CN111240713A - Method for detecting remote breakpoint continuous transmission through power utilization - Google Patents

Method for detecting remote breakpoint continuous transmission through power utilization Download PDF

Info

Publication number
CN111240713A
CN111240713A CN201911385293.9A CN201911385293A CN111240713A CN 111240713 A CN111240713 A CN 111240713A CN 201911385293 A CN201911385293 A CN 201911385293A CN 111240713 A CN111240713 A CN 111240713A
Authority
CN
China
Prior art keywords
firmware data
information
firmware
equipment
transmission
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201911385293.9A
Other languages
Chinese (zh)
Inventor
梁昆
王观亮
王利强
钱伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Tpson Technology Co ltd
Original Assignee
Hangzhou Tpson Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Tpson Technology Co ltd filed Critical Hangzhou Tpson Technology Co ltd
Priority to CN201911385293.9A priority Critical patent/CN111240713A/en
Publication of CN111240713A publication Critical patent/CN111240713A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/60Software deployment
    • G06F8/65Updates
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/70Software maintenance or management
    • G06F8/71Version control; Configuration management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/06Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/34Network arrangements or protocols for supporting network services or applications involving the movement of software or configuration parameters 

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Stored Programmes (AREA)

Abstract

The invention relates to a method for detecting remote breakpoint continuous transmission by using electricity, which comprises the steps that an equipment side requests firmware information, a platform side verifies that the request is legal and returns acceptance information, the equipment side presets a storage space, the platform side transmits processed firmware data to the equipment side based on convention, if transmission is interrupted, whether updating exists or not needs to be confirmed when transmission is restarted, if yes, the firmware data returns, otherwise, breakpoint continuous transmission is performed, the equipment side obtains the updated complete firmware data, if verification is passed, success information is returned, otherwise, retransmission of part of the firmware data is requested, and only the part needs to be transmitted and downloaded. The embedded equipment of the invention is restarted when the upgrading process fails, the segment of the firmware can be downloaded from the disconnected part, the new content is received when the upgrading is restarted each time, the downloaded content is continuously kept, the problem of breakpoint continuous transmission in the remote upgrading process is solved, the upgrading success rate of the embedded equipment is improved, and the embedded equipment has positive use significance for low power consumption, remote upgrading and configuration issuing of wireless equipment and the like.

Description

Method for detecting remote breakpoint continuous transmission through power utilization
Technical Field
The invention relates to the technical field of telecommunication technology, in particular to a method for detecting remote breakpoint continuous transmission by using electricity.
Background
With the development of electronic technology, communication technology and computer technology, embedded systems are widely used in various fields, whereas the requirements for system functions, performance and scale of embedded devices are increasing day by day, in the development and design of embedded software, the application of program online upgrade or remote firmware update is often involved, and developers must be able to maintain and upgrade the systems in time according to the requirements of clients, prolong the service life of the systems and improve the performance of the systems.
In the prior art, remote downloading and firmware upgrading based on an embedded small-capacity storage device are generally performed in a full-download mode or a differential-download mode, the total size of basic firmware at an upgrading device end is from tens to hundreds of K, the general design is that the full-download mode is adopted, the execution is required to be started from the beginning again after a single download failure, and the downloaded content is cleared or covered.
This mode of operation is simple and reliable to implement and is widely applicable, however, its drawbacks are also very significant, including:
(1) under the wireless communication scene of adopting NB, 2G and the like, the downloading scheme is easy to have the problem of downloading failure, and based on the problem, the normal upgrading can not be realized for a long time;
(2) if the download module is used on a low-power-consumption device powered by a battery, the power supply service life of the battery is greatly influenced by multiple download failures;
(3) the working efficiency is low.
Disclosure of Invention
The invention solves the problems that the full download is simple to realize, but the failure rate is high, the service life of an external power supply is influenced, and the working efficiency is low in the prior art, and provides an optimized method for detecting the remote breakpoint continuous transmission of the power consumption.
The technical scheme adopted by the invention is that the method for detecting the remote breakpoint continuous transmission by using electricity comprises the following steps:
step 1: requesting firmware information by the equipment side;
step 2: the platform side obtains the request information, if the request is legal, the platform side returns the acceptance information and carries out the next step, otherwise, the platform side returns the rejection information and returns to the step 1;
and step 3: the equipment side presets a storage space based on the receiving information;
and 4, step 4: the platform side processes the firmware data and transmits the processed firmware data to the equipment side based on the convention;
and 5: if the transmission is not interrupted, the transmission is continued; if transmission interruption exists, judging whether the firmware data has new updating after restarting, if so, returning to the step 1, otherwise, resuming transmission at the breakpoint; until the updated complete firmware data is obtained;
step 6: after the equipment side obtains the updated complete firmware data, checking is carried out, if the checking is passed, successful information is returned, the connection is disconnected, and if not, the next step is carried out;
and 7: based on the information that the verification fails, the equipment side requests to retransmit part of the firmware data;
and 8: and the platform side transmits part of the firmware data to the equipment side based on the convention, and the step 5 is carried out.
Preferably, in step 1, the equipment side sends a request, where the request includes the latest update time, version number, and equipment side ID of the equipment side.
Preferably, in step 2, if the device ID is a trusted ID and the latest update time of the device is earlier than the latest update time of the firmware corresponding to the version number, the request is legal.
Preferably, the acceptance information includes a firmware data amount and a slice number.
Preferably, the step 4 comprises the steps of:
step 4.1: the platform side processes the firmware data, fragments the firmware data, and arranges all fragments in sequence;
step 4.2: any one of the fragments is provided with an independent identifier;
step 4.3: setting a check character string for each fragment;
step 4.4: and transmitting the processed firmware data to the device side in the form of a plurality of fragments.
Preferably, in the step 4.2, the independent identifier is the time and version number of the current fragment when the update occurs.
Preferably, in step 4.3, any check string is encrypted, and the key is a contract.
Preferably, in the step 5, if the independent identifier on the segment is the same as the corresponding segment which is recorded by the device and updated last time, the receiving is not performed, otherwise, the current segment is received; until all the slices are received.
Preferably, in step 7, the retransmitted part of the firmware data is several fragments of the firmware data starting from the fragment for which the check is faulty.
Preferably, the number of retransmissions is provided with a threshold.
The invention relates to an optimized method for detecting remote breakpoint continuous transmission by using electricity, which comprises the steps that an equipment side requests firmware information, a platform side returns received information after verifying that the request is legal, the equipment side presets a storage space based on the received information, the platform side transmits processed firmware data to the equipment side based on convention, if transmission interruption occurs, whether updating exists or not needs to be confirmed when transmission is restarted, if yes, the firmware information returns, otherwise, the breakpoint continuous transmission is performed, the equipment side returns successful information after obtaining the updated complete firmware data, otherwise, retransmission of part of the firmware data is requested based on information that the verification fails, and then only the part which does not pass needs to be transmitted and downloaded.
In the upgrading process of the embedded equipment end, after failure occurs, the equipment is restarted, then the fragments of the firmware can be downloaded from the disconnected part again, the new content is ensured to be received when the upgrading is restarted each time, and the downloaded content is continuously kept, so that the problem of breakpoint continuous transmission in the remote upgrading process of the embedded equipment is solved, the upgrading success rate of the embedded equipment is improved, and the embedded equipment end has positive use significance for low power consumption, remote upgrading and configuration issuing of wireless equipment and the like.
Drawings
FIG. 1 is a flow chart of the present invention.
Detailed Description
The present invention is described in further detail with reference to the following examples, but the scope of the present invention is not limited thereto.
The invention relates to a method for detecting remote breakpoint continuous transmission by using electricity, which comprises the following steps.
Step 1: the device side requests firmware information.
In the step 1, the equipment side sends a request, where the request includes the latest update time, version number, and equipment side ID.
In the invention, in fact, matching between the locally recorded information and the push information of the platform side should be required to be strictly consistent, when the source file of the platform side is changed, the device side should re-import and re-download the changed file, and clear the downloaded file part of the device side.
In the invention, the equipment side can actively send the request after detecting the updated information, or send the request after the platform side sends the notice.
In the invention, the latest updating time in the request is corresponding to the version number, thereby reducing the situation of error transmission and saving space.
Step 2: and (3) the platform side acquires the request information, if the request is legal, the platform side returns the acceptance information and carries out the next step, otherwise, the platform side returns the rejection information and returns to the step 1.
In step 2, if the device side ID is a trusted ID and the latest update time of the device side is earlier than the latest update time of the firmware corresponding to the version number, the request is legal.
The acceptance information includes the firmware data volume and the number of fragments.
And step 3: and the equipment side presets a storage space based on the acceptance information.
In the invention, the received information comprises the data volume and the fragment number of the firmware, and the amount of the space required to be reserved and the fragments expected to be received on the equipment side are prompted, so that the subsequent checking is convenient.
And 4, step 4: the platform side processes the firmware data and transmits the processed firmware data to the equipment side based on the convention.
The step 4 comprises the following steps:
step 4.1: the platform side processes the firmware data, fragments the firmware data, and arranges all fragments in sequence;
step 4.2: any one of the fragments is provided with an independent identifier;
in the step 4.2, the independent identifier is the time and version number of the current fragment when the current fragment is updated.
Step 4.3: setting a check character string for each fragment;
in the step 4.3, any check character string is encrypted, and the secret key is appointed.
Step 4.4: and transmitting the processed firmware data to the device side in the form of a plurality of fragments.
In the invention, serial numbers exist among the fragments, the serial numbers refer to the arrangement of the fragments from 0 to n, and n is the total number of the fragments.
In the invention, the independent identification means that although the whole firmware package is transmitted, actually, the update may only occur on some fragments, and the rest fragments are not changed, and the update time and the version number of the fragments are marked, so that a large amount of time and space can be saved for subsequent downloading.
In the invention, the check character string is used for the subsequent comparison check, and the key, namely the encryption logic is appointed.
And 5: if the transmission is not interrupted, the transmission is continued; if transmission interruption exists, judging whether the firmware data has new updating after restarting, if so, returning to the step 1, otherwise, resuming transmission at the breakpoint; until updated complete firmware data is obtained.
In the step 5, if the independent identifier on the fragment is the same as the corresponding fragment which is recorded by the device and updated last time, the fragment is not received, otherwise, the current fragment is received; until all the slices are received.
In the step 5, if the independent identifier on the fragment is the same as the corresponding fragment which is recorded by the device and updated last time, the fragment is not received, otherwise, the current fragment is received; until all the slices are received.
In the invention, breakpoint resuming refers to that transmission is resumed from the interrupted segment.
In the invention, in fact, when the updating time and the version number of the transmitted fragment are consistent with those of the equipment end, the fragment can be skipped over completely without downloading.
In the invention, further, when transmission interruption exists, the equipment terminal is allowed to re-request the firmware information after restarting, but the acquired data needs to be matched with the data recorded by the equipment terminal;
if the upgrade record information recorded locally by the equipment end is completely consistent with the received upgrade information and indicates that no further update exists after disconnection, the equipment end requests the fragment firmware again from the disconnection position until all downloads are completed, and then the step 5 is carried out;
if the newly acquired information such as the firmware version information, the length information or the fragment number is inconsistent with the local record information of the equipment terminal, the updating is indicated after the disconnection, so that the local record information is cleared, the step 1 is returned, and the fragment data is acquired again.
Step 6: and after the equipment side obtains the updated complete firmware data, verifying, if the verification is passed, returning success information, and disconnecting, otherwise, carrying out the next step.
In the present invention, the verification in step 6 is obviously to verify the aforementioned verification string.
And 7: based on the information that the verification fails, the device side requests retransmission of part of the firmware data.
In step 7, the retransmitted part of the firmware data is a plurality of fragments of the firmware data starting from the fragment in which the verification is erroneous.
The number of retransmissions is provided with a threshold.
In the invention, the re-request is delayed after single acquisition failure, but the maximum retransmission number should be set for retransmission, and if the transmission is unsuccessful all the time, the communication relationship between the two ends should be judged.
And 7: and the platform side transmits part of the firmware data to the equipment side based on the convention, and the step 5 is carried out.
In the invention, an equipment side requests firmware information, a platform side returns acceptance information after verifying that the request is legal, the equipment side firstly presets a storage space based on the acceptance information, the platform side transmits processed firmware data to the equipment side based on convention, if transmission interruption occurs, whether updating exists needs to be confirmed when transmission is restarted, if yes, the firmware data returns, otherwise, transmission is continued at a breakpoint, the equipment side returns successful information after obtaining the updated complete firmware data, otherwise, retransmission of partial firmware data is requested based on the information which is not verified, and then only the part which is not successfully transmitted needs to be transmitted and downloaded.
In the upgrading process of the embedded equipment end, after failure occurs, the equipment is restarted, then the fragments of the firmware can be downloaded from the disconnected part again, the new content is ensured to be received when the upgrading is restarted each time, and the downloaded content is continuously kept, so that the problem of breakpoint continuous transmission in the remote upgrading process of the embedded equipment is solved, the upgrading success rate of the embedded equipment is improved, and the embedded equipment end has positive use significance for low power consumption, remote upgrading and configuration issuing of wireless equipment and the like.

Claims (10)

1. A method for detecting remote breakpoint continuous transmission by using electricity is characterized in that: the method comprises the following steps:
step 1: requesting firmware information by the equipment side;
step 2: the platform side obtains the request information, if the request is legal, the platform side returns the acceptance information and carries out the next step, otherwise, the platform side returns the rejection information and returns to the step 1;
and step 3: the equipment side presets a storage space based on the receiving information;
and 4, step 4: the platform side processes the firmware data and transmits the processed firmware data to the equipment side based on the convention;
and 5: if the transmission is not interrupted, the transmission is continued; if transmission interruption exists, judging whether the firmware data has new updating after restarting, if so, returning to the step 1, otherwise, resuming transmission at the breakpoint; until the updated complete firmware data is obtained;
step 6: after the equipment side obtains the updated complete firmware data, checking is carried out, if the checking is passed, successful information is returned, the connection is disconnected, and if not, the next step is carried out;
and 7: based on the information that the verification fails, the equipment side requests to retransmit part of the firmware data;
and 8: and the platform side transmits part of the firmware data to the equipment side based on the convention, and the step 5 is carried out.
2. The method for detecting remote breakpoint resume with electricity according to claim 1, wherein: in the step 1, the equipment side sends a request, where the request includes the latest update time, version number, and equipment side ID.
3. The method for detecting remote breakpoint resume with electricity according to claim 2, wherein: in step 2, if the device side ID is a trusted ID and the latest update time of the device side is earlier than the latest update time of the firmware corresponding to the version number, the request is legal.
4. The method for detecting remote breakpoint resume with electricity according to claim 3, wherein: the acceptance information includes the firmware data volume and the number of fragments.
5. The method for detecting remote breakpoint resume with electricity according to claim 1, wherein: the step 4 comprises the following steps:
step 4.1: the platform side processes the firmware data, fragments the firmware data, and arranges all fragments in sequence;
step 4.2: any one of the fragments is provided with an independent identifier;
step 4.3: setting a check character string for each fragment;
step 4.4: and transmitting the processed firmware data to the device side in the form of a plurality of fragments.
6. The method for detecting remote breakpoint resume with electricity according to claim 5, wherein: in the step 4.2, the independent identifier is the time and version number of the current fragment when the current fragment is updated.
7. The method for detecting remote breakpoint resume with electricity according to claim 5, wherein: in the step 4.3, any check character string is encrypted, and the secret key is appointed.
8. The method for detecting remote breakpoint resume with electricity according to claim 5, wherein: in the step 5, if the independent identifier on the fragment is the same as the corresponding fragment which is recorded by the device and updated last time, the fragment is not received, otherwise, the current fragment is received; until all the slices are received.
9. The method for detecting remote breakpoint resume with electricity according to claim 1, wherein: in step 7, the retransmitted part of the firmware data is a plurality of fragments of the firmware data starting from the fragment in which the verification is erroneous.
10. The method for detecting remote breakpoint resume with electricity according to claim 9, wherein: the number of retransmissions is provided with a threshold.
CN201911385293.9A 2019-12-28 2019-12-28 Method for detecting remote breakpoint continuous transmission through power utilization Pending CN111240713A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911385293.9A CN111240713A (en) 2019-12-28 2019-12-28 Method for detecting remote breakpoint continuous transmission through power utilization

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911385293.9A CN111240713A (en) 2019-12-28 2019-12-28 Method for detecting remote breakpoint continuous transmission through power utilization

Publications (1)

Publication Number Publication Date
CN111240713A true CN111240713A (en) 2020-06-05

Family

ID=70864975

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911385293.9A Pending CN111240713A (en) 2019-12-28 2019-12-28 Method for detecting remote breakpoint continuous transmission through power utilization

Country Status (1)

Country Link
CN (1) CN111240713A (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112181454A (en) * 2020-09-21 2021-01-05 西安微电子技术研究所 Remote upgrading system and method for unattended equipment
CN112256297A (en) * 2020-09-24 2021-01-22 苏宁智能终端有限公司 Bluetooth peripheral firmware upgrading method and system and mobile phone terminal
CN113219872A (en) * 2021-05-10 2021-08-06 安徽大学 Remote upgrading method of monitoring system of refrigerator car based on real-time perception
CN113553281A (en) * 2021-07-23 2021-10-26 深圳市警威警用装备有限公司 Data acquisition method and device and 5G intelligent data acquisition workstation
CN113612804A (en) * 2021-10-08 2021-11-05 江铃汽车股份有限公司 Vehicle configuration upgrading method and system, storage medium and intelligent gateway
CN114637987A (en) * 2022-05-18 2022-06-17 广州万协通信息技术有限公司 Security chip firmware downloading method and system based on platform verification
CN115021873A (en) * 2022-06-13 2022-09-06 浙江大华技术股份有限公司 Data retransmission method and device and electronic equipment
CN115118718A (en) * 2022-08-30 2022-09-27 深圳市华曦达科技股份有限公司 Android terminal device upgrade updating method and system and readable storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105487894A (en) * 2015-11-27 2016-04-13 浪潮软件集团有限公司 Remote updating method of distributed software system
CN109240721A (en) * 2018-08-24 2019-01-18 江苏恒宝智能系统技术有限公司 A kind of method of MCU online upgrading
CN110399149A (en) * 2019-06-26 2019-11-01 杭州智缤科技有限公司 A kind of remote upgrade method under low-power consumption scene
CN110474977A (en) * 2019-08-13 2019-11-19 北京百佑科技有限公司 Firmware upgrade method, firmware upgrade system and the intelligent door lock of intelligent door lock

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105487894A (en) * 2015-11-27 2016-04-13 浪潮软件集团有限公司 Remote updating method of distributed software system
CN109240721A (en) * 2018-08-24 2019-01-18 江苏恒宝智能系统技术有限公司 A kind of method of MCU online upgrading
CN110399149A (en) * 2019-06-26 2019-11-01 杭州智缤科技有限公司 A kind of remote upgrade method under low-power consumption scene
CN110474977A (en) * 2019-08-13 2019-11-19 北京百佑科技有限公司 Firmware upgrade method, firmware upgrade system and the intelligent door lock of intelligent door lock

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112181454A (en) * 2020-09-21 2021-01-05 西安微电子技术研究所 Remote upgrading system and method for unattended equipment
CN112181454B (en) * 2020-09-21 2023-04-07 西安微电子技术研究所 Remote upgrading system and method for unattended equipment
CN112256297A (en) * 2020-09-24 2021-01-22 苏宁智能终端有限公司 Bluetooth peripheral firmware upgrading method and system and mobile phone terminal
CN113219872A (en) * 2021-05-10 2021-08-06 安徽大学 Remote upgrading method of monitoring system of refrigerator car based on real-time perception
CN113553281A (en) * 2021-07-23 2021-10-26 深圳市警威警用装备有限公司 Data acquisition method and device and 5G intelligent data acquisition workstation
CN113612804A (en) * 2021-10-08 2021-11-05 江铃汽车股份有限公司 Vehicle configuration upgrading method and system, storage medium and intelligent gateway
CN113612804B (en) * 2021-10-08 2021-12-14 江铃汽车股份有限公司 Vehicle configuration upgrading method and system, storage medium and intelligent gateway
CN114637987A (en) * 2022-05-18 2022-06-17 广州万协通信息技术有限公司 Security chip firmware downloading method and system based on platform verification
CN114637987B (en) * 2022-05-18 2022-08-12 广州万协通信息技术有限公司 Security chip firmware downloading method and system based on platform verification
CN115021873A (en) * 2022-06-13 2022-09-06 浙江大华技术股份有限公司 Data retransmission method and device and electronic equipment
CN115118718A (en) * 2022-08-30 2022-09-27 深圳市华曦达科技股份有限公司 Android terminal device upgrade updating method and system and readable storage medium

Similar Documents

Publication Publication Date Title
CN111240713A (en) Method for detecting remote breakpoint continuous transmission through power utilization
CN102546784B (en) Method for conducting batch upgrading for device firmware based on controller area network (CAN) bus
CN107239288B (en) Version upgrading method and device for mobile terminal
CN110704077A (en) Firmware remote upgrading method and device, terminal, mobile device and storage medium
TWI518595B (en) Method and system of software update and mobile device
CN102510409A (en) Method and system for quickly and remotely updating program of mobile terminal by using wireless network
CN106843957A (en) System firmware upgrade method and device
CN110621011A (en) OTA firmware upgrading method and system based on Bluetooth device end
WO2011006328A1 (en) System and method for updating device firmware, device management server and mobile terminal
CN109391673A (en) A kind of method, system and the terminal device of management update file
US10469620B2 (en) Method for transferring a new software version to at least one electricity meter via a communication network
US20100077024A1 (en) Method for transmitting data transmitted incompletely between server and client
CN110633097A (en) OTA (over the air) upgrading method and device for single chip microcomputer
WO2011153771A1 (en) System and method for remotely upgrading machine to machine (m2m) terminal
CN113721966A (en) Node upgrading method and device, storage medium and electronic device
WO2022257927A1 (en) Key burning method and apparatus, electronic device board card, and storage medium
WO2017124736A1 (en) Method, device and system for transmitting upgrade abnormality information
KR101200025B1 (en) System for updating firmware of remote mobile equipment using wireless communication network, and method thereof
CN110045969B (en) Application program installation method, server, system, device and storage medium
KR102034427B1 (en) IoT Device and It's Firmware Update Method
CN110233906A (en) A kind of OTA Engine Version update method and system, storage medium and OTA terminal
US11397571B2 (en) Method and apparatus for remotely updating satellite devices
CN114268614A (en) Equipment firmware upgrading method, device and system
CN116450180A (en) Remote upgrading method for terminal equipment
CN113971287A (en) LoRa communication-based batch upgrading method and upgrading system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20200605