Changes for page Why can't the password access AT command after upgrade(-NB)?
Last modified by Mengting Qiu on 2024/08/27 18:17
Change comment:
There is no comment for this version
Summary
-
Page properties (1 modified, 0 added, 0 removed)
Details
- Page properties
-
- Content
-
... ... @@ -70,11 +70,12 @@ 70 70 71 71 Users can query passwords only using the UART interface via the STM32CubeProgrammer. 72 72 73 -See **[[UART Connection>>url:http://wiki.dragino.com/xwiki/bin/view/Main/UART%20Access%20for%20LoRa%20ST%20v4%20base%20model/#H2.3UARTConnectionforSN50v3basemotherboard]]**.73 +See [[UART Connection>>url:http://wiki.dragino.com/xwiki/bin/view/Main/UART%20Access%20for%20LoRa%20ST%20v4%20base%20model/#H2.3UARTConnectionforSN50v3basemotherboard]]. 74 74 75 -update firmware through UART TTL interface :** [[Instruction>>url:http://wiki.dragino.com/xwiki/bin/view/Main/UART_Access_for_NB_ST_BC660K-GL/#H4.2UpdateFirmware28Assumethedevicealreadyhaveabootloader29]]**. 76 76 76 +update firmware through UART TTL interface : **[[Instruction>>url:http://wiki.dragino.com/xwiki/bin/view/Main/UART_Access_for_NB_ST_BC660K-GL/#H4.2UpdateFirmware28Assumethedevicealreadyhaveabootloader29]]**. 77 77 78 + 78 78 == 4.2 query the password via STM32CubeProgrammer == 79 79 80 80 ... ... @@ -98,7 +98,7 @@ 98 98 99 99 **Procedure for querying the password(new firmware):** 100 100 101 -Refer to [[the old and new firmware division>>http://wiki.dragino.com/xwiki/bin/view/Why%20can%27t%20the%20password%20access%20AT%20command%20after%20upgrade%28-NB%29%3F/#H3.A0VersionConfirmation]]above, and run the firmware first after updating the firmware.102 +Refer to the old and new firmware division above, and run the firmware first after updating the firmware. 102 102 103 103 * After the firmware upgrade is complete, switch back to the FLASH and reset the node to run the new firmware once. 104 104 * Then place the switch at the ISP and connect to the STM32CubeProgrammer (same as when burning the firmware). ... ... @@ -105,6 +105,7 @@ 105 105 * Click "Device memory", enter **0x08019000** in "Address", and click "Read" 106 106 * Find the 0x08019000 address field and then read the current password as shown in the screenshot below. 107 107 109 + 108 108 [[image:image-20240827180414-1.png||height="527" width="910"]] 109 109 110 110