CN112306514A - Firmware upgrading method based on narrowband Internet of things, terminal equipment and computer readable storage medium - Google Patents
Firmware upgrading method based on narrowband Internet of things, terminal equipment and computer readable storage medium Download PDFInfo
- Publication number
- CN112306514A CN112306514A CN201910674063.8A CN201910674063A CN112306514A CN 112306514 A CN112306514 A CN 112306514A CN 201910674063 A CN201910674063 A CN 201910674063A CN 112306514 A CN112306514 A CN 112306514A
- Authority
- CN
- China
- Prior art keywords
- firmware
- terminal device
- master device
- information
- version information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/60—Software deployment
- G06F8/65—Updates
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Stored Programmes (AREA)
Abstract
The invention relates to a firmware upgrading method based on a narrowband Internet of things, terminal equipment and a computer readable storage medium. The firmware upgrading method is operated on terminal equipment of a narrowband Internet of things, and comprises the following steps: broadcasting a communication request through a short-distance wireless communication module, establishing short-distance wireless communication connection with main equipment when response information of the main equipment responding to the communication request is received, sending firmware version information of terminal equipment to the main equipment, and acquiring a firmware upgrading file package from the main equipment when firmware to be upgraded determined by the main equipment based on the firmware version information is received; and upgrading the firmware by using the acquired firmware upgrading file package. Therefore, when the firmware is required to be upgraded, the main equipment is used for establishing short-distance wireless communication connection between the mobile equipment and the main equipment and establishing network communication connection between the main equipment and the server, the main equipment is firstly used for acquiring a file packet required to be upgraded from a service, and then the file packet for upgrading the firmware is forwarded to the terminal equipment so as to finish the upgrading of the firmware.
Description
Technical Field
The present invention relates to the field of computer technologies, and in particular, to a firmware upgrade method, a terminal device, and a computer-readable storage medium.
Background
Firmware is software that resides in an electronic device, can be combined with hardware to implement specific algorithms and product functions, and often undertakes the underlying and underlying work. The firmware upgrading refers to that the terminal equipment downloads and acquires a firmware upgrading package in a wireless network or local transmission mode, and then upgrades and maintains the terminal firmware such as a mobile phone or a tablet computer; the purposes of function enhancement and problem repair of the terminal product are achieved.
In the firmware upgrading process, the key step is the acquisition of a firmware upgrading file. Firmware upgrade is applied to embedded devices. With the rapid development of the internet of things industry, more and more embedded devices with smaller memories and high power consumption requirements are continuously appeared and widely applied. The existing firmware upgrading technology for the internet of things embedded equipment mainly has two schemes: the first scheme is to use Narrow-Band Internet of Things (NB-IoT) network to wirelessly transmit and acquire a firmware upgrade package; the second scheme is to download the firmware upgrade package by using a USB or UART interface externally connected with the device. The first method depends on the operator network, and in the case that the operator network cannot be connected due to network abnormality or device defect, the upgrading scheme cannot be used at all, and in addition, the scheme also has a certain flow rate charge cost. In the second scheme, physical contact is required to be achieved with equipment through a transmission mode that an external interface is matched with professional upgrading software, whether the equipment of the internet of things provides a physical interface is limited by the overall design of a system integrator, and some equipment of the internet of things is installed in places where people cannot directly contact, so that upgrading cannot be achieved through the physical interface.
Disclosure of Invention
In view of the above, there is a need to provide a firmware upgrade method capable of conveniently and efficiently acquiring a firmware upgrade file via the internet of things, so as to solve the above problems.
In order to achieve the purpose, the firmware upgrading method provided by the invention operates on terminal equipment of a narrowband internet of things, an NB-IoT module is arranged in the terminal equipment, and the NB-IoT module comprises a short-distance wireless communication module and a memory for storing firmware version information of the terminal equipment. The firmware upgrading method comprises the following steps:
broadcasting a communication request through the short-distance wireless communication module, and judging whether a main device responds to the communication request;
when response information of the main equipment responding to the communication request is received, communication connection is established with the main equipment;
sending firmware version information of the terminal equipment to the main equipment, and controlling the main equipment to determine whether the firmware needs to be upgraded or not based on the firmware version information;
when an instruction that the main equipment determines that the firmware needs to be upgraded is received, acquiring a firmware upgrading file package from the main equipment; and
and upgrading the firmware by using the acquired firmware upgrading file package.
In a specific embodiment, the controlling the master device to determine whether the firmware needs to be upgraded based on the firmware version information specifically includes:
controlling the main equipment to establish communication connection with the server, and acquiring latest version information of the firmware from the server;
and judging whether the version information of the firmware acquired from the server is consistent with the firmware version information of the terminal equipment.
In a specific embodiment, if the version information of the firmware acquired from the server is inconsistent with the firmware version information of the terminal device, an instruction that the firmware needs to be upgraded and sent by the main device is received.
In a specific embodiment, if the version information of the firmware acquired from the server is consistent with the firmware version information of the terminal device, an instruction that the firmware does not need to be upgraded and sent by the main device is received.
In a specific embodiment, the obtaining the firmware upgrade file package from the master device specifically includes:
the main equipment downloads the upgrade file package of the latest version of the firmware from the server through an HTTP protocol;
and transmitting the upgrade file package downloaded from the server to the terminal equipment through the short-distance wireless communication module.
In a specific embodiment, when there is a master device responding to the communication request information, after establishing a communication connection with the master device, the method further includes:
and receiving authentication information sent by the main equipment, and judging whether the received authentication information is consistent with the authentication information stored in the terminal equipment.
In a specific embodiment, when the received authentication information is consistent with the stored authentication information, the firmware version information of the terminal device is sent to the master device.
In a specific embodiment, when the received authentication information is consistent with the stored authentication information, the authentication failure information is sent to the master device, and the communication connection with the master device is disconnected.
In a specific embodiment, the short-range wireless communication module is a low-power bluetooth module.
In addition, in order to solve the above problems, the invention further provides a terminal device based on the narrowband internet of things. The terminal device comprises an NB-IoT module, wherein the NB-IoT module comprises a short-distance wireless communication module, a storage memory for storing firmware version information of the terminal device, a processor and a firmware upgrading program which is stored on the storage memory and can run on the processor, and the firmware upgrading program realizes the steps of the firmware upgrading method when being executed by the processor.
In addition, to solve the above problems, the present invention also provides a computer-readable storage medium. The computer-readable storage medium stores a firmware upgrade program that, when executed by at least one processor, implements the steps of the firmware upgrade method described above.
The firmware upgrading method provided by the invention establishes short-distance wireless communication connection between the mobile equipment and the main equipment by means of the main equipment when the firmware is required to be upgraded, then establishes network communication connection between the main equipment and the server, firstly enables the main equipment to obtain an upgrading file packet of the firmware required to be upgraded from the service, and then forwards the obtained firmware upgrading file packet to the terminal equipment by means of the main equipment, and carries out firmware upgrading. Therefore, the dependence of the terminal equipment on an operator network during firmware upgrading can be reduced, and a physical interface does not need to be additionally arranged on the terminal equipment; the step-by-step firmware upgrading method is more efficient.
Drawings
Fig. 1 is a schematic diagram of a hardware structure of a firmware upgrading system for executing a firmware upgrading method according to an embodiment of the present invention.
FIG. 2 is a flowchart illustrating steps of a firmware upgrade method according to an embodiment of the present invention.
FIG. 3 is a flowchart illustrating steps of a firmware upgrade method according to another embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
In the following description, suffixes such as "module", "component", or "unit" used to denote elements are used only for facilitating the explanation of the present invention, and have no specific meaning in itself. Thus, "module", "component" or "unit" may be used mixedly.
Referring to fig. 1, a schematic diagram of a firmware upgrading system for operating a firmware upgrading method according to an embodiment of the invention is shown. As shown in fig. 1, the firmware upgrade system 100 includes a terminal device 10, a host device 20, and a server 30. The terminal device 10 and the host device 20, and the host device 20 and the server 30 are connected in communication via a network 40. Specifically, in the present embodiment, the terminal device 10 and the host device 20 establish a communication connection through short-range wireless communication, and the host device 20 and the server 30 may perform wired or wireless communication connection through a local area network or a wide area network. The terminal device 10 is a device in a narrowband internet of things system, for example, an intelligent gas meter in a narrowband internet of things-based gas system or an intelligent water meter in a narrowband internet of things-based gas system.
The host device 20 may be implemented in various terminals having data operation capability, and may include, for example, terminal devices 10 such as a mobile phone, a tablet computer, a notebook computer, a palm top computer, a Personal Digital Assistant (PDA), a Portable Media Player (PMP), a navigation device, a wearable device, a smart band, a pedometer, and the like, and fixed terminals such as a Digital TV, a desktop computer, and the like. Preferably, the host device 20 is a mobile phone provided with a bluetooth unit.
The server 30 is a control center of the narrowband internet of things system and the firmware upgrading system 100. Specifically, in the embodiment of the present invention, the server 30 manages each terminal device 10 in the firmware upgrade system 100 and the firmware upgrade file package in which the terminal device 10 is stored. Of course, other information of the firmware upgrading system 100, such as the corresponding relationship between the main device 20 and the terminal device 10, may also be stored on the server 30.
With continued reference to fig. 1, the terminal device 10 is provided with an NB-IoT module 11 therein, and the NB-IoT module 11 includes a memory 1111 and a short-range wireless communication module 112. In addition, the terminal device 10 may further include a display unit 12, an input unit 13, a processor 14 and other components, and those skilled in the art can understand that the structure of the terminal device 1 shown in fig. 2 does not constitute a limitation of the terminal device 1, and the terminal device 10 may include more or less components than those shown, or combine some components, or arrange different components.
The memory 111 may be used to store software programs as well as various data. The memory 111 may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required by at least one function (such as a sound playing function, an image playing function, etc.), and the like; the storage data area may store data (such as user data) created according to the use of the terminal device 10, and the like. Further, the memory 111 may include high speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device.
In the present embodiment, the memory 111 stores information such as firmware version information, firmware update date, and the number and identification information of the terminal device 10. In addition, the memory 111 stores therein authentication information of the terminal device 10. Specifically, the authentication information may be a number of the terminal device 10, or identity information of an owner of the terminal device 10. The authentication information is stored in the memory 111 in advance.
The short-range wireless communication module 112 may include one or more components that support short-range communication modules that allow the terminal device 10 to communicate wirelessly with wireless communication devices. For example, some examples of short-range wireless communication technologies include bluetooth (TM), Radio Frequency Identification (RFID), infrared data association (IrDA), Ultra Wideband (UWB), zigbee (TM), and the like. Preferably, in this embodiment, the short-range wireless communication module 112 is a Bluetooth Low Energy (BLE) module.
Correspondingly, a short-range wireless communication module 21 is also disposed in the master device 20, and the short-range wireless communication module 21 may be a BLE module.
The display unit 12 is used to display information input by a user or information provided to the user. The Display unit 12 may include a Display panel, which may be configured in the form of a Liquid Crystal Display (LCD), an Organic Light-Emitting Diode (OLED), or the like.
The input unit 13 may be used to receive numeric or character information input by a user through an input device such as a keyboard, and to generate key signal inputs related to user settings and function control of the terminal device 10. Specifically, the input unit 13 may include a touch panel and other input devices. The touch panel, also called a touch screen, may collect touch operations of a user (for example, operations of the user on or near the touch panel using any suitable object or accessory such as a finger, a stylus, etc.) and drive the corresponding connection device according to a preset program. The touch panel may include two parts of a touch detection device and a touch controller. The touch detection device detects the touch direction of a user, detects a signal brought by touch operation and transmits the signal to the touch controller; the touch controller receives touch information from the touch sensing device, converts the touch information into touch point coordinates, sends the touch point coordinates to the processor 14, and can receive and execute commands sent by the processor 14. In addition, the touch panel may be implemented in various types such as a resistive type, a capacitive type, an infrared ray, and a surface acoustic wave. The input unit 13 may include other input devices in addition to the touch panel. In particular, the other input devices may include, but are not limited to, one or more of a physical keyboard, a function key (such as a volume control key, a switch key, etc.), a trackball, a mouse, a joystick, and the like, which are not limited herein.
Further, the touch panel may cover the display panel, and when the touch panel detects a touch operation thereon or nearby, the touch panel transmits the touch operation to the processor 14 to determine the type of the touch event, and then the processor 14 provides a corresponding visual output on the display panel according to the type of the touch event. Although the touch panel and the display panel are two independent components to implement the input and output functions of the terminal device 10 in the present embodiment, in some embodiments, the touch panel and the display panel may be integrated to implement the input and output functions of the terminal device 10, and this is not limited herein.
The processor 14 is a control center of the terminal device, connects various parts of the entire terminal device by various interfaces and lines, and performs various functions of the terminal device and processes data by running or executing software programs and/or modules stored in the memory 111 and calling data stored in the memory 111, thereby performing overall monitoring of the terminal device. Processor 14 may include one or more processing units; preferably, the processor 14 may integrate an application processor, which primarily handles operating systems, user interfaces, applications, etc., and a modem processor, which primarily handles wireless communications. It will be appreciated that the modem processor described above may not be integrated into the processor 14.
The various embodiments described herein may be implemented in a computer-readable medium using, for example, computer software, hardware, or any combination thereof. For a hardware implementation, the embodiments described herein may be implemented using at least one of an Application Specific Integrated Circuit (ASIC), a Digital Signal Processor (DSP), a Digital Signal Processing Device (DSPD), a Programmable Logic Device (PLD), a Field Programmable Gate Array (FPGA), a processor, a controller, a microcontroller, a microprocessor, an electronic unit designed to perform the functions described herein, and in some cases, such embodiments may be implemented in processor 14. For a software implementation, the implementation such as a process or a function may be implemented with a separate software module that allows performing at least one function or operation. The software codes may be implemented by software applications (or programs) written in any suitable programming language, which may be stored in memory 111 and executed by processor 14.
The host device 20 also includes a telecommunications module 22 in telecommunications connection with the server 30. Specifically, the long-range communication module 22 may be a long-range wireless communication module, such as at least one of a GSM network, a W-CDMA network, and a TD-SCDMA network. Alternatively, the telecommunications module 22 can be a telecommunications limited module. The server 30 is provided with a communication module (not shown) opposite to the remote communication module 22. In this manner, the host device 20 and the server 30 can be connected for long-distance wired or wireless communication.
The server 30 is provided with a storage device 31, and the storage device 31 stores necessary programs and data required for the operation of the server 30. In an embodiment of the present invention, the storage device 31 stores at least the latest version of the firmware upgrade file package of the terminal device 10.
The implementation and steps of the firmware upgrading method provided in the present application will be further explained with reference to fig. 2 and with reference to the devices in the firmware upgrading system 100.
Referring to fig. 2, a flowchart illustrating steps of a firmware upgrade method according to an embodiment of the invention is shown. The firmware upgrading method is applied to the terminal equipment 10. In this embodiment, the execution order of the steps in the flowchart shown in fig. 2 may be changed and some steps may be omitted according to different requirements.
In a particular embodiment, the terminal device 10 broadcasts a communication request to the outside through the short-range wireless communication module 112. The communication request is used to request a communication connection to be established with a predetermined master device 20. In an alternative embodiment, the terminal device 10 broadcasts the communication request information through the bluetooth low energy module at preset intervals.
When the main device 20 receives the communication request broadcast by the terminal device 10, the main device 20 transmits response information responding to the communication request to the terminal device 10, that is, the terminal device 10 receives the response information sent back by the main device 20.
Upon receiving the response information sent back by the host device 20, the terminal device 10 establishes a communication connection with the host device 20, and the host device 20 sends the firmware version information of the terminal device 10. Specifically, the firmware version information of the terminal device 10 is stored in the memory 14, so that the terminal device 10 reads the firmware version information from the memory 14 and transmits the read firmware version information to the host device 20.
In a specific embodiment of the present application, step 204 specifically includes:
the terminal device 10 controls the main device 20 to establish a communication connection with the server 30, and acquires the latest version information of the firmware from the server 30; and determines whether the version information of the firmware acquired from the server 30 is consistent with the firmware version information of the terminal device.
Specifically, when the version information of the firmware acquired from the server 30 is inconsistent with the firmware version information of the terminal device 10, which indicates that the firmware of the terminal device 10 needs to be upgraded, at this time, the main device 20 sends an instruction that the firmware needs to be upgraded to the terminal device 10, that is, the terminal device 10 receives the instruction that the firmware sent by the main device 30 needs to be upgraded.
When the version information of the firmware acquired from the server 30 is consistent with the firmware version information of the terminal device 10, it indicates that the current firmware version of the terminal device 10 is the latest version at this time, and it is not necessary to update; the main device 20 sends an instruction that the firmware does not need to be upgraded to the terminal device 10, that is, the terminal device 10 receives the instruction that the firmware does not need to be upgraded and sent by the main device 30.
In another embodiment, when the terminal device 10 receives an instruction that the firmware sent by the main device 30 does not need to be upgraded, the terminal device 10 disconnects the communication connection with the main device 20.
In a specific implementation manner of the present invention, step 205 specifically includes:
the main device 20 downloads the upgrade file package of the latest version of the firmware from the server 30 online through a HyperText Transfer Protocol (HTTP); after the upgrade file package is downloaded to the host device 20, the host device 20 transmits the upgrade file package downloaded from the server 30 to the terminal device 10 by short-range wireless communication.
And step 206, upgrading the firmware by using the acquired firmware upgrading file package.
In a specific embodiment of the present application, when the terminal device 10 acquires the firmware upgrade file package of the latest version from the main device 20, the firmware upgrade file package is used to upgrade the firmware of the terminal device 10.
The firmware upgrading method provided by the invention establishes short-distance wireless communication connection between the mobile equipment and the main equipment by means of the main equipment when the firmware is required to be upgraded, then establishes network communication connection between the main equipment and the server, firstly enables the main equipment to obtain an upgrading file packet of the firmware required to be upgraded from the service, and then forwards the obtained firmware upgrading file packet to the terminal equipment by means of the main equipment, and carries out firmware upgrading. Therefore, the dependence of the terminal equipment on an operator network during firmware upgrading can be reduced, and a physical interface does not need to be additionally arranged on the terminal equipment; the step-by-step firmware upgrading method is more efficient.
Referring to fig. 3, a flowchart illustrating steps of a firmware upgrade method according to another embodiment of the invention is shown. Compared to the flowchart shown in fig. 2, in the present embodiment, the firmware upgrading method includes a step 2021 after the step 202.
Specifically, the memory 111 of the terminal device 10 stores preset authentication information in advance, where the preset authentication information includes, but is not limited to, authentication information of the host device 20 associated with the terminal device 10, and the authentication information may be an identification code of the host device 20 or identity information of an owner of the host device 20.
When the received authentication information is inconsistent with the authentication information stored in the terminal device 10, it indicates that the main device 20 does not have access right to the terminal device 10, and the access of the main device 20 may cause information leakage or function damage to the terminal device 10, so that, in order to avoid these problems, the terminal device 10 actively disconnects the communication connection with the main device 20.
In this way, the firmware upgrade method provided by the present application authenticates the authentication information of the host device 20 when the terminal device 10 receives the communication request sent by the host device 20 in response to its broadcast. If the authentication information is verified, it indicates that the main device 20 can access the terminal device 10, and the terminal device 10 can obtain the firmware upgrade file package through the main device 20 and upgrade the firmware thereof through the obtained firmware upgrade file package. If the authentication information is verified, it indicates that the master device 20 is not authorized to access the terminal device 10. Therefore, the security of the terminal device 10 during the firmware upgrade process can be further improved.
In another embodiment, the firmware upgrading method in the present application further includes, after step 205, the steps of: and verifying the acquired firmware upgrading file package, wherein the verification includes but is not limited to verifying whether the firmware upgrading file package is complete or not, whether a malicious plug-in is contained or not and the like. If the firmware upgrade package is verified, then step 206 is entered.
In this way, the terminal device 10 can be ensured to be updated accurately and safely when firmware is updated.
It will be understood by those skilled in the art that all or part of the steps of the method according to the above embodiments may be implemented by hardware associated with at least one program instruction, where the at least one program may be stored in a computer readable storage medium, and when executed, the at least one program may implement the steps of the firmware upgrade method according to any one of the embodiments of the present invention.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solution of the present invention may be substantially or partially embodied in the form of a software product, where the computer software product is stored in a storage medium (e.g., ROM/RAM, magnetic disk, optical disk), and includes instructions for enabling a terminal device (e.g., a mobile phone, a computer, a server, an air conditioner, or a network device) to execute the firmware upgrading method according to the embodiments of the present invention.
The foregoing is illustrative of embodiments of the present invention, and it should be noted that modifications and adaptations to those skilled in the art may be made without departing from the principles of the embodiments of the present invention and are intended to be within the scope of the present invention.
Claims (10)
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201910674063.8A CN112306514A (en) | 2019-07-24 | 2019-07-24 | Firmware upgrading method based on narrowband Internet of things, terminal equipment and computer readable storage medium |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201910674063.8A CN112306514A (en) | 2019-07-24 | 2019-07-24 | Firmware upgrading method based on narrowband Internet of things, terminal equipment and computer readable storage medium |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| CN112306514A true CN112306514A (en) | 2021-02-02 |
Family
ID=74329546
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN201910674063.8A Pending CN112306514A (en) | 2019-07-24 | 2019-07-24 | Firmware upgrading method based on narrowband Internet of things, terminal equipment and computer readable storage medium |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN112306514A (en) |
Cited By (9)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN113791804A (en) * | 2021-09-14 | 2021-12-14 | 中元汇吉生物技术股份有限公司 | Method, device, computer equipment and storage medium for parallel upgrade of multi-channel instruments |
| CN114020297A (en) * | 2021-11-05 | 2022-02-08 | 三川智慧科技股份有限公司 | Bluetooth-based intelligent water meter program upgrading method, device, equipment and medium |
| CN115145607A (en) * | 2021-03-29 | 2022-10-04 | 成都鼎桥通信技术有限公司 | UWB-based software upgrading method, device and equipment |
| WO2023035729A1 (en) * | 2021-09-13 | 2023-03-16 | 广州朗国电子科技股份有限公司 | Upgrade method and system for interactive electronic whiteboard |
| CN115951910A (en) * | 2022-12-06 | 2023-04-11 | 小米科技(武汉)有限公司 | Firmware upgrade method, device, electronic equipment and medium for air-conditioning equipment |
| CN116107603A (en) * | 2022-11-22 | 2023-05-12 | 北京深盾科技股份有限公司 | Firmware upgrading method and device, storage medium and electronic equipment |
| CN116301979A (en) * | 2023-03-03 | 2023-06-23 | 海信空调有限公司 | An air conditioner and an upgrade system for the air conditioner |
| US12079619B2 (en) | 2022-07-27 | 2024-09-03 | T-Mobile Usa, Inc. | Firmware-over-the-air (FOTA) update for wireless devices in an internet of things (IoT) network |
| CN120104159A (en) * | 2025-02-13 | 2025-06-06 | 苏州和光同耀智能科技有限公司 | Firmware upgrade method, device, electronic device and computer readable storage medium |
Citations (8)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN106775863A (en) * | 2016-12-09 | 2017-05-31 | 湖南长城银河科技有限公司 | A kind of method of remote automatic upgrading BIOS |
| CN107222532A (en) * | 2017-05-23 | 2017-09-29 | 努比亚技术有限公司 | A kind of radio firmware upgrade method, device and computer-readable recording medium |
| CN107247604A (en) * | 2017-05-17 | 2017-10-13 | 杭州魔猫科技有限公司 | A kind of charger baby software firmware update system and its update method |
| CN108021382A (en) * | 2017-12-22 | 2018-05-11 | 深圳华意隆电气股份有限公司 | A kind of embedded device remote update system, method and embedded device |
| CN109429205A (en) * | 2017-09-05 | 2019-03-05 | 西安中兴新软件有限责任公司 | A kind of narrowband Internet of Things upgrade method and device and system |
| CN109542485A (en) * | 2018-11-20 | 2019-03-29 | 北京千丁互联科技有限公司 | A kind of firmware upgrade method and its device based on bluetooth BLE equipment end |
| CN109861317A (en) * | 2017-11-30 | 2019-06-07 | 南京德朔实业有限公司 | Adapter, portable power system and control method |
| CN109982294A (en) * | 2019-03-08 | 2019-07-05 | 四川爱联科技有限公司 | The method that NBIot module is upgraded using bluetooth equipment |
-
2019
- 2019-07-24 CN CN201910674063.8A patent/CN112306514A/en active Pending
Patent Citations (8)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN106775863A (en) * | 2016-12-09 | 2017-05-31 | 湖南长城银河科技有限公司 | A kind of method of remote automatic upgrading BIOS |
| CN107247604A (en) * | 2017-05-17 | 2017-10-13 | 杭州魔猫科技有限公司 | A kind of charger baby software firmware update system and its update method |
| CN107222532A (en) * | 2017-05-23 | 2017-09-29 | 努比亚技术有限公司 | A kind of radio firmware upgrade method, device and computer-readable recording medium |
| CN109429205A (en) * | 2017-09-05 | 2019-03-05 | 西安中兴新软件有限责任公司 | A kind of narrowband Internet of Things upgrade method and device and system |
| CN109861317A (en) * | 2017-11-30 | 2019-06-07 | 南京德朔实业有限公司 | Adapter, portable power system and control method |
| CN108021382A (en) * | 2017-12-22 | 2018-05-11 | 深圳华意隆电气股份有限公司 | A kind of embedded device remote update system, method and embedded device |
| CN109542485A (en) * | 2018-11-20 | 2019-03-29 | 北京千丁互联科技有限公司 | A kind of firmware upgrade method and its device based on bluetooth BLE equipment end |
| CN109982294A (en) * | 2019-03-08 | 2019-07-05 | 四川爱联科技有限公司 | The method that NBIot module is upgraded using bluetooth equipment |
Cited By (11)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN115145607A (en) * | 2021-03-29 | 2022-10-04 | 成都鼎桥通信技术有限公司 | UWB-based software upgrading method, device and equipment |
| WO2023035729A1 (en) * | 2021-09-13 | 2023-03-16 | 广州朗国电子科技股份有限公司 | Upgrade method and system for interactive electronic whiteboard |
| CN113791804A (en) * | 2021-09-14 | 2021-12-14 | 中元汇吉生物技术股份有限公司 | Method, device, computer equipment and storage medium for parallel upgrade of multi-channel instruments |
| CN113791804B (en) * | 2021-09-14 | 2024-04-26 | 中元汇吉生物技术股份有限公司 | Method, device, computer equipment and storage medium for parallel upgrading of multiple instruments |
| CN114020297A (en) * | 2021-11-05 | 2022-02-08 | 三川智慧科技股份有限公司 | Bluetooth-based intelligent water meter program upgrading method, device, equipment and medium |
| US12079619B2 (en) | 2022-07-27 | 2024-09-03 | T-Mobile Usa, Inc. | Firmware-over-the-air (FOTA) update for wireless devices in an internet of things (IoT) network |
| CN116107603A (en) * | 2022-11-22 | 2023-05-12 | 北京深盾科技股份有限公司 | Firmware upgrading method and device, storage medium and electronic equipment |
| CN116107603B (en) * | 2022-11-22 | 2023-12-19 | 北京深盾科技股份有限公司 | Firmware upgrading method and device, storage medium and electronic equipment |
| CN115951910A (en) * | 2022-12-06 | 2023-04-11 | 小米科技(武汉)有限公司 | Firmware upgrade method, device, electronic equipment and medium for air-conditioning equipment |
| CN116301979A (en) * | 2023-03-03 | 2023-06-23 | 海信空调有限公司 | An air conditioner and an upgrade system for the air conditioner |
| CN120104159A (en) * | 2025-02-13 | 2025-06-06 | 苏州和光同耀智能科技有限公司 | Firmware upgrade method, device, electronic device and computer readable storage medium |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN112306514A (en) | Firmware upgrading method based on narrowband Internet of things, terminal equipment and computer readable storage medium | |
| KR102193181B1 (en) | Power sharing method and electronic device implementing the same | |
| US11989365B2 (en) | Electronic device including electronic pen and method of controlling communication connection between electronic device and electronic pen | |
| KR102177150B1 (en) | Apparatus and method for recognizing a fingerprint | |
| US8811897B2 (en) | Near field communication device and method of controlling the same | |
| KR102341531B1 (en) | Apparatus and method for a charging of electronic device using battery | |
| EP3402154A1 (en) | Service processing method, device, and system | |
| CN108197976B (en) | Reward issuing method, device and server | |
| WO2017185711A1 (en) | Method, apparatus and system for controlling smart device, and storage medium | |
| US20160379262A1 (en) | Service system and method for transmitting push message based on user location, user equipment and non-transitory computer readable storage medium having computer program recorded thereon | |
| WO2017118412A1 (en) | Method, apparatus and system for updating key | |
| EP3499918A1 (en) | Data sharing method and terminal | |
| KR102440088B1 (en) | Method for pairing devices using near field communication and electronic device using the same | |
| JPWO2012008108A1 (en) | Communication apparatus and communication method | |
| WO2015101273A1 (en) | Security verification method, and related device and system | |
| KR102314690B1 (en) | Device And Communication Connection Method Thereof | |
| CN106445309B (en) | Application download entry display method and device | |
| CN103970553A (en) | Control method for function upgrading of household appliance product | |
| CN113254038A (en) | Upgrading confirmation method, server, wire controller and mobile terminal | |
| CN105760203A (en) | Software upgrading method and terminal equipment | |
| KR20190066989A (en) | Electronic device transmitting data obtained from an external device based on identification information of a cover device to the cover device and control method thereof | |
| CN105740715A (en) | A security assessment method and terminal equipment | |
| CN111026408A (en) | A method, apparatus and computer storage medium for managing applications | |
| US20150379322A1 (en) | Method and apparatus for communication using fingerprint input | |
| CN115544464A (en) | Firmware burning method, device and system for micro-control chip and storage medium |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PB01 | Publication | ||
| PB01 | Publication | ||
| SE01 | Entry into force of request for substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| RJ01 | Rejection of invention patent application after publication | ||
| RJ01 | Rejection of invention patent application after publication |
Application publication date: 20210202 |