CN112463192A - High-pass platform private image upgrading method and terminal - Google Patents

High-pass platform private image upgrading method and terminal Download PDF

Info

Publication number
CN112463192A
CN112463192A CN202011375051.4A CN202011375051A CN112463192A CN 112463192 A CN112463192 A CN 112463192A CN 202011375051 A CN202011375051 A CN 202011375051A CN 112463192 A CN112463192 A CN 112463192A
Authority
CN
China
Prior art keywords
target
file
version information
image
target folder
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011375051.4A
Other languages
Chinese (zh)
Inventor
汤志锋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Fuzhou Huisibo Information Technology Co ltd
Original Assignee
Fuzhou Huisibo Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fuzhou Huisibo Information Technology Co ltd filed Critical Fuzhou Huisibo Information Technology Co ltd
Priority to CN202011375051.4A priority Critical patent/CN112463192A/en
Publication of CN112463192A publication Critical patent/CN112463192A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/60Software deployment
    • G06F8/65Updates
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/70Software maintenance or management
    • G06F8/71Version control; Configuration management

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Stored Programmes (AREA)

Abstract

The invention provides a high-pass platform private image upgrading method and a terminal, wherein whether a preset target folder contains a target version information file or not is judged, if yes, the target version information file in the target folder is obtained, whether the target version information file is the same as a default version information file stored in a default path or not is judged, if yes, a subsystem image file corresponding to the target version information file in the target folder is loaded, if the target folder does not contain the target version information file or the target version information file is different from the default version information file, each file in the target folder is deleted firstly, and then the default version information file is copied into the target folder. According to the invention, by setting the mirror image file of the storage subsystem of the target folder, the NON-HLOS.

Description

High-pass platform private image upgrading method and terminal
Technical Field
The invention relates to the field of system upgrading, in particular to a high-pass platform private image upgrading method and a high-pass platform private image upgrading terminal.
Background
High-pass platform private image refers to the wcnss, modem, adsp, etc. subsystem image that the NON-hlos. In the existing high-pass private image compiling process, each subsystem image is packaged in an NON-hlos.bin, then the NON-hlos.bin writes a modem partition of an Android terminal, and in the starting process of the Android terminal, each subsystem image in the NON-hlos.bin is installed in a/vector/firmware _ mnt/image path, as shown in fig. 4, Kernel loads the images to a DDR (Double Data Rate SDRAM, Double Rate synchronous dynamic random access memory) through a PIL (Peripheral image loader) driver, so that a CPU can directly address the images, and then starts each subsystem.
In order to protect the security and integrity of the Device, most manufacturers have added dm-verity technology, which is a target Device type under the Device mapper architecture and is used to guarantee the integrity of the Device or Device partition, and refer to fig. 5, which is a typical architecture of dm-verity, the dm-verity can protect the system partition, the vendor partition, and the like, and make the state of the system partition, the vendor partition, and the like, not be modified.
However, a situation that one or more of the subsystems have problems and need to be updated is often encountered, for example, WiFi or bluetooth has problems, theoretically, only the wcnss subsystem image in NON-hlos.bin needs to be updated, but because NON-hlos.bin writes a partition with a partition name of "modem", no separate subsystem partition exists in the partition, and the subsystems are packaged and written into the "modem" partition together; moreover, the system uses a dm-verity technology, the/vendor/firmware _ mnt/image directory only has read-only permission, and vendor partition data is not modified, so that private images of high-pass subsystems such as wcnss, modem, and adsp cannot be upgraded independently, the subsystem images are packed together in a NON-hlos.bin for upgrading, and the size of an upgrade package is increased.
Disclosure of Invention
The technical problem to be solved by the invention is as follows: the high-pass platform private image upgrading method and the terminal can realize the independent upgrading of a high-pass platform subsystem.
In order to solve the technical problems, the invention adopts a technical scheme that:
a high-pass platform private image upgrading method comprises the following steps:
s1, judging whether the preset target folder contains the target version information file, if so, executing S2, otherwise, executing S3;
s2, acquiring a target version information file in the target folder, and judging whether the target version information file is the same as a default version information file stored in a default path, if so, executing S4, otherwise, executing S3;
s3, copying the default version information file into the target folder as a target version information file;
and S4, loading the subsystem mirror image file corresponding to the target version information file in the target folder.
In order to solve the technical problem, the invention adopts another technical scheme as follows:
a high-pass platform private image upgrading terminal comprises a memory, a processor and a computer program which is stored on the memory and can run on the processor, wherein the processor executes the computer program to realize the following steps:
s1, judging whether the preset target folder contains the target version information file, if so, executing S2, otherwise, executing S3;
s2, acquiring a target version information file in the target folder, and judging whether the target version information file is the same as a default version information file stored in a default path, if so, executing S4, otherwise, executing S3;
s3, copying the default version information file into the target folder as a target version information file;
and S4, loading the subsystem mirror image file corresponding to the target version information file in the target folder.
The invention has the beneficial effects that: setting a target folder, firstly judging whether the target folder contains a target version information file, if not, indicating that the loading of the image file is not carried out after the starting for the first time, if the target folder contains the target version information file but is different from a default version information file in a default path, indicating that the updating of the whole package occurs, at the moment, deleting each file in the target folder, then copying the default version information file into the target folder, ensuring the normal loading of the system image file, if the version information file is the same, indicating that the updating of the whole package is not carried out and the starting for the first time is not carried out, at the moment, obtaining the subsystem image file in the target folder for loading, and realizing the independent updating and upgrading of the subsystem.
Drawings
FIG. 1 is a flowchart illustrating steps of a method for upgrading a private image of a high-pass platform according to an embodiment of the present invention;
fig. 2 is a schematic structural diagram of a high-pass platform private image upgrading terminal according to an embodiment of the present invention;
FIG. 3 is a flowchart of a method for upgrading a private image of a high-pass platform in a specific scenario according to an embodiment of the present invention;
FIG. 4 is a diagram illustrating loading of a directory by a mirror file at startup according to the prior art;
FIG. 5 is a diagram illustrating a dm-visibility exemplary architecture of the prior art;
description of reference numerals:
1. a high-pass platform private mirror image upgrading terminal; 2. a processor; 3. a memory.
Detailed Description
In order to explain technical contents, achieved objects, and effects of the present invention in detail, the following description is made with reference to the accompanying drawings in combination with the embodiments.
Referring to fig. 1 and fig. 3, a method for upgrading a private image of a high-pass platform includes the steps of:
s1, judging whether the preset target folder contains the target version information file, if so, executing S2, otherwise, executing S3;
s2, acquiring a target version information file in the target folder, and judging whether the target version information file is the same as a default version information file stored in a default path, if so, executing S4, otherwise, executing S3;
s3, copying the default version information file into the target folder as a target version information file;
and S4, loading the subsystem mirror image file corresponding to the target version information file in the target folder.
From the above description, the beneficial effects of the present invention are: setting a target folder, firstly judging whether the target folder contains a target version information file, if not, indicating that the loading of the image file is not carried out after the starting for the first time, if the target folder contains the target version information file but is different from a default version information file in a default path, indicating that the updating of the whole package occurs, at the moment, deleting each file in the target folder, then copying the default version information file into the target folder, ensuring the normal loading of the system image file, if the version information file is the same, indicating that the updating of the whole package is not carried out and the starting for the first time is not carried out, at the moment, obtaining the subsystem image file in the target folder for loading, and realizing the independent updating and upgrading of the subsystem.
Further, the preset process of generating the target folder in S1 is as follows:
creating a target folder and acquiring a target path of the target folder;
and setting a firmware _ class.path parameter in cmdlene as the target path so as to read the target folder in the boot process.
As can be seen from the above description, the firmware _ class _ path parameter in the Kernel command line cmdlet is set as the target path, and the Kernel can automatically read the relevant parameter in the cmdlet when the computer is started, so that the operation of reading the target folder can be performed in the starting process.
Further, the S1 is preceded by:
acquiring an APK file, and installing the subsystem mirror image file to the target folder through the APK file;
or acquiring an OTA data packet in an OTA mode, and storing the OTA data packet to the target folder, wherein the OTA data packet comprises a subsystem mirror image file.
As can be seen from the above description, the method for acquiring the image file required for upgrading is enriched by acquiring the image file of the subsystem through APK package installation or OTA (Over the Air, Over the Air technology), and the image file of the subsystem is installed in the target folder, so that the image file of the subsystem can be read in the installation process.
Further, the S4 specifically includes:
judging whether the target folder contains a subsystem image file, if so, loading the subsystem image file through an image request function;
otherwise, judging whether a prepared image file is stored in the default path, if so, loading the prepared image file through an image request function; otherwise, prompting that the loading of the image file fails, wherein the prepared image file is a subsystem image file installed through the default image file.
According to the description, if the target folder does not contain the subsystem image file, the image file is not updated, the default image file is loaded, the situation that the startup fails due to the fact that the image file is not loaded is avoided, and normal operation of the system is guaranteed.
Further, the default image file is NON-HLOS.
As can be seen from the above description, the default image file is a combination of subsystems such as wcnss, modem, and adsp, and the image files of all the subsystems are updated when the default image file is loaded, so that the normal operation of the system is ensured.
Referring to fig. 2, a high-pass platform private image upgrade terminal includes a memory, a processor, and a computer program stored in the memory and executable on the processor, where the processor implements the following steps when executing the computer program:
s1, judging whether the preset target folder contains the target version information file, if so, executing S2, otherwise, executing S3;
s2, acquiring a target version information file in the target folder, and judging whether the target version information file is the same as a default version information file stored in a default path, if so, executing S4, otherwise, executing S3;
s3, copying the default version information file into the target folder as a target version information file;
and S4, loading the subsystem mirror image file corresponding to the target version information file in the target folder.
The invention has the beneficial effects that: setting a target folder, firstly judging whether the target folder contains a target version information file, if not, indicating that the loading of the image file is not carried out after the starting for the first time, if the target folder contains the target version information file but is different from a default version information file in a default path, indicating that the updating of the whole package occurs, at the moment, deleting each file in the target folder, then copying the default version information file into the target folder, ensuring the normal loading of the system image file, if the version information file is the same, indicating that the updating of the whole package is not carried out and the starting for the first time is not carried out, at the moment, obtaining the subsystem image file in the target folder for loading, and realizing the independent updating and upgrading of the subsystem.
Further, the preset process of generating the target folder in S1 is as follows:
creating a target folder and acquiring a target path of the target folder;
and setting a firmware _ class.path parameter in cmdlene as the target path so as to read the target folder in the boot process.
As can be seen from the above description, the firmware _ class _ path parameter in the Kernel command line cmdlet is set as the target path, and the Kernel can automatically read the relevant parameter in the cmdlet when the computer is started, so that the operation of reading the target folder can be performed in the starting process.
Further, the S1 is preceded by:
acquiring an APK file, and installing the subsystem mirror image file to the target folder through the APK file;
or acquiring an OTA data packet in an OTA mode, and storing the OTA data packet to the target folder, wherein the OTA data packet comprises a subsystem mirror image file.
As can be seen from the above description, the method for acquiring the image file required for upgrading is enriched by acquiring the image file of the subsystem through APK package installation or OTA (Over the Air, Over the Air technology), and the image file of the subsystem is installed in the target folder, so that the image file of the subsystem can be read in the installation process.
Further, the S4 specifically includes:
judging whether the target folder contains a subsystem image file, if so, loading the subsystem image file through an image request function;
otherwise, judging whether a prepared image file is stored in the default path, if so, loading the prepared image file through an image request function; otherwise, prompting that the loading of the image file fails, wherein the prepared image file is a subsystem image file installed through the default image file.
According to the description, if the target folder does not contain the subsystem image file, the image file is not updated, the default image file is loaded, the situation that the startup fails due to the fact that the image file is not loaded is avoided, and normal operation of the system is guaranteed.
Further, the default image file is NON-HLOS.
As can be seen from the above description, the default image file is a combination of subsystems such as wcnss, modem, and adsp, and the image files of all the subsystems are updated when the default image file is loaded, so that the normal operation of the system is ensured.
Referring to fig. 1, a first embodiment of the present invention is:
a high-pass platform private image upgrading method comprises the following steps:
s1, obtaining an APK file, and installing the subsystem image file to the target folder through the APK file;
or, acquiring an OTA data packet in an OTA mode, and storing the OTA data packet to the target folder, wherein the OTA data packet comprises a subsystem mirror image file;
in an optional implementation mode, the default image file NON-HLOS.bin is saved to the default path in an OTA mode, or the default image file NON-HLOS.bin is programmed in the default path by utilizing a programming tool;
s2, judging whether the preset target folder contains the target version information file, if so, executing S3, otherwise, executing S4;
the preset process of generating the target folder comprises the following steps:
creating a target folder and acquiring a target path of the target folder;
setting a firmware _ class.path parameter in cmdlene as the target path so as to read the target folder in the starting process;
s3, acquiring a target version information file in the target folder, and judging whether the target version information file is the same as a default version information file stored in a default path, if so, executing S5, otherwise, executing S4;
s4, judging whether the target folder stores files or not, if so, deleting the files in the target folder, copying the default version information files into the target folder to serve as target version information files, and if not, directly copying the default version information files into the target folder to serve as target version information files;
s5, loading a subsystem mirror image file corresponding to the target version information file in the target folder;
the method specifically comprises the following steps: judging whether the target folder contains a subsystem image file, if so, loading the subsystem image file through an image request function; otherwise, judging whether a prepared image file is stored in the default path, if so, loading the prepared image file through an image request function; otherwise, prompting that the loading of the mirror image file fails; the preparation image file is the image file of each subsystem installed under the default path after loading the NON-HLOS.
Regarding S2 and S3:
(1) in the first startup process after the default image file NON-HLOS.bin is updated in a first programming or OTA mode, the image file NON-HLOS.bin is installed, each subsystem image file is installed in a default path, and after the installation is completed, each subsystem image file and one version information file are included in the default path; because the target folder is empty due to the first programming, the version information file in the default path is copied into the target folder; when the system starting process is carried out to the step of loading the subsystem mirror image, the loading subsystem adopts the subsystem mirror image in the default path because the target folder does not have the corresponding subsystem mirror image;
(2) when the NON-HLOS-bin is programmed again or the whole mirror image file of the NON-HLOS-bin is updated in an OTA mode in the starting process, the NON-HLOS-bin is installed, all the subsystem mirror images and the version information files in the NON-HLOS-bin are installed in a default path, the version information files in the default path and the target folder are inconsistent at the moment, all the files in the target folder are deleted, the version information files in the default path are copied into the target folder, and when a system is started to load the subsystem mirror images, the subsystem mirror images under the default path are loaded because the target folder does not have the corresponding subsystem mirror images;
(3) when a starting process is carried out after a certain subsystem mirror image or a plurality of subsystem mirror images are upgraded to a target file in an APK mode or an OTA mode, the default path is consistent with the judgment version information file in the target path, and the file in the target file cannot be deleted; when the subsystem mirror image is loaded by the system, the subsystem mirror image in the target file is preferentially loaded because the target file has the corresponding subsystem mirror image, so that the subsystem is independently updated.
Referring to fig. 3, the second embodiment of the present invention is:
the high-pass platform private image upgrading method is applied to an actual scene:
take the image file of the wcnss subsystem installed as an example (called as the wcnss image file in this embodiment):
s1, receiving the wcnss image file packaged by the OTA and storing the wcnss image file in a target folder, or receiving a special APK and installing the wcnss image file under the target folder through the special APK;
s2, judging whether the target folder contains the target version information file, if so, executing S3, otherwise, executing S4;
s3, acquiring a target version information file in the target folder, and judging whether the target version information file is the same as a default version information file stored in a default path, if so, executing S5, otherwise, executing S4;
s4, deleting all files in the target folder, and copying the default version information file into the target folder as a target version information file;
deleting all files in the target folder, and preventing the mirror image files in the target folder from being preferentially loaded from influencing the update of the NON-HLOS.
S5, loading the wcnss mirror image file in the target folder;
in this embodiment, S5 specifically includes:
(1) searching whether a mirror image meeting the requirement exists in a corresponding segment in the kernel, traversing the mirror image of the builtin _ fw segment, comparing whether the names of the mirror images are the same or not, and if so, indicating that the mirror images are matched;
(2) searching whether a mirror image loaded last time exists in cache, namely searching mirror image information on a linked list of a global variable fw _ cache, wherein the information of the mirror image loaded before can be automatically stored on the head of the linked list of the fw _ cache;
(3) reading corresponding mirror images in a file interface in a kernel directly, and searching each path in an fw _ path array, wherein the 1 st variable (fw _ path _ para) of the array can be used for a user to transmit a customized path, and the method is that a parameter (firmware _ class.path value) in a cmdline mode is given to the variable (fw _ path _ para); the value of the firmware _ class _ path parameter is set as a target path, the system code transmits the target path corresponding to the firmware _ class _ path to the fw _ path _ para parameter, so that the value of the fw _ path _ para is a target directory, the loading sequence of the fw _ path _ para is the first variable in the array loaded by the Kernel in the step, and the loaded path is the target path by the way of switching the path earlier than the way of the uevent
(4) And loading a corresponding mirror image by using the Uevent interface, reporting the Uevent event to the user space, and then waiting for the mirror image loading to be completed. At present, a high-pass platform loads a mirror image by calling a mirror image request function of Kernel, then finding mirror images of subsystems under a path prestored by a system and loading the mirror images to DDR.
Referring to fig. 2, a third embodiment of the present invention is:
a high-pass platform private image upgrading terminal 1 comprises a processor 2, a memory 3 and a computer program which is stored on the memory 3 and can run on the processor 2, and the processor 2 executes the computer program to realize the steps of the first embodiment or the second embodiment.
In summary, the invention provides a high-pass platform private image upgrading method and a terminal, by changing corresponding parameters in cmdline, the image file in a target folder is preferentially read in the process of starting and loading, and a subsystem image file is placed in the target folder to realize independent updating of a subsystem; in order to prevent the NON-HLOS-bin file from being updated but not loaded in the process of loading the subsystem image file, a version information file is set, if the loading of the NON-HLOS-bin file is completed, the version information file in the default path where the NON-HLOS-bin file is located and in the target folder is synchronously updated, if the NON-HLOS-bin file is downloaded but not loaded, only the version information file in the default path is updated, at the moment, the situation different from the version information file in the target folder occurs in the default path, if the situation occurs, all files in the target folder are deleted, the situation that the image file in the target folder is preferentially loaded according to the setting of relevant parameters of cmline when the system is started is avoided, namely, the system detects that the target folder is empty, the image file in the default path, namely the NON-HLOS-bin file is automatically acquired to be loaded, the method and the device have the advantages that the effect of updating the subsystem independently is achieved, meanwhile, the whole update of the NON-HLOS binding file is not influenced, the acquisition of the subsystem image file can be achieved through an OTA or APK installation mode, the mode of acquiring the image file is expanded, and the use experience of a user is improved.
The above description is only an embodiment of the present invention, and not intended to limit the scope of the present invention, and all equivalent changes made by using the contents of the present specification and the drawings, or applied directly or indirectly to the related technical fields, are included in the scope of the present invention.

Claims (10)

1. A high-pass platform private image upgrading method is characterized by comprising the following steps:
s1, judging whether the preset target folder contains the target version information file, if so, executing S2, otherwise, executing S3;
s2, acquiring a target version information file in the target folder, and judging whether the target version information file is the same as a default version information file stored in a default path, if so, executing S4, otherwise, executing S3;
s3, copying the default version information file into the target folder as a target version information file;
and S4, loading the subsystem mirror image file corresponding to the target version information file in the target folder.
2. The high-pass platform private image upgrading method according to claim 1, wherein the preset process of generating the target folder in S1 is as follows:
creating a target folder and acquiring a target path of the target folder;
and setting a firmware _ class.path parameter in cmdlene as the target path so as to read the target folder in the boot process.
3. The high-pass platform private image upgrading method according to claim 1, wherein the S1 is preceded by:
acquiring an APK file, and installing the subsystem mirror image file to the target folder through the APK file;
or acquiring an OTA data packet in an OTA mode, and storing the OTA data packet to the target folder, wherein the OTA data packet comprises a subsystem mirror image file.
4. The high-pass platform private image upgrading method according to claim 1, wherein the S4 specifically is:
judging whether the target folder contains a subsystem image file, if so, loading the subsystem image file through an image request function;
otherwise, judging whether a prepared image file is stored in the default path, if so, loading the prepared image file through an image request function; otherwise, prompting that the loading of the image file fails, wherein the prepared image file is a subsystem image file installed through the default image file.
5. The high-pass platform private image upgrading method of claim 4, wherein the default image file is NON-HLOS.
6. A high-pass platform private image upgrading terminal, comprising a memory, a processor and a computer program stored on the memory and operable on the processor, wherein the processor executes the computer program to implement the following steps:
s1, judging whether the preset target folder contains the target version information file, if so, executing S2, otherwise, executing S3;
s2, acquiring a target version information file in the target folder, and judging whether the target version information file is the same as a default version information file stored in a default path, if so, executing S4, otherwise, executing S3;
s3, copying the default version information file into the target folder as a target version information file;
and S4, loading the subsystem mirror image file corresponding to the target version information file in the target folder.
7. The high-pass platform private image upgrading terminal according to claim 6, wherein the preset process of generating the target folder in the S1 is as follows:
creating a target folder and acquiring a target path of the target folder;
and setting a firmware _ class.path parameter in cmdlene as the target path so as to read the target folder in the boot process.
8. The high-pass platform private image upgrading terminal according to claim 6, wherein the S1 is preceded by:
acquiring an APK file, and installing the subsystem mirror image file to the target folder through the APK file;
or acquiring an OTA data packet in an OTA mode, and storing the OTA data packet to the target folder, wherein the OTA data packet comprises a subsystem mirror image file.
9. The high-pass platform private image upgrading terminal according to claim 6, wherein the S4 is specifically:
judging whether the target folder contains a subsystem image file, if so, loading the subsystem image file through an image request function;
otherwise, judging whether a prepared image file is stored in the default path, if so, loading the prepared image file through an image request function; otherwise, prompting that the loading of the image file fails, wherein the prepared image file is a subsystem image file installed through the default image file.
10. The high-pass platform private image upgrade terminal according to claim 9, wherein the default image file is NON-hlos.
CN202011375051.4A 2020-11-30 2020-11-30 High-pass platform private image upgrading method and terminal Pending CN112463192A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011375051.4A CN112463192A (en) 2020-11-30 2020-11-30 High-pass platform private image upgrading method and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011375051.4A CN112463192A (en) 2020-11-30 2020-11-30 High-pass platform private image upgrading method and terminal

Publications (1)

Publication Number Publication Date
CN112463192A true CN112463192A (en) 2021-03-09

Family

ID=74804943

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011375051.4A Pending CN112463192A (en) 2020-11-30 2020-11-30 High-pass platform private image upgrading method and terminal

Country Status (1)

Country Link
CN (1) CN112463192A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080189340A1 (en) * 2007-02-01 2008-08-07 David Randall Blea Apparatus, system, and method for synchronizing a remote database
CN103281689A (en) * 2013-04-28 2013-09-04 华为技术有限公司 Method for network switching and version upgrading and terminal equipment
CN105446769A (en) * 2015-11-03 2016-03-30 广东欧珀移动通信有限公司 Mirror image file update processing method and apparatus and terminal device
CN110750286A (en) * 2019-10-17 2020-02-04 福州汇思博信息技术有限公司 Management method, device, system, equipment and medium for upgrading Mbn through OTA
CN111078312A (en) * 2019-12-03 2020-04-28 维沃移动通信有限公司 MBN loading method and electronic equipment

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080189340A1 (en) * 2007-02-01 2008-08-07 David Randall Blea Apparatus, system, and method for synchronizing a remote database
CN103281689A (en) * 2013-04-28 2013-09-04 华为技术有限公司 Method for network switching and version upgrading and terminal equipment
CN105446769A (en) * 2015-11-03 2016-03-30 广东欧珀移动通信有限公司 Mirror image file update processing method and apparatus and terminal device
CN110750286A (en) * 2019-10-17 2020-02-04 福州汇思博信息技术有限公司 Management method, device, system, equipment and medium for upgrading Mbn through OTA
CN111078312A (en) * 2019-12-03 2020-04-28 维沃移动通信有限公司 MBN loading method and electronic equipment

Similar Documents

Publication Publication Date Title
CN105867947B (en) Data processing method and device after preset application program updating
US9454356B2 (en) Method of and terminal for updating library file in system application
US7689983B2 (en) Information processing method and apparatus and recording medium
US7644406B2 (en) Update system capable of updating software across multiple FLASH chips
CN104572229B (en) The firmware upgrade method and device for upgrading firmware of embedded system
KR100584338B1 (en) Method and system for updating software
US5537596A (en) Method and apparatus for overriding resource maps in a computer system
US20230393840A1 (en) File update method and apparatus, device and storage medium
KR101555210B1 (en) Apparatus and method for downloadin contents using movinand in portable terminal
WO2021143845A1 (en) Extended system partitioning method and apparatus, storage medium, and computer device
WO2022262754A1 (en) Operating system data updating method and device, storage medium, and program product
CN104007992A (en) Methods and devices for program updating and starting
TWI383296B (en) Storage device and method for data writing for data using internal storage operations
US20100031246A1 (en) Updating Content Without Using a Mini Operating System
CN113867768A (en) Operating system processing method and device, electronic equipment and storage medium
CN106293790A (en) Application program updating method and apparatus based on Firefox operating system
CN112463192A (en) High-pass platform private image upgrading method and terminal
US9448782B1 (en) Reducing a size of an application package
US7490232B2 (en) Disk device using disk to rewrite firmware and firmware determination method
CN114567628B (en) OTA upgrading method and device
US20220073018A1 (en) Vehicle device
CN111679848A (en) Software updating method and terminal
WO2001050261A2 (en) Updating non volatile memory in a data processing system
KR20070081868A (en) Method for updating software efficiently in mobile communication system
WO2019237222A1 (en) System upgrading method, smart device, and server

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20210309