Changes for page Why can't the password access AT command after upgrade(-NB)?
Last modified by Mengting Qiu on 2024/08/27 18:17
Change comment:
There is no comment for this version
Summary
-
Page properties (1 modified, 0 added, 0 removed)
-
Attachments (0 modified, 2 added, 0 removed)
Details
- Page properties
-
- Content
-
... ... @@ -29,7 +29,6 @@ 29 29 * (% style="color:#037691; font-weight:bold" %)**AT+FDR**(%%)** **~/~/ Reset Parameters to Factory Default. 30 30 * (% style="color:#037691; font-weight:bold" %)**AT+FDR1**(%%)** **~/~/ Reset parameters to factory default values except for passwords.(new) 31 31 32 - 33 33 = 3. Version Confirmation = 34 34 35 35 ... ... @@ -60,38 +60,28 @@ 60 60 ))) 61 61 |(% style="width:210px" %)RS485-NB|(% style="width:150px" %)Before V1.0.8|(% style="width:150px" %)After V1.0.8 (including V1.0.8) 62 62 63 - 64 64 = 4. How to solve = 65 65 66 66 67 - == 4.1 Method1:Erase thechipbefore upgradingthefirmware==65 +Users can manually query the password via STM32CubeProgrammer. 68 68 69 69 70 -T heusercan choose to erase all contents before upgradingthe firmware andthen burn the new version ofthe firmware.Theuser can still usethe original password, but thismethodwill restoreall configurations to the default firmware Settings.68 +== 4.1 UART connection and firmware update methods == 71 71 72 -The chip can only be erased by updating the firmware through the UART TTL interface. See [[UART Connection>>url:http://wiki.dragino.com/xwiki/bin/view/Main/UART%20Access%20for%20LoRa%20ST%20v4%20base%20model/#H2.3UARTConnectionforSN50v3basemotherboard]]. 73 73 74 - Methodoferasingfull chipflashmemory71 +Users can query passwords only using the UART interface via the STM32CubeProgrammer. 75 75 76 - *ConnecttotheM32CubeProgrammer73 +See [[UART Connection>>url:http://wiki.dragino.com/xwiki/bin/view/Main/UART%20Access%20for%20LoRa%20ST%20v4%20base%20model/#H2.3UARTConnectionforSN50v3basemotherboard]]. 77 77 78 -[[image:image-20240827164813-1.png||height="457" width="791"]] 79 79 80 - *SelectErasefullchip flashmemory76 +update firmware through UART TTL interface : **[[Instruction>>url:http://wiki.dragino.com/xwiki/bin/view/Main/UART_Access_for_NB_ST_BC660K-GL/#H4.2UpdateFirmware28Assumethedevicealreadyhaveabootloader29]]**. 81 81 82 -[[image:image-20240827165549-2.png||height="462" width="800"]] 83 83 79 +== 4.2 query the password via STM32CubeProgrammer == 84 84 85 -After the erase is complete, download the new firmware directly. 86 86 87 - * updatefirmwarethrough UART TTL interface: **[[Instruction>>url:http://wiki.dragino.com/xwiki/bin/view/Main/UART_Access_for_NB_ST_BC660K-GL/#H4.2UpdateFirmware28Assumethedevicealreadyhaveabootloader29]]**.82 +Users can use the password address to query the password through STM32CubeProgrammer. 88 88 89 - 90 -== 4.2 Method 2: Update the firmware directly and query the password via STM32CubeProgrammer == 91 - 92 - 93 -If you do not want to erase the chip flash memory, you can also use the password address to query the password through STM32CubeProgrammer. 94 - 95 95 * The password address for old firmware(without FDR1 function) : **0x08019000** 96 96 * The password address for new firmware(with FDR1 function) : **0x08025D00** 97 97 ... ... @@ -105,7 +105,7 @@ 105 105 * Click "Device memory", enter **0x08019000** in "Address", and click "Read" 106 106 * Find the 0x08019000 address field and then read the current password as shown in the screenshot below. 107 107 108 -[[image:image-20240827171901-3.png||height="5 62" width="973"]]97 +[[image:image-20240827171901-3.png||height="528" width="912"]] 109 109 110 110 111 111 **Procedure for querying the password(new firmware):** ... ... @@ -112,8 +112,13 @@ 112 112 113 113 Refer to the old and new firmware division above, and run the firmware first after updating the firmware. 114 114 104 +* After the firmware upgrade is complete, switch back to the FLASH and reset the node to run the new firmware once. 105 +* Then place the switch at the ISP and connect to the STM32CubeProgrammer (same as when burning the firmware). 106 +* Click "Device memory", enter **0x08019000** in "Address", and click "Read" 107 +* Find the 0x08019000 address field and then read the current password as shown in the screenshot below. 115 115 116 116 110 +[[image:image-20240827180414-1.png||height="527" width="910"]] 117 117 118 118 119 119
- image-20240827175847-7.png
-
- Author
-
... ... @@ -1,0 +1,1 @@ 1 +XWiki.ting - Size
-
... ... @@ -1,0 +1,1 @@ 1 +310.1 KB - Content
- image-20240827180414-1.png
-
- Author
-
... ... @@ -1,0 +1,1 @@ 1 +XWiki.ting - Size
-
... ... @@ -1,0 +1,1 @@ 1 +311.7 KB - Content