CN104007996A - Reliable firmware upgrading realizing method for distributed control system - Google Patents
Reliable firmware upgrading realizing method for distributed control system Download PDFInfo
- Publication number
- CN104007996A CN104007996A CN201410267711.5A CN201410267711A CN104007996A CN 104007996 A CN104007996 A CN 104007996A CN 201410267711 A CN201410267711 A CN 201410267711A CN 104007996 A CN104007996 A CN 104007996A
- Authority
- CN
- China
- Prior art keywords
- aku
- upgrade file
- upgrading
- program
- jump
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 34
- 230000005540 biological transmission Effects 0.000 claims description 12
- 238000012423 maintenance Methods 0.000 abstract description 2
- 238000012795 verification Methods 0.000 abstract 1
- 230000008569 process Effects 0.000 description 3
- 238000004891 communication Methods 0.000 description 2
- 238000011161 development Methods 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 230000002159 abnormal effect Effects 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000008901 benefit Effects 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
Landscapes
- Stored Programmes (AREA)
- Information Transfer Between Computers (AREA)
Abstract
The invention provides a reliable firmware upgrading realizing method applied to a distributed control system. The reliable firmware upgrading realizing method enables any controller nodes or a host in the system to have program upgrading capacity, greatly improves the expansion capacity of hardware equipment and the customizing performance of the system and reduces later maintenance and upgrading cost. The reliable firmware upgrading realizing method is different from a traditional method in that receiving of a target program package is realized in an application program, the received data package is stored into a backup program area at first, after the target program package is completely received and CRC verification is passed, parameter information marks are generated in an IAP mark area, and a Boot loader is called for to realize program upgrading. Even if an unpredictable failure occurs in any link, existing programs cannot be replaced, and therefore the stability of the system is greatly improved.
Description
Technical field
The present invention relates to a kind of program firmware upgrade new method that is applied to dcs field.
Background technology
Along with the development of electronic industry, node unit in dcs is more and more various, logic function is also done more complicated and more complicated, once find that the system of moving occurs that Bug maybe needs to change the situation of agreement newly added equipment, if there is no reliablely and stablely more new tool of on-the-spot program firmware of one, will face the vicious cycle of system dismounting---depot repair---system heavy dressing work.Although present a lot of distributed systems all provide program firmware updating function, but due to machine-processed problem, this method often can only complete the upgrading to main frame, cannot be general in dissimilar node, once and some system meets accident and upgrades unsuccessfully midway, to cause the thorough inefficacy of system, the maintenance cost greatly having increased, can not embody the advantage of development in science and technology.As shown in Figure 1, the dcs of a standard often comprise one can with the system host of PC communication, one or more bus, several controls of carry or detection node in bus.Whole distributed system also needs the transmission of formulating a host computer-node, host computer-main frame to reply transparent transmission mechanism, to realize upper function, any one node in distributed system is realized to program upgrade.
Summary of the invention
Goal of the invention: for above-mentioned prior art, provide a kind of reliable firmware upgrade implementation method of dcs, realize the reliable upgrading of each node in dcs and main frame.
Technical scheme: a kind of reliable firmware upgrade implementation method of dcs, the FLASH branch of main frame and each node includes Bootloader district, working procedure district, stand-by program district, upgrading label area and data parameters district; Firmware upgrade implementation method comprises the steps:
Step 1), host computer is 2 by upgrade file by size
nbyte is divided into some AKU, and each AKU also comprises upgrade file version number, upgrade file overall budget number, the total CRC check of upgrade file and current AKU sequence number; The integer that wherein n is 1~8;
Step 2), each AKU that when upgrading, the local firmware program reception host computer of main frame or each node sends also deposits stand-by program district separately in, generate upgrading task flagging receiving after all AKU in upgrading label area, described upgrading task flagging comprises the byte number of upgrade file version number, upgrade file overall budget number, the total CRC check of upgrade file and the every bag of upgrade file;
Step 3), by main frame or each node reset being carried out to the Bootloader of starting outfit, described Bootloader reads after the upgrading task flagging of its upgrading label area, judge whether described stand-by program district exists upgrade file: if exist upgrade file to jump to step 4), if do not exist upgrade file to jump to step 8);
Step 4), judge that by CRC check whether upgrade file is effective: if upgrade file effectively jumps to step 5); If the invalid step 8 that jumps to of upgrade file);
Step 5), jump to step 6 after wiping the file in described main frame or each node operator district), wipe and extremely jump to step 3 if occur);
Step 6), jump to step 7 after the AKU in described stand-by program district is write to described local runtime program area), write and extremely jump to step 3 if occur);
Step 7), jump to step 8 after wiping the upgrading task flagging of the label area of upgrading in described main frame or each node), wipe and extremely jump to step 3 if occur);
Step 8), whether effectively detect described working procedure district target program: if effectively jump to step 9), after time delay, jump to step 3 if invalid);
Step 9), described main frame or each node configuration operation program environment complete upgrading.
Further, the local firmware program of main frame or each node adopts breakpoint transmission agreement to receive each AKU and deposit described stand-by program district in.
As preferred version of the present invention, described step 2) comprise following concrete steps:
Step 2.1), application program receives after any one AKU, carries out the judgement of AKU version number: if the upgrade file version number receiving jump to steps 2.2 different from current working procedure version), do not upgrade if version number is identical;
Step 2.2), determine whether breakpoint transmission bag: the AKU receiving if current and the AKU version number receiving in historical upgrading task, upgrade file overall budget number, the total CRC check of upgrade file are identical, and this AKU receiving is breakpoint transmission bag and jumps to step 2.3); If different be new upgrading task, upgrade file version number, upgrade file overall budget number, the total CRC check information of upgrade file in new historical upgrading task more, and the upgrade file first that starts to ask for new liter level task wraps;
Step 2.3), ask for the AKU of expectation to host computer by the upgrading task of record; If receive, the AKU of expectation jumps to step 2.4), if the AKU of receiving is not to expect that AKU continues to expect AKU to host computer request;
Step 2.4), the AKU receiving is write in FLASH stand-by program district by AKU sequence number; Wherein when often writing after an AKU, read this AKU in from stand-by program district, write whether success to judge: if unsuccessful again to this AKU of host computer request; If successful jump to step 2.5);
Step 2.5), carry out AKU and receive judgement: send the information of having upgraded and jump to described step 3 to host computer if receive), the inwhole complete receptions of AKU continue to expect AKU to host requests.
As preferred version of the present invention, described step 8) in, delay time is 100~500ms.
Beneficial effect: the inventive method is different from classic method to be: in all scalable nodes, the Bootloader of prepackage is only in order to realize program verification and replacement function, Bootloader is positioned at the enabling address of Flash, after system reset, first carry out Bootloader, start to read upgrading label, judge whether to exist in stand-by program district and can pass through the complete upgrade file of program verification, if have and progressively the data of backup area write to operational area, and finally replace the first bag, prevent unexpected generation, then read operational area the first bag and judge whether legal start-up code, if the arbitrary process of replacing meets accident, Bootloader still can be from new execution upgrading, can not occur in the incomplete situation of replacement in program replacement process.Just can wipe upgrading label if upgrade file has been replaced, prepare to start the application program of operational area.
This distributed node firmware upgrade method has not had to receive based on the routine package of communications protocol, routine package is received in application program and realizes, and first deposit the packet of reception in stand-by program district, after reception program bag is complete and CRC check passes through, generate parameter information mark in upgrading label area, and call Bootloader to realize program upgrade, escalation process can be realized breakpoint transmission, even and if send out failure unpredictable in any link, old program can not be replaced, under extreme case, can continue program updates task, Flash reads and writes the delay protection that has 100~500ms when abnormal, can prevent that Flash from being write at short notice bad, improve greatly the stability of system.
Brief description of the drawings
Fig. 1 is the applied distributed system framework of the present invention;
Fig. 2 is that IAP of the present invention divides Division;
Fig. 3 is Bootloader treatment scheme;
Fig. 4 is that application program needs embedded reception processing data packets;
Fig. 5 is AKU and FLASH corresponding relation;
Fig. 6 is the definition of upgrading control field.
Embodiment
Below in conjunction with accompanying drawing, the present invention is done further and explained.
A reliable firmware upgrade implementation method for dcs, as shown in Figure 2, the FLASH branch of main frame and each node includes Bootloader district, working procedure district, stand-by program district, upgrading label area and data parameters district; And Bootloader district and working procedure district are only divided in the FLASH space of common IAP upgrading.
As shown in Figure 3, firmware upgrade implementation method comprises the steps:
Step 1), host computer is 2 by upgrade file by size
nbyte is divided into some AKU, and each AKU also comprises upgrade file version number, upgrade file overall budget number, the total CRC check of upgrade file and current AKU sequence number; The integer that wherein n is 1~8;
Step 2), each AKU that when upgrading, the local firmware program employing breakpoint transmission agreement reception host computer of main frame or each node sends also deposits stand-by program district separately in, as shown in Figure 4, specifically comprises the steps:
Step 2.1), application program receives after any one AKU, carries out the judgement of AKU version number: if the upgrade file version number receiving jump to steps 2.2 different from current working procedure version), do not upgrade if version number is identical;
Step 2.2), determine whether breakpoint transmission bag: the AKU receiving if current and the AKU version number receiving in historical upgrading task, upgrade file overall budget number, the total CRC check of upgrade file are identical, and this AKU receiving is breakpoint transmission bag and jumps to step 2.3); If different be new upgrading task, upgrade file version number, upgrade file overall budget number, the total CRC check information of upgrade file in new historical upgrading task more, and the upgrade file first that starts to ask for new liter level task wraps;
Step 2.3), ask for the AKU of expectation to host computer by the upgrading task of record; If receive, the AKU of expectation jumps to step 2.4), if the AKU of receiving is not to expect that AKU continues to expect AKU to host computer request;
Step 2.4), the AKU receiving is write in FLASH stand-by program district by AKU sequence number; Wherein when often writing after an AKU, read this AKU in from stand-by program district, write whether success to judge: if unsuccessful again to this AKU of host computer request; If successful jump to step 2.5);
Step 2.5), carry out AKU and receive judgement: send the information of having upgraded and jump to described step 3 to host computer if receive), the inwhole complete receptions of AKU continue to expect AKU to host requests.
For example every sector writes 16 AKU, as shown in Figure 5, generate upgrading task flagging receiving after all AKU in upgrading label area, described upgrading task flagging comprises the byte number of upgrade file version number, upgrade file overall budget number, the total CRC check of upgrade file and the every bag of upgrade file;
Step 3), by main frame or each node reset being carried out to the Bootloader of starting outfit, described Bootloader reads after the upgrading task flagging of its upgrading label area, judge whether described stand-by program district exists upgrade file: if exist upgrade file to jump to step 4), if do not exist upgrade file to jump to step 8);
Step 4), judge that by CRC check whether upgrade file is effective: if upgrade file effectively jumps to step 5); If the invalid step 8 that jumps to of upgrade file);
Step 5), jump to step 6 after wiping the file in described main frame or each node operator district), wipe and extremely jump to step 3 if occur);
Step 6), jump to step 7 after the AKU in described stand-by program district is write to described local runtime program area), write and extremely jump to step 3 if occur);
Step 7), jump to step 8 after wiping the upgrading task flagging of the label area of upgrading in described main frame or each node), wipe and extremely jump to step 3 if occur);
Step 8), whether effectively detect described working procedure district target program: if effectively jump to step 9), after time delay, jump to step 3 if invalid), delay time can be set as 100~500ms;
Step 9), described main frame or each node configuration operation program environment complete upgrading.
Be illustrated in figure 6 the frame format definition of the descending AKU of this updating protocol and up upgrade request bag.
The above is only the preferred embodiment of the present invention; it should be pointed out that for those skilled in the art, under the premise without departing from the principles of the invention; can also make some improvements and modifications, these improvements and modifications also should be considered as protection scope of the present invention.
Claims (4)
1. a reliable firmware upgrade implementation method for dcs, is characterized in that: the FLASH branch of main frame and each node includes Bootloader district, working procedure district, stand-by program district, upgrading label area and data parameters district; Firmware upgrade implementation method comprises the steps:
Step 1), host computer is 2 by upgrade file by size
nbyte is divided into some AKU, and each AKU also comprises upgrade file version number, upgrade file overall budget number, the total CRC check of upgrade file and current AKU sequence number; The integer that wherein n is 1~8;
Step 2), each AKU that when upgrading, the local firmware program reception host computer of main frame or each node sends also deposits stand-by program district separately in, generate upgrading task flagging receiving after all AKU in upgrading label area, described upgrading task flagging comprises the byte number of upgrade file version number, upgrade file overall budget number, the total CRC check of upgrade file and the every bag of upgrade file;
Step 3), by main frame or each node reset being carried out to the Bootloader of starting outfit, described Bootloader reads after the upgrading task flagging of its upgrading label area, judge whether described stand-by program district exists upgrade file: if exist upgrade file to jump to step 4), if do not exist upgrade file to jump to step 8);
Step 4), judge that by CRC check whether upgrade file is effective: if upgrade file effectively jumps to step 5); If the invalid step 8 that jumps to of upgrade file);
Step 5), jump to step 6 after wiping the file in described main frame or each node operator district), wipe and extremely jump to step 3 if occur);
Step 6), jump to step 7 after the AKU in described stand-by program district is write to described local runtime program area), write and extremely jump to step 3 if occur);
Step 7), jump to step 8 after wiping the upgrading task flagging of the label area of upgrading in described main frame or each node), wipe and extremely jump to step 3 if occur);
Step 8), whether effectively detect described working procedure district target program: if effectively jump to step 9), after time delay, jump to step 3 if invalid);
Step 9), described main frame or each node configuration operation program environment complete upgrading.
2. the reliable firmware upgrade implementation method of a kind of dcs according to claim 1, it is characterized in that: described step 2) in, the local firmware program of main frame or each node adopts breakpoint transmission agreement to receive each AKU and deposit described stand-by program district in.
3. the reliable firmware upgrade implementation method of a kind of dcs according to claim 2, is characterized in that: described step 2) comprise following concrete steps:
Step 2.1), application program receives after any one AKU, carries out the judgement of AKU version number: if the upgrade file version number receiving jump to steps 2.2 different from current working procedure version), do not upgrade if version number is identical;
Step 2.2), determine whether breakpoint transmission bag: the AKU receiving if current and the AKU version number receiving in historical upgrading task, upgrade file overall budget number, the total CRC check of upgrade file are identical, and this AKU receiving is breakpoint transmission bag and jumps to step 2.3); If different be new upgrading task, upgrade file version number, upgrade file overall budget number, the total CRC check information of upgrade file in new historical upgrading task more, and the upgrade file first that starts to ask for new liter level task wraps;
Step 2.3), ask for the AKU of expectation to host computer by the upgrading task of record; If receive, the AKU of expectation jumps to step 2.4), if the AKU of receiving is not to expect that AKU continues to expect AKU to host computer request;
Step 2.4), the AKU receiving is write in FLASH stand-by program district by AKU sequence number; Wherein when often writing after an AKU, read this AKU in from stand-by program district, write whether success to judge: if unsuccessful again to this AKU of host computer request; If successful jump to step 2.5);
Step 2.5), carry out AKU and receive judgement: send the information of having upgraded and jump to described step 3 to host computer if receive), the inwhole complete receptions of AKU continue to expect AKU to host requests.
4. the reliable firmware upgrade implementation method of a kind of dcs according to claim 1, is characterized in that: described step 8) in, delay time is 100~500ms.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410267711.5A CN104007996B (en) | 2014-06-16 | 2014-06-16 | The authentic firmware upgrading of a kind of dcs realizes method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410267711.5A CN104007996B (en) | 2014-06-16 | 2014-06-16 | The authentic firmware upgrading of a kind of dcs realizes method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN104007996A true CN104007996A (en) | 2014-08-27 |
CN104007996B CN104007996B (en) | 2016-07-06 |
Family
ID=51368663
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410267711.5A Expired - Fee Related CN104007996B (en) | 2014-06-16 | 2014-06-16 | The authentic firmware upgrading of a kind of dcs realizes method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104007996B (en) |
Cited By (35)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104615471A (en) * | 2015-03-05 | 2015-05-13 | 浪潮软件集团有限公司 | System upgrading method and device for terminal |
CN105094903A (en) * | 2015-07-16 | 2015-11-25 | 广州飞米电子科技有限公司 | Method and device for upgrading firmware |
CN105117253A (en) * | 2015-08-27 | 2015-12-02 | 常州大学 | BootLoader based remote upgrade method for UV LED (Ultraviolet Light Emitting Diode) curing system |
CN105511918A (en) * | 2015-12-06 | 2016-04-20 | 江苏林洋能源股份有限公司 | Automatic data storage format maintenance method of intelligent electric energy meter |
CN105653299A (en) * | 2014-11-12 | 2016-06-08 | 杭州华三通信技术有限公司 | Firmware upgrade method device |
CN106227572A (en) * | 2016-08-30 | 2016-12-14 | 深圳市蓝海华腾技术股份有限公司 | A kind of frequency converter control system programme upgrade method |
CN107301068A (en) * | 2017-06-12 | 2017-10-27 | 合肥众志行云科技有限公司 | One-to-many wireless program upgrade-system and method on a kind of single-chip microcomputer |
CN107357621A (en) * | 2017-07-14 | 2017-11-17 | 成都天奥电子股份有限公司 | A kind of method that long distance wireless software upgrading is carried out to satellite time transfer equipment |
CN107957880A (en) * | 2017-11-30 | 2018-04-24 | 广东美的暖通设备有限公司 | Air-conditioning firmware upgrade method, device, air-conditioning and computer equipment |
CN108170457A (en) * | 2017-12-27 | 2018-06-15 | 上海闻泰电子科技有限公司 | Firmware upgrade method, device and VR head-mounted displays |
CN108471456A (en) * | 2018-06-26 | 2018-08-31 | 北京长城华冠汽车技术开发有限公司 | Vehicle mounted communication module upgrade-system and upgrade method |
CN109117168A (en) * | 2018-08-29 | 2019-01-01 | 拓攻(南京)机器人有限公司 | Unmanned plane firmware update, device, unmanned plane and storage medium |
CN109358879A (en) * | 2018-10-15 | 2019-02-19 | 广东宝莱特医用科技股份有限公司 | A method of updating monitor system part programs |
CN109416629A (en) * | 2017-11-01 | 2019-03-01 | 深圳市大疆创新科技有限公司 | Firmware upgrade method, electronic equipment, camera system and unmanned vehicle |
CN109445817A (en) * | 2018-10-19 | 2019-03-08 | 郑州云海信息技术有限公司 | A kind of firmware upgrade method |
CN109873722A (en) * | 2019-02-27 | 2019-06-11 | 深圳大学 | Firmware remote upgrade method, device, computer equipment and storage medium |
CN110134415A (en) * | 2019-04-12 | 2019-08-16 | 深圳市致宸信息科技有限公司 | A kind of controller and its method for upgrading software and device |
CN110209405A (en) * | 2019-06-04 | 2019-09-06 | 杭州安恒信息技术股份有限公司 | The automatic updating method and device of distributed system |
CN110244970A (en) * | 2019-05-16 | 2019-09-17 | 芜湖智久机器人有限公司 | A kind of single-chip microcontroller and its upgrade-system, upgrade method |
CN110347418A (en) * | 2019-06-28 | 2019-10-18 | 晶晨半导体(上海)股份有限公司 | Control system upgrade method and control system |
CN110362323A (en) * | 2018-12-20 | 2019-10-22 | 无锡职业技术学院 | Embedded type terminal equipment method for updating program based on distributed ad hoc network |
CN110362321A (en) * | 2018-04-10 | 2019-10-22 | 台达电子工业股份有限公司 | The update method of application program |
CN110413310A (en) * | 2018-04-28 | 2019-11-05 | 深圳市优必选科技有限公司 | Program upgrading method and terminal equipment |
CN110457058A (en) * | 2019-08-09 | 2019-11-15 | 北京万东医疗科技股份有限公司 | Control node online upgrading method, apparatus, host computer, system and electronic equipment |
CN110609692A (en) * | 2019-08-06 | 2019-12-24 | 厦门科灿信息技术有限公司 | Data acquisition module, firmware upgrading method thereof and storage medium |
CN111124451A (en) * | 2019-12-24 | 2020-05-08 | 山东有人信息技术有限公司 | Distributed backup upgrading method |
CN111124966A (en) * | 2019-11-12 | 2020-05-08 | 上海移远通信科技有限公司 | Method and device for improving stability of module data |
CN111142905A (en) * | 2019-12-25 | 2020-05-12 | 深圳市亿道信息股份有限公司 | OTA (over-the-air) upgrading method, OTA server and OTA upgrading system |
CN111182506A (en) * | 2019-12-29 | 2020-05-19 | 合肥工大高科信息科技股份有限公司 | UWB (ultra wide band) tag upgrading method and system based on UWB (ultra wide band) wireless communication |
CN111966385A (en) * | 2020-06-24 | 2020-11-20 | 上海昊博影像科技有限公司 | Flat panel detector online upgrading method, flat panel detector and upper computer |
CN113203936A (en) * | 2021-03-15 | 2021-08-03 | 江西创成微电子有限公司 | Chip testing device, system and method |
CN114625388A (en) * | 2020-12-11 | 2022-06-14 | 深圳市乐众云科技有限公司 | Internet of things MCU (microprogrammed control Unit) air firmware upgrading system and method |
CN115437674A (en) * | 2022-09-28 | 2022-12-06 | 杭州华塑科技股份有限公司 | Firmware upgrading method, device, medium and electronic equipment |
CN116700061A (en) * | 2023-04-12 | 2023-09-05 | 广东为辰信息科技有限公司 | Quick starting method based on safe starting technology |
CN118259949A (en) * | 2024-05-31 | 2024-06-28 | 深圳市欣威智能有限公司 | Electronic equipment firmware upgrading method and device and electronic equipment |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1925425A (en) * | 2006-10-08 | 2007-03-07 | 北京启明星辰信息技术有限公司 | Distributed upgrading method for centralization management mode |
US20110260879A1 (en) * | 2010-04-21 | 2011-10-27 | Microsoft Corporation | Automated recovery and escalation in complex distributed applications |
CN102833101A (en) * | 2012-08-22 | 2012-12-19 | 瑞斯康达科技发展股份有限公司 | Software upgrading method and equipment of distributed network system |
-
2014
- 2014-06-16 CN CN201410267711.5A patent/CN104007996B/en not_active Expired - Fee Related
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1925425A (en) * | 2006-10-08 | 2007-03-07 | 北京启明星辰信息技术有限公司 | Distributed upgrading method for centralization management mode |
US20110260879A1 (en) * | 2010-04-21 | 2011-10-27 | Microsoft Corporation | Automated recovery and escalation in complex distributed applications |
CN102833101A (en) * | 2012-08-22 | 2012-12-19 | 瑞斯康达科技发展股份有限公司 | Software upgrading method and equipment of distributed network system |
Cited By (46)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105653299A (en) * | 2014-11-12 | 2016-06-08 | 杭州华三通信技术有限公司 | Firmware upgrade method device |
CN104615471A (en) * | 2015-03-05 | 2015-05-13 | 浪潮软件集团有限公司 | System upgrading method and device for terminal |
CN105094903A (en) * | 2015-07-16 | 2015-11-25 | 广州飞米电子科技有限公司 | Method and device for upgrading firmware |
CN105094903B (en) * | 2015-07-16 | 2019-02-22 | 广州飞米电子科技有限公司 | The method and device that firmware is upgraded |
CN105117253A (en) * | 2015-08-27 | 2015-12-02 | 常州大学 | BootLoader based remote upgrade method for UV LED (Ultraviolet Light Emitting Diode) curing system |
CN105511918B (en) * | 2015-12-06 | 2018-10-26 | 江苏林洋能源股份有限公司 | A kind of data memory format automatic maintenance method of intelligent electric energy meter |
CN105511918A (en) * | 2015-12-06 | 2016-04-20 | 江苏林洋能源股份有限公司 | Automatic data storage format maintenance method of intelligent electric energy meter |
CN106227572A (en) * | 2016-08-30 | 2016-12-14 | 深圳市蓝海华腾技术股份有限公司 | A kind of frequency converter control system programme upgrade method |
CN107301068A (en) * | 2017-06-12 | 2017-10-27 | 合肥众志行云科技有限公司 | One-to-many wireless program upgrade-system and method on a kind of single-chip microcomputer |
CN107357621B (en) * | 2017-07-14 | 2020-12-15 | 成都天奥电子股份有限公司 | Method for carrying out remote wireless software upgrading on satellite time service equipment |
CN107357621A (en) * | 2017-07-14 | 2017-11-17 | 成都天奥电子股份有限公司 | A kind of method that long distance wireless software upgrading is carried out to satellite time transfer equipment |
CN109416629A (en) * | 2017-11-01 | 2019-03-01 | 深圳市大疆创新科技有限公司 | Firmware upgrade method, electronic equipment, camera system and unmanned vehicle |
WO2019084843A1 (en) * | 2017-11-01 | 2019-05-09 | 深圳市大疆创新科技有限公司 | Firmware upgrading method, electronic device, camera system, and unmanned aerial vehicle |
CN107957880A (en) * | 2017-11-30 | 2018-04-24 | 广东美的暖通设备有限公司 | Air-conditioning firmware upgrade method, device, air-conditioning and computer equipment |
CN108170457A (en) * | 2017-12-27 | 2018-06-15 | 上海闻泰电子科技有限公司 | Firmware upgrade method, device and VR head-mounted displays |
CN110362321B (en) * | 2018-04-10 | 2022-10-11 | 台达电子工业股份有限公司 | Application program updating method |
CN110362321A (en) * | 2018-04-10 | 2019-10-22 | 台达电子工业股份有限公司 | The update method of application program |
CN110413310A (en) * | 2018-04-28 | 2019-11-05 | 深圳市优必选科技有限公司 | Program upgrading method and terminal equipment |
CN108471456A (en) * | 2018-06-26 | 2018-08-31 | 北京长城华冠汽车技术开发有限公司 | Vehicle mounted communication module upgrade-system and upgrade method |
CN109117168A (en) * | 2018-08-29 | 2019-01-01 | 拓攻(南京)机器人有限公司 | Unmanned plane firmware update, device, unmanned plane and storage medium |
CN109358879A (en) * | 2018-10-15 | 2019-02-19 | 广东宝莱特医用科技股份有限公司 | A method of updating monitor system part programs |
CN109445817A (en) * | 2018-10-19 | 2019-03-08 | 郑州云海信息技术有限公司 | A kind of firmware upgrade method |
CN110362323A (en) * | 2018-12-20 | 2019-10-22 | 无锡职业技术学院 | Embedded type terminal equipment method for updating program based on distributed ad hoc network |
CN109873722A (en) * | 2019-02-27 | 2019-06-11 | 深圳大学 | Firmware remote upgrade method, device, computer equipment and storage medium |
CN110134415A (en) * | 2019-04-12 | 2019-08-16 | 深圳市致宸信息科技有限公司 | A kind of controller and its method for upgrading software and device |
CN110244970A (en) * | 2019-05-16 | 2019-09-17 | 芜湖智久机器人有限公司 | A kind of single-chip microcontroller and its upgrade-system, upgrade method |
CN110209405A (en) * | 2019-06-04 | 2019-09-06 | 杭州安恒信息技术股份有限公司 | The automatic updating method and device of distributed system |
CN110347418B (en) * | 2019-06-28 | 2023-09-29 | 晶晨半导体(上海)股份有限公司 | Control system upgrading method and control system |
CN110347418A (en) * | 2019-06-28 | 2019-10-18 | 晶晨半导体(上海)股份有限公司 | Control system upgrade method and control system |
CN110609692A (en) * | 2019-08-06 | 2019-12-24 | 厦门科灿信息技术有限公司 | Data acquisition module, firmware upgrading method thereof and storage medium |
CN110457058A (en) * | 2019-08-09 | 2019-11-15 | 北京万东医疗科技股份有限公司 | Control node online upgrading method, apparatus, host computer, system and electronic equipment |
CN111124966B (en) * | 2019-11-12 | 2021-08-24 | 上海移远通信科技有限公司 | Method and device for improving stability of module data |
CN111124966A (en) * | 2019-11-12 | 2020-05-08 | 上海移远通信科技有限公司 | Method and device for improving stability of module data |
CN111124451A (en) * | 2019-12-24 | 2020-05-08 | 山东有人信息技术有限公司 | Distributed backup upgrading method |
CN111142905B (en) * | 2019-12-25 | 2024-05-10 | 深圳市亿道信息股份有限公司 | OTA upgrading method, OTA server and OTA upgrading system |
CN111142905A (en) * | 2019-12-25 | 2020-05-12 | 深圳市亿道信息股份有限公司 | OTA (over-the-air) upgrading method, OTA server and OTA upgrading system |
CN111182506A (en) * | 2019-12-29 | 2020-05-19 | 合肥工大高科信息科技股份有限公司 | UWB (ultra wide band) tag upgrading method and system based on UWB (ultra wide band) wireless communication |
CN111966385B (en) * | 2020-06-24 | 2024-01-02 | 地太科特影像科技(上海)有限公司 | Flat panel detector online upgrading method, flat panel detector and upper computer |
CN111966385A (en) * | 2020-06-24 | 2020-11-20 | 上海昊博影像科技有限公司 | Flat panel detector online upgrading method, flat panel detector and upper computer |
CN114625388A (en) * | 2020-12-11 | 2022-06-14 | 深圳市乐众云科技有限公司 | Internet of things MCU (microprogrammed control Unit) air firmware upgrading system and method |
CN113203936A (en) * | 2021-03-15 | 2021-08-03 | 江西创成微电子有限公司 | Chip testing device, system and method |
CN115437674A (en) * | 2022-09-28 | 2022-12-06 | 杭州华塑科技股份有限公司 | Firmware upgrading method, device, medium and electronic equipment |
CN115437674B (en) * | 2022-09-28 | 2024-04-30 | 杭州华塑科技股份有限公司 | Firmware upgrading method, device, medium and electronic equipment |
CN116700061A (en) * | 2023-04-12 | 2023-09-05 | 广东为辰信息科技有限公司 | Quick starting method based on safe starting technology |
CN116700061B (en) * | 2023-04-12 | 2024-05-03 | 广东为辰信息科技有限公司 | Quick starting method based on safe starting technology |
CN118259949A (en) * | 2024-05-31 | 2024-06-28 | 深圳市欣威智能有限公司 | Electronic equipment firmware upgrading method and device and electronic equipment |
Also Published As
Publication number | Publication date |
---|---|
CN104007996B (en) | 2016-07-06 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104007996A (en) | Reliable firmware upgrading realizing method for distributed control system | |
CN106569847B (en) | Method for vehicle-mounted system to realize IAP remote upgrade based on mobile network | |
CN104899065A (en) | Method and system for batch online recovery and software online upgrading | |
CN101557583B (en) | Remote-updating and version-switching method of repeater equipment embedded software | |
US7640458B2 (en) | Software self-repair toolkit for electronic devices | |
EP2456257B1 (en) | Method and system for upgrading wireless data card | |
CN110083374B (en) | Upgrade rollback method, system and terminal equipment | |
TWI533216B (en) | Operating system updating method | |
CN104102518B (en) | double-CPU system and program upgrading method thereof | |
CN110209405B (en) | Automatic upgrading method and device for distributed system | |
CN101815988A (en) | Firmware image update and management | |
CN103473067A (en) | Embedded Linux partitioning and data recovery method, embedded Linux partitioning and data recovery system and system development method | |
CN101950254B (en) | Software updating method and system thereof | |
CN110633091A (en) | Electronic module and software wireless upgrading method thereof | |
CN105183515A (en) | Cloud deck firmware updating method and device | |
CN108170457A (en) | Firmware upgrade method, device and VR head-mounted displays | |
CN103226484A (en) | On-orbit update method for satellite-borne integrated electronic system program | |
CN101904105A (en) | Mobile handset employing efficient backup and recovery of blocks during update | |
CN109416629A (en) | Firmware upgrade method, electronic equipment, camera system and unmanned vehicle | |
CN101957765A (en) | Method, system and equipment for updating equipment firmware | |
CN105045640A (en) | Software upgrading method and device and intelligent equipment | |
KR100986487B1 (en) | Mobile handset with a fault tolerant update agent | |
CN113590161B (en) | Memory-controllable NB-IOT module differential upgrading method and system | |
CN105320534A (en) | BOOT remote updating method, BOOT remote updating device and BOOT remote updating system for single board | |
CN105468404A (en) | Remote update method and device for support controller programs |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right |
Effective date of registration: 20190529 Address after: 211103 Runfa Road, Gaoqiao Community, Dongshan Street, Jiangning District, Nanjing City, Jiangsu Province Patentee after: Nanjing Run Educational Technology Co.,Ltd. Address before: 210016 Zhujiang Road 669, Xuanwu District, Nanjing City, Jiangsu Province Patentee before: NANJING RONGJIAO TECHNOLOGY CO.,LTD. |
|
TR01 | Transfer of patent right | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20160706 |
|
CF01 | Termination of patent right due to non-payment of annual fee |