CN103455354B - Method and equipment for preventing hardware update from failing - Google Patents

Method and equipment for preventing hardware update from failing Download PDF

Info

Publication number
CN103455354B
CN103455354B CN201310400667.6A CN201310400667A CN103455354B CN 103455354 B CN103455354 B CN 103455354B CN 201310400667 A CN201310400667 A CN 201310400667A CN 103455354 B CN103455354 B CN 103455354B
Authority
CN
China
Prior art keywords
firmware
module
equipment
renewable
hardware
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201310400667.6A
Other languages
Chinese (zh)
Other versions
CN103455354A (en
Inventor
王强
吴磊
卫刚
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
NANJING NANZI INFORMATION TECHNOLOGY Co Ltd
Original Assignee
NANJING NANZI INFORMATION TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by NANJING NANZI INFORMATION TECHNOLOGY Co Ltd filed Critical NANJING NANZI INFORMATION TECHNOLOGY Co Ltd
Priority to CN201310400667.6A priority Critical patent/CN103455354B/en
Publication of CN103455354A publication Critical patent/CN103455354A/en
Application granted granted Critical
Publication of CN103455354B publication Critical patent/CN103455354B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The invention provides a method and equipment for preventing hardware update from failing. The method comprises the following steps: 1, starting the equipment; 2, if file contents pass validation of legality and consistency, exiting a hardware validation program; 3, if the file contents do not pass validation of legality and consistency, selecting a better version from updatable hardware and original hardware and executing the hardware validation program; 4, after the hardware validation program is completed, restarting the equipment, and repeating the step 1. The method and the equipment have the advantages that legality validation is carried out before updating, so that hardware with damaged files, hardware with unmatched version numbers or hardware being unmatched with the equipment type is eliminated, therefore the success rate of updating is improved; consistency validation is carried out every time when the equipment is started, so that applications can be automatically recovered after being accidentally modified, damaged or deleted; when the updating process is interrupted due to power failure or forced restart, the updating can be automatically recovered, and even the worst situation occurs, a protected minimum system can be started for updating again, so that the condition that the equipment cannot run is not caused.

Description

A kind of method and apparatus for preventing firmware upgrade failure
Technical field
The present invention relates to a kind of method and apparatus for preventing firmware upgrade failure, belongs to digital information transmission technical neck Domain.
Background technology
Firmware is a kind of software being embedded in hardware device, is usually located at ASIC(ASIC)Or can compile Journey logical device(PLD)In flash memory, Electrically Erasable Read Only Memory(EEPROM)Or programmable read only memory (PROM)In, the user that can allow having updates.
With making rapid progress for related-art technology and user's request, manufacturer typically can be carried by regularly firmware upgrade The performance and reliability of the equipment of liter, repair existing procedural problem or increase new function for equipment, so that equipment keeps In optimal working condition.
For the firmware of updating apparatus, prior art generally adopts following steps:1. by new firmware packet replication to need rise In the device memory of level;2. equipment is verified to new firmware bag, confirms the integrality of new firmware bag;3. pair new firmware bag is carried out De-packaging operation, with original firmware content in the file content covering system in new firmware bag.It is seen that, such scheme step In 3 de-packaging operation, if occurring power-off in write or forcing the mode restarted to interrupt escalation process, then be likely to cause File corruption, firmware content is imperfect, causes equipment normally to start, or needs to be brushed again into solid using unconventional mode Part.Complete this not interruptable operating process on some storage mediums than relatively time-consuming, no matter odds size, Gu The consequence caused after part upgrading failure is very serious, there is larger risk.
The content of the invention
Proposed by the present invention is a kind of method and apparatus for preventing firmware upgrade failure, and its purpose aims to solve the problem that prior art Existing above-mentioned defect, effectively prevents firmware upgrade from failing.
The technical solution of the present invention:A kind of method for preventing firmware upgrade failure, comprises the steps of:
1)Starting device, start is entered after operating system, into firmware checking routine, in the file in renewable firmware Hold and mounted application file content carries out legitimacy and consistency desired result;
2)Pass through legitimacy and consistency desired result, then exited firmware checking routine, perform mounted application program;
3)Not by legitimacy and consistency desired result, then a preferably version is selected in renewable firmware and original firmware This, performs firmware upgrade procedure;
4)After the completion of firmware upgrade procedure, equipment, repeat step 2 are restarted)Into firmware checking routine.
A kind of equipment for preventing firmware upgrade failure, is characterized in that comprising read-only memory device and read-write storage device, Described read-only memory device, comprising with lower module:A. operating system module, the hardware and software for management equipment is provided Source, for other modules running environment is provided;B. firmware is verified and upgraded module, for damaging or needing in application program module In the case of renewal, according to the content of renewable firmware memory module, automatic repairing applications module, so that it is guaranteed that using journey Sequence module always can work, or automatic updating application program module so as to be maintained at optimal working condition, and the module is also In the case of damaging in renewable firmware memory module, renewable firmware is replaced automatically using original firmware memory module and is deposited Storage module, so that it is guaranteed that the basic function of restorer, to upgrade again;C. original firmware memory module, for preserving The firmware of one version that necessarily can normally run, itself not can perform;
Described read-write storage device, comprising with lower module:A. renewable firmware memory module, for preserving new edition This firmware, itself not can perform;B. application program module, for providing the actual functional capability of equipment, application program can be Operating system module is performed in the environment of providing, and is started after by the verification of firmware correction verification module, answering described in this module With program from renewable firmware memory module.
Compared with prior art, the main distinction and its effect are the present invention:
Legitimacy verifies are carried out before upgrading, firmware, the incongruent firmware of version number or and the equipment of file corruption is excluded The unmatched firmware of model, improves success rate for upgrading;
Consistency desired result is all carried out when starting per secondary device, can after application program is by unexpected modification, damage or deletion Automatically recover;
When escalation process due to power-off or pressure restart cause in have no progeny, can recover automatically upgrading, worst situation(Such as Firmware after verification is still damaged for some reason)Occur, it is also possible to start a shielded minimum system for Again upgrade, the equipment of not resulting in cannot run.
Description of the drawings
Fig. 1 is the flow chart of A embodiments of the present invention.
Fig. 2 is the flow chart of B embodiments of the present invention.
Fig. 3 is a kind of device structure schematic diagram for preventing firmware upgrade failure.
Specific embodiment
A kind of method for preventing firmware upgrade failure, comprises the following steps:
1)Starting device, start is entered after operating system, into firmware checking routine, in the file in renewable firmware Hold and mounted application file content carries out legitimacy and consistency desired result;
2)Pass through legitimacy and consistency desired result, then exited firmware checking routine, perform mounted application program;
3)Not by legitimacy and consistency desired result, then a preferably version is selected in renewable firmware and original firmware This, performs firmware upgrade procedure;
4)After the completion of firmware upgrade procedure, equipment, repeat step 2 are restarted)Into firmware checking routine.
Described operating system, firmware checking routine and original firmware and firmware upgrade procedure, renewable firmware are all protected In depositing read-only storage in a device, its content can be changed by program or user operation.
Described is stored in readable and writable memory, and its content all is from renewable firmware or original firmware.
Described legitimacy and conforming verification, comprise the steps of:A. check whether renewable firmware can prop up Whether the model or intrinsic identifier for holding the equipment be legal;B. redundancy check algorithm CRC, MD5 or SHA1 are used;
C. the file in renewable firmware and mounted application file are compared one by one, if mounted Any one file of application program loses or check results are not inconsistent, then consistency desired result does not pass through.
Described original firmware, it be the ordinary firmware with complete function or in order to reduce memory space take depending on The simple version of system, the simple version should be able at least provide the function of firmware upgrade.
It is described in the case of renewable firmware is unspoiled, the renewable firmware of prioritizing selection otherwise selects original firmware.
It is described in the running environment that present claims are related to, it is impossible to by way of application program or user operation Change content therein, read-only storage is realized using the hardware of solidification, or realized using the mode of bottom software virtual protection.
Embodiment 1
As shown in figure 1,
In step s 110, user is by the firmware bag of redaction is with HTTP POST, FTP, TFTP, SCP or reads outside The mode of storage card uploads to the temporary memory space in equipment(Such as RAM)In.
Then, in step S111, the firmware bag to uploading carries out completeness check, in the present embodiment, firmware bag It is to be packed through tar by application file, along with the standard compression bag being fabricated to after the compression of gz, bz2 scheduling algorithm, by firmware The file content of bag is decompressed to temporary memory space, if it is possible to correct decompressed, then illustrates that firmware bag is complete, connects , with this existing renewable firmware of firmware cladding lid, into step S112;If can not correct decompressed, delete This firmware bag, stops ROMPaq, into step S116.
In step S112, equipment is restarted, into firmware checking routine, firmware bag is decompressed to deposits temporarily again Storage space, using redundancy check algorithm(Such as CRC, MD5 or SHA1, the accuracy of algorithms of different is variant, but can realize one The function of cause property verification)File content to decompressing is calculated, and obtains check value A.
Then, in step S113, the file content of existing application is calculated using redundancy check algorithm, obtains school Test value B.
Then, in step S114, check value A is compared with check value B one by one, if the A check values of All Files All meet with B check values, into step S116, otherwise into upgrade step S115.
In step sl 15, the file for being decompressed using step S112 covers application program, upgrading is completed, into step S116, if causing escalation process to interrupt it should be noted that restarting due to power-off or pressure in this step implementation procedure, then The step of performing after restarting equipment in S114, will be unable to, by verification, cause to reenter this step.
In step S116, start application program.
Embodiment 2
Present embodiment is improved on the basis of first embodiment, is mainly theed improvement is that, in this enforcement In mode, the method for calibration of first embodiment is improved, using the software package management system in linux system(Such as DEB or RPM)Application program is installed automatically, configured, unloaded and is upgraded.
As shown in Fig. 2 in step S210, user to be wrapped the temporary memory space in the equipment of passing to by the firmware of redaction In.
Then, in step S211, the firmware bag to uploading carries out completeness check, in the present embodiment, firmware bag It is standard installation kit that operating system is capable of identify that, following functions can be provided:According to the version number of renewable firmware(Generally have Major version number, secondary version number and revision number)Judge whether existing application program needs upgrading;According to renewable firmware Dependence, prevents the firmware of the setup error on equipment, if the verification for passing through this step, into step S212, otherwise deletes Except this firmware bag, stop ROMPaq, into step S216.
In step S212, equipment is restarted, into firmware checking routine, extract the verification of All Files in firmware bag Value(Typically it is stored in standard installation kit in text mode), as check value A.
Then, in step S213, the file content of existing application is calculated using redundancy check algorithm, obtains school Test value B.
Then, in step S214, check value A is compared with check value B one by one, if the A check values of All Files All meet with B check values, into step S216, otherwise into upgrade step S216.
In step S215, start software package management system installing firmware bag, if existing legacy version, system can be deleted first Legacy version installs again redaction, and the garbage files in such legacy version will not be remained in a device, upgrading is completed, into step S216, if causing escalation process to interrupt it should be noted that restarting due to power-off or pressure in this step implementation procedure, then The step of performing after restarting equipment in S214, will be unable to, by verification, cause to reenter this step.
In step S216, start application program.
As shown in figure 3, a kind of equipment for preventing firmware upgrade failure, the equipment is included:Read-only memory device A and read-write Storage device B.Wherein, the realization of read-only memory device can use special hardware ROM, but for cost-effective, this reality Apply used in scheme one piece of common 1GB storage card to realize above-mentioned two device.
Specifically, two subregions are divided on this storage card, the first subregion is used to realize read-only memory device, first point The size in area needs to be determined according to specific operating system size;The residual capacity of storage card is distributed to into the second subregion, is used for Realize read-write storage device.
Wherein, operating system A1 needs program such as firmware checking routine A2 and ROMPaq A3 and original to be protected with other Beginning firmware A4 is stored in the first subregion, and the file system format of the first subregion should adopt the form of system kernel inherently support, adopt With Windows PE or the linux system after cutting, 100MB is typically at least needed, if equipment needs more comprehensive figure Interface support, then need 300MB, less operating system to be suitably based on the embedded device of semiconductor memory.
Wherein, renewable firmware B1 and application program module B2 are stored in the second subregion, there are multiple optional schemes In the case of, the second subregion should prioritizing selection can support the file system format of operating system specific function, so as to Using corresponding function, such as Linux can use the Ext3 forms for supporting symbol connection, Windows then can using FAT32 or Person's NTFS format.
It should be noted that start-up operation system has following steps from read-only medium:
S310. bootstrap (boot loader) is loaded into, briefly, bootstrap was transported before operating system One section of capable program, it can take the hardware environment of system to a proper states, be that operation operating system is ready.
S311. operating system nucleus is loaded into internal memory by bootstrap, then control is handed to into kernel.
S312. then, the other systems file needed for kernel is loaded into, completes os starting.These system files lead to Be often compression process and can the virtual image file of carry form, such as WIM of Windows systems, linux system SquashFS, is greatly reduced required memory space.
It should be noted that required other systems file is loaded into described in S312, can be with using following two modes:
S312a. system file is fully loaded in internal memory, is started from internal memory, this mode memory size require compared with Height, toggle speed is fast.
S312b. directly from read-only medium activation system file, requirement of this mode to memory size is relatively low, but can increase Plus starting time, on some low speed storage mediums, the overall operation speed of system may be undesirable.
Further, after the system file belonging to S312 is loaded into, the subregion that these system files are located can enter virtual Write-protect pattern, under its running environment, it is impossible to which actual write is carried out to operating system file and other read-only memory devices Operation, so data therein will not be damaged, system after restarting, all lose by the interim change in internal memory, and system is recovered To initial conditions.
The step of above-mentioned embodiment, is considered the series of instructions list for realizing logic function, its complete Portion or partial function can be realized using software, firmware, hardware or its combination.For example, software or firmware are stored in into machine On computer-readable recording medium, performed by corresponding system program.
Wherein, machine readable media can be realized using following manner:Including semiconductor random access chip(Such as RAM)、 Floating gate transistor memory(Such as flash memory, Erasable Programmable Read Only Memory EPROM EPROM, Electrically Erasable Read Only Memory EEPROM), disk, CD and network memory.

Claims (1)

1. a kind of equipment for preventing firmware upgrade failure, is characterized in that comprising read-only memory device and read-write storage device, institute The read-only memory device stated, comprising with lower module:
A1. operating system module, for the hardware and software resource of management equipment, for other modules running environment is provided;
B1. firmware verification and upgraded module, in the case of damaging or needing to update in application program module, according to can be more The content of new firmware memory module, automatic repairing applications module, so that it is guaranteed that application program module always can work, or Person's automatic updating application program module so as to be maintained at optimal working condition, the module is additionally operable to be stored in renewable firmware In the case of module damage, renewable firmware memory module is replaced automatically using original firmware memory module, so that it is guaranteed that recovering The basic function of equipment, to upgrade again;
C1. original firmware memory module, for preserving the firmware of a version that necessarily can normally run, can not hold in itself OK;
Described read-write storage device, comprising with lower module:
A2. renewable firmware memory module, for preserving the firmware of redaction, not can perform in itself;
B2. application program module, for providing the actual functional capability of equipment, what application program can be provided in operating system module Perform under environment, the startup after by firmware verification and the verification of upgraded module, the application program described in this module is from can Update firmware memory module;
The method for preventing firmware upgrade failure, comprises the following steps:
1)Starting device, start is entered after operating system, into firmware checking routine, to the file content in renewable firmware and Mounted application file content carries out legitimacy and consistency desired result;
2)Pass through legitimacy and consistency desired result, then exited firmware checking routine, perform mounted application program;
3)Not by legitimacy and consistency desired result, then a preferably version is selected in renewable firmware and original firmware, Perform firmware upgrade procedure;
4)After the completion of firmware upgrade procedure, equipment, repeat step 1 are restarted)Into firmware checking routine;
Described operating system, firmware checking routine and original firmware and firmware upgrade procedure, renewable firmware are all stored in In read-only storage in equipment, its content is changed by program or user operation;
In the described read-write storage device for preserving in a device, its content all is from renewable firmware or original solid Part;
Described legitimacy and conforming verification, comprise the steps of:
A3. check whether renewable firmware can support whether the model or intrinsic identifier of the equipment are legal;
B3. redundancy check algorithm CRC, MD5 or SHA1 are used;
C3. the file in renewable firmware and mounted application file are compared one by one, if mounted should Lost with any one file of program or check results are not inconsistent, then consistency desired result does not pass through;
Described original firmware, it is the ordinary firmware with complete function or customizes to reduce memory space to take Simple version, the simple version should be able at least provide the function of firmware upgrade;
In the case of renewable firmware is unspoiled, the renewable firmware of prioritizing selection otherwise selects original firmware;
Described running environment, it is impossible to content therein, read-only storage are changed by way of application program or user operation Device is realized using the hardware of solidification, or is realized using the mode of bottom software virtual protection.
CN201310400667.6A 2013-09-06 2013-09-06 Method and equipment for preventing hardware update from failing Active CN103455354B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310400667.6A CN103455354B (en) 2013-09-06 2013-09-06 Method and equipment for preventing hardware update from failing

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310400667.6A CN103455354B (en) 2013-09-06 2013-09-06 Method and equipment for preventing hardware update from failing

Publications (2)

Publication Number Publication Date
CN103455354A CN103455354A (en) 2013-12-18
CN103455354B true CN103455354B (en) 2017-04-12

Family

ID=49737761

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310400667.6A Active CN103455354B (en) 2013-09-06 2013-09-06 Method and equipment for preventing hardware update from failing

Country Status (1)

Country Link
CN (1) CN103455354B (en)

Families Citing this family (30)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103823723B (en) * 2014-02-19 2017-08-08 惠州Tcl移动通信有限公司 The touch-screen firmware restorative procedure and device of a kind of mobile terminal
CN104090802A (en) * 2014-07-14 2014-10-08 深圳市欧林克科技有限公司 Protection method for network camera power failure
CN104320279B (en) * 2014-10-31 2017-12-15 新华三技术有限公司 A kind of method and system of upgrading service
CN104281479B (en) * 2014-10-31 2019-01-08 深圳市大疆创新科技有限公司 A kind of firmware upgrade method and device
CN105045671B (en) * 2015-08-17 2018-04-03 广东欧珀移动通信有限公司 The method for upgrading system and device of a kind of intelligent terminal
CN105337782A (en) * 2015-11-27 2016-02-17 上海斐讯数据通信技术有限公司 Method and device for automatic upgrading after boot failure of network equipment firmware
JP2017156938A (en) * 2016-03-01 2017-09-07 ヤンマー株式会社 Terminal device and software rewriting program
CN106293622B (en) * 2016-08-10 2020-12-22 高新兴物联科技有限公司 Power failure self-recovery air upgrading method and device
CN108170444B (en) * 2016-12-06 2021-06-29 佛山市顺德区顺达电脑厂有限公司 Firmware update error detection system
CN106815050B (en) * 2016-12-30 2020-06-09 深圳怡化电脑股份有限公司 Firmware management method and device of embedded equipment
CN106850342B (en) * 2017-01-20 2020-11-24 苏州浪潮智能科技有限公司 Method and device for testing compatibility and stability of switch
CN106775778B (en) * 2017-02-06 2021-03-16 山东鲁能软件技术有限公司智能电气分公司 Program updating identification method and system in embedded program development
CN106919423B (en) * 2017-02-22 2021-03-23 新华三技术有限公司 Firmware upgrading method and device
CN107423080A (en) * 2017-04-06 2017-12-01 大连网月科技股份有限公司 A kind of autosynchronous method and device of main preparation system firmware
CN107957880A (en) * 2017-11-30 2018-04-24 广东美的暖通设备有限公司 Air-conditioning firmware upgrade method, device, air-conditioning and computer equipment
CN109992289A (en) * 2017-12-29 2019-07-09 深圳市优必选科技有限公司 Sensor firmware upgrade method, device and equipment
CN108595198B (en) * 2018-04-18 2022-02-22 山东方寸微电子科技有限公司 Safe firmware updating method
CN109002317B (en) * 2018-06-27 2022-01-18 上海有个机器人有限公司 PCBA firmware upgrading method and system and PCBA
CN111199039B (en) * 2018-11-20 2023-02-28 成都鼎桥通信技术有限公司 Application security verification method and device and terminal equipment
CN109766207A (en) * 2019-01-04 2019-05-17 日立楼宇技术(广州)有限公司 Restoration methods, device, monitoring device and the storage medium of firmware remote upgrade
CN112804071A (en) * 2019-11-13 2021-05-14 中兴通讯股份有限公司 On-line upgrading method, upgrading file providing method, equipment and storage medium
CN110888759A (en) * 2019-11-19 2020-03-17 深圳来电科技有限公司 Firmware upgrade protection method and mobile power supply leasing equipment
CN111240885A (en) * 2019-12-28 2020-06-05 杭州拓深科技有限公司 Embedded online upgrade error-proofing detection method
CN113543181B (en) * 2020-04-22 2024-02-13 大唐移动通信设备有限公司 Method and device for self-recovery of base station equipment
CN112596749A (en) * 2020-12-28 2021-04-02 厦门亿联网络技术股份有限公司 Method and device for system power-on self-test and self-repair
CN113064611B (en) * 2021-03-16 2024-02-02 太仓市同维电子有限公司 Method for realizing data analysis software upgrading aiming at wireless equipment and updating method thereof
CN113407211A (en) * 2021-06-20 2021-09-17 杭州登虹科技有限公司 Embedded equipment-based upgrading method without redundant space
CN113626792B (en) * 2021-07-09 2023-07-14 苏州浪潮智能科技有限公司 PCIe Switch firmware secure execution method, device, terminal and storage medium
CN114721731B (en) * 2022-03-24 2023-07-14 苏州浪潮智能科技有限公司 Storage device upgrading method and device, storage device and storage medium
CN117055928B (en) * 2023-10-09 2024-01-26 深圳市好盈科技股份有限公司 Method and device for detecting firmware errors of electronic speed regulator of target model airplane

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101526908A (en) * 2008-03-06 2009-09-09 晨星半导体股份有限公司 Device and method for firmware updating
CN101770372A (en) * 2008-12-31 2010-07-07 亚旭电脑股份有限公司 Firmware update system, method and building method of firmware of firmware update system
US8010958B2 (en) * 2006-08-11 2011-08-30 Sharp Kabushiki Kaisha Data processing apparatus, program managing apparatus, control program updating method, program managing method, program managing system, updating program, and recording medium

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8010958B2 (en) * 2006-08-11 2011-08-30 Sharp Kabushiki Kaisha Data processing apparatus, program managing apparatus, control program updating method, program managing method, program managing system, updating program, and recording medium
CN101526908A (en) * 2008-03-06 2009-09-09 晨星半导体股份有限公司 Device and method for firmware updating
CN101770372A (en) * 2008-12-31 2010-07-07 亚旭电脑股份有限公司 Firmware update system, method and building method of firmware of firmware update system

Also Published As

Publication number Publication date
CN103455354A (en) 2013-12-18

Similar Documents

Publication Publication Date Title
CN103455354B (en) Method and equipment for preventing hardware update from failing
US10911065B2 (en) Computer system and method including selectively compressing data files and directories based on an operator indication and representing the amount of available free space
CN102023908B (en) Method and device for backing up boot program
CN105260215A (en) Method of updating vehicle-mounted automobile data recorder terminal by USB flash disk
US8341386B2 (en) Method for updating basic input/output system and method for repairing thereof
JP5113700B2 (en) Firmware update apparatus and method
US20070055969A1 (en) System and method for updating firmware
US20110004871A1 (en) Embedded electronic device and firmware updating method thereof
WO2015070521A1 (en) Method for making ubi format system file into factory burnt image file
US8136108B2 (en) Updating firmware with multiple processors
CN102334100A (en) Program update device, program update method, and information processing device
JP2009230407A (en) Data update method, memory system and memory device
CN101639785A (en) Method and device for software updating
CN103970564A (en) Automatic repairing and upgrading method of embedded operating system and embedded operating system with automatic repairing and upgrading functions
KR20170040734A (en) Electronic system with update control mechanism and method of operation thereof
CN103530138A (en) Method and device for protecting file system data based on embedded LINUX
KR20080023841A (en) The method of firmware upgrade and automatic firmware recovery system
CN107003876A (en) Firmware updates
CN109086078A (en) Android system upgrade method, device, server and mobile terminal
CN105637521A (en) Data processing method and intelligent terminal
CN101800840B (en) Set top box upgrading method
CN105677409A (en) System upgrading method and device
CN105069381B (en) A kind of partition protecting method and system based on intelligent terminal
CN103559059A (en) Quick medium-free upgrading method for Linux system
CN113032183A (en) System management method, device, computer equipment and storage medium

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant