<
From version < 10.1 >
edited by Mengting Qiu
on 2024/08/27 17:58
To version < 12.1 >
edited by Mengting Qiu
on 2024/08/27 18:08
>
Change comment: There is no comment for this version

Summary

Details

Page properties
Content
... ... @@ -29,7 +29,6 @@
29 29  * (% style="color:#037691; font-weight:bold" %)**AT+FDR**(%%)**       **~/~/ Reset Parameters to Factory Default.
30 30  * (% style="color:#037691; font-weight:bold" %)**AT+FDR1**(%%)**     **~/~/ Reset parameters to factory default values except for passwords.(new)
31 31  
32 -
33 33  = 3. Version Confirmation =
34 34  
35 35  
... ... @@ -60,38 +60,28 @@
60 60  )))
61 61  |(% style="width:210px" %)RS485-NB|(% style="width:150px" %)Before V1.0.8|(% style="width:150px" %)After V1.0.8 (including V1.0.8)
62 62  
63 -
64 64  = 4. How to solve =
65 65  
66 66  
67 -== 4.1 Method 1: Erase the chip before upgrading the firmware ==
65 +Users can manually query the password via STM32CubeProgrammer.
68 68  
69 69  
70 -The user can choose to erase all contents before upgrading the firmware and then burn the new version of the firmware. The user can still use the original password, but this method will restore all configurations to the default firmware Settings.
68 +== 4.1 UART connection and firmware update methods ==
71 71  
72 -The chip can only be erased by updating the firmware through the UART TTL interface. See [[UART Connection>>url:http://wiki.dragino.com/xwiki/bin/view/Main/UART%20Access%20for%20LoRa%20ST%20v4%20base%20model/#H2.3UARTConnectionforSN50v3basemotherboard]].
73 73  
74 -Method of erasing full chip flash memory
71 +Users can query passwords only using the UART interface via the STM32CubeProgrammer.
75 75  
76 -* Connect to the STM32CubeProgrammer
73 +See [[UART Connection>>url:http://wiki.dragino.com/xwiki/bin/view/Main/UART%20Access%20for%20LoRa%20ST%20v4%20base%20model/#H2.3UARTConnectionforSN50v3basemotherboard]].
77 77  
78 -[[image:image-20240827164813-1.png||height="457" width="791"]]
79 79  
80 -* Select Erase full chip flash memory
76 +update firmware through UART TTL interface : **[[Instruction>>url:http://wiki.dragino.com/xwiki/bin/view/Main/UART_Access_for_NB_ST_BC660K-GL/#H4.2UpdateFirmware28Assumethedevicealreadyhaveabootloader29]]**.
81 81  
82 -[[image:image-20240827165549-2.png||height="462" width="800"]]
83 83  
79 +== 4.2 query the password via STM32CubeProgrammer ==
84 84  
85 -After the erase is complete, download the new firmware directly.
86 86  
87 -* update firmware through UART TTL interface : **[[Instruction>>url:http://wiki.dragino.com/xwiki/bin/view/Main/UART_Access_for_NB_ST_BC660K-GL/#H4.2UpdateFirmware28Assumethedevicealreadyhaveabootloader29]]**.
82 +Users can use the password address to query the password through STM32CubeProgrammer.
88 88  
89 -
90 -== 4.2 Method 2: Update the firmware directly and query the password via STM32CubeProgrammer ==
91 -
92 -
93 -If you do not want to erase the chip flash memory, you can also use the password address to query the password through STM32CubeProgrammer.
94 -
95 95  * The password address for old firmware(without FDR1 function) : **0x08019000**
96 96  * The password address for new firmware(with FDR1 function) : **0x08025D00**
97 97  
... ... @@ -105,7 +105,7 @@
105 105  * Click "Device memory", enter **0x08019000** in "Address", and click "Read"
106 106  * Find the 0x08019000 address field and then read the current password as shown in the screenshot below.
107 107  
108 -[[image:image-20240827171901-3.png||height="562" width="973"]]
97 +[[image:image-20240827171901-3.png||height="528" width="912"]]
109 109  
110 110  
111 111  **Procedure for querying the password(new firmware):**
... ... @@ -112,8 +112,13 @@
112 112  
113 113  Refer to the old and new firmware division above, and run the firmware first after updating the firmware.
114 114  
104 +* After the firmware upgrade is complete, switch back to the FLASH and reset the node to run the new firmware once.
105 +* Then place the switch at the ISP and connect to the STM32CubeProgrammer (same as when burning the firmware).
106 +* Click "Device memory", enter **0x08019000** in "Address", and click "Read"
107 +* Find the 0x08019000 address field and then read the current password as shown in the screenshot below.
115 115  
116 116  
110 +[[image:image-20240827180414-1.png||height="527" width="910"]]
117 117  
118 118  
119 119  
image-20240827180414-1.png
Author
... ... @@ -1,0 +1,1 @@
1 +XWiki.ting
Size
... ... @@ -1,0 +1,1 @@
1 +311.7 KB
Content
Copyright ©2010-2024 Dragino Technology Co., LTD. All rights reserved
Dragino Wiki v2.0