Software upgrading method of terminal equipment
A technology for terminal equipment and software upgrades, applied in the field of software upgrades, can solve problems such as data loss and achieve a good user experience
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example
[0017] First embodiment
[0018] See figure 1 , Which is a flowchart of the software upgrade method of the terminal device provided in the first embodiment. First, perform step 110 to start the upgrade process. Specifically, a mobile storage device can be connected to the terminal device first, and a predetermined button or a combination of buttons on the terminal device can be pressed to start the upgrade program built in the terminal device. The terminal device here may be, for example, a digital TV, a set-top box, a router, a home gateway, and so on. The terminal device may include a main control chip, a first memory, a second memory, and a USB interface. The first memory is the main memory and has a large space for storing the underlying system software and user data of the digital TV. User data includes, for example, installed software, plug-ins, usage records, and registration information. The second memory is used to store a small amount of unchanged information, such ...
Example
[0027] Second embodiment
[0028] Refer to figure 2 The second embodiment provides a software upgrade method for terminal equipment, which is similar to the software upgrade method of the first embodiment, except that the intermediate version has a password verification function in addition to the data backup function. Correspondingly, step 210 is included between step 140 and step 150 to verify the entered password. Only after the password verification is passed, the data backup and upgrade operations will continue, otherwise the upgrade process will end. The password here can be obtained by directly using the hardware information of the terminal device or using a certain algorithm to calculate the above hardware information. The hardware information may be, for example, the MAC address of the network card, the product serial number of the terminal device, and the like. These hardware information are generally unique, that is, a password is only valid for the terminal.
[0029...
Example
[0030] The third embodiment
[0031] Refer to image 3 The third embodiment provides a software upgrade method for terminal equipment, which is similar to the software upgrade method of the first embodiment, with the difference that step 310 is included between step 120 and step 130 to determine the intermediate version Whether the upgrade file is valid, the subsequent step 130 is performed only when the upgrade file of the intermediate version is valid, otherwise the upgrade process ends. Here, judging whether the upgrade file of the intermediate version is valid can be realized by reading the version number of the upgrade file. For example, it is considered valid only when the basic version of the intermediate version matches the version currently running on the terminal device.
[0032] In the software upgrade method of the terminal device of this embodiment, since the process of judging whether the intermediate version is valid is also included before the upgrade of the interm...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap