WO2020113382A1 - 硬件升级方法、装置、设备和存储介质 - Google Patents
硬件升级方法、装置、设备和存储介质 Download PDFInfo
- Publication number
- WO2020113382A1 WO2020113382A1 PCT/CN2018/118951 CN2018118951W WO2020113382A1 WO 2020113382 A1 WO2020113382 A1 WO 2020113382A1 CN 2018118951 W CN2018118951 W CN 2018118951W WO 2020113382 A1 WO2020113382 A1 WO 2020113382A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- image file
- program
- upgrade
- hardware
- file
- Prior art date
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/60—Software deployment
- G06F8/65—Updates
Definitions
- This application relates to the technical field of hardware upgrades, for example, to a hardware upgrade method, device, equipment, and storage medium.
- Embodiments of the present disclosure provide a hardware upgrade method, device, equipment, and storage medium to improve the flexibility of hardware upgrade and lower maintenance cost.
- An embodiment of the present disclosure provides a hardware upgrade method, including:
- the upgrade script is generated according to preset upgrade demand information;
- the image file includes an image file of at least one program of the hardware;
- the upgrade requirement information includes at least the following information: the name of the image file, the storage offset corresponding to the image file, and the operation information of the upgrade execution.
- the obtaining the upgrade script and the image file includes:
- the method before acquiring the upgrade script and the image file through the TF card interface, the method further includes:
- the upgrade script and the image file are obtained through the TF card interface of the TF card.
- the upgrade script and the image file are obtained through the TF card interface of the TF card.
- the transmission rate is faster and the efficiency is higher.
- the upgrade script is parsed, and the parsed upgrade script is executed to burn the image file to the hardware.
- the hardware program can be upgraded.
- the upgrading the hardware program according to the upgrade script and the image file includes:
- the execution of the parsed upgrade script includes:
- the decompressed file includes at least one image file of the program
- the image file of the program is burned into the storage space of the hardware.
- the upgrade script is parsed and executed, that is, the image file of each program is verified; if the verification is successful, the program image file is burned into the hardware storage space, which improves Security, and the upgrade script can be modified according to the upgrade requirements, with greater flexibility and lower maintenance costs.
- the verification of the image file of the program includes:
- a cyclic redundancy check algorithm is used to verify the image file of the program.
- the acquiring the cyclic redundancy check CRC32 value of the pre-generated image file of the program includes:
- the decompressed file includes: a configuration file, and the configuration file includes a CRC32 value of a pre-generated image file of the program, and then the acquired pre-generated
- the cyclic redundancy check CRC32 value of the mirror file of the program described above includes:
- An embodiment of the present disclosure also provides a hardware upgrade device, including:
- the obtaining module is configured to obtain an upgrade script and an image file; the upgrade script is generated according to preset upgrade demand information; the image file includes an image file of at least one program of the hardware;
- the processing module is configured to upgrade the hardware program according to the upgrade script and the image file.
- the upgrade requirement information includes at least the following information: the name of the image file, the storage offset corresponding to the image file, and the operation information of the upgrade execution.
- the acquisition module is configured to:
- the acquisition module is configured to:
- the upgrade script and the image file are obtained through the TF card interface of the TF card.
- the processing module is configured to:
- the processing module is configured to:
- the decompressed file includes at least one image file of the program
- the image file of the program is burned into the storage space of the hardware.
- the acquisition module is configured to:
- the processing module is configured to:
- a cyclic redundancy check algorithm is used to verify the image file of the program.
- the acquisition module is configured to:
- the decompressed file includes: a configuration file, and the configuration file includes a CRC32 value of a pre-generated image file of the program, and the acquisition module is configured as :
- An embodiment of the present disclosure also provides a computer (or mobile phone or other device), which includes the above-mentioned hardware upgrade device.
- An embodiment of the present disclosure also provides a computer-readable storage medium that stores computer-executable instructions that are configured to perform the hardware upgrade method described above.
- An embodiment of the present disclosure also provides a computer program product.
- the computer program product includes a computer program stored on a computer-readable storage medium.
- the computer program includes program instructions. When the program instructions are executed by a computer, the The computer executes the hardware upgrade method described above.
- An embodiment of the present disclosure also provides an electronic device, including:
- At least one processor At least one processor
- a memory communicatively connected to the at least one processor; wherein,
- the memory stores instructions executable by the at least one processor. When the instructions are executed by the at least one processor, the at least one processor is caused to perform the hardware upgrade method described above.
- the hardware upgrade method, device, equipment and storage medium provided by the embodiments of the present disclosure obtain upgrade scripts and image files; the upgrade scripts are generated according to preset upgrade demand information; the image files include at least one of the hardware The mirror file of the program; upgrade the hardware program according to the upgrade script and the mirror file, generate the upgrade script by generating the upgrade demand information, and complete the upgrade task according to the upgrade script, and the upgrade script can be performed according to the upgrade demand Modification, greater flexibility, and lower maintenance costs.
- FIG. 1 is a diagram of an application scenario provided by an embodiment of the present disclosure
- FIG. 2 is a schematic flowchart of a hardware upgrade method provided by an embodiment of the present disclosure
- FIG. 3 is a schematic flowchart of a hardware upgrade method provided by another embodiment of the present disclosure.
- FIG. 4 is a schematic flowchart of a hardware upgrade method provided by another embodiment of the present disclosure.
- FIG. 5 is a schematic flowchart of a hardware upgrade method according to another embodiment of the present disclosure.
- FIG. 6 is a schematic structural diagram of a hardware upgrading apparatus provided by an embodiment of the present disclosure.
- FIG. 7 is a schematic structural diagram of an electronic device provided by an embodiment of the present disclosure.
- the hardware upgrade method provided by the embodiment of the present disclosure is applied to upgrade the program of a hardware product, for example, the hardware product has a TF card interface.
- hardware products include: mobile phones, tablet computers, robots, wearable devices and other electronic products.
- FIG. 1 is an application scenario diagram provided by an embodiment of the present disclosure.
- the method provided by the present disclosure may be implemented by an electronic device 12 such as a processor executing corresponding software codes, or may be executed by the electronic device 12 while executing corresponding software codes.
- the TF card 11 implements data interaction.
- the electronic device 12 and the TF card 11 can be connected through a TF card interface.
- the electronic equipment includes the aforementioned hardware products.
- an upgrade script is generated by generating upgrade demand information, and the upgrade task can be completed according to the upgrade script.
- the upgrade script can be modified according to the upgrade demand, which has greater flexibility and lower maintenance cost.
- FIG. 2 is a schematic flowchart of a hardware upgrade method provided by an embodiment of the present disclosure. As shown in FIG. 2, the method provided in this embodiment includes:
- Step 201 Obtain an upgrade script and an image file; the upgrade script is generated according to preset upgrade demand information; the image file includes an image file of at least one program of the hardware.
- an upgrade script is first written according to the upgrade demand information.
- the upgrade script includes information such as operations to be performed. If there are multiple programs to be upgraded, multiple The upgrade file of the program is packaged to generate an image file, and the image file can also be compressed.
- the upgrade requirement information includes at least the following information: the name of the image file, the storage offset corresponding to the image file, and the operation information for the upgrade.
- the multiple image files are programmed into different storage spaces in the hardware according to the storage offset.
- the storage offset corresponding to the image file 1 is 0, and the storage offset corresponding to the image file 2 is 100 MB, then the image file 1 and the image file 2 are programmed according to the above storage offset.
- the operation information performed by the upgrade includes, for example, what steps are performed by the upgrade and the specific content of each step, such as operations such as decompression, cyclic redundancy check, and programming.
- step 201 may be implemented in the following manner:
- the hardware product includes a serial port and a TF card interface
- the transmission speed of the TF card interface is higher than that of the serial port, you can obtain the upgrade script and image file through the TF card interface.
- the upgrade script and the image file can also be obtained through a USB interface, WIFI, Bluetooth, etc., which is not limited in this embodiment.
- Step 202 Upgrade the hardware program according to the upgrade script and the image file.
- the hardware program is upgraded, that is, through the scripted execution mode, the upgrade script can be parsed to complete the upgrade task.
- the hardware upgrade method of this embodiment obtains an upgrade script and an image file; the upgrade script is generated according to preset upgrade demand information; the image file includes an image file of at least one program of the hardware; according to the upgrade The script and the image file are used to upgrade the hardware program.
- the upgrade script can be modified according to the upgrade demand, which has greater flexibility and maintenance costs. Lower.
- FIG. 3 is a schematic flowchart of a hardware upgrade method according to another embodiment of the present disclosure. Based on the above embodiment, as shown in FIG. 3, the method provided in this embodiment includes:
- Step 301 Detect whether there is a TF card connected to the hardware
- Step 302 Parse the upgrade script and execute the parsed upgrade script.
- the hardware product can detect whether there is an accessed TF card after power-on, or can detect whether there is an accessed TF card in real time or periodically, or can detect whether there is an accessed TF card after receiving an instruction TF card.
- the above instruction may be issued by the user through the hardware product, or issued by another device to the hardware product.
- the upgrade script and the image file are obtained through the TF card interface of the TF card.
- Sample upgrade script including the following steps:
- the offset when programming the local storage of the device that is, the offset when programming the image file to the local storage of the device, such as storage offset 0, 100, 200, 300, n00, etc.
- the upgrade script can be written using the bash shell development environment.
- the upgrade script and the image file are obtained through the TF card interface of the TF card.
- the transmission rate is faster and the efficiency is higher.
- the upgrade script is parsed, and the parsed upgrade script is executed to burn the image file to Upgrade the hardware program in the local storage space of the hardware.
- step 302 will be described in detail.
- step 302 includes:
- Step 3021 Decompress the image file to obtain the decompressed file; the decompressed file includes the image file of at least one program;
- Step 3022 Verify the image files of each program
- Step 3023 If the verification is successful, the program image file is burned into the hardware storage space.
- the upgrade script is parsed, and according to the content of the upgrade script, the following operations are performed: decompress the image file to obtain an image file of at least one program; and image the at least one program
- the files are individually verified, for example, cyclic redundancy check, MD5 check, etc. If the verification of at least one of the above image files is successful, the image file of at least one program is burned into the storage space of the hardware, and the image file of each sequence can be written to according to the storage offset corresponding to the image file of each program. In the storage space of the hardware.
- the image file if it is not compressed, it can be directly verified.
- the upgrade script is generated by generating the upgrade requirement information.
- the upgrade script is parsed and executed, that is, the image file of each program is verified; if the verification is successful, the program image file is written Into the storage space of the hardware, the security is improved, and the upgrade script can be modified according to the upgrade requirements, which has greater flexibility and lower maintenance costs.
- the method of this embodiment includes:
- Step 401 Edit the upgrade script
- the upgrade script can be edited according to the upgrade demand information.
- Step 402 packaging and upgrading the image file; may include:
- Step 4021 Generate the file header of the image file, generate the CRC32 value of the image file, generate the name of the image file, and compress it;
- a cyclic redundancy check such as a CRC32 check
- the CRC32 value of the image file is generated, and the file header of the image file is generated, and operations such as compressing the generated image file are performed.
- Step 403 Copy the upgrade script and the image file to the TF card
- Step 404 connect the TF card to the device
- Step 405 Reset or power on the device
- Step 406 the device detects whether there is a TF card access
- step 407 the device performs step 407 and starts the system normally;
- step 408 is executed to read the upgrade script and image file from the TF card;
- Step 409 Parse and execute the upgrade script; may include:
- Step 4091 Perform CRC32 check on the image file in the TF card, decompress it, and program the local storage;
- completion instruction information may be issued to indicate to the user that the upgrade is completed. For example, display instruction information on the operation interface of the device, or send out voice instruction information.
- the upgrade script by generating upgrade scripts from the upgrade requirement information, packaging the upgrade image files, storing the upgrade scripts and image files in the TF card, and obtaining the upgrade scripts and image files through the TF card interface of the TF card. , Analyze and execute the upgrade script, that is, verify the image file of each program; if the verification is successful, the program image file is burned into the hardware storage space, the upgrade script can be modified according to the upgrade requirements, flexible It has greater performance and lower maintenance cost.
- step 3022 will be described in detail.
- the verification of the image file of the program may be implemented in the following manner:
- the cyclic redundancy check algorithm is used to verify the image file of the program.
- the CRC32 value of the image file of the pre-generated program can be obtained in one of the following ways:
- the decompressed files include: a configuration file, and the configuration file includes the CRC32 value of the pre-generated image file of the program, and then the CRC32 value of the image file of the program is obtained from the configuration file.
- the CRC32 value of the image file can be written in the upgrade script when editing the upgrade script.
- the CRC32 value of the image file of the pre-generated program can be written in a configuration file, compressed together with the image file, and when the image file is verified, the CRC32 value of the image file can be obtained from the configuration file.
- FIG. 6 is a schematic structural diagram of a hardware upgrading apparatus provided by an embodiment of the present disclosure. As shown in FIG. 6, the hardware upgrading apparatus provided in this embodiment includes:
- the obtaining module 601 is configured to obtain an upgrade script and an image file; the upgrade script is generated according to preset upgrade demand information; the image file includes an image file of at least one program of the hardware;
- the processing module 602 is configured to upgrade the hardware program according to the upgrade script and the image file.
- the upgrade requirement information includes at least the following information: the name of the image file, the storage offset corresponding to the image file, and the operation information of the upgrade execution.
- the acquisition module 601 is configured to:
- the acquisition module 601 is configured to:
- the upgrade script and the image file are obtained through the TF card interface of the TF card.
- the processing module 602 is configured to:
- the processing module 602 is configured to:
- the decompressed file includes at least one image file of the program
- the image file of the program is burned into the storage space of the hardware.
- the acquisition module 601 is configured to:
- the processing module 602 is configured to:
- a cyclic redundancy check algorithm is used to verify the image file of the program.
- the acquisition module 601 is configured to:
- the decompressed file includes: a configuration file
- the configuration file includes a CRC32 value of the image file of the program that is generated in advance
- the acquisition module 601 is configured as:
- the device of this embodiment may be used to execute the technical solutions of the above method embodiments, and its implementation principles and technical effects are similar, and will not be repeated here.
- An embodiment of the present disclosure also provides a computer (or mobile phone or other device), which includes the above-mentioned hardware upgrade device.
- An embodiment of the present disclosure also provides a computer-readable storage medium that stores computer-executable instructions that are configured to perform the above-described hardware upgrade method.
- An embodiment of the present disclosure also provides a computer program product.
- the computer program product includes a computer program stored on a computer-readable storage medium.
- the computer program includes program instructions. When the program instructions are executed by a computer, the The computer executes the above hardware upgrade method.
- the aforementioned computer-readable storage medium may be a transient computer-readable storage medium or a non-transitory computer-readable storage medium.
- An embodiment of the present disclosure also provides an electronic device, whose structure is shown in FIG. 7, the electronic device includes:
- At least one processor (processor) 700 one processor 700 is taken as an example in FIG. 7; and the memory (memory) 701 may further include a communication interface (Communication) Interface 702 and a bus 703.
- the processor 700, the communication interface 702, and the memory 701 can complete communication with each other through the bus 703.
- the communication interface 702 can be used for information transmission.
- the processor 700 may call logical instructions in the memory 701 to perform the hardware upgrade method of the above embodiment.
- logic instructions in the above-mentioned memory 701 can be implemented in the form of software functional units and sold or used as an independent product, and can be stored in a computer-readable storage medium.
- the memory 701 is a computer-readable storage medium and can be used to store software programs and computer-executable programs, such as program instructions/modules corresponding to the methods in the embodiments of the present disclosure.
- the processor 700 executes functional applications and data processing by running software programs, instructions, and modules stored in the memory 701, that is, implementing the hardware upgrade method in the foregoing method embodiments.
- the memory 701 may include a storage program area and a storage data area, wherein the storage program area may store an operating system and application programs required for at least one function; the storage data area may store data created according to the use of a terminal device, and the like.
- the memory 701 may include a high-speed random access memory, and may also include a non-volatile memory.
- the technical solutions of the embodiments of the present disclosure may be embodied in the form of software products, which are stored in a storage medium and include one or more instructions to make a computer device (which may be a personal computer, server, or network) Equipment, etc.) to perform all or part of the steps of the method described in the embodiments of the present disclosure.
- the aforementioned storage medium may be a non-transitory storage medium, including: U disk, mobile hard disk, read-only memory (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), magnetic disk or optical disk, etc.
- a medium that can store program codes may also be a transient storage medium.
- first, second, etc. may be used in this application to describe various elements, these elements should not be limited by these terms. These terms are only used to distinguish one element from another.
- the first element can be called the second element, and likewise, the second element can be called the first element, as long as all occurrences of the "first element” are consistently renamed and all occurrences of The “second component” can be renamed consistently.
- the first element and the second element are both elements, but they may not be the same element.
- the various aspects, implementations, implementations or features in the described embodiments can be used alone or in any combination.
- Various aspects in the described embodiments may be implemented by software, hardware, or a combination of software and hardware.
- the described embodiments may also be embodied by a computer-readable medium that stores computer-readable code including instructions executable by at least one computing device.
- the computer-readable medium can be associated with any data storage device capable of storing data, which can be read by a computer system.
- Computer-readable media used for examples may include read-only memory, random access memory, CD-ROM, HDD, DVD, magnetic tape, optical data storage devices, and the like.
- the computer-readable medium may also be distributed in computer systems connected through a network, so that computer-readable codes can be stored and executed in a distributed manner.
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Stored Programmes (AREA)
Abstract
本公开实施例涉及一种硬件升级方法、装置、设备和存储介质,该方法包括:获取升级脚本和镜像文件;所述升级脚本为根据预设的升级需求信息生成的;所述镜像文件包括所述硬件的至少一个程序的镜像文件;根据所述升级脚本和所述镜像文件,对所述硬件的程序进行升级。本公开实施例通过升级脚本即可完成升级任务,升级脚本可根据升级需求进行修改,灵活性较大,维护成本较低。
Description
本申请涉及硬件升级技术领域,例如涉及一种硬件升级方法、装置、设备和存储介质。
程序升级是硬件产品极其重要且必须要实现的功能,在产品出货后,升级功能要确保是完善的。为了进行程序升级,硬件产品通常会留一些常用的有线/无线接口来接收升级的数据包,如串口,通用串行总线(Universal Serial Bus,简称USB),(Trans-flash Card,简称TF卡),无线保真(Wireless Fidelity,简称WIFI),蓝牙等。为了节省成本,大多数硬件产品只会留一两种接口,例如串口以及TF卡接口,在这种形态下,如果想要升级只能通过串口和TF卡给固化的存储器中的程序进行升级。串口由于传输速率限制,一般只适合传输较小的数据包,但是对于较大的数据包,只能通过速度更快的TF卡接口作为升级接口。
在现有的升级方案中,由于硬件产品中有多个程序分区,或多个程序需要烧写到固化的嵌入式多媒体控制器(Embedded Multi Media Card,简称EMMC)中,一般会采用将多个程序的镜像文件打包成一个镜像文件,并在硬件产品固化的加载器LOADER程序中实现对应的解包烧写功能。上述方案,如果修改打包程序,或对固化存储的空间进行调整时,需要重新烧写新的LOADER程序到硬件产品中,维护成本较高,缺少灵活性。
发明内容
本公开实施例提供了一种硬件升级方法、装置、设备和存储介质,以提高硬件升级的灵活性,维护成本较低。
本公开实施例提供了一种硬件升级方法,包括:
获取升级脚本和镜像文件;所述升级脚本为根据预设的升级需求信息生成的;所述镜像文件包括所述硬件的至少一个程序的镜像文件;
根据所述升级脚本和所述镜像文件,对所述硬件的程序进行升级。
在本公开实施例的一实施方式中,所述升级需求信息,至少包括以下信息:所述镜像文件的名称、所述镜像文件对应的存储偏移、升级执行的操作信息。
在本公开实施例的另一实施方式中,所述获取升级脚本和镜像文件,包括:
通过TF卡接口获取所述升级脚本和所述镜像文件。
在本公开实施例的另一实施方式中,所述通过TF卡接口获取所述升级脚本和所述镜像文件之前,还包括:
检测是否存在接入所述硬件的TF卡;
若是,则通过所述TF卡的TF卡接口获取所述升级脚本和所述镜像文件。
上述实施方式中,通过TF卡的TF卡接口获取升级脚本和镜像文件,传输速率较快,效率较高,并对升级脚本进行解析,并执行解析后的升级脚本,将镜像文件烧写到硬件的本地存储空间中,实现对硬件的程序进行升级。
在本公开实施例的另一实施方式中,所述根据所述升级脚本和所述镜像文件,对所述硬件的程序进行升级,包括:
对所述升级脚本进行解析,并执行解析后的升级脚本。
在本公开实施例的另一实施方式中,所述执行解析后的升级脚本,包括:
对所述镜像文件进行解压缩,获取解压缩后的文件;所述解压缩后的文件包括至少一个所述程序的镜像文件;
对各个所述程序的镜像文件进行校验;
若校验成功,则将所述程序的镜像文件烧写到所述硬件的存储空间中。
上述实施方式中,在升级时,对升级脚本进行解析并执行,即对各个程序的镜像文件进行校验;若校验成功,则将程序的镜像文件烧写到硬件的存储空间中,提高了安全性,而且升级脚本可根据升级需求进行修改,灵活性较大,维护成本较低。
在本公开实施例的另一实施方式中,所述对所述程序的镜像文件进行校验,包括:
获取预先生成的所述程序的镜像文件的循环冗余校验CRC32值;
根据所述程序的镜像文件的CRC32值,利用循环冗余校验算法对所述程 序的镜像文件进行校验。
在本公开实施例的另一实施方式中,所述获取预先生成的所述程序的镜像文件的循环冗余校验CRC32值,包括:
从所述升级脚本中获取所述程序的镜像文件的CRC32值。
在本公开实施例的另一实施方式中,所述解压缩后的文件包括:配置文件,所述配置文件包括预先生成的所述程序的镜像文件的CRC32值,则所述获取预先生成的所述程序的镜像文件的循环冗余校验CRC32值,包括:
从所述配置文件中获取所述程序的镜像文件的CRC32值。
本公开实施例还提供了一种硬件升级装置,包括:
获取模块,配置为:获取升级脚本和镜像文件;所述升级脚本为根据预设的升级需求信息生成的;所述镜像文件包括所述硬件的至少一个程序的镜像文件;
处理模块,配置为:根据所述升级脚本和所述镜像文件,对所述硬件的程序进行升级。
在本公开实施例的一实施方式中,所述升级需求信息,至少包括以下信息:所述镜像文件的名称、所述镜像文件对应的存储偏移、升级执行的操作信息。
在本公开实施例的另一实施方式中,所述获取模块,配置为:
通过TF卡接口获取所述升级脚本和所述镜像文件。
在本公开实施例的另一实施方式中,所述获取模块,配置为:
检测是否存在接入所述硬件的TF卡;
若是,则通过所述TF卡的TF卡接口获取所述升级脚本和所述镜像文件。
在本公开实施例的另一实施方式中,所述处理模块,配置为:
对所述升级脚本进行解析,并执行解析后的升级脚本。
在本公开实施例的另一实施方式中,所述处理模块,配置为:
对所述镜像文件进行解压缩,获取解压缩后的文件;所述解压缩后的文件包括至少一个所述程序的镜像文件;
对各个所述程序的镜像文件进行校验;
若校验成功,则将所述程序的镜像文件烧写到所述硬件的存储空间中。
在本公开实施例的另一实施方式中,所述获取模块,配置为:
获取预先生成的所述程序的镜像文件的循环冗余校验CRC32值;
所述处理模块,配置为:
根据所述获取模块获取到的所述程序的镜像文件的CRC32值,利用循环冗余校验算法对所述程序的镜像文件进行校验。
在本公开实施例的另一实施方式中,所述获取模块,配置为:
从所述升级脚本中获取所述程序的镜像文件的CRC32值。
在本公开实施例的另一实施方式中,所述解压缩后的文件包括:配置文件,所述配置文件包括预先生成的所述程序的镜像文件的CRC32值,则所述获取模块,配置为:
从所述配置文件中获取所述程序的镜像文件的CRC32值。
本公开实施例还提供了一种计算机(或手机等设备),包含上述的硬件升级装置。
本公开实施例还提供了一种计算机可读存储介质,存储有计算机可执行指令,所述计算机可执行指令设置为执行上述的硬件升级方法。
本公开实施例还提供了一种计算机程序产品,所述计算机程序产品包括存储在计算机可读存储介质上的计算机程序,所述计算机程序包括程序指令,当所述程序指令被计算机执行时,使所述计算机执行上述的硬件升级方法。
本公开实施例还提供了一种电子设备,包括:
至少一个处理器;以及
与所述至少一个处理器通信连接的存储器;其中,
所述存储器存储有可被所述至少一个处理器执行的指令,所述指令被所述至少一个处理器执行时,使所述至少一个处理器执行上述的硬件升级方法。
本公开实施例提供的硬件升级方法、装置、设备和存储介质,获取升级脚本和镜像文件;所述升级脚本为根据预设的升级需求信息生成的;所述镜像文件包括所述硬件的至少一个程序的镜像文件;根据所述升级脚本和所述镜像文件,对所述硬件的程序进行升级,通过将升级需求信息生成升级脚本,根据升级脚本即可完成升级任务,升级脚本可根据升级需求进行修改,灵活性较大,维护成本较低。
一个或多个实施例通过与之对应的附图进行示例性说明,这些示例性说明和附图并不构成对实施例的限定,附图中具有相同参考数字标号的元件示为类似的元件,附图不构成比例限制,并且其中:
图1为本公开一实施例提供的应用场景图;
图2为本公开一实施例提供的硬件升级方法的流程示意图;
图3为本公开另一实施例提供的硬件升级方法的流程示意图;
图4为本公开又一实施例提供的硬件升级方法的流程示意图;
图5为本公开又一实施例提供的硬件升级方法的流程示意图;
图6为本公开一实施例提供的硬件升级装置的结构示意图;
图7为本公开实施例提供的电子设备的结构示意图。
为了能够更加详尽地了解本公开实施例的特点与技术内容,下面结合附图对本公开实施例的实现进行详细阐述,所附附图仅供参考说明之用,并非用来限定本公开实施例。在以下的技术描述中,为方便解释起见,通过多个细节以提供对所披露实施例的充分理解。然而,在没有这些细节的情况下,一个或多个实施例仍然可以实施。在其它情况下,为简化附图,熟知的结构和装置可以简化展示。
首先对本公开所涉及的应用场景进行介绍:
本公开实施例提供的硬件升级方法,应用于对硬件产品的程序进行升级,例如该硬件产品具有TF卡接口。
其中,硬件产品例如包括:手机、平板电脑、机器人、可穿戴设备等电子产品。
图1为本公开一实施例提供的应用场景图,本公开提供的方法可由电子设备12如处理器执行相应的软件代码实现,也可由该电子设备12在执行相应的软件代码的同时,通过和TF卡11进行数据交互来实现。电子设备12和TF卡11之间可以通过TF卡接口连接。
其中,电子设备包括上述的硬件产品。
本公开实施例的方法,通过将升级需求信息生成升级脚本,根据升级脚本即可完成升级任务,升级脚本可根据升级需求进行修改,灵活性较大,维 护成本较低。
下面以具体的实施例对本公开的技术方案进行详细说明。下面这几个具体的实施例可以相互结合,对于相同或相似的概念或过程可能在某些实施例不再赘述。
图2为本公开一实施例提供的硬件升级方法的流程示意图。如图2所示,本实施例提供的方法,包括:
步骤201、获取升级脚本和镜像文件;升级脚本为根据预设的升级需求信息生成的;镜像文件包括所述硬件的至少一个程序的镜像文件。
在本实施例中,在对硬件产品的程序进行升级时,先根据升级需求信息编写升级脚本,升级脚本中包括待执行的操作等信息,若待升级的程序为多个,则可以对多个程序的升级文件进行打包生成镜像文件,还可以对镜像文件进行压缩。
其中,升级需求信息,至少包括以下信息:镜像文件的名称、镜像文件对应的存储偏移、升级执行的操作信息。
若镜像文件包括多个程序的镜像文件,则在升级时,即对镜像文件烧写时,根据存储偏移将多个镜像文件烧写在硬件本地的不同存储空间中。例如镜像文件1对应的存储偏移为0,镜像文件2对应的存储偏移为100MB,则按照上述存储偏移对镜像文件1和镜像文件2进行烧写。
升级执行的操作信息,例如包括:升级执行哪些步骤,每个步骤的具体内容,例如包括解压缩、循环冗余校验、烧写等操作。
在本公开的一种实施方式中,步骤201可以采用如下方式实现:
通过TF卡接口获取升级脚本和镜像文件。
若硬件产品中包括串口和TF卡接口,由于TF卡接口的传输速度较串口的传输速度大,则可以通过TF卡接口获取升级脚本和镜像文件。
在本公开的其他实施方式中,还可以通过USB接口、WIFI、蓝牙等方式获取升级脚本和镜像文件,本实施例中对此并不限定。
步骤202、根据升级脚本和镜像文件,对硬件的程序进行升级。
根据获取到的升级脚本和镜像文件,对硬件的程序进行升级,即通过脚本化执行方式,解析升级脚本便可完成升级任务。
本实施例的硬件升级方法,获取升级脚本和镜像文件;所述升级脚本为 根据预设的升级需求信息生成的;所述镜像文件包括所述硬件的至少一个程序的镜像文件;根据所述升级脚本和所述镜像文件,对所述硬件的程序进行升级,通过将升级需求信息生成升级脚本,根据升级脚本即可完成升级任务,升级脚本可根据升级需求进行修改,灵活性较大,维护成本较低。
图3为本公开另一实施例提供的硬件升级方法的流程示意图。在上述实施例的基础上,如图3所示,本实施例提供的方法,包括:
步骤301、检测是否存在接入硬件的TF卡;
若是,则通过TF卡的TF卡接口获取升级脚本和镜像文件。
步骤302、对升级脚本进行解析,并执行解析后的升级脚本。
本实施例中,硬件产品可以在上电后检测是否存在接入的TF卡,或者可以实时或周期性的检测是否存在接入的TF卡,或者可以在接收到指示后检测是否存在接入的TF卡。其中,上述指示可以是用户通过该硬件产品发出的,或者是其他设备向该硬件产品发出的。
若检测到存在接入硬件的TF卡,则通过该TF卡的TF卡接口获取升级脚本和镜像文件。
对获取到的升级脚本进行解析,通过执行解析后的升级脚本,将镜像文件烧写到硬件的本地存储空间中,实现对硬件的程序进行升级。
升级脚本示例,包括如下步骤:
1、定义升级用的镜像名,在TF卡中会存放这些镜像文件,如镜像文件prg1、镜像文件prg2、镜像文件prg3、镜像文件prgn等。
2、定义烧写设备本地存储时的偏移,即将镜像文件烧写到设备的本地存储时的偏移,如存储偏移0、100、200、300、n00等。
3、TF卡初始化。
4、对每个镜像文件进行循环冗余校验。
5、若校验成功,则将镜像文件烧录到本地存储。
其中,为了方便和减少难度,升级脚本可以利用bash shell开发环境编写。
本实施例的方法,通过TF卡的TF卡接口获取升级脚本和镜像文件,传输速率较快,效率较高,并对升级脚本进行解析,并执行解析后的升级脚本,将镜像文件烧写到硬件的本地存储空间中,实现对硬件的程序进行升级。
在上述实施例的基础上,结合图4,对步骤302的实现方式进行详细说明。
如图4所示,步骤302包括:
步骤3021、对镜像文件进行解压缩,获取解压缩后的文件;解压缩后的文件包括至少一个程序的镜像文件;
步骤3022、对各个程序的镜像文件进行校验;
步骤3023、若校验成功,则将程序的镜像文件烧写到硬件的存储空间中。
本实施例中,在获取到镜像文件和升级脚本后,解析升级脚本,根据升级脚本的内容,执行以下操作:对镜像文件进行解压缩,得到至少一个程序的镜像文件;对至少一个程序的镜像文件分别进行校验,例如进行循环冗余校验、MD5校验等。若上述至少一个镜像文件都校验成功,则将至少一个程序的镜像文件烧写到硬件的存储空间中,可以根据各个程序的镜像文件对应的存储偏移,将各个序的镜像文件烧写到硬件的存储空间中。
在本公开的其他实施例中,若镜像文件没有压缩,则可以直接进行校验。
上述实施方式中,通过将升级需求信息生成升级脚本,在升级时,对升级脚本进行解析并执行,即对各个程序的镜像文件进行校验;若校验成功,则将程序的镜像文件烧写到硬件的存储空间中,提高了安全性,而且升级脚本可根据升级需求进行修改,灵活性较大,维护成本较低。
在上述实施例的基础上,结合图5,对本发明实施例的方案进行详细说明:
如图5所示,本实施例的方法,包括:
步骤401、编辑升级脚本;
可以根据升级需求信息编辑升级脚本。
步骤402、打包升级用的镜像文件;可以包括:
步骤4021、生成镜像文件的文件头,生成镜像文件的CRC32值,生成镜像文件的名称,进行压缩;
其中,若采用循环冗余校验,如CRC32校验,则生成镜像文件的CRC32值,并执行生成镜像文件的文件头,对生成的镜像文件进行压缩等操作。
步骤403、将升级脚本和镜像文件拷贝到TF卡中;
步骤404、连接TF卡到设备上;
步骤405、对设备进行复位或者上下电;
步骤406、设备检测是否有TF卡接入;
若没有检测到TF卡接入,则设备执行步骤407、正常启动系统;
若检测到有TF卡接入,则执行步骤408、从TF卡中读取升级脚本和镜像文件;
步骤409、解析升级脚本并执行;可以包括:
步骤4091、对TF卡中的镜像文件进行CRC32校验,解压缩,烧写本地存储;
执行解析后的升级脚本时可以执行如下操作:对TF卡中的镜像文件进行CRC32校验、解压缩、烧写本地存储等。升级完成。在升级完成后例如可以发出完成指示信息,以向用户指示升级完成。例如在设备的操作界面上显示指示信息,或发出语音指示信息等。
本实施例中,通过将升级需求信息生成升级脚本,打包升级用的镜像文件,将升级脚本和镜像文件存储在TF卡中,通过TF卡的TF卡接口获取升级脚本和镜像文件,在升级时,对升级脚本进行解析并执行,即对各个程序的镜像文件进行校验;若校验成功,则将程序的镜像文件烧写到硬件的存储空间中,升级脚本可根据升级需求进行修改,灵活性较大,维护成本较低。
在上述实施例的基础上,对步骤3022的实现方式进行详细说明。
本实施例中,对程序的镜像文件进行校验,可以采用如下方式实现:
获取预先生成的程序的镜像文件的循环冗余校验CRC32值;
根据程序的镜像文件的CRC32值,利用循环冗余校验算法对程序的镜像文件进行校验。
对镜像文件进行校验时,获取预先生成的该镜像文件的CRC32值,并在设备获取到镜像文件后根据循环冗余校验算法计算当前获取的镜像文件的CRC32值;将两个CRC32值进行比较,若一致,则校验成功;若不一致,则校验失败。
其中,获取预先生成的程序的镜像文件的CRC32值可以采用如下一种方式:
一种方式为:
从升级脚本中获取程序的镜像文件的CRC32值。
另一种方式为:
解压缩后的文件包括:配置文件,配置文件中包括预先生成的程序的镜像文件的CRC32值,则从配置文件中获取程序的镜像文件的CRC32值。
本实施例中,镜像文件的CRC32值可以在编辑升级脚本时,写在升级脚本中。或者,可以将预先生成的程序的镜像文件的CRC32值写在一个配置文件中,与镜像文件压缩在一起,在对镜像文件校验时,从该配置文件中获取该镜像文件的CRC32值。
图6为本公开一实施例提供的硬件升级装置的结构示意图。如图6所示,本实施例提供的硬件升级装置,包括:
获取模块601,配置为:获取升级脚本和镜像文件;所述升级脚本为根据预设的升级需求信息生成的;所述镜像文件包括所述硬件的至少一个程序的镜像文件;
处理模块602,配置为:根据所述升级脚本和所述镜像文件,对所述硬件的程序进行升级。
其中,所述升级需求信息,至少包括以下信息:所述镜像文件的名称、所述镜像文件对应的存储偏移、升级执行的操作信息。
在本公开的一实施例中,所述获取模块601,配置为:
通过TF卡接口获取所述升级脚本和所述镜像文件。
在本公开的一实施例中,所述获取模块601,配置为:
检测是否存在接入所述硬件的TF卡;
若是,则通过所述TF卡的TF卡接口获取所述升级脚本和所述镜像文件。
在本公开的一实施例中,所述处理模块602,配置为:
对所述升级脚本进行解析,并执行解析后的升级脚本。
在本公开的一实施例中,所述处理模块602,配置为:
对所述镜像文件进行解压缩,获取解压缩后的文件;所述解压缩后的文件包括至少一个所述程序的镜像文件;
对各个所述程序的镜像文件进行校验;
若校验成功,则将所述程序的镜像文件烧写到所述硬件的存储空间中。
在本公开的一实施例中,所述获取模块601,配置为:
获取预先生成的所述程序的镜像文件的循环冗余校验CRC32值;
所述处理模块602,配置为:
根据所述获取模块获取到的所述程序的镜像文件的CRC32值,利用循环冗余校验算法对所述程序的镜像文件进行校验。
在本公开的一实施例中,所述获取模块601,配置为:
从所述升级脚本中获取所述程序的镜像文件的CRC32值。
在本公开的一实施例中,所述解压缩后的文件包括:配置文件,所述配置文件包括预先生成的所述程序的镜像文件的CRC32值,则所述获取模块601,配置为:
从所述配置文件中获取所述程序的镜像文件的CRC32值。
本实施例的装置,可以用于执行上述方法实施例的技术方案,其实现原理和技术效果类似,此处不再赘述。
本公开实施例还提供了一种计算机(或手机等设备),包含上述的硬件升级装置。
本公开实施例还提供了一种计算机可读存储介质,存储有计算机可执行指令,所述计算机可执行指令设置为执行上述硬件升级方法。
本公开实施例还提供了一种计算机程序产品,所述计算机程序产品包括存储在计算机可读存储介质上的计算机程序,所述计算机程序包括程序指令,当所述程序指令被计算机执行时,使所述计算机执行上述硬件升级方法。
上述的计算机可读存储介质可以是暂态计算机可读存储介质,也可以是非暂态计算机可读存储介质。
本公开实施例还提供了一种电子设备,其结构如图7所示,该电子设备包括:
至少一个处理器(processor)700,图7中以一个处理器700为例;和存储器(memory)701,还可以包括通信接口(Communication Interface)702和总线703。其中,处理器700、通信接口702、存储器701可以通过总线703完成相互间的通信。通信接口702可以用于信息传输。处理器700可以调用存储器701中的逻辑指令,以执行上述实施例的硬件升级方法。
此外,上述的存储器701中的逻辑指令可以通过软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。
存储器701作为一种计算机可读存储介质,可用于存储软件程序、计算机可执行程序,如本公开实施例中的方法对应的程序指令/模块。处理器700通过运行存储在存储器701中的软件程序、指令以及模块,从而执行功能应用以及数据处理,即实现上述方法实施例中的硬件升级方法。
存储器701可包括存储程序区和存储数据区,其中,存储程序区可存储操作系统、至少一个功能所需的应用程序;存储数据区可存储根据终端设备的使用所创建的数据等。此外,存储器701可以包括高速随机存取存储器,还可以包括非易失性存储器。
本公开实施例的技术方案可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括一个或多个指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)执行本公开实施例所述方法的全部或部分步骤。而前述的存储介质可以是非暂态存储介质,包括:U盘、移动硬盘、只读存储器(ROM,Read-Only Memory)、随机存取存储器(RAM,Random Access Memory)、磁碟或者光盘等多种可以存储程序代码的介质,也可以是暂态存储介质。
当用于本申请中时,虽然术语“第一”、“第二”等可能会在本申请中使用以描述各元件,但这些元件不应受到这些术语的限制。这些术语仅用于将一个元件与另一个元件区别开。比如,在不改变描述的含义的情况下,第一元件可以叫做第二元件,并且同样第,第二元件可以叫做第一元件,只要所有出现的“第一元件”一致重命名并且所有出现的“第二元件”一致重命名即可。第一元件和第二元件都是元件,但可以不是相同的元件。
本申请中使用的用词仅用于描述实施例并且不用于限制权利要求。如在实施例以及权利要求的描述中使用的,除非上下文清楚地表明,否则单数形式的“一个”(a)、“一个”(an)和“所述”(the)旨在同样包括复数形式。类似地,如在本申请中所使用的术语“和/或”是指包含一个或一个以上相关联的列出的任何以及所有可能的组合。另外,当用于本申请中时,术语“包括”(comprise)及其变型“包括”(comprises)和/或包括(comprising)等指 陈述的特征、整体、步骤、操作、元素,和/或组件的存在,但不排除一个或一个以上其它特征、整体、步骤、操作、元素、组件和/或这些的分组的存在或添加。
所描述的实施例中的各方面、实施方式、实现或特征能够单独使用或以任意组合的方式使用。所描述的实施例中的各方面可由软件、硬件或软硬件的结合实现。所描述的实施例也可以由存储有计算机可读代码的计算机可读介质体现,该计算机可读代码包括可由至少一个计算装置执行的指令。所述计算机可读介质可与任何能够存储数据的数据存储装置相关联,该数据可由计算机系统读取。用于举例的计算机可读介质可以包括只读存储器、随机存取存储器、CD-ROM、HDD、DVD、磁带以及光数据存储装置等。所述计算机可读介质还可以分布于通过网络联接的计算机系统中,这样计算机可读代码就可以分布式存储并执行。
上述技术描述可参照附图,这些附图形成了本申请的一部分,并且通过描述在附图中示出了依照所描述的实施例的实施方式。虽然这些实施例描述的足够详细以使本领域技术人员能够实现这些实施例,但这些实施例是非限制性的;这样就可以使用其它的实施例,并且在不脱离所描述的实施例的范围的情况下还可以做出变化。比如,流程图中所描述的操作顺序是非限制性的,因此在流程图中阐释并且根据流程图描述的两个或两个以上操作的顺序可以根据若干实施例进行改变。作为另一个例子,在若干实施例中,在流程图中阐释并且根据流程图描述的一个或一个以上操作是可选的,或是可删除的。另外,某些步骤或功能可以添加到所公开的实施例中,或两个以上的步骤顺序被置换。所有这些变化被认为包含在所公开的实施例以及权利要求中。
另外,上述技术描述中使用术语以提供所描述的实施例的透彻理解。然而,并不需要过于详细的细节以实现所描述的实施例。因此,实施例的上述描述是为了阐释和描述而呈现的。上述描述中所呈现的实施例以及根据这些实施例所公开的例子是单独提供的,以添加上下文并有助于理解所描述的实施例。上述说明书不用于做到无遗漏或将所描述的实施例限制到本公开的精确形式。根据上述教导,若干修改、选择适用以及变化是可行的。在某些情况下,没有详细描述为人所熟知的处理步骤以避免不必要地影响所描述的实施例。
Claims (22)
- 一种硬件升级方法,其特征在于,包括:获取升级脚本和镜像文件;所述升级脚本为根据预设的升级需求信息生成的;所述镜像文件包括所述硬件的至少一个程序的镜像文件;根据所述升级脚本和所述镜像文件,对所述硬件的程序进行升级。
- 根据权利要求1所述的方法,其特征在于,所述升级需求信息,至少包括以下信息:所述镜像文件的名称、所述镜像文件对应的存储偏移、升级执行的操作信息。
- 根据权利要求1或2所述的方法,其特征在于,所述获取升级脚本和镜像文件,包括:通过TF卡接口获取所述升级脚本和所述镜像文件。
- 根据权利要求3所述的方法,其特征在于,所述通过TF卡接口获取所述升级脚本和所述镜像文件之前,还包括:检测是否存在接入所述硬件的TF卡;若是,则通过所述TF卡的TF卡接口获取所述升级脚本和所述镜像文件。
- 根据权利要求1或2所述的方法,其特征在于,所述根据所述升级脚本和所述镜像文件,对所述硬件的程序进行升级,包括:对所述升级脚本进行解析,并执行解析后的升级脚本。
- 根据权利要求5所述的方法,其特征在于,所述执行解析后的升级脚本,包括:对所述镜像文件进行解压缩,获取解压缩后的文件;所述解压缩后的文件包括至少一个所述程序的镜像文件;对各个所述程序的镜像文件进行校验;若校验成功,则将所述程序的镜像文件烧写到所述硬件的存储空间中。
- 根据权利要求6所述的方法,其特征在于,所述对所述程序的镜像文件进行校验,包括:获取预先生成的所述程序的镜像文件的循环冗余校验CRC32值;根据所述程序的镜像文件的CRC32值,利用循环冗余校验算法对所述程序的镜像文件进行校验。
- 根据权利要求7所述的方法,其特征在于,所述获取预先生成的所述 程序的镜像文件的循环冗余校验CRC32值,包括:从所述升级脚本中获取所述程序的镜像文件的CRC32值。
- 根据权利要求7所述的方法,其特征在于,所述解压缩后的文件包括:配置文件,所述配置文件包括预先生成的所述程序的镜像文件的CRC32值,则所述获取预先生成的所述程序的镜像文件的循环冗余校验CRC32值,包括:从所述配置文件中获取所述程序的镜像文件的CRC32值。
- 一种硬件升级装置,其特征在于,包括:获取模块,配置为:获取升级脚本和镜像文件;所述升级脚本为根据预设的升级需求信息生成的;所述镜像文件包括所述硬件的至少一个程序的镜像文件;处理模块,配置为:根据所述升级脚本和所述镜像文件,对所述硬件的程序进行升级。
- 根据权利要求10所述的装置,其特征在于,所述升级需求信息,至少包括以下信息:所述镜像文件的名称、所述镜像文件对应的存储偏移、升级执行的操作信息。
- 根据权利要求10或11所述的装置,其特征在于,所述获取模块,配置为:通过TF卡接口获取所述升级脚本和所述镜像文件。
- 根据权利要求12所述的装置,其特征在于,所述获取模块,配置为:检测是否存在接入所述硬件的TF卡;若是,则通过所述TF卡的TF卡接口获取所述升级脚本和所述镜像文件。
- 根据权利要求10或11所述的装置,其特征在于,所述处理模块,配置为:对所述升级脚本进行解析,并执行解析后的升级脚本。
- 根据权利要求14所述的装置,其特征在于,所述处理模块,配置为:对所述镜像文件进行解压缩,获取解压缩后的文件;所述解压缩后的文件包括至少一个所述程序的镜像文件;对各个所述程序的镜像文件进行校验;若校验成功,则将所述程序的镜像文件烧写到所述硬件的存储空间中。
- 根据权利要求15所述的装置,其特征在于,所述获取模块,配置为:获取预先生成的所述程序的镜像文件的循环冗余校验CRC32值;所述处理模块,配置为:根据所述获取模块获取到的所述程序的镜像文件的CRC32值,利用循环冗余校验算法对所述程序的镜像文件进行校验。
- 根据权利要求16所述的装置,其特征在于,所述获取模块,配置为:从所述升级脚本中获取所述程序的镜像文件的CRC32值。
- 根据权利要求16所述的装置,其特征在于,所述解压缩后的文件包括:配置文件,所述配置文件包括预先生成的所述程序的镜像文件的CRC32值,则所述获取模块,配置为:从所述配置文件中获取所述程序的镜像文件的CRC32值。
- 一种计算机(或手机等设备),其特征在于,包含权利要求10-18任一项所述的装置。
- 一种电子设备,其特征在于,包括:至少一个处理器;以及与所述至少一个处理器通信连接的存储器;其中,所述存储器存储有可被所述至少一个处理器执行的指令,所述指令被所述至少一个处理器执行时,使所述至少一个处理器执行权利要求1-9任一项所述的方法。
- 一种计算机可读存储介质,其特征在于,存储有计算机可执行指令,所述计算机可执行指令设置为执行权利要求1-9任一项所述的方法。
- 一种计算机程序产品,其特征在于,所述计算机程序产品包括存储在计算机可读存储介质上的计算机程序,所述计算机程序包括程序指令,当所述程序指令被计算机执行时,使所述计算机执行权利要求1-9任一项所述的方法。
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201880098355.5A CN112912841A (zh) | 2018-12-03 | 2018-12-03 | 硬件升级方法、装置、设备和存储介质 |
PCT/CN2018/118951 WO2020113382A1 (zh) | 2018-12-03 | 2018-12-03 | 硬件升级方法、装置、设备和存储介质 |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2018/118951 WO2020113382A1 (zh) | 2018-12-03 | 2018-12-03 | 硬件升级方法、装置、设备和存储介质 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2020113382A1 true WO2020113382A1 (zh) | 2020-06-11 |
Family
ID=70974111
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2018/118951 WO2020113382A1 (zh) | 2018-12-03 | 2018-12-03 | 硬件升级方法、装置、设备和存储介质 |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN112912841A (zh) |
WO (1) | WO2020113382A1 (zh) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114610329B (zh) * | 2022-05-10 | 2022-09-06 | 深圳佰维存储科技股份有限公司 | 固态硬盘部署方法、装置、可读存储介质及电子设备 |
CN115495159A (zh) * | 2022-11-14 | 2022-12-20 | 南京芯驰半导体科技有限公司 | 芯片多硬件域启动方法及装置 |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040073902A1 (en) * | 2002-10-11 | 2004-04-15 | Ambit Microsystems Corporation | Firmware upgrade method for network device through digital subscriber line |
CN103838585A (zh) * | 2012-11-20 | 2014-06-04 | 广州市暨华医疗器械有限公司 | 基于sd卡实现arm9嵌入式系统自动烧录的方法 |
CN108170455A (zh) * | 2018-03-12 | 2018-06-15 | 晶晨半导体(上海)股份有限公司 | 升级包的打包方法以及升级方法 |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103677915B (zh) * | 2013-12-11 | 2018-08-07 | 厦门雅迅网络股份有限公司 | 一种基于TF启动卡进行flash镜像自动烧写的方法 |
-
2018
- 2018-12-03 CN CN201880098355.5A patent/CN112912841A/zh active Pending
- 2018-12-03 WO PCT/CN2018/118951 patent/WO2020113382A1/zh active Application Filing
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040073902A1 (en) * | 2002-10-11 | 2004-04-15 | Ambit Microsystems Corporation | Firmware upgrade method for network device through digital subscriber line |
CN103838585A (zh) * | 2012-11-20 | 2014-06-04 | 广州市暨华医疗器械有限公司 | 基于sd卡实现arm9嵌入式系统自动烧录的方法 |
CN108170455A (zh) * | 2018-03-12 | 2018-06-15 | 晶晨半导体(上海)股份有限公司 | 升级包的打包方法以及升级方法 |
Also Published As
Publication number | Publication date |
---|---|
CN112912841A (zh) | 2021-06-04 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10423572B2 (en) | Performing live updates to file system volumes | |
CN108650287B (zh) | 物联网中的终端设备的升级方法、设备及计算机可读介质 | |
WO2017067448A1 (zh) | 一种无线固件升级方法、系统及计算机存储介质 | |
US9436557B2 (en) | Method and computation node for processing application data | |
US10235048B2 (en) | Data processing method and smart device | |
US9891862B2 (en) | Forensic data acquisition apparatus and method for guaranteeing integrity of flash memory in smart device | |
US20210240491A1 (en) | System and method for runtime synchronization and authentication of pre-boot device drivers for a rescue operating system | |
WO2016202000A1 (zh) | 差分回退升级方法及装置 | |
CN108509215B (zh) | 一种系统软件的更换方法、装置、终端设备及存储介质 | |
WO2018090528A1 (zh) | 一种镜像包制作、应用运行方法及系统 | |
WO2023040198A1 (zh) | 一种部件独立升级的方法、系统、设备和介质 | |
CN115658160A (zh) | 基于多核异构soc的多操作系统升级方法、装置及系统 | |
WO2020113382A1 (zh) | 硬件升级方法、装置、设备和存储介质 | |
US20130080751A1 (en) | Method and device for updating bios program for computer system | |
CN114237498A (zh) | 一种云原生存储数据卷的快照生成方法与系统 | |
WO2018036166A1 (zh) | 一种读取升级包的方法及装置 | |
CN108153548A (zh) | 一种emmc固件升级方法和装置 | |
CN113741954A (zh) | 系统软件生成方法、装置、电子设备及存储介质 | |
CN113448690A (zh) | 监测方法及装置 | |
WO2023231565A1 (zh) | 一种镜像文件处理方法、装置、存储介质及电子装置 | |
US10394482B2 (en) | Snap tree arbitrary replication | |
CN106933604B (zh) | 一种系统升级方法及装置 | |
US20080082826A1 (en) | Method and apparatus for updating non-volatile memories | |
WO2020113421A1 (zh) | 一种挂载文件系统的方法、终端设备及存储介质 | |
WO2022242665A1 (zh) | 一种数据存储方法及相关装置 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 18942219 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 18942219 Country of ref document: EP Kind code of ref document: A1 |