CN112799707A - CTID (computer telephony integration) access control firmware upgrading method and system - Google Patents

CTID (computer telephony integration) access control firmware upgrading method and system Download PDF

Info

Publication number
CN112799707A
CN112799707A CN202110063387.5A CN202110063387A CN112799707A CN 112799707 A CN112799707 A CN 112799707A CN 202110063387 A CN202110063387 A CN 202110063387A CN 112799707 A CN112799707 A CN 112799707A
Authority
CN
China
Prior art keywords
firmware
ctid
sub
patch file
difference data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110063387.5A
Other languages
Chinese (zh)
Inventor
吴太亮
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Fujian Newland Communication Science Technology Co Ltd
Original Assignee
Fujian Newland Communication Science Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fujian Newland Communication Science Technology Co Ltd filed Critical Fujian Newland Communication Science Technology Co Ltd
Priority to CN202110063387.5A priority Critical patent/CN112799707A/en
Publication of CN112799707A publication Critical patent/CN112799707A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/60Software deployment
    • G06F8/65Updates
    • G06F8/658Incremental updates; Differential updates
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/60Software deployment
    • G06F8/65Updates
    • G06F8/654Updates using techniques specially adapted for alterable solid state memories, e.g. for EEPROM or flash memories

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Stored Programmes (AREA)

Abstract

The invention provides a CTID (computer telephony integration) access control firmware upgrading method and system in the technical field of intelligent access control, wherein the method comprises the following steps: step S10, dividing the new firmware into a plurality of sub-firmware, and comparing the difference between each sub-firmware and the old firmware by using a BSDiff algorithm to obtain difference data; step S20, marking head identification, tail identification, length identification and block identification in corresponding sub-firmware based on the difference data; step S30, packaging each marked sub-firmware into a patch file and issuing the patch file to a server; and S40, downloading the patch file from the server by the CTID entrance guard, and after the integrity of the patch file is checked, performing upgrading operation to finish the upgrading of the CTID entrance guard firmware. The invention has the advantages that: the utilization rate of the CTID entrance guard storage space is greatly improved, and further more functions of the CTID entrance guard are expanded.

Description

CTID (computer telephony integration) access control firmware upgrading method and system
Technical Field
The invention relates to the technical field of intelligent access control, in particular to a CTID access control firmware upgrading method and system.
Background
The CTID entrance guard that possesses network card verification function promptly has access guard, and the CTID entrance guard mostly adopts embedded system at present, does not set up too much memory space, generally only sets up 1MB size flash space and is used for storing program software, and program software compiles the back and generally just can occupy 400 more KB's memory space, and along with the stack of new function, the size of later stage update firmware is probably bigger, has brought the inconvenience for the firmware upgrade.
Because the storage space of the CTID access control is limited, if the flash is equally divided into two storage spaces, the firmware to be upgraded is downloaded to one of the storage spaces first and then installed (upgraded) to the other storage space, so that the size of the firmware is limited to be only half of the flash space, and the requirement of later-stage service cannot be met.
Therefore, how to provide a CTID access control firmware upgrading method and system to improve the utilization rate of the storage space of the CTID access control and further expand more functions of the CTID access control becomes a problem to be solved urgently.
Disclosure of Invention
The technical problem to be solved by the invention is to provide a CTID access control firmware upgrading method and system, so that the utilization rate of the CTID access control storage space is improved, and further more functions of the CTID access control are expanded.
In a first aspect, the present invention provides a CTID access control firmware upgrading method, including the following steps:
step S10, dividing the new firmware into a plurality of sub-firmware, and comparing the difference between each sub-firmware and the old firmware by using a BSDiff algorithm to obtain difference data;
step S20, marking head identification, tail identification, length identification and block identification in corresponding sub-firmware based on the difference data;
step S30, packaging each marked sub-firmware into a patch file and issuing the patch file to a server;
and S40, downloading the patch file from the server by the CTID entrance guard, and after the integrity of the patch file is checked, performing upgrading operation to finish the upgrading of the CTID entrance guard firmware.
Further, the step S10 is specifically:
setting a file size based on the size of the CTID entrance guard flash, dividing the new firmware into a plurality of sub-firmware based on the file size, and comparing the difference between each sub-firmware and the old firmware by using a BSDiff algorithm to obtain difference data.
Further, in step S20, the header identifies a header for marking the difference data, the trailer identifies a trailer for marking the difference data, the length identifies a length for marking the difference data, and the block identifies a number for marking the sub-firmware.
Further, the step S30 specifically includes:
step S31, splicing the marked sub-firmware according to the flash address of the old firmware in sequence to generate a differential packet;
marking the flash address of the marked sub-firmware corresponding to the old firmware to generate address data;
step S32, performing DM5 calculation on the differential packet and the address data to obtain a first hash value;
and step S33, packaging the differential packet, the address data and the first hash value into a patch file, and issuing the patch file to a server.
Further, the step S40 specifically includes:
step S41, downloading the patch file from a server by the CTID access control, and analyzing the patch file to obtain a differential packet, address data and a first hash value;
step S42, performing DM5 calculation on the differential packet and the address data to obtain a second hash value, comparing whether the first hash value is consistent with the second hash value, if so, passing the integrity check, and entering step S43; if not, the integrity check is not passed, and the flow is ended;
step S43, extracting difference data from the difference packet based on the head mark, the tail mark, the length mark and the block mark;
and step S44, updating the difference data into a flash of the CTID access control based on the address data, and finishing upgrading the CTID access control firmware.
In a second aspect, the invention provides a CTID access control firmware upgrading system, which includes the following modules:
the difference data comparison module is used for dividing the new firmware into a plurality of sub-firmware and comparing the difference between each sub-firmware and the old firmware by using a BSDiff algorithm to obtain difference data;
a difference data marking module for marking a head identifier, a tail identifier, a length identifier and a block identifier in a corresponding sub-firmware based on the difference data;
the patch file issuing module is used for packaging each marked sub-firmware into a patch file and issuing the patch file to a server;
and the firmware upgrading module is used for downloading the patch file from the server by the CTID access control, and after the integrity of the patch file is verified, upgrading operation is carried out to complete upgrading of the CTID access control firmware.
Further, the difference data comparison module specifically comprises:
setting a file size based on the size of the CTID entrance guard flash, dividing the new firmware into a plurality of sub-firmware based on the file size, and comparing the difference between each sub-firmware and the old firmware by using a BSDiff algorithm to obtain difference data.
Further, in the difference data marking module, the head identifier is used for marking a head of the difference data, the tail identifier is used for marking a tail of the difference data, the length identifier is used for marking a length of the difference data, and the block identifier is used for marking a number of the sub-firmware.
Further, the patch file publishing module specifically includes:
the differential packet and address data generation unit is used for sequentially splicing the marked sub-firmware according to the flash address of the old firmware to generate a differential packet;
marking the flash address of the marked sub-firmware corresponding to the old firmware to generate address data;
the DM5 calculating unit is used for performing DM5 calculation on the differential packet and the address data to obtain a first hash value;
and the patch file packaging unit is used for packaging the differential packet, the address data and the first hash value into a patch file and issuing the patch file to the server.
Further, the firmware upgrade module specifically includes:
the system comprises a patch file analysis unit, a server and a server, wherein the patch file analysis unit is used for downloading the patch file from the server by the CTID access control, and analyzing the patch file to obtain a differential packet, address data and a first hash value;
the DM5 checking unit is used for performing DM5 calculation on the differential packet and the address data to obtain a second hash value, comparing whether the first hash value is consistent with the second hash value, if so, the integrity check is passed, and the differential data enters the differential data extracting unit; if not, the integrity check is not passed, and the flow is ended;
a difference data extraction unit for extracting difference data from the difference packet based on the header identifier, the trailer identifier, the length identifier, and the block identifier;
and the difference data updating unit is used for updating each difference data into a flash of the CTID access control based on the address data to finish the upgrading of the CTID access control firmware.
The invention has the advantages that:
through cutting apart into a plurality of sub-firmware with new firmware, the difference of contrast each sub-firmware and old firmware obtains difference data, mark head sign at corresponding sub-firmware based on difference data, tail sign, length sign and block sign, each sub-firmware packing after will marking becomes the patch file, utilize the patch file to upgrade CTID entrance guard's firmware, download whole firmware file and upgrade on for the tradition, very big reduction the size of file that needs to download, and only need very little storage space can accomplish the upgrading of CTID entrance guard's firmware, more storage spaces can be used to the storage of the program software of compiling, final very big promotion CTID entrance guard's storage space's utilization ratio, can expand more functions of CTID entrance guard.
Drawings
The invention will be further described with reference to the following examples with reference to the accompanying drawings.
Fig. 1 is a flowchart of a CTID access control firmware upgrading method according to the present invention.
Fig. 2 is a schematic structural diagram of a CTID access control firmware upgrading system according to the present invention.
Detailed Description
The technical scheme in the embodiment of the application has the following general idea: the new firmware is divided into the plurality of sub-firmware, difference data is obtained by comparing differences between the sub-firmware and the old firmware, the sub-firmware with the difference data is packaged into a patch file, and the CTID access control firmware is upgraded by using the patch file so as to improve the utilization rate of the CTID access control storage space and further expand more functions of the CTID access control.
Referring to fig. 1 to fig. 2, a preferred embodiment of a CTID access control firmware upgrading method according to the present invention includes the following steps:
step S10, dividing the new firmware into a plurality of sub-firmware, comparing the difference between each sub-firmware and the old firmware by using a BSDiff algorithm (delta update algorithm) to obtain difference data;
step S20, marking head identification, tail identification, length identification and block identification in corresponding sub-firmware based on the difference data;
step S30, packaging each marked sub-firmware into a patch file and issuing the patch file to a server;
and S40, downloading the patch file from the server by the CTID entrance guard, and after the integrity of the patch file is checked, performing upgrading operation to finish the upgrading of the CTID entrance guard firmware.
The step S10 specifically includes:
setting a file size based on the size of the CTID entrance guard flash, dividing the new firmware into a plurality of sub-firmware based on the file size, and comparing the difference between each sub-firmware and the old firmware by using a BSDiff algorithm to obtain difference data.
For example, the size of the CTID entrance guard flash is 1MB, the size of a set file is 2KB, and 512 small storage spaces of 2KB exist in the CTID entrance guard flash; the new firmware is split into several sub-firmware in the size of 2 KB.
In step S20, the header identifies a header for marking the difference data, the trailer identifies a trailer for marking the difference data, the length identifies a length for marking the difference data, and the block identifies a number for marking the sub-firmware.
The step S30 specifically includes:
step S31, splicing the marked sub-firmware according to the flash address of the old firmware in sequence to generate a differential packet;
marking the flash address of the marked sub-firmware corresponding to the old firmware to generate address data;
for example, the size of the address data is set to 512 bytes, each byte corresponds to a small storage space of 2KB in the CTID access flash in sequence, when the 5 th sub-firmware has difference data, the value of the 5 th byte in the address data is set to 1, and when the 6 th sub-firmware does not have difference data, the value of the 6 th byte in the address data is set to 0, so as to mark the address relationship corresponding to the sub-firmware having the difference data and the old firmware.
Step S32, performing DM5 calculation (information digest algorithm) on the differential packet and the address data to obtain a first hash value;
and step S33, packaging the differential packet, the address data and the first hash value into a patch file, and issuing the patch file to a server.
The step S40 specifically includes:
step S41, downloading the patch file from a server by the CTID access control, and analyzing the patch file to obtain a differential packet, address data and a first hash value;
step S42, performing DM5 calculation on the differential packet and the address data to obtain a second hash value, comparing whether the first hash value is consistent with the second hash value, if so, passing the integrity check, and entering step S43; if not, the integrity check is not passed, and the flow is ended;
step S43, extracting difference data from the difference packet based on the head mark, the tail mark, the length mark and the block mark;
and step S44, updating the difference data into a flash of the CTID access control based on the address data, and finishing upgrading the CTID access control firmware. For example, if the values of the first 4 bytes in the address data are all 0, and the value of the 5 th byte is 1, the first difference data in the difference packet is extracted based on the block identifier and updated to the small storage space of the 5 th 2KB of the CTID access flash.
The invention discloses a preferable embodiment of a CTID access control firmware upgrading system, which comprises the following modules:
the difference data comparison module is used for dividing the new firmware into a plurality of sub-firmware and comparing the difference between each sub-firmware and the old firmware by using a BSDiff algorithm (delta update algorithm) to obtain difference data;
a difference data marking module for marking a head identifier, a tail identifier, a length identifier and a block identifier in a corresponding sub-firmware based on the difference data;
the patch file issuing module is used for packaging each marked sub-firmware into a patch file and issuing the patch file to a server;
and the firmware upgrading module is used for downloading the patch file from the server by the CTID access control, and after the integrity of the patch file is verified, upgrading operation is carried out to complete upgrading of the CTID access control firmware.
The difference data comparison module specifically comprises:
setting a file size based on the size of the CTID entrance guard flash, dividing the new firmware into a plurality of sub-firmware based on the file size, and comparing the difference between each sub-firmware and the old firmware by using a BSDiff algorithm to obtain difference data.
For example, the size of the CTID entrance guard flash is 1MB, the size of a set file is 2KB, and 512 small storage spaces of 2KB exist in the CTID entrance guard flash; the new firmware is split into several sub-firmware in the size of 2 KB.
In the difference data marking module, the head identifier is used for marking the head of the difference data, the tail identifier is used for marking the tail of the difference data, the length identifier is used for marking the length of the difference data, and the block identifier is used for marking the number of the sub-firmware.
The patch file publishing module specifically comprises:
the differential packet and address data generation unit is used for sequentially splicing the marked sub-firmware according to the flash address of the old firmware to generate a differential packet;
marking the flash address of the marked sub-firmware corresponding to the old firmware to generate address data;
for example, the size of the address data is set to 512 bytes, each byte corresponds to a small storage space of 2KB in the CTID access flash in sequence, when the 5 th sub-firmware has difference data, the value of the 5 th byte in the address data is set to 1, and when the 6 th sub-firmware does not have difference data, the value of the 6 th byte in the address data is set to 0, so as to mark the address relationship corresponding to the sub-firmware having the difference data and the old firmware.
A DM5 calculating unit, configured to perform DM5 calculation (information digest algorithm) on the differential packet and the address data to obtain a first hash value;
and the patch file packaging unit is used for packaging the differential packet, the address data and the first hash value into a patch file and issuing the patch file to the server.
The firmware upgrading module specifically comprises:
the system comprises a patch file analysis unit, a server and a server, wherein the patch file analysis unit is used for downloading the patch file from the server by the CTID access control, and analyzing the patch file to obtain a differential packet, address data and a first hash value;
the DM5 checking unit is used for performing DM5 calculation on the differential packet and the address data to obtain a second hash value, comparing whether the first hash value is consistent with the second hash value, if so, the integrity check is passed, and the differential data enters the differential data extracting unit; if not, the integrity check is not passed, and the flow is ended;
a difference data extraction unit for extracting difference data from the difference packet based on the header identifier, the trailer identifier, the length identifier, and the block identifier;
and the difference data updating unit is used for updating each difference data into a flash of the CTID access control based on the address data to finish the upgrading of the CTID access control firmware. For example, if the values of the first 4 bytes in the address data are all 0, and the value of the 5 th byte is 1, the first difference data in the difference packet is extracted based on the block identifier and updated to the small storage space of the 5 th 2KB of the CTID access flash.
In summary, the invention has the advantages that:
through cutting apart into a plurality of sub-firmware with new firmware, the difference of contrast each sub-firmware and old firmware obtains difference data, mark head sign at corresponding sub-firmware based on difference data, tail sign, length sign and block sign, each sub-firmware packing after will marking becomes the patch file, utilize the patch file to upgrade CTID entrance guard's firmware, download whole firmware file and upgrade on for the tradition, very big reduction the size of file that needs to download, and only need very little storage space can accomplish the upgrading of CTID entrance guard's firmware, more storage spaces can be used to the storage of the program software of compiling, final very big promotion CTID entrance guard's storage space's utilization ratio, can expand more functions of CTID entrance guard.
Although specific embodiments of the invention have been described above, it will be understood by those skilled in the art that the specific embodiments described are illustrative only and are not limiting upon the scope of the invention, and that equivalent modifications and variations can be made by those skilled in the art without departing from the spirit of the invention, which is to be limited only by the appended claims.

Claims (10)

1. A CTID entrance guard firmware upgrading method is characterized in that: the method comprises the following steps:
step S10, dividing the new firmware into a plurality of sub-firmware, and comparing the difference between each sub-firmware and the old firmware by using a BSDiff algorithm to obtain difference data;
step S20, marking head identification, tail identification, length identification and block identification in corresponding sub-firmware based on the difference data;
step S30, packaging each marked sub-firmware into a patch file and issuing the patch file to a server;
and S40, downloading the patch file from the server by the CTID entrance guard, and after the integrity of the patch file is checked, performing upgrading operation to finish the upgrading of the CTID entrance guard firmware.
2. The CTID access control firmware upgrading method of claim 1, characterized in that: the step S10 specifically includes:
setting a file size based on the size of the CTID entrance guard flash, dividing the new firmware into a plurality of sub-firmware based on the file size, and comparing the difference between each sub-firmware and the old firmware by using a BSDiff algorithm to obtain difference data.
3. The CTID access control firmware upgrading method of claim 1, characterized in that: in step S20, the header identifies a header for marking the difference data, the trailer identifies a trailer for marking the difference data, the length identifies a length for marking the difference data, and the block identifies a number for marking the sub-firmware.
4. The CTID access control firmware upgrading method of claim 1, characterized in that: the step S30 specifically includes:
step S31, splicing the marked sub-firmware according to the flash address of the old firmware in sequence to generate a differential packet;
marking the flash address of the marked sub-firmware corresponding to the old firmware to generate address data;
step S32, performing DM5 calculation on the differential packet and the address data to obtain a first hash value;
and step S33, packaging the differential packet, the address data and the first hash value into a patch file, and issuing the patch file to a server.
5. The CTID entrance guard firmware upgrading method of claim 4, characterized in that: the step S40 specifically includes:
step S41, downloading the patch file from a server by the CTID access control, and analyzing the patch file to obtain a differential packet, address data and a first hash value;
step S42, performing DM5 calculation on the differential packet and the address data to obtain a second hash value, comparing whether the first hash value is consistent with the second hash value, if so, passing the integrity check, and entering step S43; if not, the integrity check is not passed, and the flow is ended;
step S43, extracting difference data from the difference packet based on the head mark, the tail mark, the length mark and the block mark;
and step S44, updating the difference data into a flash of the CTID access control based on the address data, and finishing upgrading the CTID access control firmware.
6. The utility model provides a CTID entrance guard firmware upgrade system which characterized in that: the system comprises the following modules:
the difference data comparison module is used for dividing the new firmware into a plurality of sub-firmware and comparing the difference between each sub-firmware and the old firmware by using a BSDiff algorithm to obtain difference data;
a difference data marking module for marking a head identifier, a tail identifier, a length identifier and a block identifier in a corresponding sub-firmware based on the difference data;
the patch file issuing module is used for packaging each marked sub-firmware into a patch file and issuing the patch file to a server;
and the firmware upgrading module is used for downloading the patch file from the server by the CTID access control, and after the integrity of the patch file is verified, upgrading operation is carried out to complete upgrading of the CTID access control firmware.
7. The CTID entrance guard firmware upgrade system of claim 6, characterized in that: the difference data comparison module specifically comprises:
setting a file size based on the size of the CTID entrance guard flash, dividing the new firmware into a plurality of sub-firmware based on the file size, and comparing the difference between each sub-firmware and the old firmware by using a BSDiff algorithm to obtain difference data.
8. The CTID entrance guard firmware upgrade system of claim 6, characterized in that: in the difference data marking module, the head identifier is used for marking the head of the difference data, the tail identifier is used for marking the tail of the difference data, the length identifier is used for marking the length of the difference data, and the block identifier is used for marking the number of the sub-firmware.
9. The CTID entrance guard firmware upgrade system of claim 6, characterized in that: the patch file publishing module specifically comprises:
the differential packet and address data generation unit is used for sequentially splicing the marked sub-firmware according to the flash address of the old firmware to generate a differential packet;
marking the flash address of the marked sub-firmware corresponding to the old firmware to generate address data;
the DM5 calculating unit is used for performing DM5 calculation on the differential packet and the address data to obtain a first hash value;
and the patch file packaging unit is used for packaging the differential packet, the address data and the first hash value into a patch file and issuing the patch file to the server.
10. The CTID access control firmware upgrade system of claim 9, wherein: the firmware upgrading module specifically comprises:
the system comprises a patch file analysis unit, a server and a server, wherein the patch file analysis unit is used for downloading the patch file from the server by the CTID access control, and analyzing the patch file to obtain a differential packet, address data and a first hash value;
the DM5 checking unit is used for performing DM5 calculation on the differential packet and the address data to obtain a second hash value, comparing whether the first hash value is consistent with the second hash value, if so, the integrity check is passed, and the differential data enters the differential data extracting unit; if not, the integrity check is not passed, and the flow is ended;
a difference data extraction unit for extracting difference data from the difference packet based on the header identifier, the trailer identifier, the length identifier, and the block identifier;
and the difference data updating unit is used for updating each difference data into a flash of the CTID access control based on the address data to finish the upgrading of the CTID access control firmware.
CN202110063387.5A 2021-01-18 2021-01-18 CTID (computer telephony integration) access control firmware upgrading method and system Pending CN112799707A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110063387.5A CN112799707A (en) 2021-01-18 2021-01-18 CTID (computer telephony integration) access control firmware upgrading method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110063387.5A CN112799707A (en) 2021-01-18 2021-01-18 CTID (computer telephony integration) access control firmware upgrading method and system

Publications (1)

Publication Number Publication Date
CN112799707A true CN112799707A (en) 2021-05-14

Family

ID=75810118

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110063387.5A Pending CN112799707A (en) 2021-01-18 2021-01-18 CTID (computer telephony integration) access control firmware upgrading method and system

Country Status (1)

Country Link
CN (1) CN112799707A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115134233A (en) * 2022-05-12 2022-09-30 芜湖美的厨卫电器制造有限公司 Scene upgrading method and device, medium and terminal

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110730104A (en) * 2019-10-29 2020-01-24 乐鑫信息科技(上海)股份有限公司 Method for upgrading multi-device batch firmware of mesh network device
CN110837393A (en) * 2019-11-14 2020-02-25 北京知道创宇信息技术股份有限公司 Method and device for manufacturing firmware differential upgrade package and readable storage medium
CN110874239A (en) * 2020-01-20 2020-03-10 翱捷科技(上海)有限公司 Air firmware differential upgrading method and device for electronic equipment
CN111475195A (en) * 2020-03-24 2020-07-31 普联技术有限公司 Firmware upgrading method, device and system
US20200326930A1 (en) * 2019-04-12 2020-10-15 Dell Products, Lp System and Method for Modular Patch based Firmware Update

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20200326930A1 (en) * 2019-04-12 2020-10-15 Dell Products, Lp System and Method for Modular Patch based Firmware Update
CN110730104A (en) * 2019-10-29 2020-01-24 乐鑫信息科技(上海)股份有限公司 Method for upgrading multi-device batch firmware of mesh network device
CN110837393A (en) * 2019-11-14 2020-02-25 北京知道创宇信息技术股份有限公司 Method and device for manufacturing firmware differential upgrade package and readable storage medium
CN110874239A (en) * 2020-01-20 2020-03-10 翱捷科技(上海)有限公司 Air firmware differential upgrading method and device for electronic equipment
CN111475195A (en) * 2020-03-24 2020-07-31 普联技术有限公司 Firmware upgrading method, device and system

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115134233A (en) * 2022-05-12 2022-09-30 芜湖美的厨卫电器制造有限公司 Scene upgrading method and device, medium and terminal
CN115134233B (en) * 2022-05-12 2023-10-20 芜湖美的厨卫电器制造有限公司 Scene upgrading method and device, medium and terminal

Similar Documents

Publication Publication Date Title
CN109032611B (en) Script deployment method and device, computer equipment and storage medium
CN107506219A (en) A kind of general version upgrade method based on android system
CN110837393A (en) Method and device for manufacturing firmware differential upgrade package and readable storage medium
CN108279922A (en) Differential file generation method, upgrade method and system based on the differential file
CN107783776B (en) Processing method and device of firmware upgrade package and electronic equipment
CN105224361B (en) A kind of method and system upgraded to sqlite3 type embedded databases
CN110032377B (en) Communication module software upgrading method and system and communication module
CN112559354A (en) Front-end code specification detection method and device, computer equipment and storage medium
CN110688378B (en) Migration method and system for database storage process
CN104699511B (en) Plug-in unit upgrade method and device
CN111221682B (en) Method for mirroring storage system
CN113330419B (en) Equipment application installation method, device, equipment and storage medium
CN104133699A (en) Equipment system software upgrading method and system
CN115185550A (en) Service deployment method, device, computer equipment and storage medium
CN113110832A (en) Intelligent efficient code generation method and device and storage medium
CN109101232B (en) Method, device, computer equipment and storage medium for product development
CN110007941A (en) A kind of the MCU firmware and upgrade method of Intelligent refuse classification recovery system
CN112799707A (en) CTID (computer telephony integration) access control firmware upgrading method and system
CN109462661B (en) Data synchronization method and device, computer equipment and storage medium
CN104133743B (en) A kind of by burning file to the method for EMMC chip and device
CN112199104B (en) Software upgrading method and device, electronic equipment and storage medium
CN114661423A (en) Cluster configuration detection method and device, computer equipment and storage medium
CN112579141A (en) Firmware updating method, device, equipment and storage medium of embedded system
CN111273920A (en) Method and device for writing data into installation package and storage medium
CN103793231A (en) Processing method and system for mobile terminal parameters

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination