CN106528249A - Storage method and device of upgrade package, and terminal - Google Patents

Storage method and device of upgrade package, and terminal Download PDF

Info

Publication number
CN106528249A
CN106528249A CN201611092764.3A CN201611092764A CN106528249A CN 106528249 A CN106528249 A CN 106528249A CN 201611092764 A CN201611092764 A CN 201611092764A CN 106528249 A CN106528249 A CN 106528249A
Authority
CN
China
Prior art keywords
aku
encrypted partition
module
size
space size
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201611092764.3A
Other languages
Chinese (zh)
Other versions
CN106528249B (en
Inventor
李明浩
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Xiaomi Mobile Software Co Ltd
Original Assignee
Beijing Xiaomi Mobile Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Xiaomi Mobile Software Co Ltd filed Critical Beijing Xiaomi Mobile Software Co Ltd
Priority to CN201611092764.3A priority Critical patent/CN106528249B/en
Publication of CN106528249A publication Critical patent/CN106528249A/en
Application granted granted Critical
Publication of CN106528249B publication Critical patent/CN106528249B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/60Software deployment
    • G06F8/65Updates

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)
  • Stored Programmes (AREA)

Abstract

The invention relates to a storage method and device of an upgrade package, and a terminal. The method can comprise the following steps of: determining the size of the upgrade package which is downloaded last; determining the size of the residual space of a partition which is not encrypted; and when the size of the upgrade package is smaller than the size of the residual space, storing the upgrade package in the partition which is not encrypted. By use of the embodiment of the invention, when a recovery mode is restarted to carry out OTA (Over-the-Air Technology) upgrade, an OTA upgrade package does not need to be decrypted, the storage position of the OTA upgrade package is stored, the OTA upgrade package is decrypted directly on the basis of the storage position so as to carry out the OTA upgrade, OTA upgrade speed is quickened, upgrade time is shortened, a user does not need to wait, and user experience is optimized.

Description

The storage method of AKU, device and terminal
Technical field
It relates to field of terminal technology, more particularly to a kind of storage method of AKU, device and terminal.
Background technology
In correlation technique, OTA (Over-the-Air Technology, over the air) the upgradings flow process of terminal is big Cause includes:The OTA AKUs downloaded from server are saved in into data (userdate) subregion, if the data partition is encryption point Area, then read the information of OTA AKUs, OTA AKUs be decrypted, then by the OTA AKUs storage after decryption to original Position, and by the positional information of storage OTA AKUs be stored in unencryption subregion (cache, caching) /cache/ In blocks.map files.
Seen from the above description, restart before recovery (recovery) pattern carries out OTA upgradings in terminal, can start as above The action of blocks.map files is generated, during this, reading rate is 70MB/s, EMMC of the writing rate for 40MB/s The time of (Embedded Multi Media Card, embedded multi-media card) generation blocks.map files is about 140s, This was resulted in before reforestation practices are restarted, and user needs to wait the time of at least 2 minutes enter normal upgrading flow process, The time of user is wasted, Consumer's Experience is not good enough.
The content of the invention
To overcome problem present in correlation technique, present disclose provides a kind of storage method of AKU, device and end End.
According to the first aspect of the embodiment of the present disclosure, there is provided a kind of storage method of AKU, including:
Determine the bag size of the AKU of newest download;
It is determined that the not remaining space size of encrypted partition;
When the bag size is less than the remaining space size, the AKU is stored in into the not encrypted partition.
In one embodiment, before the bag size of the AKU for determining newest download, methods described also includes:
AKU is sent to server and updates detection request;
Receive the newest AKU that the server is returned.
In one embodiment, the bag size of the AKU for determining newest download, including:
Parse the package informatin of the AKU;
The bag size of the AKU is obtained based on the package informatin.
In one embodiment, the remaining space size for determining not encrypted partition, including:
The luv space size of not encrypted partition described in reading;
The use space size of not encrypted partition described in calculating;
The remaining space size is calculated based on the luv space size and the use space size.
In one embodiment, methods described also includes:
When reforestation practices are restarted, the AKU is read from the not encrypted partition;
Upgraded based on the AKU.
In one embodiment, it is described the AKU is stored in into the not encrypted partition after, methods described also includes:
When the bag size is not less than the remaining space size, the AKU is stored in into encrypted partition;
Positional information of the AKU in the encrypted partition is stored in into the not encrypted partition.
In one embodiment, the positional information by the AKU in the encrypted partition is stored in the unencryption After subregion, methods described also includes:
When reforestation practices are restarted, the positional information is read from the not encrypted partition;
The AKU is read and decrypts based on the positional information from the encrypted partition;
Upgraded based on the AKU after the decryption.
According to the second aspect of the embodiment of the present disclosure, there is provided a kind of storage device of AKU, including:
First determining module, is configured to determine that the bag size of the AKU of newest download;
Second determining module, is configured to determine that the remaining space size of not encrypted partition;
First memory module, is configured to when the bag size is less than the remaining space size, by the AKU It is stored in the not encrypted partition.
In one embodiment, described device also includes:
Sending module, is configured to send AKU renewal detection request to server;
Receiver module, is configured to receive the newest AKU that the server is returned.
In one embodiment, first determining module includes:
Analyzing sub-module, is configured to parse the package informatin of the AKU;
Determination sub-module, is configured to the bag size of the AKU is obtained based on the package informatin.
In one embodiment, second determining module includes:
Reading submodule, is configured to the luv space size of not encrypted partition described in reading;
First calculating sub module, is configured to the use space size of not encrypted partition described in calculating;
Second calculating sub module, is configured to calculate institute based on the luv space size and the use space size State remaining space size.
In one embodiment, described device also includes:
First read module, is configured to, when reforestation practices are restarted, read the upgrading from the not encrypted partition Bag;
Upgraded module, is configured to be upgraded based on the AKU.
In one embodiment, described device also includes:
Second memory module, is configured to when the bag size is not less than the remaining space size, by the upgrading Bag is stored in encrypted partition;
3rd memory module, be configured to the positional information by the AKU in the encrypted partition be stored in it is described not Encrypted partition.
In one embodiment, described device also includes:
Second read module, is configured to, when reforestation practices are restarted, read the position from the not encrypted partition Information;
Deciphering module, is configured to read from the encrypted partition based on the positional information and decrypt the AKU;
Upgraded module, is configured to be upgraded based on the AKU after the decryption.
According to the third aspect of the embodiment of the present disclosure, there is provided a kind of terminal, including:
Processor;
For storing the memory of processor executable;
Wherein, the processor is configured to:
Determine the bag size of the AKU of newest download;
It is determined that the not remaining space size of encrypted partition;
When the bag size is less than the remaining space size, the AKU is stored in into the not encrypted partition.
The technical scheme that embodiment of the disclosure is provided can include following beneficial effect:
In the disclosure, terminal can be in the case where the bag size of AKU be not less than the not remaining space of encrypted partition, will OTA AKUs are encrypted and stored in encrypted partition, and then storage location is stored in not encrypted partition.So as to restart When recovery patterns carry out OTA upgradings, without the need for its storage location is decrypted and preserved to OTA AKUs, it is directly based upon and deposits Storage space is put decryption OTA AKUs and carries out OTA upgradings, accelerates the speed of OTA upgradings, shortens update time, Yong Huwu Need to wait for, optimize Consumer's Experience.
It should be appreciated that the general description of the above and detailed description hereinafter are only exemplary and explanatory, not The disclosure can be limited.
Description of the drawings
During accompanying drawing herein is merged in specification and the part of this specification is constituted, show the enforcement for meeting the disclosure Example, and be used for explaining the principle of the disclosure together with specification.
Figure 1A is a kind of storage method flow chart of AKU of the disclosure according to an exemplary embodiment.
Figure 1B is that a kind of application scenarios of the storage method of AKU of the disclosure according to an exemplary embodiment show It is intended to.
Fig. 2 is the flow chart of the storage method of another kind of AKU of the disclosure according to an exemplary embodiment.
Fig. 3 is the flow chart of the storage method of another kind of AKU of the disclosure according to an exemplary embodiment.
Fig. 4 is the flow chart of the storage method of another kind of AKU of the disclosure according to an exemplary embodiment.
Fig. 5 is a kind of storage device block diagram of AKU of the disclosure according to an exemplary embodiment.
Fig. 6 is the storage device block diagram of another kind of AKU of the disclosure according to an exemplary embodiment.
Fig. 7 is the storage device block diagram of another kind of AKU of the disclosure according to an exemplary embodiment.
Fig. 8 is the storage device block diagram of another kind of AKU of the disclosure according to an exemplary embodiment.
Fig. 9 is the storage device block diagram of another kind of AKU of the disclosure according to an exemplary embodiment.
Figure 10 is the storage device block diagram of another kind of AKU of the disclosure according to an exemplary embodiment.
Figure 11 is the storage device block diagram of another kind of AKU of the disclosure according to an exemplary embodiment.
Figure 12 is an a kind of structure of storage device for AKU of the disclosure according to an exemplary embodiment Schematic diagram.
Specific embodiment
Here in detail exemplary embodiment will be illustrated, its example is illustrated in the accompanying drawings.Explained below is related to During accompanying drawing, unless otherwise indicated, the same numbers in different accompanying drawings represent same or analogous key element.Following exemplary embodiment Described in embodiment do not represent all embodiments consistent with the disclosure.Conversely, they be only with as appended by The example of consistent apparatus and method in terms of some described in detail in claims, the disclosure.
The disclosure using term be purpose only merely for description specific embodiment, and be not intended to be limiting the disclosure. " one kind ", " described " and " being somebody's turn to do " of singulative used in disclosure and the accompanying claims book is also intended to include majority Form, unless context clearly shows that other implications.It is also understood that term "and/or" used herein is referred to and is wrapped Containing one or more associated any or all possible combinations for listing project.
It will be appreciated that though various information, but this may be described using term first, second, third, etc. in the disclosure A little information should not necessarily be limited by these terms.These terms are only for same type of information is distinguished from each other out.For example, without departing from In the case of disclosure scope, the first information can also be referred to as the second information, and similarly, the second information can also be referred to as One information.Depending on linguistic context, word as used in this " if " can be construed to " ... when " or " when ... When " or " in response to determining ".
Figure 1A is a kind of storage method flow chart of the AKU according to an exemplary embodiment, and Figure 1B is according to one A kind of application scenario diagram of the storage method of the AKU shown in exemplary embodiment.The method can be used in terminal, this public affairs Terminal in opening can be any intelligent terminal with function of surfing the Net, for example, can be specially mobile phone, panel computer, PDA (Personal Digital Assistant, personal digital assistant) etc..Wherein, terminal can access road by WLAN By device, and by the server on router access public network.The method comprises the following steps 101-103:
In a step 101, determine the bag size of the AKU of newest download.
In the embodiment of the present disclosure, the AKU be OTA AKUs, terminal can periodically or every set time to Server sends AKU and updates detection request, when server detects newest OTA AKUs, by the OTA AKUs Terminal is sent to, or replies to terminal check information, terminal-pair OTA AKU is downloaded.
In a step 102, determine the remaining space size of not encrypted partition.
In the embodiment of the present disclosure, encrypted partition does not refer to cache (cache) subregion, it is determined that the residue of encrypted partition is not empty Between method can adopt correlation technique in method, will not be described here.
In step 103, when bag size is less than remaining space size, AKU is stored in into not encrypted partition.
In one embodiment, without the need for being encrypted to OTA AKUs, OTA AKUs are stored in into not encrypted partition directly .
With reference to shown in Figure 1B, in fig. ib, including server and the smart mobile phone as terminal, smart mobile phone is from server After downloading OTA AKUs, the bag size of OTA AKUs, and the remaining space size of the not encrypted partition of itself are determined, When bag size is less than remaining space size, OTA AKUs are directly stored in not encrypted partition, thus, it is possible to avoid an OTA AKU is stored in encrypted partition, and it is caused need decryption can enter upgrading flow process, save OTA update times, it is excellent Consumer's Experience is changed.
As shown in Fig. 2 Fig. 2 is the storage method flow chart of another kind of AKU according to an exemplary embodiment, The said method that the present embodiment is provided using the embodiment of the present disclosure, is schematically illustrated as a example by how storing AKU, should Method comprises the steps 201-209:
In step 201, AKU is sent to server update detection request.
In one embodiment, terminal can send AKU renewal detection request to server every the time of setting, with This can be downloaded determining whether newest OTA AKUs.
In step 202., the newest AKU that the reception server is returned.
When server detects newest OTA AKUs, OTA AKUs are sent to into terminal.
In step 203, parse the package informatin of AKU.
In step 204, the bag size of AKU is obtained based on package informatin.
The OTA AKUs that end-on is received are parsed, and obtain package informatin, contain bag size, so as to end in package informatin End determines the bag size of OTA.
In step 205, read the luv space size of not encrypted partition.
In one embodiment, terminal can determine the luv space size of not encrypted partition by reading configuration information.
In step 206, calculate the use space size of encrypted partition.
In one embodiment, the size of the file that terminal has been stored by detection can determine that the use of not encrypted partition is empty Between size.
In step 207, remaining space size is calculated based on luv space size and using space size.
So as to terminal just can calculate remaining space size using space size by luv space size is deducted.
In a step 208, judge bag size whether more than remaining space size.
In step 209, when being judged as that bag size is less than remaining space size, AKU is stored in and do not encrypt point Area.
In one embodiment, OTA AKUs can be stored directly in not encrypted partition, and without the need for encryption.
By above-described embodiment, update time can be reduced significantly, when restarting reply pattern user without waiting for, you can enter Enter normal upgrading flow process, optimize Consumer's Experience.
As shown in figure 3, Fig. 3 is the storage method flow chart of another kind of AKU according to an exemplary embodiment, The said method that the present embodiment is provided using the embodiment of the present disclosure, is schematically illustrated as a example by how upgrading, the method bag Include following steps 301-303:
In step 301, when reforestation practices are restarted, never AKU is read in encrypted partition.
In disclosure step, terminal when restarting recovery patterns and being upgraded, directly never read by encrypted partition OTA AKUs are taken, without the need for as being decrypted in the prior art.
In step 302, upgraded based on AKU.
In step 303, when being judged as that bag size is not less than remaining space size, AKU is stored in into encryption point Area, and the positional information by AKU in encrypted partition is stored in not encrypted partition.
In one embodiment, encrypted partition can be userdate subregions, when not encrypted partition memory space inadequate with During storage OTA AKUs, encrypted partition can will be stored in after OTA upgrading packet encryptions, and by the OTA AKUs in encrypted partition Storage location, such as block message is stored in not encrypted partition, be generally stored inside not encrypted partition /cache/blocks.map In file.
As shown in figure 4, Fig. 4 is the storage method flow chart of another kind of AKU according to an exemplary embodiment, The said method that the present embodiment is provided using the embodiment of the present disclosure, is schematically illustrated as a example by how upgrading, the method bag Include following steps 401-403:
In step 401, when reforestation practices are restarted, never encrypted partition reading position information.
In one embodiment, when will carry out OTA upgradings, need first to determine the storage location of OTA AKUs.
In step 402, read from encrypted partition based on positional information and decrypt AKU.
In step 403, upgraded based on the AKU after decryption.
In the disclosed embodiments, in the case where the bag size of AKU is not less than the not remaining space of encrypted partition, OTA AKUs are encrypted and stored in into encrypted partition, then storage location is stored in not encrypted partition.So as to restart When recovery patterns carry out OTA upgradings, without the need for its storage location is decrypted and preserved to OTA AKUs, it is directly based upon and deposits Storage space is put decryption OTA AKUs and carries out OTA upgradings, accelerates the speed of OTA upgradings, shortens update time, Yong Huwu Need to wait for, optimize Consumer's Experience.
It is corresponding with the storage method embodiment of aforementioned AKU, the disclosure additionally provide the storage device of AKU and its The embodiment of the terminal applied.
As shown in figure 5, Fig. 5 is a kind of storage device frame of AKU of the disclosure according to an exemplary embodiment Figure, the device is can apply in terminal, and the method for performing Figure 1A illustrated embodiments, and the device can include:First Determining module 510, the second determining module 520 and the first memory module 530.
First determining module 510, is configured to determine that the bag size of the AKU of newest download;
Second determining module 520, is configured to determine that the remaining space size of not encrypted partition;
First memory module 530, the bag size for being configured to determine in the first determining module 510 are less than the second determining module During the remaining space size of 520 determinations, AKU is stored in into not encrypted partition.
In above-described embodiment, terminal can reduce OTA update times significantly, when restarting reply pattern user without waiting for, Normal upgrading flow process can be entered, optimizes Consumer's Experience.
As shown in fig. 6, Fig. 6 is the storage device frame of another kind of AKU of the disclosure according to an exemplary embodiment Figure, on the basis of aforementioned embodiment illustrated in fig. 5, the device can also include the embodiment:Sending module 540 and receiver module 550。
Sending module 540, is configured to send AKU renewal detection request to server;
Receiver module 550, is configured to the newest AKU of the reception server return.
As shown in fig. 7, Fig. 7 is the storage device frame of another kind of AKU of the disclosure according to an exemplary embodiment Figure, on the basis of aforementioned embodiment illustrated in fig. 6, the first determining module 510 can include the embodiment:Analyzing sub-module 511 With determination sub-module 512.
Analyzing sub-module 511, is configured to parse the package informatin of AKU;
Determination sub-module 512, is configured to the bag that the package informatin for obtaining obtains AKU is parsed based on analyzing sub-module 511 Size.
As shown in figure 8, Fig. 8 is the storage device frame of another kind of AKU of the disclosure according to an exemplary embodiment Figure, on the basis of aforementioned embodiment illustrated in fig. 5, the second determining module 520 includes the embodiment:Reading submodule 521, first Calculating sub module 522 and the second calculating sub module 523.
Reading submodule 521, is configured to read the luv space size of not encrypted partition;
First calculating sub module 522, is configured to calculate the use space size of not encrypted partition;
Second calculating sub module 523, is configured to luv space size and the first meter read based on reading submodule 521 The use space size that operator module 522 is calculated calculates remaining space size.
As shown in figure 9, Fig. 9 is the storage device frame of another kind of AKU of the disclosure according to an exemplary embodiment Figure, on the basis of aforementioned embodiment illustrated in fig. 5, the device can also include the embodiment:First read module 560 and first Upgraded module 570.
First read module 560, is configured to when reforestation practices are restarted, and never AKU is read in encrypted partition;
First upgraded module 570, the AKU for being configured to be read based on the first read module 560 are upgraded.
As shown in Figure 10, Figure 10 is the storage device of another kind of AKU of the disclosure according to an exemplary embodiment Block diagram, on the basis of aforementioned embodiment illustrated in fig. 5, the device can also include the embodiment:Second memory module 580 and Three memory modules 590.
Second memory module 580, is configured to, when bag size is not less than remaining space size, AKU is stored in and is added Close subregion;
3rd memory module 590, is configured to the positional information by AKU in encrypted partition and is stored in not encrypted partition.
As shown in figure 11, Figure 11 is the storage device of another kind of AKU of the disclosure according to an exemplary embodiment Block diagram, on the basis of aforementioned embodiment illustrated in fig. 5, the device can also include the embodiment:Second read module 5100, solution Close module 5110 and the second upgraded module 5120.
Second read module 5100, is configured to when reforestation practices are restarted, never encrypted partition reading position information;
Deciphering module 5110, is configured to read from encrypted partition based on the positional information that the second read module 5100 reads And decrypt AKU;
Second upgraded module 5120, the AKU after being configured to be decrypted based on deciphering module 5110 are upgraded.
The storage device embodiment of the AKU shown in above-mentioned Fig. 5 to Figure 11 can be using in the terminal.
In said apparatus, the function of unit and effect realizes that process specifically refers to correspondence step in said method Process is realized, be will not be described here.
For device embodiment, as which corresponds essentially to embodiment of the method, so related part is referring to method reality Apply the part explanation of example.Device embodiment described above is only schematic, wherein described as separating component The unit of explanation can be or may not be physically separate, as the part that unit shows can be or can also It is not physical location, you can local to be located at one, or can also be distributed on multiple NEs.Can be according to reality Need to select some or all of module therein to realize the purpose of disclosure scheme.Those of ordinary skill in the art are not paying In the case of going out creative work, you can to understand and implement.
Accordingly, the disclosure also provides a kind of terminal, and the terminal includes processor;Can perform for storing processor The memory of instruction;Wherein, the processor is configured to:
Determine the bag size of the AKU of newest download;
It is determined that the not remaining space size of encrypted partition;
When the bag size is less than the remaining space size, the AKU is stored in into the not encrypted partition.
As shown in figure 12, Figure 12 is that a kind of storage for AKU of the disclosure according to an exemplary embodiment is filled Put 1200 structural representation.For example, device 1200 can be the mobile phone with routing function, and computer, numeral are wide Broadcast terminal, messaging devices, game console, tablet device, Medical Devices, body-building equipment, personal digital assistant etc..
With reference to Figure 12, device 1200 can include following one or more assemblies:Process assembly 1202, memory 1204, Power supply module 1206, multimedia groupware 1208, audio-frequency assembly 1210, the interface 1212 of input/output (I/O), sensor cluster 1214, and communication component 1216.
The integrated operation of 1202 usual control device 1200 of process assembly, such as with display, call, data communication, The associated operation of camera operation and record operation.Process assembly 1202 can include one or more processors 1220 to perform Instruction, to complete all or part of step of above-mentioned method.Additionally, process assembly 1202 can include one or more moulds Block, the interaction being easy between process assembly 1202 and other assemblies.For example, process assembly 1202 can include multi-media module, To facilitate the interaction between multimedia groupware 1208 and process assembly 1202.
Memory 1204 is configured to store various types of data to support the operation in device 1200.These data Example includes the instruction of any application program or method for operating on device 1200, contact data, telephone book data, Message, picture, video etc..Memory 1204 can by any kind of volatibility or non-volatile memory device or they Combination realizes, such as static RAM (SRAM), Electrically Erasable Read Only Memory (EEPROM), it is erasable can Program read-only memory (EPROM), programmable read only memory (PROM), read-only storage (ROM), magnetic memory, flash memory Reservoir, disk or CD.
Power supply module 1206 provides electric power for the various assemblies of device 1200.Power supply module 1206 can include power management System, one or more power supplys, and other generate, manage and distribute the component that electric power is associated with for device 1200.
Multimedia groupware 1208 is included in the screen of one output interface of offer between described device 1200 and user. In some embodiments, screen can include liquid crystal display (LCD) and touch panel (TP).If screen includes touch panel, Screen may be implemented as touch-screen, to receive the input signal from user.Touch panel includes that one or more touch and passes Sensor is with the gesture on sensing touch, slip and touch panel.The touch sensor can not only sensing touch or slip be dynamic The border of work, but also detect the duration related to the touch or slide and pressure.In certain embodiments, it is many Media component 1208 includes a front-facing camera and/or post-positioned pick-up head.When device 1200 is in operator scheme, mould is such as shot When formula or video mode, front-facing camera and/or post-positioned pick-up head can receive outside multi-medium data.Each preposition shooting Head and post-positioned pick-up head can be a fixed optical lens system or have focusing and optical zoom capabilities.
Audio-frequency assembly 1210 is configured to output and/or input audio signal.For example, audio-frequency assembly 1210 includes a wheat Gram wind (MIC), when device 1200 is in operator scheme, such as call model, logging mode and speech recognition mode, microphone quilt It is configured to receive external audio signal.The audio signal for being received can be further stored in memory 1204 or via communication Component 1216 sends.In certain embodiments, audio-frequency assembly 1210 also includes a loudspeaker, for exports audio signal.
I/O interfaces 1212 are that interface, above-mentioned peripheral interface module are provided between process assembly 1202 and peripheral interface module Can be keyboard, click wheel, button etc..These buttons may include but be not limited to:Home button, volume button, start button and Locking press button.
Sensor cluster 1214 includes one or more sensors, and the state for various aspects are provided for device 1200 is commented Estimate.For example, sensor cluster 1214 can detect the opening/closed mode of device 1200, such as relative positioning of component, institute Display and keypad that component is device 1200 are stated, sensor cluster 1214 can be with detection means 1200 or device 1,200 1 The position of individual component changes, and user is presence or absence of with what device 1200 was contacted, 1200 orientation of device or acceleration/deceleration and dress Put 1200 temperature change.Sensor cluster 1214 can include proximity transducer, be configured to do not having any physics The presence of object nearby is detected during contact.Sensor cluster 1214 can also include optical sensor, such as CMOS or ccd image sensing Device, for used in imaging applications.In certain embodiments, the sensor cluster 1214 can also include acceleration sensing Device, gyro sensor, Magnetic Sensor, pressure sensor, microwave remote sensor or temperature sensor.
Communication component 1216 is configured to facilitate the communication of wired or wireless way between device 1200 and other equipment.Dress Put 1200 and can access wireless network based on communication standard, such as WiFi, 2G or 3G, or combinations thereof.It is exemplary at one In embodiment, communication component 1216 receives the broadcast singal or broadcast correlation from external broadcasting management system via broadcast channel Information.In one exemplary embodiment, the communication component 1216 also includes near-field communication (NFC) module, to promote short distance Communication.For example, RF identification (RFID) technology, Infrared Data Association (IrDA) technology, ultra broadband can be based in NFC module (UWB) technology, bluetooth (BT) technology and other technologies are realizing.
In the exemplary embodiment, device 1200 can be by one or more application specific integrated circuits (ASIC), numeral Signal processor (DSP), digital signal processing appts (DSPD), PLD (PLD), field programmable gate array (FPGA), controller, microcontroller, microprocessor or other electronic components realizations, for performing said method.
In the exemplary embodiment, a kind of non-transitorycomputer readable storage medium including instruction, example are additionally provided Such as include the memory 1204 of instruction, above-mentioned instruction can be performed to complete said method by the processor 1220 of device 1200.Example Such as, the non-transitorycomputer readable storage medium can be ROM, random access memory (RAM), CD-ROM, tape, soft Disk and optical data storage devices etc..
Wherein, processor 1220 is configured to:
Determine the bag size of the AKU of newest download;
It is determined that the not remaining space size of encrypted partition;
When the bag size is less than the remaining space size, the AKU is stored in into the not encrypted partition.
Those skilled in the art will readily occur to its of the disclosure after considering specification and putting into practice invention disclosed herein Its embodiment.The disclosure is intended to any modification, purposes or the adaptations of the disclosure, these modifications, purposes or Person's adaptations follow the general principle of the disclosure and including the undocumented common knowledge in the art of the disclosure Or conventional techniques.Description and embodiments are considered only as exemplary, and the true scope of the disclosure and spirit are by following Claim is pointed out.
The preferred embodiment of the disclosure is the foregoing is only, not to limit the disclosure, all essences in the disclosure Within god and principle, any modification, equivalent substitution and improvements done etc. are should be included within the scope of disclosure protection.

Claims (15)

1. a kind of storage method of AKU, it is characterised in that include:
Determine the bag size of the AKU of newest download;
It is determined that the not remaining space size of encrypted partition;
When the bag size is less than the remaining space size, the AKU is stored in into the not encrypted partition.
2. method according to claim 1, it is characterised in that the bag size of the AKU of the newest download of the determination it Before, methods described also includes:
AKU is sent to server and updates detection request;
Receive the newest AKU that the server is returned.
3. method according to claim 2, it is characterised in that the bag size of the AKU of the newest download of the determination, bag Include:
Parse the package informatin of the AKU;
The bag size of the AKU is obtained based on the package informatin.
4. method according to claim 1, it is characterised in that the remaining space size of the determination not encrypted partition, bag Include:
The luv space size of not encrypted partition described in reading;
The use space size of not encrypted partition described in calculating;
The remaining space size is calculated based on the luv space size and the use space size.
5. method according to claim 1, it is characterised in that methods described also includes:
When reforestation practices are restarted, the AKU is read from the not encrypted partition;
Upgraded based on the AKU.
6. method according to claim 1, it is characterised in that described that the AKU is stored in into the not encrypted partition Afterwards, methods described also includes:
When the bag size is not less than the remaining space size, the AKU is stored in into encrypted partition;
Positional information of the AKU in the encrypted partition is stored in into the not encrypted partition.
7. method according to claim 6, it is characterised in that it is described by the AKU the encrypted partition position After the unencryption subregion, methods described also includes information Store:
When reforestation practices are restarted, the positional information is read from the not encrypted partition;
The AKU is read and decrypts based on the positional information from the encrypted partition;
Upgraded based on the AKU after the decryption.
8. a kind of storage device of AKU, it is characterised in that include:
First determining module, is configured to determine that the bag size of the AKU of newest download;
Second determining module, is configured to determine that the remaining space size of not encrypted partition;
First memory module, is configured to, when the bag size is less than the remaining space size, the AKU be stored In the not encrypted partition.
9. device according to claim 8, it is characterised in that described device also includes:
Sending module, is configured to send AKU renewal detection request to server;
Receiver module, is configured to receive the newest AKU that the server is returned.
10. device according to claim 9, it is characterised in that first determining module includes:
Analyzing sub-module, is configured to parse the package informatin of the AKU;
Determination sub-module, is configured to the bag size of the AKU is obtained based on the package informatin.
11. devices according to claim 8, it is characterised in that second determining module includes:
Reading submodule, is configured to the luv space size of not encrypted partition described in reading;
First calculating sub module, is configured to the use space size of not encrypted partition described in calculating;
Second calculating sub module, is configured to calculate described remaining based on the luv space size and the use space size Complementary space size.
12. devices according to claim 8, it is characterised in that described device also includes:
First read module, is configured to, when reforestation practices are restarted, read the AKU from the not encrypted partition;
Upgraded module, is configured to be upgraded based on the AKU.
13. devices according to claim 8, it is characterised in that described device also includes:
Second memory module, is configured to, when the bag size is not less than the remaining space size, the AKU be deposited Storage is in encrypted partition;
3rd memory module, is configured to the positional information by the AKU in the encrypted partition and is stored in described do not encrypt Subregion.
14. device according to claim 13, it is characterised in that described device also includes:
Second read module, is configured to, when reforestation practices are restarted, read the positional information from the not encrypted partition;
Deciphering module, is configured to read from the encrypted partition based on the positional information and decrypt the AKU;
Upgraded module, is configured to be upgraded based on the AKU after the decryption.
15. a kind of terminals, it is characterised in that include:
Processor;
For storing the memory of processor executable;
Wherein, the processor is configured to:
Determine the bag size of the AKU of newest download;
It is determined that the not remaining space size of encrypted partition;
When the bag size is less than the remaining space size, the AKU is stored in into the not encrypted partition.
CN201611092764.3A 2016-11-30 2016-11-30 Storage method, device and the terminal of upgrade package Active CN106528249B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611092764.3A CN106528249B (en) 2016-11-30 2016-11-30 Storage method, device and the terminal of upgrade package

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611092764.3A CN106528249B (en) 2016-11-30 2016-11-30 Storage method, device and the terminal of upgrade package

Publications (2)

Publication Number Publication Date
CN106528249A true CN106528249A (en) 2017-03-22
CN106528249B CN106528249B (en) 2019-10-25

Family

ID=58354478

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611092764.3A Active CN106528249B (en) 2016-11-30 2016-11-30 Storage method, device and the terminal of upgrade package

Country Status (1)

Country Link
CN (1) CN106528249B (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107273156A (en) * 2017-06-06 2017-10-20 珠海全志科技股份有限公司 A kind of OTA upgrade methods and device
CN109343885A (en) * 2018-11-01 2019-02-15 百度在线网络技术(北京)有限公司 Method for upgrading system and multi-system equipment
CN110134416A (en) * 2019-04-12 2019-08-16 平安普惠企业管理有限公司 Oftware updating method, device and computer readable storage medium
CN110221856A (en) * 2019-06-25 2019-09-10 努比亚技术有限公司 A kind of wearable device upgrade method, wearable device and storage medium
CN111104137A (en) * 2019-12-06 2020-05-05 山东信通电子股份有限公司 OTA equipment upgrading method and device
CN113495729A (en) * 2020-03-20 2021-10-12 株洲中车时代电气股份有限公司 Software upgrading method and device
US11989435B2 (en) 2021-05-17 2024-05-21 Elektrobit Automotive Gmbh Re-partitioning of a flash memory device

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101924607A (en) * 2010-08-27 2010-12-22 华为终端有限公司 Firmware processing method based on firmware air transmission technology, device and system thereof
CN103383660A (en) * 2013-04-01 2013-11-06 华为终端有限公司 Method and device for realizing functions of cache partition of Android system as well as terminal equipment
CN105912369A (en) * 2016-04-26 2016-08-31 青岛海信移动通信技术股份有限公司 System upgrading method and device
CN105930184A (en) * 2016-04-19 2016-09-07 青岛海信移动通信技术股份有限公司 System upgrade method and device

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101924607A (en) * 2010-08-27 2010-12-22 华为终端有限公司 Firmware processing method based on firmware air transmission technology, device and system thereof
CN103383660A (en) * 2013-04-01 2013-11-06 华为终端有限公司 Method and device for realizing functions of cache partition of Android system as well as terminal equipment
CN105930184A (en) * 2016-04-19 2016-09-07 青岛海信移动通信技术股份有限公司 System upgrade method and device
CN105912369A (en) * 2016-04-26 2016-08-31 青岛海信移动通信技术股份有限公司 System upgrading method and device

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107273156A (en) * 2017-06-06 2017-10-20 珠海全志科技股份有限公司 A kind of OTA upgrade methods and device
CN109343885A (en) * 2018-11-01 2019-02-15 百度在线网络技术(北京)有限公司 Method for upgrading system and multi-system equipment
CN110134416A (en) * 2019-04-12 2019-08-16 平安普惠企业管理有限公司 Oftware updating method, device and computer readable storage medium
CN110221856A (en) * 2019-06-25 2019-09-10 努比亚技术有限公司 A kind of wearable device upgrade method, wearable device and storage medium
CN110221856B (en) * 2019-06-25 2024-03-19 努比亚技术有限公司 Wearable device upgrading method, wearable device and storage medium
CN111104137A (en) * 2019-12-06 2020-05-05 山东信通电子股份有限公司 OTA equipment upgrading method and device
CN111104137B (en) * 2019-12-06 2023-10-20 山东信通电子股份有限公司 OTA equipment upgrading method and device
CN113495729A (en) * 2020-03-20 2021-10-12 株洲中车时代电气股份有限公司 Software upgrading method and device
US11989435B2 (en) 2021-05-17 2024-05-21 Elektrobit Automotive Gmbh Re-partitioning of a flash memory device

Also Published As

Publication number Publication date
CN106528249B (en) 2019-10-25

Similar Documents

Publication Publication Date Title
CN106528249B (en) Storage method, device and the terminal of upgrade package
EP3151507B1 (en) Methods and apparatuses for controlling device
CN104461666B (en) The firmware upgrade method and device of equipment primary processor
CN104484200A (en) Method and device for updating firmware
CN104811776B (en) Multi-medium play method and device
CN105204542B (en) The vibration control method and device of motor
KR101642019B1 (en) Method, apparatus, program, and recording medium of verifying terminal
CN107357613A (en) Using update method, device and computer-readable recording medium
CN105068848A (en) System upgrading method and apparatus
CN103916468A (en) System upgrading method, terminal, server and upgrading system
CN105631254A (en) Unlocking method and unlocking device
CN106775903A (en) Java.policy update method and device
CN105282162A (en) Processing method and device for account management business
CN104837133A (en) SIM card authentication method and device
CN106658467A (en) Virtual SIM card management method and device
CN106611112A (en) Application program safe processing method, device and equipment
CN104866349A (en) Application updating method and device
CN107239771A (en) Fingerprint calibration method and device
CN106528113A (en) File compiling method and apparatus
CN107733674A (en) Component upgrade method and terminal
CN104951337A (en) File incremental updating method and device
CN105099758A (en) Methods and devices for transmitting update data package
CN112733092B (en) Information processing method and device
CN104468523B (en) UI themes acquisition methods, terminal and router
CN104298527A (en) Processing method and derive of application updating

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant