CN105159697A - Structure and method for updating firmware in storage apparatuses - Google Patents
Structure and method for updating firmware in storage apparatuses Download PDFInfo
- Publication number
- CN105159697A CN105159697A CN201510400617.7A CN201510400617A CN105159697A CN 105159697 A CN105159697 A CN 105159697A CN 201510400617 A CN201510400617 A CN 201510400617A CN 105159697 A CN105159697 A CN 105159697A
- Authority
- CN
- China
- Prior art keywords
- firmware
- storing apparatus
- memory
- memory cell
- host apparatus
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/60—Software deployment
- G06F8/65—Updates
- G06F8/654—Updates using techniques specially adapted for alterable solid state memories, e.g. for EEPROM or flash memories
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Stored Programmes (AREA)
Abstract
The invention relates to a structure and a method for updating firmware in storage apparatuses. The structure comprises a host apparatus and at least one storage apparatus, wherein the host apparatus stores at least one piece of first firmware; each storage apparatus comprises a controller and a first storage unit; the host apparatus is capable of transmitting the first firmware to the storage apparatuses; the controllers load the first firmware into first storage units and utilize operation behaviors defined by the first firmware to perform operations; when the storage apparatuses are in startup states, the first firmware provided by the host apparatus can be received and updated, so that the convenience for firmware update is improved; and when the storage apparatuses are in power-off states, the first firmware disappears from the first storage units of the storage apparatuses to prevent other unauthorized host apparatuses from casually accessing data of the storage apparatuses by utilizing the first firmware in the storage apparatuses.
Description
[technical field]
The present invention has tough body renewal structure about a kind of storing apparatus and method, refers in particular to a kind of structure and the method that utilize host apparatus directly storing apparatus to be carried out to tough body renewal.
[background technology]
Firmware is the key determining storing apparatus (as solid state hard disc or flash memory device) performance.Except controller, firmware function also can affect usefulness and the stability of storing apparatus.Write excellent firmware program, not only can assist to revise the mistake (bug) affecting storing apparatus running speed, also can increase more application function, and improve the extra value of storing apparatus.
The firmware that storing apparatus used in the past all can all be defined among storing apparatus.When storing apparatus is for carrying out tough body renewal, host apparatus needs the action carrying out shutting down, and is connected with a burning device to make storing apparatus can detach out from host apparatus.Then, burning device utilize a special program (as burning program) with by the firmware burning program for upgrading in the ROM (read-only memory) (Read-OnlyMemory, ROM) of storing apparatus.Afterwards, reconnect host apparatus after storing apparatus tough body renewal completes, host apparatus is started shooting again, then, storing apparatus can use the firmware upgraded.
Utilize traditional mode to upgrade the firmware of storing apparatus, the step of its tough body renewal is very loaded down with trivial details, and when storing apparatus carries out tough body renewal each time, host apparatus all needs the action carrying out switching on and shutting down, causes the inconvenience that host apparatus uses.Moreover if host apparatus is a server, the storing apparatus that its device inner meeting usually magnitude setting is numerous, if each storing apparatus all adopts traditional mode to upgrade firmware, will cause many burdens for manpower.
[summary of the invention]
The object of the invention is to the tough body renewal structure and the method that propose a kind of storing apparatus, its structure comprises a host apparatus and at least one storing apparatus, host apparatus stores the first firmware of the operation behavior of at least one definition storing apparatus, storing apparatus comprises a controller and one first memory cell, host apparatus can transmit the first firmware to storing apparatus, the controller of storing apparatus is loaded among the first firmware to the first memory cell, then, when storing apparatus is in start running, can the first firmware of providing of Receiving Host device and carry out tough body renewal at any time, increase the convenience on tough body renewal.
The object of the invention is to the tough body renewal structure and the method that propose a kind of storing apparatus, host apparatus can connect most storing apparatus, and by a firmware supervisory routine so that the first firmware is transferred to all storing apparatus, and make whole storing apparatus the same time can carry out tough body renewal together.
The object of the invention is to the tough body renewal structure and the method that propose a kind of storing apparatus, the first memory cell in storing apparatus is a random access memory (RAM), when storing apparatus is in pass tester in power-down state, the first firmware be temporarily stored in the first memory cell of storing apparatus will disappear, the data in the first firmware arbitrary access storing apparatus utilizing in storing apparatus to avoid other unauthorized host apparatus.
For reaching above-mentioned purpose, the invention provides a kind of tough body renewal structure of storing apparatus, it is characterized in that, comprise: a host apparatus, comprise a processor and a memory, processor connects memory, at least one first firmware of memory storage, each first firmware defines an operation behavior respectively; And at least one storing apparatus, comprise a controller and one first memory cell, controller connects flash memory and the first memory cell, wherein host apparatus transmits the first firmware to storing apparatus, first firmware is loaded in the first memory cell by storing apparatus, the operation behavior that the controller of storing apparatus defines according to the first firmware and perform relative running.
In one embodiment of the invention, the first memory cell is a random access memory (RAM), and the first firmware is temporarily stored in the first memory cell.
In one embodiment of the invention, storing apparatus comprises the second memory cell of a connection control device, and the second memory cell is a ROM (read-only memory) and storage has one second firmware, and the controller of storing apparatus utilizes the second firmware to perform boot program.
In one embodiment of the invention, the storage of the memory of host apparatus has a firmware supervisory routine, and the first selected firmware to select the first firmware of the operation behavior for defining storing apparatus, and is transferred to storing apparatus via firmware supervisory routine by host apparatus.
In one embodiment of the invention, host apparatus connects the storing apparatus of most amount, host apparatus by firmware supervisory routine so that the first firmware is transferred to all storing apparatus.
In one embodiment of the invention, controller comprises a loading unit, utilizes and is loaded into unit to be loaded in the first memory by the first firmware.
In one embodiment of the invention, host apparatus includes one first encryption/decryption element, and storing apparatus comprises one second encryption/decryption element, and host apparatus utilizes the first encryption/decryption element to encrypt the first firmware, and storing apparatus utilizes the second encryption/decryption element to decipher the first firmware.
In one embodiment of the invention, the first encryption/decryption element and the second encryption/decryption element are stored in memory and flash memory in a software form respectively.
The present invention provides again a kind of firmware updating method of storing apparatus, it is characterized in that, method is applied between a host apparatus and at least one storing apparatus, host apparatus comprises a processor and a memory, at least one first firmware of memory storage, each first firmware defines an operation behavior respectively, and storing apparatus comprises a controller and one first memory cell, and method step comprises: make host apparatus transmit the first firmware to storing apparatus; Storing apparatus is made to be loaded in the first memory cell by the first firmware received; And the operation behavior making the controller of storing apparatus define according to the first firmware and perform relative running.
In one embodiment of the invention, before comprising the following steps: to make host apparatus transmit the first firmware, encrypt the first firmware; And decipher the first firmware after making storing apparatus receive the first firmware.
[accompanying drawing explanation]
Fig. 1: the structural representation of tough body renewal structure one embodiment of storing apparatus of the present invention.
Fig. 2: the structural representation of the another embodiment of tough body renewal structure of storing apparatus of the present invention.
Drawing reference numeral: 100: host apparatus; 101: transmission interface; 11: processor; 12: memory; 13: firmware supervisory routine; 131: the first firmwares; 15: the first encryption/decryption elements; 200: storing apparatus; 21: controller; 211: be loaded into unit; 22: flash memory; 23: the first memory cells; 24: the second memory cells; 241: the second firmwares; 25: the second encryption/decryption elements.
[embodiment]
Referring to Fig. 1, is the structural representation of tough body renewal structure one embodiment of storing apparatus of the present invention.As shown in the figure, tough body renewal structure of the present invention comprises a host apparatus 100 and at least one storing apparatus 200.Storing apparatus 200 can be a solid state hard disc, a memory card or a Portable disk, and it can connect host apparatus 100 by a transmission interface 101 and carry out data transmission with host apparatus 100.Transmission interface 101 can be SATA interface, PCIe interface, USB interface or other data transmission interfaces.
Wherein host apparatus 100 comprises processor 11 and a memory 12, and processor 11 is electrically connected memory 12.Memory 12 stores at least one first firmware 131, and each first firmware 131 has the operation behavior of definition storing apparatus 200 respectively.Storing apparatus 200 comprises controller 21, flash memory 22 and one first memory cell 23, and controller 21 is electrically connected flash memory 22 and the first memory cell 23.Flash memory 22 is using the memory space as data.
When host apparatus 100 of the present invention is for carrying out tough body renewal program for storing apparatus 200, at least one first firmware 131 to storing apparatus 200 can be transmitted via transmission interface 101.Storing apparatus 200 is after receiving the first firmware 131, and one of controller 21 is loaded into unit 211 and can be loaded in the first memory cell 23 by the first firmware 131, then the operation behavior that defines according to the first firmware 131 of controller 21 and carry out relative running.
In the present invention one example, first firmware 131 is defined as the firmware of a systems axiol-ogy function, controller 131 utilizes the first firmware 131 to carry out detection operation for the system documentation be arranged in the flash memory 22 of storing apparatus 200, to guarantee the fiduciary level of system documentation.Or, in the another example of the present invention, first firmware 131 is defined as the firmware of a system optimization function, controller 131 utilizes the first firmware 131 to carry out optimized scheduling operation (as data restructuring) for the system documentation be arranged in the flash memory 22 of storing apparatus 200, to accelerate the access operation of system documentation.Moreover, the operation behavior that above-mentioned each first firmware 131 enumerated defines is only the example of certain applications of the present invention, know this case those skilled in the art should be appreciated that, host apparatus 100 of the present invention can provide the first firmware 131 to storing apparatus 200 of different purposes further, can perform various types of application operating to make storing apparatus 200.
At this, when storing apparatus 200 of the present invention is in start running, namely can receives the first firmware 131 that host apparatus 100 provides at any time and upgrade firmware data, increasing the convenience on storing apparatus 200 tough body renewal.
Again, the memory 12 of host apparatus 100 remains storage one firmware supervisory routine 13, host apparatus 13 selects the first firmware 131 of at least one operation behavior for definition storing apparatus 200 via firmware supervisory routine 13, and the first selected firmware 131 is transferred to storing apparatus 200.Moreover, in one embodiment of the invention, host apparatus 100 can be a server, it connects the storing apparatus 200 of most amount simultaneously, host apparatus 100 can by firmware supervisory routine 13 so that the first firmware 131 is transferred to all storing apparatus 200, and make whole storing apparatus 200 the same time can carry out tough body renewal together.
In one embodiment of the invention, the first memory cell 23 also can be a random access memory (RAM), and the first firmware 131 will be temporary among the first memory cell 23.When storing apparatus 200 is in pass tester in power-down state, the first firmware 131 be temporarily stored in the first memory cell 23 also can and then disappear, the data in the first firmware 131 arbitrary access flash memory 22 that other unauthorized host apparatus can be avoided to utilize in storing apparatus 200.
In one embodiment of the invention, storing apparatus 200 is provided with an operating system to become the main storing apparatus of host apparatus 100.Storing apparatus 200 still comprises one second memory cell 24, and it is electrically connected controller 21.Second memory cell 23 is a ROM (read-only memory), and its storage has one second firmware 241.Second firmware 241 is a basic power-on operation program.When host apparatus 100 is started shooting, the controller 21 of storing apparatus 200 will preferentially read the second firmware 241 in the second memory cell 23, perform boot program with the power-on operation defined according to the second firmware 241.
Referring to Fig. 2, is the structural representation of the another embodiment of tough body renewal structure of storing apparatus of the present invention.As shown in the figure, host apparatus 100 still comprises one first encryption/decryption element 15, and storing apparatus 200 still comprises one second encryption/decryption element 25.First encryption/decryption element 15 and the second encryption/decryption element 25 are stored in the memory 12 of host apparatus 100 and the flash memory 22 of storing apparatus 200 in a software form respectively.
When the first firmware 131 to storing apparatus 200 is sent in host apparatus 100 tendency to develop, the processor 11 of host apparatus 100 can utilize the first encryption/decryption element 15 to encrypt for the first firmware 131.After the first firmware 131 encrypted is sent to storing apparatus 200, the controller 21 of storing apparatus 200 utilizes the second encryption/decryption element 25 to decipher the first firmware 131, then to be loaded in the first memory cell 23 by the deciphered first firmware 131.At this, by the setting of the first encryption/decryption element 15 and the second encryption/decryption element 25, to guarantee the security that the first firmware 131 data uses.
Certainly, in further embodiment of this invention, the first encryption/decryption element 15 and the second encryption/decryption element 25 can be built in host apparatus 100 and storing apparatus 200 internal circuit in hardware respectively, also can realize the operation for the first firmware 131 encrypt/decrypt.
As described above, be only a preferred embodiment of the present invention, not be used for limiting scope of the invention process, namely all equalizations of doing according to shape, structure, feature and the spirit described in the present patent application the scope of the claims change and modify, and all should be included in claim of the present invention.
Claims (12)
1. a tough body renewal structure for storing apparatus, is characterized in that, comprising:
One host apparatus, comprises a processor and a memory, and processor connects memory, at least one first firmware of memory storage, and each first firmware defines an operation behavior respectively; And
At least one storing apparatus, comprise a controller and one first memory cell, controller connects flash memory and the first memory cell, wherein host apparatus transmits the first firmware to storing apparatus, first firmware is loaded in the first memory cell by storing apparatus, the operation behavior that the controller of storing apparatus defines according to the first firmware and perform relative running.
2. tough body renewal structure according to claim 1, is characterized in that, described first memory cell is a random access memory (RAM), and described first firmware is temporarily stored in this first memory cell.
3. tough body renewal structure according to claim 1, it is characterized in that, described storing apparatus more comprises the second memory cell of the described controller of a connection, this second memory cell is a ROM (read-only memory) and storage has one second firmware, and this controller of this storing apparatus utilizes described second firmware to perform boot program.
4. tough body renewal structure according to claim 1, it is characterized in that, the described memory of described host apparatus more stores a firmware supervisory routine, this selected first firmware to select described first firmware of operation behavior for the described storing apparatus of definition, and is transferred to this storing apparatus via described firmware supervisory routine by this host apparatus.
5. tough body renewal structure according to claim 4, is characterized in that, described host apparatus connects the described storing apparatus of most amount, this host apparatus by described firmware supervisory routine so that described first firmware is transferred to this all storing apparatus.
6. tough body renewal structure according to claim 1, is characterized in that, described controller comprises a loading unit, utilizes this loading unit to be loaded in described first memory by described first firmware.
7. tough body renewal structure according to claim 1, it is characterized in that, described host apparatus more includes one first encryption/decryption element, described storing apparatus more comprises one second encryption/decryption element, this host apparatus utilizes described first firmware of described first encryption/decryption element encryption, and this storing apparatus utilizes described second encryption/decryption element to decipher this first firmware.
8. tough body renewal structure according to claim 7, is characterized in that, described first encryption/decryption element and described second encryption/decryption element are stored in described memory and described flash memory in a software form respectively.
9. the firmware updating method of a storing apparatus, it is characterized in that, described method is applied between a host apparatus and at least one storing apparatus, this host apparatus comprises a processor and a memory, at least one first firmware of this memory storage, each first firmware defines an operation behavior respectively, and this storing apparatus comprises a controller and one first memory cell, and the method step comprises:
This host apparatus is made to transmit this first firmware to this storing apparatus;
This storing apparatus is made to be loaded in this first memory cell by this first firmware received; And
The operation behavior making the controller of this storing apparatus define according to this first firmware and perform relative running.
10. firmware updating method according to claim 9, is characterized in that, described first memory cell is a random access memory (RAM), and described first firmware is temporarily stored in described first memory cell.
11. firmware updating methods according to claim 9, it is characterized in that, described storing apparatus more comprises one second memory cell, and this second memory cell is a ROM (read-only memory) and storage one second firmware, and the described controller of this storing apparatus performs boot program according to described second firmware.
12. firmware updating methods according to claim 9, is characterized in that, more comprise the following steps:
This first firmware is encrypted before making described host apparatus transmit described first firmware; And
This first firmware is deciphered after making described storing apparatus receive described first firmware.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510400617.7A CN105159697A (en) | 2015-07-09 | 2015-07-09 | Structure and method for updating firmware in storage apparatuses |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510400617.7A CN105159697A (en) | 2015-07-09 | 2015-07-09 | Structure and method for updating firmware in storage apparatuses |
Publications (1)
Publication Number | Publication Date |
---|---|
CN105159697A true CN105159697A (en) | 2015-12-16 |
Family
ID=54800563
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510400617.7A Pending CN105159697A (en) | 2015-07-09 | 2015-07-09 | Structure and method for updating firmware in storage apparatuses |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105159697A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
TWI720694B (en) * | 2019-11-18 | 2021-03-01 | 中華電信股份有限公司 | Device and method of burning authentication with time sequence algorithm |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1983227A (en) * | 2001-08-02 | 2007-06-20 | 圣地斯克公司 | Removable computer with mass storage |
CN101340663A (en) * | 2008-05-30 | 2009-01-07 | 普天信息技术研究院有限公司 | Smart memory card system and method for implementing interaction by the system |
CN103995784A (en) * | 2014-04-23 | 2014-08-20 | 威盛电子股份有限公司 | Flash memory controller, storage device and flash memory control method |
-
2015
- 2015-07-09 CN CN201510400617.7A patent/CN105159697A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1983227A (en) * | 2001-08-02 | 2007-06-20 | 圣地斯克公司 | Removable computer with mass storage |
CN101340663A (en) * | 2008-05-30 | 2009-01-07 | 普天信息技术研究院有限公司 | Smart memory card system and method for implementing interaction by the system |
CN103995784A (en) * | 2014-04-23 | 2014-08-20 | 威盛电子股份有限公司 | Flash memory controller, storage device and flash memory control method |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
TWI720694B (en) * | 2019-11-18 | 2021-03-01 | 中華電信股份有限公司 | Device and method of burning authentication with time sequence algorithm |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109964227B (en) | Method and terminal for updating SELinux security policy | |
US9507604B2 (en) | Boot method and boot system | |
CN106020875B (en) | Firmware update management method and device of embedded terminal | |
KR102358470B1 (en) | Boot loader update firmware, method for updating boot loader | |
US9286468B2 (en) | Option read-only memory use | |
CN104506639A (en) | Root right acquiring method and device | |
CN103942061A (en) | Battery firmware updating method, portable electronic device and rechargeable battery module | |
CN104123199A (en) | Method and device for recovering application program and mobile terminal | |
CN105637521B (en) | Data processing method and intelligent terminal | |
US8621195B2 (en) | Disabling communication ports | |
CN102567135B (en) | Refreshing/recovering method and electronic equipment | |
US20160004648A1 (en) | Data erasing apparatus, data erasing method, and computer-readable storage medium | |
US9977614B2 (en) | Automatic back-up system with verification key and method of operation thereof | |
CN103577212A (en) | System starting preloading method and device | |
US9384353B2 (en) | System and method for encryption of disk based on pre-boot compatibility testing | |
US20170010821A1 (en) | Architecture and method for updating firmware of storage device | |
CN105468401A (en) | Nfc device, software installation method and software uninstallation method | |
US8478979B2 (en) | Disable a feature of a computing machine | |
CN104765631A (en) | Restoration method and device for application program of mobile terminal | |
CN106951771B (en) | Mobile terminal using method of android operating system | |
CN105159697A (en) | Structure and method for updating firmware in storage apparatuses | |
US20060168440A1 (en) | OS selection methods and computer systems utilizing the same | |
US20090187898A1 (en) | Method for securely updating an autorun program and portable electronic entity executing it | |
CN111953753B (en) | Communication device connection method, device, computer device and storage medium | |
CN103020509A (en) | Terminal equipment encryption and decryption method, device and terminal equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20151216 |