CN109240721A - A kind of method of MCU online upgrading - Google Patents

A kind of method of MCU online upgrading Download PDF

Info

Publication number
CN109240721A
CN109240721A CN201810975480.1A CN201810975480A CN109240721A CN 109240721 A CN109240721 A CN 109240721A CN 201810975480 A CN201810975480 A CN 201810975480A CN 109240721 A CN109240721 A CN 109240721A
Authority
CN
China
Prior art keywords
data
new firmware
mcu
downloading
online upgrading
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810975480.1A
Other languages
Chinese (zh)
Inventor
许荣均
崔静燕
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jiangsu Hengbao Intelligent System Technology Co Ltd
Original Assignee
Jiangsu Hengbao Intelligent System Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jiangsu Hengbao Intelligent System Technology Co Ltd filed Critical Jiangsu Hengbao Intelligent System Technology Co Ltd
Priority to CN201810975480.1A priority Critical patent/CN109240721A/en
Publication of CN109240721A publication Critical patent/CN109240721A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/60Software deployment
    • G06F8/65Updates

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Stored Programmes (AREA)

Abstract

This application involves technical field of electronic equipment more particularly to a kind of methods of MCU online upgrading, comprising: judges whether the new firmware data process of last downloaded is interrupted;If so, the breakpoint information and received data information when last downloaded process is interrupted are sent to data platform;Receive the continuation downloading data that data platform is sent.In the method for MCU online upgrading as provided by the embodiment of the present application, by way of breakpoint transmission, especially by write-in data length value and the new firmware data operation result of write-in is verified, in case after abnormal conditions generation, continue to download subsequent new firmware data from interruption place when downloading again, and do not have to re-download existing new firmware data, therefore while ensure that MCU can normally upgrade after re-powering or resetting, it avoids and re-downloads caused time cost again, improve the efficiency of MCU online upgrading.

Description

A kind of method of MCU online upgrading
Technical field
This application involves technical field of electronic equipment more particularly to a kind of methods of MCU online upgrading.
Background technique
During MCU online upgrading, it is possible to which there is a situation where accident power-offs, can be protected using power-off protection strategy Once power blackout situation occurs during card online upgrading, MCU can normally upgrade after re-powering or resetting again.
Power-off protection strategy in currently available technology is usually after MCU is re-powered or resetted again, under needing again Data are carried, or the data that storage region has been downloaded are copied to program Operational Zone again and are upgraded.But such case Under, on the one hand, once needing to re-download data after accident power-off, then MCU update time is increased, and then just reduce MCU The efficiency of online upgrading;On the other hand, once accident power-off causes the data for being downloaded to storage region imperfect, if by imperfect Data copy to program Operational Zone upgraded, still will cause MCU upgrading failure.
Therefore, while how guaranteeing that MCU can normally upgrade after re-powering or resetting, MCU online upgrading is reduced Time improves the efficiency of MCU online upgrading, is those skilled in the art's technical problem urgently to be solved at present.
Summary of the invention
This application provides a kind of methods of MCU online upgrading, to guarantee that MCU can normally rise after re-powering or resetting While grade, the time of MCU online upgrading is reduced, improves the efficiency of MCU online upgrading.
In order to solve the above technical problems, the application provides the following technical solutions:
A kind of method of MCU online upgrading, which comprises the following steps: judge the new firmware data of last downloaded Whether process is interrupted;If so, the breakpoint information and received data information when last downloaded process is interrupted are sent to number According to platform;Receive the continuation downloading data that data platform is sent.
The method of MCU online upgrading as described above, wherein preferably, the breakpoint information is to have been written into number of devices According to the data length value of memory block;The data information is after having been written into the data progress operation of new firmware data buffer area Operation values;It is described to continue downloading data to be to take data length value as the data for downloading offset.
The method of MCU online upgrading as described above, wherein preferably, new firmware data buffer area will be had been written into It is specially to carry out abstract operation that data, which carry out operation,.
The method of MCU online upgrading as described above, wherein preferably, data platform receives operation values and data It after length value, also follows the steps below: the new firmware data within the scope of the data length value for being stored in data platform is transported Calculation obtains check value;Twin check value and operation values;If consistent, sending to MCU with data length value is downloading offset Data.
The method of MCU online upgrading as described above, wherein preferably, before data platform calculates check value, also It include: judgement data length value, if data length value is 0;Then re-download new firmware data;If data length value is non-zero;Then Calculate check value.
The method of MCU online upgrading as described above, wherein preferably, judge the new firmware data process of last downloaded Whether it is interrupted and specifically includes: judges to update Status Flag in update;And/or judge that data platform issues in upgrade request Data summarization value is different with the new firmware data digest value of device data memory block is had been written into;The then new firmware data mistake of last downloaded Journey is interrupted.
The method of MCU online upgrading as described above, wherein preferably, before new firmware data downloading starts, will update Status Flag, which is set as updating, to be started;Status Flag will be updated after passing through the certification of data platform identity to be set as in update;Newly After the completion of firmware data downloading, Status Flag will be updated and be set as updating completion.
The method of MCU online upgrading as described above, wherein preferably, have been written into the new solid of device data memory block Number of packages is according to the digest value that digest value is that the new firmware data of last downloaded is stored in device data memory block after the completion.
The method of MCU online upgrading as described above, wherein preferably, new firmware number is downloaded in verifying after the completion of downloading According to integrality.
The method of MCU online upgrading as described above, wherein preferably, by calculating the new firmware data downloaded to The upgrade request that is issued with data platform of digest value in digest value be compared, if than more consistent, the new firmware downloaded Data are complete.
Relatively above-mentioned background technique, the method for MCU online upgrading provided by the present invention, comprising the following steps: in judgement Whether the secondary new firmware data process of downloading is interrupted;If so, breakpoint information when last downloaded process is interrupted and received Data information is sent to data platform;Receive the continuation downloading data that data platform is sent.Since the embodiment of the present application is provided MCU online upgrading method in, by way of breakpoint transmission, especially by write-in data length value and to write-in New firmware data operation result is verified, in case after abnormal conditions generation, after continuing downloading from interruption place when downloading again The new firmware data in face, and do not have to re-download existing new firmware data, MCU makees from the end address for storing new firmware data Data platform is continued to write to for initial address and issues the data packet got off, and is finished until all downloading, therefore ensure that on again While MCU can normally upgrade after electricity or reset, avoids and re-download caused time cost again, improve MCU and exist The efficiency of line upgrading.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this The some embodiments recorded in invention can also be obtained according to these attached drawings other for those of ordinary skill in the art Attached drawing.
Fig. 1 illustrates the schematic diagram downloaded according to the new firmware of the embodiment of the present application;
Fig. 2 illustrates the schematic diagram of the new firmware breakpoint transmission according to the embodiment of the present application;
Fig. 3 illustrates the schematic diagram of the new firmware upgrade according to the embodiment of the present application.
Specific embodiment
The embodiment of the present invention is described below in detail, examples of the embodiments are shown in the accompanying drawings, wherein from beginning to end Same or similar label indicates same or similar element or element with the same or similar functions.Below with reference to attached The embodiment of figure description is exemplary, and for explaining only the invention, and is not construed as limiting the claims.
MCU online upgrading is that online upgrading is carried out to the firmware of MCU, MCU online upgrading be by data platform (also It is online upgrading platform) it initiates.The APP program (referred to as firmware) for running on the Operational Zone APP of MCU is sent out according to data platform The upgrade request risen, downloads new firmware data.APP program delays the new firmware data that the new firmware data of downloading is cached in MCU Deposit area, (area is not limited to the FLASH of MCU, is also possible to connect with MCU for data cached for the new firmware data buffer area of MCU Other memories).After MCU is powered on, operation BOOT program, the program run on the device data memory block of MCU first, have Body can be the boot section BOOT, and BOOT program is for guiding, verifying, updating APP program.
Referring to Fig. 1, Fig. 1 illustrates the schematic diagram downloaded according to the new firmware of the embodiment of the present application.
When firmware needs to update, data platform initiates online upgrading request 110 first.The APP program of MCU receives online After upgrade request, judge whether to need to update firmware 120.If you do not need to updating firmware, then process is exited;If necessary to update Firmware then enters next step online upgrading process, and this avoid repeat to update.
As an example, data platform initiates online upgrading request, wherein comprising being currently stored in number in online upgrading request According to the digest value of the new firmware data of platform, being also possible to other can be identified for that the new firmware data for being currently stored in data platform The value of version, as long as the technical effect for identifying new firmware data version can be played.APP program receives online upgrading request Afterwards, the new firmware data digest value that data platform issues, the digest value of judgement and currently running APP program in MCU are parsed Whether (digest value of currently running APP program can be the digest value stored to MCU when last time firmware upgrade) be equal. Show that currently running APP program has been new firmware if equal, does not need to re-download upgrading, exit process;If It is unequal, show that currently running APP program is not new firmware, need to re-download upgrading, then enters next step online upgrading Process.
Or data platform reads the data field MCU relevant release note or firmware digest value, it is then current with data platform After firmware data is compared, decide whether the firmware upgrade for carrying out MCU by data platform.If necessary to upgrade, firmware is initiated Upgrade after initiation command receives beginning upgrade command to MCU, MCU and enters firmware on line upgrading process.
Before carrying out new firmware data downloading, initialization downloading process 130 can also be carried out, by APP program to keep away Exempt from the new firmware data of remaining data influence downloading.As an example, initialization downloading process can be initialization package Serial number is set as 0, removes the relevant authentication information in MCU.
Status Flag can also will be updated in initialization downloading process and is set as updating and is started, wherein update Status Flag It is to identify whether the label in new firmware data download state.Updating status indicator is to show that MCU is in downloading in updating Process is downloading new firmware data.Updating Status Flag is to update to complete to show that MCU has been updated completion.
Before being downloaded new firmware data, authentication 140 can also be carried out to data platform, to guarantee to receive number According to safety.If certification does not pass through, process is exited;Certification passes through, then enters next step online upgrading process.
As an example, carrying out authentication to data platform can be following mode.
Firstly, data platform generates the data packet of authentication.The data packet for generating authentication specifically can be data Platform calculates the digest value of new firmware, is denoted as H1;Data platform generates random key, is denoted as RK;Data platform obtains new The parameters such as firmware total length, version number, timestamp are denoted as P1;By H1, RK and P1 progress operation obtain A1 (such as: A1=H1 +RK+P1);Abstract operation is carried out to A1, is denoted as H2;Using key in external authorization key physical unit, (symmetric key is non- Asymmetric private key) H2 is encrypted, it is denoted as ED1=ENC (A1+H2, key);Data platform is using random key RK to new firmware number According to being encrypted, it is denoted as ED2=ENC (new firmware data, RK).
Then, the data packet subpackage of the authentication of generation or whole packet are sent to the APP program of MCU.
Then, APP program receives the data packet of the authentication of data platform transmission, to the data packet of authentication into Row certification.For example, using preset key key, (symmetric key is asymmetric after receiving the ED1 in the data packet of authentication Public key) data are decrypted to obtain clear data AD1 (AD1=A1+H2)=DEC (ED1, key).Verify clear data Whether the digest value of AD1 partial data (i.e. A1) is equal to H2.The authentification failure if not equal to H2, exits process;If be equal to It is to pass through that H2, which then authenticates successfully juxtaposition identity identifier,.Parse clear data AD1 in related data (such as: H1, H2, so as to Judge whether next time to need online upgrading) and saved, enter finally into the downloading process of new firmware data.
Process is downloaded into new firmware data, data platform sends the data of new firmware to MCU, and APP program receives data The new firmware data 150 that platform issues.
During APP program receives the new firmware data that data platform issues, it can also preset and wait new firmware number According to the time of downloading, it should new firmware data download command is waited within the preset waiting time, if the every new firmware waited The time of data download command exceeds the preset waiting time, then exits process.In the downloading process for waiting new firmware data In, by way of the above-mentioned default waiting time, can avoid waiting for download time too long causes unsafe influence to downloading. As an example, it presets the time waited and continues the lower current-carrying of new firmware data if receiving new firmware data in 2s for 2s Journey exits the downloading process of new firmware data while removing authentication mark if being not received by new firmware data in 2s Know and currently update Status Flag.
In addition, checking command can also be arranged during APP program receives the new firmware data that data platform issues Program, to avoid non-firmware data download instruction to new firmware data downloading interfere.Such as: if monitored other When request instruction, then downloading process is exited, while removing identity identifier and currently updating Status Flag.
On the basis of the above, the new firmware data that APP program receives can be to be transmitted in the form of data packet.Its In, new firmware data packet can be following form: packet serial number+data offset+total length+data (ciphertext)+data MAC value, It is also possible to packet serial number+data offset+total length+data (ciphertext) etc., the data packet form of new firmware is also not necessarily limited to Above-mentioned form, as long as the embodiment of the present application technical effect to be achieved can be reached.
APP program receives new firmware data, can also verify to received new firmware data.Under new firmware data It, can also be using the form either ciphertext+MAC form transmission of ciphertext, to guarantee that new firmware data will not be let out during load Reveal or distorts.As an example, it can be APP program before starting to download the first bag data, encrypt meeting using preset key Words key plain SK (when secondary firmware upgrade is effective) obtain session key ciphertext E_SK, then send session key ciphertext E_SK To data platform;After data platform receives session key ciphertext E_SK, external authorization KEY class physical unit decrypted session is used Key ciphertext E_SK obtains session key plaintext SK;Then data platform is in data of every transmission, using the session key Plaintext SK carries out MAC operation MD1 ... n=MAC (D1 ... n, SK) to current data, after operation result is then appended to data packet Face TD1 ... n=D1 ... n+MD1 ... n;After APP program receives data, the data received are carried out using session key plaintext SK Whether MAC operation, the MAC value that the MAC value and APP program for then comparing data platform calculating calculate are identical.If the same after Continuous downloading;If it is not the same, then emptying related cache data (the new firmware data namely downloaded) backed off after random downloading process.
After APP program verifies successfully received new firmware data, new firmware data is sequentially written in new firmware data Buffer area, and new firmware data total length, next time data offset is written in device data memory block and has been written into number According to parameters such as length.New firmware data success is received at this, is also referred to one divided data of reception and is bundled into function.It is new solid receiving Number of packages according to while, be also possible to after receiving new firmware data, can also judge whether new firmware data downloads completion 160. Judge whether new firmware data is downloaded completion and can be compared the data offset in data packet with total length.It is more different It causes, then downloading does not complete, and continues to download;If comparing unanimously, completion is downloaded, then enters next step process.
After the download is complete, the integrality 170 for downloading new firmware data can also be verified, is avoided passing through incomplete new solid Number of packages is avoided copying incomplete new firmware data to APP Operational Zone in escalation process and led according to upgrading to APP program It causes MCU that cannot normally start, prevents APP program staging error.As an example, can be the digest value by verifying new firmware with Guarantee the integrality of new firmware data entirety.Such as: the new firmware data of the new firmware data buffer area of caching to MCU is carried out Integrity verification specifically can be and be decrypted to obtain clear data to the new firmware data of caching, then holds clear data The digest value being calculated is compared by row abstract operation with the digest value that data platform before downloading issues.If no Equal, then authentication failed removes relevant authentication information and data cached and exit upgrading process;If equal, verifying at Function updates digest value to the device data memory block of MCU, that is, the digest value that verification process is calculated and is stored in equipment The parameter region of data storage area is to be stored in the digest value of the parameter region of device data memory block before replacing.
On the basis of the above, more new state can also be set to update simultaneously to complete, empties the relevant information 180 of certification, It is completed with showing that downloading caches new firmware data process.It is to update to complete, or pass through verifying downloading by verifying more new state Data packet in data offset it is equal with total length, with show downloading new firmware data it is complete.It can certainly pass through Other modes verify the integrality of new firmware data, as long as can reach the embodiment of the present application technical effect to be achieved i.e. It can.
If caused under new firmware data due to power down, network etc. during the downloading of above-mentioned new firmware data It carries and interrupts, APP program will hold consultation downloading in next firmware upgrade with data platform.Extremely it exiting, interrupting, updating At situations such as exit downloading process when, APP program can all empty authentication information.
Referring to Fig. 2, Fig. 2 illustrates the schematic diagram of the new firmware breakpoint transmission according to the embodiment of the present application.
After MCU is powered on again, data platform requests online upgrading, online upgrading request and above-mentioned new firmware downloading process In online upgrading request it is identical.Online upgrading request form and content also with online upgrading in above-mentioned new firmware downloading process The form of request is consistent with content, and details are not described herein again.
On the basis of the above, authentication can also be carried out to data platform, the form of specific authentication and above-mentioned new It is the same to the authentication of data platform in firmware downloading process, it is not just repeating herein.For carrying out identity to data platform As long as the opportunity of certification is before carrying out new firmware data to continue downloading.
After APP program receives the online upgrading request of data platform transmission, judge whether last downloaded process is interrupted 210.As an example, judge last downloaded process whether be interrupted specifically can be APP program according to update Status Flag and Digest value determines that last downloaded process is aborted.Such as: it can be to judge last time more in update according to Status Flag is updated It has not updated newly, last downloaded is aborted in other words;In can also updating according to Status Flag is updated and data are flat The digest value that platform issues is not waited with the digest value in the device data memory block for being stored in MCU judges that last time update has not updated, Last downloaded is aborted in other words.
When judging that last downloaded process is interrupted, then breakpoint information when last downloaded process is interrupted by APP program and The data information that data are received before interrupting is sent to data platform 220.Specifically can be APP program will have been written into new firmware data The data of buffer area carry out operation (specifically can be abstract operation), and by operation values and have been written into device data memory block Data length value is sent to data platform.
Data platform obtains the corresponding data information for being stored in data platform according to the breakpoint information received, then will count It is compared according to the received data information of corresponding data information and date platform of platform, judges the beginning for downloading new firmware data Point 230.If inconsistent, new firmware data is re-downloaded;If consistent, continue to download new firmware number from corresponding breakpoint According to.As an example, it if the data length value that data platform receives write device data storage area is 0, re-downloads new solid Number of packages evidence;If data platform receive write device data storage area data length value be it is non-zero, to being stored in data platform Data length value within the scope of new firmware data carry out operation and obtain check value and (can be abstract operation, be also possible to other The calculation of operation, the operation mode and operation values is identical), then by data platform calculate check value and receive APP program calculate operation values be compared.Less consistent, then setting downloading offset is 0, that is, is re-downloaded;Than More consistent, then setting downloading offset is the data length value for having been written into device data memory block.
Before continuing downloading, MCU and data platform can also carry out data encryption key negotiation 240 and (newly consolidate with above-mentioned Key agreement is identical when part is downloaded).After having negotiated data encryption key, after the new firmware encrypting of downloading, continue to new solid Number of packages according to being downloaded 250, to new firmware to continue downloading identical with above-mentioned new firmware downloading.Such as: data are also possible to count It is transmitted according to the form of packet, APP program can also verify received new firmware data, it is also desirable to judge that new firmware data is No downloading is completed, it is also desirable to be updated digest value to the device data memory block of MCU, just not repeated herein.
In the method for MCU online upgrading as provided by the embodiment of the present application, by way of breakpoint transmission, especially By write-in data length value and the new firmware data operation result of write-in is verified, in case occurring in abnormal conditions Afterwards, continue to download subsequent new firmware data from interruption place when downloading again, and do not have to re-download existing new firmware data, MCU continues to write to data platform as initial address from the end address for storing new firmware data and issues the data packet got off, directly Finished to all downloadings, thus ensure that re-power or reset after MCU while can normally upgrade, avoid again again Time cost caused by downloading, improves the efficiency of MCU online upgrading.
After the completion of in the first above-mentioned situation and second situation to the downloading of new firmware data, then start to APP journey Sequence carries out upgrading update.
Referring to Fig. 3, Fig. 3 illustrates the schematic diagram of the new firmware upgrade according to the embodiment of the present application.
After MCU is powered on, operation BOOT program 310, BOOT program read more new state 320 first.Updating Status Flag is Original state does not execute firmware upgrade process then, the APP program 370 for the Operational Zone APP that brings into operation;Updating Status Flag is more It is new to complete, then firmware upgrade process is executed, the new firmware data 330 of caching is read.Read new firmware data, total length.If The new firmware data of downloading is the data cached of ciphertext form, then reads key verification data 340, specifically can be using key The new firmware data of reading is decrypted to obtain the clear data of firmware, according to new firmware data length value, to new firmware number According to abstract operation is carried out, obtained result is compared with the new firmware digest value that platform data is sent.If unequal, Exit new firmware update process;If equal, new firmware data is copied to the program area APP and carries out APP program update 350. If the new firmware data of downloading is the data cached of plaintext version, need according to the new new firmware data of firmware data length computation The digest value sent after digest value with platform data is compared.If unequal, new firmware update process is exited;If phase Deng, then by new firmware data be copied to the program area APP carry out APP program update 350.It is finished to the upgrading of APP program, empties update State is original state, and empties the new firmware data of new firmware data buffer area caching.Finally jump to the operation of the program area APP APP program.
It is obvious to a person skilled in the art that invention is not limited to the details of the above exemplary embodiments, Er Qie In the case where without departing substantially from spirit or essential attributes of the invention, the present invention can be realized in other specific forms.Therefore, no matter From the point of view of which point, the present embodiments are to be considered as illustrative and not restrictive, and the scope of the present invention is by appended power Benefit requires rather than above description limits, it is intended that all by what is fallen within the meaning and scope of the equivalent elements of the claims Variation is included within the present invention.Any reference signs in the claims should not be construed as limiting the involved claims.
In addition, it should be understood that although this specification is described in terms of embodiments, but not each embodiment is only wrapped Containing an independent technical solution, this description of the specification is merely for the sake of clarity, and those skilled in the art should It considers the specification as a whole, the technical solutions in the various embodiments may also be suitably combined, forms those skilled in the art The other embodiments being understood that.

Claims (10)

1. a kind of method of MCU online upgrading, which comprises the following steps:
Judge whether the new firmware data process of last downloaded is interrupted;
If so, the breakpoint information and received data information when last downloaded process is interrupted are sent to data platform;
Receive the continuation downloading data that data platform is sent.
2. the method for MCU online upgrading according to claim 1, which is characterized in that the breakpoint information is to have been written into set The data length value of standby data storage area;The data information is the data progress operation that will have been written into new firmware data buffer area Operation values afterwards;It is described to continue downloading data to be to take data length value as the data for downloading offset.
3. the method for MCU online upgrading according to claim 2, which is characterized in that new firmware data caching will be had been written into The operation that the data in area carry out is specially to carry out abstract operation.
4. the method for MCU online upgrading according to claim 2, which is characterized in that data platform receive operation values and After data length value, also follow the steps below:
Operation is carried out to the new firmware data within the scope of the data length value for being stored in data platform and obtains check value;
Twin check value and operation values;
If consistent, sending to MCU with data length value is the data for downloading offset.
5. the method for MCU online upgrading according to claim 4, which is characterized in that data platform calculate check value it Before, further includes:
Data length value is judged, if data length value is 0;
Then re-download new firmware data;
If data length value is non-zero;
Then calculate check value.
6. the method for MCU online upgrading according to claim 2, which is characterized in that judge the new firmware data of last downloaded Whether process, which is interrupted, specifically includes:
Judge to update Status Flag in update;
And/or judge that data platform issues the data summarization value in upgrade request and has been written into the new firmware of device data memory block Data summarization value is different;
Then the new firmware data process of last downloaded is interrupted.
7. the method for MCU online upgrading according to claim 6, which is characterized in that, will before new firmware data downloading starts It updates Status Flag and is set as updating and start;Status Flag will be updated after passing through the certification of data platform identity to be set as updating In;After the completion of new firmware data downloading, Status Flag will be updated and be set as updating completion.
8. the method for MCU online upgrading according to claim 6, which is characterized in that have been written into device data memory block New firmware data digest value is the digest value that the new firmware data of last downloaded is stored in device data memory block after the completion.
9. the method for MCU online upgrading according to any one of claims 1 to 8, which is characterized in that verified after the completion of downloading Download the integrality of new firmware data.
10. the method for MCU online upgrading according to claim 9, which is characterized in that by calculating the new firmware downloaded to The digest value in upgrade request that the digest value of data is issued with data platform is compared, if that downloads is new than more consistent Firmware data is complete.
CN201810975480.1A 2018-08-24 2018-08-24 A kind of method of MCU online upgrading Pending CN109240721A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810975480.1A CN109240721A (en) 2018-08-24 2018-08-24 A kind of method of MCU online upgrading

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810975480.1A CN109240721A (en) 2018-08-24 2018-08-24 A kind of method of MCU online upgrading

Publications (1)

Publication Number Publication Date
CN109240721A true CN109240721A (en) 2019-01-18

Family

ID=65067980

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810975480.1A Pending CN109240721A (en) 2018-08-24 2018-08-24 A kind of method of MCU online upgrading

Country Status (1)

Country Link
CN (1) CN109240721A (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109933354A (en) * 2019-03-07 2019-06-25 广东汇泰龙科技有限公司 Fingerprint head online upgrading method, system and the cloud lock of a kind of intelligent cloud lock
CN110096294A (en) * 2019-05-07 2019-08-06 柏科智能(厦门)科技有限公司 It is a kind of can break-point radio upgrade MCU application program method
CN111240713A (en) * 2019-12-28 2020-06-05 杭州拓深科技有限公司 Method for detecting remote breakpoint continuous transmission through power utilization
CN111522564A (en) * 2020-04-20 2020-08-11 深圳Tcl新技术有限公司 Method and device for identifying system upgrading state and computer readable storage medium
CN111984281A (en) * 2019-05-24 2020-11-24 北京车和家信息技术有限公司 Software updating method, vehicle, terminal and computer readable storage medium
CN112312374A (en) * 2020-11-06 2021-02-02 国网江苏省电力有限公司电力科学研究院 Device and method for upgrading firmware of single chip microcomputer based on NFC
CN113760333A (en) * 2021-09-16 2021-12-07 海宁奕斯伟集成电路设计有限公司 Software upgrading method and device, electronic equipment and computer readable storage medium

Citations (24)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH0210442A (en) * 1988-06-28 1990-01-16 Nec Corp Break point instruction control system
JPH09269933A (en) * 1996-04-01 1997-10-14 Oki Electric Ind Co Ltd Multi-processor system
JP3632229B2 (en) * 1994-12-07 2005-03-23 株式会社日立製作所 ATM switching equipment
CN1688147A (en) * 2005-05-17 2005-10-26 北京立通无限科技有限公司 Breaker point continuous transmission method based on mail
CN101004691A (en) * 2007-01-23 2007-07-25 北京映翰通网络技术有限公司 Method and device for updating firmware program
CN101308536A (en) * 2007-05-16 2008-11-19 许丰 Control method and apparatus for binuclear safety
CN101414264A (en) * 2008-11-24 2009-04-22 孙亚萍 Method for updating high reliable software version and three update modes
CN101490686A (en) * 2005-10-18 2009-07-22 英特托拉斯技术公司 Methods for digital rights management
CN101751273A (en) * 2008-12-15 2010-06-23 中国科学院声学研究所 Safety guide device and method for embedded system
CN101996154A (en) * 2009-08-10 2011-03-30 北京多思科技发展有限公司 General processor supporting reconfigurable safety design
CN102073515A (en) * 2009-11-23 2011-05-25 天津中兴软件有限责任公司 RFID (Radio Frequency Identification Device) active tag and method and system for upgrading software thereof
CN102280929A (en) * 2010-06-13 2011-12-14 中国电子科技集团公司第三十研究所 System for information safety protection of electric power supervisory control and data acquisition (SCADA) system
CN103473088A (en) * 2013-08-30 2013-12-25 北京远特科技有限公司 Method and system for online upgrading of single chip microcomputer
CN103761122A (en) * 2013-12-31 2014-04-30 青岛歌尔声学科技有限公司 Chip firmware updating method and system
CN104572168A (en) * 2014-09-10 2015-04-29 中电科技(北京)有限公司 BIOS (Basic Input/Output System) self-updating protection system and BIOS self-updating protection method
CN105159707A (en) * 2015-08-14 2015-12-16 飞天诚信科技股份有限公司 Secure financial terminal firmware programming method and financial terminal
CN105208135A (en) * 2015-10-26 2015-12-30 天津书生云科技有限公司 File transmission method and equipment
CN105591824A (en) * 2016-01-14 2016-05-18 杭州赫智电子科技有限公司 Method and system for firmware upgrade
CN105760165A (en) * 2016-02-22 2016-07-13 深圳威迈斯电源有限公司 MCU self-backup loading and refreshing method
CN105897911A (en) * 2016-05-20 2016-08-24 广州优视网络科技有限公司 File downloading method and device and user terminal
CN106161336A (en) * 2015-03-25 2016-11-23 阿里巴巴集团控股有限公司 A kind of information updating method, Apparatus and system
CN106203071A (en) * 2016-06-30 2016-12-07 浪潮(北京)电子信息产业有限公司 A kind of firmware upgrade method and device
CN107783791A (en) * 2017-11-13 2018-03-09 重庆首亨软件有限公司 A kind of embedded software maintaining method
CN108429979A (en) * 2018-06-15 2018-08-21 歌尔科技有限公司 A kind of charging box upgrade method, charging box, wireless headset and TWS earphones

Patent Citations (24)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH0210442A (en) * 1988-06-28 1990-01-16 Nec Corp Break point instruction control system
JP3632229B2 (en) * 1994-12-07 2005-03-23 株式会社日立製作所 ATM switching equipment
JPH09269933A (en) * 1996-04-01 1997-10-14 Oki Electric Ind Co Ltd Multi-processor system
CN1688147A (en) * 2005-05-17 2005-10-26 北京立通无限科技有限公司 Breaker point continuous transmission method based on mail
CN101490686A (en) * 2005-10-18 2009-07-22 英特托拉斯技术公司 Methods for digital rights management
CN101004691A (en) * 2007-01-23 2007-07-25 北京映翰通网络技术有限公司 Method and device for updating firmware program
CN101308536A (en) * 2007-05-16 2008-11-19 许丰 Control method and apparatus for binuclear safety
CN101414264A (en) * 2008-11-24 2009-04-22 孙亚萍 Method for updating high reliable software version and three update modes
CN101751273A (en) * 2008-12-15 2010-06-23 中国科学院声学研究所 Safety guide device and method for embedded system
CN101996154A (en) * 2009-08-10 2011-03-30 北京多思科技发展有限公司 General processor supporting reconfigurable safety design
CN102073515A (en) * 2009-11-23 2011-05-25 天津中兴软件有限责任公司 RFID (Radio Frequency Identification Device) active tag and method and system for upgrading software thereof
CN102280929A (en) * 2010-06-13 2011-12-14 中国电子科技集团公司第三十研究所 System for information safety protection of electric power supervisory control and data acquisition (SCADA) system
CN103473088A (en) * 2013-08-30 2013-12-25 北京远特科技有限公司 Method and system for online upgrading of single chip microcomputer
CN103761122A (en) * 2013-12-31 2014-04-30 青岛歌尔声学科技有限公司 Chip firmware updating method and system
CN104572168A (en) * 2014-09-10 2015-04-29 中电科技(北京)有限公司 BIOS (Basic Input/Output System) self-updating protection system and BIOS self-updating protection method
CN106161336A (en) * 2015-03-25 2016-11-23 阿里巴巴集团控股有限公司 A kind of information updating method, Apparatus and system
CN105159707A (en) * 2015-08-14 2015-12-16 飞天诚信科技股份有限公司 Secure financial terminal firmware programming method and financial terminal
CN105208135A (en) * 2015-10-26 2015-12-30 天津书生云科技有限公司 File transmission method and equipment
CN105591824A (en) * 2016-01-14 2016-05-18 杭州赫智电子科技有限公司 Method and system for firmware upgrade
CN105760165A (en) * 2016-02-22 2016-07-13 深圳威迈斯电源有限公司 MCU self-backup loading and refreshing method
CN105897911A (en) * 2016-05-20 2016-08-24 广州优视网络科技有限公司 File downloading method and device and user terminal
CN106203071A (en) * 2016-06-30 2016-12-07 浪潮(北京)电子信息产业有限公司 A kind of firmware upgrade method and device
CN107783791A (en) * 2017-11-13 2018-03-09 重庆首亨软件有限公司 A kind of embedded software maintaining method
CN108429979A (en) * 2018-06-15 2018-08-21 歌尔科技有限公司 A kind of charging box upgrade method, charging box, wireless headset and TWS earphones

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
冉崇善: "《互联网实用技术与网页制作》", 30 June 2003, 西安电子科技大学出版社 *
谭晖: "《低功耗蓝牙开发与实战》", 31 January 2016, 北京航空航天大学出版社 *

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109933354A (en) * 2019-03-07 2019-06-25 广东汇泰龙科技有限公司 Fingerprint head online upgrading method, system and the cloud lock of a kind of intelligent cloud lock
CN110096294A (en) * 2019-05-07 2019-08-06 柏科智能(厦门)科技有限公司 It is a kind of can break-point radio upgrade MCU application program method
CN111984281A (en) * 2019-05-24 2020-11-24 北京车和家信息技术有限公司 Software updating method, vehicle, terminal and computer readable storage medium
CN111240713A (en) * 2019-12-28 2020-06-05 杭州拓深科技有限公司 Method for detecting remote breakpoint continuous transmission through power utilization
CN111522564A (en) * 2020-04-20 2020-08-11 深圳Tcl新技术有限公司 Method and device for identifying system upgrading state and computer readable storage medium
CN112312374A (en) * 2020-11-06 2021-02-02 国网江苏省电力有限公司电力科学研究院 Device and method for upgrading firmware of single chip microcomputer based on NFC
CN112312374B (en) * 2020-11-06 2022-09-06 国网江苏省电力有限公司电力科学研究院 Device and method for upgrading firmware of single chip microcomputer based on NFC
CN113760333A (en) * 2021-09-16 2021-12-07 海宁奕斯伟集成电路设计有限公司 Software upgrading method and device, electronic equipment and computer readable storage medium

Similar Documents

Publication Publication Date Title
CN109240721A (en) A kind of method of MCU online upgrading
CN110532735B (en) Firmware upgrading method
US8555049B2 (en) Secure boot terminal, secure boot method, secure boot program, recording medium, and integrated circuit
CN104462965B (en) Application integrity verification method and the network equipment
US8600896B2 (en) Software updating apparatus, software updating system, invalidation method, and invalidation program
JP7371103B2 (en) In-vehicle device upgrade method and related equipment
EP2037388A1 (en) Certifying device, verifying device, verifying system, computer program and integrated circuit
US20070217614A1 (en) Program update method and server
CN109413009A (en) The method and computer readable storage medium of vehicle Firmware Over upgrading
JP2004192278A (en) Communication system and onboard gateway device
CN110795126A (en) Firmware safety upgrading system
CN109002312A (en) Method for upgrading software, device and upgrade server and equipment
CN109286502B (en) Method for recovering manager lock of encryption machine and encryption machine
CN110378104A (en) A method of upgrading is anti-to distort
JP7450713B2 (en) Software integrity protection method and apparatus, and software integrity verification method and apparatus
CN109857385B (en) Application program file packaging method, installation method and starting method
WO2014206170A1 (en) Verification method and device
CN114301596A (en) OTA (over the air) secure communication method and device for vehicle intranet, vehicle-mounted system and storage medium
CN111177709A (en) Execution method and device of terminal trusted component and computer equipment
CN108170461B (en) Differential upgrade package generation method, differential upgrade method and device
CN105279441A (en) Methods and architecture for encrypting and decrypting data
US8646070B1 (en) Verifying authenticity in data storage management systems
CN101299849B (en) WiMAX terminal and starting method thereof
CN109150811A (en) A kind of method and device that realizing credible session calculates equipment
CN107995230B (en) A kind of method for down loading and terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20190118