CN103533534A - Firmware wireless upgrading method for DECT (Digital Enhanced Cordless Telecommunications) mobile phone - Google Patents

Firmware wireless upgrading method for DECT (Digital Enhanced Cordless Telecommunications) mobile phone Download PDF

Info

Publication number
CN103533534A
CN103533534A CN201310481001.8A CN201310481001A CN103533534A CN 103533534 A CN103533534 A CN 103533534A CN 201310481001 A CN201310481001 A CN 201310481001A CN 103533534 A CN103533534 A CN 103533534A
Authority
CN
China
Prior art keywords
upgrading
data
handle
app
main frame
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201310481001.8A
Other languages
Chinese (zh)
Other versions
CN103533534B (en
Inventor
曾炳阳
黄志坚
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xiamen Yealink Network Technology Co Ltd
Original Assignee
Xiamen Yealink Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xiamen Yealink Network Technology Co Ltd filed Critical Xiamen Yealink Network Technology Co Ltd
Priority to CN201310481001.8A priority Critical patent/CN103533534B/en
Publication of CN103533534A publication Critical patent/CN103533534A/en
Application granted granted Critical
Publication of CN103533534B publication Critical patent/CN103533534B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

The invention relates to a firmware wireless upgrading method for a DECT (Digital Enhanced Cordless Telecommunications) mobile phone. A firmware upgrading data packet is sent to a handle through a host in a wireless communication mode and in the upgrading process, a conventional data line is completely abandoned; when upgrading is failed or is artificially interrupted, restarting is carried out to enter a safety mode, dependence on FFS (Fringe Field Switching) data is abandoned and an upgraded end can meet the lowest start requirement and then is continuously upgraded; after the handle receives data, only a check code is returned to the host, but not all the received data are returned to the host to be checked, so that the data transmission quantity is greatly reduced and the transmission time is shortened; firmware upgrading of the firmware wireless upgrading method is divided into two parts, upgrading can be separately carried out in the two parts and under the common condition of only updating a program without updating resources, upgrading of the first part can greatly reduce upgrading time and improve upgrading efficiency.

Description

A kind of wireless firmware upgrade method of DECT mobile phone
Technical field
The present invention relates to a kind of wireless firmware upgrade method of DECT mobile phone.
Background technology
For DECT (DECT) mobile phone, because thering is the feature of wireless telecommunications, there is very much competitiveness, but tradition still relies on data wire for its firmware upgrade, and be limited to the problems such as wireless transmission rate, space are inadequate, cause exploitation difficulty.DECT mobile phone comprises two kinds of data, and a kind of is APP, is executable program data, and a kind of is FFS, is the file system of storage general data.
Summary of the invention
The object of the present invention is to provide a kind of wireless firmware upgrade method that does not rely on the DECT of data wire and low hardware consumption.
A wireless firmware upgrade method for mobile phone, comprises the steps:
Step 1, to set a part before the SPI Flash of handle be file system area, after a part be APP copy region, upgrade again APP copy after having upgraded file system;
Step 2, by main frame or handle, initiate upgrade request, main frame and handle open wireless updating protocol stack, main frame removes remote server downloading data bag according to configuration information, and the packet of having downloaded is deposited in the internal memory of opening up;
Step 3, main frame obtain handle operating software version, if version is the same or upgraded, skip upgrading, and upgrading finishes, otherwise enters step 4;
Step 4, upgrading start, handle is first wiped SPI Flash, the packed data that handle Receiving Host sends over, in whole packed data receiving course, this packed data snaps to 1K, handle carries out verification and decompress(ion) to packed data, be written in the file system area before SPI Flash, after the first decompress(ion) of described packed data, all deposit in after being reduced into a complete original data block in file system area and be updated to again APP copy region, if wipe or ablation process in be interrupted, can start and enter safe mode, and get back to step 2;
Step 5, handle carry out CRC check after receiving data, when the data to all complete CRC check, automatically produce a check code, and this check code is sent to main frame, and main frame is confirmed accurately to handle, to send order and make it to restart afterwards to this check code ;
Step 6, handle restart rear horse back enter Bootloader file reading system look into see if there is upgrading APP needs, if had, enter local upgrade pattern, go to step 7, otherwise upgraded;
Step 7, handle enter local upgrade pattern, APP copy data to needs copy carries out verification, if verification correctly, executable program region is wiped, then carry out data carrying, from file is copied toward APP region from APP copy region, when all data are all write into APP region, carry out Data Comparison, after contrast is correct, wipe flag bit to be upgraded, initial data in handle is emptied, restart next time and can normally enter system, upgrading completes.
Firmware upgrade packet of the present invention sends to handle by communication via main frame, and escalation process is abandoned traditional data line completely; Upgrading unsuccessfully, or artificial will restart when interrupting upgrading enter safe mode, abandon the dependence to FFS data, and make to be upgraded end, can meet minimum startup requirement and then continue to upgrade; Handle receives after data, and only back-checking code is to main frame, rather than returns to all reception data and check to main frame, and volume of transmitted data greatly reduces, and has shortened the transmission time; Firmware upgrade of the present invention divides two parts, can separately upgrade, if under general case refresh routine and not more new resources in the situation that, upgrading first wherein, can significantly reduce update time, improves upgrading efficiency just.
Embodiment
The wireless firmware upgrade method of a kind of DECT mobile phone of the present invention, specifically comprises the steps:
Step 1, to set a part before the SPI Flash of handle be file system area, after a part be APP copy region, upgrade again APP copy after having upgraded file system;
Step 2, by main frame or handle, initiate upgrade request, main frame and handle open wireless updating protocol stack, main frame removes remote server downloading data bag according to configuration information, and the packet of having downloaded is deposited in the internal memory of opening up;
Step 3, main frame obtain handle operating software version, if version is the same or upgraded, skip upgrading, and upgrading finishes, otherwise enters step 4;
Step 4, upgrading starts, handle is first wiped SPI Flash, the packed data that handle Receiving Host sends over, in whole packed data receiving course, this packed data snaps to 1K, the true writing address of so each transmission is all can be by very simple record, after can avoiding mobile phone to receive data, writing position is made mistakes, handle carries out verification to packed data, and decompress(ion), be written in the file system area before SPI Flash, after the first decompress(ion) of described packed data, all deposit in after being reduced into a complete original data block in file system area and be updated to again APP copy region, if wipe or ablation process in be interrupted, can start and enter safe mode, and get back to step 2,
Step 5, handle carry out CRC check after receiving data, when the data to all complete CRC check, automatically produce the check code of 32 bit lengths, and this check code is sent to main frame, main frame is confirmed accurately to handle, to send order and make it to restart afterwards to this check code ;
Step 6, handle restart rear horse back enter Bootloader file reading system look into see if there is upgrading APP needs, if had, enter local upgrade pattern, go to step 7, otherwise upgraded;
Step 7, handle enter local upgrade pattern, APP copy data to needs copy carries out verification, if verification correctly, executable program region is wiped, then carry out data carrying, from file is copied toward APP region from APP copy region, when all data are all write into APP region, carry out Data Comparison, after contrast is correct, wipe flag bit to be upgraded, initial data in handle is emptied, restart next time and can normally enter system, upgrading completes.
More than only having the 5th step is to have atomicity, and the 6th step can not affect escalation process, as long as not executing the 5th step all not very upgrades successfully, but can unconfinedly restart and restart upgrading (as long as APP copy data does not damage).This kind of way can under any circumstance guarantee to upgrade successfully (comprising low-down probability repeated events) completely.
The above, it is only preferred embodiment of the present invention, not technical scope of the present invention is imposed any restrictions, therefore any trickle modification, equivalent variations and modification that every foundation technical spirit of the present invention is done above embodiment all still belong in the scope of technical solution of the present invention.

Claims (1)

1. a wireless firmware upgrade method for DECT mobile phone, is characterized in that comprising the steps:
Step 1, to set a part before the SPI Flash of handle be file system area, after a part be APP copy region, upgrade again APP copy after having upgraded file system;
Step 2, by main frame or handle, initiate upgrade request, main frame and handle open wireless updating protocol stack, main frame removes remote server downloading data bag according to configuration information, and the packet of having downloaded is deposited in the internal memory of opening up;
Step 3, main frame obtain handle operating software version, if version is the same or upgraded, skip upgrading, and upgrading finishes, otherwise enters step 4;
Step 4, upgrading start, handle is first wiped SPI Flash, the packed data that handle Receiving Host sends over, in whole packed data receiving course, this packed data snaps to 1K, handle carries out verification and decompress(ion) to packed data, be written in the file system area before SPI Flash, after the first decompress(ion) of described packed data, all deposit in after being reduced into a complete original data block in file system area and be updated to again APP copy region, if wipe or ablation process in be interrupted, can start and enter safe mode, and get back to step 2;
Step 5, handle carry out CRC check after receiving data, when the data to all complete CRC check, automatically produce a check code, and this check code is sent to main frame, and main frame is confirmed accurately to handle, to send order and make it to restart afterwards to this check code ;
Step 6, handle restart rear horse back enter Bootloader file reading system look into see if there is upgrading APP needs, if had, enter local upgrade pattern, go to step 7, otherwise upgraded;
Step 7, handle enter local upgrade pattern, APP copy data to needs copy carries out verification, if verification correctly, executable program region is wiped, then carry out data carrying, from file is copied toward APP region from APP copy region, when all data are all write into APP region, carry out Data Comparison, after contrast is correct, wipe flag bit to be upgraded, initial data in handle is emptied, restart next time and can normally enter system, upgrading completes.
CN201310481001.8A 2013-10-15 2013-10-15 Firmware wireless upgrading method for DECT (Digital Enhanced Cordless Telecommunications) mobile phone Active CN103533534B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310481001.8A CN103533534B (en) 2013-10-15 2013-10-15 Firmware wireless upgrading method for DECT (Digital Enhanced Cordless Telecommunications) mobile phone

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310481001.8A CN103533534B (en) 2013-10-15 2013-10-15 Firmware wireless upgrading method for DECT (Digital Enhanced Cordless Telecommunications) mobile phone

Publications (2)

Publication Number Publication Date
CN103533534A true CN103533534A (en) 2014-01-22
CN103533534B CN103533534B (en) 2017-02-01

Family

ID=49935127

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310481001.8A Active CN103533534B (en) 2013-10-15 2013-10-15 Firmware wireless upgrading method for DECT (Digital Enhanced Cordless Telecommunications) mobile phone

Country Status (1)

Country Link
CN (1) CN103533534B (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103823723A (en) * 2014-02-19 2014-05-28 惠州Tcl移动通信有限公司 Mobile terminal touch screen firmware restoration method and device
CN108958767A (en) * 2018-06-21 2018-12-07 厦门亿联网络技术股份有限公司 A kind of safe mode automatically updating method realized based on minimum system backup
CN109918110A (en) * 2019-03-05 2019-06-21 郑州中豫绿能电子科技有限公司 Remote upgrade method based on support plate under DTU
CN111443927A (en) * 2020-02-25 2020-07-24 厦门亿联网络技术股份有限公司 Method and system for clone upgrading between DECT roaming system devices
CN113031985A (en) * 2021-02-07 2021-06-25 厦门亿联网络技术股份有限公司 Wireless upgrading method

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101515967B (en) * 2009-03-18 2012-10-10 中兴通讯股份有限公司 Over-the-air downloader of terminal firmware and method thereof
CN101778376A (en) * 2009-12-31 2010-07-14 中兴通讯股份有限公司 Method and device for realizing wireless firmware update

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103823723A (en) * 2014-02-19 2014-05-28 惠州Tcl移动通信有限公司 Mobile terminal touch screen firmware restoration method and device
CN103823723B (en) * 2014-02-19 2017-08-08 惠州Tcl移动通信有限公司 The touch-screen firmware restorative procedure and device of a kind of mobile terminal
CN108958767A (en) * 2018-06-21 2018-12-07 厦门亿联网络技术股份有限公司 A kind of safe mode automatically updating method realized based on minimum system backup
CN109918110A (en) * 2019-03-05 2019-06-21 郑州中豫绿能电子科技有限公司 Remote upgrade method based on support plate under DTU
CN111443927A (en) * 2020-02-25 2020-07-24 厦门亿联网络技术股份有限公司 Method and system for clone upgrading between DECT roaming system devices
CN113031985A (en) * 2021-02-07 2021-06-25 厦门亿联网络技术股份有限公司 Wireless upgrading method

Also Published As

Publication number Publication date
CN103533534B (en) 2017-02-01

Similar Documents

Publication Publication Date Title
WO2013178048A1 (en) Method and device for generating firmware over-the-air upgrade package
CN103533534A (en) Firmware wireless upgrading method for DECT (Digital Enhanced Cordless Telecommunications) mobile phone
WO2017067448A1 (en) Firmware-over-the-air upgrade method, system and computer storage medium
US20070074201A1 (en) Method and system for updating software and computer readable recording medium storing the method
WO2017049550A1 (en) Adapter and adapter upgrade method
CN104199706A (en) Firmware upgrade method and device for eMMC
WO2019062635A1 (en) Update method and device
CN110618830B (en) Remote upgrading method and system based on NBIOT network
CN102622283A (en) Backup recovery method and device for radio frequency calibration parameters of terminal
US20160170735A1 (en) Operating system updating method by using a checklist
CN104283878A (en) Security type mobile terminal based on cloud services and method of security type mobile terminal based on cloud services for having access to cloud server
KR101541112B1 (en) FOTA system and the method
CN102915249A (en) Method and device for remotely realizing firmware updating
CN112162773B (en) Differential upgrading method and device, storage medium and terminal
CN102004657B (en) A kind of electronic equipment and upgrade method thereof
US10120791B2 (en) Data read apparatus, data read method, and storage medium storing data read program
EP4270299A1 (en) Operating system upgrade method, electronic device, and storage medium
CN110333876A (en) A kind of data clearing method and control equipment
CN103885763A (en) Operating system resource access method and system
CN110474977A (en) Firmware upgrade method, firmware upgrade system and the intelligent door lock of intelligent door lock
EP3313041A1 (en) Application download method and device
CN114064077A (en) Automobile ECU cloud software upgrading method based on TC397 microcontroller address mapping
CN104298757A (en) Method and system allowing compatibility with mobile clients and databases different in version
WO2019129271A1 (en) Method for electronic device authentication and firmware update, and electronic device
WO2023198056A1 (en) Firmware update method for embedded device, and embedded device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant