The present application is based on, and claims priority from, GB Application Number 0501889.0, filed Jan. 31, 2005, the disclosure of which is hereby incorporated by reference herein in its entirety.
The present invention relates to the updating of software on electronic appliances, and is particularly applicable to firmware updates in relatively low cost appliances such as mobile phones, personal digital assistants (PDAs) and digital cameras.
With many electronic appliances, functionality is frequently upgraded, and a process is needed to ensure that each appliance that is manufactured is updated, often before it is even used, or when it is first used, as well as later in the life of the appliance. For many appliances, particularly smaller appliances, the programs that determine the functionality are stored as firmware. In this case the firmware needs to be updated to upgrade the functionality. This may require updating during the manufacturing process, or after the manufacturing process, for example when the appliance is first used. Firmware changes made after pre-programmed components have been put onto printed circuit boards generally require a high bandwidth error free channel to transfer the data from the stored form of the upgrade into the device memory. Also it is desirable to make the upgrading process as simple as possible for the user to avoid human errors during upgrading.
It is known to download firmware from the internet using a PC and then to upload it onto an appliance, such as a mobile phone, over its serial digital port. However, this requires the user to be able to operate the PC to perform the upgrade, and the serial port is usually slow. It is also known to upgrade mobile phones over the air, i.e. over the mobile phone network. However this also tends to be slow.
It has also been proposed, in US2002140966A1 to provide upgrades for printing systems via an RFID tag attached to a replacement printer cartridge. However, this is only possible because replacement printer cartridges are required on a regular basis.
The present invention provides a method of updating software on an appliance that includes an interrogator for interrogating memory tags, the method comprising releasably attaching a memory tag to the appliance, updating the software from the memory tag, and removing the tag from the appliance.
The present invention further provides an appliance having a memory tag releasably attached to it, the appliance including memory having software stored therein, and a reading device arranged to read data from the tag, wherein the tag has a software update stored thereon.
The present invention still further provides a method of manufacturing an appliance comprising providing an appliance with software loaded thereon, releasably attaching a memory tag to the appliance, and loading a software update onto the tag, the software update being arranged for updating the software.
The present invention still further provides apparatus for updating software on an appliance, the apparatus comprising a memory tag having upgrade software stored thereon and being arranged to communicate the software wirelessly to a reader, and a carrier to which the tag is attached, the carrier carrying information relating to the upgrade software. Corresponding methods of distributing software updates and of updating software are also provided.
Preferred embodiments of the present invention will now be described by way of example only with reference to the accompanying drawings.
Referring to
The phone further includes a radio frequency (RF) interrogator 8 arranged to read data wirelessly from a memory tag operating at radio frequencies and upload data from it as will be described in more detail below. The interrogator 8 in this embodiment can also transmit data wirelessly to a memory tag, but in some cases an interrogator that can only read data could be used.
Referring to
Referring now to
Referring now to
The circuit 28 of the interrogator 8 comprises a signal generator 30 which generates a signal at the chosen frequency of 2.45 GHz. This signal passes via an amplitude modulator 32, where it is amplitude modulated with data to be written to the memory tag 14, and a splitter 34, to an antenna L1 and capacitor C1 which form a tuned circuit. The component values of L1 and C1 being chosen to tune it to 2.45 GHz, as for the tuned circuit in the memory tag 14, in order to maximise inductive coupling between the two circuits, and thus transmission of power and data to the memory tag 14.
The splitter 34 takes a part (as much as 50% of the power) of the amplitude modulated signal, for use as a reference signal, and passes it to a multiplier 36. The signal received from the memory tag 14, via the tuned circuit L1/C1 and divided from the outgoing signal by a coupler 38, is also passed to the multiplier 36. Thus the transmitted amplitude modulated signal and received signal are multiplied and then pass through a low pass filter 40 to provide a signal comprising the phase modulation from the memory tag 14 and thus indicative of the data read from the memory tag 14.
One amplitude modulation format which may be used to apply the data to be transmitted to the 2.45 GHz signal is Amplitude Shift Keying (ASK) which only requires the simple envelope detector D2/C5 described in the circuit 20. However, other amplitude modulation formats may also be employed. Further alternatives are Frequency Shift Keying (FSK) and Phase Shift Keying (PSK) that provide near constant envelope modulation, that is without any significant amplitude modulation, however these options have more complex demodulation requirements and thus demand more complex circuitry in the memory tag 14.
With the apparatus of memory tag 14 and interrogator 8 described above power transfer of around 25% can be achieved with a distance of around 1.8 mm between the antennae L1 and L2, of the interrogator 8 and memory tag 14 respectively. This is sufficient to transfer enough power to the memory tag 14 for it to operate.
Referring to
At another point in the production of the phone 1, a software upgrade is uploaded onto the memory tag 14a using a further read/write device 46. This is essentially the same as the interrogator 8 in the phone 1, and is arranged to transmit a firmware upgrade to the memory tag 14a using RF transmission. The upgrade includes a reference or identity code that is unique to that upgrade. In this case this step is carried out at the end of the production process. This enables the most up-to-date upgrade to be uploaded to the memory tag 14a just before it leaves the factory. It will also be appreciated that uploading the upgrade to the tag 14a enables the upgrade to be provided to the phone 1 without having to power up the phone.
The phone is then shipped to a distributor, and distributed to one of a number of retail outlets where it is sold to a user. When the user first switches on the phone 1 to power it up, he is instructed to input a predetermined command to the phone using the keypad 3, and this input is recognised by the update control program which is arranged to control the interrogator 8 on the phone 1 to interrogate the tag 14a and upload the update from it. The update control program checks the reference code associated with the update to determine whether the update is appropriate for the firmware currently on the phone. If it is, the update control program controls the storing of the upgrade in the ROM 6 of the phone 1 thereby updating the firmware, and hence the functionality of the phone 1.
When the update is complete the update control program is arranged to produce an output to the user, on the screen 4, to indicate this, and the user then removes the tag 14a from the phone 1, together with its coating 42. This uncovers the interrogator 8 so that it can be used in the normal manner as a read/write device to read data from, and write data to, other memory tags.
The above process is illustrated in
Referring to
Referring to
Referring to
The update pack 300 may be issued, for example, to all users of a phone running a particular application as soon as an update to the application is available. This can be achieved provided there is a database identifying users and their addresses to which the upgrade pack should be sent, or at least a contact address to which an offer can be sent, which may be a postal address of an email address. Provided such a database does exist, then the supplier of the application only needs to identify from the database those customers or users for whom the update is appropriate and send the update pack 300 to each of them. Alternatively, once the appropriate customers have been identified, they can be offered the update, either free or for payment of a predetermined price, and supplied with the update pack only once they have paid, or agreed to pay, for it. A further possibility is for the update pack to be offered to customers as a general offer, for example from an advertisement for the update, or by means of an email sent to each customer. In this case the customers need to identify that the update is available and suitable for them, and then purchase the update from the supplier of the update, for example by making payment and identifying the update that they require.
When the user has obtained the update pack, they first check the information 308 provided on the carrier 302 to identify whether the memory tag 304 or the memory tag 306 carries an upgrade that is suitable for their phone. When they have identified a tag, for example tag 304, with a suitable upgrade stored on it, the phone 1 is held over the carrier 302 so that the interrogator 8 is close to the appropriate tag 304. Then in order to initiate the update, the user inputs an update command to the phone 1 using the keypad 3. The update control program on the phone is arranged to recognise this command, and respond by initiating the update process. It does this by controlling the interrogator 8 to interrogate the tag 304, and storing the update software that is received in response from the tag 304, in memory. This update process can be carried out with the tag 304 acting in a passive manner, as described above in relation to
The memory tags 14 have an external dimension D around 1 mm, as described above, and the interrogator 8 is arranged to communicate with them only over a relatively short range, in this example of approximately 2D, i.e. when the interrogator 8 is in close proximity with the memory tag 14. This is because the interrogator 8 and memory tag 14 are arranged to communicate via near-field inductive interaction. However, the distance over which the interrogator 8 and memory tag 14 will communicate effectively will clearly vary with the exact details of their construction, and it may therefore be up to 10D i.e. 10 mm. Distances greater than this would limit the ability to use a plurality of memory tags 14 on a single sheet of paper 10, or other item, due to the distances which would be necessary between the memory tags 14 to ensure that the interrogator 8 does communicate with the desired memory tag 14 out of a number present. To ensure that communication is with the correct memory tag 14 in every circumstance a communication distance of 5D or less is preferable. This supports a natural and robust user interaction where the user finds the labelling text appropriate to his situation and places the reader probe on a tag collocated with the label. Only the proximate tag is energised and thus the appropriate software update is loaded. In practice hundreds of tags could be affixed to an A4 sheet of paper with no danger of unwanted interaction.
The memory tags 14 will preferably have a data rate of 10 Mbits s, which is two orders of magnitude faster than is typical in prior art devices. Such data rate would enable the interrogator 8 to be held over the memory tag for a very short period of time (“brush and go”) for the data to be read or written as appropriate.
Although the memory tags 14 described above operate at 2.45 GHz it should be understood that memory tags operating at other frequencies may be used to implement the invention. Factors affecting the choice of operating frequency for the memory tags are: a) government regulations concerning radio frequency transmissions; b) adequate bandwidth (consistent with government regulations); c) frequency high enough to render the physical size of components in the memory tag small enough to keep the area of silicon required low (and hence the cost to manufacture low); d) frequency low enough to provide adequate performance when using low-cost high-volume CMOS technology to manufacture memory tag.
While in the embodiments just described the carrier on which the memory tags are embedded are sheets of paper, it will be appreciated that other materials are also suitable. For example, sheets of other material such as plastics can be used. These have the advantage that the information relating to the updates can easily be applied to the carrier, for example by printing.
While all of the embodiments described above relate to mobile phones, it will be appreciated that the invention is also applicable to other electronic appliances, such as digital cameras and PDAs.
Number | Date | Country | Kind |
---|---|---|---|
0501889.0 | Jan 2005 | GB | national |