CN104007996A - Reliable firmware upgrading realizing method for distributed control system - Google Patents

Reliable firmware upgrading realizing method for distributed control system Download PDF

Info

Publication number
CN104007996A
CN104007996A CN201410267711.5A CN201410267711A CN104007996A CN 104007996 A CN104007996 A CN 104007996A CN 201410267711 A CN201410267711 A CN 201410267711A CN 104007996 A CN104007996 A CN 104007996A
Authority
CN
China
Prior art keywords
aku
upgrade file
upgrading
program
jump
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201410267711.5A
Other languages
Chinese (zh)
Other versions
CN104007996B (en
Inventor
齐翔
何国远
王鹏
齐羽心
孔宁
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing Run Educational Technology Co ltd
Original Assignee
Nanjing Rong Jiao Science And Technology Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing Rong Jiao Science And Technology Ltd filed Critical Nanjing Rong Jiao Science And Technology Ltd
Priority to CN201410267711.5A priority Critical patent/CN104007996B/en
Publication of CN104007996A publication Critical patent/CN104007996A/en
Application granted granted Critical
Publication of CN104007996B publication Critical patent/CN104007996B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Stored Programmes (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The invention provides a reliable firmware upgrading realizing method applied to a distributed control system. The reliable firmware upgrading realizing method enables any controller nodes or a host in the system to have program upgrading capacity, greatly improves the expansion capacity of hardware equipment and the customizing performance of the system and reduces later maintenance and upgrading cost. The reliable firmware upgrading realizing method is different from a traditional method in that receiving of a target program package is realized in an application program, the received data package is stored into a backup program area at first, after the target program package is completely received and CRC verification is passed, parameter information marks are generated in an IAP mark area, and a Boot loader is called for to realize program upgrading. Even if an unpredictable failure occurs in any link, existing programs cannot be replaced, and therefore the stability of the system is greatly improved.

Description

A kind of reliable firmware upgrade implementation method of dcs
Technical field
The present invention relates to a kind of program firmware upgrade new method that is applied to dcs field.
Background technology
Along with the development of electronic industry, node unit in dcs is more and more various, logic function is also done more complicated and more complicated, once find that the system of moving occurs that Bug maybe needs to change the situation of agreement newly added equipment, if there is no reliablely and stablely more new tool of on-the-spot program firmware of one, will face the vicious cycle of system dismounting---depot repair---system heavy dressing work.Although present a lot of distributed systems all provide program firmware updating function, but due to machine-processed problem, this method often can only complete the upgrading to main frame, cannot be general in dissimilar node, once and some system meets accident and upgrades unsuccessfully midway, to cause the thorough inefficacy of system, the maintenance cost greatly having increased, can not embody the advantage of development in science and technology.As shown in Figure 1, the dcs of a standard often comprise one can with the system host of PC communication, one or more bus, several controls of carry or detection node in bus.Whole distributed system also needs the transmission of formulating a host computer-node, host computer-main frame to reply transparent transmission mechanism, to realize upper function, any one node in distributed system is realized to program upgrade.
Summary of the invention
Goal of the invention: for above-mentioned prior art, provide a kind of reliable firmware upgrade implementation method of dcs, realize the reliable upgrading of each node in dcs and main frame.
Technical scheme: a kind of reliable firmware upgrade implementation method of dcs, the FLASH branch of main frame and each node includes Bootloader district, working procedure district, stand-by program district, upgrading label area and data parameters district; Firmware upgrade implementation method comprises the steps:
Step 1), host computer is 2 by upgrade file by size nbyte is divided into some AKU, and each AKU also comprises upgrade file version number, upgrade file overall budget number, the total CRC check of upgrade file and current AKU sequence number; The integer that wherein n is 1~8;
Step 2), each AKU that when upgrading, the local firmware program reception host computer of main frame or each node sends also deposits stand-by program district separately in, generate upgrading task flagging receiving after all AKU in upgrading label area, described upgrading task flagging comprises the byte number of upgrade file version number, upgrade file overall budget number, the total CRC check of upgrade file and the every bag of upgrade file;
Step 3), by main frame or each node reset being carried out to the Bootloader of starting outfit, described Bootloader reads after the upgrading task flagging of its upgrading label area, judge whether described stand-by program district exists upgrade file: if exist upgrade file to jump to step 4), if do not exist upgrade file to jump to step 8);
Step 4), judge that by CRC check whether upgrade file is effective: if upgrade file effectively jumps to step 5); If the invalid step 8 that jumps to of upgrade file);
Step 5), jump to step 6 after wiping the file in described main frame or each node operator district), wipe and extremely jump to step 3 if occur);
Step 6), jump to step 7 after the AKU in described stand-by program district is write to described local runtime program area), write and extremely jump to step 3 if occur);
Step 7), jump to step 8 after wiping the upgrading task flagging of the label area of upgrading in described main frame or each node), wipe and extremely jump to step 3 if occur);
Step 8), whether effectively detect described working procedure district target program: if effectively jump to step 9), after time delay, jump to step 3 if invalid);
Step 9), described main frame or each node configuration operation program environment complete upgrading.
Further, the local firmware program of main frame or each node adopts breakpoint transmission agreement to receive each AKU and deposit described stand-by program district in.
As preferred version of the present invention, described step 2) comprise following concrete steps:
Step 2.1), application program receives after any one AKU, carries out the judgement of AKU version number: if the upgrade file version number receiving jump to steps 2.2 different from current working procedure version), do not upgrade if version number is identical;
Step 2.2), determine whether breakpoint transmission bag: the AKU receiving if current and the AKU version number receiving in historical upgrading task, upgrade file overall budget number, the total CRC check of upgrade file are identical, and this AKU receiving is breakpoint transmission bag and jumps to step 2.3); If different be new upgrading task, upgrade file version number, upgrade file overall budget number, the total CRC check information of upgrade file in new historical upgrading task more, and the upgrade file first that starts to ask for new liter level task wraps;
Step 2.3), ask for the AKU of expectation to host computer by the upgrading task of record; If receive, the AKU of expectation jumps to step 2.4), if the AKU of receiving is not to expect that AKU continues to expect AKU to host computer request;
Step 2.4), the AKU receiving is write in FLASH stand-by program district by AKU sequence number; Wherein when often writing after an AKU, read this AKU in from stand-by program district, write whether success to judge: if unsuccessful again to this AKU of host computer request; If successful jump to step 2.5);
Step 2.5), carry out AKU and receive judgement: send the information of having upgraded and jump to described step 3 to host computer if receive), the inwhole complete receptions of AKU continue to expect AKU to host requests.
As preferred version of the present invention, described step 8) in, delay time is 100~500ms.
Beneficial effect: the inventive method is different from classic method to be: in all scalable nodes, the Bootloader of prepackage is only in order to realize program verification and replacement function, Bootloader is positioned at the enabling address of Flash, after system reset, first carry out Bootloader, start to read upgrading label, judge whether to exist in stand-by program district and can pass through the complete upgrade file of program verification, if have and progressively the data of backup area write to operational area, and finally replace the first bag, prevent unexpected generation, then read operational area the first bag and judge whether legal start-up code, if the arbitrary process of replacing meets accident, Bootloader still can be from new execution upgrading, can not occur in the incomplete situation of replacement in program replacement process.Just can wipe upgrading label if upgrade file has been replaced, prepare to start the application program of operational area.
This distributed node firmware upgrade method has not had to receive based on the routine package of communications protocol, routine package is received in application program and realizes, and first deposit the packet of reception in stand-by program district, after reception program bag is complete and CRC check passes through, generate parameter information mark in upgrading label area, and call Bootloader to realize program upgrade, escalation process can be realized breakpoint transmission, even and if send out failure unpredictable in any link, old program can not be replaced, under extreme case, can continue program updates task, Flash reads and writes the delay protection that has 100~500ms when abnormal, can prevent that Flash from being write at short notice bad, improve greatly the stability of system.
Brief description of the drawings
Fig. 1 is the applied distributed system framework of the present invention;
Fig. 2 is that IAP of the present invention divides Division;
Fig. 3 is Bootloader treatment scheme;
Fig. 4 is that application program needs embedded reception processing data packets;
Fig. 5 is AKU and FLASH corresponding relation;
Fig. 6 is the definition of upgrading control field.
Embodiment
Below in conjunction with accompanying drawing, the present invention is done further and explained.
A reliable firmware upgrade implementation method for dcs, as shown in Figure 2, the FLASH branch of main frame and each node includes Bootloader district, working procedure district, stand-by program district, upgrading label area and data parameters district; And Bootloader district and working procedure district are only divided in the FLASH space of common IAP upgrading.
As shown in Figure 3, firmware upgrade implementation method comprises the steps:
Step 1), host computer is 2 by upgrade file by size nbyte is divided into some AKU, and each AKU also comprises upgrade file version number, upgrade file overall budget number, the total CRC check of upgrade file and current AKU sequence number; The integer that wherein n is 1~8;
Step 2), each AKU that when upgrading, the local firmware program employing breakpoint transmission agreement reception host computer of main frame or each node sends also deposits stand-by program district separately in, as shown in Figure 4, specifically comprises the steps:
Step 2.1), application program receives after any one AKU, carries out the judgement of AKU version number: if the upgrade file version number receiving jump to steps 2.2 different from current working procedure version), do not upgrade if version number is identical;
Step 2.2), determine whether breakpoint transmission bag: the AKU receiving if current and the AKU version number receiving in historical upgrading task, upgrade file overall budget number, the total CRC check of upgrade file are identical, and this AKU receiving is breakpoint transmission bag and jumps to step 2.3); If different be new upgrading task, upgrade file version number, upgrade file overall budget number, the total CRC check information of upgrade file in new historical upgrading task more, and the upgrade file first that starts to ask for new liter level task wraps;
Step 2.3), ask for the AKU of expectation to host computer by the upgrading task of record; If receive, the AKU of expectation jumps to step 2.4), if the AKU of receiving is not to expect that AKU continues to expect AKU to host computer request;
Step 2.4), the AKU receiving is write in FLASH stand-by program district by AKU sequence number; Wherein when often writing after an AKU, read this AKU in from stand-by program district, write whether success to judge: if unsuccessful again to this AKU of host computer request; If successful jump to step 2.5);
Step 2.5), carry out AKU and receive judgement: send the information of having upgraded and jump to described step 3 to host computer if receive), the inwhole complete receptions of AKU continue to expect AKU to host requests.
For example every sector writes 16 AKU, as shown in Figure 5, generate upgrading task flagging receiving after all AKU in upgrading label area, described upgrading task flagging comprises the byte number of upgrade file version number, upgrade file overall budget number, the total CRC check of upgrade file and the every bag of upgrade file;
Step 3), by main frame or each node reset being carried out to the Bootloader of starting outfit, described Bootloader reads after the upgrading task flagging of its upgrading label area, judge whether described stand-by program district exists upgrade file: if exist upgrade file to jump to step 4), if do not exist upgrade file to jump to step 8);
Step 4), judge that by CRC check whether upgrade file is effective: if upgrade file effectively jumps to step 5); If the invalid step 8 that jumps to of upgrade file);
Step 5), jump to step 6 after wiping the file in described main frame or each node operator district), wipe and extremely jump to step 3 if occur);
Step 6), jump to step 7 after the AKU in described stand-by program district is write to described local runtime program area), write and extremely jump to step 3 if occur);
Step 7), jump to step 8 after wiping the upgrading task flagging of the label area of upgrading in described main frame or each node), wipe and extremely jump to step 3 if occur);
Step 8), whether effectively detect described working procedure district target program: if effectively jump to step 9), after time delay, jump to step 3 if invalid), delay time can be set as 100~500ms;
Step 9), described main frame or each node configuration operation program environment complete upgrading.
Be illustrated in figure 6 the frame format definition of the descending AKU of this updating protocol and up upgrade request bag.
The above is only the preferred embodiment of the present invention; it should be pointed out that for those skilled in the art, under the premise without departing from the principles of the invention; can also make some improvements and modifications, these improvements and modifications also should be considered as protection scope of the present invention.

Claims (4)

1. a reliable firmware upgrade implementation method for dcs, is characterized in that: the FLASH branch of main frame and each node includes Bootloader district, working procedure district, stand-by program district, upgrading label area and data parameters district; Firmware upgrade implementation method comprises the steps:
Step 1), host computer is 2 by upgrade file by size nbyte is divided into some AKU, and each AKU also comprises upgrade file version number, upgrade file overall budget number, the total CRC check of upgrade file and current AKU sequence number; The integer that wherein n is 1~8;
Step 2), each AKU that when upgrading, the local firmware program reception host computer of main frame or each node sends also deposits stand-by program district separately in, generate upgrading task flagging receiving after all AKU in upgrading label area, described upgrading task flagging comprises the byte number of upgrade file version number, upgrade file overall budget number, the total CRC check of upgrade file and the every bag of upgrade file;
Step 3), by main frame or each node reset being carried out to the Bootloader of starting outfit, described Bootloader reads after the upgrading task flagging of its upgrading label area, judge whether described stand-by program district exists upgrade file: if exist upgrade file to jump to step 4), if do not exist upgrade file to jump to step 8);
Step 4), judge that by CRC check whether upgrade file is effective: if upgrade file effectively jumps to step 5); If the invalid step 8 that jumps to of upgrade file);
Step 5), jump to step 6 after wiping the file in described main frame or each node operator district), wipe and extremely jump to step 3 if occur);
Step 6), jump to step 7 after the AKU in described stand-by program district is write to described local runtime program area), write and extremely jump to step 3 if occur);
Step 7), jump to step 8 after wiping the upgrading task flagging of the label area of upgrading in described main frame or each node), wipe and extremely jump to step 3 if occur);
Step 8), whether effectively detect described working procedure district target program: if effectively jump to step 9), after time delay, jump to step 3 if invalid);
Step 9), described main frame or each node configuration operation program environment complete upgrading.
2. the reliable firmware upgrade implementation method of a kind of dcs according to claim 1, it is characterized in that: described step 2) in, the local firmware program of main frame or each node adopts breakpoint transmission agreement to receive each AKU and deposit described stand-by program district in.
3. the reliable firmware upgrade implementation method of a kind of dcs according to claim 2, is characterized in that: described step 2) comprise following concrete steps:
Step 2.1), application program receives after any one AKU, carries out the judgement of AKU version number: if the upgrade file version number receiving jump to steps 2.2 different from current working procedure version), do not upgrade if version number is identical;
Step 2.2), determine whether breakpoint transmission bag: the AKU receiving if current and the AKU version number receiving in historical upgrading task, upgrade file overall budget number, the total CRC check of upgrade file are identical, and this AKU receiving is breakpoint transmission bag and jumps to step 2.3); If different be new upgrading task, upgrade file version number, upgrade file overall budget number, the total CRC check information of upgrade file in new historical upgrading task more, and the upgrade file first that starts to ask for new liter level task wraps;
Step 2.3), ask for the AKU of expectation to host computer by the upgrading task of record; If receive, the AKU of expectation jumps to step 2.4), if the AKU of receiving is not to expect that AKU continues to expect AKU to host computer request;
Step 2.4), the AKU receiving is write in FLASH stand-by program district by AKU sequence number; Wherein when often writing after an AKU, read this AKU in from stand-by program district, write whether success to judge: if unsuccessful again to this AKU of host computer request; If successful jump to step 2.5);
Step 2.5), carry out AKU and receive judgement: send the information of having upgraded and jump to described step 3 to host computer if receive), the inwhole complete receptions of AKU continue to expect AKU to host requests.
4. the reliable firmware upgrade implementation method of a kind of dcs according to claim 1, is characterized in that: described step 8) in, delay time is 100~500ms.
CN201410267711.5A 2014-06-16 2014-06-16 The authentic firmware upgrading of a kind of dcs realizes method Expired - Fee Related CN104007996B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410267711.5A CN104007996B (en) 2014-06-16 2014-06-16 The authentic firmware upgrading of a kind of dcs realizes method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410267711.5A CN104007996B (en) 2014-06-16 2014-06-16 The authentic firmware upgrading of a kind of dcs realizes method

Publications (2)

Publication Number Publication Date
CN104007996A true CN104007996A (en) 2014-08-27
CN104007996B CN104007996B (en) 2016-07-06

Family

ID=51368663

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410267711.5A Expired - Fee Related CN104007996B (en) 2014-06-16 2014-06-16 The authentic firmware upgrading of a kind of dcs realizes method

Country Status (1)

Country Link
CN (1) CN104007996B (en)

Cited By (35)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104615471A (en) * 2015-03-05 2015-05-13 浪潮软件集团有限公司 System upgrading method and device for terminal
CN105094903A (en) * 2015-07-16 2015-11-25 广州飞米电子科技有限公司 Method and device for upgrading firmware
CN105117253A (en) * 2015-08-27 2015-12-02 常州大学 BootLoader based remote upgrade method for UV LED (Ultraviolet Light Emitting Diode) curing system
CN105511918A (en) * 2015-12-06 2016-04-20 江苏林洋能源股份有限公司 Automatic data storage format maintenance method of intelligent electric energy meter
CN105653299A (en) * 2014-11-12 2016-06-08 杭州华三通信技术有限公司 Firmware upgrade method device
CN106227572A (en) * 2016-08-30 2016-12-14 深圳市蓝海华腾技术股份有限公司 A kind of frequency converter control system programme upgrade method
CN107301068A (en) * 2017-06-12 2017-10-27 合肥众志行云科技有限公司 One-to-many wireless program upgrade-system and method on a kind of single-chip microcomputer
CN107357621A (en) * 2017-07-14 2017-11-17 成都天奥电子股份有限公司 A kind of method that long distance wireless software upgrading is carried out to satellite time transfer equipment
CN107957880A (en) * 2017-11-30 2018-04-24 广东美的暖通设备有限公司 Air-conditioning firmware upgrade method, device, air-conditioning and computer equipment
CN108170457A (en) * 2017-12-27 2018-06-15 上海闻泰电子科技有限公司 Firmware upgrade method, device and VR head-mounted displays
CN108471456A (en) * 2018-06-26 2018-08-31 北京长城华冠汽车技术开发有限公司 Vehicle mounted communication module upgrade-system and upgrade method
CN109117168A (en) * 2018-08-29 2019-01-01 拓攻(南京)机器人有限公司 Unmanned plane firmware update, device, unmanned plane and storage medium
CN109358879A (en) * 2018-10-15 2019-02-19 广东宝莱特医用科技股份有限公司 A method of updating monitor system part programs
CN109416629A (en) * 2017-11-01 2019-03-01 深圳市大疆创新科技有限公司 Firmware upgrade method, electronic equipment, camera system and unmanned vehicle
CN109445817A (en) * 2018-10-19 2019-03-08 郑州云海信息技术有限公司 A kind of firmware upgrade method
CN109873722A (en) * 2019-02-27 2019-06-11 深圳大学 Firmware remote upgrade method, device, computer equipment and storage medium
CN110134415A (en) * 2019-04-12 2019-08-16 深圳市致宸信息科技有限公司 A kind of controller and its method for upgrading software and device
CN110209405A (en) * 2019-06-04 2019-09-06 杭州安恒信息技术股份有限公司 The automatic updating method and device of distributed system
CN110244970A (en) * 2019-05-16 2019-09-17 芜湖智久机器人有限公司 A kind of single-chip microcontroller and its upgrade-system, upgrade method
CN110347418A (en) * 2019-06-28 2019-10-18 晶晨半导体(上海)股份有限公司 Control system upgrade method and control system
CN110362323A (en) * 2018-12-20 2019-10-22 无锡职业技术学院 Embedded type terminal equipment method for updating program based on distributed ad hoc network
CN110362321A (en) * 2018-04-10 2019-10-22 台达电子工业股份有限公司 The update method of application program
CN110413310A (en) * 2018-04-28 2019-11-05 深圳市优必选科技有限公司 Program upgrading method and terminal equipment
CN110457058A (en) * 2019-08-09 2019-11-15 北京万东医疗科技股份有限公司 Control node online upgrading method, apparatus, host computer, system and electronic equipment
CN110609692A (en) * 2019-08-06 2019-12-24 厦门科灿信息技术有限公司 Data acquisition module, firmware upgrading method thereof and storage medium
CN111124451A (en) * 2019-12-24 2020-05-08 山东有人信息技术有限公司 Distributed backup upgrading method
CN111124966A (en) * 2019-11-12 2020-05-08 上海移远通信科技有限公司 Method and device for improving stability of module data
CN111142905A (en) * 2019-12-25 2020-05-12 深圳市亿道信息股份有限公司 OTA (over-the-air) upgrading method, OTA server and OTA upgrading system
CN111182506A (en) * 2019-12-29 2020-05-19 合肥工大高科信息科技股份有限公司 UWB (ultra wide band) tag upgrading method and system based on UWB (ultra wide band) wireless communication
CN111966385A (en) * 2020-06-24 2020-11-20 上海昊博影像科技有限公司 Flat panel detector online upgrading method, flat panel detector and upper computer
CN113203936A (en) * 2021-03-15 2021-08-03 江西创成微电子有限公司 Chip testing device, system and method
CN114625388A (en) * 2020-12-11 2022-06-14 深圳市乐众云科技有限公司 Internet of things MCU (microprogrammed control Unit) air firmware upgrading system and method
CN115437674A (en) * 2022-09-28 2022-12-06 杭州华塑科技股份有限公司 Firmware upgrading method, device, medium and electronic equipment
CN116700061A (en) * 2023-04-12 2023-09-05 广东为辰信息科技有限公司 Quick starting method based on safe starting technology
CN118259949A (en) * 2024-05-31 2024-06-28 深圳市欣威智能有限公司 Electronic equipment firmware upgrading method and device and electronic equipment

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1925425A (en) * 2006-10-08 2007-03-07 北京启明星辰信息技术有限公司 Distributed upgrading method for centralization management mode
US20110260879A1 (en) * 2010-04-21 2011-10-27 Microsoft Corporation Automated recovery and escalation in complex distributed applications
CN102833101A (en) * 2012-08-22 2012-12-19 瑞斯康达科技发展股份有限公司 Software upgrading method and equipment of distributed network system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1925425A (en) * 2006-10-08 2007-03-07 北京启明星辰信息技术有限公司 Distributed upgrading method for centralization management mode
US20110260879A1 (en) * 2010-04-21 2011-10-27 Microsoft Corporation Automated recovery and escalation in complex distributed applications
CN102833101A (en) * 2012-08-22 2012-12-19 瑞斯康达科技发展股份有限公司 Software upgrading method and equipment of distributed network system

Cited By (46)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105653299A (en) * 2014-11-12 2016-06-08 杭州华三通信技术有限公司 Firmware upgrade method device
CN104615471A (en) * 2015-03-05 2015-05-13 浪潮软件集团有限公司 System upgrading method and device for terminal
CN105094903A (en) * 2015-07-16 2015-11-25 广州飞米电子科技有限公司 Method and device for upgrading firmware
CN105094903B (en) * 2015-07-16 2019-02-22 广州飞米电子科技有限公司 The method and device that firmware is upgraded
CN105117253A (en) * 2015-08-27 2015-12-02 常州大学 BootLoader based remote upgrade method for UV LED (Ultraviolet Light Emitting Diode) curing system
CN105511918B (en) * 2015-12-06 2018-10-26 江苏林洋能源股份有限公司 A kind of data memory format automatic maintenance method of intelligent electric energy meter
CN105511918A (en) * 2015-12-06 2016-04-20 江苏林洋能源股份有限公司 Automatic data storage format maintenance method of intelligent electric energy meter
CN106227572A (en) * 2016-08-30 2016-12-14 深圳市蓝海华腾技术股份有限公司 A kind of frequency converter control system programme upgrade method
CN107301068A (en) * 2017-06-12 2017-10-27 合肥众志行云科技有限公司 One-to-many wireless program upgrade-system and method on a kind of single-chip microcomputer
CN107357621B (en) * 2017-07-14 2020-12-15 成都天奥电子股份有限公司 Method for carrying out remote wireless software upgrading on satellite time service equipment
CN107357621A (en) * 2017-07-14 2017-11-17 成都天奥电子股份有限公司 A kind of method that long distance wireless software upgrading is carried out to satellite time transfer equipment
CN109416629A (en) * 2017-11-01 2019-03-01 深圳市大疆创新科技有限公司 Firmware upgrade method, electronic equipment, camera system and unmanned vehicle
WO2019084843A1 (en) * 2017-11-01 2019-05-09 深圳市大疆创新科技有限公司 Firmware upgrading method, electronic device, camera system, and unmanned aerial vehicle
CN107957880A (en) * 2017-11-30 2018-04-24 广东美的暖通设备有限公司 Air-conditioning firmware upgrade method, device, air-conditioning and computer equipment
CN108170457A (en) * 2017-12-27 2018-06-15 上海闻泰电子科技有限公司 Firmware upgrade method, device and VR head-mounted displays
CN110362321B (en) * 2018-04-10 2022-10-11 台达电子工业股份有限公司 Application program updating method
CN110362321A (en) * 2018-04-10 2019-10-22 台达电子工业股份有限公司 The update method of application program
CN110413310A (en) * 2018-04-28 2019-11-05 深圳市优必选科技有限公司 Program upgrading method and terminal equipment
CN108471456A (en) * 2018-06-26 2018-08-31 北京长城华冠汽车技术开发有限公司 Vehicle mounted communication module upgrade-system and upgrade method
CN109117168A (en) * 2018-08-29 2019-01-01 拓攻(南京)机器人有限公司 Unmanned plane firmware update, device, unmanned plane and storage medium
CN109358879A (en) * 2018-10-15 2019-02-19 广东宝莱特医用科技股份有限公司 A method of updating monitor system part programs
CN109445817A (en) * 2018-10-19 2019-03-08 郑州云海信息技术有限公司 A kind of firmware upgrade method
CN110362323A (en) * 2018-12-20 2019-10-22 无锡职业技术学院 Embedded type terminal equipment method for updating program based on distributed ad hoc network
CN109873722A (en) * 2019-02-27 2019-06-11 深圳大学 Firmware remote upgrade method, device, computer equipment and storage medium
CN110134415A (en) * 2019-04-12 2019-08-16 深圳市致宸信息科技有限公司 A kind of controller and its method for upgrading software and device
CN110244970A (en) * 2019-05-16 2019-09-17 芜湖智久机器人有限公司 A kind of single-chip microcontroller and its upgrade-system, upgrade method
CN110209405A (en) * 2019-06-04 2019-09-06 杭州安恒信息技术股份有限公司 The automatic updating method and device of distributed system
CN110347418B (en) * 2019-06-28 2023-09-29 晶晨半导体(上海)股份有限公司 Control system upgrading method and control system
CN110347418A (en) * 2019-06-28 2019-10-18 晶晨半导体(上海)股份有限公司 Control system upgrade method and control system
CN110609692A (en) * 2019-08-06 2019-12-24 厦门科灿信息技术有限公司 Data acquisition module, firmware upgrading method thereof and storage medium
CN110457058A (en) * 2019-08-09 2019-11-15 北京万东医疗科技股份有限公司 Control node online upgrading method, apparatus, host computer, system and electronic equipment
CN111124966B (en) * 2019-11-12 2021-08-24 上海移远通信科技有限公司 Method and device for improving stability of module data
CN111124966A (en) * 2019-11-12 2020-05-08 上海移远通信科技有限公司 Method and device for improving stability of module data
CN111124451A (en) * 2019-12-24 2020-05-08 山东有人信息技术有限公司 Distributed backup upgrading method
CN111142905B (en) * 2019-12-25 2024-05-10 深圳市亿道信息股份有限公司 OTA upgrading method, OTA server and OTA upgrading system
CN111142905A (en) * 2019-12-25 2020-05-12 深圳市亿道信息股份有限公司 OTA (over-the-air) upgrading method, OTA server and OTA upgrading system
CN111182506A (en) * 2019-12-29 2020-05-19 合肥工大高科信息科技股份有限公司 UWB (ultra wide band) tag upgrading method and system based on UWB (ultra wide band) wireless communication
CN111966385B (en) * 2020-06-24 2024-01-02 地太科特影像科技(上海)有限公司 Flat panel detector online upgrading method, flat panel detector and upper computer
CN111966385A (en) * 2020-06-24 2020-11-20 上海昊博影像科技有限公司 Flat panel detector online upgrading method, flat panel detector and upper computer
CN114625388A (en) * 2020-12-11 2022-06-14 深圳市乐众云科技有限公司 Internet of things MCU (microprogrammed control Unit) air firmware upgrading system and method
CN113203936A (en) * 2021-03-15 2021-08-03 江西创成微电子有限公司 Chip testing device, system and method
CN115437674A (en) * 2022-09-28 2022-12-06 杭州华塑科技股份有限公司 Firmware upgrading method, device, medium and electronic equipment
CN115437674B (en) * 2022-09-28 2024-04-30 杭州华塑科技股份有限公司 Firmware upgrading method, device, medium and electronic equipment
CN116700061A (en) * 2023-04-12 2023-09-05 广东为辰信息科技有限公司 Quick starting method based on safe starting technology
CN116700061B (en) * 2023-04-12 2024-05-03 广东为辰信息科技有限公司 Quick starting method based on safe starting technology
CN118259949A (en) * 2024-05-31 2024-06-28 深圳市欣威智能有限公司 Electronic equipment firmware upgrading method and device and electronic equipment

Also Published As

Publication number Publication date
CN104007996B (en) 2016-07-06

Similar Documents

Publication Publication Date Title
CN104007996A (en) Reliable firmware upgrading realizing method for distributed control system
CN106569847B (en) Method for vehicle-mounted system to realize IAP remote upgrade based on mobile network
CN104899065A (en) Method and system for batch online recovery and software online upgrading
CN101557583B (en) Remote-updating and version-switching method of repeater equipment embedded software
US7640458B2 (en) Software self-repair toolkit for electronic devices
EP2456257B1 (en) Method and system for upgrading wireless data card
CN110083374B (en) Upgrade rollback method, system and terminal equipment
TWI533216B (en) Operating system updating method
CN104102518B (en) double-CPU system and program upgrading method thereof
CN110209405B (en) Automatic upgrading method and device for distributed system
CN101815988A (en) Firmware image update and management
CN103473067A (en) Embedded Linux partitioning and data recovery method, embedded Linux partitioning and data recovery system and system development method
CN101950254B (en) Software updating method and system thereof
CN110633091A (en) Electronic module and software wireless upgrading method thereof
CN105183515A (en) Cloud deck firmware updating method and device
CN108170457A (en) Firmware upgrade method, device and VR head-mounted displays
CN103226484A (en) On-orbit update method for satellite-borne integrated electronic system program
CN101904105A (en) Mobile handset employing efficient backup and recovery of blocks during update
CN109416629A (en) Firmware upgrade method, electronic equipment, camera system and unmanned vehicle
CN101957765A (en) Method, system and equipment for updating equipment firmware
CN105045640A (en) Software upgrading method and device and intelligent equipment
KR100986487B1 (en) Mobile handset with a fault tolerant update agent
CN113590161B (en) Memory-controllable NB-IOT module differential upgrading method and system
CN105320534A (en) BOOT remote updating method, BOOT remote updating device and BOOT remote updating system for single board
CN105468404A (en) Remote update method and device for support controller programs

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20190529

Address after: 211103 Runfa Road, Gaoqiao Community, Dongshan Street, Jiangning District, Nanjing City, Jiangsu Province

Patentee after: Nanjing Run Educational Technology Co.,Ltd.

Address before: 210016 Zhujiang Road 669, Xuanwu District, Nanjing City, Jiangsu Province

Patentee before: NANJING RONGJIAO TECHNOLOGY CO.,LTD.

TR01 Transfer of patent right
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20160706

CF01 Termination of patent right due to non-payment of annual fee