CN106528114B - Android firmware application device and android firmware upgrading method - Google Patents
Android firmware application device and android firmware upgrading method Download PDFInfo
- Publication number
- CN106528114B CN106528114B CN201610941922.1A CN201610941922A CN106528114B CN 106528114 B CN106528114 B CN 106528114B CN 201610941922 A CN201610941922 A CN 201610941922A CN 106528114 B CN106528114 B CN 106528114B
- Authority
- CN
- China
- Prior art keywords
- android
- firmware
- partition
- mode
- application
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/4401—Bootstrapping
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/60—Software deployment
- G06F8/61—Installation
Abstract
According to the android firmware application, the android firmware and the firmware upgrading method provided by the invention, the android firmware is small, the function is single and fixed, the upgrade is not required except for some extreme conditions, and the hardware ordering cost of an operator can be greatly saved. The android firmware application can download complete partition files of the android system from a storage server protected by an operator, the files do not need to be provided externally, and the technical secret of the operator is fully guaranteed not to be leaked.
Description
Technical Field
The invention relates to an android firmware application device and an android firmware upgrading method.
Background
An operating system of some kind, plus the necessary hardware (e.g., processors, memory, etc.) needed to run the operating system, may be considered an example system in which various applications (an application refers to software or programs that can run in the operating system of the example system) can run. The cloud system can be formed by centrally managing a plurality of example systems according to a certain architectural mode (such as distributed mode). Generally, the cloud system is in charge of daily operation by an operator to provide services for users.
In recent years, the open source Android (Android) system has been widely used and is often selected as the operating system of the instance system. Generally, an operator of the cloud system is responsible for software development and does not have hardware production capacity. The operator provides firmware (firmware) to the factory with hardware production capability, and the factory burns the firmware into the memory of the example system, so that the example system can work normally. For an operator, the process has a risk of disclosure, and the technical secret of the operator can be obtained by cracking the firmware by others.
Furthermore, the amount of code for the android system is large, which may exceed 1G if the firmware includes all partitions of the android system. The larger the firmware, the longer the time to burn in the memory, and the factory typically charges the operator a fee in terms of the burn-in time. Operators often subscribe to a large number of example systems, and the excessive android firmware can significantly increase the cost of the operators. If the code of the android system is updated frequently by the operator, new firmware is compiled when a new instance system is ordered, further increasing the cost.
The disclosure in the "background" section of the specification is helpful to those skilled in the art to understand the technical solution of the present invention, but should not be construed as necessarily belonging to the prior art or common general knowledge.
Disclosure of Invention
In order to overcome the defects reflected by the 'background technology' part, the invention provides an android firmware application device and an android firmware upgrading method.
The application device can run in a recovery mode of an android system and enters different working modes according to different input levels of a bus extender, the working modes comprise a test mode and an initialization mode, the test mode can detect hardware of an instance system, and the initialization mode can download a complete partition file of the android system from a storage server of a cloud system.
The android firmware comprises a u-boot, a misc, a recovery partition file and a file for identifying partition table information, wherein the recovery partition file comprises a virtual memory disc started in a starting mode, a resource and kernel partition file and a user mode application.
Further, the user mode application comprises an android firmware application.
The android firmware upgrading method comprises the following steps:
the controller controls the android firmware application to enter an initialization mode through the input level of the bus extender; the android firmware comprises a u-boot, a misc, a recovery partition file and a file for identifying partition table information, wherein the recovery partition file comprises a virtual memory disc started by starting, a resource and kernel partition file and a user mode application;
the android firmware application is connected with a storage server according to a pre-written address, and a complete partition file of an android system is downloaded from the storage server;
the android firmware application restarts into the normal mode of the android system.
Further, the controller is an ARM controller.
In the technical scheme of the invention, the words such as 'comprise', 'use' and the like are understood in an open expression mode, and the words such as 'consisting of … …' and the like are understood in a closed expression mode. The content that can be known by a person skilled in the art through reading the description and combining with the prior art or common general knowledge will not be described in detail in the description.
According to the android firmware application, the android firmware and the firmware upgrading method provided by the invention, the android firmware is small, the function is single and fixed, the upgrade is not required except for some extreme conditions, and the hardware ordering cost of an operator can be greatly saved. The android firmware application can download complete partition files of the android system from a storage server protected by an operator, the files do not need to be provided externally, and the technical secret of the operator is fully guaranteed not to be leaked.
Drawings
Fig. 1 is a flowchart of an android firmware upgrading method in a specific embodiment.
Detailed Description
The following describes embodiments of the present invention in further detail. It should be noted, however, that the scope of the present invention is not limited by the specific disclosure described. Any technical solution obtained by performing the same or equivalent replacement on technical elements in the described specific technical solution or technical solution obtained by a person skilled in the art without creative work on the basis of the described specific technical solution should be considered to fall within the protection scope of the present invention.
The android instance system is implemented in a simpler way by utilizing an existing development board (such as an ARM development board). Conventional android firmware for development boards includes u-boot, resource, misc, kernel, system, recovery, sysbackup partitions, where the partition names boot, misc, system, recovery, etc. exist in almost all android systems solutions. The boot partition is a common boot partition, and the android system is dependent on the boot partition when normally starting up to enter a normal mode. In some technical solutions of the android system, the boot partition includes a kernel of the android system, but in the technical solution of the present invention, the kernel of the android system is stored in the kernel partition, and the boot partition does not include the kernel of the android system. The misc partition is a miscellaneous partition and stores configuration files of some system settings or other partitions, such as boot information of a recovery partition. The system partition is a common system partition that stores the entire android system (except for the kernels that have been stored in other partitions, etc.). The recovery partition stores files required when the android system enters a recovery (recovery) mode. The u-boot partition is a universal boot loader (universal boot loader). The resource partition stores parameters corresponding to the development board, for example, what operation the kernel of the android system performs according to different level signals of the development board. The kernel partition stores the kernel of the android system. The sysbackup partition is a system backup partition, in some technical solutions, the android system is provided with more than two system backup partitions, the firmware only includes one system backup partition, the partition is a read-only partition, and a number 1(sysbackup1) is added behind the name of the partition.
The android firmware provided by the technical scheme of the invention only comprises u-boot, misc, recovery partition files and files (parameter files) for identifying the partition table information. The recovery partition file is composed of a virtual memory disk (ramdisk) started by a boot, a resource and kernel partition file (i.e. complete files in the resource and kernel partitions), and a small amount of user mode (user mode) applications.
The application of recovery partition files comprises an application with a special function (hereinafter referred to as an R application), wherein the R application can run in a recovery mode of an android system, and enters different working modes according to different Input levels (which can be single levels or level combinations) of a bus extender (General Purpose Input Output, GPIO), the working modes comprise a test mode and an initialization mode, the test mode can detect hardware of an example system, and the initialization mode can download a complete partition file of the android system from a storage server of a cloud system.
When the android firmware provided by the technical scheme of the invention is started (the android firmware can be regarded as an incomplete android system and can also be started due to the u-boot partition), the file of the u-boot partition is loaded and executed firstly, the u-boot partition finds that the boot partition is not verified, the android system cannot be normally started to enter a conventional mode, and the u-boot partition loads the file of the recovery partition to enter a recovery mode. The files of the recovery partition comprise kernel files of an android system, the android kernel can run in a recovery mode, and the R application can correspondingly run in the android kernel.
When the example system is located in a factory, a debugging board externally connected with the example system development board can enable the R application to enter a test mode by inputting the GPIO level. In the test mode, the R application can detect whether hardware such as a processor, a memory and the like of the example system works normally according to the instruction of the debugging board.
After the operator obtains the example system from the factory, the cloud system is built by using the example system. Different types of controllers are arranged in the cloud system to manage the example system. The controller comprises an ARM controller, namely a Linux server (armcontroller) with an ARM architecture, the controller is low in cost, a hardware circuit of the controller is connected with a development board of the example system, and the android system in the example system is managed through the input GPIO level. Operators often set storage servers in the cloud system, the storage servers store files related to technical secrets of the operators, and the operators take strict physical isolation and technical protection measures on the storage servers. Each instance system in the cloud system can communicate with the storage server, and the storage server transmits the required files to the instance system after verifying that the identity of the instance system is correct.
After the example system is added into the cloud system, the ARM controller enables the R application to enter an initialization mode through the GPIO level, and the R application can download a complete partition file of the android system from the storage server.
By utilizing the android firmware and the R application, the android firmware upgrading method can be realized. The flow of the android firmware upgrading method is shown in fig. 1, and includes:
s101: the controller controls the android firmware application to enter an initialization mode.
Specifically, the ARM controller inputs a preset GPIO level to enable the R application to enter an initialization mode.
S102: and the android firmware application is connected with the storage server according to the address written in advance, and the complete partition file of the android system is downloaded from the storage server.
Specifically, an address of a storage server is written in the R application in advance, after the R application enters an initialization mode, the R application is connected to the storage server according to the address, the latest version of the android system complete partition file is downloaded from the storage server, and the files are stored in a memory of the instance system.
S103: the android firmware application restarts into the normal mode of the android system.
Specifically, after all android system partition files are stored locally, the R application restarts the android system, and the android system enters a conventional mode to run after file deletion does not exist after the android system is restarted.
The conventional android firmware may exceed 1G, while the android firmware provided by the technical scheme of the invention is only about 30M. The 1G data is programmed for at least 5 minutes according to the current programming technology, while the 30M data is programmed for only 10 seconds. The android firmware provided by the technical scheme of the invention has a single function, only contains partition files essential for factory test case system hardware, does not contain core codes of the android system, does not need to be updated or upgraded except extreme conditions such as repartitioning of a partition table, and can be used by an operator for a long time. Meanwhile, codes related to technical confidentiality of the operator do not need to be sent out, and the risk of secret leakage of the operator is greatly reduced.
On the basis of the specific technical solutions described above, those skilled in the art can completely construct other solutions, which are not listed here.
Claims (2)
1. The android firmware application device is characterized in that the application device can run in a recovery mode of an android system and enters different working modes according to different input levels of a bus extender, the working modes comprise a test mode and an initialization mode, the test mode can detect hardware of an instance system, and the initialization mode can download a complete partition file of the android system from a storage server of a cloud system;
the android firmware comprises a u-boot, a misc, a recovery partition file and a file for identifying partition table information, wherein the recovery partition file comprises a virtual memory disc started in a starting mode, a resource and kernel partition file and a user mode application.
2. The android firmware upgrading method is characterized by comprising the following steps:
the controller controls the android firmware application to enter an initialization mode through the input level of the bus extender; the android firmware comprises a u-boot, a misc, a recovery partition file and a file for identifying partition table information, wherein the recovery partition file comprises a virtual memory disc started by starting, a resource and kernel partition file and a user mode application;
the android firmware application is connected with a storage server according to a pre-written address, and a complete partition file of an android system is downloaded from the storage server;
the android firmware application restarts into the normal mode of the android system.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610941922.1A CN106528114B (en) | 2016-10-25 | 2016-10-25 | Android firmware application device and android firmware upgrading method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610941922.1A CN106528114B (en) | 2016-10-25 | 2016-10-25 | Android firmware application device and android firmware upgrading method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106528114A CN106528114A (en) | 2017-03-22 |
CN106528114B true CN106528114B (en) | 2022-03-29 |
Family
ID=58293344
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610941922.1A Active CN106528114B (en) | 2016-10-25 | 2016-10-25 | Android firmware application device and android firmware upgrading method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106528114B (en) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108345464A (en) * | 2018-03-06 | 2018-07-31 | 播思通讯技术(北京)有限公司 | A kind of the startup method and Android vehicle device of Android system |
CN109240720B (en) * | 2018-08-23 | 2021-11-26 | 瑞芯微电子股份有限公司 | Firmware upgrading method of android system and storage device |
CN110187909B (en) * | 2019-06-03 | 2023-04-14 | 山东海格尔信息技术股份有限公司 | Single-chip microcomputer firmware upgrading method based on android system |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080040580A1 (en) * | 2005-11-28 | 2008-02-14 | Daniel Scott Cohen | Microcontroller based flash memory digital controller system |
CN102802083A (en) * | 2012-08-24 | 2012-11-28 | 乐视网信息技术(北京)股份有限公司 | Set top box updating method based on Android system and set top box |
CN103116801A (en) * | 2013-01-22 | 2013-05-22 | 无锡中科龙泽信息科技有限公司 | Wireless secure digital (SD) card and implementation method of working mode switch thereof |
CN104899055A (en) * | 2015-05-06 | 2015-09-09 | 深圳市国鑫恒宇科技有限公司 | BIOS control based ME updating system and updating method thereof |
CN105260205A (en) * | 2015-09-30 | 2016-01-20 | 中山市天启电子科技有限公司 | Method for implementing startup of double operating systems on embedded board |
-
2016
- 2016-10-25 CN CN201610941922.1A patent/CN106528114B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080040580A1 (en) * | 2005-11-28 | 2008-02-14 | Daniel Scott Cohen | Microcontroller based flash memory digital controller system |
CN102802083A (en) * | 2012-08-24 | 2012-11-28 | 乐视网信息技术(北京)股份有限公司 | Set top box updating method based on Android system and set top box |
CN103116801A (en) * | 2013-01-22 | 2013-05-22 | 无锡中科龙泽信息科技有限公司 | Wireless secure digital (SD) card and implementation method of working mode switch thereof |
CN104899055A (en) * | 2015-05-06 | 2015-09-09 | 深圳市国鑫恒宇科技有限公司 | BIOS control based ME updating system and updating method thereof |
CN105260205A (en) * | 2015-09-30 | 2016-01-20 | 中山市天启电子科技有限公司 | Method for implementing startup of double operating systems on embedded board |
Also Published As
Publication number | Publication date |
---|---|
CN106528114A (en) | 2017-03-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104850762B (en) | Prevent the undesirable method of the movement of computer, computer program and computer | |
TWI363298B (en) | Communication device and firmware update method thereof | |
US8875125B2 (en) | Operation system installation methods and media | |
US9298470B2 (en) | Method and apparatus for selecting bios program for a processor | |
US9910664B2 (en) | System and method of online firmware update for baseboard management controller (BMC) devices | |
CN103746833A (en) | PXE-based RAID automatic configuration method and system | |
US20150074386A1 (en) | Boot method and boot system | |
US10747523B2 (en) | Methods of updating firmware components, computer systems and memory apparatus | |
EP3518099B1 (en) | Installation of operating system | |
US9766876B2 (en) | Methods of updating software components, computer systems and memory apparatus | |
CN104572387A (en) | Method and device for debugging terminal in engineering mode | |
CN106528114B (en) | Android firmware application device and android firmware upgrading method | |
CN106201773A (en) | The upgrading of instance system, cloud system and instance system or restoration methods | |
CN103714287A (en) | Method and device for obtaining temporary Root authority | |
WO2021136200A1 (en) | Bootloader loading method, storage medium, and embedded terminal | |
US10552171B2 (en) | Efficient booting system | |
TW201721412A (en) | Selecting and loading firmware volumes | |
US20220244942A1 (en) | Selecting and sending subset of components to computing device prior to operating system install | |
US8086834B2 (en) | System and method for populating a dedicated system service repository for an information handling system | |
CN109375953B (en) | Operating system starting method and device | |
WO2014112973A1 (en) | Server-platform simulation service | |
US20150212866A1 (en) | Management system for service of multiple operating environments, and methods thereof | |
US10210004B2 (en) | Method of providing at least one data carrier for a computer system and computer system including service processor independently operable from a main processor of the computer system | |
JP2016173744A (en) | Blade server, blade system, bmc, chipset, and enclosure manager | |
CN110007973B (en) | Information processing method and electronic equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CP03 | Change of name, title or address |
Address after: 230031 Room 672, 6/F, Building A3A4, Zhong'an Chuanggu Science Park, No. 900, Wangjiang West Road, High-tech Zone, Hefei, Anhui Patentee after: Anhui Haima Cloud Technology Co.,Ltd. Address before: 100102 floor 41, block B, Wangjing SOHO T3, yard 1, Futong East Street, Chaoyang District, Beijing Patentee before: BEIJING HAIYUDONGXIANG TECHNOLOGY Co.,Ltd. |
|
CP03 | Change of name, title or address |