WO2016090822A1 - 对固件进行升级的方法及装置 - Google Patents
对固件进行升级的方法及装置 Download PDFInfo
- Publication number
- WO2016090822A1 WO2016090822A1 PCT/CN2015/077855 CN2015077855W WO2016090822A1 WO 2016090822 A1 WO2016090822 A1 WO 2016090822A1 CN 2015077855 W CN2015077855 W CN 2015077855W WO 2016090822 A1 WO2016090822 A1 WO 2016090822A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- chip
- firmware
- partition
- downloading
- upgraded
- Prior art date
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/60—Software deployment
- G06F8/65—Updates
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F12/00—Accessing, addressing or allocating within memory systems or architectures
- G06F12/02—Addressing or allocation; Relocation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F12/00—Accessing, addressing or allocating within memory systems or architectures
- G06F12/02—Addressing or allocation; Relocation
- G06F12/0223—User address space allocation, e.g. contiguous or non contiguous base addressing
- G06F12/023—Free address space management
- G06F12/0238—Memory management in non-volatile memory, e.g. resistive RAM or ferroelectric memory
- G06F12/0246—Memory management in non-volatile memory, e.g. resistive RAM or ferroelectric memory in block erasable memory, e.g. flash memory
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/60—Software deployment
- G06F8/65—Updates
- G06F8/654—Updates using techniques specially adapted for alterable solid state memories, e.g. for EEPROM or flash memories
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/445—Program loading or initiating
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/46—Multiprogramming arrangements
- G06F9/50—Allocation of resources, e.g. of the central processing unit [CPU]
- G06F9/5061—Partitioning or combining of resources
- G06F9/5077—Logical partitioning of resources; Management or configuration of virtualized resources
Definitions
- the present disclosure relates to the field of electronic technologies, and in particular, to a method and apparatus for upgrading firmware.
- Firmware upgrade refers to refreshing the embedded firmware of the embedded Micro Control Unit (MCU) to improve the function of the smart device and enhance the stability of the smart device.
- MCU embedded Micro Control Unit
- Non-MCU chips such as Wireless Fidelity (WIFI) chips, Bluetooth chips, etc. .
- WIFI Wireless Fidelity
- embodiments of the present disclosure provide a method and apparatus for upgrading firmware to improve security during a firmware upgrade process.
- a method of upgrading firmware comprising:
- the method may further include:
- the second partition is set as a first partition for downloading firmware of the second chip.
- the identifying the first partition of the firmware of the second chip for downloading the firmware of the second chip may include:
- the method may further include:
- the new firmware of the first chip is downloaded to the first partition, the new firmware of the first chip is verified.
- an apparatus for upgrading firmware comprising:
- An identification module configured to identify a first partition of the firmware of the second chip for downloading the firmware of the second chip when determining that the firmware of the first chip needs to be upgraded
- a first downloading module configured to download new firmware of the first chip to the first partition identified by the identification module
- a copy module configured to copy the new firmware of the first chip downloaded by the first download module from the first partition to an effective area in the first chip.
- the apparatus may further include:
- a second downloading module configured to download new firmware of the second chip to the first partition when determining that the firmware of the second chip needs to be upgraded
- An activation module configured to activate the first partition into an original for storing the second chip after the second download module downloads new firmware of the second chip to the first partition a second partition with firmware
- a setting module configured to, after the activation module activates the first partition as the second partition, set the second partition as a first partition for downloading firmware of the second chip.
- the identification module may include:
- an identification submodule configured to identify, by the partition information acquired by the obtaining submodule, a first partition in the flash memory of the second chip for downloading firmware of the second chip.
- the apparatus may further include:
- the verification module is configured to verify the new firmware of the first chip after the first download module downloads the new firmware of the first chip to the first partition.
- an apparatus for upgrading firmware comprising:
- a memory for storing processor executable instructions
- processor is configured to:
- the technical solution provided by the embodiment of the present disclosure may include the following beneficial effects: the security of the firmware upgrade of the chip is improved by first determining that the firmware of the first chip needs to be upgraded, avoiding conflicts occurring when upgrading firmware of multiple chips at the same time. By downloading the new firmware of the first chip to the first partition in the flash memory of the second chip, the new firmware of the first chip is copied from the first partition to the effective position in the first chip, thereby implementing Two chip flash to the first The chip's new firmware is upgraded, eliminating the need for additional control logic during the upgrade process, saving resources for smart devices.
- FIG. 1 is a flow chart of a method of upgrading firmware, according to an exemplary embodiment.
- FIG. 2 is a flow chart of a method of upgrading firmware according to an exemplary embodiment.
- FIG. 3 is a flowchart of a method of upgrading firmware according to an exemplary embodiment.
- FIG. 4A is a schematic diagram showing a partition of an MCU chip according to an exemplary embodiment.
- FIG. 4B is a schematic diagram of a partitioning of a firmware upgrade of an MCU chip, according to an exemplary embodiment.
- FIG. 4C is a second schematic diagram of a partitioning of a firmware upgrade of a WIFI chip according to an exemplary embodiment.
- FIG. 4D is a third schematic diagram of a partitioning of a firmware upgrade of a WIFI chip according to an exemplary embodiment.
- FIG. 4E is a fourth schematic diagram of a partitioning of a firmware upgrade of a WIFI chip according to an exemplary embodiment.
- FIG. 5 is a block diagram of an apparatus for upgrading firmware, according to an exemplary embodiment.
- FIG. 6 is a block diagram of another apparatus for upgrading firmware according to an exemplary embodiment.
- FIG. 7 is a block diagram of an apparatus suitable for upgrading firmware, according to an exemplary embodiment.
- FIG. 1 is a flowchart of a method for upgrading firmware according to an exemplary embodiment, where the method for upgrading firmware may be applied to a smart device (eg, smart socket, smart TV, smart air conditioner, etc.), as shown in FIG.
- a smart device eg, smart socket, smart TV, smart air conditioner, etc.
- the method for upgrading the firmware includes the following steps S101 to S103:
- step S101 when it is determined that the firmware of the first chip needs to be upgraded, the first partition of the firmware of the second chip for downloading the firmware of the second chip is identified.
- the firmware of the first chip needs to be upgraded by means of remote control, and the firmware of the first chip needs to be upgraded by triggering a button on the smart device.
- the first chip is a non-MCU chip such as a Bluetooth chip or a WIFI chip
- the second chip may be an MCU chip or an MCU-like chip
- the first partition may be a backup area in the flash memory in the MCU chip.
- the first chip may be an MCU chip
- the second chip is a non-MCU chip such as a Bluetooth chip or a WIFI chip.
- the first embodiment and the second chip are not in the embodiment of the present disclosure. The specific name is limited, and one of the first chip and the second chip is provided with a flash memory.
- step S102 the new firmware of the first chip is downloaded to the first partition.
- the firmware of the first chip can be downloaded to the first partition via the internetwork.
- step S103 the new firmware of the first chip is copied from the first partition to the active area in the first chip.
- the active area of the first chip may be determined based on the type of firmware.
- the firmware of the first chip needs to be upgraded, avoiding conflicts when upgrading firmware of multiple chips at the same time, improving the security of the firmware during firmware upgrade;
- the firmware is downloaded to the first partition in the flash memory of the second chip, and the new firmware of the first chip is copied from the first partition to the effective position in the first chip, and the flash memory of the second chip is implemented by the second chip.
- the new firmware is upgraded, eliminating the need for additional control logic during the upgrade process, saving resources on smart devices.
- the method for upgrading the firmware may further include:
- the second partition is set as a first partition for downloading firmware of the second chip.
- step S101 may further include:
- the first partition of the firmware for downloading the second chip in the flash memory of the second chip is identified by the partition information.
- the method for upgrading the firmware may further include:
- the new firmware of the first chip is downloaded to the first partition, the new firmware of the first chip is verified.
- the foregoing method provided by the embodiments of the present disclosure can avoid conflicts when upgrading firmware of multiple chips at the same time, improve security during firmware upgrade of the chip, and avoid using additional control logic during the upgrade process. , saving resources of smart devices.
- FIG. 2 is a flowchart of a method for upgrading firmware according to an exemplary embodiment of the present invention
- the present embodiment utilizes the foregoing method provided by the embodiment of the present disclosure, using a second chip as an MCU chip, and passing through the MCU chip.
- the firmware is upgraded as an example for exemplary illustration, as shown in Figure 2, including the following steps:
- step S201 when it is determined that the firmware of the second chip needs to be upgraded, the partition information of the second chip is acquired.
- the firmware to be upgraded may be determined to be an MCU chip by means of remote control, or the firmware to be upgraded may be determined as an MCU chip by triggering a button on the smart device.
- the partition information of the second chip indicates the area where the first partition and the second partition in the flash memory are located.
- step S202 the first partition of the firmware for downloading the second chip in the flash memory of the second chip is identified by the partition information.
- the first partition is, for example, a backup area of a flash memory.
- step S203 after the new firmware of the first chip is downloaded to the first partition, the new firmware for the first chip Check it out.
- the new firmware of the first chip may be verified by a Cyclic Redundancy Check (CRC), or the new firmware may be verified by the format information of the new firmware.
- CRC Cyclic Redundancy Check
- step S204 the new firmware of the second chip is downloaded to the first partition.
- step S205 the first partition is activated into a second partition for storing the original firmware of the second chip.
- the second partition is, for example, an active area of a flash memory for storing the original firmware of the MCU chip.
- step S206 the second partition is set as the first partition for downloading the firmware of the second chip.
- the second chip is taken as an example of the MCU chip.
- the firmware that needs to be upgraded by the MCU chip is downloaded to the backup area, the backup area is set as the active area, and the second partition where the original firmware is located is set.
- the firmware of the MCU chip is upgraded without occupying other resources of the smart device, thereby avoiding the use of additional control logic and saving resources of the smart device.
- FIG. 3 is a flowchart of a method for upgrading firmware according to an exemplary embodiment.
- This embodiment uses the foregoing method provided by an embodiment of the present disclosure to upgrade an firmware in an MCU chip on a smart device.
- the firmware in the non-MCU chip for example, the WIFI chip, the Bluetooth chip, and the like
- FIG. 3 the following steps are included:
- step S301 when it is determined that the firmware of the second chip needs to be upgraded, the partition information of the second chip is acquired.
- the firmware of the MCU chip needs to be upgraded by remote control, and the firmware of the MCU chip needs to be upgraded by triggering the button on the smart device.
- the partition information of the second chip indicates the area where the first partition and the second partition in the flash memory are located.
- step S302 the first partition of the firmware for downloading the second chip in the flash memory of the second chip is identified by the partition information.
- step S303 the new firmware of the second chip is downloaded to the first partition.
- step S304 after the new firmware of the second chip is downloaded to the first partition, the new firmware of the second chip is verified.
- step S305 the first partition is activated into a second partition for storing the original firmware of the second chip.
- step S306 the second partition is set as the first partition for downloading the firmware of the second chip.
- Step S307 when it is determined that the firmware to be upgraded is the first chip, the new firmware of the first chip is downloaded to the first partition.
- the first chip is a WIFI chip
- the first partition in the flash memory of the MCU is the original second partition in the flash memory
- the first partition is set as a backup area through step S305.
- step S308 the new firmware of the first chip is copied from the first partition to the active area in the first chip.
- the firmware in the first chip and the firmware in the second chip are upgraded as an example, and the backup area is set as an active area by downloading the firmware that the MCU needs to be upgraded to the backup area, and Set the second partition where the original firmware is located as the backup area, then download the firmware that needs to be upgraded from the WIFI chip to the backup area, and then copy the firmware that needs to be upgraded from the WIFI chip to the effective area in the WIFI chip to avoid simultaneous MCU chips.
- the conflict between the firmware and the firmware of the WIFI chip is upgraded, and the security of the firmware upgrade of the MCU chip and the WIFI chip is improved; by downloading the new firmware of the WIFI chip to the first partition of the flash memory of the MCU chip, The new firmware of the WIFI chip is copied from the backup area to the effective position in the WIFI chip, and the new firmware of the WIFI chip is upgraded by the flash memory of the MCU chip, and the additional control logic is avoided during the upgrade process, saving the intelligence.
- the resources of the device can also be a Bluetooth chip.
- the process of upgrading the firmware in the Bluetooth chip can be referred to the above description, and will not be described in detail herein.
- the firmware upgrade process of the embodiment of the present disclosure is exemplarily described below with reference to FIG. 4A to FIG. 4E .
- the embodiment of the present disclosure is exemplified by using the first chip as the WIFI chip and the second chip as the MCU chip as an example. It is understood that, for a chip in which a flash memory exists in a smart device, a technical solution for upgrading other firmware that needs to be upgraded through different partitions in the flash memory can be understood as a technical solution of the embodiment of the present disclosure.
- firmwares in the smart device may be upgraded according to the above-mentioned steps of upgrading the firmware according to the order of the instructions received by the smart device. Examples are as follows:
- the smart device 40 includes an MCU chip 41 and a WIFI chip 42, wherein the flash memory in the MCU chip 41 includes a first partition 411 and a second partition 412, and the first partition 411 is used to download the MCU chip 41.
- the second partition 412 is used to store the original firmware of the MCU chip, and the image is more vivid.
- the first partition 411 may be referred to as a backup area in the flash memory of the MCU chip
- the second partition 412 may be referred to as a flash memory in the MCU chip. Active area.
- both the MCU chip 41 and the WIFI chip 42 require a firmware upgrade.
- the smart device can download the new firmware of the MCU chip 41 into the first partition 411 by remote downloading.
- the new firmware of the MCU chip 41 can be verified to ensure that the new firmware of the MCU chip 41 is activated, and the second partition 412 of the region where the new firmware of the MCU chip 41 is located is activated.
- the area where the original firmware of the MCU chip 41 is located is set as the first partition (that is, the backup area).
- the smart device downloads the new firmware of the WIFI chip 42 to the first partition of the MCU chip by remote downloading.
- FIG. 4E after the new firmware verification of the WIFI chip 42 is completed, the new firmware of the WIFI chip 42 is copied into the WIFI chip, and the original firmware of the WIFI 42 is overwritten, and the smart device is restarted. Firmware upgrade for smart devices.
- FIG. 5 is a block diagram of an apparatus for upgrading firmware according to an exemplary embodiment, as shown in FIG.
- the device for upgrading may include:
- the identification module 51 is configured to identify a first partition of the firmware of the second chip for downloading the firmware of the second chip when determining that the firmware of the first chip needs to be upgraded;
- the first downloading module 52 is configured to download the new firmware of the first chip to the first partition to which the identification module identifies 51;
- the copy module 53 is configured to copy the new firmware of the first chip downloaded by the first download module 52 from the first partition to the effective area in the first chip.
- the apparatus may further include:
- the second downloading module 54 is configured to download the new firmware of the second chip to the first partition identified by the identification module 51 when determining that the firmware of the second chip needs to be upgraded;
- the activation module 55 is configured to activate the first partition into a second partition for storing the original firmware of the second chip after the second download module 54 downloads the new firmware of the second chip to the first partition;
- the setting module 56 is configured to, after the activation module 55 activates the first partition to the second partition, set the second partition as a first partition for downloading firmware of the second chip, when the firmware of the first chip is needed,
- the identification module 51 is capable of identifying a first partition of the firmware of the second chip for downloading the firmware of the second chip.
- the identification module 51 can include:
- the obtaining submodule 511 is configured to acquire partition information of the second chip
- the identification sub-module 512 is configured to identify the first partition of the firmware of the second chip for downloading the firmware of the second chip by acquiring the partition information acquired by the sub-module 511.
- the apparatus may further include:
- the verification module 57 is configured to verify the new firmware of the first chip after the first download module 52 downloads the new firmware of the first chip to the first partition.
- FIG. 7 is a block diagram of an apparatus suitable for upgrading firmware, according to an exemplary embodiment.
- device 700 can be a mobile phone, a computer, a digital broadcast terminal, a messaging device, a gaming console, a tablet device, a medical device, a fitness device, a personal digital assistant, a smart home device, and the like.
- apparatus 700 can include one or more of the following components: processing component 702, memory 704, power component 706, multimedia component 708, audio component 710, input/output (I/O) interface 712, sensor component 714, And a communication component 716.
- Processing component 702 typically controls the overall operation of device 700, such as operations associated with display, telephone calls, data communications, camera operations, and recording operations.
- Processing component 702 can include one or more processors 720 to execute instructions to perform all or part of the steps described above.
- processing component 702 can include one or more modules to facilitate interaction between component 702 and other components.
- processing component 702 can include a multimedia module to facilitate interaction between multimedia component 707 and processing component 702.
- Memory 704 is configured to store various types of data to support operation at device 700. Examples of such data include instructions for any application or method operating on device 700, contact data, phone book data, messages, pictures, videos, and the like. Memory 704 can be implemented by any type of volatile or non-volatile storage device, or a combination thereof, such as static random access memory (SRAM), electrically erasable programmable read only memory (EEPROM), erasable Programmable Read Only Memory (EPROM), Programmable Read Only Memory (PROM), Read Only Memory (ROM), Magnetic Memory, Flash Memory, Disk or Optical Disk.
- SRAM static random access memory
- EEPROM electrically erasable programmable read only memory
- EPROM erasable Programmable Read Only Memory
- PROM Programmable Read Only Memory
- ROM Read Only Memory
- Magnetic Memory Flash Memory
- Disk Disk or Optical Disk.
- Power component 706 provides power to various components of device 700.
- Power component 706 can include a power management system, one or more power sources, and other components associated with generating, managing, and distributing power for device 700.
- the multimedia component 708 includes a screen between the device 700 and the user that provides an output interface.
- the screen can include a liquid crystal display (LCD) and a touch panel (TP). If the screen includes a touch panel, the screen can be implemented as a touch screen to receive input signals from the user.
- the touch panel includes one or more touch sensors to sense touches, slides, and gestures on the touch panel. The touch sensor may sense not only the boundary of the touch or sliding action, but also the duration and pressure associated with the touch or slide operation.
- the multimedia component 708 includes a front camera and/or a rear camera. When the device 700 is in an operation mode, such as a shooting mode or a video mode, the front camera and/or the rear camera can receive external multimedia data. Each front and rear camera can be a fixed optical lens system or have focal length and optical zoom capabilities.
- the audio component 710 is configured to output and/or input an audio signal.
- audio component 710 includes a microphone (MIC) that is configured to receive an external audio signal when device 700 is in an operational mode, such as a call mode, a recording mode, and a voice recognition mode.
- the received audio signal may be further stored in memory 704 or transmitted via communication component 716.
- audio component 710 also includes a speaker for outputting an audio signal.
- the I/O interface 712 provides an interface between the processing component 702 and the peripheral interface module, which may be a keyboard, a click wheel, a button, or the like. These buttons may include, but are not limited to, a home button, a volume button, a start button, and a lock button.
- Sensor assembly 714 includes one or more sensors for providing device 700 with various aspects of status assessment.
- sensor component 714 can detect an open/closed state of device 700, a relative positioning of components, such as the display and keypad of device 700, and sensor component 714 can also detect a change in position of one component of device 700 or device 700. The presence or absence of user contact with device 700, device 700 orientation or acceleration/deceleration, and temperature variation of device 700.
- Sensor assembly 714 can include a proximity sensor configured to detect the presence of nearby objects without any physical contact.
- Sensor component 714 can also include a light sensor, such as a CMOS or CCD image sensor, for use in imaging applications.
- the sensor component 714 can also include an acceleration sensor, a gyro sensor, a magnetic sensor, a pressure sensor, or a temperature sensor.
- Communication component 716 is configured to facilitate wired or wireless communication between device 700 and other devices.
- the device 700 can access a wireless network based on a communication standard, such as WiFi, 2G or 3G, or a combination thereof.
- communication component 716 receives a broadcast signal or broadcast associated message from an external broadcast management system via a broadcast channel. interest.
- the communication component 716 also includes a near field communication (NFC) module to facilitate short range communication.
- NFC near field communication
- the NFC module can be implemented based on radio frequency identification (RFID) technology, infrared data association (IrDA) technology, ultra-wideband (UWB) technology, Bluetooth (BT) technology, and other technologies.
- RFID radio frequency identification
- IrDA infrared data association
- UWB ultra-wideband
- Bluetooth Bluetooth
- apparatus 700 may be implemented by one or more application specific integrated circuits (ASICs), digital signal processors (DSPs), digital signal processing devices (DSPDs), programmable logic devices (PLDs), field programmable A gate array (FPGA), controller, microcontroller, microprocessor, or other electronic component implementation for performing the above methods.
- ASICs application specific integrated circuits
- DSPs digital signal processors
- DSPDs digital signal processing devices
- PLDs programmable logic devices
- FPGA field programmable A gate array
- controller microcontroller, microprocessor, or other electronic component implementation for performing the above methods.
- non-transitory computer readable storage medium comprising instructions, such as a memory 704 comprising instructions executable by processor 720 of apparatus 700 to perform the above method.
- the non-transitory computer readable storage medium may be a ROM, a random access memory (RAM), a CD-ROM, a magnetic tape, a floppy disk, and an optical data storage device.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- Stored Programmes (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
Abstract
Description
Claims (9)
- 一种对固件进行升级的方法,应用在智能设备上,其特征在于,所述方法包括:在确定第一芯片的固件需要升级时,识别第二芯片的闪存中的用于下载所述第二芯片的固件的第一分区;将所述第一芯片的新的固件下载到所述第一分区;将所述第一芯片的新的固件从所述第一分区拷贝到所述第一芯片中的有效区域。
- 如权利要求1所述的方法,其特征在于,所述方法还包括:在确定所述第二芯片的固件需要升级时,将所述第二芯片的新的固件下载到所述第一分区;将所述第一分区激活成用于存储所述第二芯片的原有固件的第二分区;将所述第二分区设置为用于下载所述第二芯片的固件的第一分区。
- 如权利要求1所述的方法,其特征在于,所述识别第二芯片的闪存中的用于下载所述第二芯片的固件的第一分区,包括:获取第二芯片的分区信息;通过所述分区信息识别所述第二芯片的闪存中的用于下载所述第二芯片的固件的第一分区。
- 如权利要求1所述的方法,其特征在于,所述方法还包括:在所述第一芯片的新的固件下载到所述第一分区后,对所述第一芯片的新的固件进行校验。
- 一种对固件进行升级的装置,应用在智能设备上,其特征在于,所述装置包括:识别模块,被配置为在确定第一芯片的固件需要升级时,识别第二芯片的闪存中的用于下载所述第二芯片的固件的第一分区;第一下载模块,被配置为将所述第一芯片的新的固件下载到所述识别模块识别到的所述第一分区;拷贝模块,被配置为将所述第一下载模块下载得到的所述第一芯片的新的固件从所述第一分区拷贝到所述第一芯片中的有效区域。
- 如权利要求5所述的装置,其特征在于,所述装置还包括:第二下载模块,被配置为在确定所述第二芯片的固件需要升级时,将所述第二芯片的新的固件下载到所述识别模块识别到的所述第一分区;激活模块,被配置为在所述第二下载模块将所述第二芯片的新的固件下载到所述第一分区后,将所述第一分区激活成用于存储所述第二芯片的原有固件的第二分区;设置模块,被配置为在所述激活模块将所述第一分区激活为所述第二分区后,将所述第二分区设置为用于下载所述第二芯片的固件的第一分区。
- 如权利要求5所述的装置,其特征在于,所述识别模块包括:获取子模块,被配置为获取第二芯片的分区信息;识别子模块,被配置为通过所述获取子模块获取到的所述分区信息识别所述第二芯片的闪存中的用于下载所述第二芯片的固件的第一分区。
- 如权利要求5所述的装置,其特征在于,所述装置还包括:校验模块,被配置为在所述第一下载模块将所述第一芯片的新的固件下载到所述第一分区后,对所述第一芯片的新的固件进行校验。
- 一种对固件进行升级的装置,其特征在于,所述装置包括:处理器;用于存储处理器可执行指令的存储器;其中,所述处理器被配置为:在确定第一芯片的固件需要升级时,识别第二芯片的闪存中的用于下载所述第二芯片的固件的第一分区;将所述第一芯片的新的固件下载到所述第一分区;将所述第一芯片的新的固件从所述第一分区拷贝到所述第一芯片中的有效区域。
Priority Applications (6)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020157016306A KR20160084304A (ko) | 2014-12-09 | 2015-04-29 | 펌웨어 업그레이드 방법, 장치, 프로그램 및 저장매체 |
MX2015010881A MX354477B (es) | 2014-12-09 | 2015-04-29 | Método y dispositivo para actualizar firmware. |
BR112015020272A BR112015020272A2 (pt) | 2014-12-09 | 2015-04-29 | método e dispositivo para atualização de firmware |
JP2016563234A JP6259122B2 (ja) | 2014-12-09 | 2015-04-29 | ファームウェアアップグレード方法、装置、プログラム及び記録媒体 |
RU2015131124A RU2633151C2 (ru) | 2014-12-09 | 2015-04-29 | Способ и устройство для обновления микропрограммного обеспечения |
US14/841,911 US9886264B2 (en) | 2014-12-09 | 2015-09-01 | Method and device for upgrading firmware |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410751727.3A CN104484200B (zh) | 2014-12-09 | 2014-12-09 | 对固件进行升级的方法及装置 |
CN201410751727.3 | 2014-12-09 |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/841,911 Continuation US9886264B2 (en) | 2014-12-09 | 2015-09-01 | Method and device for upgrading firmware |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2016090822A1 true WO2016090822A1 (zh) | 2016-06-16 |
Family
ID=52758744
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2015/077855 WO2016090822A1 (zh) | 2014-12-09 | 2015-04-29 | 对固件进行升级的方法及装置 |
Country Status (8)
Country | Link |
---|---|
EP (1) | EP3032412B1 (zh) |
JP (1) | JP6259122B2 (zh) |
KR (1) | KR20160084304A (zh) |
CN (1) | CN104484200B (zh) |
BR (1) | BR112015020272A2 (zh) |
MX (1) | MX354477B (zh) |
RU (1) | RU2633151C2 (zh) |
WO (1) | WO2016090822A1 (zh) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114138694A (zh) * | 2021-11-29 | 2022-03-04 | 杭州迪普科技股份有限公司 | 下载接口模块、芯片烧录方法及装置 |
CN114661368A (zh) * | 2022-05-19 | 2022-06-24 | 中昊芯英(杭州)科技有限公司 | 一种芯片及其启动方法 |
Families Citing this family (22)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104484200B (zh) * | 2014-12-09 | 2018-05-25 | 小米科技有限责任公司 | 对固件进行升级的方法及装置 |
US9886264B2 (en) | 2014-12-09 | 2018-02-06 | Xiaomi Inc. | Method and device for upgrading firmware |
US10581755B2 (en) | 2015-04-03 | 2020-03-03 | Nicira, Inc. | Provisioning network services in a software defined data center |
CN105022690A (zh) * | 2015-07-14 | 2015-11-04 | 四川长虹电器股份有限公司 | 一种空调测试方法及功能测试系统 |
CN105117251A (zh) * | 2015-08-25 | 2015-12-02 | 浪潮电子信息产业股份有限公司 | 一种外挂芯片式远程刷新电源firmware的设计方法 |
CN105554306B (zh) * | 2016-01-27 | 2019-05-31 | 努比亚技术有限公司 | 移动终端及其双芯片系统升级方法 |
CN105577450A (zh) * | 2016-01-27 | 2016-05-11 | 努比亚技术有限公司 | 系统升级装置和方法 |
CN105577940B (zh) * | 2016-01-27 | 2019-05-31 | 努比亚技术有限公司 | 移动终端及系统升级方法 |
US10242197B2 (en) * | 2016-09-23 | 2019-03-26 | Intel Corporation | Methods and apparatus to use a security coprocessor for firmware protection |
CN106843958A (zh) * | 2017-01-18 | 2017-06-13 | 成都黑盒子电子技术有限公司 | 一种嵌入式固件升级方法 |
CN107748665A (zh) * | 2017-09-06 | 2018-03-02 | 中国航空工业集团公司西安飞行自动控制研究所 | 一种适用于水下惯导设备的软件升级方法 |
CN107608705A (zh) * | 2017-09-29 | 2018-01-19 | 深圳市瑞科慧联科技有限公司 | 一种无线wifi视频设备及其固件升级方法 |
CN107992322B (zh) * | 2017-12-04 | 2021-06-04 | 上海无线电设备研究所 | 一种雷达信号处理机dsp代码自更新方法 |
US11210084B2 (en) * | 2018-03-09 | 2021-12-28 | Samsung Electronics Co., Ltd. | Integrated single FPGA and solid state disk controller |
CN109002317B (zh) * | 2018-06-27 | 2022-01-18 | 上海有个机器人有限公司 | 一种pcba固件升级方法及系统、pcba |
CN110175042A (zh) * | 2019-06-04 | 2019-08-27 | 深圳云里物里科技股份有限公司 | 一种固件升级方法、装置及其相关设备 |
KR20210101690A (ko) | 2020-02-10 | 2021-08-19 | 삼성전자주식회사 | 전자 장치 및 전자 장치의 초기화 방법 |
EP3937044A1 (en) * | 2020-07-06 | 2022-01-12 | Thales DIS France SA | Method for managing a biometric smart card |
US11601474B2 (en) | 2020-09-28 | 2023-03-07 | Vmware, Inc. | Network virtualization infrastructure with divided user responsibilities |
KR102520452B1 (ko) * | 2021-05-24 | 2023-04-12 | 주식회사 아이자랩 | 경사지 붕괴위험 예측용 계측기의 무선 원격 펌웨어 업데이트 방법 |
CN113204364A (zh) * | 2021-05-28 | 2021-08-03 | 广州众诺电子技术有限公司 | 一种芯片固件升级方法、装置、电子设备及存储介质 |
CN113434184A (zh) * | 2021-06-30 | 2021-09-24 | 浙江大华技术股份有限公司 | 设备升级方法、装置、存储介质及电子装置 |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100313191A1 (en) * | 2009-06-05 | 2010-12-09 | Dell Products L.P. | System and Method for Modifying Firmware |
CN102945174A (zh) * | 2012-11-08 | 2013-02-27 | 大连捷成实业发展有限公司 | 通过接着片外Flash实现单片机程序升级的方法 |
CN103116502A (zh) * | 2011-11-17 | 2013-05-22 | 国家纳米技术与工程研究院 | 一种利用主备版本备份实现升级的方法 |
CN104484200A (zh) * | 2014-12-09 | 2015-04-01 | 小米科技有限责任公司 | 对固件进行升级的方法及装置 |
Family Cites Families (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CA2357382A1 (en) * | 2001-09-17 | 2003-03-17 | Soma Networks, Inc. | Software update method, apparatus and system |
CN100472442C (zh) * | 2006-03-02 | 2009-03-25 | 中兴通讯股份有限公司 | 一种对固件程序进行在线升级的装置及其方法 |
KR20070120447A (ko) * | 2006-06-19 | 2007-12-24 | 삼성전자주식회사 | 시스템 프로그램 갱신 장치 및 방법 |
KR101426710B1 (ko) * | 2006-07-14 | 2014-09-23 | 삼성전자주식회사 | 휴대단말기의 버전정보 갱신 장치 및 방법 |
JP2008104036A (ja) * | 2006-10-20 | 2008-05-01 | Sumitomo Electric Ind Ltd | 通信装置 |
CN100589078C (zh) * | 2007-08-21 | 2010-02-10 | 中兴通讯股份有限公司 | 多核终端的固件升级方法 |
US8812746B2 (en) * | 2010-12-16 | 2014-08-19 | Intel Corporation | Dynamically configurable device host controller |
WO2013101068A1 (en) * | 2011-12-29 | 2013-07-04 | Intel Corporation | Short circuit of probes in a chain |
CN102662706A (zh) * | 2012-04-01 | 2012-09-12 | 西安合众思壮导航技术有限公司 | 一种远程可靠升级xip 芯片软件的方法 |
CN102722390B (zh) * | 2012-06-05 | 2015-04-15 | 上海联影医疗科技有限公司 | 多处理器共用flash的装置及固件程序加载与升级方法 |
US8972970B2 (en) * | 2012-07-02 | 2015-03-03 | Taiwan Gomet Technology Co. Ltd. | Firmware overwriting method in paired use wireless microphone and receiver |
JP6175788B2 (ja) * | 2013-02-11 | 2017-08-09 | 住友電気工業株式会社 | マイクロプログラムを更新可能な電子機器 |
JP6070360B2 (ja) * | 2013-03-29 | 2017-02-01 | 沖電気工業株式会社 | 情報処理装置およびその処理方法 |
CN103810004B (zh) * | 2013-11-22 | 2017-03-22 | 小米科技有限责任公司 | 嵌入式系统升级的方法、装置及设备 |
-
2014
- 2014-12-09 CN CN201410751727.3A patent/CN104484200B/zh active Active
-
2015
- 2015-04-29 JP JP2016563234A patent/JP6259122B2/ja active Active
- 2015-04-29 BR BR112015020272A patent/BR112015020272A2/pt not_active IP Right Cessation
- 2015-04-29 MX MX2015010881A patent/MX354477B/es active IP Right Grant
- 2015-04-29 RU RU2015131124A patent/RU2633151C2/ru active
- 2015-04-29 KR KR1020157016306A patent/KR20160084304A/ko active Search and Examination
- 2015-04-29 WO PCT/CN2015/077855 patent/WO2016090822A1/zh active Application Filing
- 2015-11-05 EP EP15193088.0A patent/EP3032412B1/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100313191A1 (en) * | 2009-06-05 | 2010-12-09 | Dell Products L.P. | System and Method for Modifying Firmware |
CN103116502A (zh) * | 2011-11-17 | 2013-05-22 | 国家纳米技术与工程研究院 | 一种利用主备版本备份实现升级的方法 |
CN102945174A (zh) * | 2012-11-08 | 2013-02-27 | 大连捷成实业发展有限公司 | 通过接着片外Flash实现单片机程序升级的方法 |
CN104484200A (zh) * | 2014-12-09 | 2015-04-01 | 小米科技有限责任公司 | 对固件进行升级的方法及装置 |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114138694A (zh) * | 2021-11-29 | 2022-03-04 | 杭州迪普科技股份有限公司 | 下载接口模块、芯片烧录方法及装置 |
CN114661368A (zh) * | 2022-05-19 | 2022-06-24 | 中昊芯英(杭州)科技有限公司 | 一种芯片及其启动方法 |
Also Published As
Publication number | Publication date |
---|---|
EP3032412B1 (en) | 2024-06-26 |
MX2015010881A (es) | 2016-08-02 |
JP2017505966A (ja) | 2017-02-23 |
RU2015131124A (ru) | 2017-06-07 |
BR112015020272A2 (pt) | 2017-07-18 |
MX354477B (es) | 2018-03-07 |
CN104484200B (zh) | 2018-05-25 |
RU2633151C2 (ru) | 2017-10-11 |
EP3032412A1 (en) | 2016-06-15 |
CN104484200A (zh) | 2015-04-01 |
KR20160084304A (ko) | 2016-07-13 |
JP6259122B2 (ja) | 2018-01-10 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2016090822A1 (zh) | 对固件进行升级的方法及装置 | |
US9886264B2 (en) | Method and device for upgrading firmware | |
WO2016155233A1 (zh) | 智能场景删除方法和装置 | |
WO2017035990A1 (zh) | 安装智能设备的插件的方法和装置 | |
US10425403B2 (en) | Method and device for accessing smart camera | |
WO2016011743A1 (zh) | 节省存储空间的方法和装置 | |
WO2016029685A1 (zh) | 一种路由器管理应用与路由器固件的兼容方法和装置 | |
WO2016041312A1 (zh) | 应用程序运行方法及装置 | |
WO2016188060A1 (zh) | 应用程序安装包的处理方法及装置 | |
RU2641257C2 (ru) | Способ и аппаратура для управления устройствами | |
WO2017035994A1 (zh) | 外接设备的连接方法及装置 | |
CN104536783B (zh) | 预留空间设置方法及装置 | |
EP3076745B1 (en) | Methods and apparatuses for controlling wireless access point | |
CN109669730B (zh) | 一种进程保活方法、装置、电子设备及介质 | |
WO2017036018A1 (zh) | 指纹识别方法、装置及移动终端 | |
WO2016150104A1 (zh) | 应用主题的加载方法及装置 | |
EP2924552A1 (en) | Method and mobile terminal for executing user instructions | |
EP3133806A1 (en) | Method and device for generating panorama | |
US20160123622A1 (en) | Air purification notification method and apparatus, user equipment and system | |
WO2018072193A1 (zh) | 控制应用自启动的方法及装置 | |
CN107463372B (zh) | 一种数据驱动的页面更新方法和装置 | |
WO2016095452A1 (zh) | 固件刷新方法及装置 | |
RU2632396C2 (ru) | Способ и устройство для управления подключаемым модулем маршрутизатора | |
WO2017045301A1 (zh) | 应用安装方法、装置及智能设备 | |
CN107733674B (zh) | 组件升级方法及终端 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
ENP | Entry into the national phase |
Ref document number: 20157016306 Country of ref document: KR Kind code of ref document: A |
|
ENP | Entry into the national phase |
Ref document number: 2016563234 Country of ref document: JP Kind code of ref document: A |
|
WWE | Wipo information: entry into national phase |
Ref document number: MX/A/2015/010881 Country of ref document: MX |
|
ENP | Entry into the national phase |
Ref document number: 2015131124 Country of ref document: RU Kind code of ref document: A |
|
REG | Reference to national code |
Ref country code: BR Ref legal event code: B01A Ref document number: 112015020272 Country of ref document: BR |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 15868157 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
ENP | Entry into the national phase |
Ref document number: 112015020272 Country of ref document: BR Kind code of ref document: A2 Effective date: 20150824 |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 15868157 Country of ref document: EP Kind code of ref document: A1 |