Device and method for updating firmware of a peripheral device

ABSTRACT

An electronic device executes a software application that includes instructions for updating firmware of a peripheral device and one or more firmware images. The electronic executes the firmware update instructions to initiate the firmware update of the peripheral device and transfers a firmware image from the software application to the peripheral device according to a response from the peripheral device. The software application sends information to the peripheral device for verifying the transferred firmware image and causes the peripheral device to use the transferred firmware image upon successful verification.

This disclosure claims the benefit of priority, under 35 U.S.C. §120, toU.S. Provisional Application No. 61/813,203, the contents of which arehereby incorporated in their entirety by reference thereto.

FIELD

The present application relates to communication between an electronicdevice and a device peripheral to the electronic device. Morespecifically, the present application relates to update of firmware usedby the peripheral device. Even more specifically, the presentapplication includes embodiments for updating firmware executed by aprotective case for an electronic device, the protective case includinga circuitry for supplementing power for the electronic device.

BACKGROUND

Many types of portable electronic devices are used for business,information, or entertainment purposes. Portable electronic devices mayinclude smartphones, tablets, computers, cameras, video players, mobilecommunication devices, electronic media readers, audio players, handheldscanners, two-way radios, global positioning system (GPS) devices, andother types of electronic computing or communication devices, includingcombinations of the above-identified or other devices. Moreover, aportable electronic device may include one or more processors configuredto execute mobile application software, referred to colloquially (andherein) as an “app”. When executed by a processor, an app may operateas, for example, a simple electronic game, word processing feature,internet browser, media player or other operation. Typically the apppresents graphical information to a user of the portable electronicdevice, but may also operate in the background to record and/or processdata or sensory information.

A portable electronic device may engage physically and/or electronicallywith a device that is peripheral thereto (a peripheral device). Forexample a protective enclosure, as peripheral device, may enclose andprotect from damaging force and/or elements a portable electronic devicehaving comparatively sensitive or fragile components. Such componentsmay include, for example, electronic connectors, circuitry, sensors, orglass screens, which can be easily damaged if the device is exposed toelements and/or forces. A user may install a protective enclosure havinga robustness chosen to provide a corresponding degree of protection forthe user's phone. Other types of devices (e.g., docking stations, remotecontrol devices, printers, etc., to name a few) may constitute aperipheral device.

In some instances circuitry of a peripheral device may executeinstructions of a firmware image stored in a memory portion of theperipheral device. The firmware is read from the memory portion andexecuted by a processor or microcontroller of the peripheral device forperformance of the peripheral device's intended function(s). Forexample, a protective enclosure may include a processor configured, viacorresponding firmware, for monitoring and managing charge/discharge ofa battery included in the protective enclosure for efficient use by theportable electronic device enclosed.

SUMMARY

Embodiments introduced herein include devices, methods and systems withvarious components for automatically updating firmware of a peripheraldevice when a user app is updated. In addition, instructions aredisclosed that when executed by a processor direct the processor toperform the methods or variations thereof, or other operations describedherein. While illustrative embodiments are disclosed, those of ordinaryskill in the art will recognize still other embodiments apparent fromthe following detailed description. As will be realized, the embodimentsare capable of modification in various aspects, all without departingfrom the scope of the present disclosure. Accordingly, the drawings anddetailed description are to be regarded as illustrative in nature andnot restrictive.

BRIEF DESCRIPTION OF THE DRAWINGS

Embodiments of the present invention will be described and explainedthrough the use of the accompanying drawings in which:

FIG. 1 shows a perspective view of a protective case, as peripheraldevice for a portable electronic device;

FIG. 2 shows a top-front perspective view of the disassembled protectivecase, as peripheral device for a portable electronic device, togetherwith a portable electronic device;

FIG. 3 shows a bottom-rear perspective view of the disassembledprotective case, as peripheral device for a portable electronic device,together with a portable electronic device;

FIG. 4 shows a bottom-rear, partially-exploded perspective view of backshell portion of the protective case, as peripheral device for aportable electronic device;

FIG. 5 shows a top-front, partially-exploded perspective view of backshell portion of the protective case, as peripheral device for aportable electronic device

FIG. 6 illustrates system components for updating firmware in aperipheral device;

FIG. 7A is a block diagram showing elements of an app, includinginstructions for execution by a portable electronic device;

FIG. 7B illustrates a structure for a firmware image provided in an app;

FIG. 8 illustrates an arrangement for memory of a peripheral device,according to a disclosed embodiment;

FIG. 9 is a flow chart for a firmware update process portion of a mobileapp for execution by a portable electronic device;

FIGS. 10A and 10B provide flow charts for peripheral device instructionsfor updating firmware in the peripheral device; and

FIGS. 11A and 11B are communication diagrams illustrating communicationbetween a portable electronic device and peripheral device during afirmware update, according to disclosed embodiments.

DETAILED DESCRIPTION

Among other embodiments, the present disclosure details a peripheraldevice, for a portable electronic device, and a method for updatingfirmware for execution by the peripheral device. A peripheral device fora portable electronic device may include circuitry that performs afunction separate from and/or complementary to functions performed bythe portable electronic device. For example, a peripheral device may bea protective enclosure that includes a battery and circuitry forsupplementing a battery of the portable electronic device.

For a variety of reasons it may become appropriate to change or replacefirmware of the peripheral device in order to, for example, add,enhance, limit, change, or repair existing functions performed by theperipheral device. Firmware updates may be effected by physicallyreplacing media (e.g., flash memory) upon which the firmware is stored,or by “flashing” the existing media with a new firmware image to replacethe existing firmware image. Physical replacement of firmware media isnot convenient and may be technically unfeasible for a non-technician,and conventional flashing techniques for devices peripheral to portableelectronic devices require significant interaction by the user.

To flash the conventional peripheral device the user often mustdeliberately perform a number of steps that may be cumbersome andinconvenient. For example, in many cases the user must search for,select, and obtain a firmware update image and means to load the updateimage to the peripheral device. The user may also be required tomanipulate both the peripheral device and the means for updating into anupdate configuration, cease other operation of the peripheral deviceduring the update, etc. These requirements limit the user's mobility,consume the user's time and attention to download or select a firmwareimage to flash, deliberately connect/configure the peripheral device andupdate means, and start the program to flash the firmware image.

Moreover, for any of several reasons a peripheral device conventionallycannot be operated during such update. For example, the existingfirmware may be overwritten, thus necessitating that operation of theperipheral device cease prior to update. The process typically includesmany risks, and can result in rendering the unsuccessfully flasheddevice permanently inoperable (commonly termed “bricked”).

In some instances, a user may install software on their electronicdevice, which may be used to identify a firmware image hosted on aseparate server, and permit the user to download and install a newfirmware image. However, this method nevertheless requires the user todeliberately engage the software to check for and identify a differentfirmware image, elect whether or not to obtain the identified firmwareimage, and choose an appropriate moment for updating, which as notedabove may render the peripheral device unusable for a period of time.Accordingly, users may be disinclined to update the firmware of theirperipheral device despite benefits of such update.

This disclosure addresses shortcomings of the conventional updatingmethodology. FIGS. 1-5 illustrate, as an example of a peripheral device,a battery case 100 for a portable electronic device 200. Firmware ofbattery case 100 may be updated according to the present disclosure. Incertain embodiments the battery case 100 may include a number of partsthat can be assembled into a whole. FIG. 1 illustrates such a multi-partbattery case 100 in an assembled state. As shown in FIG. 2's explodedtop-front view, in non-limiting embodiments a battery case 100 mayinclude multiple enclosure parts, including a front shell 110 and a backshell 115 which may be assembled to enclose a portable electronic device200 such as a smartphone. A stretchable cushion layer 120 is configuredto fit snugly over the assembled back and front shells. The battery case100 is not limited to this configuration, however, and one of ordinaryskill in the art will recognize that a battery case may come in manyconfigurations including single piece, two-piece slider, cases having nostretchable cushion layer, no front shell, etc.

FIG. 3 provides a bottom-rear exploded view complementing FIG. 2. Theback shell 115 exposes a case power connector 420 which is part ofcircuitry 400 (shown in FIGS. 4-5). Although shown at a bottom portionof the case, it will be appreciated that the case power connector 420 isnot limited to this location. Moreover, the case power connector may bepositioned to be sealed behind a dustproof, waterproof, and/orwater-resistant cover in some embodiments.

Also illustrated in FIG. 3 is a bottom portion of portable electronicdevice 200, which includes a device connector 205. As will becomeapparent, device connector 205 may be used to interface with circuitryof the battery case 100.

FIG. 4 provides a bottom-rear exploded view of back shell 115 in oneembodiment of a peripheral device, a battery case for a portable phone.In the battery case described above, back shell 115 may enclosecircuitry 400 between an inner back shell portion 450 and an outer backshell portion 460, which can be sealed together to enclose thecircuitry. Circuitry 400 may include a battery 405 electricallyconnected to a circuit board 410, which circuit board may, asillustrated, include multiple portions such as main circuit board 412and/or interface circuit board 414. The circuit board includes amicroprocessor or microcontroller 416 and non-volatile memory 418. Inthe figures, the microprocessor/microcontroller 416 and non-volatilememory 418 are integrated into a same IC package. However, in otherconfigurations (not shown), the microprocessor/microcontroller 416 andnon-volatile memory 418 may be provided separately. Non-volatile memory418 may include read-only memory (ROM) such as electrically erasableprogrammable read-only memory (EEPROM), and/or other non-volatile memorysuch as flash memory.

Non-volatile memory 418 is, in disclosed embodiments, arranged to have aportion dedicated to firmware. That is, the memory portion is sized andconfigured to hold a firmware image that includes instructions for theoperation of the peripheral device. As described below in furtherdetail, the memory 418 may include multiple portions for alternativefirmware images, and may be updated in response to commands and datafrom the portable electronic device 100.

The circuit board 410 may include the case power connector 420 whichmay, for example, be used to connect the battery case 100 to an externalpower supply and, in certain configurations, to a computer for datatransfer through the case 100 to the portable electronic device 200. Insome embodiments the case power connector 420 may use USB, LIGHTNINGand/or other connectors or communication protocols to convey powerand/or communication signals from a computer or other device.

FIG. 5 illustrates a top-front exploded view of back shell 115. Thecircuit board 410 may further include a case interface connector 425 forinterfacing with device connector 205 of the portable electronic device200. This interface will be discussed in further detail below. As willbe appreciated by one of ordinary skill in the art, the circuitry 410may include other well-known components that provide specific and/orcomplementary functionality, e.g., for communications or specificsensors, but which is not described in detail in the present disclosure.

FIGS. 1-5 should not be construed as limiting the size, shape, locationor physical contours of a peripheral device, circuit board, or any partsthereof. One having ordinary skill in the art will appreciate that acircuit board, for example, may be modified and arranged to accommodatevarious constraints on the casing in which it resides. A battery case,for example, may be constructed to conform to physical constraints of aparticular portable electronic device or class of portable electronicdevices. It will be appreciated that the circuit board may be positionedat the top, bottom, or any other portion of the peripheral device,depending on space and/or design preferences and/or on the position of aconnector on the corresponding portable electronic device(s). Thecircuit board 410 could, for example, be positioned in a central portionof a battery case 100, or an electrical connection may be made betweenthe circuit board 410 and a case interface connector 425 positioned at atop end or side portion of a battery case 100 by way of a wire, cable,and/or flex circuit.

This disclosure provides a description in which firmware for aperipheral device, such as the battery case described above, may beupdated. For such update, the peripheral device 100 and portableelectronic device 200 are connected, where case interface connector 425and device connector 205 are joined to accommodate electrical and datacommunication therethrough. The portable electronic device 200 maypresent commands such as firmware update commands, responses, and datasuch as firmware through device connector 205 and through case interfaceconnector 425 for receipt by, e.g., microprocessor/microcontroller 416or other appropriate communication circuitry. Likewise,microprocessor/microcontroller 416 may present commands, responses, anddata through case interface connector 425, and through device connector205 for processing by the portable electronic device 200. In certainconfigurations data and/or power received at case power connector 420from an external source may be passed through directly to the portableelectronic device 200. Likewise data from portable electronic device 200directed to an external destination may be passed through the peripheraldevice 100 for use by the external destination.

As noted above, a peripheral device may include amicroprocessor/microcontroller such as microprocessor/microcontroller416 of FIG. 4, which typically executes instructions read from anon-volatile memory, such as memory 418. In brief, the presentdisclosure details a process in which a portable electronic deviceobtains an app that provides functions to be performed by the portableelectronic device, new (update) firmware and instructions for executinga firmware update using the updated firmware. When executed, thefunctions of the app performed by the portable electronic devicetypically include a function related to the peripheral device.

In one non-limiting example of a system 600 for updating firmware of aperipheral device, illustrated in FIG. 6, an electronic device 610(corresponding to portable electronic device 200 of FIGS. 2, 3) obtains,via a physical (e.g., wired) or wireless connection to a carrier networkor business network, an app 620 from a remote app repository 630. Theelectronic device 610 may store the app 620 in a memory 612(corresponding to memory 418 of FIG. 4) for execution. An updatedfirmware image included in the app is transferred to peripheral device640, which under conditions described below stores the firmware inmemory 642 and causes execution of the newly stored firmware byprocessor 644.

The app 620 may include, as illustrated in FIG. 7A, primary instructions710, secondary instructions 720, a first updated firmware image A, 730,and in certain embodiments at least a second updated firmware image B,740. The primary instructions 710 provide features executed by theportable electronic device 610, for example the display and monitoringof battery charge levels in a battery of the electronic device 610and/or of the peripheral device 640. The secondary instructions 720,being configured for communication with and data transfer to theperipheral device, require a physical (or at least logical) connectionwith the peripheral device 640, and when successfully executed cause oneof the firmware images 730, 740 to be loaded to peripheral device 640 tobe executed by peripheral device 640 instead of firmware previouslyexecuted by peripheral device 640. Embodiments of this firmware updateprocess are illustrated in FIGS. 9-11 described below.

As shown in FIG. 7B, the firmware image 730 (and 740) may be formed fromseveral firmware image portions 732, each firmware image portion 732including at least a header 734, firmware image data 736, and a checksum738. The header 734 may include information identifying a location forthe firmware image portion 732 to be written in memory 418. The checksum738 may be pre-calculated from the header 734 and firmware image data736 or from only the firmware image data 736.

Returning to FIG. 6, app repository 630 may be a commercial apprepository, such as the APPLE “APP STORE”, “GOOGLE PLAY”, and/or otherwell-established app repositories. Alternatively, the app may beobtained from a private repository or “side-loaded” to the portableelectronic device 610, e.g., via a removable storage medium (not shown).

When executed by a processor (not shown) of the portable electronicdevice 610, the primary instructions 710 of app 620 may cause theportable electronic device 610 to perform functions related to theperipheral device 640. For example, in an embodiment in which theperipheral device is a battery case (such as battery case 100 describedabove), the app 620 may perform functions related to the features of thebattery case, such displaying a charge level of a battery located in theportable electronic device and/or the peripheral device. Depending oncircumstances, the app 620 may function in cooperation with datacommunicated from the peripheral device 640, or may functionindependently. For example, in an embodiment in which peripheral device640 is a battery case, the app 620 may, even when not in communicationwith the battery case, display charge level of a battery in the portableelectronic device 610, or display charge history data. However, when incommunication with the peripheral device 640, the app 620 may displaydata received from the peripheral device 640, such as charge level of abattery in a battery case, times for charging the portable electronicdevice battery, etc., and may provide data to the battery case.

The secondary instructions 720 of app 620 may, when executed by theportable electronic device 610, cause a firmware image update in theperipheral device 640. In a disclosed embodiment memory 642 includes atleast two memory blocks that can hold firmware images. In FIG. 8 isillustrated a memory layout showing a “high” memory block 805 and a“low” memory block 810, each of which is of sufficient dimension to holda firmware image for the peripheral device 640. Here, “high” and “low”may refer to relative locations or address numbers in the memory 642 orto relative locations in common memory diagrams (e.g., FIG. 8). Indisclosed embodiments each memory block is a continuous portion ofmemory 642, of a same size and mutually exclusive of other memoryblocks. It is considered that the memory blocks alternatively may beconfigured as discontinuous portions of memory 642, with jumps toaddress the discontinuities being coded into the firmware.

Although the following description generally accounts for two memoryblocks, one of ordinary skill in the art will appreciate that thedisclosure may extend to more than two memory blocks. In addition, aboot section 815 of the memory 642 may include a designation of which ofthe memory blocks 805 or 810 should be executed. The peripheral device640 uses only one firmware image a time. Thus, at a given time afirmware image may be executed from a “high” memory block designated forexecution while an updated firmware image may be loaded into the “low”memory block (or vice versa).

Each of the updated firmware images 730, 740 may include identicalinstructions for the peripheral device, but be targeted for a differentmemory block. For example, firmware image A (730) may be targeted to thehigh memory block 805, whereas firmware image B (740) may be targeted tothe low memory block 810.

One of ordinary skill in the art will recognize that more than twomemory blocks may be used, and the app may thus include more than twoupdated firmware images. In embodiments having more than two memoryblocks, the app 620 may include a set of firmware image corresponding toeach of the more than two memory blocks. It will also be recognized thatthe app 620 may include a second set of updated firmware images thatprovide instructions that are different from instructions provided inthe first set of updated firmware images for the peripheral device.

For example, in some embodiments, peripheral device 640 may includehardware capable of disparate functions. One memory block of peripheraldevice 640 may store firmware which causes the peripheral device toperform as a card reader, while another memory block may includefirmware which can cause the peripheral device to perform as a bar codescanner. In peripheral devices such as this having multiple“personalities”, the app 620 may include alternative (or cooperative)primary instructions 710 according to current peripheral devicepersonality, and can cause the peripheral device 640 to load acorresponding firmware image from a memory block. Alternatively,different firmware image sets may be provided in the app to includevarious levels of functionality. For example, one firmware image mightenable a full set of features, while another firmware image may enableonly a partial set of the features.

FIGS. 9-10 present flow charts to illustrate a firmware update processas found in the secondary instructions 720 and within each firmwareimage 730, 740. The flow chart of FIG. 9 presents a method for anelectronic device such as electronic device 610 or portable electronicdevice 100 (referred to in the description of FIG. 9 below simply as“electronic device”. The flow chart of FIG. 10 presents a method for aperipheral device being updated, such as peripheral device 640 orbattery case 200 (referred to below simply as “peripheral device”).

In FIG. 9, the method of flow chart 900 begins with the electronicdevice checking whether threshold parameters are satisfied S902. Suchparameters may include a determination that a peripheral device isconnected to and in communication with the portable electronic device,determination of whether or not a limiting function is operating,whether the update has already been performed or the firmware is notdifferent from that currently executed by the peripheral device, etc. Inthe instance that the peripheral device is a battery case 100 asdiscussed above, a threshold parameter may include a requirement of apredetermined minimum charge level for the battery in the peripheraldevice and/or in the portable electronic device in order to proceed. Ifa parameter is not satisfied, the update process may wait for a lateropportunity (“N” at S902), or may abort. In another alternative, a usermay be notified of the current and updated firmware versions and mayselect whether or not to proceed with a firmware update process. Thisalternative may enable the user to select updating with an older versionof firmware or even to re-flash the same version of firmware.

If the parameters are satisfied (“Y” at S902), the electronic devicetransmits (S904) an update notification to the peripheral deviceindicating that a firmware update is forthcoming. The updatenotification may identify a specific memory block of a memory (such asmemory 642 or memory 418), of the peripheral device. For example, theupdate notification may identify the “high” memory block as an intendeddestination for updated firmware. In S906, the electronic devicereceives a response to the update notification. The response mayindicate availability of the memory block identified in the updatenotification, and the update process proceeds to S912.

If, instead, the peripheral device's response to the update notificationindicates an error (i.e., the memory block identified in the updatenotification is not available) the electronic device may check to ensureavailability, in the app, of an updated firmware image for anothermemory block (S908). If such firmware image is available, the electronicdevice identifies (S910) the differently-targeted firmware image in anew update notification (S904) to be sent. Alternatively, a response tothe update notification may include information that identifies anavailable memory block, in which case the app may send a new updatenotification for a firmware image corresponding to the memory block thatthe peripheral device identified as available.

In another embodiment it may be appreciated that more than two updatedfirmware images may exist in an app (such as app 620), each respectivelytargeted for a mutually different memory block of the memory in theperipheral device, depending on the size of the firmware image and asize of the memory in the peripheral device.

Alternatively, in embodiments that utilize only two memory blocks, theportable electronic device 610 may, in response to the error,immediately proceed to transmitting the updated firmware image notidentified in the update notification, without sending a new updatenotification or checking whether other updated firmware images areavailable.

In still another embodiment (not shown), an app may provide a singlefirmware image having memory block location information that can bedynamically changed while the firmware image is being sent to theperipheral device. For example, such changeable firmware image mayinclude a default memory location such as location informationidentifying a “high” memory block, and can be changed to instead includelocation information identifying the “low” memory block during loading,depending on memory block availability.

In another alternative embodiment, the update notification may include afirst updated firmware image portion, which may be written to acorresponding memory portion in the peripheral device and/or verified,followed by receipt of a next updated firmware image portion, thusskipping one operation in the loading of the updated firmware image.

Upon receiving acknowledgement of an available memory block, theelectronic device transmits (S912) the corresponding updated firmwareimage to the peripheral device. Once all portions of the firmware imageare transmitted (S914), the portable electronic device notifies (S916)the peripheral device that the transmission is finished, and provides(S916) to the peripheral device a pre-calculated file checksum of thetransmitted firmware image file, which the peripheral device comparesagainst a total checksum calculated at the peripheral device.

Certain of the method instructions may be repeated for furtherverification of the firmware image. Thus, a first pass through theinstructions is, in the figures, referenced as a “Write cycle” (becausethe firmware image is written to memory), and the second pass throughmethod instructions is here referenced as a “Verification cycle”(because the firmware image is verified without being rewritten). If, inthe above-described checksum comparison, the pre-calculated checksummatches the total checksum calculated in the peripheral device (i.e.,the “Write cycle” branch at S916), the process may repeat, thus startingthe “Verification cycle”. For example, the electronic device may againsend an update notification and transmit the corresponding updatedfirmware image.

After the verification process is satisfied, i.e., the updated firmwareis successfully transmitted and the file checksum is verified again(“Verification cycle”, at S916), the electronic device sends a commandthat causes the peripheral device to update the location from which itexecutes firmware (S918). This may cause the peripheral device to reset.

In an exemplary embodiment the firmware image is transmitted portion byportion, each portion including a target memory block address, firmwaredata, and a predetermined portion checksum as described above for FIG.7B. Thus, at S914, the process returns (“N” see dotted line) to S912 fortransmission of a next portion until all portions are transmitted.

If at any stage of the update process an error occurs, the updateprocess may abort.

In FIG. 10A, flow chart 1000 illustrates a method performed by aperipheral device in a firmware update process. At S1002, the peripheraldevice receives an update notification from an electronic device. Theupdate notification identifies a target memory block of the peripheraldevice. The peripheral device determines whether the targeted memoryblock is available (S1004). For example, the identified target memoryblock may be compared with a code vector that designates a memory blockin a vector table, or, in another embodiment, compared with a registervalue identifying a memory block for execution. If the identified targetmemory block is not available (“N” at S1004; e.g., the target memoryblock is already designated as an active memory block), an error istransmitted (S1006) to the electronic device. In certain embodiments,the peripheral device may, with the error, or as error information,specifically identify an available memory block. If, however, the targetmemory block is available, an acknowledgment (ACK) so indicating is sent(S1008) to the electronic device. The peripheral device then expects toreceive a firmware image portion destined for the targeted memory block.

At S1010-S1016 of FIG. 10A, the peripheral device receives the updatedfirmware image portion, verifies it and, depending on whether thefirmware update process is not in a Verification cycle (“N” at S1014),may write the update image portion to the identified target memoryblock. FIG. 10B shows an alternative (AA) for S1010 to S1018, wherewriting and verifying the updated firmware image portion may beinterchanged as shown at S1012 a to S1016 a.

Verification, in S1012 (or S1012 a), involves calculating a checksum forthe portion and comparing the calculated checksum against apre-calculated checksum received from the portable electronic device.The pre-calculated checksum may be included in the firmware imageportion or provided in a separate transmission from the portableelectronic device, and is not included in the checksum calculation. InFIG. 10A, if the calculated portion checksum matches the pre-calculatedportion checksum (S1012) during a write cycle (“N” at S1014), theupdated firmware image portion is written (S1016) to the target memoryblock. In FIG. 10B, during a write cycle (“N” at S1014 a) an updatedfirmware portion is written to the target memory block in S1016 a,followed by verification at S1012 a.

In addition, the peripheral device may use the calculated portionchecksum in updating (not shown) a running total checksum for the entireupdated firmware image.

In disclosed embodiments each firmware image portion is verified, eitherbefore (S1012, FIG. 10B) or after (S1012 a, FIG. 10B) it is written tothe memory block. However, in alternative embodiments, the process mayproceed directly from receipt of a firmware image portion toverification thereof (see dotted arrows in FIGS. 10A, 10B), whereverification of each updated firmware portion may be skipped, orpostponed (S1028) until all firmware image portions have been written,e.g., by calculating and sending a checksum to the portable electronicdevice for comparison by the app, or by reading back each firmwareportion to the portable electronic device for comparison by the app.

Specifically, the peripheral device may calculate a checksum for thereceived firmware image portion and for a corresponding updated firmwareportion in the memory block, and compare the two checksums.Alternatively, the peripheral device may conduct a bit-by-bit orbyte-by-byte comparison of the received portion and the previouslywritten portion.

In certain disclosed embodiments, the firmware update process may berepeated solely for verification. In this case, each firmware imageportion is written to the memory block only on the first pass (“Writecycle”). Thus, at S1014 (S1014 a), the peripheral device tracks whetherthe firmware image portion is being received as part of a Write cycle oras part of a Verification cycle. If Write cycle (“N” at S1014, S1014 a),and verification is satisfactory, the updated firmware image portion iswritten (S1016, S1016 a) to the identified memory block. Once thefirmware image portion is written to the memory block, the peripheraldevice may send (S1018) a notification of readiness for another imageportion or other data. If a “transmission finished” signal is notreceived (“N” at S1020), the peripheral device continues to receive,verify, and write (or receive, write and verify) successive updatedfirmware image portions. Alternatively, checking for the “transmissionreceived” signal may take place prior to, or simultaneous with checkingfor receipt of an updated firmware image portion.

The process repeats from receiving an updated firmware image portion(S1010) until the “transmission finished” signal is received (S1020)from the portable electronic device. One of ordinary skill in the artwill recognize that the term “transmission finished” here may representany of a number of signals indicating that all portions of the updatedfirmware image have been transmitted.

Along with a “transmission finished” signal, the peripheral device mayreceive a pre-calculated total checksum from the portable electronicdevice. The peripheral device may compare (S1022) the pre-calculatedchecksum against the running total checksum. If not satisfactory (“N” atS1024), the process ends. Otherwise, the peripheral device acknowledgesthe match to the portable electronic device. If the just finished passthrough the instructions was a “Write cycle” (at S1024), the processrepeats from receiving an update notification (S1002). Otherwise (i.e.,“Verification cycle” at S1024), the peripheral device may then receiveand execute a “commit” command (S1026), which causes the peripheraldevice to revise information indicating which memory block to executeupon a reset of the peripheral device, and resets in order to executethe updated firmware.

The above process will be presented now with reference to FIGS. 11A and11B, which illustrate a communication between a portable electronicdevice such as electronic device 200 or 610 (“Device”) and a peripheraldevice such as peripheral device 100 or 640 (“Peripheral”). FIG. 11Aillustrates communications when the first update notification identifiesan available memory block of the Peripheral. FIG. 11B illustratescommunications when the first update notification identifies a memoryblock of the Peripheral that is not available.

At 1110, the Device sends notification of imminent transmission of anupdated firmware image corresponding to a first memory block of thePeripheral, here designated FW_(a), where “a” identifies the memoryblock. The Peripheral responds 1116, here indicating availability ofmemory block “a”. The Device successively transmits portions FW_(ap) ofthe updated firmware image FW_(a), where p is in the range 1 to n, nbeing the number of updated firmware image portions. For each firmwareportion FW_(ap) the Peripheral calculates the portion checksum(chksum_(p) at 1120) and verifies the firmware portion FW_(ap) using thecalculated checksum, as described above with respect to FIG. 10A,updates a running total checksum using the image portion checksum, andwrites the updated firmware portion FW_(ap) to memory block “a”. Asnoted above, the writing and verification may be performed in any order.

The Peripheral acknowledges successful processing at 1122. After thefinal portion, FW_(an), is transmitted, processed, and acknowledged, theDevice sends an indication 1124 of “transmission finished” (“Done”, inFIG. 11) and sends a pre-calculated total checksum corresponding toFW_(a) (“checksum_(at)”). The Peripheral compares checksum_(at) with therunning total checksum and indicates a match (“checksum okay”) 1126. Ifverification of each updated firmware image portion checksum or of thefirmware image file checksum fails (not illustrated), an error isreported to the Device.

For the verification cycle, the updated firmware image FW_(a) is againtransmitted as portions FW_(ap). This may begin with a second updatenotification 1128, followed by acknowledgement 1130 from the Peripheraland successive transmission 1132, verification 1134, and acknowledgement1136 of each FW_(ap). The transmission complete (“Done”) andpre-calculated total checksum_(at) may be transmitted 1138 again,verified, and confirmed 1140. The Device sends a “commit” command 1142,thus causing the Peripheral to revise a designator indicating whichmemory block from which to execute firmware on next reset/power-up.Restarting may proceed automatically, or in certain embodiments maydepend upon satisfaction of predefined parameters. For example, incertain situations it may be prudent to delay restarting of thePeripheral until, for example, a task is finished, environmentalconditions are satisfactory, or the Peripheral or Device is (or is not)in a particular state. In certain embodiments, a vector table of theperipheral device memory indicates which memory portion is to beexecuted (i.e., the location of “active” firmware). This vector table isrewritten in such embodiments to identify the memory location of thejust-written firmware, and then a watchdog timer is caused to expire,thus triggering a reset of the peripheral device.

FIG. 11B shows the communication between the Device and the Peripheralin a case that the first-identified memory block is not available (e.g.,is currently in use). The communication is basically the same as in 11A,with the exception that at 1112 the Peripheral indicates to the Devicethat the “a” block is not available. As a result, the Device sends a newupdate notification (1114), this time identifying an updated firmwareimage FW_(b) corresponding to a different memory block “b” of thePeripheral. The remainder of the communication proceeds as in FIG. 11A,using memory block “b” and corresponding pre-calculated totalchecksum_(at), etc. instead of using memory block “a” and correspondingpre-calculated total checksum_(at), etc.

In review of the above disclosure, a peripheral device for an electronicdevice has a memory with at least two memory blocks each configured tostore a respective set of instructions, one of the memory blocks beingchangeably designated as an active memory block. Electrical circuitry ofthe peripheral device is configured to receive an update notificationfrom the electronic device, the update notification identifying one ofthe at least two memory blocks for receiving updated instructions. Upondetermination that the identified one memory block is not the activememory block, the circuitry transmits a response to the electronicdevice acknowledging the update notification, receives, from theelectronic device, the updated instructions targeted for the identifiedmemory block, and writes the received updated instructions to theidentified one memory block.

In contrast, upon determination that the identified one memory block isthe active memory block, the electronic circuitry transmits a responseto the electronic device indicating an error, receives another updatenotification from the electronic device that identifies a different oneof the at least two memory blocks for receiving the updatedinstructions, and receives, from the electronic device, the updatedinstructions targeted for the identified different memory block, andwrites the received updated instructions to the identified differentmemory block. The electronic circuitry then designates the memory blockto which the received updated instructions were written as the activememory block in response to a command from the electronic device.'

In certain embodiments, the electrical circuitry is further configuredto verify the received updated instructions, wherein the verificationincludes calculation of a portion checksum respectively for each of oneor more updated instructions portions constituting the received updatedinstructions, comparison of the calculated portion checksum against aprovided portion checksum included in said each updated instructionsportion, and notification to the electronic device that the calculatedportion checksum matches the provided portion checksum.

If the number of updated instructions portion is more than one, theelectrical circuitry may be further configured to, for said eachreceived updated instructions portion, successively update a runningtotal checksum using the calculated updated instruction portionchecksum, and upon receiving from the electronic device a pre-calculatedtotal checksum and information that indicates all updated instructionsportions have been received, compare the pre-calculated total checksumagainst the running total checksum.

The electrical circuitry may be further configured to acknowledge to theelectronic device that the received updated instructions weresuccessfully written and verified, to receive another updatenotification identifying the memory block that was written, and tosuccessively receive the updated instructions portions again forre-verification.

The electrical circuitry of the peripheral device may be furtherconfigured to be reset so that the updated instructions will beexecuted.

The peripheral device having the memory and electrical circuitry may bea protective enclosure that includes a battery configured to power theelectronic device and to recharge a battery of the electronic device,based on the instructions in the active memory block.

The received updated instructions and the instructions in the activememory block may respectively comprise firmware which when executed inthe electrical circuitry manages at least charging and discharging ofthe battery of the protective enclosure and of the battery of theelectronic device.

The electronic device may be a mobile telephone configured to acquirefrom a remote source a software application (“app”) that includes firstinstructions, second instructions, and one or more sets of updatedinstructions. The first instructions, when executed by the mobiletelephone, may cause results of functions in the peripheral device to bedisplayed on a display of the electronic device. The secondinstructions, when executed by the mobile telephone, may cause theperipheral device to receive, store, and execute an updated instructionsset transmitted from the mobile telephone. The one or more sets ofupdated instructions may include firmware. If two or more updatedinstructions sets are included in the app, each updated instructions setrespectively may include information identifying a different one of theat least two memory blocks.

In addition, the peripheral device may also include an interface to abattery of the peripheral device, an interface to receive electricalpower from an external power source, and a bar code reader and/or amagnetic strip reader configured to read information from a magneticstrip card. In such embodiment, the updated instructions and theinstructions in the active memory block constitute respective firmwareimages, which firmware images when executed by the electrical circuitrymay perform management of charging and discharging of the battery of theperipheral device with respect to a battery of the electronic device,and operation of the bar-code reader and/or the magnetic strip reader.

A method in the electronic device for updating firmware of theperipheral device may include acquiring an app that includesinstructions to be executed by the electronic device and one or moreupdated firmware images for the peripheral device. The instructions forexecution by the electronic device may include first instructions whichwhen executed cause the electronic device to display information relatedto functions of the peripheral device. The instructions for execution bythe electronic device may include second instructions for updatingfirmware of the peripheral device.

The second instructions include, upon determining that a version of theone or more updated firmware images is different from a version of afirmware image in the peripheral device, transmitting successiveportions of one updated firmware image, from the one or more updatedfirmware images, the one updated firmware image being targeted forstorage in a memory block, of the peripheral device, that is differentfrom a memory block used by the peripheral device for currently activefirmware. For each updated firmware image portion successfullytransmitted, the electronic device can receive, as a condition fortransmitting a next updated firmware image portion, an acknowledgementfrom the peripheral device that the updated firmware image portion wasreceived by the peripheral device. When all updated firmware imageportions have been transmitted, the electronic device transmits to theperipheral device an indication of firmware image transmissioncompletion.

The peripheral device may be a protective enclosure having a battery andelectrical circuitry, and the information displayed may includeinformation regarding the battery of the protective enclosure, saidinformation derived from data communicated from the protectiveenclosure.

Before the transmitting of successive updated firmware image portions,the electronic device may transmit an update notification to theperipheral device, the update notification including informationidentifying one of the memory blocks, and may receive a response to theupdate notification.

Upon determining that the response to the update notification indicatesan error, the electronic device may transmit a different updatenotification including information identifying the memory block that isdifferent from the memory block used by the peripheral device forcurrently active firmware. The electronic device may receiveacknowledgement from the peripheral device indicating that thetransmitting of successive updated firmware image portions may proceed.

At least two updated firmware images may be provided in the app, each ofthe at least two updated firmware images being associated with arespective one of the memory blocks of the peripheral device, and theupdated firmware image portions in the respective at least two updatedfirmware images including information identifying the respectiveassociated memory block. The updated firmware image portions that aretransmitted correspond to the memory block identified in the updatenotification or correspond to the different memory block identified inthe different update notification, depending on whether or not theresponse indicates the error.

In certain embodiments, only one updated firmware image is provided inthe app, and, in accord with the response to the update notification,memory block target information in the updated firmware image portionsis confirmed or changed to indicate an available one of the memoryblocks of the peripheral device.

The indication of transmission completion may include a pre-calculatedtotal checksum for the written updated firmware image for comparisonagainst a running total checksum calculated at the peripheral device.Upon determining that the calculated running total checksum matches thepredetermined total checksum value, the method performed by theelectronic device causes the peripheral device to use the writtenupdated firmware image as a new active firmware image.

Upon receiving a response to the transmission completion indication, thetransmissions of the update notification and of each updated firmwareimage portion are repeated for re-verification by the peripheral device.

The acknowledgement, from the peripheral device, of receipt of said eachtransmitted updated firmware image portion may further indicatesuccessful verification that a calculated checksum of the transmittedupdated firmware image portion, calculated at the peripheral device,matches a predetermined checksum of the transmitted updated firmwareimage portion included in the transmitted updated firmware imageportion.

The acknowledgement, from the peripheral device, of receipt of eachtransmitted updated firmware image portion may further indicate that thetransmitted updated firmware image portion was successfully written tothe memory block that is different from the memory block used by theperipheral device for currently active firmware.

A non-transient processor-readable medium may have stored thereon asoftware application, including electronic-device-executable displayinstructions, electronic-device-executable firmware update instructions,and one or more firmware update images.

The display instructions may be configured to cause display of images ona display of the electronic device, the displayed images being based onparameters related to a peripheral device for the electronic device. Thefirmware update instructions may be configured to update firmware of theperipheral device. The one or more updated firmware images may includeinstructions to be executed by the peripheral device, each updatedfirmware image including address information corresponding to arespective mutually-different block of memory of the peripheral device.

The firmware update instructions cause the electronic device to transmitto the peripheral device one of the updated firmware images thatcorresponds to a non-active memory block of the peripheral device. Uponsuccessful transmission of the entire one of the updated firmwareimages, which is written to the memory block of the peripheral devicecorresponding to the address information of the updated firmware image,the electronic device is caused to transmit to the peripheral device (a)an indication that transmission of the updated firmware image iscomplete, and (b) a pre-determined file checksum of the successfullytransmitted updated firmware image. The electronic device is furthercaused to receive from the peripheral device an indication of whether ornot the predetermined file checksum is successfully verified. If thereceived indication indicates that the predetermined file checksum isverified, the electronic device is caused to notify the peripheraldevice that the updated firmware image will be retransmitted forverification with respect to the written updated firmware image.

Prior to the transmission of the updated firmware image that correspondsto the non-active memory block, the firmware update instructions mayfurther cause the electronic device to transmit an update notificationto the peripheral device, the update notification identifying a targetmemory block of the peripheral device. If the target memory blockcorresponds to an active memory block of the peripheral device, thefirmware update instructions may cause the electronic device to receive,from the peripheral device, information indicating that the targetmemory block cannot be written, and transmit, to the peripheral device,an update notification that identifies a memory block different from theactive memory block.

In an embodiment of the method in which the application includes onlyone updated firmware image, the address information of the only oneupdated firmware image may be changed in response to the notificationfrom the peripheral device indicating that the target memory blockcannot be written.

The transmitting of the one updated firmware image may includesuccessive transmission of portions of the one updated firmware image,each portion including portion address information, firmware informationand a pre-determined checksum of the updated firmware image portion.

The firmware update instructions may further cause the electronic deviceto receive an error indicator when a portion verification checksumcalculated by the peripheral device for an updated firmware imageportion fails to match the pre-determined checksum of that updatedfirmware image portion. Upon receiving the error indicator, the firmwareupdate instructions may further cause the electronic device to restartthe firmware update instructions to begin again the portion-by-portiontransmission of the updated firmware image that corresponds to thenon-active memory block of the peripheral device.

The firmware update instructions may further cause the electronic deviceto receive from the peripheral device an indication of a version ofactive firmware stored at the peripheral device. In response to adetermination that the firmware version of the active firmware image isthe same as a version of the updated firmware image, execution of thefirmware update instructions is terminated.

The software application may include one or more alternate updatedfirmware images having address information that is the same as theaddress information in the one or more updated firmware images. The oneor more alternate updated firmware images may include instructions whichwhen executed by the peripheral device enable functionality of theperipheral device that is substantially different from functionalityenabled by instructions of the one or more updated firmware images.

A method in an electronic device for updating firmware of a deviceperipheral to the electronic device via a software application (app) ofthe electronic device may include storing the app in a memory portion ofthe electronic device and executing update instructions for updatingfirmware of the peripheral device, included in the app. The app alsoincludes one or more updated firmware images. The update instructionscause, in the electronic device, transmitting to the peripheral devicean update notification identifying a peripheral device memory block forreceiving an updated firmware image. Upon receiving a response from theperipheral device that indicates availability of the identifiedperipheral device memory block, the update instructions causetransmitting, to the peripheral device, one updated firmware image andinformation designating an address of the identified peripheral memoryblock to which the updated firmware image is to be written. The updateinstructions cause indicating to the peripheral device that transmissionof the updated firmware image is complete, and transmitting of a commitcommand to the peripheral device.

Along with the indicating that the transmission of the updated firmwareimage is complete, The update instructions also cause providing to theperipheral device a pre-calculated total checksum of the full updatedfirmware image that was transmitted, and, prior to transmitting thecommit command, upon receiving an indication from the peripheral devicethat the pre-calculated total checksum matches a peripheral-devicecalculated total checksum, repeating, for verification, the notificationof impending firmware update, the transmitting of the updated firmwareimage, and the indicating that transmission is complete.

The app may include two alternative updated firmware images that includeidentical instructions for the peripheral device. The alternativeupdated firmware images respectively include information identifyingdifferent peripheral device memory blocks of two possible peripheraldevice memory blocks from which the identified peripheral device memoryblock is selected.

The transmission of the updated firmware image includes successivetransmission of plural updated firmware image portions constituting theupdated firmware image, each updated firmware image portion beingtransmitted in response to a signal from the peripheral device.

The electronic device may obtain the app from a remote app repository.

The app may further include first instructions which when executed bythe electronic device cause information to be displayed on a displayscreen of the electronic device.

The update instructions may further cause, prior to transmitting theupdate notification, checking that prerequisites for firmware update aresatisfied, the prerequisites including that an electrical connectionexists between a communications connector of the electronic device and acommunications connector of the peripheral device.

A method performed in a peripheral device for updating its firmwareincludes responding to an update notification from an electronic device,and receiving from the electronic device an updated firmware image,including information designating a memory block of the peripheraldevice for writing the updated firmware image. The method furtherincludes writing the updated firmware image to the designated memoryblock upon determining that the memory block identified in the updatenotification is available for writing. Upon receipt of a commit commandfrom the electronic device, the method includes designating forexecution the memory block to which the received updated firmware imagewas written, and resetting the peripheral device in order to execute theupdated firmware image at the memory block designated for execution.

The instructions may further include receiving, with the indication thatthe transmission of the updated firmware image is complete, apre-calculated total checksum for the updated firmware image. Comparingthe pre-calculated total checksum with a peripheral-device calculatedtotal checksum prepares the peripheral device, upon determining a matchof the pre-calculated total checksum and the peripheral-devicecalculated checksum, for transmitting a confirmation of the match.

The responding to the update notification may include indicatingavailability of the peripheral device memory block identified in theupdate notification.

The availability status of the peripheral device memory block identifiedin the update notification may be indicated as not available forreceiving the updated firmware image when the identified peripheraldevice memory block is designated as an active memory block storingfirmware for current execution.

The responding to the update notification may indicate an error when theidentified peripheral device memory block is not available for receivingthe updated firmware.

If the response to the update notification indicates the error, theelectronic device transmits a secondary update notification thatidentifies a different peripheral device memory block for receiving theupdate.

The method in the peripheral device may further include verifying thereceived updated firmware image. This is done by affirmatively comparinga pre-calculated checksum included with the updated firmware imageagainst a checksum calculated by the peripheral device after receipt ofthe updated firmware image.

The updated firmware image may be received by the peripheral device insuccessive updated firmware image portions, each updated firmware imageportion being received, verified, and successfully written to theidentified memory block by the peripheral device successfully prior toprocessing of a subsequent updated firmware image portion.

One of ordinary skill in the art will appreciate that functionsperformed by a peripheral device are limited primarily by the skill andimagination of its creator(s), and that firmware in each instance may betailored specifically for those functions. For example, peripheraldevice functions may also include (as non-limiting examples) wiredand/or wireless communications, image capture and/or image reproductionfunctions, monitoring of various signals, evaluation of inputs fromsensors, energy and/or signal enhancement, operation and/or tuning ofmechanical components, audio features, etc.

It will be recognized by those having ordinary skill in the art that theprimary instructions 710 of app 620 need not be limited to battery-caseoriented functions. The mobile app 620, and particularly the primaryinstructions 710, may relate to features of a different peripheraldevice or a plurality of different peripheral devices. For example, theprimary instructions may relate to interaction with, operation of and/ormonitoring of a mobile point of sale (POS) peripheral device (possiblyin a tablet case form), and may communicate with and utilize data fromPOS-oriented features such as a payment card reader or bar-code scanner.In another alternative, the primary instructions 710 in an app ofportable electronic device 200 may communicate with a non-caseperipheral. That is, a portable electronic device 200, may executeprimary instructions for control of wired or wireless communication,while firmware instructions in the same app may control firmwareupdating as disclosed above between the portable electronic device 200and communication-capable circuitry of any device.

In yet another embodiment, a user may select a firmware version from alibrary of firmware versions provided in or accessible by the app 620.Specifically, some peripheral devices may be reconfigured, depending onwhich of several firmware images is active, to perform differently or toperform different functions. The inclusion of multiple firmware imagesmay also permit selectable use of enhanced features of a device. Suchfeatures may be made accessible, for example, upon receipt ofcorresponding unlock codes at the app 620.

For example, a battery case such as described above may include basiccharge features, or may alternatively, depending on active firmwareversion, include enhanced or customized features. Customized featuresmay include changing the timing and amount of charging for highestbattery life or highest available power based on user preferences orbased on monitored usage of the portable electronic device. Such changesmay work in conjunction with particular features of the primaryinstructions 710 of the app 620.

The firmware update process described above may be carried outautomatically each time the portable electronic device or the app isstarted. Alternatively the firmware update process may be initiated onlyupon first execution of the app 620 after the app is obtained by theportable electronic device 200. In a still further embodiment, thefirmware update process in the portable electronic device 200 may beexecuted in response to an input received from a user, for example apredetermined button press or selection of a soft key of the app 620designated for such purpose. Still further, the firmware update processmay commence when the app, in the course of its primary instructions 710receives a firmware version report from battery case (or other subjectperipheral device 100), which communication indicates that a version ofthe currently executed firmware image is different from a version of thefirmware image provided in the app 620. Those of ordinary skill willappreciate that these alternatives may be combined or performedindependently.

The firmware update process may count the number of errors or failedchecksum comparisons and terminate the firmware update when apredetermined number of re-tries is reached. For example, in oneembodiment the firmware update process may restart three times beforeterminating the process. The count may be reset upon a forced restart ofthe mobile application and/or a reboot of the portable electronicdevice. In other circumstances, the user may be notified to contact acustomer support group to help troubleshoot the errors.

To prevent erroneous writing of the updated firmware image, each portion(e.g., byte) of the updated firmware image may be written and thencompared to an expected value. The comparison may include calculation ofa checksum for the firmware image portion and comparison of thecalculated checksum against an expected value. In addition, when all ofthe replacement firmware has been written, a checksum may be calculatedfor the whole, and compared with an expected value. If any of thesechecks fails, an error is reported and the firmware update isterminated. In one example, a predetermined number of attempts may bemade to repeat reception of a firmware image portion, verification andwriting of the firmware image portion initially having a non-matchingchecksum.

In a variation (not shown), the app 620 may, instead of including thefirmware in its own code, check for firmware updates at a firmwarerepository. The firmware repository may be separate from a repositorythat hosts the app itself. Upon detecting a firmware version differentfrom the firmware currently active in the peripheral device, the app mayautomatically download the firmware and initiate a firmware update asdescribed above. Alternatively, a device user may be notified offirmware updates or may be presented with a catalog of firmware versionsavailable. The user may then select a desired firmware update fordownload and installation.

Embodiments described above may pertain to a battery case peripheral foran electronic device, such as that illustrated in FIGS. 1-5 anddescribed above. However, as will be appreciated by one of ordinaryskill in the art, the safe method of updating firmware described abovemay be applied to all manner of peripheral devices, insofar as the term“peripheral” may be understood to mean any device having circuitrycapable of interacting with or being controlled by the electronicdevice. For example, an app may include firmware and instructions forupdating a traditional computer peripheral (e.g., printer, monitor,media drive, television, docking station, etc.), but is not limited toupdate of such traditional peripherals. The inventors envision that thedisclosed methods may be applied to safely update firmware in all mannerof vehicles, appliances, HVAC units, power systems, lighting fixtures,audio equipment, industrial machines, CNC, etc. If the device hascapacity for firmware updates and wired or wireless communication withan electronic device, the above-described methods may be applied toquickly and safely update the firmware.

What is claimed is:
 1. A method in an electronic device for updatingfirmware of a peripheral device, the method comprising: acquiring an appthat includes instructions to be executed by the electronic device andone or more updated firmware images for the peripheral device, theinstructions for execution by the electronic device includinginstructions which when executed cause the electronic device to displayinformation related to functions of the peripheral device; upondetermining that a version of the one or more updated firmware images isdifferent from a version of a firmware image in the peripheral device,transmitting successive portions of one updated firmware image, from theone or more updated firmware images, that is targeted for storage in amemory block of the peripheral device that is different from a memoryblock used by the peripheral device for currently active firmware; foreach updated firmware image portion successfully transmitted, receiving,as a condition for transmitting a next updated firmware image portion,an acknowledgement from the peripheral device that the updated firmwareimage portion was received by the peripheral device; and when allupdated firmware image portions have been transmitted, transmitting tothe peripheral device an indication of transmission completion.
 2. Themethod according to claim 1, wherein the peripheral device is aprotective enclosure having a battery and electrical circuitry, and theinformation displayed includes information regarding the battery of theprotective enclosure, said information derived from data communicatedfrom the protective enclosure.
 3. The method according to claim 1,further comprising: before the transmitting of successive updatedfirmware image portions, transmitting an update notification to theperipheral device, the update notification including informationidentifying one of the memory blocks; and receiving a response to theupdate notification.
 4. The method according to claim 3, furthercomprising: upon determining that the response to the updatenotification indicates an error, transmitting a different updatenotification including information identifying the memory blockdifferent from the memory block currently used by the peripheral devicefor active firmware; and receiving acknowledgement from the peripheraldevice indicating that the transmitting of successive updated firmwareimage portions may proceed.
 5. The method according to claim 4, wherein,at least two updated firmware images are provided in the app, each ofthe at least two updated firmware images being associated with arespective one of the memory blocks of the peripheral device, and theupdated firmware image portions in the respective at least two updatedfirmware images including information identifying the respectiveassociated memory block; and the updated firmware image portions thatare transmitted correspond to the memory block identified in the updatenotification or correspond to the different memory block identified inthe different update notification, depending on whether or not theresponse indicates the error.
 6. The method according to claim 3,wherein, only one updated firmware image is provided in the app, and inaccord with the response to the update notification, memory block targetinformation in the successive updated firmware image portions isconfirmed or changed to indicate an available one of the memory blocksof the peripheral device.
 7. The method according to claim 1, wherein,the indication of transmission completion includes a pre-calculatedtotal checksum for the written updated firmware image for comparisonagainst a running total checksum calculated at the peripheral device,and the method further comprises: upon determining that the calculatedrunning total checksum matches the predetermined total checksum value,causing the peripheral device to use the written updated firmware imageas a new active firmware image.
 8. The method according to claim 7,further comprising: upon receiving a response to the transmissioncompletion indication, repeating the transmission of the updatenotification and of each updated firmware image portion forre-verification by the peripheral device.
 9. The method according toclaim 1, wherein, the acknowledgement, from the peripheral device, ofreceipt of said each transmitted updated firmware image portion furtherindicates successful verification that a calculated checksum of thetransmitted updated firmware image portion, calculated at the peripheraldevice, matches a predetermined checksum of the transmitted updatedfirmware image portion included in the transmitted updated firmwareimage portion.
 10. The method according to claim 1, wherein theacknowledgement, from the peripheral device, of receipt of said eachtransmitted updated firmware image portion further indicates that thetransmitted updated firmware image portion was successfully written tothe memory block that is different from the memory block used by theperipheral device for currently active firmware.
 11. A non-transientprocessor-readable medium having stored thereon an application, theapplication comprising: electronic-device-executable displayinstructions configured to cause display of images on a display of theelectronic device, the displayed images being based on parametersrelated to a peripheral device for the electronic device;electronic-device-executable firmware update instructions configured toupdate firmware of the peripheral device; and one or more updatedfirmware images including instructions to be executed by the peripheraldevice, each updated firmware image including address informationcorresponding to a respective mutually-different block of memory of theperipheral device, wherein the firmware update instructions cause theelectronic device to: transmit to the peripheral device one of theupdated firmware images that corresponds to a non-active memory block ofthe peripheral device; upon successful transmission of the entire one ofthe updated firmware images, which is written to the memory block of theperipheral device corresponding to the address information of theupdated firmware image, transmit to the peripheral device an indicationthat transmission of the updated firmware image is complete, and apre-determined file checksum of the successfully transmitted updatedfirmware image; receive from the peripheral device an indication ofwhether or not the predetermined file checksum is successfully verified;and if the received indication indicates that the predetermined filechecksum is verified, notify the peripheral device that the updatedfirmware image will be retransmitted, the retransmission being forverification with respect to the written updated firmware image.
 12. Thenon-transient processor-readable medium according to claim 11, whereinprior to the transmission of the updated firmware image that correspondsto the non-active memory block, the firmware update instructions furthercause the electronic device to: transmit an update notification to theperipheral device, the update notification identifying a target memoryblock of the peripheral device; and if the target memory blockcorresponds to an active memory block of the peripheral device: receive,from the peripheral device, a notification indicating that the targetmemory block cannot be written, and transmit, to the peripheral device,an update notification that identifies a memory block different from theactive memory block.
 13. The non-transient processor-readable mediumaccording to claim 12, wherein the software application includes onlyone updated firmware image, and the address information of the only oneupdated firmware image is changeable in response to the notificationfrom the peripheral device indicating that the target memory blockcannot be written.
 14. The non-transient processor-readable mediumaccording to claim 11, wherein said transmitting of the one updatedfirmware image includes successive transmission of portions of said oneupdated firmware image, each updated firmware image portion includingportion address information, firmware information and a pre-determinedchecksum of the updated firmware image portion.
 15. The non-transientprocessor-readable medium according to claim 14, wherein the firmwareupdate instructions further cause the electronic device to: receive anerror indicator when a portion verification checksum calculated by theperipheral device for an updated firmware image portion fails to matchthe pre-determined checksum of that updated firmware image portion; andupon receiving the error indicator, restart the firmware updateinstructions begin again the portion-by-portion transmission of theupdated firmware image that corresponds to the non-active memory blockof the peripheral device.
 16. The non-transient processor-readablemedium according to claim 11, wherein the firmware update instructionsfurther cause the electronic device to: receive from the peripheraldevice an indication of a version of active firmware stored at theperipheral device; in response to a determination that the firmwareversion of the active firmware image is the same as a version of theupdated firmware image, terminate execution of the firmware updateinstructions.
 17. The non-transient processor-readable medium of claim11, wherein the software application further comprises: one or morealternate updated firmware images having address information that is thesame as the address information in the one or more updated firmwareimages, wherein the one or more alternate updated firmware imagesinclude instructions which when executed by the peripheral device enablefunctionality of the peripheral device that is substantially differentfrom functionality enabled by instructions of the one or more updatedfirmware images.
 18. A method in an electronic device for updatingfirmware of a device peripheral to the electronic device via a softwareapplication of the electronic device, the method comprising: storing theapplication in a memory portion of the electronic device, theapplication including update instructions for updating firmware of theperipheral device and one or more updated firmware images; and executingthe update instructions, the update instructions causing: transmittingto the peripheral device an update notification identifying a peripheraldevice memory block for receiving an updated firmware image, uponreceiving a response from the peripheral device that indicatesavailability of the identified peripheral device memory block,transmitting, to the peripheral device, one updated firmware image andinformation designating an address of the identified peripheral memoryblock to which the updated firmware image is to be written, indicatingto the peripheral device that transmission of the updated firmware imageis complete, and transmitting a commit command to the peripheral device.19. The method according to claim 18, wherein executing the updateinstructions further causes: along with the indicating that thetransmission of the updated firmware image is complete, providing to theperipheral device a pre-calculated total checksum of the full updatedfirmware image that was transmitted, and, prior to transmitting thecommit command, upon receiving an indication from the peripheral devicethat the pre-calculated total checksum matches a peripheral-devicecalculated total checksum, repeating, for verification, the notificationof impending firmware update, the transmitting of the updated firmwareimage, and the indicating that transmission is complete.
 20. The methodaccording to claim 18, wherein the application includes two alternativeupdated firmware images that each include identical instructions for theperipheral device, and respectively include information identifyingdifferent peripheral device memory blocks of two possible peripheraldevice memory blocks from which the identified peripheral device memoryblock is selected.
 21. The method according to claim 18, wherein thetransmission of the updated firmware image includes successivetransmission of plural updated firmware image portions constituting theupdated firmware image, each updated firmware image portion beingtransmitted in response to a signal from the peripheral device.
 22. Themethod according to claim 18, wherein the electronic device obtains theapplication from a remote app repository.
 23. The method according toclaim 18, wherein the application further includes: first instructionswhich when executed by the electronic device cause information to bedisplayed on a display screen of the electronic device.
 24. The methodaccording to claim 18, wherein executing the update instructions furthercauses: prior to transmitting the update notification, checking thatprerequisites for executing firmware update are satisfied, theprerequisites including that an electrical connection exists between acommunications connector of the electronic device and a communicationsconnector of the peripheral device.