CN106528114B - Android firmware application device and android firmware upgrading method - Google Patents

Android firmware application device and android firmware upgrading method Download PDF

Info

Publication number
CN106528114B
CN106528114B CN201610941922.1A CN201610941922A CN106528114B CN 106528114 B CN106528114 B CN 106528114B CN 201610941922 A CN201610941922 A CN 201610941922A CN 106528114 B CN106528114 B CN 106528114B
Authority
CN
China
Prior art keywords
android
firmware
partition
mode
application
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610941922.1A
Other languages
Chinese (zh)
Other versions
CN106528114A (en
Inventor
王小品
田乐
赵幸
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Anhui Haima Cloud Technology Co ltd
Original Assignee
Beijing Haiyudongxiang Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Haiyudongxiang Technology Co ltd filed Critical Beijing Haiyudongxiang Technology Co ltd
Priority to CN201610941922.1A priority Critical patent/CN106528114B/en
Publication of CN106528114A publication Critical patent/CN106528114A/en
Application granted granted Critical
Publication of CN106528114B publication Critical patent/CN106528114B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/4401Bootstrapping
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/60Software deployment
    • G06F8/61Installation

Abstract

According to the android firmware application, the android firmware and the firmware upgrading method provided by the invention, the android firmware is small, the function is single and fixed, the upgrade is not required except for some extreme conditions, and the hardware ordering cost of an operator can be greatly saved. The android firmware application can download complete partition files of the android system from a storage server protected by an operator, the files do not need to be provided externally, and the technical secret of the operator is fully guaranteed not to be leaked.

Description

Android firmware application device and android firmware upgrading method
Technical Field
The invention relates to an android firmware application device and an android firmware upgrading method.
Background
An operating system of some kind, plus the necessary hardware (e.g., processors, memory, etc.) needed to run the operating system, may be considered an example system in which various applications (an application refers to software or programs that can run in the operating system of the example system) can run. The cloud system can be formed by centrally managing a plurality of example systems according to a certain architectural mode (such as distributed mode). Generally, the cloud system is in charge of daily operation by an operator to provide services for users.
In recent years, the open source Android (Android) system has been widely used and is often selected as the operating system of the instance system. Generally, an operator of the cloud system is responsible for software development and does not have hardware production capacity. The operator provides firmware (firmware) to the factory with hardware production capability, and the factory burns the firmware into the memory of the example system, so that the example system can work normally. For an operator, the process has a risk of disclosure, and the technical secret of the operator can be obtained by cracking the firmware by others.
Furthermore, the amount of code for the android system is large, which may exceed 1G if the firmware includes all partitions of the android system. The larger the firmware, the longer the time to burn in the memory, and the factory typically charges the operator a fee in terms of the burn-in time. Operators often subscribe to a large number of example systems, and the excessive android firmware can significantly increase the cost of the operators. If the code of the android system is updated frequently by the operator, new firmware is compiled when a new instance system is ordered, further increasing the cost.
The disclosure in the "background" section of the specification is helpful to those skilled in the art to understand the technical solution of the present invention, but should not be construed as necessarily belonging to the prior art or common general knowledge.
Disclosure of Invention
In order to overcome the defects reflected by the 'background technology' part, the invention provides an android firmware application device and an android firmware upgrading method.
The application device can run in a recovery mode of an android system and enters different working modes according to different input levels of a bus extender, the working modes comprise a test mode and an initialization mode, the test mode can detect hardware of an instance system, and the initialization mode can download a complete partition file of the android system from a storage server of a cloud system.
The android firmware comprises a u-boot, a misc, a recovery partition file and a file for identifying partition table information, wherein the recovery partition file comprises a virtual memory disc started in a starting mode, a resource and kernel partition file and a user mode application.
Further, the user mode application comprises an android firmware application.
The android firmware upgrading method comprises the following steps:
the controller controls the android firmware application to enter an initialization mode through the input level of the bus extender; the android firmware comprises a u-boot, a misc, a recovery partition file and a file for identifying partition table information, wherein the recovery partition file comprises a virtual memory disc started by starting, a resource and kernel partition file and a user mode application;
the android firmware application is connected with a storage server according to a pre-written address, and a complete partition file of an android system is downloaded from the storage server;
the android firmware application restarts into the normal mode of the android system.
Further, the controller is an ARM controller.
In the technical scheme of the invention, the words such as 'comprise', 'use' and the like are understood in an open expression mode, and the words such as 'consisting of … …' and the like are understood in a closed expression mode. The content that can be known by a person skilled in the art through reading the description and combining with the prior art or common general knowledge will not be described in detail in the description.
According to the android firmware application, the android firmware and the firmware upgrading method provided by the invention, the android firmware is small, the function is single and fixed, the upgrade is not required except for some extreme conditions, and the hardware ordering cost of an operator can be greatly saved. The android firmware application can download complete partition files of the android system from a storage server protected by an operator, the files do not need to be provided externally, and the technical secret of the operator is fully guaranteed not to be leaked.
Drawings
Fig. 1 is a flowchart of an android firmware upgrading method in a specific embodiment.
Detailed Description
The following describes embodiments of the present invention in further detail. It should be noted, however, that the scope of the present invention is not limited by the specific disclosure described. Any technical solution obtained by performing the same or equivalent replacement on technical elements in the described specific technical solution or technical solution obtained by a person skilled in the art without creative work on the basis of the described specific technical solution should be considered to fall within the protection scope of the present invention.
The android instance system is implemented in a simpler way by utilizing an existing development board (such as an ARM development board). Conventional android firmware for development boards includes u-boot, resource, misc, kernel, system, recovery, sysbackup partitions, where the partition names boot, misc, system, recovery, etc. exist in almost all android systems solutions. The boot partition is a common boot partition, and the android system is dependent on the boot partition when normally starting up to enter a normal mode. In some technical solutions of the android system, the boot partition includes a kernel of the android system, but in the technical solution of the present invention, the kernel of the android system is stored in the kernel partition, and the boot partition does not include the kernel of the android system. The misc partition is a miscellaneous partition and stores configuration files of some system settings or other partitions, such as boot information of a recovery partition. The system partition is a common system partition that stores the entire android system (except for the kernels that have been stored in other partitions, etc.). The recovery partition stores files required when the android system enters a recovery (recovery) mode. The u-boot partition is a universal boot loader (universal boot loader). The resource partition stores parameters corresponding to the development board, for example, what operation the kernel of the android system performs according to different level signals of the development board. The kernel partition stores the kernel of the android system. The sysbackup partition is a system backup partition, in some technical solutions, the android system is provided with more than two system backup partitions, the firmware only includes one system backup partition, the partition is a read-only partition, and a number 1(sysbackup1) is added behind the name of the partition.
The android firmware provided by the technical scheme of the invention only comprises u-boot, misc, recovery partition files and files (parameter files) for identifying the partition table information. The recovery partition file is composed of a virtual memory disk (ramdisk) started by a boot, a resource and kernel partition file (i.e. complete files in the resource and kernel partitions), and a small amount of user mode (user mode) applications.
The application of recovery partition files comprises an application with a special function (hereinafter referred to as an R application), wherein the R application can run in a recovery mode of an android system, and enters different working modes according to different Input levels (which can be single levels or level combinations) of a bus extender (General Purpose Input Output, GPIO), the working modes comprise a test mode and an initialization mode, the test mode can detect hardware of an example system, and the initialization mode can download a complete partition file of the android system from a storage server of a cloud system.
When the android firmware provided by the technical scheme of the invention is started (the android firmware can be regarded as an incomplete android system and can also be started due to the u-boot partition), the file of the u-boot partition is loaded and executed firstly, the u-boot partition finds that the boot partition is not verified, the android system cannot be normally started to enter a conventional mode, and the u-boot partition loads the file of the recovery partition to enter a recovery mode. The files of the recovery partition comprise kernel files of an android system, the android kernel can run in a recovery mode, and the R application can correspondingly run in the android kernel.
When the example system is located in a factory, a debugging board externally connected with the example system development board can enable the R application to enter a test mode by inputting the GPIO level. In the test mode, the R application can detect whether hardware such as a processor, a memory and the like of the example system works normally according to the instruction of the debugging board.
After the operator obtains the example system from the factory, the cloud system is built by using the example system. Different types of controllers are arranged in the cloud system to manage the example system. The controller comprises an ARM controller, namely a Linux server (armcontroller) with an ARM architecture, the controller is low in cost, a hardware circuit of the controller is connected with a development board of the example system, and the android system in the example system is managed through the input GPIO level. Operators often set storage servers in the cloud system, the storage servers store files related to technical secrets of the operators, and the operators take strict physical isolation and technical protection measures on the storage servers. Each instance system in the cloud system can communicate with the storage server, and the storage server transmits the required files to the instance system after verifying that the identity of the instance system is correct.
After the example system is added into the cloud system, the ARM controller enables the R application to enter an initialization mode through the GPIO level, and the R application can download a complete partition file of the android system from the storage server.
By utilizing the android firmware and the R application, the android firmware upgrading method can be realized. The flow of the android firmware upgrading method is shown in fig. 1, and includes:
s101: the controller controls the android firmware application to enter an initialization mode.
Specifically, the ARM controller inputs a preset GPIO level to enable the R application to enter an initialization mode.
S102: and the android firmware application is connected with the storage server according to the address written in advance, and the complete partition file of the android system is downloaded from the storage server.
Specifically, an address of a storage server is written in the R application in advance, after the R application enters an initialization mode, the R application is connected to the storage server according to the address, the latest version of the android system complete partition file is downloaded from the storage server, and the files are stored in a memory of the instance system.
S103: the android firmware application restarts into the normal mode of the android system.
Specifically, after all android system partition files are stored locally, the R application restarts the android system, and the android system enters a conventional mode to run after file deletion does not exist after the android system is restarted.
The conventional android firmware may exceed 1G, while the android firmware provided by the technical scheme of the invention is only about 30M. The 1G data is programmed for at least 5 minutes according to the current programming technology, while the 30M data is programmed for only 10 seconds. The android firmware provided by the technical scheme of the invention has a single function, only contains partition files essential for factory test case system hardware, does not contain core codes of the android system, does not need to be updated or upgraded except extreme conditions such as repartitioning of a partition table, and can be used by an operator for a long time. Meanwhile, codes related to technical confidentiality of the operator do not need to be sent out, and the risk of secret leakage of the operator is greatly reduced.
On the basis of the specific technical solutions described above, those skilled in the art can completely construct other solutions, which are not listed here.

Claims (2)

1. The android firmware application device is characterized in that the application device can run in a recovery mode of an android system and enters different working modes according to different input levels of a bus extender, the working modes comprise a test mode and an initialization mode, the test mode can detect hardware of an instance system, and the initialization mode can download a complete partition file of the android system from a storage server of a cloud system;
the android firmware comprises a u-boot, a misc, a recovery partition file and a file for identifying partition table information, wherein the recovery partition file comprises a virtual memory disc started in a starting mode, a resource and kernel partition file and a user mode application.
2. The android firmware upgrading method is characterized by comprising the following steps:
the controller controls the android firmware application to enter an initialization mode through the input level of the bus extender; the android firmware comprises a u-boot, a misc, a recovery partition file and a file for identifying partition table information, wherein the recovery partition file comprises a virtual memory disc started by starting, a resource and kernel partition file and a user mode application;
the android firmware application is connected with a storage server according to a pre-written address, and a complete partition file of an android system is downloaded from the storage server;
the android firmware application restarts into the normal mode of the android system.
CN201610941922.1A 2016-10-25 2016-10-25 Android firmware application device and android firmware upgrading method Active CN106528114B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610941922.1A CN106528114B (en) 2016-10-25 2016-10-25 Android firmware application device and android firmware upgrading method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610941922.1A CN106528114B (en) 2016-10-25 2016-10-25 Android firmware application device and android firmware upgrading method

Publications (2)

Publication Number Publication Date
CN106528114A CN106528114A (en) 2017-03-22
CN106528114B true CN106528114B (en) 2022-03-29

Family

ID=58293344

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610941922.1A Active CN106528114B (en) 2016-10-25 2016-10-25 Android firmware application device and android firmware upgrading method

Country Status (1)

Country Link
CN (1) CN106528114B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108345464A (en) * 2018-03-06 2018-07-31 播思通讯技术(北京)有限公司 A kind of the startup method and Android vehicle device of Android system
CN109240720B (en) * 2018-08-23 2021-11-26 瑞芯微电子股份有限公司 Firmware upgrading method of android system and storage device
CN110187909B (en) * 2019-06-03 2023-04-14 山东海格尔信息技术股份有限公司 Single-chip microcomputer firmware upgrading method based on android system

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080040580A1 (en) * 2005-11-28 2008-02-14 Daniel Scott Cohen Microcontroller based flash memory digital controller system
CN102802083A (en) * 2012-08-24 2012-11-28 乐视网信息技术(北京)股份有限公司 Set top box updating method based on Android system and set top box
CN103116801A (en) * 2013-01-22 2013-05-22 无锡中科龙泽信息科技有限公司 Wireless secure digital (SD) card and implementation method of working mode switch thereof
CN104899055A (en) * 2015-05-06 2015-09-09 深圳市国鑫恒宇科技有限公司 BIOS control based ME updating system and updating method thereof
CN105260205A (en) * 2015-09-30 2016-01-20 中山市天启电子科技有限公司 Method for implementing startup of double operating systems on embedded board

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080040580A1 (en) * 2005-11-28 2008-02-14 Daniel Scott Cohen Microcontroller based flash memory digital controller system
CN102802083A (en) * 2012-08-24 2012-11-28 乐视网信息技术(北京)股份有限公司 Set top box updating method based on Android system and set top box
CN103116801A (en) * 2013-01-22 2013-05-22 无锡中科龙泽信息科技有限公司 Wireless secure digital (SD) card and implementation method of working mode switch thereof
CN104899055A (en) * 2015-05-06 2015-09-09 深圳市国鑫恒宇科技有限公司 BIOS control based ME updating system and updating method thereof
CN105260205A (en) * 2015-09-30 2016-01-20 中山市天启电子科技有限公司 Method for implementing startup of double operating systems on embedded board

Also Published As

Publication number Publication date
CN106528114A (en) 2017-03-22

Similar Documents

Publication Publication Date Title
CN104850762B (en) Prevent the undesirable method of the movement of computer, computer program and computer
TWI363298B (en) Communication device and firmware update method thereof
US8875125B2 (en) Operation system installation methods and media
US9298470B2 (en) Method and apparatus for selecting bios program for a processor
US9910664B2 (en) System and method of online firmware update for baseboard management controller (BMC) devices
CN103746833A (en) PXE-based RAID automatic configuration method and system
US20150074386A1 (en) Boot method and boot system
US10747523B2 (en) Methods of updating firmware components, computer systems and memory apparatus
EP3518099B1 (en) Installation of operating system
US9766876B2 (en) Methods of updating software components, computer systems and memory apparatus
CN104572387A (en) Method and device for debugging terminal in engineering mode
CN106528114B (en) Android firmware application device and android firmware upgrading method
CN106201773A (en) The upgrading of instance system, cloud system and instance system or restoration methods
CN103714287A (en) Method and device for obtaining temporary Root authority
WO2021136200A1 (en) Bootloader loading method, storage medium, and embedded terminal
US10552171B2 (en) Efficient booting system
TW201721412A (en) Selecting and loading firmware volumes
US20220244942A1 (en) Selecting and sending subset of components to computing device prior to operating system install
US8086834B2 (en) System and method for populating a dedicated system service repository for an information handling system
CN109375953B (en) Operating system starting method and device
WO2014112973A1 (en) Server-platform simulation service
US20150212866A1 (en) Management system for service of multiple operating environments, and methods thereof
US10210004B2 (en) Method of providing at least one data carrier for a computer system and computer system including service processor independently operable from a main processor of the computer system
JP2016173744A (en) Blade server, blade system, bmc, chipset, and enclosure manager
CN110007973B (en) Information processing method and electronic equipment

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CP03 Change of name, title or address

Address after: 230031 Room 672, 6/F, Building A3A4, Zhong'an Chuanggu Science Park, No. 900, Wangjiang West Road, High-tech Zone, Hefei, Anhui

Patentee after: Anhui Haima Cloud Technology Co.,Ltd.

Address before: 100102 floor 41, block B, Wangjing SOHO T3, yard 1, Futong East Street, Chaoyang District, Beijing

Patentee before: BEIJING HAIYUDONGXIANG TECHNOLOGY Co.,Ltd.

CP03 Change of name, title or address