-
公开(公告)号:US11074347B2
公开(公告)日:2021-07-27
申请号:US16298010
申请日:2019-03-11
Applicant: Itron, Inc.
Inventor: Adithya Krishna Murthy , Brett McDonald , Krishna Vinay Gambali , Daniel Sullivan , Kevin David Guthrie
Abstract: A delta file may be assembled for use in updating software on a networked device. The delta file may include at least one manifest, and each manifest may be associated with a subset of files (e.g., replacement and/or upgrade files for the networked device). The subset(s) of files may be selected based on a wide range of criteria. In an example, subsets may be selected based on rules that regulate when files are allowed to change. Subsets may also be defined based on the device associated with the files (e.g., a metrology device or a communications device). Any desired criteria/criterion may be used to define a subset of files. The delta file may be transmitted to the networked device. On the networked device, the subset(s) of files may be verified against data corruption, actions of bad actors, and/or unexpected changes at runtime.
-
公开(公告)号:US20200293658A1
公开(公告)日:2020-09-17
申请号:US16298010
申请日:2019-03-11
Applicant: Itron, Inc.
Inventor: Adithya Krishna Murthy , Brett McDonald , Krishna Vinay Gambali , Daniel Sullivan , Kevin David Guthrie
Abstract: A delta file may be assembled for use in updating software on a networked device. The delta file may include at least one manifest, and each manifest may be associated with a subset of files (e.g., replacement and/or upgrade files for the networked device). The subset(s) of files may be selected based on a wide range of criteria. In an example, subsets may be selected based on rules that regulate when files are allowed to change. Subsets may also be defined based on the device associated with the files (e.g., a metrology device or a communications device). Any desired criteria/criterion may be used to define a subset of files. The delta file may be transmitted to the networked device. On the networked device, the subset(s) of files may be verified against data corruption, actions of bad actors, and/or unexpected changes at runtime.
-