CN103533534A - Firmware wireless upgrading method for DECT (Digital Enhanced Cordless Telecommunications) mobile phone - Google Patents
Firmware wireless upgrading method for DECT (Digital Enhanced Cordless Telecommunications) mobile phone Download PDFInfo
- Publication number
- CN103533534A CN103533534A CN201310481001.8A CN201310481001A CN103533534A CN 103533534 A CN103533534 A CN 103533534A CN 201310481001 A CN201310481001 A CN 201310481001A CN 103533534 A CN103533534 A CN 103533534A
- Authority
- CN
- China
- Prior art keywords
- upgrading
- data
- handle
- app
- main frame
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Landscapes
- Mobile Radio Communication Systems (AREA)
Abstract
The invention relates to a firmware wireless upgrading method for a DECT (Digital Enhanced Cordless Telecommunications) mobile phone. A firmware upgrading data packet is sent to a handle through a host in a wireless communication mode and in the upgrading process, a conventional data line is completely abandoned; when upgrading is failed or is artificially interrupted, restarting is carried out to enter a safety mode, dependence on FFS (Fringe Field Switching) data is abandoned and an upgraded end can meet the lowest start requirement and then is continuously upgraded; after the handle receives data, only a check code is returned to the host, but not all the received data are returned to the host to be checked, so that the data transmission quantity is greatly reduced and the transmission time is shortened; firmware upgrading of the firmware wireless upgrading method is divided into two parts, upgrading can be separately carried out in the two parts and under the common condition of only updating a program without updating resources, upgrading of the first part can greatly reduce upgrading time and improve upgrading efficiency.
Description
Technical field
The present invention relates to a kind of wireless firmware upgrade method of DECT mobile phone.
Background technology
For DECT (DECT) mobile phone, because thering is the feature of wireless telecommunications, there is very much competitiveness, but tradition still relies on data wire for its firmware upgrade, and be limited to the problems such as wireless transmission rate, space are inadequate, cause exploitation difficulty.DECT mobile phone comprises two kinds of data, and a kind of is APP, is executable program data, and a kind of is FFS, is the file system of storage general data.
Summary of the invention
The object of the present invention is to provide a kind of wireless firmware upgrade method that does not rely on the DECT of data wire and low hardware consumption.
A wireless firmware upgrade method for mobile phone, comprises the steps:
Step 1, to set a part before the SPI Flash of handle be file system area, after a part be APP copy region, upgrade again APP copy after having upgraded file system;
Step 2, by main frame or handle, initiate upgrade request, main frame and handle open wireless updating protocol stack, main frame removes remote server downloading data bag according to configuration information, and the packet of having downloaded is deposited in the internal memory of opening up;
Step 3, main frame obtain handle operating software version, if version is the same or upgraded, skip upgrading, and upgrading finishes, otherwise enters step 4;
Step 4, upgrading start, handle is first wiped SPI Flash, the packed data that handle Receiving Host sends over, in whole packed data receiving course, this packed data snaps to 1K, handle carries out verification and decompress(ion) to packed data, be written in the file system area before SPI Flash, after the first decompress(ion) of described packed data, all deposit in after being reduced into a complete original data block in file system area and be updated to again APP copy region, if wipe or ablation process in be interrupted, can start and enter safe mode, and get back to step 2;
Step 5, handle carry out CRC check after receiving data, when the data to all complete CRC check, automatically produce a check code, and this check code is sent to main frame, and main frame is confirmed accurately to handle, to send order and make it to restart afterwards to this check code
;
Step 6, handle restart rear horse back enter Bootloader file reading system look into see if there is upgrading APP needs, if had, enter local upgrade pattern, go to step 7, otherwise upgraded;
Step 7, handle enter local upgrade pattern, APP copy data to needs copy carries out verification, if verification correctly, executable program region is wiped, then carry out data carrying, from file is copied toward APP region from APP copy region, when all data are all write into APP region, carry out Data Comparison, after contrast is correct, wipe flag bit to be upgraded, initial data in handle is emptied, restart next time and can normally enter system, upgrading completes.
Firmware upgrade packet of the present invention sends to handle by communication via main frame, and escalation process is abandoned traditional data line completely; Upgrading unsuccessfully, or artificial will restart when interrupting upgrading enter safe mode, abandon the dependence to FFS data, and make to be upgraded end, can meet minimum startup requirement and then continue to upgrade; Handle receives after data, and only back-checking code is to main frame, rather than returns to all reception data and check to main frame, and volume of transmitted data greatly reduces, and has shortened the transmission time; Firmware upgrade of the present invention divides two parts, can separately upgrade, if under general case refresh routine and not more new resources in the situation that, upgrading first wherein, can significantly reduce update time, improves upgrading efficiency just.
Embodiment
The wireless firmware upgrade method of a kind of DECT mobile phone of the present invention, specifically comprises the steps:
Step 1, to set a part before the SPI Flash of handle be file system area, after a part be APP copy region, upgrade again APP copy after having upgraded file system;
Step 2, by main frame or handle, initiate upgrade request, main frame and handle open wireless updating protocol stack, main frame removes remote server downloading data bag according to configuration information, and the packet of having downloaded is deposited in the internal memory of opening up;
Step 3, main frame obtain handle operating software version, if version is the same or upgraded, skip upgrading, and upgrading finishes, otherwise enters step 4;
Step 4, upgrading starts, handle is first wiped SPI Flash, the packed data that handle Receiving Host sends over, in whole packed data receiving course, this packed data snaps to 1K, the true writing address of so each transmission is all can be by very simple record, after can avoiding mobile phone to receive data, writing position is made mistakes, handle carries out verification to packed data, and decompress(ion), be written in the file system area before SPI Flash, after the first decompress(ion) of described packed data, all deposit in after being reduced into a complete original data block in file system area and be updated to again APP copy region, if wipe or ablation process in be interrupted, can start and enter safe mode, and get back to step 2,
Step 5, handle carry out CRC check after receiving data, when the data to all complete CRC check, automatically produce the check code of 32 bit lengths, and this check code is sent to main frame, main frame is confirmed accurately to handle, to send order and make it to restart afterwards to this check code
;
Step 6, handle restart rear horse back enter Bootloader file reading system look into see if there is upgrading APP needs, if had, enter local upgrade pattern, go to step 7, otherwise upgraded;
Step 7, handle enter local upgrade pattern, APP copy data to needs copy carries out verification, if verification correctly, executable program region is wiped, then carry out data carrying, from file is copied toward APP region from APP copy region, when all data are all write into APP region, carry out Data Comparison, after contrast is correct, wipe flag bit to be upgraded, initial data in handle is emptied, restart next time and can normally enter system, upgrading completes.
More than only having the 5th step is to have atomicity, and the 6th step can not affect escalation process, as long as not executing the 5th step all not very upgrades successfully, but can unconfinedly restart and restart upgrading (as long as APP copy data does not damage).This kind of way can under any circumstance guarantee to upgrade successfully (comprising low-down probability repeated events) completely.
The above, it is only preferred embodiment of the present invention, not technical scope of the present invention is imposed any restrictions, therefore any trickle modification, equivalent variations and modification that every foundation technical spirit of the present invention is done above embodiment all still belong in the scope of technical solution of the present invention.
Claims (1)
1. a wireless firmware upgrade method for DECT mobile phone, is characterized in that comprising the steps:
Step 1, to set a part before the SPI Flash of handle be file system area, after a part be APP copy region, upgrade again APP copy after having upgraded file system;
Step 2, by main frame or handle, initiate upgrade request, main frame and handle open wireless updating protocol stack, main frame removes remote server downloading data bag according to configuration information, and the packet of having downloaded is deposited in the internal memory of opening up;
Step 3, main frame obtain handle operating software version, if version is the same or upgraded, skip upgrading, and upgrading finishes, otherwise enters step 4;
Step 4, upgrading start, handle is first wiped SPI Flash, the packed data that handle Receiving Host sends over, in whole packed data receiving course, this packed data snaps to 1K, handle carries out verification and decompress(ion) to packed data, be written in the file system area before SPI Flash, after the first decompress(ion) of described packed data, all deposit in after being reduced into a complete original data block in file system area and be updated to again APP copy region, if wipe or ablation process in be interrupted, can start and enter safe mode, and get back to step 2;
Step 5, handle carry out CRC check after receiving data, when the data to all complete CRC check, automatically produce a check code, and this check code is sent to main frame, and main frame is confirmed accurately to handle, to send order and make it to restart afterwards to this check code
;
Step 6, handle restart rear horse back enter Bootloader file reading system look into see if there is upgrading APP needs, if had, enter local upgrade pattern, go to step 7, otherwise upgraded;
Step 7, handle enter local upgrade pattern, APP copy data to needs copy carries out verification, if verification correctly, executable program region is wiped, then carry out data carrying, from file is copied toward APP region from APP copy region, when all data are all write into APP region, carry out Data Comparison, after contrast is correct, wipe flag bit to be upgraded, initial data in handle is emptied, restart next time and can normally enter system, upgrading completes.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310481001.8A CN103533534B (en) | 2013-10-15 | 2013-10-15 | Firmware wireless upgrading method for DECT (Digital Enhanced Cordless Telecommunications) mobile phone |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310481001.8A CN103533534B (en) | 2013-10-15 | 2013-10-15 | Firmware wireless upgrading method for DECT (Digital Enhanced Cordless Telecommunications) mobile phone |
Publications (2)
Publication Number | Publication Date |
---|---|
CN103533534A true CN103533534A (en) | 2014-01-22 |
CN103533534B CN103533534B (en) | 2017-02-01 |
Family
ID=49935127
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201310481001.8A Active CN103533534B (en) | 2013-10-15 | 2013-10-15 | Firmware wireless upgrading method for DECT (Digital Enhanced Cordless Telecommunications) mobile phone |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103533534B (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103823723A (en) * | 2014-02-19 | 2014-05-28 | 惠州Tcl移动通信有限公司 | Mobile terminal touch screen firmware restoration method and device |
CN108958767A (en) * | 2018-06-21 | 2018-12-07 | 厦门亿联网络技术股份有限公司 | A kind of safe mode automatically updating method realized based on minimum system backup |
CN109918110A (en) * | 2019-03-05 | 2019-06-21 | 郑州中豫绿能电子科技有限公司 | Remote upgrade method based on support plate under DTU |
CN111443927A (en) * | 2020-02-25 | 2020-07-24 | 厦门亿联网络技术股份有限公司 | Method and system for clone upgrading between DECT roaming system devices |
CN113031985A (en) * | 2021-02-07 | 2021-06-25 | 厦门亿联网络技术股份有限公司 | Wireless upgrading method |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101515967B (en) * | 2009-03-18 | 2012-10-10 | 中兴通讯股份有限公司 | Over-the-air downloader of terminal firmware and method thereof |
CN101778376A (en) * | 2009-12-31 | 2010-07-14 | 中兴通讯股份有限公司 | Method and device for realizing wireless firmware update |
-
2013
- 2013-10-15 CN CN201310481001.8A patent/CN103533534B/en active Active
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103823723A (en) * | 2014-02-19 | 2014-05-28 | 惠州Tcl移动通信有限公司 | Mobile terminal touch screen firmware restoration method and device |
CN103823723B (en) * | 2014-02-19 | 2017-08-08 | 惠州Tcl移动通信有限公司 | The touch-screen firmware restorative procedure and device of a kind of mobile terminal |
CN108958767A (en) * | 2018-06-21 | 2018-12-07 | 厦门亿联网络技术股份有限公司 | A kind of safe mode automatically updating method realized based on minimum system backup |
CN109918110A (en) * | 2019-03-05 | 2019-06-21 | 郑州中豫绿能电子科技有限公司 | Remote upgrade method based on support plate under DTU |
CN111443927A (en) * | 2020-02-25 | 2020-07-24 | 厦门亿联网络技术股份有限公司 | Method and system for clone upgrading between DECT roaming system devices |
CN113031985A (en) * | 2021-02-07 | 2021-06-25 | 厦门亿联网络技术股份有限公司 | Wireless upgrading method |
Also Published As
Publication number | Publication date |
---|---|
CN103533534B (en) | 2017-02-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2013178048A1 (en) | Method and device for generating firmware over-the-air upgrade package | |
CN103533534A (en) | Firmware wireless upgrading method for DECT (Digital Enhanced Cordless Telecommunications) mobile phone | |
WO2017067448A1 (en) | Firmware-over-the-air upgrade method, system and computer storage medium | |
US20070074201A1 (en) | Method and system for updating software and computer readable recording medium storing the method | |
WO2017049550A1 (en) | Adapter and adapter upgrade method | |
CN104199706A (en) | Firmware upgrade method and device for eMMC | |
WO2019062635A1 (en) | Update method and device | |
CN110618830B (en) | Remote upgrading method and system based on NBIOT network | |
CN102622283A (en) | Backup recovery method and device for radio frequency calibration parameters of terminal | |
US20160170735A1 (en) | Operating system updating method by using a checklist | |
CN104283878A (en) | Security type mobile terminal based on cloud services and method of security type mobile terminal based on cloud services for having access to cloud server | |
KR101541112B1 (en) | FOTA system and the method | |
CN102915249A (en) | Method and device for remotely realizing firmware updating | |
CN112162773B (en) | Differential upgrading method and device, storage medium and terminal | |
CN102004657B (en) | A kind of electronic equipment and upgrade method thereof | |
US10120791B2 (en) | Data read apparatus, data read method, and storage medium storing data read program | |
EP4270299A1 (en) | Operating system upgrade method, electronic device, and storage medium | |
CN110333876A (en) | A kind of data clearing method and control equipment | |
CN103885763A (en) | Operating system resource access method and system | |
CN110474977A (en) | Firmware upgrade method, firmware upgrade system and the intelligent door lock of intelligent door lock | |
EP3313041A1 (en) | Application download method and device | |
CN114064077A (en) | Automobile ECU cloud software upgrading method based on TC397 microcontroller address mapping | |
CN104298757A (en) | Method and system allowing compatibility with mobile clients and databases different in version | |
WO2019129271A1 (en) | Method for electronic device authentication and firmware update, and electronic device | |
WO2023198056A1 (en) | Firmware update method for embedded device, and embedded device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant |