CN114020283A - Firmware burning method, burning circuit, device, equipment and readable storage medium - Google Patents

Firmware burning method, burning circuit, device, equipment and readable storage medium Download PDF

Info

Publication number
CN114020283A
CN114020283A CN202111164916.7A CN202111164916A CN114020283A CN 114020283 A CN114020283 A CN 114020283A CN 202111164916 A CN202111164916 A CN 202111164916A CN 114020283 A CN114020283 A CN 114020283A
Authority
CN
China
Prior art keywords
burning
connector
firmware
voltage
dongle
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111164916.7A
Other languages
Chinese (zh)
Inventor
钟学杰
闫波
李岩
尤慧杰
陈定邦
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Inspur Electronic Information Industry Co Ltd
Original Assignee
Inspur Electronic Information Industry Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Inspur Electronic Information Industry Co Ltd filed Critical Inspur Electronic Information Industry Co Ltd
Priority to CN202111164916.7A priority Critical patent/CN114020283A/en
Publication of CN114020283A publication Critical patent/CN114020283A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/60Software deployment
    • G06F8/61Installation

Abstract

The application discloses a firmware burning method, a burning circuit, a burning device, equipment and a readable storage medium, wherein the method comprises the following steps: monitoring a connector in the burning circuit; after the fact that the software protector is inserted into the connector is monitored, the communication connection between the software protector and the target device is disconnected; and burning firmware to a voltage conversion chip in the burning circuit by using the software protector. And monitoring a connector in the burning circuit. When the software protector is detected to be inserted into the connector, the communication connection between the software protector and the target device is directly disconnected. I.e. only the communication connection between the dongle and the voltage conversion chip can be reserved, directly avoiding the I2C communication collision from the physical hardware point of view. Then, the firmware is burned on the voltage conversion chip by using the software protector, and the success rate of burning the firmware can be effectively improved due to the fact that I2C communication conflict is avoided.

Description

Firmware burning method, burning circuit, device, equipment and readable storage medium
Technical Field
The present application relates to the field of computer technologies, and in particular, to a firmware burning method, a burning circuit, a burning apparatus, a device, and a readable storage medium.
Background
With the development of artificial intelligence and big data, the demand on a server is increasing, wherein an onboard power supply is an indispensable part of the server. The requirements for power supply software and hardware for board-mounted power supplies, in particular for CPU and DIMM (Dual-Inline-Memory-Modules) parts, are increasing. A mature on-board power supply is required to undergo multiple test verifications, which often involve a VR FW (voltage regulation firmware) version of burn-in upgrade and a later upgrade.
However, when a dongle (software protector) is used for online burning of VR FW at present, the VR FW cannot be burned in frequently, and the VR FW can be successfully burned in many times.
In summary, how to effectively solve the VR FW burning success rate and other problems is a technical problem that needs to be solved urgently by those skilled in the art.
Disclosure of Invention
The application aims to provide a firmware burning method, a burning circuit, a burning device, firmware burning equipment and a readable storage medium, and improve the VR FW burning success rate.
In order to solve the technical problem, the application provides the following technical scheme:
a firmware burning method comprises the following steps:
monitoring a connector in the burning circuit;
after the fact that the dongle is inserted into the connector is monitored, disconnecting the communication connection between the dongle and a target device;
and burning firmware to a voltage conversion chip in the burning circuit by using the software protector.
Preferably, the method further comprises the following steps:
and if the fact that the software protector is pulled out is monitored, the communication connection between the software protector and the target device is recovered.
Preferably, disconnecting the dongle from communication with the target device comprises:
turning off the operating voltage of the target I2C device by using a switch; wherein the target I2C device powers the target device.
Preferably, monitoring the connector in the burning circuit includes:
monitoring the voltage value of the connector;
determining that the dongle is inserted into the connector if the voltage value increases from a first voltage to a second voltage;
and if the voltage value is reduced from the second voltage to the first voltage, determining that the dongle is unplugged from the connector.
Preferably, the monitoring the voltage value of the connector includes:
and monitoring the voltage value of the connector by utilizing an automatic switching module connected with the connector.
A burning circuit, comprising:
the device comprises a connector, an automatic switching module, a voltage conversion chip and a target device;
the connector is connected with the automatic switching module;
the automatic switching module is used for monitoring the connector, and disconnecting the communication connection between the software protector and the target device after the software protector is inserted into the connector, so that the software protector can burn firmware on the voltage conversion chip.
Preferably, the automatic switching module is provided with a switch, and the switch is used for turning off the working voltage of the target I2C device; the target I2C device powers the target device.
A firmware burning device, comprising:
the connection monitoring module is used for monitoring a connector in the burning circuit;
the access control module is used for disconnecting the communication connection between the software protector and the target device after the software protector is monitored to be inserted into the connector;
and the firmware burning module is used for burning firmware to the voltage conversion chip in the burning circuit by using the software protector.
An electronic device, comprising:
a memory for storing a computer program;
and the processor is used for realizing the steps of the firmware burning method when the computer program is executed.
A readable storage medium, on which a computer program is stored, which, when executed by a processor, implements the steps of the firmware burning method described above.
Monitoring a connector in a burning circuit by applying the method provided by the embodiment of the application; after the fact that the software protector is inserted into the connector is monitored, the communication connection between the software protector and the target device is disconnected; and burning firmware to a voltage conversion chip in the burning circuit by using the software protector.
The reason why the software protector is used for burning the firmware of the voltage conversion chip is that when the firmware is burnt to the voltage conversion chip, the I2C communication conflicts, so that the firmware cannot be burnt. Therefore, in the present application, in order to improve the success rate of burning firmware onto the voltage conversion chip, the connector in the burning circuit is first monitored. When the software protector is detected to be inserted into the connector, the communication connection between the software protector and the target device is directly disconnected. I.e. only the communication connection between the dongle and the voltage conversion chip can be reserved, directly avoiding the I2C communication collision from the physical hardware point of view. Then, the firmware is burned on the voltage conversion chip by using the software protector, and the success rate of burning the firmware can be effectively improved due to the fact that I2C communication conflict is avoided.
Accordingly, the embodiment of the present application further provides a recording circuit, a firmware recording device, an apparatus and a readable storage medium corresponding to the firmware recording method, which have the above technical effects and are not described herein again.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments or related technologies of the present application, the drawings needed to be used in the description of the embodiments or related technologies are briefly introduced below, it is obvious that the drawings in the following description are only some embodiments of the present application, and for those skilled in the art, other drawings can be obtained according to these drawings without creative efforts.
FIG. 1 is a flowchart illustrating an implementation of a firmware burning method according to an embodiment of the present application;
FIG. 2 is a schematic diagram of a recording circuit according to an embodiment of the present application;
FIG. 3 is a schematic diagram of a recording circuit;
FIG. 4 is a schematic diagram of another recording circuit according to an embodiment of the present application;
FIG. 5 is a schematic diagram illustrating a firmware burning device according to an embodiment of the present application;
fig. 6 is a schematic structural diagram of an electronic device in an embodiment of the present application;
fig. 7 is a schematic structural diagram of an electronic device in an embodiment of the present application.
Detailed Description
In order that those skilled in the art will better understand the disclosure, the following detailed description will be given with reference to the accompanying drawings. It is to be understood that the embodiments described are only a few embodiments of the present application and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
Referring to fig. 1, fig. 1 is a flowchart illustrating a firmware burning method according to an embodiment of the present application, the method including the following steps:
and S101, monitoring a connector in the burning circuit.
The software protector can be inserted into a connector in the burning circuit, so that communication connection between the software protector and the voltage conversion chip is formed, and firmware can be burnt to the voltage conversion chip through the communication connection software protector. The voltage conversion chip can be any VR which needs firmware burning, such as a CPU VR and a DIMM VR.
In an actual recording circuit, after the dongle is inserted into the connector, not only a communication connection between the dongle and the voltage conversion chip may be formed, but also a communication connection between the dongle and a CPU (processor), a BMC (baseboard management controller), and a CPLD (Complex Programmable Logic Device) may be formed, and the communication connection between the dongle and the CPU, the BMC, and the CPLD may cause communication interference to the communication connection between the dongle and the voltage conversion chip.
Therefore, in the embodiment of the present application, in order to improve the success rate of VR FW, it is proposed to monitor the connector in the burning circuit so as to effectively control the communication connection corresponding to the dongle. Communication connection between the software protector and other target devices which may cause interference is disconnected by reserving communication connection between the software protector and the voltage conversion chip, so that the success rate of burning firmware of the voltage conversion chip is guaranteed.
In a specific embodiment of the present application, the step S101 of monitoring the connector in the burning circuit may specifically include:
monitoring a voltage value of a connector;
step two, if the voltage value is increased from the first voltage to a second voltage, determining that the software protector is inserted into the connector;
and step two, if the voltage value is reduced from the second voltage to the first voltage, determining that the dongle is pulled out of the connector.
For convenience of description, the above three steps will be described in combination.
When the dongle is inserted into the connector, since the dongle signal has a phenomenon of being pulled up to a voltage (e.g., 3.3V (volt)) and thus can determine whether the dongle is inserted into the connector by monitoring the voltage value of the connector.
It should be noted that, in the present application, the first voltage is lower than the second voltage, and there is no sequential or primary and secondary limitation between the first voltage and the second voltage, the first voltage may specifically be a voltage corresponding to the dongle being inserted into the connector, and the second voltage may specifically be a voltage (e.g. 3.3V) corresponding to the dongle being inserted into the connector.
Specifically, the voltage value of the connector can be monitored in real time, and when the voltage value is increased from a first voltage to a second voltage, the software protector can be determined to be inserted into the connector; when the voltage value is reduced from the second voltage to the first voltage, the dongle can be determined to be unplugged from the connector. Determining that the dongle is not plugged into the connector when the voltage value remains at the first voltage; when the voltage value remains at the second voltage, it may be determined that the dongle remains plugged into the connector.
In practical applications, the voltage status of the connector, i.e. whether the dongle is inserted into the connector, can be monitored by the auto-switching module as shown in fig. 2. That is, the voltage value of the connector is monitored by the automatic switching module connected with the connector. The automatic switching module may be specifically a circuit with monitoring and switching functions, and the circuit may specifically include a voltage detector for detecting whether the dongle is inserted into the connector; and the change-over switch is used for disconnecting the communication connection between the software protector and the devices such as the BMC, the CPLD and the like after the software protector is inserted into the connector, and restoring the communication connection between the software protector and the devices such as the BMC, the CPLD and the like after the software protector is pulled out from the connector.
The I2C bus has three types of signals in the process of transmitting data: a start signal, an end signal and a response signal; start signal: when SCL is high level, SDA jumps from high level to low level to start transmitting data; an end signal: when SCL is high level, SDA jumps from low level to high level to finish transmitting data.
Of course, in practical applications, it may be monitored whether the dongle is inserted into the connector by using techniques such as image processing and infrared monitoring. For example, timed or real-time image capture of the connector, determining whether a dongle is inserted into the connector by identifying whether the dongle is present in the image; a monitoring infrared (including an infrared transmitter and an infrared receiver) is provided at the position of the insertion interface of the connector, and when the dongle is inserted into the connector so that the infrared is blocked, the infrared receiver generates a varying signal, thereby determining that the dongle is inserted into the connector.
S102, after the fact that the dongle is inserted into the connector is monitored, the communication connection between the dongle and the target device is disconnected.
When the software protector is detected to be inserted into the connector, the firmware burning of the voltage conversion chip is indicated, so that the communication connection between the software protector and the target device can be disconnected at the moment, and therefore I2C communication conflict is avoided, and the success rate of firmware burning is improved. The target device is a device which can interfere with firmware burning, such as a CPU, a BMC and a CPLD. For example, the following steps are carried out: as shown in fig. 3, the reason why the dongle is used to write the firmware into the voltage conversion chip is that when the dongle is used to write the firmware into the voltage conversion chip, the I2C communication conflicts, which results in the failure of writing. Specifically, the VR FW is burned by connecting an I2C connector (I2C connector) through a dongle, but the burned communication I2C is not only connected to the dongle, but also connected to the CPU, BMC, and CPLD. When dongle burns firmware to VR (voltage conversion chip), if CPLD, BMC, CPU have access or have access to CPU VR/DIMM VR, I2C communication conflict will be generated, resulting in unsuccessful burning.
In one embodiment of the present application, the disconnecting the dongle from the target device in step S102 includes: turning off the operating voltage of the target I2C device by using a switch; wherein the target I2C device powers the target device. Specifically, referring to fig. 4, a switch is set in fig. 4, and the operating voltage of the target I2C device can be turned off by the switch, so as to disconnect the operating voltages of the target I2C device and the target device, so that the target device cannot operate normally, i.e., the communication connection between the dongle and the target device can be disconnected.
In practical application, when the fact that the dongle is inserted into the connector is monitored, prompt information for disconnecting the communication connection between the dongle and the target device can be output externally in a light or sound or screen display mode, so that a user can disconnect the communication connection between the dongle and the target device in time, and the communication connection between the dongle and the target device can be disconnected by directly adopting a manual line removal mode or a manual control switch mode.
And S103, burning firmware to a voltage conversion chip in the burning circuit by using the software protector.
After the communication connection which can cause firmware burning interference is disconnected, firmware can be burnt to the voltage conversion chip by using the software protector. In the embodiment of the present application, how to burn firmware into the voltage conversion chip and what kind of firmware is burned are not limited.
At this time, since communication interference (especially, I2C communication interference) does not exist, the success rate of firmware burning can be greatly improved.
After the firmware is burned, the software protector can be pulled out from the connector, and in order to not interfere the normal work of the target device, the communication connection between the software protector and the target device can be recovered when the software protector can be detected to be pulled out. That is, when the dongle is detected to be unplugged, the communication connection between the dongle and the target device can be restored. Specifically, if the switch is used to disconnect the relevant communication connection and the dongle is pulled out, 3.3V of the dongle is pulled out, the switch does not work, and the I2C device operating voltage of the BMC and the CPLD is restored.
Monitoring a connector in a burning circuit by applying the method provided by the embodiment of the application; after the fact that the software protector is inserted into the connector is monitored, the communication connection between the software protector and the target device is disconnected; and burning firmware to a voltage conversion chip in the burning circuit by using the software protector.
The reason why the software protector is used for burning the firmware of the voltage conversion chip is that when the firmware is burnt to the voltage conversion chip, the I2C communication conflicts, so that the firmware cannot be burnt. Therefore, in the present application, in order to improve the success rate of burning firmware onto the voltage conversion chip, the connector in the burning circuit is first monitored. When the software protector is detected to be inserted into the connector, the communication connection between the software protector and the target device is directly disconnected. I.e. only the communication connection between the dongle and the voltage conversion chip can be reserved, directly avoiding the I2C communication collision from the physical hardware point of view. Then, the firmware is burned on the voltage conversion chip by using the software protector, and the success rate of burning the firmware can be effectively improved due to the fact that I2C communication conflict is avoided.
Corresponding to the above method embodiments, the present application further provides a burning circuit, and the burning circuit described below and the firmware burning method described above can be referred to correspondingly.
Referring to fig. 2, the burning circuit includes:
the device comprises a connector, an automatic switching module, a voltage conversion chip and a target device;
the connector is connected with the automatic switching module;
and the automatic switching module is used for monitoring the connector, and disconnecting the communication connection between the software protector and the target device after the software protector is inserted into the connector so that the software protector can burn firmware on the voltage conversion chip.
The automatic switching module is provided with a switch, and the switch is used for switching off the working voltage of the target I2C device; the target I2C device powers the target device.
The target device can be a CPU, a BMC or a CPLD. The voltage conversion chip can be any VR such as a CPU VR or a DIMM VR.
That is to say, an automatic switching module is added to the related burning circuit, so that only the dongle path is conducted when the dongle is automatically inserted, and other paths are conducted when the dongle is pulled out.
Specifically, when the dongle is inserted into the connector, the operating voltage of the I2C device connected to the BMC and the CPLD can be turned off by a switch due to the dongle signal pulling up to 3.3V. When the dongle is pulled out, 3.3V of the dongle is pulled out, the change-over switch does not work, and the working voltage of the I2C devices of the BMC and the CPLD is recovered. Therefore, the condition of I2C access conflict is not generated, and the fast read-write burning is realized.
Corresponding to the above method embodiments, the present application further provides a firmware burning apparatus, and the firmware burning apparatus described below and the firmware burning method described above may be referred to correspondingly.
Referring to fig. 5, the apparatus includes the following modules:
the connection monitoring module 101 is used for monitoring a connector in the burning circuit;
the access control module 102 is used for disconnecting the communication connection between the dongle and the target device after the dongle is monitored to be inserted into the connector;
and the firmware burning module 103 is used for burning firmware to the voltage conversion chip in the burning circuit by using the software protector.
The device provided by the embodiment of the application is applied to monitor the connector in the burning circuit; after the fact that the software protector is inserted into the connector is monitored, the communication connection between the software protector and the target device is disconnected; and burning firmware to a voltage conversion chip in the burning circuit by using the software protector.
The reason why the software protector is used for burning the firmware of the voltage conversion chip is that when the firmware is burnt to the voltage conversion chip, the I2C communication conflicts, so that the firmware cannot be burnt. Therefore, in the present application, in order to improve the success rate of burning firmware onto the voltage conversion chip, the connector in the burning circuit is first monitored. When the software protector is detected to be inserted into the connector, the communication connection between the software protector and the target device is directly disconnected. I.e. only the communication connection between the dongle and the voltage conversion chip can be reserved, directly avoiding the I2C communication collision from the physical hardware point of view. Then, the firmware is burned on the voltage conversion chip by using the software protector, and the success rate of burning the firmware can be effectively improved due to the fact that I2C communication conflict is avoided.
In one embodiment of the present application, the method further includes:
and the recovery module is used for recovering the communication connection between the software protector and the target device if the software protector is monitored to be pulled out.
In one embodiment of the present application, the path control module 102 is specifically configured to turn off the operating voltage of the target I2C device by using a switch; wherein the target I2C device powers the target device.
In a specific embodiment of the present application, the monitoring module 101 is connected, and is specifically configured to monitor a voltage value of the connector;
determining that the dongle is inserted into the connector if the voltage value increases from the first voltage to the second voltage;
and if the voltage value is reduced from the second voltage to the first voltage, determining that the dongle is pulled out of the connector.
In an embodiment of the present application, the connection monitoring module 101 is specifically configured to monitor a voltage value of the connector by using an automatic switching module connected to the connector.
Corresponding to the above method embodiment, the present application further provides an electronic device, and the electronic device described below and the firmware burning method described above may be referred to correspondingly.
Referring to fig. 6, the electronic device includes:
a memory 332 for storing a computer program;
the processor 322 is configured to implement the steps of the firmware burning method of the above-mentioned method embodiment when executing the computer program.
Specifically, referring to fig. 7, fig. 7 is a schematic diagram of a specific structure of an electronic device according to the present embodiment, which may generate relatively large differences due to different configurations or performances, and may include one or more processors (CPUs) 322 (e.g., one or more processors) and a memory 332, where the memory 332 stores one or more computer applications 342 or data 344. Memory 332 may be, among other things, transient or persistent storage. The program stored in memory 332 may include one or more modules (not shown), each of which may include a sequence of instructions operating on a data processing device. Still further, the central processor 322 may be configured to communicate with the memory 332 to execute a series of instruction operations in the memory 332 on the electronic device 301.
The electronic device 301 may also include one or more power sources 326, one or more wired or wireless network interfaces 350, one or more input-output interfaces 358, and/or one or more operating systems 341.
The electronic Device may be implemented by one or more Application Specific Integrated Circuits (ASICs), Digital Signal Processors (DSPs), Digital Signal Processing Devices (DSPDs), Programmable Logic Devices (PLDs), Field Programmable Gate Arrays (FPGAs), controllers, microcontrollers, microprocessors or other electronic components, and is configured to perform the firmware burning method according to the above embodiments.
That is, the steps in the firmware burning method described above may be implemented by the structure of the electronic device.
Corresponding to the above method embodiment, the present application further provides a readable storage medium, and a readable storage medium described below and a firmware burning method described above may be referred to correspondingly.
A readable storage medium, on which a computer program is stored, wherein the computer program, when executed by a processor, implements the steps of the firmware burning method of the above method embodiment.
The readable storage medium may be a usb disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and various other readable storage media capable of storing program codes.
The embodiments are described in a progressive manner, each embodiment focuses on differences from other embodiments, and the same or similar parts among the embodiments are referred to each other. The device disclosed by the embodiment corresponds to the method disclosed by the embodiment, so that the description is simple, and the relevant points can be referred to the method part for description.
Those of skill would further appreciate that the various illustrative components and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware, computer software, or combinations of both, and that the various illustrative components and steps have been described above generally in terms of their functionality in order to clearly illustrate this interchangeability of hardware and software. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
The steps of a method or algorithm described in connection with the embodiments disclosed herein may be embodied directly in hardware, in a software module executed by a processor, or in a combination of the two. A software module may reside in Random Access Memory (RAM), memory, Read Only Memory (ROM), electrically programmable ROM, electrically erasable programmable ROM, registers, hard disk, a removable disk, a CD-ROM, or any other form of storage medium known in the art.
Finally, it should also be noted that, herein, relationships such as first and second, etc., are intended only to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms include, or any other variation is intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that includes a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus.
The principle and the implementation of the present application are explained herein by applying specific examples, and the above description of the embodiments is only used to help understand the method and the core idea of the present application; meanwhile, for a person skilled in the art, according to the idea of the present application, there may be variations in the specific embodiments and the application scope, and in summary, the content of the present specification should not be construed as a limitation to the present application.

Claims (10)

1. A firmware burning method is characterized by comprising the following steps:
monitoring a connector in the burning circuit;
after the fact that the dongle is inserted into the connector is monitored, disconnecting the communication connection between the dongle and a target device;
and burning firmware to a voltage conversion chip in the burning circuit by using the software protector.
2. The firmware burning method of claim 1, further comprising:
and if the fact that the software protector is pulled out is monitored, the communication connection between the software protector and the target device is recovered.
3. The firmware burning method of claim 1, wherein disconnecting the dongle from communication with the target device comprises:
turning off the operating voltage of the target I2C device by using a switch; wherein the target I2C device powers the target device.
4. The method of claim 1, wherein monitoring a connector in a burning circuit comprises:
monitoring the voltage value of the connector;
determining that the dongle is inserted into the connector if the voltage value increases from a first voltage to a second voltage;
and if the voltage value is reduced from the second voltage to the first voltage, determining that the dongle is unplugged from the connector.
5. The firmware burning method of claim 4, wherein the monitoring the voltage value of the connector comprises:
and monitoring the voltage value of the connector by utilizing an automatic switching module connected with the connector.
6. A burning circuit, comprising:
the device comprises a connector, an automatic switching module, a voltage conversion chip and a target device;
the connector is connected with the automatic switching module;
the automatic switching module is used for monitoring the connector, and disconnecting the communication connection between the software protector and the target device after the software protector is inserted into the connector, so that the software protector can burn firmware on the voltage conversion chip.
7. The burning circuit as claimed in claim 6, wherein the automatic switching module has a switch therein for turning off the operating voltage of the target I2C device; the target I2C device powers the target device.
8. A firmware burning device is characterized by comprising:
the connection monitoring module is used for monitoring a connector in the burning circuit;
the access control module is used for disconnecting the communication connection between the software protector and the target device after the software protector is monitored to be inserted into the connector;
and the firmware burning module is used for burning firmware to the voltage conversion chip in the burning circuit by using the software protector.
9. An electronic device, comprising:
a memory for storing a computer program;
a processor for implementing the steps of the firmware burning method according to any one of claims 1 to 5 when executing the computer program.
10. A readable storage medium, on which a computer program is stored, which, when executed by a processor, implements the steps of the firmware burning method according to any one of claims 1 to 5.
CN202111164916.7A 2021-09-30 2021-09-30 Firmware burning method, burning circuit, device, equipment and readable storage medium Pending CN114020283A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111164916.7A CN114020283A (en) 2021-09-30 2021-09-30 Firmware burning method, burning circuit, device, equipment and readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111164916.7A CN114020283A (en) 2021-09-30 2021-09-30 Firmware burning method, burning circuit, device, equipment and readable storage medium

Publications (1)

Publication Number Publication Date
CN114020283A true CN114020283A (en) 2022-02-08

Family

ID=80055480

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111164916.7A Pending CN114020283A (en) 2021-09-30 2021-09-30 Firmware burning method, burning circuit, device, equipment and readable storage medium

Country Status (1)

Country Link
CN (1) CN114020283A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117251183A (en) * 2023-11-16 2023-12-19 苏州元脑智能科技有限公司 Firmware burning method, main board, device, equipment, system and storage medium

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117251183A (en) * 2023-11-16 2023-12-19 苏州元脑智能科技有限公司 Firmware burning method, main board, device, equipment, system and storage medium
CN117251183B (en) * 2023-11-16 2024-02-20 苏州元脑智能科技有限公司 Firmware burning method, main board, device, equipment, system and storage medium

Similar Documents

Publication Publication Date Title
US10860425B2 (en) Method for recovering basic input/output system image file of a computer system and the computer system
JP4464451B2 (en) Microcontroller
US20200290460A1 (en) Method for processing throttle control signal, electronic speed regulator, controller, and mobile platform
CN1074767A (en) The method that computing machine, equipment and system thereof reconfigure
CN112000351B (en) Updating method, updating device, updating equipment and storage medium of BMC (baseboard management controller) firmware
CN101373433A (en) Method for updating BIOS and computer and system using the same
CN103729220A (en) Method and device for restoring BIOS (basic input output system) ROM (read only memory) by aid of EC (electronically controllable) ROM
CN112612357B (en) Abnormal power-off protection system, method and equipment for sub-nodes in server of whole cabinet
CN114020283A (en) Firmware burning method, burning circuit, device, equipment and readable storage medium
CN110865822A (en) Starting framework and method of Bootloader flash program for whole vehicle controller
CN114003173A (en) Power-down protection system of storage device and storage device
CN111881074A (en) Electronic system, host device and control method
CN117331760A (en) Equipment debugging method and device based on USB interface and storage medium
CN100410893C (en) Method and apparatus for master-controlled applied programm of self-repairing built-in equipment
US8406069B2 (en) Data writing method and writing device for an electronic erasable read only dynamic memory
US10482053B2 (en) Information processing apparatus with connection terminal for connecting to electronic devices having different functions
CN112115000B (en) Remote resetting method and system of system component power supply and BMC remote device
CN116466968B (en) Access method and device of main board flash memory and firmware burning method and device
CN110908673A (en) Digital power supply chip burning method
CN104143350A (en) Electronic apparatus
CN214376428U (en) Intelligent vehicle-mounted internet terminal mainboard, intelligent vehicle-mounted internet terminal and vehicle
CN214897632U (en) Detection device of nonvolatile memory
CN116155389B (en) Optical module debugging system and method
CN114979925A (en) Earphone type recognition device, earphone type recognition method, earphone type recognition device, and storage medium
EP4131888A1 (en) Method for searching for interrupted device, slave device, master device, and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination