CN118170411A - Updating method and device of equipment firmware - Google Patents

Updating method and device of equipment firmware Download PDF

Info

Publication number
CN118170411A
CN118170411A CN202410340266.4A CN202410340266A CN118170411A CN 118170411 A CN118170411 A CN 118170411A CN 202410340266 A CN202410340266 A CN 202410340266A CN 118170411 A CN118170411 A CN 118170411A
Authority
CN
China
Prior art keywords
target
firmware
file
updating
configuration file
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202410340266.4A
Other languages
Chinese (zh)
Inventor
王瑾
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Suzhou Metabrain Intelligent Technology Co Ltd
Original Assignee
Suzhou Metabrain Intelligent Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Suzhou Metabrain Intelligent Technology Co Ltd filed Critical Suzhou Metabrain Intelligent Technology Co Ltd
Priority to CN202410340266.4A priority Critical patent/CN118170411A/en
Publication of CN118170411A publication Critical patent/CN118170411A/en
Pending legal-status Critical Current

Links

Landscapes

  • Stored Programmes (AREA)

Abstract

The embodiment of the application provides a device firmware updating method and a device, wherein a device control system comprises a target device and a reference device, the target device is a device to be subjected to firmware updating, the reference device is used for controlling the target device to carry out firmware updating, and the method is applied to the target device and comprises the following steps: receiving a target control file and a target configuration file generated by a reference device for a target device; extracting file update information and firmware attribute information from a target control file; generating target update logic of a target configuration file according to the file update information and the firmware attribute information; and updating the target configuration file into the target firmware according to the target updating logic. The application solves the problem of lower updating efficiency of the equipment firmware, thereby achieving the effect of improving the updating efficiency of the equipment firmware.

Description

Updating method and device of equipment firmware
Technical Field
The embodiment of the application relates to the field of computers, in particular to a method and a device for updating equipment firmware.
Background
Network devices such as a switch, a router, a firewall, a server and storage equipment exist in the current network environment, and the functions of the network devices are realized by deploying and recording firmware for realizing operation logic corresponding to service functions on the network devices. When firmware on a device needs to be updated, a person skilled in the art generally adopts a mode of issuing a configuration file to the device, firmware data on the firmware to be updated is stored in the configuration file, and when the configuration file is sent to the device, the device immediately uses the configuration file to update the firmware to be updated, however, the updated firmware may be executing a corresponding service, so that a conflict between normal service and firmware update occurs, and the problem of running paralysis of the device occurs.
Disclosure of Invention
The embodiment of the application provides a method and a device for updating equipment firmware, which are used for at least solving the problem of lower updating efficiency of the equipment firmware in the related technology.
According to an embodiment of the present application, there is provided a device firmware updating method, a device control system including a target device and a reference device, the target device being a device to be firmware-updated, the reference device being configured to control the target device to perform firmware update, the method being applied to the target device, the method including:
Receiving a target control file and a target configuration file generated by the reference device for the target device, wherein the target configuration file records firmware data required by target firmware to be updated on the target device, the target firmware records operation logic of the target device for realizing a corresponding service function, and the target control file is used for indicating target effective conditions of the target configuration file effective on the target firmware;
Extracting file updating information and firmware attribute information from the target control file, wherein the file updating information is used for indicating the effective time of the target configuration file in the target firmware, and the firmware attribute information is used for indicating the firmware restarting state required by the configuration file effective in the target firmware;
Generating target update logic of the target configuration file according to the file update information and the firmware attribute information, wherein the target update logic is used for adjusting a firmware restarting state of firmware on the target device to be a restarting state meeting the target effective condition;
And updating the target configuration file into the target firmware according to the target updating logic.
In one exemplary embodiment, the generating the target update logic of the target configuration file according to the file update information and the firmware attribute information includes:
detecting a target firmware version of the target firmware on the target device;
under the condition that the target firmware version is matched and consistent with the reference firmware version, determining a target service to which the firmware data carried in the target configuration file belong in the target firmware;
Determining target execution time of target restarting operation according to the restarting logic of the target service and the configuration time of a target configuration file, wherein the restarting logic is a requirement of the target service on the restarting operation of the target firmware, the restarting operation is used for representing a service process or firmware which needs to execute the restarting operation in order to enable the firmware data corresponding to the target service to take effect on the target firmware, the file updating information comprises the configuration time and the reference firmware version adapted to the target configuration file, the firmware attribute information comprises the restarting logic, and the target updating logic comprises the target execution time of the target restarting operation.
In an exemplary embodiment, the determining, according to the restart logic of the target service and the configuration time of the target configuration file, the target execution time of the target restart operation includes:
Under the condition that the number of the target services is N, determining the reference execution time of each reference restarting operation in N reference restarting operations corresponding to the N target services according to the configuration time, wherein the target execution time comprises the reference execution time;
Determining the execution priority of M reference restarting operations under the condition that the number of the reference restarting operations which need to be executed at the same reference execution time is M, wherein M is greater than or equal to 2 and M is less than or equal to N;
And screening out the reference restarting operation with the execution priority higher than a target priority threshold from M reference restarting operations, and taking the reference restarting operation as the target restarting operation.
In one exemplary embodiment, the device control system further includes an external storage device, where the external storage device is configured to transmit the target control file and the target configuration file between the target device and the reference device, where the reference device is configured to encrypt the target configuration file and the target control file using an encryption key corresponding to the external storage device when the external storage device is detected to be connected to a device recorded in a device connection list of the reference device, to obtain a target encrypted file, and store the target encrypted file to the external storage device,
The receiving the target control file and the target configuration file generated by the reference device for the target device includes:
detecting the equipment access condition in the equipment access interface of the target equipment;
acquiring an external device list on the target device under the condition that the external storage device is determined to be accessed to the device access interface, wherein a reference device identifier of a file storage device configured for the target device is recorded in the external device list;
under the condition that the device identification of the external storage device is matched and consistent with the reference device identification, acquiring a decryption key corresponding to the external storage device;
And decrypting the target encrypted file stored in the external storage device by using the decryption key to obtain the target control file and the target configuration file.
In an exemplary embodiment, said updating said target configuration file into said target firmware according to said target update logic comprises:
controlling the target equipment to update the firmware data in the target configuration file into the target firmware at target execution time;
And executing a target restarting operation on the target firmware, wherein the target updating logic comprises executing the target restarting operation at the target execution time, and the target restarting operation is used for enabling the configuration file to be effective in the target firmware.
In an exemplary embodiment, the controlling the target device to update the firmware data in the target configuration file into the target firmware at a target execution time includes:
Extracting a target address in an unoccupied state from an address set stored in the control file in the case that the firmware data is data for configuring a network address environment of the target device;
adding the target address to a position corresponding to an address field in the firmware data;
And updating the firmware data added with the target address into the target firmware.
In an exemplary embodiment, after the updating of the firmware data to which the target address is added into the target firmware, the method further includes:
Updating the occupied state of the target control file in the address set of the target control file to obtain a reference control file;
Transmitting the reference control file to the reference device.
According to another embodiment of the present application, there is provided an apparatus for updating device firmware, a device control system including a target device, which is a device to be subjected to firmware update, and a reference device for controlling the target device to perform firmware update, the apparatus being applied to the target device, the apparatus including:
The receiving module is used for receiving a target control file and a target configuration file which are generated by the reference equipment for the target equipment, wherein firmware data required by target firmware to be updated on the target equipment are recorded in the target configuration file, operation logic of the target equipment for realizing a corresponding service function is recorded in the target firmware, and the target control file is used for indicating target effective conditions of the target configuration file effective on the target firmware;
The extraction module is used for extracting file updating information and firmware attribute information from the target control file, wherein the file updating information is used for indicating the effective time of the target configuration file in the target firmware, and the firmware attribute information is used for indicating the firmware restarting state required by the configuration file effective in the target firmware;
The generating module is used for generating target updating logic of the target configuration file according to the file updating information and the firmware attribute information, wherein the target updating logic is used for adjusting the firmware restarting state of the firmware on the target equipment to be the restarting state meeting the target effective condition;
and the updating module is used for updating the target configuration file into the target firmware according to the target updating logic.
According to a further embodiment of the application, there is also provided a computer readable storage medium having stored therein a computer program, wherein the computer program is arranged to perform the steps of any of the method embodiments described above when run.
According to a further embodiment of the application there is also provided an electronic device comprising a memory having stored therein a computer program and a processor arranged to run the computer program to perform the steps of any of the method embodiments described above.
According to the application, since the device control system comprises the reference device and the target device, the reference device controls the target device to update the firmware to be updated on the target device, when the reference device needs to control the target device to update, the target control file and the target configuration file are sent to the target device, the firmware data required by the target firmware to be updated on the target device is recorded in the target configuration file, the target effective condition of the target configuration file effective on the target firmware is recorded in the target control file, and then the target control device receives the target control file and the target configuration file, through extracting the updating information and the firmware attribute information in the target control file, the firmware restarting condition required by the effective actual of the target configuration file on the target firmware and the configuration file effective in the target firmware is known, and through biochemical forming the target updating logic of the target configuration file according to the file updating information and the firmware attribute information, the firmware restarting state of the firmware on the target device can be adjusted through the updating logic, so that the firmware updating operation and normal service conflict of the device caused by the target firmware updating to the target firmware after the target configuration file is received in the related technology can be avoided, the problem of low updating efficiency of the device in related technology can be solved, and the updating efficiency of the device to the device can be improved.
Drawings
Fig. 1 is a hardware block diagram of a server device of a method for updating device firmware according to an embodiment of the present application;
FIG. 2 is a flow chart of a method of updating device firmware according to an embodiment of the application;
FIG. 3 is a schematic diagram of an alternative deployment application module, in accordance with an embodiment of the present application;
FIG. 4 is a schematic diagram of a framework of an alternative control file according to an embodiment of the present application;
FIG. 5 is a schematic diagram of a framework of another alternative control file according to an embodiment of the present application;
FIG. 6 is a flow chart of an external storage device fabrication process according to an embodiment of the application;
FIG. 7 is a flow chart of setting up a trusted external storage device according to an embodiment of the present application;
FIG. 8 is a BMC deployment flowchart in accordance with an embodiment of the present application;
FIG. 9 is a schematic diagram of an alternative BMC deployment module according to an embodiment of the present application;
fig. 10 is a block diagram of a structure of an updating apparatus of device firmware according to an embodiment of the present application.
Detailed Description
Embodiments of the present application will be described in detail below with reference to the accompanying drawings in conjunction with the embodiments.
It should be noted that the terms "first," "second," and the like in the description and the claims of the present application and the above figures are used for distinguishing between similar objects and not necessarily for describing a particular sequential or chronological order.
The method embodiments provided in the embodiments of the present application may be executed in a server apparatus or similar computing device. Taking the example of running on a server device, fig. 1 is a block diagram of a hardware structure of a server device according to an embodiment of the present application. As shown in fig. 1, the server device may include one or more (only one is shown in fig. 1) processors 102 (the processor 102 may include, but is not limited to, a microprocessor MCU, a programmable logic device FPGA, or the like processing means) and a memory 104 for storing data, wherein the server device may further include a transmission device 106 for communication functions and an input-output device 108. It will be appreciated by those of ordinary skill in the art that the architecture shown in fig. 1 is merely illustrative and is not intended to limit the architecture of the server apparatus described above. For example, the server device may also include more or fewer components than shown in FIG. 1, or have a different configuration than shown in FIG. 1.
The memory 104 may be used to store computer programs, such as software programs of application software and modules, such as computer programs corresponding to the method for updating device firmware in the embodiment of the present application, and the processor 102 executes the computer programs stored in the memory 104 to perform various functional applications and data processing, that is, implement the method described above. Memory 104 may include high-speed random access memory, and may also include non-volatile memory, such as one or more magnetic storage devices, flash memory, or other non-volatile solid-state memory. In some examples, the memory 104 may further include memory remotely located with respect to the processor 102, which may be connected to the server device via a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
The transmission device 106 is used to receive or transmit data via a network. Specific examples of the network described above may include a wireless network provided by a communication provider of a server device. In one example, the transmission device 106 includes a network adapter (Network Interface Controller, simply referred to as a NIC) that can connect to other network devices through a base station to communicate with the internet. In one example, the transmission device 106 may be a Radio Frequency (RF) module, which is configured to communicate with the internet wirelessly.
In this embodiment, there is provided a method for updating device firmware, where a device control system includes a target device and a reference device, where the target device is a device to be subjected to firmware update, and the reference device is configured to control the target device to perform firmware update, and the method is applied to the target device, and fig. 2 is a flowchart of a method for updating device firmware according to an embodiment of the present application, as shown in fig. 2, where the flowchart includes the following steps:
Step S202, receiving a target control file and a target configuration file generated by the reference device for the target device, wherein firmware data required by target firmware to be updated on the target device is recorded in the target configuration file, operation logic of the target device for realizing a corresponding service function is recorded in the target firmware, and the target control file is used for indicating a target effective condition of the target configuration file effective on the target firmware;
step S204, extracting file update information and firmware attribute information from the target control file, wherein the file update information is used for indicating the effective time of the target configuration file in the target firmware, and the firmware attribute information is used for indicating the firmware restarting state required by the configuration file effective in the target firmware;
Step S206, generating target update logic of the target configuration file according to the file update information and the firmware attribute information, wherein the target update logic is used for adjusting the firmware restarting state of the firmware on the target device to be a restarting state meeting the target effective condition;
step S208, updating the target configuration file into the target firmware according to the target updating logic.
Optionally, in the embodiment of the present application, the firmware update may be a firmware data update of an existing firmware on the target device, or may be a new target firmware on the target device, which is not limited in this scheme.
Through the steps, since the device control system comprises the reference device and the target device, the reference device controls the target device to update the firmware to be updated on the target device, when the reference device needs to control the target device to update, the target control file and the target configuration file are sent to the target device, the firmware data required by the target firmware to be updated on the target device is recorded in the target configuration file, the target effective condition of the target configuration file effective on the target firmware is recorded in the target control file, and then the target control device receives the target control file and the target configuration file, through extracting the updating information and the firmware attribute information in the target control file, the firmware restarting condition required by the effective actual of the target configuration file on the target firmware and the configuration file effective in the target firmware is known, and through biochemical forming the target updating logic of the target configuration file according to the file updating information and the firmware attribute information, the firmware restarting state of the firmware on the target device can be adjusted through the updating logic, so that the firmware updating operation and the normal service conflict of the device caused by directly updating the target configuration file to the target firmware after the target configuration file is received in the related technology can be avoided, the problem of low updating efficiency of the firmware updating efficiency of the related technology can be solved, and the device updating efficiency can be improved, and the technical effect on the device can be achieved.
The application scenario of the device firmware updating method provided by the application can be a scenario of updating a single device to be updated with firmware, or can also be a scenario of applying the device to be updated with firmware updating control to devices included in a device cluster, at this time, the number of target devices to be updated with firmware in the device cluster can be one or more, the reference device can be a device configured for the device cluster and used for updating and controlling the firmware of the devices in the device cluster, or the reference device can also be any one selected from the device cluster and used for updating and controlling the firmware of other devices, at this time, the reference device receives an updating requirement for updating the firmware or a target configuration file to be updated, and generates a corresponding target control file according to the target firmware to be updated in the target configuration file, and the scheme is not limited.
In the embodiment provided in step S202, the reference control device may send the target control file and the target configuration file to the target device through wired transmission, network transmission or transmission through a transmission medium, where when the reference control device performs transmission through the network transmission, the reference device may encrypt the target control file and the reference control file according to the target encryption mode and transmit the encrypted control file to the target device, and then the target device decrypts the encrypted file using a decryption mode corresponding to the target encryption mode after receiving the encrypted file, so as to obtain the target control file and the target configuration file; when the data storage device is connected to the target device, the target device can extract the target control file and the target configuration file from the data storage device.
In the embodiment provided in step S204, the file update information may include, but is not limited to, information including the effective time of the configuration file, the usage version of the configuration file, and the like.
Optionally, in the embodiment of the present application, the firmware attribute information includes service characteristics and start logic of each firmware, for example, the restart logic may, but is not limited to, instruct that a configuration file needs to execute a restart operation when the configuration file takes effect on the firmware, including whether to restart a corresponding service process on the firmware or restart the firmware, instruct a start sequence of each service process on the firmware if the configuration takes effect and needs to restart the server without restarting the corresponding firmware, and instruct a start sequence of a plurality of target firmware when the configuration file takes effect and the target firmware involved in the target configuration file is a plurality of target firmware; the service feature is used to indicate a special attribute of the corresponding service on the target firmware, such as an IP address configuration service, and the service feature indicates an address template of an IP address that is allowed to be used by the current target device, which is not limited in this scheme.
In the embodiment provided in step S206, the target update logic is configured to configure the target configuration file into the target firmware according to the configuration time, and the execution timing of the boot operation that needs to be performed by the target firmware in order to make the target configuration file effective on the target firmware, where the boot operation may include, but is not limited to, starting one or more server processes in the target firmware, or starting one or more target firmware, and the present scheme is not limited to this.
Optionally, in the embodiment of the present application, the determining of the target update logic may be determining, according to the file update information, an update timing of each target configuration file on the target firmware, and determining, according to the firmware attribute information, a startup operation to be executed on the firmware required for the target configuration file to take effect, and planning the startup operation according to the update timing, where the startup operation is planned according to the update timing, and may, but is not limited to, configuring a corresponding update time in the update timing for the corresponding startup operation, or may also be detecting a startup operation to be executed in the same update time, and if there is a conflict in the startup operation, executing a startup operation that determines a startup operation with a higher priority as a startup operation to be executed at the current time, which is not limited by the present scheme.
As an alternative embodiment, the generating the target update logic of the target configuration file according to the file update information and the firmware attribute information includes:
detecting a target firmware version of the target firmware on the target device;
under the condition that the target firmware version is matched and consistent with the reference firmware version, determining a target service to which the firmware data carried in the target configuration file belong in the target firmware;
Determining target execution time of target restarting operation according to the restarting logic of the target service and the configuration time of a target configuration file, wherein the restarting logic is a requirement of the target service on the restarting operation of the target firmware, the restarting operation is used for representing a service process or firmware which needs to execute the restarting operation in order to enable the firmware data corresponding to the target service to take effect on the target firmware, the file updating information comprises the configuration time and the reference firmware version adapted to the target configuration file, the firmware attribute information comprises the restarting logic, and the target updating logic comprises the target execution time of the target restarting operation.
Optionally, in the embodiment of the present application, the reference firmware version is a version applicable to the target configuration file, and when the target firmware version and the reference firmware version are the same, it may be determined that the target firmware version and the reference firmware version are matched and consistent; or the reference firmware version may also be the lowest version adapted to the target configuration file, and when the target firmware version is greater than or equal to the reference firmware version, it may be determined that the target firmware version and the reference firmware version match consistently, which is not limited in this scheme.
Optionally, in the embodiment of the present application, the target configuration file may be, but not limited to, firmware data required for carrying one or more services in the target firmware, or the target configuration file may also be, but not limited to, firmware data required for carrying one or more firmware on the target device.
Optionally, in the embodiment of the present application, the target service described by the firmware data in the target configuration file may be obtained by identifying a field indicating the firmware type in the firmware data, or may also be determined by determining a service related to the target control file, which is not limited in this scheme.
Alternatively, in an embodiment of the present application, the target execution time of the target restart operation may be determined by: firstly, determining the restart operation required to be executed by a configuration file to take effect on the corresponding firmware according to the restart logic of the target service, further determining the execution time of each restart operation according to the restart operation and the configuration time of the target configuration file, and further configuring the execution time of each restart operation according to the execution time to obtain the target execution time of the target restart operation, or detecting the restart operation condition required to be executed in the same time period after determining the execution time of each restart operation, and determining the restart operation with the highest priority as the target restart operation under the condition that the number of the restart operations required to be executed in the same time period is a plurality of service conflicts or the restart operation is redundant, for example, simultaneously requiring restarting the BMC firmware and the BIOS firmware.
Through the above, the target execution time of the target restarting operation is determined through the determination of the target service described by the configuration query, and further according to the restarting logic and the configuration time of the target service, thereby realizing the orderly restarting of the firmware in the deployment and validation process of the configuration file, avoiding the conflict between the restarting operation and the service executed on the device, and improving the updating efficiency of the firmware.
As an optional embodiment, the determining the target execution time of the target restart operation according to the restart logic of the target service and the configuration time of the target configuration file includes:
Under the condition that the number of the target services is N, determining the reference execution time of each reference restarting operation in N reference restarting operations corresponding to the N target services according to the configuration time, wherein the target execution time comprises the reference execution time;
Determining the execution priority of M reference restarting operations under the condition that the number of the reference restarting operations which need to be executed at the same reference execution time is M, wherein M is greater than or equal to 2 and M is less than or equal to N;
And screening out the reference restarting operation with the execution priority higher than a target priority threshold from M reference restarting operations, and taking the reference restarting operation as the target restarting operation.
Optionally, in the embodiment of the present application, the target priority threshold may be a fixed value set according to requirements, or may also be set according to the priority of the restart operations executed at the same time, for example, the maximum value in the priorities corresponding to the restart operations executed at the same time is determined as the target priority threshold.
Through the above, when the number of the restart operations to be executed in the same time is a plurality of, the reference restart operation higher than the target priority threshold is taken as the target restart operation to be executed through judging the priority of the restart operation, so that the influence on the load of the target equipment caused by the repeated execution of the restart operation is avoided, and the running stability of the equipment is improved.
As an optional embodiment, the device control system further includes an external storage device, where the external storage device is configured to transmit the target control file and the target configuration file between the target device and the reference device, where the reference device is configured to encrypt the target configuration file and the target control file using an encryption key corresponding to the external storage device when the external storage device is detected to be connected to a device recorded in a device connection list of the reference device, and store the target encrypted file on the external storage device,
The receiving the target control file and the target configuration file generated by the reference device for the target device includes:
detecting the equipment access condition in the equipment access interface of the target equipment;
acquiring an external device list on the target device under the condition that the external storage device is determined to be accessed to the device access interface, wherein a reference device identifier of a file storage device configured for the target device is recorded in the external device list;
under the condition that the device identification of the external storage device is matched and consistent with the reference device identification, acquiring a decryption key corresponding to the external storage device;
And decrypting the target encrypted file stored in the external storage device by using the decryption key to obtain the target control file and the target configuration file.
Optionally, in the embodiment of the present application, the external storage device is a device with a data storage and transmission function, which may include, but is not limited to, a hard disk, a USB disk, a disk array, a USB storage device, a TF card, and the like, which is not limited in this scheme.
Optionally, in the embodiment of the present application, the target control file and the target configuration file may be encrypted as a whole in the external storage device, or may be separately encrypted, which is not limited in this scheme.
Optionally, in the embodiment of the present application, the trusted storage device of the target device is recorded in the external device list, and the target device defaults to the trusted storage device recorded in the external device list, so that the data stored in the trusted storage device can be downloaded and used.
Optionally, in the embodiment of the present application, the decryption key may be a key value pre-agreed between the target device and the reference device, such as a symmetric key or an asymmetric key generated in advance according to a target rule; the decryption key may also be a user key set by a user using the target device, or the decryption key may also be a device unique code for uniquely indicating the external storage device, which is not limited in this scheme.
Optionally, in an embodiment of the present application, a trusted configuration file batch deployment scheme is provided. The method uses external storage equipment such as USB storage equipment and TF card and uses symmetrical algorithm to make configuration file encryption protection. When the BMC detects that the external storage device is authorized device, the BMC automatically decrypts the external storage device, automatically executes the configuration file according to the instruction and imports the configuration file to take effect.
Through the above, the trusted external storage device is configured on the target device, and then the target control file and the target configuration file configured by the reference device are transferred for the target device through the external storage device, and the external storage device also encrypts the target configuration file and the target control file when transferring the target control file and the target configuration file, so that the file transmission safety of the target control file and the target configuration file is ensured, the file leakage problem in the file transmission process is avoided, and the file transmission mode does not depend on a network, so that the firmware update operation under the condition that the target device is not configured for the first time can be realized.
As an alternative embodiment, said updating said target configuration file into said target firmware according to said target update logic comprises:
controlling the target equipment to update the firmware data in the target configuration file into the target firmware at target execution time;
And executing a target restarting operation on the target firmware, wherein the target updating logic comprises executing the target restarting operation at the target execution time, and the target restarting operation is used for enabling the configuration file to be effective in the target firmware.
As an optional embodiment, the controlling the target device to update the firmware data in the target configuration file to the target firmware at a target execution time includes:
extracting a target address in an unoccupied state from an address set stored in the target control file in the case that the firmware data is data for configuring a network address environment of the target device;
adding the target address to a position corresponding to an address field in the firmware data;
And updating the firmware data added with the target address into the target firmware.
Optionally, in the embodiment of the present application, in the case that the target configuration file is used to configure a network address environment, the target control file stores an address set, where a network address that is provided for the device and can be configured for a network is stored.
Optionally, in the embodiment of the present application, after the target address is selected from the target device address set, the target address stored in the address set in the target control file is set to an occupied state, so that the same address is prevented from being occupied by a plurality of devices, and further, the updated target configuration file can be transferred to other devices needing to perform network configuration for use.
Through the above, the address set is stored in the control file, the address capable of carrying out network configuration of the device is stored in the address set, and the target address is set to be in the occupied state after the target address is selected from the address set, so that the fact that the same address is occupied by a plurality of devices is avoided, and the updating efficiency of updating firmware of a plurality of target devices in batches by using the target control file and the target configuration file is improved.
As an alternative embodiment, after said updating said firmware data to which said target address is added into said target firmware, said method further comprises:
updating the occupation state of the target address in the address set of the target control file to obtain a reference control file;
Transmitting the reference control file to the reference device.
Optionally, in the embodiment of the present application, the reference control file may be transmitted to the reference device through a network, or may also be transmitted through an external storage device, which is not limited in this scheme.
Through the above, the occupation state of the target address in the address set of the target control file is used, and the updated reference control file is transmitted to the reference device, so that the situation that the same address is repeatedly occupied when the address configuration is carried out on a plurality of target devices is avoided, and the firmware batch updating efficiency of the plurality of target devices is improved.
Optionally, in an embodiment of the present application, implementation of a secure trusted method for batch deployment of configuration files includes: deployment application programs, BMC deployment modules and BMC hardware drivers. The deployment application can be installed on a general OS, generates a configuration file and a control file, and encrypts and stores the configuration file and the control file on an external storage device; the external storage device identifies and formats it. The BMC hardware driver automatically identifies the external storage device. The BMC deployment module allows an authorized manager to configure the trusted external storage device; decrypting the configuration file and the control file using the encryption password; automatically executing configuration file deployment and validation according to the control file; and recording operation behaviors of configuration deployment in external storage equipment and BMC security audit logs.
The method for updating the device firmware can be at least realized through a deployment application program, a BMC deployment module and a BMC hardware driver, wherein the deployment application program runs on a reference device, the BMC deployment module and the BMC hardware driver run on a target device, the deployment application program can be installed on a general OS, a configuration file and a control file are generated, and the configuration file and the control file are encrypted and stored on an external storage device; the external storage device is identified and formatted. The BMC hardware driver automatically identifies the external storage device. The BMC deployment module allows an authorized manager to configure the trusted external storage device; decrypting the configuration file and the control file using the encryption password; automatically executing configuration file deployment and validation according to the control file; and recording operation behaviors of configuration deployment in external storage equipment and BMC security audit logs.
Specifically, the deployment application has at least the following functions: after the external storage device is connected to the tool, formatting the external storage device; and supporting the import and export of the configuration files, wherein the import and export of the configuration files are convenient for a user to make a basic configuration file template for batch deployment on the configuration of the existing environment, and provide a modified and perfect interface. The configuration file and the control file are encrypted separately with the support of an encryption password. The deployment application program identifies the non-hardened piece information such as SN of the external storage device, adopts the hardware information such as the unique code of the storage device as an encryption key, and directly encrypts the configuration file and the control file by using a symmetric encryption security algorithm such as AES. And encrypting and storing the final batch deployment configuration files and control files of the user on external storage equipment. And (3) log audit, namely recording logs generated by the generated configuration file and the control file. The system supports a plurality of typical configuration files and control file templates, is a configuration template and a control file template which are generated according to various common configuration defaults of the BMC, and simultaneously supports the requirement that a user can conveniently and simply modify and perfect a real scene on the basis of the templates. And supporting a deployment instruction customization function. The user can select different control instructions to deploy, such as configuring the effective time (immediate or restarting, etc.); different kinds of configuration content may be selected, such as network configuration, storage configuration, power supply configuration, etc. And generating a control file according to the selection of a user, and realizing the customization of the configuration file and the control file.
FIG. 3 is a schematic diagram of an alternative deployment application module in accordance with an embodiment of the application. As shown in fig. 3, the deployment application module includes:
the external storage device management module is used for identifying, formatting and reading the unique code of the external storage device;
and the control file management module is used for completing customization of the control instruction and generating a control file. Managing multiple control files and configuration file templates, wherein one control file template corresponds to multiple configuration file templates;
The configuration file management module is used for generating a configuration file according to various information;
The encryption module is used for providing support of encryption algorithms, encrypted files and the like;
And the template library is used for providing a configuration template and a control file template which are generated by common configuration defaults.
For the configuration file design related to the application program deployment, the configuration file supports BMC, BIOS, CPLD and other BMC controllable firmware, the configuration file format is consistent with the BMC or the BMC can be resolved, and xml and json formats can also be adopted. Taking BMC components as an example, the configuration types include sensor monitoring, component management, service management, log alarm management, user management, security policy management, network management, firmware upgrading and the like, and the dependency relationship among the configuration types is described by a control file.
For control file designs related to deployment application programs, the control file suggests a format json or xml, and indicates control behaviors to the BMC deployment module. FIG. 4 is a schematic diagram of a framework of an alternative control file according to an embodiment of the present application. As shown in fig. 4, the control file is divided into two major parts, namely: "configuration class startup logic" and "control behavior". "control behavior" may be basic activities such as profile export, profile validation time, applicable version of profile, etc., whose format defines parameters of the kind and meaning consistent with BMC redfish or IPMI. The "configuration class boot logic" is used to indicate the boot sequence of the respective firmware in case the configuration takes effect, which requires the corresponding firmware to be booted. If the configuration validation requires that the service be started without the corresponding firmware being started, a start-up sequence of the respective service is indicated. The configuration types are arranged in a hierarchical and layered structure. Hierarchical, support BMC firmware, BIOS firmware, CPLD firmware, etc. Each firmware reclassification delineates the individual features and boot logic indicating whether each feature configuration validation requires a restart of the service/firmware. If a firmware needs to be restarted as long as a feature exists in the firmware, the firmware executes the restart according to the effective time (information of control behavior configuration). If all the characteristics of a certain firmware do not need to restart the firmware but need to restart the corresponding service, the firmware executes the restart service according to the effective time (information of control behavior configuration) and the sequence of the configured characteristics. If all the features of a certain firmware do not require restarting the firmware and services, the validation is performed immediately. The "configuration class start logic" also supports the processing of the situation that certain configuration information with certain characteristics cannot be the same as certain configuration information of other network devices in the local area network, as the IP address cannot be in the local area network, an IP address pool can be allocated first when a control file is generated, when the BMCs are deployed, IP is allocated to each BMC one by one through the IP address pool, and the IP in the address pool already allocated is marked (the IP is refreshed and recorded to the control file). The control file may also be a script language such as a shell supported by the BMC, and the control behavior may be a high-level activity such as a loop activity. The "control behavior" records the applicable version of the present configuration file, for example, the version above BMC v4.0 is applicable to the configuration file. "control behavior" also records configuration validation time: takes effect immediately, takes effect when restarting, takes effect at the appointed time. If the specified time is in effect, the BMC creates a timing script to execute the restart. "control behavior" also supports custom behavior operations, such as export of files, such as configuration files, logs, etc., to external storage devices.
FIG. 5 is a schematic diagram of a framework of another alternative control file according to an embodiment of the present application. As shown in FIG. 5, the "configuration class start logic" in the control file supports the configuration of BMC firmware, BIOS firmware, CPLD firmware, and power firmware. Specifically, taking BMC configuration as an example, configuration deployment of user management, firmware management, log management and network management is supported. The user management configures a local user, double-factor authentication and AD management, and the local user configuration takes effect immediately; the two-factor authentication involves modifying the configuration of 3 parts, corresponding to different restarting requirements; service restarting is needed for all the configuration of AD management, and single-point characteristics are configured after the characteristics are configured; all configurations of the single point feature are effective for service restart. The network management configures static IPv4 addresses, one by one, from 192.168.1.1 to 192.168.1.254. "control behavior" in the control file, BMC configuration deployment requires that the current BMC version be > 4.0, CPLD current version be > 2.0; the BMC is currently in effect at 24 points, and the CPLD is currently in effect at 12 points.
For the directory structure of the storage medium related to the deployment application, the storage medium deployed using the deployment application will contain three files, namely control. After the storage medium is inserted into the BMC, the BMC automatically executes the storage medium after detecting the storage medium, and generates a results. Taking xml format control files and configuration files as examples, the directory structure of the storage medium requires: the control.xml and config.xml must be placed under the root directory, and the encryption is adopted for storage; the configuration file (config. Xml) does not have to exist, but is determined according to the behavior defined by control; the results. Xm result file is used for recording the result executed by the control file in the BMC; log, used for recording the Log of the deployment batch configuration operation generated by the deployment application.
FIG. 6 is a flow chart of the external storage device fabrication according to an embodiment of the application. As shown in fig. 6, the dashed box represents that it is not necessary to execute, i.e. generating the configuration file for deployment use is not necessary to execute, but the execution is determined according to the requirement. If the configuration is simply exported from the BMC device, it may not be executed.
BMC deployment module: the BMC deployment module is a module on the BMC. The BMC authorized user can add 2 trusted storage devices at most, and the BMC deployment module automatically identifies the accessed external storage device and displays the unique code of the external storage device. The user configures whether the storage device is trusted based on the identified storage device unique code. If the external storage device is trusted, judging whether the external storage device is trusted, if not, not automatically executing and not being usable. FIG. 7 is a flow chart of setting up a trusted external storage device according to an embodiment of the present application. As shown in fig. 7, for the external storage device, whether the external storage device is trusted is first determined, when the external storage device is detected as an untrusted external storage device, user permission of a user who sets permission of the external storage device and whether a setting operation performed by the user is an operation for setting trusted external storage device are detected, and when the user has permission and the operation performed by the user is an operation for setting trusted external storage device, trusted setting is performed on the external storage device.
Fig. 8 is a flowchart of BMC deployment according to an embodiment of the present application, as shown in fig. 8, when performing batch deployment, the trusted status of the connected external storage device is detected first, and in the case that the external storage device is a trusted external storage device, the encrypted configuration file and the control file stored on the external storage device are decrypted, and the decrypted control file is executed, so that updating of the configuration file on firmware is implemented.
FIG. 9 is a schematic diagram of an alternative BMC deployment module according to an embodiment of the present application. As shown in fig. 9, the BMC is used as a control firmware for updating firmware of the target storage device, and is used for updating the firmware of other firmware (such as power firmware, BIOS firmware and CPLD firmware) to the airport, wherein the BMC comprises a BMC deployment module and BMC bottom hardware, and the BMC deployment module supports the use of hardware information such as a storage device unique code as a key, decrypts a configuration file and a control (control) file, analyzes a deployment instruction of the control file, and completes deployment of the configuration file or exports the configuration file. And recording the BMC execution results of batch deployment to the results.xml of the external storage device and the BMC local audit log.
And for the control logic of the control file, when the BMC recognizes external storage, the BMC automatically reads the decryption control file. And executing deployment of the configuration file according to the instruction of the control file. And the BMC takes corresponding firmware configuration information in the read configuration file according to the configuration of each firmware in the control file, and covers the current configuration information, or backs up the current configuration information and covers the current configuration information, and starts the timing task execution configuration to take effect.
Based on the example given in fig. 5, 2 servers (with 2 BMCs) are deployed. The BMC performs related operations according to the control file by:
Inserting an external storage device into the server 1, reading the control file by the BMC1 to see whether the current version of the BMC1 is more than 4.0, and if so, continuing the follow-up operation. The BMC1 reads the configuration file stored in the external storage, stores the configuration file in a designated position in the BMC1, reads the control file to identify BMC configuration, and only configures four characteristics, namely user management, firmware management, log management and network management, wherein the configuration is performed without restarting BMC firmware, and only needs to restart the service lighttp corresponding to the dual factors and the service corresponding to the AD. And simultaneously executing network management configuration, when the IPv4 static address is configured, managing the IP configuration 192.168.1.1 by the BMC1, and marking that the IP address is occupied in a control file. And the BMC1 sets a timing task 24 points to restart the lighttp and AD service according to the BMC effective time as the current 24 points, and refreshes the configuration file of the BMC1 according to the configuration file at the designated position. BMC1 reads the control file to see if the version of the current CPLD is > 2.0, and if so, continues the subsequent operation. The BMC1 reads the CPLD to upgrade the firmware, reads the firmware image file at the appointed position, and sets the timing task 12 points to restart the CPLD according to the effective time of the CPLD as the current 24 points.
When the external storage device is inserted into the server 2 and the BMC2 executes the control file to configure the IPv4 static address, the BMC2 manages the IP configuration to 192.168.1.2 and marks that the IP address is occupied in the control file. The other parts perform the same as BMC 1.
BMC hardware driver: support driving support for external storage devices.
By the embodiment, the problems that the configuration files are leaked in the clear text and are required to be networked in batch deployment are solved, and the problems that the configuration files are encrypted, the networking is not required, and the external equipment is in a trusted setting mode are solved.
In the above embodiment, when the server BMC is deployed, a deployment application is used to make a batch deployment configuration file and a control file on the external storage device. And setting a trusted external storage device on each BMC. The configuration file and the control file are protected in an encrypted mode, so that leakage and tampering are prevented. And the BMC automatically completes deployment according to whether the external device and the control file are trusted or not.
The firmware updating method of the application can be applied to other embedded devices such as switches, routers and the like besides being applied to the configuration deployment and firmware updating of the server BMC. The format of the configuration file and the control file is not limited as long as the BMC can recognize, and is not limited to the examples in the present application. The encryption algorithm and encryption key design is not limited to the examples herein, but may be implemented using an externally entered password key, or a user password of the BMC, etc. The method and the device can be applied to configuration deployment, and can also modify the control file to realize data collection scenes such as log collection and the like.
From the description of the above embodiments, it will be clear to a person skilled in the art that the method according to the above embodiments may be implemented by means of software plus the necessary general hardware platform, but of course also by means of hardware, but in many cases the former is a preferred embodiment. Based on such understanding, the technical solution of the present application may be embodied essentially or in a part contributing to the prior art in the form of a software product stored in a storage medium (e.g. ROM/RAM, magnetic disk, optical disk) comprising instructions for causing a terminal device (which may be a mobile phone, a computer, a server, or a network device, etc.) to perform the method according to the embodiments of the present application.
The embodiment also provides an apparatus for updating device firmware, which is used to implement the foregoing embodiments and preferred embodiments, and is not described in detail. As used below, the term "module" may be a combination of software and/or hardware that implements a predetermined function. While the means described in the following embodiments are preferably implemented in software, implementation in hardware, or a combination of software and hardware, is also possible and contemplated.
Fig. 10 is a block diagram of a device firmware updating apparatus according to an embodiment of the present application, and as shown in fig. 10, a device control system includes a target device, which is a device to be subjected to firmware updating, and a reference device for controlling the target device to perform firmware updating, and the apparatus is applied to the target device, and includes:
The receiving module is used for receiving a target control file and a target configuration file which are generated by the reference equipment for the target equipment, wherein firmware data required by target firmware to be updated on the target equipment are recorded in the target configuration file, operation logic of the target equipment for realizing a corresponding service function is recorded in the target firmware, and the target control file is used for indicating target effective conditions of the target configuration file effective on the target firmware;
The extraction module is used for extracting file updating information and firmware attribute information from the target control file, wherein the file updating information is used for indicating the effective time of the target configuration file in the target firmware, and the firmware attribute information is used for indicating the firmware restarting state required by the configuration file effective in the target firmware;
The generating module is used for generating target updating logic of the target configuration file according to the file updating information and the firmware attribute information, wherein the target updating logic is used for adjusting the firmware restarting state of the firmware on the target equipment to be the restarting state meeting the target effective condition;
and the updating module is used for updating the target configuration file into the target firmware according to the target updating logic.
As an alternative embodiment, the generating module includes:
The first detection unit is used for detecting a target firmware version of the target firmware on the target equipment currently;
the first determining unit is used for determining a target service of the firmware data carried in the target configuration file in the target firmware under the condition that the target firmware version is matched and consistent with the reference firmware version;
And the second determining unit is used for determining target execution time of target restarting operation according to the restarting logic of the target service and the configuration time of the target configuration file, wherein the restarting logic is the condition of the target service on the restarting operation of the target firmware, the restarting operation is used for representing a restarting operation service process or firmware which is required to be executed for enabling the firmware data corresponding to the target service to take effect on the target firmware, the file updating information comprises the configuration time and the reference firmware version which is adapted to the target configuration file, the firmware attribute information comprises the restarting logic, and the target updating logic comprises the target execution time of the target restarting operation.
Optionally, the second determining unit is further configured to:
Under the condition that the number of the target services is N, determining the reference execution time of each reference restarting operation in N reference restarting operations corresponding to the N target services according to the configuration time, wherein the target execution time comprises the reference execution time;
Determining the execution priority of M reference restarting operations under the condition that the number of the reference restarting operations which need to be executed at the same reference execution time is M, wherein M is greater than or equal to 2 and M is less than or equal to N;
And screening out the reference restarting operation with the execution priority higher than a target priority threshold from M reference restarting operations, and taking the reference restarting operation as the target restarting operation.
As an alternative embodiment, the receiving module includes:
The second detection unit is used for detecting the equipment access condition in the equipment access interface of the target equipment;
the first acquisition unit is used for acquiring an external device list on the target device under the condition that the external storage device is determined to be accessed to the device access interface, wherein a reference device identifier of a file storage device configured for the target device is recorded in the external device list;
The second obtaining unit is used for obtaining a decryption key corresponding to the external storage device under the condition that the device identifier of the external storage device is matched with the reference device identifier;
And the decryption unit is used for decrypting the target encrypted file stored in the external storage device by using the decryption key to obtain the target control file and the target configuration file.
As an alternative embodiment, the updating module includes:
The control unit is used for controlling the target equipment to update the firmware data in the target configuration file into the target firmware at the target execution time;
and the execution unit is used for executing a target restarting operation on the target firmware, wherein the target updating logic comprises executing the target restarting operation at the target execution time, and the target restarting operation is used for enabling the configuration file to be effective in the target firmware.
Optionally, the control unit is further configured to:
Extracting a target address in an unoccupied state from an address set stored in the control file in the case that the firmware data is data for configuring a network address environment of the target device;
adding the target address to a position corresponding to an address field in the firmware data;
And updating the firmware data added with the target address into the target firmware.
Optionally, the control unit is further configured to:
Updating the occupied state of the target control file in the address set of the target control file to obtain a reference control file;
Transmitting the reference control file to the reference device.
It should be noted that each of the above modules may be implemented by software or hardware, and for the latter, it may be implemented by, but not limited to: the modules are all located in the same processor; or the above modules may be located in different processors in any combination.
Embodiments of the present application also provide a computer readable storage medium having a computer program stored therein, wherein the computer program is arranged to perform the steps of any of the method embodiments described above when run.
In one exemplary embodiment, the computer readable storage medium may include, but is not limited to: a usb disk, a Read-Only Memory (ROM), a random access Memory (Random Access Memory RAM), a removable hard disk, a magnetic disk, or an optical disk, or other various media capable of storing a computer program.
An embodiment of the application also provides an electronic device comprising a memory having stored therein a computer program and a processor arranged to run the computer program to perform the steps of any of the method embodiments described above.
In an exemplary embodiment, the electronic device may further include a transmission device connected to the processor, and an input/output device connected to the processor.
Embodiments of the application also provide a computer program product comprising a computer program which, when executed by a processor, implements the steps of any of the method embodiments described above.
Embodiments of the present application also provide another computer program product comprising a non-volatile computer readable storage medium storing a computer program which, when executed by a processor, implements the steps of any of the method embodiments described above.
Embodiments of the present application also provide a computer program comprising computer instructions stored on a computer readable storage medium; the processor of the computer device reads the computer instructions from the computer readable storage medium and the embedder executes the computer instructions to cause the computer device to perform the steps of any of the method embodiments described above.
Specific examples in this embodiment may refer to the examples described in the foregoing embodiments and the exemplary implementation, and this embodiment is not described herein.
It will be appreciated by those skilled in the art that the modules or steps of the application described above may be implemented in a general purpose computing device, they may be concentrated on a single computing device, or distributed across a network of computing devices, they may be implemented in program code executable by computing devices, so that they may be stored in a storage device for execution by computing devices, and in some cases, the steps shown or described may be performed in a different order than that shown or described herein, or they may be separately fabricated into individual integrated circuit modules, or multiple modules or steps of them may be fabricated into a single integrated circuit module. Thus, the present application is not limited to any specific combination of hardware and software.
The above description is only of the preferred embodiments of the present application and is not intended to limit the present application, but various modifications and variations can be made to the present application by those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the principle of the present application should be included in the protection scope of the present application.

Claims (10)

1.A method for updating device firmware is characterized in that,
The device control system comprises a target device and a reference device, wherein the target device is a device to be subjected to firmware updating, the reference device is used for controlling the target device to be subjected to firmware updating, and the method is applied to the target device and comprises the following steps: receiving a target control file and a target configuration file generated by the reference device for the target device, wherein the target configuration file records firmware data required by target firmware to be updated on the target device, the target firmware records operation logic of the target device for realizing a corresponding service function, and the target control file is used for indicating target effective conditions of the target configuration file effective on the target firmware;
Extracting file updating information and firmware attribute information from the target control file, wherein the file updating information is used for indicating the effective time of the target configuration file in the target firmware, and the firmware attribute information is used for indicating the firmware restarting state required by the configuration file effective in the target firmware;
Generating target update logic of the target configuration file according to the file update information and the firmware attribute information, wherein the target update logic is used for adjusting a firmware restarting state of firmware on the target device to be a restarting state meeting the target effective condition;
And updating the target configuration file into the target firmware according to the target updating logic.
2. The method of claim 1, wherein the step of determining the position of the substrate comprises,
The target update logic for generating the target configuration file according to the file update information and the firmware attribute information comprises:
detecting a target firmware version of the target firmware on the target device;
under the condition that the target firmware version is matched and consistent with the reference firmware version, determining a target service to which the firmware data carried in the target configuration file belong in the target firmware;
Determining target execution time of target restarting operation according to the restarting logic of the target service and the configuration time of a target configuration file, wherein the restarting logic is a requirement of the target service on the restarting operation of the target firmware, the restarting operation is used for representing a service process or firmware which needs to execute the restarting operation in order to enable the firmware data corresponding to the target service to take effect on the target firmware, the file updating information comprises the configuration time and the reference firmware version adapted to the target configuration file, the firmware attribute information comprises the restarting logic, and the target updating logic comprises the target execution time of the target restarting operation.
3. The method of claim 2, wherein the step of determining the position of the substrate comprises,
The determining the target execution time of the target restarting operation according to the restarting logic of the target service and the configuration time of the target configuration file includes:
Under the condition that the number of the target services is N, determining the reference execution time of each reference restarting operation in N reference restarting operations corresponding to the N target services according to the configuration time, wherein the target execution time comprises the reference execution time;
Determining the execution priority of M reference restarting operations under the condition that the number of the reference restarting operations which need to be executed at the same reference execution time is M, wherein M is greater than or equal to 2 and M is less than or equal to N;
And screening out the reference restarting operation with the execution priority higher than a target priority threshold from M reference restarting operations, and taking the reference restarting operation as the target restarting operation.
4. The method of claim 1, wherein the step of determining the position of the substrate comprises,
The device control system further comprises an external storage device, the external storage device is used for transmitting the target control file and the target configuration file between the target device and the reference device, the reference device is used for encrypting the target configuration file and the target control file by using an encryption key corresponding to the external storage device under the condition that the external storage device is detected to be accessed and the external storage device is a device recorded in a device access list of the reference device, the target encryption file is obtained, the target encryption file is stored on the external storage device,
The receiving the target control file and the target configuration file generated by the reference device for the target device includes:
detecting the equipment access condition in the equipment access interface of the target equipment;
acquiring an external device list on the target device under the condition that the external storage device is determined to be accessed to the device access interface, wherein a reference device identifier of a file storage device configured for the target device is recorded in the external device list;
under the condition that the device identification of the external storage device is matched and consistent with the reference device identification, acquiring a decryption key corresponding to the external storage device;
And decrypting the target encrypted file stored in the external storage device by using the decryption key to obtain the target control file and the target configuration file.
5. The method of claim 1, wherein the step of determining the position of the substrate comprises,
The updating the target configuration file into the target firmware according to the target updating logic comprises the following steps:
controlling the target equipment to update the firmware data in the target configuration file into the target firmware at target execution time;
And executing a target restarting operation on the target firmware, wherein the target updating logic comprises executing the target restarting operation at the target execution time, and the target restarting operation is used for enabling the configuration file to be effective in the target firmware.
6. The method of claim 5, wherein the step of determining the position of the probe is performed,
The controlling the target device to update the firmware data in the target configuration file to the target firmware at a target execution time includes:
extracting a target address in an unoccupied state from an address set stored in the target control file in the case that the firmware data is data for configuring a network address environment of the target device;
adding the target address to a position corresponding to an address field in the firmware data;
And updating the firmware data added with the target address into the target firmware.
7. The method of claim 6, wherein the step of providing the first layer comprises,
After the updating of the firmware data to which the target address is added into the target firmware, the method further includes:
updating the occupation state of the target address in the address set of the target control file to obtain a reference control file; transmitting the reference control file to the reference device.
8. An updating device of equipment firmware is characterized in that,
The device control system comprises a target device and a reference device, wherein the target device is a device to be subjected to firmware update, the reference device is used for controlling the target device to be subjected to firmware update, and the device is applied to the target device and comprises: the receiving module is used for receiving a target control file and a target configuration file which are generated by the reference equipment for the target equipment, wherein firmware data required by target firmware to be updated on the target equipment are recorded in the target configuration file, operation logic of the target equipment for realizing a corresponding service function is recorded in the target firmware, and the target control file is used for indicating target effective conditions of the target configuration file effective on the target firmware;
The extraction module is used for extracting file updating information and firmware attribute information from the target control file, wherein the file updating information is used for indicating the effective time of the target configuration file in the target firmware, and the firmware attribute information is used for indicating the firmware restarting state required by the configuration file effective in the target firmware;
The generating module is used for generating target updating logic of the target configuration file according to the file updating information and the firmware attribute information, wherein the target updating logic is used for adjusting the firmware restarting state of the firmware on the target equipment to be the restarting state meeting the target effective condition;
and the updating module is used for updating the target configuration file into the target firmware according to the target updating logic.
9. A computer-readable storage medium comprising,
The computer readable storage medium has stored therein a computer program, wherein the computer program when executed by a processor realizes the steps of the method as claimed in any of claims 1 to 7.
10. An electronic device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, characterized in that,
The processor, when executing the computer program, implements the steps of the method as claimed in any one of claims 1 to 7.
CN202410340266.4A 2024-03-22 2024-03-22 Updating method and device of equipment firmware Pending CN118170411A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202410340266.4A CN118170411A (en) 2024-03-22 2024-03-22 Updating method and device of equipment firmware

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202410340266.4A CN118170411A (en) 2024-03-22 2024-03-22 Updating method and device of equipment firmware

Publications (1)

Publication Number Publication Date
CN118170411A true CN118170411A (en) 2024-06-11

Family

ID=91352378

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202410340266.4A Pending CN118170411A (en) 2024-03-22 2024-03-22 Updating method and device of equipment firmware

Country Status (1)

Country Link
CN (1) CN118170411A (en)

Similar Documents

Publication Publication Date Title
US11916911B2 (en) Gateway enrollment for Internet of Things device management
US8230222B2 (en) Method, system and computer program for deploying software packages with increased security
US9766914B2 (en) System and methods for remote maintenance in an electronic network with multiple clients
CN101258505B (en) Secure software updates
US11190407B2 (en) Internet of things device discovery and configuration
CN110096886A (en) Compared based on inventory and executes safe action
US11770300B2 (en) Secure management of devices
CN114244604B (en) Integrated authority management method and system suitable for fort machine, electronic equipment and readable storage medium
JP6923582B2 (en) Information processing equipment, information processing methods, and programs
US11714659B2 (en) Device provisioning with manufacturer boot environment
US10546168B1 (en) Managing a plurality of tag reader devices
JP5220675B2 (en) Thin client master rewrite system, thin client master rewrite method, and thin client
CN111935195B (en) Distributed system management method, device, storage medium and distributed management system
CN111131324A (en) Login method and device of business system, storage medium and electronic device
CN118170411A (en) Updating method and device of equipment firmware
US20240220277A1 (en) Device customization while remaining in an integral outer package
EP3598358B1 (en) Managing a plurality of tag reader devices
US8788681B1 (en) Method and apparatus for autonomously managing a computer resource using a security certificate
Jadhav Evaluation and implementation of zero-touch onboarding solutions for IIoT
WO2024145489A1 (en) Device customization while remaining in an integral outer package
Zhang Secure and Practical Splitting of IoT Device Functionalities
Bettany et al. Exam Ref MD-101 Managing Modern Desktops
CN113010881A (en) Method, device, equipment and storage medium for disabling unofficial parts
CN117707578A (en) Beacon firmware upgrading method, device and system
CN116679969A (en) Hard disk firmware refreshing method, system, terminal and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination