system, updating program, and recording medium |
-
2013
- 2013-09-06 CN CN201310400667.6A patent/CN103455354B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8010958B2 (en) * | 2006-08-11 | 2011-08-30 | Sharp Kabushiki Kaisha | Data processing apparatus, program managing apparatus, control program updating method, program managing method, program managing system, updating program, and recording medium |
CN101526908A (en) * | 2008-03-06 | 2009-09-09 | 晨星半导体股份有限公司 | Device and method for firmware updating |
CN101770372A (en) * | 2008-12-31 | 2010-07-07 | 亚旭电脑股份有限公司 | Firmware update system, method and building method of firmware of firmware update system |
Also Published As
Publication number | Publication date |
---|---|
CN103455354A (en) | 2013-12-18 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103455354B (en) | Method and equipment for preventing hardware update from failing | |
US10911065B2 (en) | Computer system and method including selectively compressing data files and directories based on an operator indication and representing the amount of available free space | |
CN102023908B (en) | Method and device for backing up boot program | |
CN105260215A (en) | Method of updating vehicle-mounted automobile data recorder terminal by USB flash disk | |
US8341386B2 (en) | Method for updating basic input/output system and method for repairing thereof | |
JP5113700B2 (en) | Firmware update apparatus and method | |
US20070055969A1 (en) | System and method for updating firmware | |
US20110004871A1 (en) | Embedded electronic device and firmware updating method thereof | |
WO2015070521A1 (en) | Method for making ubi format system file into factory burnt image file | |
US8136108B2 (en) | Updating firmware with multiple processors | |
CN102334100A (en) | Program update device, program update method, and information processing device | |
JP2009230407A (en) | Data update method, memory system and memory device | |
CN101639785A (en) | Method and device for software updating | |
CN103970564A (en) | Automatic repairing and upgrading method of embedded operating system and embedded operating system with automatic repairing and upgrading functions | |
KR20170040734A (en) | Electronic system with update control mechanism and method of operation thereof | |
CN103530138A (en) | Method and device for protecting file system data based on embedded LINUX | |
KR20080023841A (en) | The method of firmware upgrade and automatic firmware recovery system | |
CN107003876A (en) | Firmware updates | |
CN109086078A (en) | Android system upgrade method, device, server and mobile terminal | |
CN105637521A (en) | Data processing method and intelligent terminal | |
CN101800840B (en) | Set top box upgrading method | |
CN105677409A (en) | System upgrading method and device | |
CN105069381B (en) | A kind of partition protecting method and system based on intelligent terminal | |
CN103559059A (en) | Quick medium-free upgrading method for Linux system | |
CN113032183A (en) | System management method, device, computer equipment and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |