CN116126380A - Firmware upgrading method and device, electronic equipment and storage medium - Google Patents

Firmware upgrading method and device, electronic equipment and storage medium Download PDF

Info

Publication number
CN116126380A
CN116126380A CN202310152578.8A CN202310152578A CN116126380A CN 116126380 A CN116126380 A CN 116126380A CN 202310152578 A CN202310152578 A CN 202310152578A CN 116126380 A CN116126380 A CN 116126380A
Authority
CN
China
Prior art keywords
firmware
target
candidate
slave device
network disk
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310152578.8A
Other languages
Chinese (zh)
Inventor
田伟
张平化
孟凡己
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Fj Controlling Co ltd
Original Assignee
Fj Controlling Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fj Controlling Co ltd filed Critical Fj Controlling Co ltd
Priority to CN202310152578.8A priority Critical patent/CN116126380A/en
Publication of CN116126380A publication Critical patent/CN116126380A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/60Software deployment
    • G06F8/65Updates
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Stored Programmes (AREA)

Abstract

The invention discloses a firmware upgrading method, a firmware upgrading device, electronic equipment and a storage medium. The method comprises the following steps: determining a target slave device from at least one candidate slave device in response to a device determination operation, and determining candidate firmware according to the target slave device and a pre-generated credential file; acquiring network disk parameters of a target network disk associated with a firmware publisher, establishing connection with the target network disk according to the network disk parameters, and acquiring target firmware from the candidate firmware stored in the target network disk; and sending the target firmware to the target slave device according to a preset firmware upgrading protocol. By operating the technical scheme provided by the embodiment of the invention, the problem that the firmware upgrading cost is increased and the convenience of firmware upgrading is improved because the specific firmware issuing system is required to be established in the prior art, so that the equipment to be upgraded downloads the upgrading firmware from the firmware issuing system can be solved.

Description

Firmware upgrading method and device, electronic equipment and storage medium
Technical Field
The present invention relates to firmware upgrade technologies, and in particular, to a firmware upgrade method, apparatus, electronic device, and storage medium.
Background
After the device is applied, firmware in the device needs to be upgraded due to technical upgrade or fault repair and other reasons.
Existing upgrades generally include: programming in the system (In System Programming, ISP), programming in the circuit (In Circuit Programming, ICP) and programming in the application (In Application Programming, IAP). ISPs and ICPs are generally suitable for burning programs during the factory production phase, but cannot update programs through external interfaces when the device is cased, thus not facilitating frequent upgrades of firmware. IAP firmware upgrade processes typically involve building a specific firmware distribution system such that the device to be upgraded downloads the upgraded firmware from the firmware distribution system, increasing firmware upgrade costs.
Disclosure of Invention
The invention provides a firmware upgrading method, a firmware upgrading device, electronic equipment and a storage medium, so as to improve convenience of firmware upgrading.
According to an aspect of the present invention, there is provided a firmware upgrade method performed by a master device connected to at least one candidate slave device, the method comprising:
determining a target slave device from at least one candidate slave device in response to a device determination operation, and determining candidate firmware according to the target slave device and a pre-generated credential file;
acquiring network disk parameters of a target network disk associated with a firmware publisher, establishing connection with the target network disk according to the network disk parameters, and acquiring target firmware from the candidate firmware stored in the target network disk;
and sending the target firmware to the target slave device according to a preset firmware upgrading protocol.
According to another aspect of the present invention, there is provided a firmware upgrade apparatus configured in a master device, the master device being connected to at least one candidate slave device, the apparatus comprising:
a candidate firmware determining module, configured to determine a target slave device from at least one candidate slave device in response to a device determining operation, and determine candidate firmware according to the target slave device and a pre-generated credential file;
the target firmware acquisition module is used for acquiring network disk parameters of a target network disk, establishing connection with the target network disk according to the network disk parameters, and acquiring target firmware from the candidate firmware stored in the target network disk;
and the firmware sending module is used for sending the target firmware to the target slave equipment according to a preset firmware upgrading protocol.
According to another aspect of the present invention, there is provided an electronic apparatus including:
at least one processor; and
a memory communicatively coupled to the at least one processor; wherein,,
the memory stores a computer program executable by the at least one processor to enable the at least one processor to perform the firmware upgrade method of any one of the embodiments of the present invention.
According to another aspect of the present invention, there is provided a computer readable storage medium storing computer instructions for causing a processor to execute a firmware upgrade method according to any one of the embodiments of the present invention.
According to the technical scheme, the target slave device is determined from at least one candidate slave device in response to the device determining operation, and the candidate firmware is determined according to the target slave device and the pre-generated credential file, so that the determined candidate firmware is the firmware authorized to be upgraded, the problem that the firmware upgrading operation is executed on the firmware unauthorized to be upgraded is avoided, and the effectiveness of firmware upgrading is improved. The network disk parameters of the target network disk associated with the firmware publisher are acquired, so that connection with the target network disk is established according to the network disk parameters, the target firmware is acquired from the existing target network disk, a specific firmware publication system is not required to be additionally established, and the firmware publication system is not required to be correspondingly developed in order to be compatible with different main devices, so that the cost of firmware publication is reduced, and the development time of firmware upgrade is saved. According to a preset firmware upgrading protocol, the target firmware is sent to the target slave devices, the firmware of a plurality of target slave devices can be upgraded only through communication between the target network disk and a single master device, and each device to be upgraded does not need to interact with the target network disk directly, so that the firmware upgrading efficiency is improved.
It should be understood that the description in this section is not intended to identify key or critical features of the embodiments of the invention or to delineate the scope of the invention. Other features of the present invention will become apparent from the description that follows.
Drawings
Fig. 1 is a flowchart of a firmware upgrade method according to a first embodiment of the present invention;
fig. 2 is a flowchart of a firmware upgrading method according to a second embodiment of the present invention;
fig. 3 is a schematic structural diagram of a firmware upgrading apparatus according to a third embodiment of the present invention;
fig. 4 is a schematic structural diagram of an electronic device for implementing an embodiment of the present invention.
Detailed Description
In order that those skilled in the art will better understand the present invention, a technical solution in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in which it is apparent that the described embodiments are only some embodiments of the present invention, not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the present invention without making any inventive effort, shall fall within the scope of the present invention.
It should be noted that the terms "first," "second," "target," and the like in the description and claims of the present invention and in the above figures are used for distinguishing between similar objects and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used may be interchanged where appropriate such that the embodiments of the invention described herein may be implemented in sequences other than those illustrated or otherwise described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
Example 1
Fig. 1 is a flowchart of a firmware upgrading method according to a first embodiment of the present invention, where the method may be performed by a firmware upgrading device according to the first embodiment of the present invention, and the device may be implemented by software and/or hardware. Referring to fig. 1, the firmware upgrading method provided in this embodiment includes:
step 110, in response to the device determination operation, determining a target slave device from at least one candidate slave device, and determining candidate firmware according to the target slave device and the pre-generated credential file.
The master device is a device for centrally processing firmware upgrades of all candidate slave devices, and may be a computer terminal or a remote server terminal, which is not limited in this embodiment. Candidate slave devices are devices that may have a need to upgrade firmware. Each master device may be connected to one or more candidate slave devices, which may be wired or wireless, and this embodiment is not limited in this regard.
The device determining operation is an operation of determining a device needing to upgrade firmware, the target slave device is a device needing to upgrade firmware currently, and each candidate slave device and a selection key associated with the candidate slave device can be displayed, the candidate slave device is selected by clicking the selection key and the like, and the selected candidate slave device is determined to be the target slave device; the selection result of the candidate slave device in the last firmware upgrade procedure contained in the configuration file can be obtained by loading the configuration file, and if adjustment is needed, the candidate slave device can be updated on the basis of the selection result, which is not limited in this embodiment.
The credential file may contain authorization information, where the authorization information may contain a firmware type of firmware that the firmware issuer authorizes the firmware updater to upgrade, such as firmware of a licensed upgrade meter device, firmware of an unlicensed upgrade controller device, and so forth. The credential file may be generated by the firmware issuer and passed to the master device prior to the firmware upgrade, such that the master device reads the credential file at the time of the firmware upgrade.
The candidate firmware may be all firmware having the upgrade authority in the target slave device, all firmware contained in the target slave device may be determined, and the firmware having the upgrade authority therein may be determined by reading the authorization information in the credential file.
In this embodiment, optionally, before determining the candidate firmware according to the target slave device and the pre-generated credential file, the method further includes:
and acquiring the hardware information of the main equipment, and sending the hardware information to the firmware publisher so that the firmware publisher generates a credential file according to the hardware information.
The hardware information may include hardware information specific to the master device, such as a CPU ID of the master device, a hard disk ID, and the like, and the hardware information is sent to the firmware issuer, which may generate the credential file according to the hardware information, the candidate slave devices associated with the master device, and other information requiring authorization.
Correspondingly, when the firmware is updated later, the file information contained in the credential file is obtained by reading the hardware information of the main equipment.
Generating corresponding voucher files according to the hardware information of the master equipment, so that corresponding contents can be added in the voucher files according to the actual conditions of different master equipment, and the pertinence of the generation of the voucher files is improved; and the corresponding credential file can be used only according to the hardware information of the main equipment, so that the security of firmware upgrading is improved.
In this embodiment, optionally, the master device is connected to at least one candidate slave device through a CAN bus.
The master device is connected with at least one candidate slave device through the CAN bus, so that when the slave device needs to upgrade firmware, the slave device only needs to be connected with the master device through the CAN bus, and therefore, the slave device does not need to increase a networking function, and the production cost of the slave device and the cost of firmware upgrade are reduced.
Step 120, obtaining network disk parameters of a target network disk associated with the firmware publisher, so as to establish connection with the target network disk according to the network disk parameters, and obtaining target firmware from candidate firmware stored in the target network disk.
The target network disk associated with the firmware publisher may be a third party network disk corresponding to the firmware publisher and having a storage function, for example, an enterprise micro disk of the firmware publisher, which is not limited in this embodiment.
The network disk parameters of the target network disk may be provided to the master device in advance by the firmware publisher, for example, in the case of an enterprise micro disk, the network disk parameters may include corpid, corpsecret, and the like, and a token for accessing the target network disk may be generated according to the network disk parameters, so as to establish an http connection between the master device and the target network disk according to the generated token.
The target firmware is obtained from the candidate firmware stored in the target network disk, and the network disk path of the candidate firmware in the target network disk can be obtained from the credential file, so that the target firmware is obtained according to the network disk path, wherein the target firmware is the firmware actually required to be obtained by the host device, and can be all the firmware in the candidate firmware or part of the firmware in the candidate firmware, which is not limited in this embodiment.
And 130, according to a preset firmware upgrading protocol, the target firmware is sent to the target slave device.
The preset firmware upgrade protocol is a firmware upgrade protocol between the master device and the candidate slave device, and may include a firmware data transmission mode of the master device and a response mode of the slave device when obtaining firmware data, for example, for each time the master device transmits a frame of data, the slave device needs to respond once whether the frame of data is received successfully, which is not limited in this embodiment.
According to the technical scheme provided by the embodiment, the target slave device is determined from at least one candidate slave device in response to the device determining operation, and the candidate firmware is determined according to the target slave device and the pre-generated credential file, so that the determined candidate firmware is the firmware authorized to be upgraded, the problem of executing the firmware upgrading operation on the firmware unauthorized to be upgraded is avoided, and the effectiveness of firmware upgrading is improved.
The network disk parameters of the target network disk associated with the firmware publisher are acquired, so that connection with the target network disk is established according to the network disk parameters, the target firmware is acquired from the existing target network disk, a specific firmware publication system is not required to be additionally established, and the firmware publication system is not required to be correspondingly developed in order to be compatible with different main devices, so that the cost of firmware publication is reduced, and the development time of firmware upgrade is saved.
According to a preset firmware upgrading protocol, the target firmware is sent to the target slave devices, the firmware of a plurality of target slave devices can be upgraded only through communication between the target network disk and a single master device, and each device to be upgraded does not need to interact with the target network disk directly, so that the firmware upgrading efficiency is improved.
Example two
Fig. 2 is a flowchart of a firmware upgrading method according to a second embodiment of the present invention, and the present technical solution is to supplement the process of sending the target firmware to the target slave device according to the preset firmware upgrading protocol. Compared with the scheme, the scheme is specifically optimized, according to a preset firmware upgrade protocol, the target firmware is sent to the target slave device, and the scheme comprises the following steps:
determining the blocking information of the target firmware according to a preset firmware protocol;
the target firmware sends the current block to the target slave device according to the block information so as to acquire firmware receiving information returned by the target slave device according to the block information;
and determining the transmission mode of the next block of the target firmware according to the firmware receiving information. Specifically, a flowchart of a firmware upgrade method is shown in fig. 2:
step 210, in response to the device determination operation, determining a target slave device from at least one candidate slave device, and determining candidate firmware according to the target slave device and the pre-generated credential file.
Step 220, obtaining network disk parameters of a target network disk associated with the firmware publisher, so as to establish connection with the target network disk according to the network disk parameters, and obtaining target firmware from candidate firmware stored in the target network disk.
In this embodiment, optionally, the obtaining the target firmware from the candidate firmware stored in the target network disk includes:
displaying a firmware list of the candidate firmware, and determining a target firmware in response to a selection operation on the firmware list;
storing the target firmware into a cache file of the main device.
The firmware list can be displayed in a display interface of the main device, a user of the main device can generate selection operation on the firmware list through clicking a check box in the firmware list, and the selected candidate firmware is determined to be the target firmware, so that the corresponding target firmware can be upgraded according to actual needs, and the flexibility of firmware upgrading is improved.
The target firmware is stored in the cache file of the master device, not written into the fixed folder of the master device, and can be deleted from the cache after being transferred to the target slave device, so that excessive space is avoided. And the target firmware is stored in the cache file of the main equipment, so that a user of the main equipment cannot directly contact the target firmware, and the confidentiality of firmware upgrading is improved.
In this embodiment, optionally, after obtaining the target firmware from the candidate firmware stored in the target network disk, the method further includes:
if the target firmware is the encrypted firmware, acquiring a decryption key from the credential file;
and executing decryption operation on the target firmware according to the decryption key.
The encryption firmware is the firmware which is encrypted by adopting an encryption algorithm in advance, the credential file contains a decryption key provided by a firmware issuer in advance, and the decryption operation is carried out on the obtained target firmware through the decryption key, so that the decrypted target firmware can be conveniently transmitted to the target slave device. The integrity of the target firmware can also be checked according to the check value obtained from the credential file.
If the target firmware is stored in the cache file of the main device, the decryption operation can be directly completed in the cache, so that a user of the main device cannot directly contact the target firmware, and the confidentiality of firmware upgrading is improved.
The obtained target firmware is encrypted firmware, so that the target firmware is prevented from being stolen by other objects, and the safety of firmware obtaining is improved; the decryption key is obtained from the credential file, and the credential file corresponds to the master device, so that the corresponding decryption key can be set according to different master devices, and the security of firmware acquisition is further improved; and the credential file contains a plurality of information related to firmware upgrade such as decryption keys, and the information can be obtained in a centralized way during firmware upgrade, so that the information obtaining efficiency is improved.
Step 230, determining the blocking information of the target firmware according to the preset firmware protocol.
The blocking information is a range of continuously transmitting the target firmware, for example, if the target firmware data is transmitted from the master device to the target slave device through the CAN bus, the single frame data generally contains 8 bytes, so when the target firmware contains a large amount of data, the data of the target firmware needs to be split and transmitted, and one frame is transmitted at a time, and the blocking information is used for determining the number of data frames transmitted at one time, for example, 100 frames.
And 240, transmitting the current block to the target slave device by the target firmware according to the block information so as to acquire firmware receiving information returned by the target slave device according to the block information.
And transmitting the current block of the target firmware to the target slave device according to the block information, wherein the current block is a block obtained by performing block processing on the target firmware according to the block information, for example, if the range of the block information containing the continuously transmitted target firmware is 100 frames, the current block can contain 100 frames of target firmware data.
The target slave device determines a reply time according to the block information to return firmware receiving information at the reply time, wherein the firmware receiving information is a firmware receiving condition of a current block, for example, the firmware receiving information is receiving success or receiving failure, if the firmware receiving information is receiving failure, the firmware receiving information can also comprise a specific frame number of receiving failure, and if the block information comprises a range of continuously sending the target firmware to be 100 frames, the target slave device returns the firmware receiving information after receiving 100 frames of data, and if the 56 th frame is not receiving success or the receiving time exceeds a preset threshold, the returned firmware receiving information can comprise that the 56 th frame is not receiving successfully.
Step 250, determining the transmission mode of the next block of the target firmware according to the firmware receiving information.
If the firmware receiving information is that the receiving is successful, determining that the next block of the target firmware can be sent in a way of continuing to block from the first frame of the data frame which is not sent, and sending the block; if the firmware receiving information is a receiving failure, determining that the transmission mode of the next block of the target firmware can continue to block and transmit from the data frame with the failed transmission, and if the current block is 1-100 frames of data, and if the firmware receiving information is a receiving success, determining that the transmission mode of the next block of the target firmware is 101-200 frames of data; if the firmware receiving information is that the 56 th frame is not successfully received, the next block of the target firmware can be determined to be sent in a manner of sending 56-156 frame data.
According to the embodiment of the invention, the blocking information of the target firmware is determined according to a preset firmware protocol; the method comprises the steps that target firmware sends current blocks to target slave equipment according to block information to obtain firmware receiving information returned by the target slave equipment according to the block information, batch sending of target firmware data is achieved, the situation that each frame of target firmware data is sent by main equipment is avoided, the slave equipment needs to return the firmware receiving information once, and therefore sending efficiency of the target firmware is improved; and determining the transmission mode of the next block of the target firmware according to the firmware receiving information, and avoiding data omission caused by transmission failure still according to the pre-block transmission, thereby improving the integrity of the target firmware transmission.
Example III
Fig. 3 is a schematic structural diagram of a firmware upgrading apparatus according to a third embodiment of the present invention. The device can be realized in a hardware and/or software mode, is configured in the master device, and the master device is connected with at least one candidate slave device, so that the firmware upgrading method provided by any embodiment of the invention can be executed, and has the corresponding functional modules and beneficial effects of the executing method. As shown in fig. 3, the apparatus includes:
a candidate firmware determining module 310, configured to determine a target slave device from at least one candidate slave device in response to a device determining operation, and determine candidate firmware according to the target slave device and a pre-generated credential file;
a target firmware obtaining module 320, configured to obtain a network disk parameter of a target network disk, so as to establish a connection with the target network disk according to the network disk parameter, and obtain a target firmware from the candidate firmware stored in the target network disk;
and the firmware sending module 330 is configured to send the target firmware to the target slave device according to a preset firmware upgrade protocol.
On the basis of the above technical solutions, optionally, the target firmware obtaining module includes:
a target firmware determining unit, configured to display a firmware list of the candidate firmware, and determine the target firmware in response to a selection operation on the firmware list;
and the target firmware storage unit is used for storing the target firmware into the cache file of the main equipment.
On the basis of the above technical solutions, optionally, the apparatus further includes:
the key acquisition module is used for acquiring a decryption key from the credential file after the target firmware acquisition module if the target firmware is encrypted firmware;
and the decryption operation execution module is used for executing decryption operation on the target firmware according to the decryption key.
On the basis of the above technical solutions, optionally, the firmware sending module includes:
the block information determining unit is used for determining the block information of the target firmware according to the preset firmware protocol;
the firmware receiving information acquisition unit is used for transmitting the current block of the target firmware to the target slave device according to the block information so as to acquire firmware receiving information returned by the target slave device according to the block information;
and the transmission mode determining unit is used for determining the transmission mode of the next block of the target firmware according to the firmware receiving information.
On the basis of the above technical solutions, optionally, the apparatus further includes:
and the credential file generation module is used for acquiring the hardware information of the master device and sending the hardware information to the firmware publisher so that the firmware publisher generates the credential file according to the hardware information before the candidate firmware determination module executes the determination of the candidate firmware according to the target slave device and the pre-generated credential file.
On the basis of the technical schemes, optionally, the master device is connected with at least one candidate slave device through a CAN bus.
Example IV
Fig. 4 shows a schematic diagram of an electronic device 10 that may be used to implement an embodiment of the invention. Electronic devices are intended to represent various forms of digital computers, such as laptops, desktops, workstations, personal digital assistants, servers, blade servers, mainframes, and other appropriate computers. Electronic equipment may also represent various forms of mobile devices, such as personal digital processing, cellular telephones, smartphones, wearable devices (e.g., helmets, glasses, watches, etc.), and other similar computing devices. The components shown herein, their connections and relationships, and their functions, are meant to be exemplary only, and are not meant to limit implementations of the inventions described and/or claimed herein.
As shown in fig. 4, the electronic device 10 includes at least one processor 11, and a memory, such as a Read Only Memory (ROM) 12, a Random Access Memory (RAM) 13, etc., communicatively connected to the at least one processor 11, in which the memory stores a computer program executable by the at least one processor, and the processor 11 may perform various appropriate actions and processes according to the computer program stored in the Read Only Memory (ROM) 12 or the computer program loaded from the storage unit 18 into the Random Access Memory (RAM) 13. In the RAM 13, various programs and data required for the operation of the electronic device 10 may also be stored. The processor 11, the ROM 12 and the RAM 13 are connected to each other via a bus 14. An input/output (I/O) interface 15 is also connected to bus 14.
Various components in the electronic device 10 are connected to the I/O interface 15, including: an input unit 16 such as a keyboard, a mouse, etc.; an output unit 17 such as various types of displays, speakers, and the like; a storage unit 18 such as a magnetic disk, an optical disk, or the like; and a communication unit 19 such as a network card, modem, wireless communication transceiver, etc. The communication unit 19 allows the electronic device 10 to exchange information/data with other devices via a computer network, such as the internet, and/or various telecommunication networks.
The processor 11 may be a variety of general and/or special purpose processing components having processing and computing capabilities. Some examples of processor 11 include, but are not limited to, a Central Processing Unit (CPU), a Graphics Processing Unit (GPU), various specialized Artificial Intelligence (AI) computing chips, various processors running machine learning model algorithms, digital Signal Processors (DSPs), and any suitable processor, controller, microcontroller, etc. The processor 11 performs the various methods and processes described above, such as firmware upgrade methods.
In some embodiments, the firmware upgrade method may be implemented as a computer program tangibly embodied on a computer-readable storage medium, such as storage unit 18. In some embodiments, part or all of the computer program may be loaded and/or installed onto the electronic device 10 via the ROM 12 and/or the communication unit 19. When the computer program is loaded into RAM 13 and executed by processor 11, one or more steps of the firmware upgrade method described above may be performed. Alternatively, in other embodiments, processor 11 may be configured to perform the firmware upgrade method in any other suitable manner (e.g., by means of firmware).
Various implementations of the systems and techniques described here above may be implemented in digital electronic circuitry, integrated circuit systems, field Programmable Gate Arrays (FPGAs), application Specific Integrated Circuits (ASICs), application Specific Standard Products (ASSPs), systems On Chip (SOCs), load programmable logic devices (CPLDs), computer hardware, firmware, software, and/or combinations thereof. These various embodiments may include: implemented in one or more computer programs, the one or more computer programs may be executed and/or interpreted on a programmable system including at least one programmable processor, which may be a special purpose or general-purpose programmable processor, that may receive data and instructions from, and transmit data and instructions to, a storage system, at least one input device, and at least one output device.
A computer program for carrying out methods of the present invention may be written in any combination of one or more programming languages. These computer programs may be provided to a processor of a general purpose computer, special purpose computer, or other programmable data processing apparatus, such that the computer programs, when executed by the processor, cause the functions/acts specified in the flowchart and/or block diagram block or blocks to be implemented. The computer program may execute entirely on the machine, partly on the machine, as a stand-alone software package, partly on the machine and partly on a remote machine or entirely on the remote machine or server.
In the context of the present invention, a computer-readable storage medium may be a tangible medium that can contain, or store a computer program for use by or in connection with an instruction execution system, apparatus, or device. The computer readable storage medium may include, but is not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any suitable combination of the foregoing. Alternatively, the computer readable storage medium may be a machine readable signal medium. More specific examples of a machine-readable storage medium would include an electrical connection based on one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
To provide for interaction with a user, the systems and techniques described here can be implemented on an electronic device having: a display device (e.g., a CRT (cathode ray tube) or LCD (liquid crystal display) monitor) for displaying information to a user; and a keyboard and a pointing device (e.g., a mouse or a trackball) through which a user can provide input to the electronic device. Other kinds of devices may also be used to provide for interaction with a user; for example, feedback provided to the user may be any form of sensory feedback (e.g., visual feedback, auditory feedback, or tactile feedback); and input from the user may be received in any form, including acoustic input, speech input, or tactile input.
The systems and techniques described here can be implemented in a computing system that includes a background component (e.g., as a data server), or that includes a middleware component (e.g., an application server), or that includes a front-end component (e.g., a user computer having a graphical user interface or a web browser through which a user can interact with an implementation of the systems and techniques described here), or any combination of such background, middleware, or front-end components. The components of the system can be interconnected by any form or medium of digital data communication (e.g., a communication network). Examples of communication networks include: local Area Networks (LANs), wide Area Networks (WANs), blockchain networks, and the internet.
The computing system may include clients and servers. The client and server are typically remote from each other and typically interact through a communication network. The relationship of client and server arises by virtue of computer programs running on the respective computers and having a client-server relationship to each other. The server can be a cloud server, also called a cloud computing server or a cloud host, and is a host product in a cloud computing service system, so that the defects of high management difficulty and weak service expansibility in the traditional physical hosts and VPS service are overcome.
It should be appreciated that various forms of the flows shown above may be used to reorder, add, or delete steps. For example, the steps described in the present invention may be performed in parallel, sequentially, or in a different order, so long as the desired results of the technical solution of the present invention are achieved, and the present invention is not limited herein.
The above embodiments do not limit the scope of the present invention. It will be apparent to those skilled in the art that various modifications, combinations, sub-combinations and alternatives are possible, depending on design requirements and other factors. Any modifications, equivalent substitutions and improvements made within the spirit and principles of the present invention should be included in the scope of the present invention.

Claims (10)

1. A method of firmware upgrade performed by a master device, the master device being coupled to at least one candidate slave device, the method comprising:
determining a target slave device from at least one candidate slave device in response to a device determination operation, and determining candidate firmware according to the target slave device and a pre-generated credential file;
acquiring network disk parameters of a target network disk associated with a firmware publisher, establishing connection with the target network disk according to the network disk parameters, and acquiring target firmware from the candidate firmware stored in the target network disk;
and sending the target firmware to the target slave device according to a preset firmware upgrading protocol.
2. The method of claim 1, wherein obtaining target firmware from the candidate firmware stored in the target inventory comprises:
displaying a firmware list of the candidate firmware, and determining the target firmware in response to a selection operation of the firmware list;
and storing the target firmware into a cache file of the master device.
3. The method of claim 1, further comprising, after retrieving target firmware from the candidate firmware stored in the target network disk:
if the target firmware is the encrypted firmware, acquiring a decryption key from the credential file;
and executing decryption operation on the target firmware according to the decryption key.
4. The method of claim 1, wherein transmitting the target firmware to the target slave device according to a preset firmware upgrade protocol comprises:
determining the blocking information of the target firmware according to the preset firmware protocol;
the target firmware sends the current block to the target slave device according to the block information so as to acquire firmware receiving information returned by the target slave device according to the block information;
and determining the transmission mode of the next block of the target firmware according to the firmware receiving information.
5. The method of claim 1, further comprising, prior to determining candidate firmware from the target slave device and a pre-generated credential file:
and acquiring the hardware information of the master device and sending the hardware information to the firmware publisher so that the firmware publisher generates the credential file according to the hardware information.
6. The method according to any of claims 1-5, wherein the master device and at least one candidate slave device are connected via a CAN bus.
7. A firmware upgrade apparatus configured in a master device, the master device being connected to at least one candidate slave device, the apparatus comprising:
a candidate firmware determining module, configured to determine a target slave device from at least one candidate slave device in response to a device determining operation, and determine candidate firmware according to the target slave device and a pre-generated credential file;
the target firmware acquisition module is used for acquiring network disk parameters of a target network disk, establishing connection with the target network disk according to the network disk parameters, and acquiring target firmware from the candidate firmware stored in the target network disk;
and the firmware sending module is used for sending the target firmware to the target slave equipment according to a preset firmware upgrading protocol.
8. The apparatus of claim 7, wherein the target firmware acquisition module comprises:
a target firmware determining unit, configured to display a firmware list of the candidate firmware, and determine the target firmware in response to a selection operation on the firmware list;
and the firmware storage unit is used for storing the target firmware into the cache file of the main equipment.
9. An electronic device, the electronic device comprising:
at least one processor; and
a memory communicatively coupled to the at least one processor; wherein,,
the memory stores a computer program executable by the at least one processor to enable the at least one processor to perform the firmware upgrade method of any one of claims 1-6.
10. A computer readable storage medium storing computer instructions for causing a processor to implement the firmware upgrade method of any one of claims 1-6 when executed.
CN202310152578.8A 2023-02-22 2023-02-22 Firmware upgrading method and device, electronic equipment and storage medium Pending CN116126380A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310152578.8A CN116126380A (en) 2023-02-22 2023-02-22 Firmware upgrading method and device, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310152578.8A CN116126380A (en) 2023-02-22 2023-02-22 Firmware upgrading method and device, electronic equipment and storage medium

Publications (1)

Publication Number Publication Date
CN116126380A true CN116126380A (en) 2023-05-16

Family

ID=86311671

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310152578.8A Pending CN116126380A (en) 2023-02-22 2023-02-22 Firmware upgrading method and device, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN116126380A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116501353A (en) * 2023-06-21 2023-07-28 苏州浪潮智能科技有限公司 Firmware updating method, device, equipment and medium

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116501353A (en) * 2023-06-21 2023-07-28 苏州浪潮智能科技有限公司 Firmware updating method, device, equipment and medium
CN116501353B (en) * 2023-06-21 2023-09-29 苏州浪潮智能科技有限公司 Firmware updating method, device, equipment and medium

Similar Documents

Publication Publication Date Title
CN110601896A (en) Data processing method and equipment based on block chain nodes
CN116126380A (en) Firmware upgrading method and device, electronic equipment and storage medium
CN109522060A (en) The restoring method and terminal device of business scenario
CN111698227B (en) Information synchronization management method, device, computer system and readable storage medium
CN117692900A (en) Equipment verification method, device, equipment and medium based on security chip
CN106570402A (en) Encryption module and process trusted measurement method
CN116244682A (en) Database access method, device, equipment and storage medium
CN115291973A (en) Method and device for connecting database by application on cloud, electronic equipment and storage medium
CN114398678A (en) Registration verification method and device for preventing electronic file from being tampered, electronic equipment and medium
CN113609156A (en) Data query and write-in method and device, electronic equipment and readable storage medium
CN114024780B (en) Node information processing method and device based on Internet of things equipment
CN115794165A (en) Application upgrading method and device, EPS and medium
CN117194298B (en) Control method, device, equipment and storage medium
CN115906131B (en) Data management method, system, equipment and storage medium
CN116578965A (en) Method, device, equipment and storage medium for checking security of upgrade package
CN118551389A (en) Light equipment firmware verification method, device, equipment, medium and product
CN115766698A (en) System software package publishing method and device, electronic equipment and storage medium
CN118153061A (en) Upgrading method, device, equipment and storage medium
CN115390872A (en) Method, system, electronic device and storage medium for updating device configuration parameters
CN117729008A (en) Data security protection method and device, electronic equipment and storage medium
CN117670341A (en) Authentication method, device, equipment and storage medium for payment terminal
CN114816484A (en) System software upgrading method, device, equipment and medium
CN116627483A (en) Version release method, device, equipment and storage medium
CN115913729A (en) Host login method, device, equipment and storage medium
CN115801237A (en) Information encryption/decryption device, information encryption method, and information decryption method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination