K770i EPROM resetting with CID53 Hi I had bought one K770i hand set. It was not connecting to USB port. Suddenly it started RED led blinking with no display. So one of my friend adviced me to flash it with KK as after that the phone got discovered on the USB. ""Press "5" and "2" keys, hold them together and plug DCU60 USB cable. Phone Connected... Detected: DB2020 Series Flash ID: 0x897E - Supported EROM CID Detected: 52 Status:3 EROM Update Ok!""" Later Though SEUS updated it to CID 53 and got latest firm where. There has been a problem arraised due to Flashing with KK client. The EPROM was written KK claint and its IMEI number had a clash with that of GDFS. I am useing a genuine Indian set bought from open shop with complete box.The IMEI matches with that on the BOx too. But the conflecting error making the mbile function all except the phone. "No network access" appears with any SIM. The company service center says hardware needs replacement(probably EPROM) but asking 20 days time. Can you please help me by suggesting how to mitegate this problem?? some one was telling on the other day that get the CID53 flashed back to CID52 and reflash the EPROM. but how to ???Not known your help is of grate save to me Thanks CVK N Rao |
Quote:
|
same problem restarting and cant connect,i do first option replace keypad flex and now fine and download main/fs v0.915057/UNI CARD SERIAL: Loaded 51 flash descriptors CFG:000000000000 ChipID:9900,EMP protocol:0301 PHONE STATE: "RETAIL" FLASH CID: 0053 Speed:921600 FLASH ID:897E OTP: LOCKED:1 CID:51 PAF:1 IMEI:35238402274647 CERT:RED FLASH CID:53 COLOR:RED Model (from GDFS):K770i Brand:Generic MAPP CXC article: R8BE001 prg1201-7587_GENERIC_VI MAPP CXC version: R8BE001 Language Package: EUROPE_4 CDA article: CDA12345678/123 CDA version: R2A Default article: 1201-7603 Default version: R8BE001 PROVIDER: 000-00 SIMLOCKS NOT DETECTED RESTORATION FILE NOT PRESENT "R8BE001_1201-7587_GENERIC_VI" YOU MUST PERFORM FULL FLASHING WHEN "ALTERNATIVE SECURITY BYPASS" ENABLED BYPASS PACKAGE PRESENT FOR DETECTED FIRMWARE SECURITY UNITS BACKUP CREATED. Elapsed: 14 secs. |
insert battery cable dcu 60 hold c tick indentify for flashing load main/fs in settings tab use server customize phone after flash unlock during flash procedure format gdfs when writing tick flash http://i302.photobucket.com/albums/n...Picture057.jpg PHONE STATE: "RETAIL" FLASH CID: 0053 Speed:921600 FLASH ID:897E OTP: LOCKED:1 CID:51 PAF:1 IMEI:35238402274647 CERT:RED FLASH CID:53 COLOR:RED Model (from GDFS):K770i Brand:Generic MAPP CXC article: R8BE001 prg1201-7587_GENERIC_VI MAPP CXC version: R8BE001 Language Package: EUROPE_4 CDA article: CDA12345678/123 CDA version: R2A Default article: 1201-7603 Default version: R8BE001 PROVIDER: 000-00 SIMLOCKS NOT DETECTED RESTORATION FILE NOT PRESENT "R8BE001_1201-7587_GENERIC_VI" YOU MUST PERFORM FULL FLASHING WHEN "ALTERNATIVE SECURITY BYPASS" ENABLED BYPASS PACKAGE PRESENT FOR DETECTED FIRMWARE SECURITY UNITS BACKUP CREATED. Elapsed: 14 secs. SIGNED MODE (USING SERVER) CFG:100110000100 ChipID:9900,EMP protocol:0301 PHONE STATE: "RETAIL" FLASH CID: 0053 Speed:921600 OTP: LOCKED:1 CID:51 PAF:1 IMEI:35238402274647 CERT:RED FLASH CID:53 COLOR:RED PATCH:071120 1355 HANCXC9876543210_DB2020_MEM_PATCHER_R2A012 0 LDR:080108 1810 ESGCXC1329129_DB2020_FLASHLOADER_R2A015 FLASH ID:897E writing "E:\SE TOOL\FLASH FILE\K770i cid 53\R8BC004_1201-7587_GENERIC_VI.ssw" CURRENT FLASH FILE CID:53 SSW uses full hash, hash len is: 9200 Will flash 460 blocks... writing "E:\SE TOOL\FLASH FILE\K770i cid 53\r8bc004_fs_apac_vi_red_cid53.ssw" CURRENT FLASH FILE CID:53 SSW uses full hash, hash len is: 3380 Will flash 169 blocks... LDR:070904 1245 AN2CXC1250562_DB2020_CSLOADER_R3A013 loader startup: executed loader GDFS startup: executed loader filesystem startup: executed loader unlock: executed USERCODE RESET TO "0000" using GENERIC phone customization tpa/preset/custom/C3_PCA_G3v2.cer tpa/preset/custom/CONTENT_DOWNLOAD_HOOK_2.itm tpa/preset/custom/customize.xml tpa/preset/custom/DESKTOP_HOOK_2.itm tpa/preset/custom/Entrust.net Root Certificate.cer tpa/preset/custom/Entrust.net_WTLS_Root_Certificate.wcrt tpa/preset/custom/FM_PICTURES_HOOK_3.itm tpa/preset/custom/FM_SOUNDS_HOOK_3.itm tpa/preset/custom/FM_THEMES_HOOK_3.itm tpa/preset/custom/FM_VIDEOS_HOOK_3.itm tpa/preset/custom/GAMES_HOOK_3.itm tpa/preset/custom/GTE_CyberTrust_Root.cer tpa/preset/custom/GTE_Cybe_Trust_Root_WTLS.wcrt tpa/preset/custom/Root.cer tpa/preset/custom/SEMC_E2E_Root_CA.crt tpa/preset/custom/SETT_RINGTONE_HOOK_3.itm tpa/preset/custom/ThawtePremium.der tpa/preset/custom/ThawteServerCA.cer tpa/preset/custom/Utiroot.cer tpa/preset/custom/VeriSignClass3Root.cer tpa/preset/custom/Verisign_Class_3_CA_WTLS.wcrt Phone detached Elapsed: 384 secs. |
All times are GMT +1. The time now is 17:53. |
vBulletin Optimisation provided by
vB Optimise (Pro) -
vBulletin Mods & Addons Copyright © 2024 DragonByte Technologies Ltd.
- GSM Hosting Ltd. - 1999-2023 -