CN109408099B - Remote FPGA firmware code updating system, method and medium - Google Patents
Remote FPGA firmware code updating system, method and medium Download PDFInfo
- Publication number
- CN109408099B CN109408099B CN201811070265.3A CN201811070265A CN109408099B CN 109408099 B CN109408099 B CN 109408099B CN 201811070265 A CN201811070265 A CN 201811070265A CN 109408099 B CN109408099 B CN 109408099B
- Authority
- CN
- China
- Prior art keywords
- fpga
- firmware
- updating
- module
- mcu control
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 38
- 238000004891 communication Methods 0.000 claims abstract description 49
- 238000004590 computer program Methods 0.000 claims description 5
- 238000012795 verification Methods 0.000 abstract description 5
- 230000000694 effects Effects 0.000 abstract description 2
- 238000013461 design Methods 0.000 description 2
- 238000011161 development Methods 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 230000006870 function Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000013459 approach Methods 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 239000000284 extract Substances 0.000 description 1
- 239000004065 semiconductor Substances 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/60—Software deployment
- G06F8/65—Updates
- G06F8/654—Updates using techniques specially adapted for alterable solid state memories, e.g. for EEPROM or flash memories
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Stored Programmes (AREA)
Abstract
The invention provides a remote FPGA firmware code updating system, a method and a medium, comprising the following steps: the device comprises a remote communication module, an MCU control module, an FPGA module and a FLASH memory; the remote communication module is connected with the MCU control module, the MCU control module is connected with the FPGA module, and the FPGA module is connected with the FLASH memory; the FLASH memory is stored with FPGA firmware. The invention uses the MCU control module, can check the legitimacy of the firmware, prevent the system from being updated the firmware illegally; the verification field is pre-stored in the MCU, so that verification information is prevented from being leaked, and the safety of the whole system is ensured; the MCU control module is used for controlling the FPGA to reset, so that the firmware can take effect without power failure and restarting after updating; the MCU control module can control the power-on time sequence of the FPGA, detect whether the power-on loading of the firmware is successful or not and ensure the reliability of the system.
Description
Technical Field
The invention relates to the technical field of programmable logic devices, in particular to a remote FPGA firmware code updating system, method and medium. In particular to a remote and safe firmware code updating method of an FPGA based on an MCU.
Background
At present, with the rapid development of semiconductor technology, field Programmable Gate array (fpga) (field Programmable Gate array) has been widely used in many product designs, and even used to replace dedicated IC chips in many occasions. The FPGA has abundant logic resources and IO resources, and has the advantages of short design cycle, low development cost, small risk and high reliability. With the wide application of FPGAs, the method of remotely updating the firmware code of the FPGA is also used in a large scale.
For a common method for remotely updating an FPGA firmware code, many patent documents already propose a solution, but basically, power is cut off and configuration is needed after restart to be effective. With the high occupation ratio of the FPGA in various application occasions, the safety of a remote FPGA firmware updating approach is more and more important, and once the updating is in a problem or is maliciously updated to wrong configuration, immeasurable influence can be caused to enterprises.
Patent document CN105955783A (application number: 201610305001.6) discloses a method for downloading remote FPGA logic codes based on FPGA control, which updates the logic control codes through the FPGA, and when the update fails, the FPGA loads a backup version, so that the system can work normally and the next code update can be performed at the same time. The downloading method comprises the following steps: the logic code is transmitted to the CPU through the Ethernet, and then transmitted to the FPGA through the IIC interface after being processed, the logic code controls and erases the update code bit stream in the FLASH memory inside the FPGA, and the update code is downloaded to the FLASH memory and verified, so that the remote update of the FPGA is realized.
The patent document is transmitted to the FPGA through the IIC interface by the CPU, and can back up the loaded code and check the bit stream of the updated code. The method can only check whether the codes received by the CPU are correct, but whether the codes are legal or not can not be checked.
Patent document CN06843959A (application number: 201710034806.6) discloses an FPGA remote updating device, which includes an FPGA module, an embedded processor remote updating system is disposed inside the FPGA module, the remote updating system includes a communication module and a remote updating module, the communication module is respectively connected with an upper computer and the remote updating module, and the remote updating module is connected with the FPGA module and configured with FLASH. The patent document also correspondingly discloses an FPGA remote updating method, which comprises the following steps: s01, the upper computer sends an appointed program updating instruction to the embedded processor remote updating system, and the remote updating module collects the state of the updating system to determine whether to receive the updating instruction; and S02, when the updating is allowed, the upper computer sends the data frame to the remote updating module for temporary storage of the data frame, and then the updating of the data frame is completed according to the specific time sequence of the configuration FLASH.
The patent document receives an appointed program updating instruction sent by an upper computer through an embedded processor in the FPGA for updating. The method has the risk that the instruction is intercepted and cracked, and once the instruction is obtained, the system can maliciously update wrong firmware.
Disclosure of Invention
Aiming at the defects in the prior art, the invention aims to provide a remote FPGA firmware code updating system, method and medium.
The invention provides a remote FPGA firmware code updating system which is characterized by comprising the following components: the device comprises a remote communication module, an MCU control module, an FPGA module and a FLASH memory;
the remote communication module is connected with the MCU control module, the MCU control module is connected with the FPGA module, and the FPGA module is connected with the FLASH memory;
the FLASH memory is stored with FPGA firmware.
Preferably, the FPGA firmware: the method comprises a check field for the MCU control module to check the validity of the FPGA firmware;
the remote communication module: receiving a firmware updating instruction and the FPGA new firmware, and transmitting the FPGA new firmware to the MCU control module; receiving an updating result from the MCU control module, and recording updating log information according to the updating result;
the MCU control module: analyzing a check field in the received FPGA new firmware, and judging whether the FPGA new firmware is legal or not according to the check field:
if the firmware is legal, the MCU control module removes the check field of the FPGA new firmware, generates the FPGA to-be-updated firmware and transmits the FPGA to-be-updated firmware to the FPGA module; generating an update firmware mark and sending the update firmware mark to the FPGA module to control the FPGA module to be powered on and reset;
otherwise, the remote communication module is informed that the FPGA new firmware is illegal, and the update is abandoned;
the FPGA module: receiving the firmware to be updated and the firmware updating mark of the FPGA from the MCU control module, updating the FPGA firmware in the FLASH memory into the firmware to be updated of the FPGA according to the firmware updating mark, and sending an updating success mark or an updating failure mark to the MCU control module after updating is executed;
the MCU control module: generating an updating result according to the received updating success mark or the received updating failure mark transmitted from the FPGA module, and transmitting the updating result to the remote communication module;
the FLASH memory is characterized in that: storing the FPGA firmware and the firmware to be updated of the FPGA.
Preferably, the firmware update instruction and the FPGA firmware come from a remote terminal.
The invention provides a remote FPGA firmware code updating method, which is characterized by comprising the following steps:
step 1: the remote communication module is used for receiving a firmware updating instruction and the FPGA new firmware, and sending the FPGA new firmware to the MCU control module according to the received firmware updating instruction and the FPGA new firmware;
step 2: after the MCU control module receives the FPGA new firmware, analyzing a check field in the received FPGA new firmware, checking whether the FPGA new firmware is legal or not according to the check field, and if the FPGA new firmware is judged to be legal, continuing to execute the step 3; otherwise, the remote communication module is informed that the FPGA new firmware is illegal, the updating is abandoned, and the process is ended;
and step 3: enabling the MCU control module to remove the check field of the FPGA new firmware, generating the FPGA to-be-updated firmware, and transmitting the FPGA to-be-updated firmware to the FPGA module; generating an update firmware mark and sending the update firmware mark to the FPGA module to control the FPGA module to be powered on and reset;
and 4, step 4: the FPGA module receives the update firmware mark, updates the FPGA firmware in the FLASH memory into the firmware to be updated of the FPGA according to the update firmware mark, judges whether the update is successful or not after the update is finished, and sends an update success mark to the MCU control module if the update is successful; otherwise, sending an update failure mark to the MCU control module;
and 5: if the MCU control module receives the sign that the FPGA is successfully updated, a reset signal is generated to control the FPGA module to reset, an update result is output, and the step 6 is entered for continuous execution;
if the MCU control module receives the sign of FPGA updating failure, judging whether the repeated updating times are larger than a preset value, if so, stopping updating, judging that the updating is failed, outputting an updating result, and entering the step 6 to continue execution; otherwise, adding 1 to the repeated updating times, and returning to the step 4 to continue executing;
step 6: and the MCU control module transmits the updating result to the remote communication module, and the remote communication module records the current updating log.
Preferably, the step 2 includes:
step 2.1: the MCU control module receives the FPGA new firmware sent by the remote communication module;
step 2.2: enabling the MCU control module to extract a check field in the FPGA new firmware according to the preset position and length;
step 2.3: comparing the check field in the extracted FPGA new firmware with a prestored check field prestored in an MCU control module, if the comparison is consistent, judging that the FPGA new firmware is legal, and entering the step 3 to continue execution; otherwise, the remote communication module FPGA is informed that the new firmware is illegal, the update is abandoned, and the process is ended.
According to the invention, a computer readable storage medium storing a computer program is provided, wherein the computer program is configured to implement the steps of any one of the above methods for updating firmware code of a remote FPGA when executed by a processor.
Compared with the prior art, the invention has the following beneficial effects:
1. the MCU control module is used, so that the validity of the firmware can be checked, and the system is prevented from being illegally updated;
2. the verification field is pre-stored in the MCU, so that verification information is prevented from being leaked, and the safety of the whole system is ensured;
3. the MCU control module is used for controlling the FPGA to reset, so that the firmware can take effect without power failure and restarting after updating;
4. the MCU control module can control the power-on time sequence of the FPGA, detect whether the power-on loading of the firmware is successful or not and ensure the reliability of the system.
5. The remote communication module has the function of updating log records, can record each legal and illegal update in detail and is ready for subsequent check.
Drawings
Other features, objects and advantages of the invention will become more apparent upon reading of the detailed description of non-limiting embodiments with reference to the following drawings:
fig. 1 is a schematic structural diagram of a remote FPGA firmware code updating system according to the present invention.
Fig. 2 is a flowchart illustrating a remote FPGA firmware code updating method according to the present invention.
Fig. 3 is a flowchart illustrating step S102 of the remote FPGA firmware code updating method according to the present invention.
Fig. 4 is a flowchart illustrating a remote FPGA firmware code updating method according to a preferred embodiment of the present invention.
Fig. 5 is a schematic firmware verification flow diagram of a remote FPGA firmware code updating method according to a preferred embodiment of the present invention.
Detailed Description
The present invention will be described in detail with reference to specific examples. The following examples will assist those skilled in the art in further understanding the invention, but are not intended to limit the invention in any way. It should be noted that it would be obvious to those skilled in the art that various changes and modifications can be made without departing from the spirit of the invention. All falling within the scope of the present invention.
As shown in fig. 1, the remote FPGA firmware code updating system provided in the present invention includes: the device comprises a remote communication module, an MCU control module, an FPGA module and a FLASH memory;
the remote communication module is connected with the MCU control module, the MCU control module is connected with the FPGA module, and the FPGA module is connected with the FLASH memory;
the FLASH memory is stored with FPGA firmware.
Specifically, the FPGA firmware: the method comprises a check field for the MCU control module to check the validity of the FPGA firmware;
the remote communication module: receiving a firmware updating instruction and the FPGA new firmware, and transmitting the FPGA new firmware to the MCU control module; receiving an updating result from the MCU control module, and recording updating log information according to the updating result;
the MCU control module: analyzing a check field in the received FPGA new firmware, and judging whether the FPGA new firmware is legal or not according to the check field:
if the firmware is legal, the MCU control module removes the check field of the FPGA new firmware, generates the FPGA to-be-updated firmware and transmits the FPGA to-be-updated firmware to the FPGA module; generating an update firmware mark and sending the update firmware mark to the FPGA module to control the FPGA module to be powered on and reset;
otherwise, the remote communication module is informed that the FPGA new firmware is illegal, and the update is abandoned;
the FPGA module: receiving the firmware to be updated and the firmware updating mark of the FPGA from the MCU control module, updating the FPGA firmware in the FLASH memory into the firmware to be updated of the FPGA according to the firmware updating mark, and sending an updating success mark or an updating failure mark to the MCU control module after updating is executed;
the MCU control module: generating an updating result according to the received updating success mark or the received updating failure mark transmitted from the FPGA module, and transmitting the updating result to the remote communication module;
the FLASH memory is characterized in that: storing the FPGA firmware and the firmware to be updated of the FPGA.
Specifically, the firmware updating instruction and the FPGA firmware come from a remote terminal.
The remote FPGA firmware code updating system provided by the invention can be realized through the step flow of the remote FPGA firmware code updating method provided by the invention. The remote FPGA firmware code updating method can be understood as a preferred example of the remote FPGA firmware code updating system by those skilled in the art.
As shown in fig. 2, the method for updating firmware code of remote FPGA according to the present invention includes:
step S101: the remote communication module is used for receiving a firmware updating instruction and the FPGA new firmware, and sending the FPGA new firmware to the MCU control module according to the received firmware updating instruction and the FPGA new firmware;
step S102: after the MCU control module receives the FPGA new firmware, analyzing a check field in the received FPGA new firmware, checking whether the FPGA new firmware is legal according to the check field, and if the FPGA new firmware is judged to be legal, continuing to execute the step S103; otherwise, the remote communication module is informed that the FPGA new firmware is illegal, the updating is abandoned, and the process is ended;
step S103: enabling the MCU control module to remove the check field of the FPGA new firmware, generating the FPGA to-be-updated firmware, and transmitting the FPGA to-be-updated firmware to the FPGA module; generating an update firmware mark and sending the update firmware mark to the FPGA module to control the FPGA module to be powered on and reset;
step S104: the FPGA module receives the update firmware mark, updates the FPGA firmware in the FLASH memory into the firmware to be updated of the FPGA according to the update firmware mark, judges whether the update is successful or not after the update is finished, and sends an update success mark to the MCU control module if the update is successful; otherwise, sending an update failure mark to the MCU control module;
step S105: if the MCU control module receives the sign that the FPGA is successfully updated, a reset signal is generated to control the FPGA module to reset, an update result is output, and the step S106 is entered for continuous execution;
if the MCU control module receives the sign of FPGA updating failure, judging whether the repeated updating times are larger than a preset value, if so, stopping updating, judging that the updating is failed, outputting an updating result, and entering the step S106 to continue execution; otherwise, adding 1 to the repeated updating times, and returning to the step S104 to continue execution;
step S106: and the MCU control module transmits the updating result to the remote communication module, and the remote communication module records the current updating log.
As shown in fig. 3, specifically, the step S102 includes:
step S201: the MCU control module receives the FPGA new firmware sent by the remote communication module;
step S202: enabling the MCU control module to extract a check field in the FPGA new firmware according to the preset position and length;
step S203: comparing the check field in the extracted FPGA new firmware with a prestored check field prestored in an MCU control module, if the comparison is consistent, judging that the FPGA new firmware is legal, and entering step S103 to continue execution; otherwise, the remote communication module FPGA is informed that the new firmware is illegal, the update is abandoned, and the process is ended.
According to the present invention, there is provided a computer readable storage medium storing a computer program which, when executed by a processor, implements the steps of any of the above-described remote FPGA firmware code updating methods.
The present invention will be described in more detail below by way of preferred examples.
Example 1:
as shown in fig. 4 and 5, a system for updating a remote FPGA firmware code includes an FPGA firmware with a check field (hereinafter referred to as FPGA firmware), a remote communication module, an MCU control module, an FPGA module, and a FLASH memory.
The FPGA firmware comprises a check field for providing the validity check of the firmware.
And the remote communication module is used for receiving the command and the firmware file sent by the remote terminal, sending the firmware file to the MCU control module, receiving and sending the command returned by the MCU, and recording the update log information each time.
And the MCU control module is used for analyzing the received check field in the FPGA firmware, checking the validity of the firmware and controlling the FPGA module to be powered on and reset.
And the FPGA module is used for receiving the firmware which is verified by the MCU and solidifying the firmware into the FLASH memory.
And the FLASH memory is used for storing the FPGA firmware.
The remote communication module, the remote terminal and the MCU control
The MCU control module is connected with the FPGA module, and the FPGA module is connected with the FLASH memory.
The invention also provides an updating and checking method based on the remote updating FPGA firmware system, which comprises the following steps:
step 1: the remote terminal sends a firmware updating instruction and new firmware to the remote communication module, and the remote communication module starts to receive the FPGA new firmware and sends the new firmware to the MCU control module after receiving the firmware updating instruction;
step 2: after receiving the new firmware, the MCU control module analyzes the field and verifies the validity of the new firmware;
and step 3: after the firmware is legal, generating new firmware with the check field removed, transmitting the new firmware to the FPGA, and generating a firmware updating mark;
and 4, step 4: the FPGA receives the firmware updating mark, starts to update the FLASH firmware, and informs the MCU control module after the updating is finished;
and 5: if the MCU receives the sign that the FPGA is successfully updated, a reset signal is generated, and the FPGA is actively reset; if the MCU receives the sign of the failure of the FPGA updating, the step 4 is repeatedly executed until the updating operation is finished or the preset repeated updating times are reached, and the updating is stopped;
step 6: and the MCU returns the updating result to the remote communication module, and the remote communication module records the current updating log.
Wherein, step 2 includes the following steps:
step 2.1: and the MCU control module receives the new firmware sent by the remote communication module.
Step 2.2: the MCU control module extracts a check field in the firmware according to the appointed position and length;
step 2.3: comparing the extracted check field with a check field pre-stored in an MCU control module, if the comparison is passed, generating an update firmware mark by the MCU, and informing the FPGA to update the FLASH firmware; if the comparison fails, the remote communication module is informed that the firmware is illegal, and the update is abandoned.
Those skilled in the art will appreciate that, in addition to implementing the systems, apparatus, and various modules thereof provided by the present invention in purely computer readable program code, the same procedures can be implemented entirely by logically programming method steps such that the systems, apparatus, and various modules thereof are provided in the form of logic gates, switches, application specific integrated circuits, programmable logic controllers, embedded microcontrollers and the like. Therefore, the system, the device and the modules thereof provided by the present invention can be considered as a hardware component, and the modules included in the system, the device and the modules thereof for implementing various programs can also be considered as structures in the hardware component; modules for performing various functions may also be considered to be both software programs for performing the methods and structures within hardware components.
The foregoing description of specific embodiments of the present invention has been presented. It is to be understood that the present invention is not limited to the specific embodiments described above, and that various changes or modifications may be made by one skilled in the art within the scope of the appended claims without departing from the spirit of the invention. The embodiments and features of the embodiments of the present application may be combined with each other arbitrarily without conflict.
Claims (4)
1. A remote FPGA firmware code update system, comprising: the device comprises a remote communication module, an MCU control module, an FPGA module and a FLASH memory;
the remote communication module is connected with the MCU control module, the MCU control module is connected with the FPGA module, and the FPGA module is connected with the FLASH memory;
the FLASH memory stores FPGA firmware;
the FPGA firmware: the method comprises a check field for the MCU control module to check the validity of the FPGA firmware;
the remote communication module: receiving a firmware updating instruction and the FPGA new firmware, and transmitting the FPGA new firmware to the MCU control module; receiving an updating result from the MCU control module, and recording updating log information according to the updating result;
the MCU control module: receiving the FPGA new firmware sent by the remote communication module, and extracting a check field in the FPGA new firmware according to a preset position and length; comparing the check field in the extracted FPGA new firmware with a prestored check field prestored in an MCU control module, and if the check fields are consistent, judging that the FPGA new firmware is legal; otherwise, notifying the remote communication module FPGA that the new firmware is illegal;
if the firmware is legal, the MCU control module removes the check field of the FPGA new firmware, generates the FPGA to-be-updated firmware and transmits the FPGA to-be-updated firmware to the FPGA module; generating an update firmware mark and sending the update firmware mark to the FPGA module to control the FPGA module to be powered on and reset;
otherwise, the remote communication module is informed that the FPGA new firmware is illegal, and the update is abandoned;
the FPGA module: receiving the firmware to be updated and the firmware updating mark of the FPGA from the MCU control module, updating the FPGA firmware in the FLASH memory into the firmware to be updated of the FPGA according to the firmware updating mark, and sending an updating success mark or an updating failure mark to the MCU control module after updating is executed;
the MCU control module: generating an updating result according to the received updating success mark or the received updating failure mark transmitted from the FPGA module, and transmitting the updating result to the remote communication module;
the FLASH memory is characterized in that: storing the FPGA firmware and the firmware to be updated of the FPGA.
2. The remote FPGA firmware code update system of claim 1, wherein the firmware update instructions and FPGA firmware are from a remote terminal.
3. A method for updating firmware codes of a remote FPGA is characterized by comprising the following steps:
step 1: the remote communication module is used for receiving a firmware updating instruction and the FPGA new firmware, and sending the FPGA new firmware to the MCU control module according to the received firmware updating instruction and the FPGA new firmware;
step 2: after the MCU control module receives the FPGA new firmware, analyzing a check field in the received FPGA new firmware, checking whether the FPGA new firmware is legal or not according to the check field, and if the FPGA new firmware is judged to be legal, continuing to execute the step 3; otherwise, the remote communication module is informed that the FPGA new firmware is illegal, the updating is abandoned, and the process is ended;
and step 3: enabling the MCU control module to remove the check field of the FPGA new firmware, generating the FPGA to-be-updated firmware, and transmitting the FPGA to-be-updated firmware to the FPGA module; generating an update firmware mark and sending the update firmware mark to the FPGA module to control the FPGA module to be powered on and reset;
and 4, step 4: the FPGA module receives the update firmware mark, updates the FPGA firmware in the FLASH memory into the firmware to be updated of the FPGA according to the update firmware mark, judges whether the update is successful or not after the update is finished, and sends an update success mark to the MCU control module if the update is successful; otherwise, sending an update failure mark to the MCU control module;
and 5: if the MCU control module receives the sign that the FPGA is successfully updated, a reset signal is generated to control the FPGA module to reset, an update result is output, and the step 6 is entered for continuous execution;
if the MCU control module receives the sign of FPGA updating failure, judging whether the repeated updating times are larger than a preset value, if so, stopping updating, judging that the updating is failed, outputting an updating result, and entering the step 6 to continue execution; otherwise, adding 1 to the repeated updating times, and returning to the step 4 to continue executing;
step 6: the MCU control module transmits the updating result to the remote communication module, and the remote communication module records the current updating log;
the step 2 comprises the following steps:
step 2.1: the MCU control module receives the FPGA new firmware sent by the remote communication module;
step 2.2: enabling the MCU control module to extract a check field in the FPGA new firmware according to the preset position and length;
step 2.3: comparing the check field in the extracted FPGA new firmware with a prestored check field prestored in an MCU control module, if the comparison is consistent, judging that the FPGA new firmware is legal, and entering the step 3 to continue execution; otherwise, the remote communication module FPGA is informed that the new firmware is illegal, the update is abandoned, and the process is ended.
4. A computer-readable storage medium storing a computer program, wherein the computer program, when executed by a processor, performs the steps of the remote FPGA firmware code updating method of claim 3.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811070265.3A CN109408099B (en) | 2018-09-13 | 2018-09-13 | Remote FPGA firmware code updating system, method and medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811070265.3A CN109408099B (en) | 2018-09-13 | 2018-09-13 | Remote FPGA firmware code updating system, method and medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109408099A CN109408099A (en) | 2019-03-01 |
CN109408099B true CN109408099B (en) | 2021-11-09 |
Family
ID=65464863
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811070265.3A Active CN109408099B (en) | 2018-09-13 | 2018-09-13 | Remote FPGA firmware code updating system, method and medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109408099B (en) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110515773A (en) * | 2019-08-27 | 2019-11-29 | 北京中科晶上科技股份有限公司 | Update method and device, the system of configuration file |
CN110806887A (en) * | 2019-10-29 | 2020-02-18 | 华工正源智能终端(孝感)有限公司 | Software security upgrading method and device |
CN114003294B (en) * | 2021-09-18 | 2023-08-29 | 苏州浪潮智能科技有限公司 | Remote startup and shutdown and firmware updating device, server, system, method and medium |
Family Cites Families (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102866900B (en) * | 2012-08-03 | 2016-04-13 | 浙江昱能科技有限公司 | Upgrade the method and system of the configurator of control system |
CN105955783A (en) * | 2016-05-09 | 2016-09-21 | 浙江大学 | Method for downloading remote FPGA logic codes on basis of FPGA control |
CN106843959A (en) * | 2017-01-18 | 2017-06-13 | 株洲变流技术国家工程研究中心有限公司 | A kind of FPGA remotely updating devices and method |
CN106886438A (en) * | 2017-02-06 | 2017-06-23 | 仓智(上海)智能科技有限公司 | System remote update method based on FPGA |
CN107465542A (en) * | 2017-08-01 | 2017-12-12 | 郑州云海信息技术有限公司 | A kind of remote management FPGA method and system |
CN107608700A (en) * | 2017-10-16 | 2018-01-19 | 浪潮(北京)电子信息产业有限公司 | A kind of update method, device and the medium of FPGA firmwares |
CN108255505A (en) * | 2018-01-10 | 2018-07-06 | 浪潮(北京)电子信息产业有限公司 | A kind of firmware update, device, equipment and computer readable storage medium |
CN108875318A (en) * | 2018-05-28 | 2018-11-23 | 哈尔滨工程大学 | A kind of FPGA property right protection and remote update system and its method based on MCU |
-
2018
- 2018-09-13 CN CN201811070265.3A patent/CN109408099B/en active Active
Also Published As
Publication number | Publication date |
---|---|
CN109408099A (en) | 2019-03-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109408099B (en) | Remote FPGA firmware code updating system, method and medium | |
US9027014B2 (en) | Updating firmware compatibility data | |
CN107733847B (en) | Method and device for platform login website, computer equipment and readable storage medium | |
CN106873990B (en) | Multi-partition guiding method under embedded system RAM damage mode | |
US9696988B2 (en) | Upgrade processing method, apparatus and system for CPLD | |
CN104881283A (en) | Method and system for obtaining root privilege of terminal device based on android | |
CN106897166B (en) | Mobile terminal and repairing method thereof | |
CN101853171A (en) | On-line upgrade method and device of complicated programmable logical device | |
CN107729196B (en) | Smart card power-off test method | |
KR20170067826A (en) | Updating of firmware | |
CN111258591A (en) | Program deployment task execution method and device, computer equipment and storage medium | |
US20160103688A1 (en) | Method of Starting Computing System | |
CN111090443A (en) | Method, equipment and storage medium for guaranteeing safe upgrade of linux system | |
WO2018049798A1 (en) | Method and apparatus for reconstructing cache partition | |
CN114116170A (en) | Timed task execution method and device, computer equipment and storage medium | |
US20160328312A1 (en) | Enhanced stability of automation execution via use of state machine pattern and expected conditions when executing an action on an application element | |
CN111273928B (en) | Bootloader design method for self-upgrading | |
CN113741934A (en) | Inverter program upgrading method | |
CN114793196B (en) | Firmware upgrading method, device, equipment and storage medium | |
CN105791514B (en) | Application starting monitoring method and device | |
CN104239781A (en) | Method and unit for preventing processes from being injected | |
CN111930579A (en) | Test machine deployment permission verification method and device, computer equipment and storage medium | |
CN109002317B (en) | PCBA firmware upgrading method and system and PCBA | |
CN109428936B (en) | APP upgrading method, device, system, electronic equipment and storage medium | |
US9529581B2 (en) | Circuit and method for writing program codes of basic input/output system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |