CN109426515A - The generation method and device of upgrade package - Google Patents

The generation method and device of upgrade package Download PDF

Info

Publication number
CN109426515A
CN109426515A CN201710787814.8A CN201710787814A CN109426515A CN 109426515 A CN109426515 A CN 109426515A CN 201710787814 A CN201710787814 A CN 201710787814A CN 109426515 A CN109426515 A CN 109426515A
Authority
CN
China
Prior art keywords
upgrade package
signature
file
file destination
signature file
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN201710787814.8A
Other languages
Chinese (zh)
Inventor
刘路
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CN201710787814.8A priority Critical patent/CN109426515A/en
Priority to PCT/CN2018/087148 priority patent/WO2019041891A1/en
Publication of CN109426515A publication Critical patent/CN109426515A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/60Software deployment
    • G06F8/65Updates
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/445Program loading or initiating

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Stored Programmes (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The present invention provides a kind of generation method of upgrade package and devices, wherein this method comprises: judging under root with the presence or absence of signature file destination;When there are the signature file destination, the signature file destination is decompressed, deletes IMAGES catalogue therein, and modify file content to be upgraded;System image is regenerated using specified script, and generates upgrade package.Through the invention, it solves the problems, such as that the upgrade package of particular size cannot be generated when making upgrade package based on block in the related technology.

Description

The generation method and device of upgrade package
Technical field
The present invention relates to computer fields, in particular to the generation method and device of a kind of upgrade package.
Background technique
As Android version constantly updates, the software version of mobile terminal is generally also required to update therewith, such energy Meet the use demand of user, improves user experience etc..General Android mobile device has the application software of aerial upgrade, This application software can search the upgrade package that server is stored above, download this upgrade package simultaneously with the interaction of corresponding server And new version is upgraded to by the recovery mode of mobile terminal, to achieve the purpose that update system version.According to us Known, the upgrading scheme of Google is that upgrade package is passed through under Gota (the aerial downloading software upgrading of Google oneself) server (if cache subregion can not enough download in data subregion), the L of present Google are downloaded in the cache subregion of mobile terminal Block device is all based on M platform and carries out production upgrade package, and the upgrade package worked it out is bigger, particularly across the liter of platform Grade, such as Android L are upgraded to M, and the upgrade package worked it out all reaches 1G or so.Even if the upgrading made on same platform Packet is mostly between 20M to 250M, such problem is just come, if needing to make 3M or so also generally all in 20M or more Upgrade package difficulty can be bigger, in practice to solve the problems, such as particular demands that are certain specific, or meeting user, upgrade Packet size is only specific size (such as U.S. operator AT&T needs 3M, 50M, the upgrade package of 500M size).In order to Solving the method that this problem is easier to expect is exactly to compile the version of particular demands always, then does upgrade package again, It makes repeated attempts in this way and does version, then wrap, perhaps may can make the upgrade package for meeting amount of capacity, can waste so very The upgrade package of more times, 50M and 500M size can work it out, but the upgrade package of 3M size cannot almost make, former Because being the version recompilated, system mirror image therein is the file system of an ext4, even if content is identical, It is completely different from the perspective of binary system, for example a file/system/build.prop storage block is utterly Location is different or even a file may be stored in above different physical address, so former and later two versions are set based on block Standby packet difference of doing is typically very big, and here it is be difficult to make the big parcel of 3M.Related production particular size upgrading The scheme for wrapping aspect occurs not yet.
For the above problem present in the relevant technologies, at present it is not yet found that the solution of effect.
Summary of the invention
The embodiment of the invention provides a kind of generation method of upgrade package and devices, at least to solve in the related technology in base The problem of upgrade package of particular size cannot be generated when block makes upgrade package.
According to one embodiment of present invention, provide a kind of generation method of upgrade package, comprising: judge be under root It is no to there is signature file destination;When there are the signature file destination, the signature file destination is decompressed, is deleted therein IMAGES catalogue, and modify file content to be upgraded;System image is regenerated using specified script, and generates upgrade package.
Optionally, the method also includes: when the signature file destination being not present under the root directory, system image turn It is changed to ext4 format, and searches the absolute address of file to be modified by system.map;It is modified using winhex tool File content in system catalogue is converted to sparse format after generating new system image, and generates upgrade package.
Optionally, the file content for modifying upgrading includes at least one of: modification SYSTEM file;Modification Build.prop file;Modify the external version number information of SYSTEM file;Modify the external version number of build.prop file Information.
Optionally, after generating upgrade package, the method also includes: the two of predetermined volumes are added in the upgrade package Binary data obtains specified upgrade package;The specified upgrading packet signature is given using signature script.
Optionally, before decompressing the signature file destination, the method also includes: a signature target of copy File renames the signature file destination of copy version to specified storage equipment;By the signature target of the copy version File is determined as signature file destination to be decompressed.
According to another embodiment of the invention, a kind of generating means of upgrade package are provided, comprising: judgment module is used In judge under root with the presence or absence of signature file destination;First processing module, for when there are the signature file destination, The signature file destination is decompressed, deletes IMAGES catalogue therein, and modify file content to be upgraded;First generates mould Block for using specified script to regenerate system image, and generates upgrade package.
Optionally, described device further include: Second processing module, for there is no the signature target texts under the root directory When part, system image is converted to ext4 format, and the absolute address of file to be modified is searched by system.map;Second is raw It is converted to after generating new system image at module for using the file content in winhex tool modification system catalogue Sparse format, and generate upgrade package.
Optionally, described device further include: adding module, for adding after generating upgrade package in the upgrade package The binary data for entering predetermined volumes obtains specified upgrade package;Signature blocks, for giving the specified upgrading using signature script Packet signature.
According to still another embodiment of the invention, a kind of storage medium is additionally provided.The storage medium is set as storage and uses In the program code for executing following steps:
Judge under root with the presence or absence of signature file destination;
When there are the signature file destination, the signature file destination is decompressed, deletes IMAGES catalogue therein, and Modify file content to be upgraded;
System image is regenerated using specified script, and generates upgrade package.
Through the invention, when there is signature file destination, decompression signature file destination deletes IMAGES mesh therein Record, and file content to be upgraded is modified, system image is regenerated using specified script, and generate upgrade package.Solves phase The problem of upgrade package of particular size cannot be generated when making upgrade package based on block in the technology of pass.
Detailed description of the invention
The drawings described herein are used to provide a further understanding of the present invention, constitutes part of this application, this hair Bright illustrative embodiments and their description are used to explain the present invention, and are not constituted improper limitations of the present invention.In the accompanying drawings:
Fig. 1 is the flow chart of the generation method of upgrade package according to an embodiment of the present invention;
Fig. 2 is the structural block diagram of the generating means of upgrade package according to an embodiment of the present invention;
Fig. 3 is the data flow diagram of the embodiment of the present invention;
Fig. 4 is the flow diagram of present invention method provided in this embodiment.
Specific embodiment
Hereinafter, the present invention will be described in detail with reference to the accompanying drawings and in combination with Examples.It should be noted that not conflicting In the case of, the features in the embodiments and the embodiments of the present application can be combined with each other.
It should be noted that description and claims of this specification and term " first " in above-mentioned attached drawing, " Two " etc. be to be used to distinguish similar objects, without being used to describe a particular order or precedence order.
Embodiment 1
A kind of generation method of upgrade package is provided in the present embodiment, and Fig. 1 is upgrade package according to an embodiment of the present invention Generation method flow chart, as shown in Figure 1, the process includes the following steps:
Step S102 judges under root with the presence or absence of signature file destination;
Step S104, when there is signature file destination, decompression signature file destination deletes IMAGES catalogue therein, And modify file content to be upgraded;
Step S106 regenerates system image using specified script, and generates upgrade package.
Through the above steps, when there is signature file destination, decompression signature file destination deletes IMAGES mesh therein Record, and file content to be upgraded is modified, system image is regenerated using specified script, and generate upgrade package.Solves phase The problem of upgrade package of particular size cannot be generated when making upgrade package based on block in the technology of pass.
Optionally, the executing subject of above-mentioned steps can be terminal, upgrading tool etc., but not limited to this.
Specified script in the present embodiment can be img_from_target_files script.
Optionally, in the present embodiment, as another implement scene, comprising:
System image is converted to ext4 format, and pass through under the root directory there is no when signature file destination by S11 System.map searches the absolute address of file to be modified;
S12 is converted to after generating new system image using the file content in winhex tool modification system catalogue Sparse format, and generate upgrade package.
In the present embodiment, the file content for modifying upgrading includes at least one of: modification SYSTEM file;Modification Build.prop file;Modify the external version number information of SYSTEM file;Modify the external version number of build.prop file Information.
In the present embodiment, after generating upgrade package, do not meet particular size in the upgrade package that previous time generates It is required that when, further includes:
S21, the binary data that predetermined volumes are added in upgrade package obtain specified upgrade package;The binary number added According to can be useless data, when being upgraded using upgrade package, terminal with automatic identification and can be deleted;
S22, using signature script to specified upgrading packet signature.
Optionally, before decompression signs file destination, further includes:
S31 copies a signature file destination to specified storage equipment, and renames the signature target text of copy version Part;
The signature file destination for copying version is determined as signature file destination to be decompressed by S32.
Through the above description of the embodiments, those skilled in the art can be understood that according to above-mentioned implementation The method of example can be realized by means of software and necessary general hardware platform, naturally it is also possible to by hardware, but it is very much In the case of the former be more preferably embodiment.Based on this understanding, technical solution of the present invention is substantially in other words to existing The part that technology contributes can be embodied in the form of software products, which is stored in a storage In medium (such as ROM/RAM, magnetic disk, CD), including some instructions are used so that a terminal device (can be mobile phone, calculate Machine, server or network equipment etc.) execute method described in each embodiment of the present invention.
Embodiment 2
A kind of generating means of upgrade package are additionally provided in the present embodiment, and the device is for realizing above-described embodiment and excellent Embodiment is selected, the descriptions that have already been made will not be repeated.As used below, predetermined function may be implemented in term " module " Software and/or hardware combination.Although device described in following embodiment is preferably realized with software, hardware, Or the realization of the combination of software and hardware is also that may and be contemplated.
Fig. 2 is the structural block diagram of the generating means of upgrade package according to an embodiment of the present invention, as shown in Fig. 2, the device packet It includes:
Judgment module 20, for judging under root with the presence or absence of signature file destination;
First processing module 22, for when there is signature file destination, decompression signature file destination to be deleted therein IMAGES catalogue, and modify file content to be upgraded;
First generation module 24, for using specified script to regenerate system image, and generates upgrade package.
Optionally, device further include: Second processing module, when for signature file destination to be not present under the root directory, System image is converted to ext4 format, and the absolute address of file to be modified is searched by system.map;Second generation module, For using the file content in winhex tool modification system catalogue, sparse lattice are converted to after generating new system image Formula, and generate upgrade package.
Optionally, device further include: adding module, for pre- constant volume to be added in upgrade package after generating upgrade package The binary data of amount obtains specified upgrade package;Signature blocks, for giving specified upgrading packet signature using signature script.
It should be noted that above-mentioned modules can be realized by software or hardware, for the latter, Ke Yitong Following manner realization is crossed, but not limited to this: above-mentioned module is respectively positioned in same processor;Alternatively, above-mentioned modules are with any Combined form is located in different processors.
Embodiment 3
The present embodiment is according to an alternative embodiment of the invention, for supplementing the application and being described in detail:
Specific upgrade packet is made in the present embodiment can be USER version, other versions can also be with Fig. 3 is implementation of the present invention The data flow diagram of example, after compiled version when can generate set boot, recovery and system a catalogue Person is the file (being called signature file destination (signed-target-files.zip file)) of A.zip format, if do not deleted Except this file, and content therein first decompresses this file of A.zip, deletes after decompression therein there is no crossing to modify IMAGES catalogue, if will use the bootimage wherein generated without deleting, recoveryimage and Systemimage mirror image, any modification will not all come into force;Then the file content for going modification to need to change, such as modify External version number information etc. in this file of SYSTEM/build.prop re-compresses file directory after that decompression just now, It centainly needs to add-ry parameter when attention using zip order, not so being flexible coupling in system mirror image can all lose, and make With the img_from_target_files.py of Google, this script regenerates the mirror images such as new systemimage.
This new mirror image is bundled in original version, replaces original systemimage mirror image, then this version Change title, make the upgrade package based on block device between the two because the systemimage mirror image of front and back version from One system catalogue, as document order in the system mirror image of formation with size is, modification wherein few file, And each file size is not above original 4K size, so can be smaller based on the upgrade package that block device mode makes.
Sometimes this file of A.zip can be deleted due to various reasons, cannot be based on this method above, can New mirror image is generated to use original system mirror image and corresponding system.map.System.map is one and deposits The address table of All Files, such as/system/build.prop 851944-851946 are put, refers to and is stored in as unit of 4K The two blocks (not including 851946) of the 851944th and 851945 from the beginning can thus use winhex tool open System.img.ext4 mirror image (needs to be first ext4 from sparse format conversion), finds the corresponding corresponding number of address modification Value, but this method can only replace original value, for example ro.build.display.id=Z831V1.0.0B24 is changed into Ro.build.display.id=Z831V1.0.0B2* not can increase or extend new character, because of newly addition character meeting Lead to problems such as data overflow to lose with end mark, will lead to after device upgrade cannot be switched on.
This implementation use-case provides a kind of Android device from the upgrading scheme for encrypting external T card reading upgrade package.It please join Fig. 4 is examined, Fig. 4 is the flow diagram of present invention method provided in this embodiment, comprising:
Step S101: a complete USER version is compiled according to Android, face can generate A.zip (one under the root directory As be this file of signed-target-files.zip) file, copy portion is renamed as fota-target- files.zip;Wherein, fota (FirmwareOver-The-Air) is the aerial downloading software upgrading of mobile terminal.
Step S102: signed-target- can be all generated under the root directory when user version out every time Files.zip, judges whether there is file signed-target-files.zip, walks S103 step if it does not exist, walks if it exists Step S106;
Step S103: system mirror image is first converted to ext4 format using simg2img, is found by system.map Need to modify the absolute address of file, System.map is the address table of a storage All Files, such as/system/ Build.prop 851944-851946, refer to be stored in as unit of 4K from the beginning the 851944th and 851945 the two Block (not including 851946);
Step S104: using the system mirror image of winhex tool open ext4 format, the system mirror image of modification is wherein File content, original characters length cannot be changed, for example ro.build.display.id=Z831V1.0.0B24 is changed into Ro.build.display.id=Z831V1.0.0B2* not can increase or extend new character, because of newly addition character meeting Lead to problems such as data overflow to lose with end mark, will lead to after device upgrade cannot be switched on;
Step S105: it after generating new system mirror image, reuses img2simg order and is converted to ext4 format This system mirror image is packaged as a new version by sparse format, only system between this version and version before Mirror image is different;
Step S106: since there are A.zip, a and renamed as fota-target-files.zip is just copied;
Step S107: decompressing fota-target-files.zip and deletes the content of IMAGES file and the inside, It is that will use bootimage, recoveryimage and the systemimage mirror image wherein generated without deleting, it is any Modification will not come into force.
Step S108: the file for needing to modify below in modification fota-target-files catalogue, such as SYSTEM/ Build.prop file modifies external version number therein, pays attention to modification front and back file attribute must with before unanimously;
Step S109: the All Files being packaged inside fota-target-files catalogue pay attention to centainly needing in fota- Zip-ry is used under target-files catalogue
Fota-target-files_new.zip./order, r therein refer to that subdirectories at different levels are effective, the meaning of y parameter Refer to retain and original all be flexible coupling;
Step S110: calling following order under the root of android translation and compiling environment,
sudo./build/tools/releasetools/img_from_target_files
Fota-target-files_new.zip fota_img.zip has new life in newly-generated fota_img.zip At system.img and system.map, copy out and replace corresponding mirror image in original version, to generate new mesh Mark version;
Step S111: originally remaking upgrade package using binding foot, and allows Android device to upgrade this version, sees after upgrading See whether achieve the desired results;
Step S112: if necessary to bigger upgrade package, can fill in the binary data of suitable capacity size thereto, Then upgrade packet signature once to this again using signature script, allow Android device to go to upgrade this version, filled in escalation process The data entered can't be written in Android device;
The upgrade package of particular size is first made according to above method, then a common external T card is inserted into movement In terminal, then by MTP copy mode etc., this upgrade package is copied on this T card, upgrade package is renamed as Update.zip, referring initially to the version number of lower equipment before upgrading.The mobile Android device for needing to upgrade can be by being arranged mould System update button detects this upgrade package under block, and system upper layer meeting calling system reboots into recovery mode and risen Grade, can be appreciated that small machine people constantly rotates, progress bar, which can be shown from 0%, is upgraded to 100%, the upgrading after upgrading in external T card Packet can be deleted, and do not influenced user using T card data field, be switched on after upgrading and see whether the version number of lower equipment becomes again Change.
Embodiment 4
The embodiments of the present invention also provide a kind of storage mediums.Optionally, in the present embodiment, above-mentioned storage medium can To be arranged to store the program code for executing following steps:
S1 judges under root with the presence or absence of signature file destination;
S2, when there is signature file destination, decompression signature file destination deletes IMAGES catalogue therein, and modify File content to be upgraded;
S3 regenerates system image using specified script, and generates upgrade package.
Optionally, in the present embodiment, above-mentioned storage medium can include but is not limited to: USB flash disk, read-only memory (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), mobile hard disk, magnetic disk or The various media that can store program code such as CD.
Optionally, in the present embodiment, processor judges root mesh according to program code stored in storage medium execution Record is lower with the presence or absence of signature file destination;
Optionally, in the present embodiment, processor is executed according to program code stored in storage medium has label When name file destination, decompression signature file destination deletes IMAGES catalogue therein, and modify file content to be upgraded;
Optionally, in the present embodiment, processor is executed according to program code stored in storage medium using specified Script regenerates system image, and generates upgrade package.
Optionally, the specific example in the present embodiment can be with reference to described in above-described embodiment and optional embodiment Example, details are not described herein for the present embodiment.
Obviously, those skilled in the art should be understood that each module of the above invention or each step can be with general Computing device realize that they can be concentrated on a single computing device, or be distributed in multiple computing devices and formed Network on, optionally, they can be realized with the program code that computing device can perform, it is thus possible to which they are stored It is performed by computing device in the storage device, and in some cases, it can be to be different from shown in sequence execution herein Out or description the step of, perhaps they are fabricated to each integrated circuit modules or by them multiple modules or Step is fabricated to single integrated circuit module to realize.In this way, the present invention is not limited to any specific hardware and softwares to combine.
The foregoing is only a preferred embodiment of the present invention, is not intended to restrict the invention, for the skill of this field For art personnel, the invention may be variously modified and varied.All within the spirits and principles of the present invention, made any to repair Change, equivalent replacement, improvement etc., should all be included in the protection scope of the present invention.

Claims (10)

1. a kind of generation method of upgrade package characterized by comprising
Judge under root with the presence or absence of signature file destination;
When there are the signature file destination, the signature file destination is decompressed, deletes IMAGES catalogue therein, and modify File content to be upgraded;
System image is regenerated using specified script, and generates upgrade package.
2. the method according to claim 1, wherein the method also includes:
When the signature file destination being not present under the root directory, system image is converted to ext4 format, and pass through System.map searches the absolute address of file to be modified;
Using the file content in winhex tool modification system catalogue, sparse lattice are converted to after generating new system image Formula, and generate upgrade package.
3. the method according to claim 1, wherein the file content of modification upgrading includes at least one of:
Modify SYSTEM file;
Modify build.prop file;
Modify the external version number information of SYSTEM file;
Modify the external version number information of build.prop file.
4. method according to claim 1 or 2, which is characterized in that after generating upgrade package, the method also includes:
The binary data that predetermined volumes are added in the upgrade package obtains specified upgrade package;
The specified upgrading packet signature is given using signature script.
5. the method according to claim 1, wherein before decompressing the signature file destination, the method Further include:
A signature file destination of copy renames the signature file destination of copy version to specified storage equipment;
The signature file destination of the copy version is determined as signature file destination to be decompressed.
6. a kind of generating means of upgrade package characterized by comprising
Judgment module, for judging under root with the presence or absence of signature file destination;
First processing module is deleted therein for when there are the signature file destination, decompressing the signature file destination IMAGES catalogue, and modify file content to be upgraded;
First generation module for using specified script to regenerate system image, and generates upgrade package.
7. device according to claim 6, which is characterized in that described device further include:
System image is converted to ext4 when for the signature file destination to be not present under the root directory by Second processing module Format, and search by system.map the absolute address of file to be modified;
Second generation module generates new system mirror for using the file content in winhex tool modification system catalogue Sparse format is converted to as after, and generates upgrade package.
8. device according to claim 6 or 7, which is characterized in that described device further include:
Adding module, for after generating upgrade package, the binary data that predetermined volumes are added in the upgrade package to be obtained Specified upgrade package;
Signature blocks, for giving the specified upgrading packet signature using signature script.
9. a kind of storage medium, which is characterized in that the storage medium includes the program of storage, wherein when described program is run Method described in any one of perform claim requirement 1 to 5.
10. a kind of processor, which is characterized in that the processor is for running program, wherein right of execution when described program is run Benefit require any one of 1 to 5 described in method.
CN201710787814.8A 2017-09-04 2017-09-04 The generation method and device of upgrade package Withdrawn CN109426515A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201710787814.8A CN109426515A (en) 2017-09-04 2017-09-04 The generation method and device of upgrade package
PCT/CN2018/087148 WO2019041891A1 (en) 2017-09-04 2018-05-16 Method and device for generating upgrade package

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710787814.8A CN109426515A (en) 2017-09-04 2017-09-04 The generation method and device of upgrade package

Publications (1)

Publication Number Publication Date
CN109426515A true CN109426515A (en) 2019-03-05

Family

ID=65513774

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710787814.8A Withdrawn CN109426515A (en) 2017-09-04 2017-09-04 The generation method and device of upgrade package

Country Status (2)

Country Link
CN (1) CN109426515A (en)
WO (1) WO2019041891A1 (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110348178A (en) * 2019-06-27 2019-10-18 绿漫科技有限公司 The method that a kind of pair of iOS system application is signed again
CN111930412A (en) * 2019-05-13 2020-11-13 阿里巴巴集团控股有限公司 Method and device for generating differential file and upgrading firmware on line
CN111949303A (en) * 2020-07-06 2020-11-17 深圳市华曦达科技股份有限公司 Upgrade package processing method and device, electronic equipment and storage medium
CN113609476A (en) * 2021-07-28 2021-11-05 南京慧尔视智能科技有限公司 Radar firmware remote upgrading method and upgrading system
CN114637523A (en) * 2022-02-14 2022-06-17 北京鸿合爱学教育科技有限公司 Firmware upgrade file processing method, device, server and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105373410A (en) * 2015-12-22 2016-03-02 京信通信技术(广州)有限公司 Differential upgrading method and device for base station software
CN105511911A (en) * 2015-11-27 2016-04-20 青岛海信移动通信技术股份有限公司 System firmware upgrade package generation method and device
US20160124739A1 (en) * 2014-10-30 2016-05-05 Google Inc. Minimizing Image Copying During Partition Updates
US20170115980A1 (en) * 2015-10-21 2017-04-27 Oracle International Corporation Computerized system and method for patching an application by separating executables and working data using different images

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103123588A (en) * 2013-02-05 2013-05-29 东莞宇龙通信科技有限公司 Method and system for obtaining difference upgrade patch
CN105335182A (en) * 2014-08-06 2016-02-17 中兴通讯股份有限公司 Method and device for realizing making of upgrade patches
CN106648766B (en) * 2016-12-07 2020-07-28 京信通信***(中国)有限公司 Method and device for generating patch upgrade patch based on folder and differentially upgrading patch based on folder

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160124739A1 (en) * 2014-10-30 2016-05-05 Google Inc. Minimizing Image Copying During Partition Updates
US20170115980A1 (en) * 2015-10-21 2017-04-27 Oracle International Corporation Computerized system and method for patching an application by separating executables and working data using different images
CN105511911A (en) * 2015-11-27 2016-04-20 青岛海信移动通信技术股份有限公司 System firmware upgrade package generation method and device
CN105373410A (en) * 2015-12-22 2016-03-02 京信通信技术(广州)有限公司 Differential upgrading method and device for base station software

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111930412A (en) * 2019-05-13 2020-11-13 阿里巴巴集团控股有限公司 Method and device for generating differential file and upgrading firmware on line
CN110348178A (en) * 2019-06-27 2019-10-18 绿漫科技有限公司 The method that a kind of pair of iOS system application is signed again
CN111949303A (en) * 2020-07-06 2020-11-17 深圳市华曦达科技股份有限公司 Upgrade package processing method and device, electronic equipment and storage medium
CN113609476A (en) * 2021-07-28 2021-11-05 南京慧尔视智能科技有限公司 Radar firmware remote upgrading method and upgrading system
CN114637523A (en) * 2022-02-14 2022-06-17 北京鸿合爱学教育科技有限公司 Firmware upgrade file processing method, device, server and storage medium

Also Published As

Publication number Publication date
WO2019041891A1 (en) 2019-03-07

Similar Documents

Publication Publication Date Title
CN109426515A (en) The generation method and device of upgrade package
US10055216B2 (en) Minimizing image copying during partition updates
CN105100191B (en) The method, apparatus and system of Java application installations are realized in a kind of cloud compiling
CN107506219A (en) A kind of general version upgrade method based on android system
CN107506221B (en) Application program upgrading method, device and equipment
KR101105177B1 (en) Data container for user interface content data
CN105760184B (en) A kind of method and apparatus of charging assembly
CN105426223B (en) Using loading method and device
CN102722386A (en) Method and device for generating firmware over the air (FOTA) upgrade pack
CN107783770B (en) Page configuration updating method, device, server and medium
EP2987079A1 (en) A system and method thereof for creating dynamically attachable and detachable binary files
CN104426955A (en) Processing method of shared file, and cloud storage server
CN104834541B (en) Function module hanging method, carry system and the method for updating carry system
CN108089865A (en) Using method of cutting out, device and storage medium
CN105407130A (en) Mobile client plug-in system and mobile client plug-in processing method
CN109189384A (en) A kind of multiplexing method and device of code
CN109298873B (en) System upgrading method and device
CN109492176A (en) A kind of page info update method and device
CN110209420A (en) A kind of method and device updating bootstrap loader
CN108694049B (en) Method and equipment for updating software
CN104461621A (en) Attribute information updating method and device
CN106227541A (en) A kind of program updates download process method and mobile terminal
CN114911497A (en) SDK upgrading method and device and computer equipment
CN106294530A (en) The method and system of rule match
CN107124446A (en) Application program method for down loading, server and terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication

Application publication date: 20190305

WW01 Invention patent application withdrawn after publication