CN111240713A - Method for detecting remote breakpoint continuous transmission through power utilization - Google Patents
Method for detecting remote breakpoint continuous transmission through power utilization Download PDFInfo
- Publication number
- CN111240713A CN111240713A CN201911385293.9A CN201911385293A CN111240713A CN 111240713 A CN111240713 A CN 111240713A CN 201911385293 A CN201911385293 A CN 201911385293A CN 111240713 A CN111240713 A CN 111240713A
- Authority
- CN
- China
- Prior art keywords
- firmware data
- information
- firmware
- equipment
- transmission
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 230000005540 biological transmission Effects 0.000 title claims abstract description 37
- 238000000034 method Methods 0.000 title claims abstract description 31
- 230000005611 electricity Effects 0.000 claims abstract description 15
- 238000012795 verification Methods 0.000 claims abstract description 10
- 239000012634 fragment Substances 0.000 claims description 55
- 238000005516 engineering process Methods 0.000 description 4
- 238000004891 communication Methods 0.000 description 3
- 238000013461 design Methods 0.000 description 2
- 238000011161 development Methods 0.000 description 2
- 230000003111 delayed effect Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/60—Software deployment
- G06F8/65—Updates
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/70—Software maintenance or management
- G06F8/71—Version control; Configuration management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/06—Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/34—Network arrangements or protocols for supporting network services or applications involving the movement of software or configuration parameters
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Stored Programmes (AREA)
Abstract
The invention relates to a method for detecting remote breakpoint continuous transmission by using electricity, which comprises the steps that an equipment side requests firmware information, a platform side verifies that the request is legal and returns acceptance information, the equipment side presets a storage space, the platform side transmits processed firmware data to the equipment side based on convention, if transmission is interrupted, whether updating exists or not needs to be confirmed when transmission is restarted, if yes, the firmware data returns, otherwise, breakpoint continuous transmission is performed, the equipment side obtains the updated complete firmware data, if verification is passed, success information is returned, otherwise, retransmission of part of the firmware data is requested, and only the part needs to be transmitted and downloaded. The embedded equipment of the invention is restarted when the upgrading process fails, the segment of the firmware can be downloaded from the disconnected part, the new content is received when the upgrading is restarted each time, the downloaded content is continuously kept, the problem of breakpoint continuous transmission in the remote upgrading process is solved, the upgrading success rate of the embedded equipment is improved, and the embedded equipment has positive use significance for low power consumption, remote upgrading and configuration issuing of wireless equipment and the like.
Description
Technical Field
The invention relates to the technical field of telecommunication technology, in particular to a method for detecting remote breakpoint continuous transmission by using electricity.
Background
With the development of electronic technology, communication technology and computer technology, embedded systems are widely used in various fields, whereas the requirements for system functions, performance and scale of embedded devices are increasing day by day, in the development and design of embedded software, the application of program online upgrade or remote firmware update is often involved, and developers must be able to maintain and upgrade the systems in time according to the requirements of clients, prolong the service life of the systems and improve the performance of the systems.
In the prior art, remote downloading and firmware upgrading based on an embedded small-capacity storage device are generally performed in a full-download mode or a differential-download mode, the total size of basic firmware at an upgrading device end is from tens to hundreds of K, the general design is that the full-download mode is adopted, the execution is required to be started from the beginning again after a single download failure, and the downloaded content is cleared or covered.
This mode of operation is simple and reliable to implement and is widely applicable, however, its drawbacks are also very significant, including:
(1) under the wireless communication scene of adopting NB, 2G and the like, the downloading scheme is easy to have the problem of downloading failure, and based on the problem, the normal upgrading can not be realized for a long time;
(2) if the download module is used on a low-power-consumption device powered by a battery, the power supply service life of the battery is greatly influenced by multiple download failures;
(3) the working efficiency is low.
Disclosure of Invention
The invention solves the problems that the full download is simple to realize, but the failure rate is high, the service life of an external power supply is influenced, and the working efficiency is low in the prior art, and provides an optimized method for detecting the remote breakpoint continuous transmission of the power consumption.
The technical scheme adopted by the invention is that the method for detecting the remote breakpoint continuous transmission by using electricity comprises the following steps:
step 1: requesting firmware information by the equipment side;
step 2: the platform side obtains the request information, if the request is legal, the platform side returns the acceptance information and carries out the next step, otherwise, the platform side returns the rejection information and returns to the step 1;
and step 3: the equipment side presets a storage space based on the receiving information;
and 4, step 4: the platform side processes the firmware data and transmits the processed firmware data to the equipment side based on the convention;
and 5: if the transmission is not interrupted, the transmission is continued; if transmission interruption exists, judging whether the firmware data has new updating after restarting, if so, returning to the step 1, otherwise, resuming transmission at the breakpoint; until the updated complete firmware data is obtained;
step 6: after the equipment side obtains the updated complete firmware data, checking is carried out, if the checking is passed, successful information is returned, the connection is disconnected, and if not, the next step is carried out;
and 7: based on the information that the verification fails, the equipment side requests to retransmit part of the firmware data;
and 8: and the platform side transmits part of the firmware data to the equipment side based on the convention, and the step 5 is carried out.
Preferably, in step 1, the equipment side sends a request, where the request includes the latest update time, version number, and equipment side ID of the equipment side.
Preferably, in step 2, if the device ID is a trusted ID and the latest update time of the device is earlier than the latest update time of the firmware corresponding to the version number, the request is legal.
Preferably, the acceptance information includes a firmware data amount and a slice number.
Preferably, the step 4 comprises the steps of:
step 4.1: the platform side processes the firmware data, fragments the firmware data, and arranges all fragments in sequence;
step 4.2: any one of the fragments is provided with an independent identifier;
step 4.3: setting a check character string for each fragment;
step 4.4: and transmitting the processed firmware data to the device side in the form of a plurality of fragments.
Preferably, in the step 4.2, the independent identifier is the time and version number of the current fragment when the update occurs.
Preferably, in step 4.3, any check string is encrypted, and the key is a contract.
Preferably, in the step 5, if the independent identifier on the segment is the same as the corresponding segment which is recorded by the device and updated last time, the receiving is not performed, otherwise, the current segment is received; until all the slices are received.
Preferably, in step 7, the retransmitted part of the firmware data is several fragments of the firmware data starting from the fragment for which the check is faulty.
Preferably, the number of retransmissions is provided with a threshold.
The invention relates to an optimized method for detecting remote breakpoint continuous transmission by using electricity, which comprises the steps that an equipment side requests firmware information, a platform side returns received information after verifying that the request is legal, the equipment side presets a storage space based on the received information, the platform side transmits processed firmware data to the equipment side based on convention, if transmission interruption occurs, whether updating exists or not needs to be confirmed when transmission is restarted, if yes, the firmware information returns, otherwise, the breakpoint continuous transmission is performed, the equipment side returns successful information after obtaining the updated complete firmware data, otherwise, retransmission of part of the firmware data is requested based on information that the verification fails, and then only the part which does not pass needs to be transmitted and downloaded.
In the upgrading process of the embedded equipment end, after failure occurs, the equipment is restarted, then the fragments of the firmware can be downloaded from the disconnected part again, the new content is ensured to be received when the upgrading is restarted each time, and the downloaded content is continuously kept, so that the problem of breakpoint continuous transmission in the remote upgrading process of the embedded equipment is solved, the upgrading success rate of the embedded equipment is improved, and the embedded equipment end has positive use significance for low power consumption, remote upgrading and configuration issuing of wireless equipment and the like.
Drawings
FIG. 1 is a flow chart of the present invention.
Detailed Description
The present invention is described in further detail with reference to the following examples, but the scope of the present invention is not limited thereto.
The invention relates to a method for detecting remote breakpoint continuous transmission by using electricity, which comprises the following steps.
Step 1: the device side requests firmware information.
In the step 1, the equipment side sends a request, where the request includes the latest update time, version number, and equipment side ID.
In the invention, in fact, matching between the locally recorded information and the push information of the platform side should be required to be strictly consistent, when the source file of the platform side is changed, the device side should re-import and re-download the changed file, and clear the downloaded file part of the device side.
In the invention, the equipment side can actively send the request after detecting the updated information, or send the request after the platform side sends the notice.
In the invention, the latest updating time in the request is corresponding to the version number, thereby reducing the situation of error transmission and saving space.
Step 2: and (3) the platform side acquires the request information, if the request is legal, the platform side returns the acceptance information and carries out the next step, otherwise, the platform side returns the rejection information and returns to the step 1.
In step 2, if the device side ID is a trusted ID and the latest update time of the device side is earlier than the latest update time of the firmware corresponding to the version number, the request is legal.
The acceptance information includes the firmware data volume and the number of fragments.
And step 3: and the equipment side presets a storage space based on the acceptance information.
In the invention, the received information comprises the data volume and the fragment number of the firmware, and the amount of the space required to be reserved and the fragments expected to be received on the equipment side are prompted, so that the subsequent checking is convenient.
And 4, step 4: the platform side processes the firmware data and transmits the processed firmware data to the equipment side based on the convention.
The step 4 comprises the following steps:
step 4.1: the platform side processes the firmware data, fragments the firmware data, and arranges all fragments in sequence;
step 4.2: any one of the fragments is provided with an independent identifier;
in the step 4.2, the independent identifier is the time and version number of the current fragment when the current fragment is updated.
Step 4.3: setting a check character string for each fragment;
in the step 4.3, any check character string is encrypted, and the secret key is appointed.
Step 4.4: and transmitting the processed firmware data to the device side in the form of a plurality of fragments.
In the invention, serial numbers exist among the fragments, the serial numbers refer to the arrangement of the fragments from 0 to n, and n is the total number of the fragments.
In the invention, the independent identification means that although the whole firmware package is transmitted, actually, the update may only occur on some fragments, and the rest fragments are not changed, and the update time and the version number of the fragments are marked, so that a large amount of time and space can be saved for subsequent downloading.
In the invention, the check character string is used for the subsequent comparison check, and the key, namely the encryption logic is appointed.
And 5: if the transmission is not interrupted, the transmission is continued; if transmission interruption exists, judging whether the firmware data has new updating after restarting, if so, returning to the step 1, otherwise, resuming transmission at the breakpoint; until updated complete firmware data is obtained.
In the step 5, if the independent identifier on the fragment is the same as the corresponding fragment which is recorded by the device and updated last time, the fragment is not received, otherwise, the current fragment is received; until all the slices are received.
In the step 5, if the independent identifier on the fragment is the same as the corresponding fragment which is recorded by the device and updated last time, the fragment is not received, otherwise, the current fragment is received; until all the slices are received.
In the invention, breakpoint resuming refers to that transmission is resumed from the interrupted segment.
In the invention, in fact, when the updating time and the version number of the transmitted fragment are consistent with those of the equipment end, the fragment can be skipped over completely without downloading.
In the invention, further, when transmission interruption exists, the equipment terminal is allowed to re-request the firmware information after restarting, but the acquired data needs to be matched with the data recorded by the equipment terminal;
if the upgrade record information recorded locally by the equipment end is completely consistent with the received upgrade information and indicates that no further update exists after disconnection, the equipment end requests the fragment firmware again from the disconnection position until all downloads are completed, and then the step 5 is carried out;
if the newly acquired information such as the firmware version information, the length information or the fragment number is inconsistent with the local record information of the equipment terminal, the updating is indicated after the disconnection, so that the local record information is cleared, the step 1 is returned, and the fragment data is acquired again.
Step 6: and after the equipment side obtains the updated complete firmware data, verifying, if the verification is passed, returning success information, and disconnecting, otherwise, carrying out the next step.
In the present invention, the verification in step 6 is obviously to verify the aforementioned verification string.
And 7: based on the information that the verification fails, the device side requests retransmission of part of the firmware data.
In step 7, the retransmitted part of the firmware data is a plurality of fragments of the firmware data starting from the fragment in which the verification is erroneous.
The number of retransmissions is provided with a threshold.
In the invention, the re-request is delayed after single acquisition failure, but the maximum retransmission number should be set for retransmission, and if the transmission is unsuccessful all the time, the communication relationship between the two ends should be judged.
And 7: and the platform side transmits part of the firmware data to the equipment side based on the convention, and the step 5 is carried out.
In the invention, an equipment side requests firmware information, a platform side returns acceptance information after verifying that the request is legal, the equipment side firstly presets a storage space based on the acceptance information, the platform side transmits processed firmware data to the equipment side based on convention, if transmission interruption occurs, whether updating exists needs to be confirmed when transmission is restarted, if yes, the firmware data returns, otherwise, transmission is continued at a breakpoint, the equipment side returns successful information after obtaining the updated complete firmware data, otherwise, retransmission of partial firmware data is requested based on the information which is not verified, and then only the part which is not successfully transmitted needs to be transmitted and downloaded.
In the upgrading process of the embedded equipment end, after failure occurs, the equipment is restarted, then the fragments of the firmware can be downloaded from the disconnected part again, the new content is ensured to be received when the upgrading is restarted each time, and the downloaded content is continuously kept, so that the problem of breakpoint continuous transmission in the remote upgrading process of the embedded equipment is solved, the upgrading success rate of the embedded equipment is improved, and the embedded equipment end has positive use significance for low power consumption, remote upgrading and configuration issuing of wireless equipment and the like.
Claims (10)
1. A method for detecting remote breakpoint continuous transmission by using electricity is characterized in that: the method comprises the following steps:
step 1: requesting firmware information by the equipment side;
step 2: the platform side obtains the request information, if the request is legal, the platform side returns the acceptance information and carries out the next step, otherwise, the platform side returns the rejection information and returns to the step 1;
and step 3: the equipment side presets a storage space based on the receiving information;
and 4, step 4: the platform side processes the firmware data and transmits the processed firmware data to the equipment side based on the convention;
and 5: if the transmission is not interrupted, the transmission is continued; if transmission interruption exists, judging whether the firmware data has new updating after restarting, if so, returning to the step 1, otherwise, resuming transmission at the breakpoint; until the updated complete firmware data is obtained;
step 6: after the equipment side obtains the updated complete firmware data, checking is carried out, if the checking is passed, successful information is returned, the connection is disconnected, and if not, the next step is carried out;
and 7: based on the information that the verification fails, the equipment side requests to retransmit part of the firmware data;
and 8: and the platform side transmits part of the firmware data to the equipment side based on the convention, and the step 5 is carried out.
2. The method for detecting remote breakpoint resume with electricity according to claim 1, wherein: in the step 1, the equipment side sends a request, where the request includes the latest update time, version number, and equipment side ID.
3. The method for detecting remote breakpoint resume with electricity according to claim 2, wherein: in step 2, if the device side ID is a trusted ID and the latest update time of the device side is earlier than the latest update time of the firmware corresponding to the version number, the request is legal.
4. The method for detecting remote breakpoint resume with electricity according to claim 3, wherein: the acceptance information includes the firmware data volume and the number of fragments.
5. The method for detecting remote breakpoint resume with electricity according to claim 1, wherein: the step 4 comprises the following steps:
step 4.1: the platform side processes the firmware data, fragments the firmware data, and arranges all fragments in sequence;
step 4.2: any one of the fragments is provided with an independent identifier;
step 4.3: setting a check character string for each fragment;
step 4.4: and transmitting the processed firmware data to the device side in the form of a plurality of fragments.
6. The method for detecting remote breakpoint resume with electricity according to claim 5, wherein: in the step 4.2, the independent identifier is the time and version number of the current fragment when the current fragment is updated.
7. The method for detecting remote breakpoint resume with electricity according to claim 5, wherein: in the step 4.3, any check character string is encrypted, and the secret key is appointed.
8. The method for detecting remote breakpoint resume with electricity according to claim 5, wherein: in the step 5, if the independent identifier on the fragment is the same as the corresponding fragment which is recorded by the device and updated last time, the fragment is not received, otherwise, the current fragment is received; until all the slices are received.
9. The method for detecting remote breakpoint resume with electricity according to claim 1, wherein: in step 7, the retransmitted part of the firmware data is a plurality of fragments of the firmware data starting from the fragment in which the verification is erroneous.
10. The method for detecting remote breakpoint resume with electricity according to claim 9, wherein: the number of retransmissions is provided with a threshold.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911385293.9A CN111240713A (en) | 2019-12-28 | 2019-12-28 | Method for detecting remote breakpoint continuous transmission through power utilization |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911385293.9A CN111240713A (en) | 2019-12-28 | 2019-12-28 | Method for detecting remote breakpoint continuous transmission through power utilization |
Publications (1)
Publication Number | Publication Date |
---|---|
CN111240713A true CN111240713A (en) | 2020-06-05 |
Family
ID=70864975
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201911385293.9A Pending CN111240713A (en) | 2019-12-28 | 2019-12-28 | Method for detecting remote breakpoint continuous transmission through power utilization |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111240713A (en) |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112181454A (en) * | 2020-09-21 | 2021-01-05 | 西安微电子技术研究所 | Remote upgrading system and method for unattended equipment |
CN112256297A (en) * | 2020-09-24 | 2021-01-22 | 苏宁智能终端有限公司 | Bluetooth peripheral firmware upgrading method and system and mobile phone terminal |
CN113219872A (en) * | 2021-05-10 | 2021-08-06 | 安徽大学 | Remote upgrading method of monitoring system of refrigerator car based on real-time perception |
CN113553281A (en) * | 2021-07-23 | 2021-10-26 | 深圳市警威警用装备有限公司 | Data acquisition method and device and 5G intelligent data acquisition workstation |
CN113612804A (en) * | 2021-10-08 | 2021-11-05 | 江铃汽车股份有限公司 | Vehicle configuration upgrading method and system, storage medium and intelligent gateway |
CN114637987A (en) * | 2022-05-18 | 2022-06-17 | 广州万协通信息技术有限公司 | Security chip firmware downloading method and system based on platform verification |
CN115021873A (en) * | 2022-06-13 | 2022-09-06 | 浙江大华技术股份有限公司 | Data retransmission method and device and electronic equipment |
CN115118718A (en) * | 2022-08-30 | 2022-09-27 | 深圳市华曦达科技股份有限公司 | Android terminal device upgrade updating method and system and readable storage medium |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105487894A (en) * | 2015-11-27 | 2016-04-13 | 浪潮软件集团有限公司 | Remote updating method of distributed software system |
CN109240721A (en) * | 2018-08-24 | 2019-01-18 | 江苏恒宝智能系统技术有限公司 | A kind of method of MCU online upgrading |
CN110399149A (en) * | 2019-06-26 | 2019-11-01 | 杭州智缤科技有限公司 | A kind of remote upgrade method under low-power consumption scene |
CN110474977A (en) * | 2019-08-13 | 2019-11-19 | 北京百佑科技有限公司 | Firmware upgrade method, firmware upgrade system and the intelligent door lock of intelligent door lock |
-
2019
- 2019-12-28 CN CN201911385293.9A patent/CN111240713A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105487894A (en) * | 2015-11-27 | 2016-04-13 | 浪潮软件集团有限公司 | Remote updating method of distributed software system |
CN109240721A (en) * | 2018-08-24 | 2019-01-18 | 江苏恒宝智能系统技术有限公司 | A kind of method of MCU online upgrading |
CN110399149A (en) * | 2019-06-26 | 2019-11-01 | 杭州智缤科技有限公司 | A kind of remote upgrade method under low-power consumption scene |
CN110474977A (en) * | 2019-08-13 | 2019-11-19 | 北京百佑科技有限公司 | Firmware upgrade method, firmware upgrade system and the intelligent door lock of intelligent door lock |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112181454A (en) * | 2020-09-21 | 2021-01-05 | 西安微电子技术研究所 | Remote upgrading system and method for unattended equipment |
CN112181454B (en) * | 2020-09-21 | 2023-04-07 | 西安微电子技术研究所 | Remote upgrading system and method for unattended equipment |
CN112256297A (en) * | 2020-09-24 | 2021-01-22 | 苏宁智能终端有限公司 | Bluetooth peripheral firmware upgrading method and system and mobile phone terminal |
CN113219872A (en) * | 2021-05-10 | 2021-08-06 | 安徽大学 | Remote upgrading method of monitoring system of refrigerator car based on real-time perception |
CN113553281A (en) * | 2021-07-23 | 2021-10-26 | 深圳市警威警用装备有限公司 | Data acquisition method and device and 5G intelligent data acquisition workstation |
CN113612804A (en) * | 2021-10-08 | 2021-11-05 | 江铃汽车股份有限公司 | Vehicle configuration upgrading method and system, storage medium and intelligent gateway |
CN113612804B (en) * | 2021-10-08 | 2021-12-14 | 江铃汽车股份有限公司 | Vehicle configuration upgrading method and system, storage medium and intelligent gateway |
CN114637987A (en) * | 2022-05-18 | 2022-06-17 | 广州万协通信息技术有限公司 | Security chip firmware downloading method and system based on platform verification |
CN114637987B (en) * | 2022-05-18 | 2022-08-12 | 广州万协通信息技术有限公司 | Security chip firmware downloading method and system based on platform verification |
CN115021873A (en) * | 2022-06-13 | 2022-09-06 | 浙江大华技术股份有限公司 | Data retransmission method and device and electronic equipment |
CN115118718A (en) * | 2022-08-30 | 2022-09-27 | 深圳市华曦达科技股份有限公司 | Android terminal device upgrade updating method and system and readable storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111240713A (en) | Method for detecting remote breakpoint continuous transmission through power utilization | |
CN102546784B (en) | Method for conducting batch upgrading for device firmware based on controller area network (CAN) bus | |
CN107239288B (en) | Version upgrading method and device for mobile terminal | |
CN110704077A (en) | Firmware remote upgrading method and device, terminal, mobile device and storage medium | |
TWI518595B (en) | Method and system of software update and mobile device | |
CN102510409A (en) | Method and system for quickly and remotely updating program of mobile terminal by using wireless network | |
CN106843957A (en) | System firmware upgrade method and device | |
CN110621011A (en) | OTA firmware upgrading method and system based on Bluetooth device end | |
WO2011006328A1 (en) | System and method for updating device firmware, device management server and mobile terminal | |
CN109391673A (en) | A kind of method, system and the terminal device of management update file | |
US10469620B2 (en) | Method for transferring a new software version to at least one electricity meter via a communication network | |
US20100077024A1 (en) | Method for transmitting data transmitted incompletely between server and client | |
CN110633097A (en) | OTA (over the air) upgrading method and device for single chip microcomputer | |
WO2011153771A1 (en) | System and method for remotely upgrading machine to machine (m2m) terminal | |
CN113721966A (en) | Node upgrading method and device, storage medium and electronic device | |
WO2022257927A1 (en) | Key burning method and apparatus, electronic device board card, and storage medium | |
WO2017124736A1 (en) | Method, device and system for transmitting upgrade abnormality information | |
KR101200025B1 (en) | System for updating firmware of remote mobile equipment using wireless communication network, and method thereof | |
CN110045969B (en) | Application program installation method, server, system, device and storage medium | |
KR102034427B1 (en) | IoT Device and It's Firmware Update Method | |
CN110233906A (en) | A kind of OTA Engine Version update method and system, storage medium and OTA terminal | |
US11397571B2 (en) | Method and apparatus for remotely updating satellite devices | |
CN114268614A (en) | Equipment firmware upgrading method, device and system | |
CN116450180A (en) | Remote upgrading method for terminal equipment | |
CN113971287A (en) | LoRa communication-based batch upgrading method and upgrading system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20200605 |