CN109240721A - A kind of method of MCU online upgrading - Google Patents
A kind of method of MCU online upgrading Download PDFInfo
- Publication number
- CN109240721A CN109240721A CN201810975480.1A CN201810975480A CN109240721A CN 109240721 A CN109240721 A CN 109240721A CN 201810975480 A CN201810975480 A CN 201810975480A CN 109240721 A CN109240721 A CN 109240721A
- Authority
- CN
- China
- Prior art keywords
- data
- new firmware
- mcu
- downloading
- online upgrading
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/60—Software deployment
- G06F8/65—Updates
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Stored Programmes (AREA)
Abstract
This application involves technical field of electronic equipment more particularly to a kind of methods of MCU online upgrading, comprising: judges whether the new firmware data process of last downloaded is interrupted;If so, the breakpoint information and received data information when last downloaded process is interrupted are sent to data platform;Receive the continuation downloading data that data platform is sent.In the method for MCU online upgrading as provided by the embodiment of the present application, by way of breakpoint transmission, especially by write-in data length value and the new firmware data operation result of write-in is verified, in case after abnormal conditions generation, continue to download subsequent new firmware data from interruption place when downloading again, and do not have to re-download existing new firmware data, therefore while ensure that MCU can normally upgrade after re-powering or resetting, it avoids and re-downloads caused time cost again, improve the efficiency of MCU online upgrading.
Description
Technical field
This application involves technical field of electronic equipment more particularly to a kind of methods of MCU online upgrading.
Background technique
During MCU online upgrading, it is possible to which there is a situation where accident power-offs, can be protected using power-off protection strategy
Once power blackout situation occurs during card online upgrading, MCU can normally upgrade after re-powering or resetting again.
Power-off protection strategy in currently available technology is usually after MCU is re-powered or resetted again, under needing again
Data are carried, or the data that storage region has been downloaded are copied to program Operational Zone again and are upgraded.But such case
Under, on the one hand, once needing to re-download data after accident power-off, then MCU update time is increased, and then just reduce MCU
The efficiency of online upgrading;On the other hand, once accident power-off causes the data for being downloaded to storage region imperfect, if by imperfect
Data copy to program Operational Zone upgraded, still will cause MCU upgrading failure.
Therefore, while how guaranteeing that MCU can normally upgrade after re-powering or resetting, MCU online upgrading is reduced
Time improves the efficiency of MCU online upgrading, is those skilled in the art's technical problem urgently to be solved at present.
Summary of the invention
This application provides a kind of methods of MCU online upgrading, to guarantee that MCU can normally rise after re-powering or resetting
While grade, the time of MCU online upgrading is reduced, improves the efficiency of MCU online upgrading.
In order to solve the above technical problems, the application provides the following technical solutions:
A kind of method of MCU online upgrading, which comprises the following steps: judge the new firmware data of last downloaded
Whether process is interrupted;If so, the breakpoint information and received data information when last downloaded process is interrupted are sent to number
According to platform;Receive the continuation downloading data that data platform is sent.
The method of MCU online upgrading as described above, wherein preferably, the breakpoint information is to have been written into number of devices
According to the data length value of memory block;The data information is after having been written into the data progress operation of new firmware data buffer area
Operation values;It is described to continue downloading data to be to take data length value as the data for downloading offset.
The method of MCU online upgrading as described above, wherein preferably, new firmware data buffer area will be had been written into
It is specially to carry out abstract operation that data, which carry out operation,.
The method of MCU online upgrading as described above, wherein preferably, data platform receives operation values and data
It after length value, also follows the steps below: the new firmware data within the scope of the data length value for being stored in data platform is transported
Calculation obtains check value;Twin check value and operation values;If consistent, sending to MCU with data length value is downloading offset
Data.
The method of MCU online upgrading as described above, wherein preferably, before data platform calculates check value, also
It include: judgement data length value, if data length value is 0;Then re-download new firmware data;If data length value is non-zero;Then
Calculate check value.
The method of MCU online upgrading as described above, wherein preferably, judge the new firmware data process of last downloaded
Whether it is interrupted and specifically includes: judges to update Status Flag in update;And/or judge that data platform issues in upgrade request
Data summarization value is different with the new firmware data digest value of device data memory block is had been written into;The then new firmware data mistake of last downloaded
Journey is interrupted.
The method of MCU online upgrading as described above, wherein preferably, before new firmware data downloading starts, will update
Status Flag, which is set as updating, to be started;Status Flag will be updated after passing through the certification of data platform identity to be set as in update;Newly
After the completion of firmware data downloading, Status Flag will be updated and be set as updating completion.
The method of MCU online upgrading as described above, wherein preferably, have been written into the new solid of device data memory block
Number of packages is according to the digest value that digest value is that the new firmware data of last downloaded is stored in device data memory block after the completion.
The method of MCU online upgrading as described above, wherein preferably, new firmware number is downloaded in verifying after the completion of downloading
According to integrality.
The method of MCU online upgrading as described above, wherein preferably, by calculating the new firmware data downloaded to
The upgrade request that is issued with data platform of digest value in digest value be compared, if than more consistent, the new firmware downloaded
Data are complete.
Relatively above-mentioned background technique, the method for MCU online upgrading provided by the present invention, comprising the following steps: in judgement
Whether the secondary new firmware data process of downloading is interrupted;If so, breakpoint information when last downloaded process is interrupted and received
Data information is sent to data platform;Receive the continuation downloading data that data platform is sent.Since the embodiment of the present application is provided
MCU online upgrading method in, by way of breakpoint transmission, especially by write-in data length value and to write-in
New firmware data operation result is verified, in case after abnormal conditions generation, after continuing downloading from interruption place when downloading again
The new firmware data in face, and do not have to re-download existing new firmware data, MCU makees from the end address for storing new firmware data
Data platform is continued to write to for initial address and issues the data packet got off, and is finished until all downloading, therefore ensure that on again
While MCU can normally upgrade after electricity or reset, avoids and re-download caused time cost again, improve MCU and exist
The efficiency of line upgrading.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below
There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this
The some embodiments recorded in invention can also be obtained according to these attached drawings other for those of ordinary skill in the art
Attached drawing.
Fig. 1 illustrates the schematic diagram downloaded according to the new firmware of the embodiment of the present application;
Fig. 2 illustrates the schematic diagram of the new firmware breakpoint transmission according to the embodiment of the present application;
Fig. 3 illustrates the schematic diagram of the new firmware upgrade according to the embodiment of the present application.
Specific embodiment
The embodiment of the present invention is described below in detail, examples of the embodiments are shown in the accompanying drawings, wherein from beginning to end
Same or similar label indicates same or similar element or element with the same or similar functions.Below with reference to attached
The embodiment of figure description is exemplary, and for explaining only the invention, and is not construed as limiting the claims.
MCU online upgrading is that online upgrading is carried out to the firmware of MCU, MCU online upgrading be by data platform (also
It is online upgrading platform) it initiates.The APP program (referred to as firmware) for running on the Operational Zone APP of MCU is sent out according to data platform
The upgrade request risen, downloads new firmware data.APP program delays the new firmware data that the new firmware data of downloading is cached in MCU
Deposit area, (area is not limited to the FLASH of MCU, is also possible to connect with MCU for data cached for the new firmware data buffer area of MCU
Other memories).After MCU is powered on, operation BOOT program, the program run on the device data memory block of MCU first, have
Body can be the boot section BOOT, and BOOT program is for guiding, verifying, updating APP program.
Referring to Fig. 1, Fig. 1 illustrates the schematic diagram downloaded according to the new firmware of the embodiment of the present application.
When firmware needs to update, data platform initiates online upgrading request 110 first.The APP program of MCU receives online
After upgrade request, judge whether to need to update firmware 120.If you do not need to updating firmware, then process is exited;If necessary to update
Firmware then enters next step online upgrading process, and this avoid repeat to update.
As an example, data platform initiates online upgrading request, wherein comprising being currently stored in number in online upgrading request
According to the digest value of the new firmware data of platform, being also possible to other can be identified for that the new firmware data for being currently stored in data platform
The value of version, as long as the technical effect for identifying new firmware data version can be played.APP program receives online upgrading request
Afterwards, the new firmware data digest value that data platform issues, the digest value of judgement and currently running APP program in MCU are parsed
Whether (digest value of currently running APP program can be the digest value stored to MCU when last time firmware upgrade) be equal.
Show that currently running APP program has been new firmware if equal, does not need to re-download upgrading, exit process;If
It is unequal, show that currently running APP program is not new firmware, need to re-download upgrading, then enters next step online upgrading
Process.
Or data platform reads the data field MCU relevant release note or firmware digest value, it is then current with data platform
After firmware data is compared, decide whether the firmware upgrade for carrying out MCU by data platform.If necessary to upgrade, firmware is initiated
Upgrade after initiation command receives beginning upgrade command to MCU, MCU and enters firmware on line upgrading process.
Before carrying out new firmware data downloading, initialization downloading process 130 can also be carried out, by APP program to keep away
Exempt from the new firmware data of remaining data influence downloading.As an example, initialization downloading process can be initialization package
Serial number is set as 0, removes the relevant authentication information in MCU.
Status Flag can also will be updated in initialization downloading process and is set as updating and is started, wherein update Status Flag
It is to identify whether the label in new firmware data download state.Updating status indicator is to show that MCU is in downloading in updating
Process is downloading new firmware data.Updating Status Flag is to update to complete to show that MCU has been updated completion.
Before being downloaded new firmware data, authentication 140 can also be carried out to data platform, to guarantee to receive number
According to safety.If certification does not pass through, process is exited;Certification passes through, then enters next step online upgrading process.
As an example, carrying out authentication to data platform can be following mode.
Firstly, data platform generates the data packet of authentication.The data packet for generating authentication specifically can be data
Platform calculates the digest value of new firmware, is denoted as H1;Data platform generates random key, is denoted as RK;Data platform obtains new
The parameters such as firmware total length, version number, timestamp are denoted as P1;By H1, RK and P1 progress operation obtain A1 (such as: A1=H1
+RK+P1);Abstract operation is carried out to A1, is denoted as H2;Using key in external authorization key physical unit, (symmetric key is non-
Asymmetric private key) H2 is encrypted, it is denoted as ED1=ENC (A1+H2, key);Data platform is using random key RK to new firmware number
According to being encrypted, it is denoted as ED2=ENC (new firmware data, RK).
Then, the data packet subpackage of the authentication of generation or whole packet are sent to the APP program of MCU.
Then, APP program receives the data packet of the authentication of data platform transmission, to the data packet of authentication into
Row certification.For example, using preset key key, (symmetric key is asymmetric after receiving the ED1 in the data packet of authentication
Public key) data are decrypted to obtain clear data AD1 (AD1=A1+H2)=DEC (ED1, key).Verify clear data
Whether the digest value of AD1 partial data (i.e. A1) is equal to H2.The authentification failure if not equal to H2, exits process;If be equal to
It is to pass through that H2, which then authenticates successfully juxtaposition identity identifier,.Parse clear data AD1 in related data (such as: H1, H2, so as to
Judge whether next time to need online upgrading) and saved, enter finally into the downloading process of new firmware data.
Process is downloaded into new firmware data, data platform sends the data of new firmware to MCU, and APP program receives data
The new firmware data 150 that platform issues.
During APP program receives the new firmware data that data platform issues, it can also preset and wait new firmware number
According to the time of downloading, it should new firmware data download command is waited within the preset waiting time, if the every new firmware waited
The time of data download command exceeds the preset waiting time, then exits process.In the downloading process for waiting new firmware data
In, by way of the above-mentioned default waiting time, can avoid waiting for download time too long causes unsafe influence to downloading.
As an example, it presets the time waited and continues the lower current-carrying of new firmware data if receiving new firmware data in 2s for 2s
Journey exits the downloading process of new firmware data while removing authentication mark if being not received by new firmware data in 2s
Know and currently update Status Flag.
In addition, checking command can also be arranged during APP program receives the new firmware data that data platform issues
Program, to avoid non-firmware data download instruction to new firmware data downloading interfere.Such as: if monitored other
When request instruction, then downloading process is exited, while removing identity identifier and currently updating Status Flag.
On the basis of the above, the new firmware data that APP program receives can be to be transmitted in the form of data packet.Its
In, new firmware data packet can be following form: packet serial number+data offset+total length+data (ciphertext)+data MAC value,
It is also possible to packet serial number+data offset+total length+data (ciphertext) etc., the data packet form of new firmware is also not necessarily limited to
Above-mentioned form, as long as the embodiment of the present application technical effect to be achieved can be reached.
APP program receives new firmware data, can also verify to received new firmware data.Under new firmware data
It, can also be using the form either ciphertext+MAC form transmission of ciphertext, to guarantee that new firmware data will not be let out during load
Reveal or distorts.As an example, it can be APP program before starting to download the first bag data, encrypt meeting using preset key
Words key plain SK (when secondary firmware upgrade is effective) obtain session key ciphertext E_SK, then send session key ciphertext E_SK
To data platform;After data platform receives session key ciphertext E_SK, external authorization KEY class physical unit decrypted session is used
Key ciphertext E_SK obtains session key plaintext SK;Then data platform is in data of every transmission, using the session key
Plaintext SK carries out MAC operation MD1 ... n=MAC (D1 ... n, SK) to current data, after operation result is then appended to data packet
Face TD1 ... n=D1 ... n+MD1 ... n;After APP program receives data, the data received are carried out using session key plaintext SK
Whether MAC operation, the MAC value that the MAC value and APP program for then comparing data platform calculating calculate are identical.If the same after
Continuous downloading;If it is not the same, then emptying related cache data (the new firmware data namely downloaded) backed off after random downloading process.
After APP program verifies successfully received new firmware data, new firmware data is sequentially written in new firmware data
Buffer area, and new firmware data total length, next time data offset is written in device data memory block and has been written into number
According to parameters such as length.New firmware data success is received at this, is also referred to one divided data of reception and is bundled into function.It is new solid receiving
Number of packages according to while, be also possible to after receiving new firmware data, can also judge whether new firmware data downloads completion 160.
Judge whether new firmware data is downloaded completion and can be compared the data offset in data packet with total length.It is more different
It causes, then downloading does not complete, and continues to download;If comparing unanimously, completion is downloaded, then enters next step process.
After the download is complete, the integrality 170 for downloading new firmware data can also be verified, is avoided passing through incomplete new solid
Number of packages is avoided copying incomplete new firmware data to APP Operational Zone in escalation process and led according to upgrading to APP program
It causes MCU that cannot normally start, prevents APP program staging error.As an example, can be the digest value by verifying new firmware with
Guarantee the integrality of new firmware data entirety.Such as: the new firmware data of the new firmware data buffer area of caching to MCU is carried out
Integrity verification specifically can be and be decrypted to obtain clear data to the new firmware data of caching, then holds clear data
The digest value being calculated is compared by row abstract operation with the digest value that data platform before downloading issues.If no
Equal, then authentication failed removes relevant authentication information and data cached and exit upgrading process;If equal, verifying at
Function updates digest value to the device data memory block of MCU, that is, the digest value that verification process is calculated and is stored in equipment
The parameter region of data storage area is to be stored in the digest value of the parameter region of device data memory block before replacing.
On the basis of the above, more new state can also be set to update simultaneously to complete, empties the relevant information 180 of certification,
It is completed with showing that downloading caches new firmware data process.It is to update to complete, or pass through verifying downloading by verifying more new state
Data packet in data offset it is equal with total length, with show downloading new firmware data it is complete.It can certainly pass through
Other modes verify the integrality of new firmware data, as long as can reach the embodiment of the present application technical effect to be achieved i.e.
It can.
If caused under new firmware data due to power down, network etc. during the downloading of above-mentioned new firmware data
It carries and interrupts, APP program will hold consultation downloading in next firmware upgrade with data platform.Extremely it exiting, interrupting, updating
At situations such as exit downloading process when, APP program can all empty authentication information.
Referring to Fig. 2, Fig. 2 illustrates the schematic diagram of the new firmware breakpoint transmission according to the embodiment of the present application.
After MCU is powered on again, data platform requests online upgrading, online upgrading request and above-mentioned new firmware downloading process
In online upgrading request it is identical.Online upgrading request form and content also with online upgrading in above-mentioned new firmware downloading process
The form of request is consistent with content, and details are not described herein again.
On the basis of the above, authentication can also be carried out to data platform, the form of specific authentication and above-mentioned new
It is the same to the authentication of data platform in firmware downloading process, it is not just repeating herein.For carrying out identity to data platform
As long as the opportunity of certification is before carrying out new firmware data to continue downloading.
After APP program receives the online upgrading request of data platform transmission, judge whether last downloaded process is interrupted
210.As an example, judge last downloaded process whether be interrupted specifically can be APP program according to update Status Flag and
Digest value determines that last downloaded process is aborted.Such as: it can be to judge last time more in update according to Status Flag is updated
It has not updated newly, last downloaded is aborted in other words;In can also updating according to Status Flag is updated and data are flat
The digest value that platform issues is not waited with the digest value in the device data memory block for being stored in MCU judges that last time update has not updated,
Last downloaded is aborted in other words.
When judging that last downloaded process is interrupted, then breakpoint information when last downloaded process is interrupted by APP program and
The data information that data are received before interrupting is sent to data platform 220.Specifically can be APP program will have been written into new firmware data
The data of buffer area carry out operation (specifically can be abstract operation), and by operation values and have been written into device data memory block
Data length value is sent to data platform.
Data platform obtains the corresponding data information for being stored in data platform according to the breakpoint information received, then will count
It is compared according to the received data information of corresponding data information and date platform of platform, judges the beginning for downloading new firmware data
Point 230.If inconsistent, new firmware data is re-downloaded;If consistent, continue to download new firmware number from corresponding breakpoint
According to.As an example, it if the data length value that data platform receives write device data storage area is 0, re-downloads new solid
Number of packages evidence;If data platform receive write device data storage area data length value be it is non-zero, to being stored in data platform
Data length value within the scope of new firmware data carry out operation and obtain check value and (can be abstract operation, be also possible to other
The calculation of operation, the operation mode and operation values is identical), then by data platform calculate check value and receive
APP program calculate operation values be compared.Less consistent, then setting downloading offset is 0, that is, is re-downloaded;Than
More consistent, then setting downloading offset is the data length value for having been written into device data memory block.
Before continuing downloading, MCU and data platform can also carry out data encryption key negotiation 240 and (newly consolidate with above-mentioned
Key agreement is identical when part is downloaded).After having negotiated data encryption key, after the new firmware encrypting of downloading, continue to new solid
Number of packages according to being downloaded 250, to new firmware to continue downloading identical with above-mentioned new firmware downloading.Such as: data are also possible to count
It is transmitted according to the form of packet, APP program can also verify received new firmware data, it is also desirable to judge that new firmware data is
No downloading is completed, it is also desirable to be updated digest value to the device data memory block of MCU, just not repeated herein.
In the method for MCU online upgrading as provided by the embodiment of the present application, by way of breakpoint transmission, especially
By write-in data length value and the new firmware data operation result of write-in is verified, in case occurring in abnormal conditions
Afterwards, continue to download subsequent new firmware data from interruption place when downloading again, and do not have to re-download existing new firmware data,
MCU continues to write to data platform as initial address from the end address for storing new firmware data and issues the data packet got off, directly
Finished to all downloadings, thus ensure that re-power or reset after MCU while can normally upgrade, avoid again again
Time cost caused by downloading, improves the efficiency of MCU online upgrading.
After the completion of in the first above-mentioned situation and second situation to the downloading of new firmware data, then start to APP journey
Sequence carries out upgrading update.
Referring to Fig. 3, Fig. 3 illustrates the schematic diagram of the new firmware upgrade according to the embodiment of the present application.
After MCU is powered on, operation BOOT program 310, BOOT program read more new state 320 first.Updating Status Flag is
Original state does not execute firmware upgrade process then, the APP program 370 for the Operational Zone APP that brings into operation;Updating Status Flag is more
It is new to complete, then firmware upgrade process is executed, the new firmware data 330 of caching is read.Read new firmware data, total length.If
The new firmware data of downloading is the data cached of ciphertext form, then reads key verification data 340, specifically can be using key
The new firmware data of reading is decrypted to obtain the clear data of firmware, according to new firmware data length value, to new firmware number
According to abstract operation is carried out, obtained result is compared with the new firmware digest value that platform data is sent.If unequal,
Exit new firmware update process;If equal, new firmware data is copied to the program area APP and carries out APP program update 350.
If the new firmware data of downloading is the data cached of plaintext version, need according to the new new firmware data of firmware data length computation
The digest value sent after digest value with platform data is compared.If unequal, new firmware update process is exited;If phase
Deng, then by new firmware data be copied to the program area APP carry out APP program update 350.It is finished to the upgrading of APP program, empties update
State is original state, and empties the new firmware data of new firmware data buffer area caching.Finally jump to the operation of the program area APP
APP program.
It is obvious to a person skilled in the art that invention is not limited to the details of the above exemplary embodiments, Er Qie
In the case where without departing substantially from spirit or essential attributes of the invention, the present invention can be realized in other specific forms.Therefore, no matter
From the point of view of which point, the present embodiments are to be considered as illustrative and not restrictive, and the scope of the present invention is by appended power
Benefit requires rather than above description limits, it is intended that all by what is fallen within the meaning and scope of the equivalent elements of the claims
Variation is included within the present invention.Any reference signs in the claims should not be construed as limiting the involved claims.
In addition, it should be understood that although this specification is described in terms of embodiments, but not each embodiment is only wrapped
Containing an independent technical solution, this description of the specification is merely for the sake of clarity, and those skilled in the art should
It considers the specification as a whole, the technical solutions in the various embodiments may also be suitably combined, forms those skilled in the art
The other embodiments being understood that.
Claims (10)
1. a kind of method of MCU online upgrading, which comprises the following steps:
Judge whether the new firmware data process of last downloaded is interrupted;
If so, the breakpoint information and received data information when last downloaded process is interrupted are sent to data platform;
Receive the continuation downloading data that data platform is sent.
2. the method for MCU online upgrading according to claim 1, which is characterized in that the breakpoint information is to have been written into set
The data length value of standby data storage area;The data information is the data progress operation that will have been written into new firmware data buffer area
Operation values afterwards;It is described to continue downloading data to be to take data length value as the data for downloading offset.
3. the method for MCU online upgrading according to claim 2, which is characterized in that new firmware data caching will be had been written into
The operation that the data in area carry out is specially to carry out abstract operation.
4. the method for MCU online upgrading according to claim 2, which is characterized in that data platform receive operation values and
After data length value, also follow the steps below:
Operation is carried out to the new firmware data within the scope of the data length value for being stored in data platform and obtains check value;
Twin check value and operation values;
If consistent, sending to MCU with data length value is the data for downloading offset.
5. the method for MCU online upgrading according to claim 4, which is characterized in that data platform calculate check value it
Before, further includes:
Data length value is judged, if data length value is 0;
Then re-download new firmware data;
If data length value is non-zero;
Then calculate check value.
6. the method for MCU online upgrading according to claim 2, which is characterized in that judge the new firmware data of last downloaded
Whether process, which is interrupted, specifically includes:
Judge to update Status Flag in update;
And/or judge that data platform issues the data summarization value in upgrade request and has been written into the new firmware of device data memory block
Data summarization value is different;
Then the new firmware data process of last downloaded is interrupted.
7. the method for MCU online upgrading according to claim 6, which is characterized in that, will before new firmware data downloading starts
It updates Status Flag and is set as updating and start;Status Flag will be updated after passing through the certification of data platform identity to be set as updating
In;After the completion of new firmware data downloading, Status Flag will be updated and be set as updating completion.
8. the method for MCU online upgrading according to claim 6, which is characterized in that have been written into device data memory block
New firmware data digest value is the digest value that the new firmware data of last downloaded is stored in device data memory block after the completion.
9. the method for MCU online upgrading according to any one of claims 1 to 8, which is characterized in that verified after the completion of downloading
Download the integrality of new firmware data.
10. the method for MCU online upgrading according to claim 9, which is characterized in that by calculating the new firmware downloaded to
The digest value in upgrade request that the digest value of data is issued with data platform is compared, if that downloads is new than more consistent
Firmware data is complete.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810975480.1A CN109240721A (en) | 2018-08-24 | 2018-08-24 | A kind of method of MCU online upgrading |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810975480.1A CN109240721A (en) | 2018-08-24 | 2018-08-24 | A kind of method of MCU online upgrading |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109240721A true CN109240721A (en) | 2019-01-18 |
Family
ID=65067980
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810975480.1A Pending CN109240721A (en) | 2018-08-24 | 2018-08-24 | A kind of method of MCU online upgrading |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109240721A (en) |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109933354A (en) * | 2019-03-07 | 2019-06-25 | 广东汇泰龙科技有限公司 | Fingerprint head online upgrading method, system and the cloud lock of a kind of intelligent cloud lock |
CN110096294A (en) * | 2019-05-07 | 2019-08-06 | 柏科智能(厦门)科技有限公司 | It is a kind of can break-point radio upgrade MCU application program method |
CN111240713A (en) * | 2019-12-28 | 2020-06-05 | 杭州拓深科技有限公司 | Method for detecting remote breakpoint continuous transmission through power utilization |
CN111522564A (en) * | 2020-04-20 | 2020-08-11 | 深圳Tcl新技术有限公司 | Method and device for identifying system upgrading state and computer readable storage medium |
CN111984281A (en) * | 2019-05-24 | 2020-11-24 | 北京车和家信息技术有限公司 | Software updating method, vehicle, terminal and computer readable storage medium |
CN112312374A (en) * | 2020-11-06 | 2021-02-02 | 国网江苏省电力有限公司电力科学研究院 | Device and method for upgrading firmware of single chip microcomputer based on NFC |
CN113760333A (en) * | 2021-09-16 | 2021-12-07 | 海宁奕斯伟集成电路设计有限公司 | Software upgrading method and device, electronic equipment and computer readable storage medium |
Citations (24)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH0210442A (en) * | 1988-06-28 | 1990-01-16 | Nec Corp | Break point instruction control system |
JPH09269933A (en) * | 1996-04-01 | 1997-10-14 | Oki Electric Ind Co Ltd | Multi-processor system |
JP3632229B2 (en) * | 1994-12-07 | 2005-03-23 | 株式会社日立製作所 | ATM switching equipment |
CN1688147A (en) * | 2005-05-17 | 2005-10-26 | 北京立通无限科技有限公司 | Breaker point continuous transmission method based on mail |
CN101004691A (en) * | 2007-01-23 | 2007-07-25 | 北京映翰通网络技术有限公司 | Method and device for updating firmware program |
CN101308536A (en) * | 2007-05-16 | 2008-11-19 | 许丰 | Control method and apparatus for binuclear safety |
CN101414264A (en) * | 2008-11-24 | 2009-04-22 | 孙亚萍 | Method for updating high reliable software version and three update modes |
CN101490686A (en) * | 2005-10-18 | 2009-07-22 | 英特托拉斯技术公司 | Methods for digital rights management |
CN101751273A (en) * | 2008-12-15 | 2010-06-23 | 中国科学院声学研究所 | Safety guide device and method for embedded system |
CN101996154A (en) * | 2009-08-10 | 2011-03-30 | 北京多思科技发展有限公司 | General processor supporting reconfigurable safety design |
CN102073515A (en) * | 2009-11-23 | 2011-05-25 | 天津中兴软件有限责任公司 | RFID (Radio Frequency Identification Device) active tag and method and system for upgrading software thereof |
CN102280929A (en) * | 2010-06-13 | 2011-12-14 | 中国电子科技集团公司第三十研究所 | System for information safety protection of electric power supervisory control and data acquisition (SCADA) system |
CN103473088A (en) * | 2013-08-30 | 2013-12-25 | 北京远特科技有限公司 | Method and system for online upgrading of single chip microcomputer |
CN103761122A (en) * | 2013-12-31 | 2014-04-30 | 青岛歌尔声学科技有限公司 | Chip firmware updating method and system |
CN104572168A (en) * | 2014-09-10 | 2015-04-29 | 中电科技(北京)有限公司 | BIOS (Basic Input/Output System) self-updating protection system and BIOS self-updating protection method |
CN105159707A (en) * | 2015-08-14 | 2015-12-16 | 飞天诚信科技股份有限公司 | Secure financial terminal firmware programming method and financial terminal |
CN105208135A (en) * | 2015-10-26 | 2015-12-30 | 天津书生云科技有限公司 | File transmission method and equipment |
CN105591824A (en) * | 2016-01-14 | 2016-05-18 | 杭州赫智电子科技有限公司 | Method and system for firmware upgrade |
CN105760165A (en) * | 2016-02-22 | 2016-07-13 | 深圳威迈斯电源有限公司 | MCU self-backup loading and refreshing method |
CN105897911A (en) * | 2016-05-20 | 2016-08-24 | 广州优视网络科技有限公司 | File downloading method and device and user terminal |
CN106161336A (en) * | 2015-03-25 | 2016-11-23 | 阿里巴巴集团控股有限公司 | A kind of information updating method, Apparatus and system |
CN106203071A (en) * | 2016-06-30 | 2016-12-07 | 浪潮(北京)电子信息产业有限公司 | A kind of firmware upgrade method and device |
CN107783791A (en) * | 2017-11-13 | 2018-03-09 | 重庆首亨软件有限公司 | A kind of embedded software maintaining method |
CN108429979A (en) * | 2018-06-15 | 2018-08-21 | 歌尔科技有限公司 | A kind of charging box upgrade method, charging box, wireless headset and TWS earphones |
-
2018
- 2018-08-24 CN CN201810975480.1A patent/CN109240721A/en active Pending
Patent Citations (24)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH0210442A (en) * | 1988-06-28 | 1990-01-16 | Nec Corp | Break point instruction control system |
JP3632229B2 (en) * | 1994-12-07 | 2005-03-23 | 株式会社日立製作所 | ATM switching equipment |
JPH09269933A (en) * | 1996-04-01 | 1997-10-14 | Oki Electric Ind Co Ltd | Multi-processor system |
CN1688147A (en) * | 2005-05-17 | 2005-10-26 | 北京立通无限科技有限公司 | Breaker point continuous transmission method based on mail |
CN101490686A (en) * | 2005-10-18 | 2009-07-22 | 英特托拉斯技术公司 | Methods for digital rights management |
CN101004691A (en) * | 2007-01-23 | 2007-07-25 | 北京映翰通网络技术有限公司 | Method and device for updating firmware program |
CN101308536A (en) * | 2007-05-16 | 2008-11-19 | 许丰 | Control method and apparatus for binuclear safety |
CN101414264A (en) * | 2008-11-24 | 2009-04-22 | 孙亚萍 | Method for updating high reliable software version and three update modes |
CN101751273A (en) * | 2008-12-15 | 2010-06-23 | 中国科学院声学研究所 | Safety guide device and method for embedded system |
CN101996154A (en) * | 2009-08-10 | 2011-03-30 | 北京多思科技发展有限公司 | General processor supporting reconfigurable safety design |
CN102073515A (en) * | 2009-11-23 | 2011-05-25 | 天津中兴软件有限责任公司 | RFID (Radio Frequency Identification Device) active tag and method and system for upgrading software thereof |
CN102280929A (en) * | 2010-06-13 | 2011-12-14 | 中国电子科技集团公司第三十研究所 | System for information safety protection of electric power supervisory control and data acquisition (SCADA) system |
CN103473088A (en) * | 2013-08-30 | 2013-12-25 | 北京远特科技有限公司 | Method and system for online upgrading of single chip microcomputer |
CN103761122A (en) * | 2013-12-31 | 2014-04-30 | 青岛歌尔声学科技有限公司 | Chip firmware updating method and system |
CN104572168A (en) * | 2014-09-10 | 2015-04-29 | 中电科技(北京)有限公司 | BIOS (Basic Input/Output System) self-updating protection system and BIOS self-updating protection method |
CN106161336A (en) * | 2015-03-25 | 2016-11-23 | 阿里巴巴集团控股有限公司 | A kind of information updating method, Apparatus and system |
CN105159707A (en) * | 2015-08-14 | 2015-12-16 | 飞天诚信科技股份有限公司 | Secure financial terminal firmware programming method and financial terminal |
CN105208135A (en) * | 2015-10-26 | 2015-12-30 | 天津书生云科技有限公司 | File transmission method and equipment |
CN105591824A (en) * | 2016-01-14 | 2016-05-18 | 杭州赫智电子科技有限公司 | Method and system for firmware upgrade |
CN105760165A (en) * | 2016-02-22 | 2016-07-13 | 深圳威迈斯电源有限公司 | MCU self-backup loading and refreshing method |
CN105897911A (en) * | 2016-05-20 | 2016-08-24 | 广州优视网络科技有限公司 | File downloading method and device and user terminal |
CN106203071A (en) * | 2016-06-30 | 2016-12-07 | 浪潮(北京)电子信息产业有限公司 | A kind of firmware upgrade method and device |
CN107783791A (en) * | 2017-11-13 | 2018-03-09 | 重庆首亨软件有限公司 | A kind of embedded software maintaining method |
CN108429979A (en) * | 2018-06-15 | 2018-08-21 | 歌尔科技有限公司 | A kind of charging box upgrade method, charging box, wireless headset and TWS earphones |
Non-Patent Citations (2)
Title |
---|
冉崇善: "《互联网实用技术与网页制作》", 30 June 2003, 西安电子科技大学出版社 * |
谭晖: "《低功耗蓝牙开发与实战》", 31 January 2016, 北京航空航天大学出版社 * |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109933354A (en) * | 2019-03-07 | 2019-06-25 | 广东汇泰龙科技有限公司 | Fingerprint head online upgrading method, system and the cloud lock of a kind of intelligent cloud lock |
CN110096294A (en) * | 2019-05-07 | 2019-08-06 | 柏科智能(厦门)科技有限公司 | It is a kind of can break-point radio upgrade MCU application program method |
CN111984281A (en) * | 2019-05-24 | 2020-11-24 | 北京车和家信息技术有限公司 | Software updating method, vehicle, terminal and computer readable storage medium |
CN111240713A (en) * | 2019-12-28 | 2020-06-05 | 杭州拓深科技有限公司 | Method for detecting remote breakpoint continuous transmission through power utilization |
CN111522564A (en) * | 2020-04-20 | 2020-08-11 | 深圳Tcl新技术有限公司 | Method and device for identifying system upgrading state and computer readable storage medium |
CN112312374A (en) * | 2020-11-06 | 2021-02-02 | 国网江苏省电力有限公司电力科学研究院 | Device and method for upgrading firmware of single chip microcomputer based on NFC |
CN112312374B (en) * | 2020-11-06 | 2022-09-06 | 国网江苏省电力有限公司电力科学研究院 | Device and method for upgrading firmware of single chip microcomputer based on NFC |
CN113760333A (en) * | 2021-09-16 | 2021-12-07 | 海宁奕斯伟集成电路设计有限公司 | Software upgrading method and device, electronic equipment and computer readable storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109240721A (en) | A kind of method of MCU online upgrading | |
CN110532735B (en) | Firmware upgrading method | |
US8555049B2 (en) | Secure boot terminal, secure boot method, secure boot program, recording medium, and integrated circuit | |
CN104462965B (en) | Application integrity verification method and the network equipment | |
US8600896B2 (en) | Software updating apparatus, software updating system, invalidation method, and invalidation program | |
JP7371103B2 (en) | In-vehicle device upgrade method and related equipment | |
EP2037388A1 (en) | Certifying device, verifying device, verifying system, computer program and integrated circuit | |
US20070217614A1 (en) | Program update method and server | |
CN109413009A (en) | The method and computer readable storage medium of vehicle Firmware Over upgrading | |
JP2004192278A (en) | Communication system and onboard gateway device | |
CN110795126A (en) | Firmware safety upgrading system | |
CN109002312A (en) | Method for upgrading software, device and upgrade server and equipment | |
CN109286502B (en) | Method for recovering manager lock of encryption machine and encryption machine | |
CN110378104A (en) | A method of upgrading is anti-to distort | |
JP7450713B2 (en) | Software integrity protection method and apparatus, and software integrity verification method and apparatus | |
CN109857385B (en) | Application program file packaging method, installation method and starting method | |
WO2014206170A1 (en) | Verification method and device | |
CN114301596A (en) | OTA (over the air) secure communication method and device for vehicle intranet, vehicle-mounted system and storage medium | |
CN111177709A (en) | Execution method and device of terminal trusted component and computer equipment | |
CN108170461B (en) | Differential upgrade package generation method, differential upgrade method and device | |
CN105279441A (en) | Methods and architecture for encrypting and decrypting data | |
US8646070B1 (en) | Verifying authenticity in data storage management systems | |
CN101299849B (en) | WiMAX terminal and starting method thereof | |
CN109150811A (en) | A kind of method and device that realizing credible session calculates equipment | |
CN107995230B (en) | A kind of method for down loading and terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190118 |