Entries |
Document | Title | Date |
20080201570 | Apparatus, Method and Product for Selecting an iSCSI Target for Automated Initiator Booting - An apparatus, method and product for selecting an iSCSI target for us in automatically booting a remote initiator is disclosed. A policy engine is created for use in a discovery domain of an iSCSI device. A boot attribute setting within the policy engine is set for selecting an iSCSI target to allow the remote initiator to automatically log onto the selected target for booting. | 08-21-2008 |
20080201571 | SYSTEM AND METHOD FOR MANAGING BOOT IMAGES IN A RETAIL STORE ENVIRONMENT - The present invention is a system for managing boot images in a retail store environment. The system includes a server. The system further includes a plurality of client devices communicatively coupled with the server. A first client device included in the plurality of client devices is configured for downloading a first portion of a boot image from the server via a first connection. The first client device is further configured for downloading a second portion of the boot image from a second client device included in the plurality of client devices via a second connection. | 08-21-2008 |
20080201572 | Method and system for uniformizing product data embedded in a computer platform - A method uniformizes product data embedded in a computer platform equipped with a first-type control unit stored with first product data, and a second-type control unit stored with second product data. The method includes recording a first time value when the first product data are modified; recording a second time value when the second product data are modified; reading the first and second time values when either one of a power-on procedure and a resetting procedure is performed on the computer platform; comparing the first time value with the second time value and determining whether the first time value is identical to the second time value; and updating one of the first product data and the second product data having an earlier one of the first and second time values with the other if the first time value is determined to be not equal to the second time value. | 08-21-2008 |
20080201573 | OPERATING SYSTEM REBOOTING METHOD AND APPARATUS FOR CONTINUING TO EXECUTE A NON-STOP MODULE EVEN DURING REBOOTING - A method of rebooting an operating system including a plurality of load modules in a single computer. One load module which is to be operated during rebooting of the operating system is held in a memory, while establishing a state capable of accepting interrupt to be processed by the one load module. All the other load modules are loaded in a memory of the computer. Processing of the interrupt can be executed by the one load module even during the rebooting of the operating system. | 08-21-2008 |
20080209196 | Method to Enable Firmware to Boot a System from an ISCSI Device - A method and system that enable system firmware to efficiently boot an operating system (OS) and/or client program from a network-connected Internet Small Computer Systems Interface (iSCSI) device. The method generally comprises: (1) defining the firmware representation of the iSCSI device within the hierarchical data structure that represents the system hardware; and (2) extending the network support package to accommodate additional boot arguments that allow system firmware to acquire the information required for booting from the network-connected iSCSI device, while utilizing one of the existing discovery protocols. | 08-28-2008 |
20080209197 | Method to Add IPV6 and DHCP Support to the Network Support Package - Extending the network support package to accept network addresses in IPv6 format and allow the use of other boot discovery protocols, such as DHCP, to acquire the information needed to boot a system using a file on a remote server. A mechanism is added to the network support package to enable/allow the specification of additional boot discovery protocols and additional network address formats. The mechanism defines qualifier keywords that are added to the boot arguments and processed by the network support package. The qualifier keywords modify the boot arguments associated with a bootstrap method by specifying a way to acquire the arguments (i.e., a specific boot discovery protocol), the format of the arguments, and other parameters associated with the arguments. Qualifier keywords are optionally appended before the arguments. Multiple qualifier keywords may be added to the boot arguments at a time, and the keywords can be applied in their order within the arguments. | 08-28-2008 |
20080209198 | Boot Acceleration For Computer Systems - Boot acceleration for computer systems is disclosed. In an exemplary embodiment, a method of boot acceleration for a computer system may comprise monitoring data requests during a boot procedure. The method may also comprise pre-fetching data from a storage device during a subsequent boot procedure based at least in part on the monitored data requests. The method may also comprise accessing the pre-fetched data from a cache to accelerate the subsequent boot procedure. | 08-28-2008 |
20080209199 | BOOT NEGOTIATION AMONG MULTIPLE BOOT-CAPABLE DEVICES - A first device discovers the capabilities of a second device. The first device determines which of the first device and the second device is to execute a controlling boot image based at least in part on the capabilities of the first device and the second device. A first boot image is executed by the first device when the first device is determined to execute the controlling boot image, the second device to be a resource for the first boot image. The first device sends a second boot image stored on the first device to the second device when the second device is determined to execute the controlling boot image, wherein the first device to be a resource for the second boot image. | 08-28-2008 |
20080209200 | Method for protecting data in a hard disk - The present invention discloses a method for protecting data in a hard disk, which is applied to the hard disk, such that if a computer executes boot codes of the hard disk and a hard disk identification code recorded by the hard disk is determined to be identical to a computer identification code stored in a computer, the hard disk can be read, which subsequently allows an operating system to be initialized, or else the content in a partition table area will be cleared and the hard disk cannot be read, thus the initialization of the operating system cannot be completed. | 08-28-2008 |
20080209201 | APPARATUS AND METHOD FOR UPDATING BOOT LOGO IMAGE IN PORTABLE TERMINAL - An apparatus and method for updating a boot logo image in a portable terminal are provided. In the method, a boot logo image selected by a user and a boot loader are separately stored in a memory unit. | 08-28-2008 |
20080209202 | Apparatus operable under an operating system, method of controlling apparatus and computer-readable recording medium - According to an aspect of an embodiment, an apparatus operable under an operating system having an input device for inputting information, the apparatus being activated by booting a BIOS and the operating system successively comprises, a storage for storing information; and a processor receiving specific information inputted by the input device before completion of booting the operating system, storing the specific information into the storage, determining whether or not the specific information is stored in the storage after completion of booting the operating system, rebooting the BIOS when the specific information is stored in the storage and displaying information related to the BIOS. | 08-28-2008 |
20080215870 | Method and apparatus for loading boot code - Apparatus for loading boot code including a non-volatile memory for the storage of the boot code, a micro-control unit for the storage of a small boot code, a microprocessor, and a volatile memory; and wherein the microprocessor copies the boot code from the non-volatile memory into the volatile memory using the small boot code. A corresponding method is also disclosed. | 09-04-2008 |
20080215871 | Swapping "Fixed System" Hard Disk - Method for ‘Cool-Swap’, ‘Warm-Swap’ and ‘Hot-Swap’ of ‘Fixed’ ‘System’ hard disk(s) in and out of the computer and for re-cycling the computer between ‘diskly’ state to ‘diskless’ state by combining the following features in one way or the other: separating the power supply of the ‘Fixed’ ‘System’ hard disk(s) from the internal power supply that is supplying power to other components of the computer, in particular the motherboard; taking the operating system, capable of being taken to run as ramdisk-based operating system, in control of the computer to run as ramdisk-based operating system; putting the computer into different power management states; and issuing commands or instructions for logical disconnection and/or re-connection of hard disk(s). | 09-04-2008 |
20080215872 | METHOD OF BOOTING ELECTRONIC DEVICE AND METHOD OF AUTHENTICATING BOOT OF ELECTRONIC DEVICE - Provided is a method of booting an electronic device including a host central processing unit (CPU) and a security module. The method includes: the host CPU starting to boot a system by using boot information in response to a reset or power on event of the electronic device; and when an authentication start instruction is not received by the security module from the host CPU until a first predetermined period elapses after an occurrence of the reset or power on event of the electronic device, controlling an operation of the host CPU by the security module. According to the method, when the authentication start instruction is received before the first predetermined period elapses, the security module authenticates the boot information and controls the operation of the host CPU based on an authentication result. A method of authenticating a boot of the electronic device in the security module is also provided. | 09-04-2008 |
20080215873 | SYSTEM AND METHOD FOR PRESENTING COPY PROTECTED CONTENT TO A USER FROM A PORTABLE STORAGE DEVICE - A device for presenting content to a user is utilized in combination with a general purpose computer. The computer has a processor, a computer communications interface, a computer memory and an operating system. The operating system has one or more file management tools. The device has a housing, a device communications interface and a device memory. The device memory comprises a boot partition which includes boot software. The boot software is copied from the device into the computer memory and is executed from the computer memory by the processor. The device memory also comprises a secure partition inaccessible by the file management tools and having content stored thereon. The device memory also comprises content delivery software, which is copied to the computer memory, and when executed by the processor from the computer memory can access the content from the secure partition and present it to the user as sensory data. | 09-04-2008 |
20080215874 | System and Method for Masking a Boot Sequence by Providing a Dummy Processor - A system and method for masking a boot sequence by providing a dummy processor are provided. With the system and method, one of the processors of a multiprocessor system is chosen to be a boot processor. The other processors of the multiprocessor system execute masking code that generates electromagnetic and/or thermal signatures that mask the electromagnetic and/or thermal signatures of the actual boot processor. The execution of the masking code on the non-boot processors preferably generates electromagnetic and/or thermal signatures that approximate the signatures of the actual boot code execution on the boot processor. One of the non-boot processors is selected to execute masking code that is different from the other masking code sequence to thereby generate a electromagnetic and/or thermal signature that appears to be unique from an external monitoring perspective. | 09-04-2008 |
20080222407 | Monitoring Bootable Busses - A security circuit in a computer monitors data busses that support memory capable of booting the computer during the computer reset/boot cycle. When activity oil one of the data busses indicates the computer is booting from a non-authorized memory location, the security circuit disrupts the computer, for example, by causing a reset. Execution from the non-authorized memory location may occur when an initial jump address at a known location, such as the top of memory, is re-programmed to a memory location having a rogue BIOS program. | 09-11-2008 |
20080222408 | CIRCUIT FOR PROTECTING MOTHERBOARD - A circuit for protecting a motherboard includes a power button ( | 09-11-2008 |
20080222409 | Memory access system and memory access method thereof - A memory access system for accessing a basic input output system (BIOS) program is provided. The memory access system includes a flash memory, a CPU, a peripheral component interconnect (PCI) slave, an address converter and a flash memory controller. The flash memory stores a number of BIOS data of the BIOS program, and each BIOS data corresponds to a default BIOS address and is allocated in a flash memory type BIOS address. The CPU delivers a BIOS access instruction. The BIOS access instruction corresponds to a default target address of the default BIOS addresses. After the PCI slave interprets the BIOS access instruction, the address converter converts the default target address into a flash memory type target address, which is one of the flash memory type BIOS address. The flash memory controller accesses the BIOS data allocated at the flash memory type target address accordingly. | 09-11-2008 |
20080229089 | Remote network device provisioning - Various embodiments are disclosed relating to remote network device provisioning. A method is disclosed, the method comprising discovering a network address associated with a device on a network based on a discovery response received in response to a discovery request provided to the device. One or more configurable boot options associated with the device may be determined based at least in part on the discovery response. One or more of the configurable boot options may be configured on the device, wherein, upon reboot of the device using the configured boot options, a software image is provided to the device. | 09-18-2008 |
20080229090 | Memory Card, Memory System Including the Same, and Operating Method thereof - Provided is a memory card device. The memory card device includes a flash memory and a controller. The flash memory includes a boot area storing boot data, and a user area storing user data. The controller accesses the boot area or the user area according to an external command. Boot data can be stored in a memory card integrated in an electronic device. Also, when a host requests an access to boot data/user data stored in the memory card, the boot data/user data can be accessed under control of the controller. | 09-18-2008 |
20080229091 | Remote Activation Device For A Computer - A remote activation device for enabling WOL capability in a target computer that is not connected to a wired network is disclosed. The remote activation device is WOL compatible and simulates a network host computer using WOL technology for “waking-up” the target computer. The remote activation device generally comprises a microcontroller and a communications controller. The device is connected to the target computer via the communications controller of the device and a wired network adapter of the target computer. As such, the remote activation device forms a “mini-network” with the target computer. The remote activation device generates and sends a WOL magic packet to the target computer instructing the computer to power ON. Once the computer is powered ON, the computer is able to wirelessly connect to a WLAN in the target computer's work environment. A computer administrator is then able to manage the target computer via network host computer. Alternatively, a computer user is able to commence work on the target computer. | 09-18-2008 |
20080229092 | Secure Boot Across a Plurality of Processors - Boot code is partitioned into a plurality of boot code partitions. Processors of a multiprocessor system are selected to be boot processors and are each provided with a boot code partition to execute in a predetermined boot code sequence. Each processor executes its boot code partition in accordance with the boot code sequence and signals to a next processor the successful and uncompromised execution of its boot code partition. If any of the processors does not signal successful completion and/or uncompromised execution of its boot code partition, the boot operation fails. The processors may be arranged, with regard to the boot operation, in a daisy chain, ring, or master/slave arrangement, for example. | 09-18-2008 |
20080244253 | SYSTEM, METHOD AND PROGRAM FOR SELECTIVELY REBOOTING COMPUTERS AND OTHER COMPONENTS OF A DISTRIBUTED COMPUTER SYSTEM - Selectively rebooting components of a computer system. One or more tables which list respective costs to reboot the components and respective likelihoods that reboots of the respective components will correct respective problems with the computer system are generated. Each of the costs is based on a time to reboot or delays caused by the reboot of the respective component. In response to a subsequent problem with the computer system, an order to reboot components of the computer system is determined from the table based on the costs and likelihoods that the reboot will correct the problem, such that a component of the computer system characterized by a relatively low cost and high likelihood to correct the problem will be rebooted before another component characterized by a relatively high cost and low likelihood to correct the problem. The tables are updated through actual experience. | 10-02-2008 |
20080244254 | MULTI-MODE COMPUTER OPERATION - A mobile device, such as a laptop or notebook computer, capable of booting from at least two environments. If a remote environment is present, the mobile device may boot from the remote environment. The mobile device may also boot from the local environment. | 10-02-2008 |
20080244255 | Method for not resetting memory while booting computer through hardware booting button thereof - A method for not resetting a memory while booting a computer through a hardware booting button is adapted to utilize a general hardware booting mode and increases steps that judges whether preset values are respectively stored in specific address of the memory. If it is the preset value, allowing the memory to be reset is not executed before booting sequences are executed, the booting sequences are directly processed and data stored in the memory is allowed to maintain so that it will not happen that the data stored in the memory is cleared to cause embarrassment to a user because the memory is not reset. | 10-02-2008 |
20080244256 | Parallel link reset in link based system - A link based system including a plurality of processors is reset when transitioning from a slower speed to a higher speed mode during a booting process. One processor may coordinate the simultaneous establishment of link resetting of a plurality of other processors. In one embodiment, the processors may operate beginning with the farthest processor to reset their local links. Each processor sets its local links and if it determines, based on the speed of the link that the link has already been reset, it moves on to the next link. | 10-02-2008 |
20080244257 | Server active management technology (AMT) assisted secure boot - In some embodiments, the invention involves a system and method relating to secure booting of a platform. In at least one embodiment, the present invention is intended to securely boot a platform using one or more signature keys stored in a secure location on the platform, where access to the signature is by a microcontroller on the platform and the host processor has no direct access to alter the signature key. Other embodiments are described and claimed. | 10-02-2008 |
20080256351 | BIOS configuration and management - The present invention provides a system and method for a modular and enhanced kernel device manager (KDM). KDM is passed control during POST after Enhanced Device Initialization Manager (eDIM) has performed device initialization. KDM configures and manages all the devices enumerated by the eDIM. KDM groups these devices into Input Device, Output Device and/or Storage Device classifications and links them with proper class specific kernel (Input Kernel, Output Kernel, and Storage Kernel) through an Input Pipe, Output Pipe, and/or Storage Pipe. | 10-16-2008 |
20080256352 | Methods and systems of booting of an intelligent non-volatile memory microcontroller from various sources - Methods and systems of booting an intelligent non-volatile memory (NVM) microcontroller from various sources are described. According to one aspect of the present invention, a NVM microcontroller comprises multiple memory interfaces. Each of the memory interfaces may connect to one of the various sources for booting. The sources may include random access memory (RAM), read-only memory (ROM), Electrically Erasable Programmable ROM (EEPROM) (e.g., NOR flash memory, NAND flash memory). RAM may include static RAM (SRAM), dynamic RAM (DRAM), and synchronous dynamic RAM (SDRAM). Other sources include Secure Digital (SD) card and intelligent non-volatile memory devices. The NAND flash memory may include single-level cell (SLC) flash or multi-level cell (MLC) flash. SLC flash uses a single level per cell or two states per cell, while MLC flash stores four, eight or more states per cell. | 10-16-2008 |
20080263344 | Pre-Loading Data - A battery-powered device comprising: a memory storing software essential to the provision of normal functions of the device; a first processing section ( | 10-23-2008 |
20080263345 | Dual boot strategy to authenticate firmware in a computing device - Methods for authenticating firmware in a computing device include partitioning functions critical to the intended role of the computing device so that, upon successful authentication of the firmware, all functions of the device are made operational. Otherwise, the computing device behaves in a diagnostic mode of operation to assist users in troubleshooting to eventually authenticate firmware. At least first and second sets of firmware are loaded at various times into a controller of the computing device with the first set occurring without verification of trustworthiness, while the second set occurs upon authentication of the first. The second is used to authenticate a remainder set of firmware. Particular computing devices contemplate laser printers, mobile phones, PDA's, gaming consoles, etc. Firmware downloads, error messaging, hash comparisons, signature table construction, page-in techniques, computer program products, and particular computing arrangements are other noteworthy features, to name a few. | 10-23-2008 |
20080263346 | Method and device for securely sending bootstrap message in device management - A method and device for securely sending a bootstrap message from a server (i.e., a device management (DM )server) to a device in a device management system, the method comprising acquiring first information by the device, receiving, by the device, a bootstrap message from the server, acquiring, by the device, second information from the received bootstrap message, and verifying the bootstrap message by the device, whereby it is effective to securely send the bootstrap message from the server to the device by checking up whether the first information is identical to the second information. | 10-23-2008 |
20080263347 | NETWORK DEVICE AND REBOOTING METHOD THEREOF - A network device connected to a server includes a firmware upgrading determining module, a communication module, a storage module, a reboot determining module, and a reboot scheduling module. The firmware upgrading determining module determines whether current firmware of the network device needs to be upgraded. The communication module downloads the newest firmware from the server, and upgrades the current firmware if the current firmware needs to be upgraded. The storage module saves a reboot flag and a preset reboot time window. The reboot determining module determines whether the network device needs to be rebooted immediately according to the reboot flag, and determines whether the network device has a preset reboot time window. The reboot scheduling module determines what time to reboot during the reboot time window if the network device does not need to be rebooted immediately and the network device has a preset reboot time window. | 10-23-2008 |
20080263348 | Dynamic asymmetric partitioning of program code memory in network connected devices - A novel asymmetric memory partitioning mechanism for providing resolving and reducing memory limitations when an increase in software image size is required. Two partitions are created in non-volatile memory, one smaller than the other. The smaller partition stores a degenerated version of the full-functionality software comprising only essential program code for booting the device and repeating the download and installation procedures until the full-functionality software image is successfully installed in non-volatile memory. The larger portion stores a full-functionality version of the software comprising both essential and non-essential program code. The mechanism also provides the capability of converting devices already deployed in the field. The legacy symmetrical partitioning of the memory in these devices is removed and replaced with asymmetrical partitioning, wherein the smaller partition stores the degenerated software image and the larger partition stores the full-functionality software image. | 10-23-2008 |
20080263349 | BOOTING SYSTEM, BOOT PROGRAM, AND METHOD THEREFOR - A booting system, a boot program, and a method therefor are provided. A boot source device and a boot target device are connected to each other via a transfer interface. The transfer interface is an interface where booting is supported by a BIOS of the boot target device. The boot source device transfers a first object corresponding to booting data which allows the boot target device to establish and use a connection including an interface other than the transfer interface, which is not supported by the BIOS, via the transfer interface. After the boot target device is enabled to use the interface other than the transfer interface, the boot source device transfers a second object corresponding to booting data for booting up an OS of the boot target device or the like via the transfer interface and transfer interfaces and to the boot target device to boot the boot target device. | 10-23-2008 |
20080263350 | UPDATE IN-USE FLASH MEMORY WITHOUT EXTERNAL INTERFACES - A method, apparatus and program storage device for updating a non-volatile memory in an embedded system is provided. The invention includes detaching the non-volatile memory from all expectable non-volatile memory references, creating a temporary, volatile-memory file system for allocation of volatile memory space as needed for the non-volatile memory update process, copying all procedural code required to perform the non-volatile memory update into the volatile memory, changing the system search path definitions temporarily to point to the volatile memory, and performing the non-volatile memory update. | 10-23-2008 |
20080270781 | Secure compter system update - In one embodiment a computer system, comprises a processor, a trusted platform module comprising at least one platform configuration register, a basic input/output system, and logic to unseal at least one current key in the trusted platform module, initiate an update to the basic input/output system, obtain, with the update, at least a component of one expected value for a platform configuration register in the trusted platform module, seal at least one key using the at least one expected value for a platform configuration register, and install the basic input/output system update. | 10-30-2008 |
20080270782 | BOOT PROCESS - When a secure boot operation fails, the operation of a mobile telecommunications terminal can be severely impacted. In order to lower the impact on the user, one example embodiment of the invention relates to a method for automatically implementing a “safe boot” mode, whereby code can be accessed solely for the purpose of handling failed operations and if necessary providing limited services from the failing terminal. | 10-30-2008 |
20080270783 | METHOD FOR DETERMINING A REBOOTING ACTION OF A COMPUTER SYSTEM AND RELATED COMPUTER SYSTEM - A method for determining a rebooting action of a computer system includes: a keyboard controller of the computer system detecting whether a signal representing a system stage transformation is transmitted from a south bridge chipset; determining whether a system status flag is set as “ON” when the signal representing the system stage transformation is received by the keyboard controller; setting a rebooting flag as “ON” and setting the system status flag as “OFF”; determining whether a system sleeping flag representing the computer system isn't activated is “ON” and determining whether the rebooting flag is set as “OFF” according to this determined result; detecting whether the signal representing the system stage transformation is transmitted from the south bridge chipset; determining whether the rebooting flag is set as “ON”; and determining whether the computer system executes the rebooting action according to a determined result of whether the rebooting flag is “ON”. | 10-30-2008 |
20080276082 | COMPARING CHRACTERISTICS PRIOR TO BOOTING DEVICES - A system that comprises a first electronic device comprising a non-volatile memory. The system also comprises another electronic device in communication with the first electronic device and comprising a second non-volatile memory. The system further comprises a control logic coupled to the first and second electronic devices. Each of the non-volatile memories stores electrical characteristics associated with a corresponding electronic device. Prior to booting up the first or second electronic device, the control logic obtains and compares at least some of the electrical characteristics and disables the communication as a result of the comparison. | 11-06-2008 |
20080282077 | APPARATUS, METHOD AND PROGRAM PRODUCT FOR INITIATING COMPUTER SYSTEM OPERATION - A computer system which includes a CPU for performing various processes by program control and storage elements which store at least one operating system and a BIOS, wherein upon starting a system, the CPU recognizes the system's own hardware configuration, and starts a selected one operating system stored in the storage elements in accordance with the recognized hardware configuration under the control of the BIOS. | 11-13-2008 |
20080288762 | Firmware Interface Runtime Environment Protection Field - Method and apparatus for protecting a firmware runtime environment are described herein. In one embodiment, a process example is provided to retrieve a first key from a secure store of a firmware within a platform, the firmware including an initialization table for initializing the platform, and verify the initialization table using the first key retrieved from the secure store during an initialization of the platform. Other methods and apparatuses are also described. | 11-20-2008 |
20080288763 | Method For Controlling the Operation of a Display Screen In A Computing Device - In a computing device such as a mobile phone which includes a splash-screen displayed while the operating system is booting up, the portion of the operating system which is responsible for the display after booting up is provided with all the information about the state of the splashscreen, so that a smooth transition is provided between the splashscreen and the initial screen under the control of the operating system when control of the screen is passed from the boot-up process to the operating system. | 11-20-2008 |
20080288764 | BOOT-SWITCHING APPARATUS AND METHOD FOR MULTIPROCESSOR AND MULTI-MEMORY SYSTEM - A boot-switching apparatus suitable for a system having a plurality of processors and a plurality of memories and a method thereof are provided. While booting the system, a single timer is used for counting down a time-out and it is determined whether a disabling signal sent by a Basic Input/Output System (BIOS) is received during the countdown. If the disabling signal is not received and the time-out is up, whether the processors operate normally is further detected and a plurality of detection signals is obtained. Next, whether each of the detection signals matches its corresponding enabling signal is determined. If the two do not match, the corresponding processor is disabled. If all of them match, the memories are switched. Accordingly, the problem of misjudgment in the prior art can be resolved and the system can be led to select normal processor and memory for executing its booting. | 11-20-2008 |
20080288765 | Computer system capable of reducing booting time and method thereof - The present invention discloses a method for reducing booting time of a computer system, and the method is applied in a computer booting process. If a computer receives an easy booting signal, the computer will read an easy booting data built in a basic input output system (BIOS) of the computer, start an operating system (OS) of the computer and enable at least one terminate-and-stay-resident (TSR) program of the operating system, such that the whole booting process can be completed quickly without wasting unnecessary time on self-testing all hardware devices for the booting process or loading all terminate-and-stay-resident programs. | 11-20-2008 |
20080288766 | INFORMATION PROCESSING APPARATUS AND METHOD FOR ABORTTING LEGACY EMULATION PROCESS - An information processing apparatus includes: a non-volatile memory that stores a BIOS program that performs legacy emulation process for enabling a device not supported by an operating system to be accessed from the operating system; a controller that controls the device; a boot process unit that performs a boot sequence for booting the operating system stored in the device by controlling the controller through the legacy emulation process of the BIOS program; and a legacy emulation process control unit that performs a stop control process including: monitoring write access by software to a predetermined register, in which a value for designating an operation environment for controlling the device to the controller is set; and aborting execution of the legacy emulation process by the BIOS program when the write access is detected. | 11-20-2008 |
20080288767 | Computer system - The invention provides a computer system, which includes a motherboard, a nonvolatile memory and a chipset provided on the motherboard. The nonvolatile memory stores a first BIOS and a second BIOS. The chipset has an external flag having a first state and a second state corresponding to the first BIOS and second BIOS, respectively. When the external flag is in the first state, the motherboard is booted by the first BIOS. When the external flag is in the second state, the motherboard is booted by the second BIOS. When one BIOS is booted according to the state of the external flag, if the BIOS is damaged, the other complete BIOS is booted and is used to update the damaged BIOS program. | 11-20-2008 |
20080294886 | Method for resetting bios - A method for resetting a basic input/output system (BIOS) suitable for a desktop computer having the BIOS is provided. The BIOS is reset when a reset or power button of the desktop computer is pressed. Accordingly, the problem that the desktop computer cannot be booted up can be resolved quickly. | 11-27-2008 |
20080294887 | ACTIVATION METHOD FOR MULTIPLE OPERATION SYSTEMS OF A COMPUTER - An activation method for multiple operation systems of a computer, comprising selectively pressing a function key in a keyboard while pressing a power supply key, receiving a signal of the pressed power supply key and a key code of the pressed function key by an embedded controller, determining the operation system desired to be activated according to the received key code by the embedded controller, and informing a basic input/output system by the embedded controller to activate the specific operation system. Therefore, the waiting time spent on selecting operation system in the prior art is eliminated. | 11-27-2008 |
20080294888 | DEPLOY TARGET COMPUTER, DEPLOYMENT SYSTEM AND DEPLOYING METHOD - A deploy target computer is connected to a storage device including a replication source logical disk used to store a boot disk image. A disk mapping processing part in the deploy target computer changes over access destination so as to set the access destination to the replication source logical disk in the storage device when an I/O request is issued from the deploy target computer to the storage device and the I/O request specifies reading the boot disk image, and so as to set the access destination to a replication destination logical disk for conducting writing concerning the boot disk image when the I/O request specifies writing concerning the boot disk image. | 11-27-2008 |
20080294889 | Method and apparatus to store initialization and configuration information - Briefly, in accordance with an embodiment of the invention, an apparatus and method to store initialization and configuration information is provided. The method may include storing basic input/output system (BIOS) software in a polymer memory. The method may further include copying a first portion of the BIOS software from the polymer memory to a random access memory (RAM) buffer of a memory controller, wherein the RAM buffer has a storage capacity of at least about two kilobytes (KB). | 11-27-2008 |
20080301424 | Intelligent Boot Services - An information handling system is provided with an intelligent boot service which addresses and resolves unbootable system scenarios. The intelligent boot service detects and corrects adverse events before booting into the operating system. The intelligent boot service architecture is extensible to add newer events and is extensible to include extensible firmware interface (EFI) technology. | 12-04-2008 |
20080301425 | Method And System To Support ISCSI Boot Through Management Controllers - An information handling system includes a host including a central processing unit, a management controller enabled to communicate with the host, a network interface resource in communication with the host and operable to enable the information handling system to communicate via an external network, and a target system in communication with the host through the network interface resource. The management controller comprises an iSCSI initiator operable to generate a request to the target system for an initial OS image. | 12-04-2008 |
20080301426 | ROOTKIT DETECTION - Embodiments of the present invention address deficiencies of the art in respect to rootkit detection and provide a method, system and computer program product for external rootkit detection and remediation. In one embodiment of the invention, an external rootkit detection tool can be provided. The tool can include external static memory with an input/output (I/O) port interface to an external I/O port on a target computing platform. The tool further can include a boot image disposed in the external static memory, and rootkit detection and remediation logic disposed in the external static memory and referenced by the boot image. In one aspect of the embodiment, the external static memory can include a universal serial bus (USB) key and, correspondingly, the I/O port can include an external USB port. | 12-04-2008 |
20080301427 | BASIC INPUT/OUTPUT SYSTEM MEMORY SIMULATION MODULE - A basic input/output system (BIOS) memory simulation module includes a first transmission interface unit adapted to receive an updated BIOS data from an external source, a second transmission interface unit adapted to be connected electrically to a computer under test, a memory unit, and a control unit connected electrically to the first transmission interface unit, the second transmission interface unit and the memory unit. The control unit is operable to store the updated BIOS data from the first transmission interface unit into the memory unit, and to output the updated BIOS data stored in the memory unit to the computer under test via the second transmission interface unit. | 12-04-2008 |
20080301428 | INFORMATION PROCESSING APPARATUS AND START-UP CONTROL METHOD - According to one embodiment, if start-up of an application is abnormal after starting up the application, the information processing apparatus reports the fact to the basic input/output system (BIOS), and the BIOS locks a system. | 12-04-2008 |
20080307215 | REMOTE COMPUTER OPERATING SYSTEM UPGRADE - Methods of upgrading a kernel image of a remote computer are described. The method comprises, during a first connection between an update computer and a remote computer, storing a kernel version identifier of the active kernel image of the remote computer; storing active boot partition information comprising the active kernel boot partition of the remote computer; setting the active boot partition of the remote computer as a safe boot partition; storing a second kernel image at the remote computer, wherein the second kernel image comprises a second kernel version identifier; setting the remote computer to boot from the second kernel image; rebooting the remote computer; and, during a second connection between the update computer and the remote computer, marking the second kernel image as a safe kernel image if the active kernel version is the same as the second kernel version identifier. | 12-11-2008 |
20080307216 | METHOD AND APPARATUS FOR BOOTING A COMPUTER SYSTEM - In investigating the cause of a fault in a computer storage system, it is considered useful to previously prepare maintenance logical units (LUs) of a simple structure, the operation of which has been confirmed. If the same number of LUs as servers are prepared for each server as in the prior art, the efficiency is low. Furthermore, securing these LUs complicates assignment of the LUs for construction of a system and a work for addressing the fault. The present invention provides a computer system free of these problems. The computer system has a first computer for executing a first OS (operating system), a second computer for executing a second OS, and a storage array system. The storage array system uses a disk device having a logical unit (LU) for storing a boot loader, as well as the first and second OSes. The boot loader is executed on any one of the two computers, reads in any of the OSes corresponding to the currently operating computer into this operating computer, and executes the read OS. | 12-11-2008 |
20080313450 | Distributed Bootstrapping Mechanism for Peer-to-Peer Networks - Methods, apparatuses and systems directed to a distributed bootstrapping mechanism for peer-to-peer networks. In particular implementations, the de-centralized bootstrapping mechanism utilizes an allocated set of anycast addresses from the public IP space. Routing nodes or peer nodes corresponding to respective autonomous systems select an anycast address by computing a hash of an Autonomous System (AS) number (or other string) and mapping the hash value, or a portion of the hash value, to one of the anycast addresses in the allocated set. Other mechanisms for selecting anycast addresses (such as random selection) can be used. One or more of the routing nodes of the autonomous system may advertise a host route identifying the selected anycast address. When a new peer node is added to the P2P network, it may, upon initialization, transmit discovery messages using the anycast addresses from the allocated set, which may be ultimately routed to one of the peers in the P2P network. One of the responding peers in the P2P network may then be used by the newly initialized peer as a bootstrap resource to join the P2P network. | 12-18-2008 |
20080313451 | DATA RECOVERY METHOD - The present invention provides a data recovery method in a system with storage of default values and prior configuration values, including executing initialization of the system; loading the default values; detecting a status of a first flag to generate a first detection result; and, determining whether a boot-up sequence is complete according to the first detection result. | 12-18-2008 |
20080313452 | One wire boot loader - A power tool system component has a microprocessor, a one wire communication terminal connecting the microprocessor to an external device, and a flash memory storing: (a) an application program governing operation of an application mode during which the power tool system component is operated; and (b) a boot loader program governing operation of a boot loader mode during which at least part of the application program can be updated. The microprocessor accesses the flash memory and implements the boot loader program and the application program by setting up and observing a temporal window during which one or more predetermined conditions must be met for the boot loader mode to be entered. The predetermined conditions include successful completion of a calibration process that includes sending a calibration byte to the external device according to a format predetermined to allow the external device to adjust its baud rate for sending and receiving information. Upon successful completion of the conditions within the temporal window, the microprocessor sends a confirmation to the device that the conditions have been satisfied and enters the boot loader mode. | 12-18-2008 |
20080313453 | Boot Validation in Imaging Devices - A boot validation system and method may be used in a computer system to validate boot code before allowing the computer system to execute the boot code. In particular, a secure hash algorithm may be used to compute a hash value of the boot code and the computed hash value may be compared to a preprogrammed hash value stored in a secure non-volatile device. If the hash values match the boot code may be validated and the system may then be allowed to execute the boot code. Once the boot code is validated, the boot code may be executed to validate other code (e.g., firmware) in the computer system. In an exemplary embodiment, the boot validation system and method may be used in an imaging device, such as a printer. | 12-18-2008 |
20080313454 | SYSTEM AND METHOD FOR RAPID BOOT OF SECONDARY OPERATING SYSTEM - The primary operating system of a computer such as a notebook computer is stored on disk in a hard disk drive and a smaller, secondary operating system such as an email operating system, wireless phone operating system, DVD player operating system, etc. is stored on disk and is transferred to flash memory within the HDD upon power-down of the primary operating system. In this way, should the user subsequently elect to power up the computer only for a limited secondary purpose, the user can elect to boot the associated secondary operating system from flash memory of the HDD without having to spin up the disks, saving energy and reducing boot time. | 12-18-2008 |
20080320294 | USER SELECTABLE CONFIGURATION OPTIONS APPLICATION FOR INACCESSIBLE NONVOLATILE STORAGE AT BOOTSTRAP - Embodiments of the present invention address deficiencies of the art in respect to applying user configurable options during bootstrap and provide a novel and non-obvious method, system and computer program product for user selectable configuration options application for inaccessible nonvolatile storage at bootstrap. In one embodiment of the invention, a method for user selectable configuration options application for inaccessible nonvolatile storage at bootstrap can be provided. The method can include powering up a motherboard for a computer system and reading user selectable configuration options for the computing system from sticky bits prior to bootstrap for the motherboard. The method further can include applying the user selectable configuration options to the computing system. Finally, the method can include performing bootstrap for the motherboard subsequent to applying the user selectable configuration options. | 12-25-2008 |
20080320295 | METHOD AND APPARATUS FOR VIRTUALIZATION OF APPLIANCES - A method and apparatus for the virtualization of appliances provides an embedded operating system (OS) which is included in the system boot ROM of a personal computer. When the system boots, the OS is launched and looks for all available virtual appliances from, for example, the following places: local USB, flash card, e.g. SD, xD, CF, CDROM/DVD, or other storage media; local hard disk storage; and the Internet, e.g. an appliance server. The user selects an appliance to use from the OS, whereupon the appliance is loaded and launched. If the selected appliance is not on a local storage, then it is downloaded, e.g. over the Internet from an appliance server. The downloaded appliance can be cached in local storage media such that, the next time it is needed, it need not be downloaded from the appliance server. The user can also elect to boot an operating system from the hard disk, if an operating system and hard disk are installed, or to power-off the system. | 12-25-2008 |
20090006833 | IMAGE FORMING APPARATUS - An image forming apparatus includes: a hardware resource used in image formation; and a storage unit storing a program for processing the image formation; and a controller that is operable to: accepting rebooting commands for rebooting the hardware resource and the program; monitoring a state of the hardware resource and a state of the program and detecting whether or not at least one of the hardware resource and the program is in automatic adjustment processing; and rebooting the hardware resource and the program according to the rebooting commands after completion of the automatic adjustment processing, when the rebooting commands are accepted in a state that the hardware resource or the program is in the automatic adjustment processing. | 01-01-2009 |
20090006834 | PROXIED FIRMWARE UPDATES - The subject mater herein relates to computing systems and, more particularly, to proxied firmware updates. Some embodiments provide one or more of systems, methods, software, and firmware that, upon receiving a source of power, initialize an out-of-band controller that, may initialize a network interface to facilitate communication by the out-of-band controller with network resources and receive a firmware update payload from a remote network source over the network interface. These, and other embodiments may also include powering on a computing system including a BIOS and initializing at least a portion of the BIOS. If the computing system supports proxied firmware updates and a firmware update exists in a memory, such embodiments retrieve the payload and launching the payload to implement the firmware update. | 01-01-2009 |
20090006835 | ELECTRONIC DEVICE AND CONTROL METHOD THEREOF - An electronic device is disclosed. The electronic device includes a storage unit in which execution codes including a boot code and an application code are stored, a main memory in which the boot code is loaded, a CPU which performs booting by executing the boot code loaded in the main memory, and executes the application code; and a controller which reads the boot code of the execution codes, loads the boot code to the main memory, and controls the CPU to perform booting if it is determined that the boot code is completely loaded. | 01-01-2009 |
20090006836 | Information Processing Unit For Automatically Copying System Information - An information processing unit is provided, which includes a first memory, a second memory, and a controller. The first memory stores a BIOS program beforehand that is executed at a startup of the unit so as to allow peripheral devices to operate normally. The first memory also stores initial BIOS data beforehand. The second memory stores BIOS data with which the BIOS program is executed. The controller is configured to: (a) if the initial BIOS data is updated, read the updated BIOS data including updated data from the first memory and writes the updated BIOS data into the second memory; and (b) execute the BIOS program using the updated BIOS data written in the second memory. | 01-01-2009 |
20090013164 | Computer system and method of using power button to switch from one BIOS to another - A computer system, using a power button to switch from one BIOS to another, includes a power button, a detection device and a switch circuit. The power button is electrically coupled to the computer system. The detection device is electrically coupled to the power button, and outputs a switch signal and a boot signal when the power button is continuously pushed for a switch time value, in which the boot signal is used to execute a boot procedure in the computer system. The switch circuit is electrically coupled to the detection device, and switches from a first BIOS to a second BIOS used for the boot procedure, in accordance with the switch signal. A method of using a power button to switch from one BIOS to another is also disclosed. | 01-08-2009 |
20090013165 | PORTABLE USB DEVICE THAT BOOTS A COMPUTER AS A SERVER - Techniques for booting a host computer from a portable storage device with customized settings have been described herein. According to one embodiment, in response to detecting a portable storage device inserted into a first host computer having a first operating environment provided by a first operating system (OS) installed in the first host computer, rebooting the first host computer into a second operating environment using a second OS image stored in the portable device. In addition, a personal configuration file stored in the portable device is extracted to configure the second operating environment of the first host computer, such that the user of the portable storage device can operate the second host computer in view of the personal working environment. Other methods and apparatuses are also described. | 01-08-2009 |
20090013166 | ROM BIOS BASED TRUSTED ENCRYPTED OPERATING SYSTEM - There is disclosed a device, system, and method for a ROM BIOS based trusted encrypted operating system for use in a gaming environment. The gaming device includes a ROM storing a BIOS, a secure loader, an encrypted operating system, and a decryption key for decrypting the encrypted operating system. The decryption key is partitioned and scattered about the secure loader. The method includes initializing the BIOS, locating the decryption key, decrypting the encrypted operating system with the encryption key, verifying a plurality of check codes, and transferring control to the operating system. The check codes are verified responsive to decrypting the encrypted operating system. The check codes are dispersed about the operating system and are unrelated to the operating system. Control is transferred to the operating system responsive to verifying the check codes. | 01-08-2009 |
20090013167 | COMPUTER DEVICE, METHOD FOR BOOTING THE SAME, AND BOOTING MODULE FOR THE SAME - A method for booting a computer device can be applied to a basic input/output system (BIOS). Whether backup data of a master boot record (MBR) is stored in the BIOS is first determined. When the backup data of the MBR is not stored in the BIOS, actual data of the MBR is backed up to the BIOS; when the backup data of the MBR is stored in the BIOS, the actual data of the MBR is compared with the backup data of the MBR. Then the backup data is restored to MBR when the actual data is different from the backup data. | 01-08-2009 |
20090013168 | SYSTEMS AND METHODS FOR AUTOMATIC PROVISIONING OF STORAGE AND OPERATING SYSTEM INSTALLATION - A method for provisioning a blade server is provided. The method includes creating a server boot image for a blade server, where the boot image includes an operating system image created from a donor server. Then, the method includes inserting the blade server into a chassis of an enclosure that is capable of receiving multiple blade servers. Then, staring the blade server from a pre-boot execution environment (PXE). The PXE loading an image that prompts a user to install a new operating system from a pre-existing target computer of the enclosure. The method then installs the new operating system. The installing includes creation of a new iSCSI target for the inserted blade server, and partitioning of the iSCSI target. The also includes restarting the inserted blade server. The restarting is configured to boot using the iSCSI target of the inserted blade server, so that the inserted blade server becomes a provisioned blade server. The provisioning is accomplished without a hardware iSCSI initiator for an iSCSI boot. | 01-08-2009 |
20090013169 | Method And System For Migrating Information Between Information Handling Systems - A system for migrating information includes a first information handling system (IHS). The first IHS is for, in response to a first boot event, booting from a computer readable medium, bypassing the first IHS user authentication requirement, and establishing a connection between the first IHS and a second IHS. The system for migrating information also includes the second IHS, coupled to the first IHS. The second IHS is for, in response to a second boot event, booting from a storage device of the second IHS, establishing the connection between the first IHS and the second IHS, and migrating information from the first IHS to the second IHS. | 01-08-2009 |
20090019274 | DATA PROCESSING ARRANGEMENT COMPRISING A RESET FACILITY - A data processing arrangement (MPS) comprises a plurality of data processors (SPR, PM | 01-15-2009 |
20090019275 | Secure Boot Method and Semiconductor Memory System Using the Method - A semiconductor memory system includes an external memory, an internal memory, and a one-time programmable (OTP) memory. The external memory includes a kernel, a public key, first boot information used to authenticate the public key and generate a test secret key, and a second boot loader verifying integrity of the kernel. The internal memory includes a first boot loader that verifies integrity of the second boot loader and generates the test secret key. The OTP memory includes second boot information generated using the public key and a secret key. Since the secure boot method and the semiconductor memory system using the method do not need an additional OTP memory to store a secret key unlike conventional technology, the capacity and recording time of the OTP memory can be reduced to about half compared to the conventional technology. | 01-15-2009 |
20090019276 | NETWORK TERMINAL OPERATED BY DOWNLOADABLE OPERATING SYSTEM AND OPERATING METHOD THEREOF - A network terminal operated by a downloadable operating system is provided. In the network terminal, a power supply supplies a power to an element of the network terminal, a nonvolatile storage medium stores a basic input/output system (BIOS) that automatically operates upon the supplying of the power, a controller is initialized by the operation of the BIOS in order to enable a connection between the network terminal and a host computer and to enable a download of a terminal operating system (OS) from the host computer to the network terminal, and a volatile storage medium stores the terminal OS downloaded from the host computer. | 01-15-2009 |
20090019277 | NETWORK TERMINAL OPERATED BY DOWNLOADABLE OPERATING SYSTEM AND OPERATING METHOD THEREOF - A network terminal operated by a downloadable operating system is provided. In the network terminal, a power supply supplies a power to an element of the network terminal, a nonvolatile storage medium stores a basic input/output system (BIOS) that automatically operates upon the supplying of the power, a controller is initialized by the operation of the BIOS in order to enable a connection between the network terminal and a host computer and to enable a download of a terminal operating system (OS) from the host computer to the network terminal, and a volatile storage medium stores the terminal OS downloaded from the host computer. | 01-15-2009 |
20090024843 | COMPUTER HAVING FLASH MEMORY AND METHOD OF OPERATING FLASH MEMORY - Provided is a method of variably establishing storage areas of a flash memory according to the status of a system in a computer having flash memory in which booting data and execution data are stored. The computer includes: a flash memory including a storage area that is divided into a boot area for storing booting data and a cache area for storing execution data, and supplementing a reading speed of a main storage device; a flash controller designating a location to which the data stored in the flash memory is written; and a main controller calculating an area ratio of the flash memory according to the operating status of a PC, controlling the flash controller, and reestablishing the area ratio between the boot area and the cache area. | 01-22-2009 |
20090037717 | FIRMWARE RETRIEVAL ACROSS A NETWORK - A system comprises a processor and non-volatile storage coupled to the processor. The non-volatile storage comprises firmware that is executable by the processor. The processor determines whether the firmware is available to be executed. If the firmware is not available to be executed, the processor determines a location across a network and retrieves a second firmware image from that location. | 02-05-2009 |
20090037718 | BOOTING SOFTWARE PARTITION WITH NETWORK FILE SYSTEM - In a software partition (SWPAR) environment, a method, system and computer program product enables a SWPAR to be remotely booted, independent of the booting of the OS on the global system environment, using network file system (NFS) services and protocols. A request to mount a NFS, hosted by an external server into a SWPAR environment is transmitted. The NFS services are automatically transitioning to a first operating state that enables support for user-level NFS services without requiring the NFS services be active. The SWPAR is automatically booted and access to the SWPAR provided during operation of the NFS services in the first operating state. Once the SWPAR has completed booting, the NFS services is transitioned back to a normal operating state in which SWPAR operates as a standalone device providing its own user-level NFS services. | 02-05-2009 |
20090037719 | Enabling a heterogeneous blade environment - In one embodiment, the present invention includes a method for receiving a request for power-up of a first blade of a chassis, enabling the first blade to power-up in a reduced boot mode and receiving a communication including characteristic information and policy information associated with the first blade, and analyzing the characteristic information and the policy information to determine a policy and a boot configuration for the first blade. Other embodiments are described and claimed. | 02-05-2009 |
20090037720 | Hard Disk Security Method in a Computer System - This invention presented a hard disk security method in a computer system, which provides a hard disk security mechanism combining with the power-on password function for the storage data in a hard disk by restoring the partition table into the BIOS ROM in advance, and deleting the partition table of the hard disk to secure the hard disk. | 02-05-2009 |
20090037721 | PROGRAM DEVELOPMENT METHOD, PROGRAM DEVELOPMENT SUPPORTING SYSTEM, AND PROGRAM INSTALLATION METHOD - An development environment of a high security level is provided for a key-installed system. Development of a program for a system having an LSI device which includes a secure memory is performed by providing another LSI device having the same structure and setting the provided LSI device to a development mode which is different from a product operation mode. Alternatively, the provided LSI device is set to an administrator mode to perform development and encryption of a key-generation program. The LSI device is set to a key-generation mode to execute the encrypted key-generation program, thereby generating various keys. | 02-05-2009 |
20090037722 | Integration Model for Instant-On Environment - An instant-on environment consists of components residing in a computer boot ROM and/or also on a mass storage device. Main components to the instant-on environment include a loader, EPG1, and EPG2. The loader is a module that is integrated into the computer boot ROM, based on an embedded OS, that functions to load other instant-on environment components. There are various methods of integrating the loader into boot firmware to optimize for different requirements. EPG1 is a first user screen that appears on the computer display within seconds after power-on, and from which the user can choose to launch one of the instant-on environment's applications or launch the primary OS. EPG2 is launched if the user chooses to launch an instant-on environment application. EPG2 is a Linux-based desktop environment that the user enters once he selects an application from EPG1. | 02-05-2009 |
20090037723 | Method for the Autonomic Configuration of a Data Storage Device - A method is disclosed for configuring a data storage device. A storage module stores configuration data on a remote storage system that may include operating systems, applications, updates, and an index. A boot module boots a computer system from a program other than the regular boot program to provide access to a network in communication with the remote storage system. A device configuration module autonomically downloads and installs the operating systems, applications, and updates in response to data stored in an index on the remote storage system. | 02-05-2009 |
20090044001 | METHOD OF POWERING UP A TERMINAL, MEMORY AND TERMINAL THEREOF - A method of powering up a portable terminal, which automatically executes a software program when powered on, the terminal having a manually operated power-up key, wherein the method comprises the step of: a) at the beginning, moving (in | 02-12-2009 |
20090044002 | COMPUTER SYSTEM AND BOOTING METHOD THEREOF - A computer system, including a data storage unit which stores first operating system data of the computer system therein; a main memory to which the first operating system data is copied; a data transmission unit which transmits data between the data storage unit and the main memory; and a controller which performs a power-on self test (POST) of the computer system, and controls the data transmission unit to copy the first operating system data stored in the data storage unit to the main memory during the POST. | 02-12-2009 |
20090049290 | CONSISTENT DATA STORAGE SUBSYSTEM CONFIGURATION REPLICATION - Consistency for replicating data storage subsystem configurations in accordance with a “golden” configuration file. A data storage subsystem comprises a blade system with a plurality of slots, the blade system configured to support a plurality of blades and a storage system, each arranged in a predetermined slot of the blade system. A management module operates the blade system to first power on the storage system, and subsequently to power on the plurality of server blades in a sequential order that matches a blade system natural boot sequence order, skipping the storage system, and the storage system is configured with the “golden” configuration file to log on the server blades in accordance with the power on sequence to logically configure the server blades in accordance with the “golden” configuration file. | 02-19-2009 |
20090049291 | CONSISTENT DATA STORAGE SUBSYSTEM CONFIGURATION REPLICATION IN ACCORDANCE WITH SEQUENCE INFORMATION - Consistency for replicating data storage subsystem configurations in accordance with a “golden” configuration file. A data storage subsystem comprises a blade system with a plurality of slots, the blade system configured to support a plurality of blades and a storage system, each arranged in a predetermined slot of the blade system. A management module operates the blade system to first power on the storage system. In accordance with a “golden” configuration file, the storage system passes sequence information to the management module. The management module powers on the plurality of server blades in accordance with the sequence information. The storage system is configured with the “golden” configuration file to log on the server blades in accordance with the power on sequence to logically configure the server blades in accordance with the “golden” configuration file. | 02-19-2009 |
20090049292 | Computer with Extensible Firmware Interface Implementing Parallel Storage-Device Enumeration - A computer includes an extensible firmware interface with a storage device enumeration function that performs storage device enumeration operations in parallel. | 02-19-2009 |
20090049293 | BOOTING A COMPUTER USING A BOOT LIST WHEN A NON-VOLATILE MEMORY ON THE COMPUTER DOES NOT CONTAIN THE BOOT LIST - A computer implemented method, apparatus, and computer program product for booting a computer using a boot list. A determination is made as to whether a boot list is present in a non-volatile memory of the computer. The boot list is a set of paths, in which each path in the boot list is a path of a storage device. If the boot list is not present, a search is performed for the boot list in a reserved area of each storage device in a set of storage devices. When the boot list is found in the reserved area of a storage device in the set of storage devices, the boot list is copied from the reserved area of the storage device in the set of storage devices to form a copied boot list. The copied boot list is stored in the non-volatile memory to form a stored boot list. The computer is booted using the stored boot list in the non-volatile memory. | 02-19-2009 |
20090049294 | METHOD FOR BOOTING COMPUTER SYSTEM - The invention relates to a method for booting a computer system. The method includes the steps of executing a hardware initialization process, starting a setting interface according to a trigger signal, determining whether a specific setting option belongs to a specific option group when the value of the specific setting option in the setting interface is changed and loading an operating system to the computer system when the specific setting option belongs to the specific option group. | 02-19-2009 |
20090049295 | Determining a boot image based on a requesting client address - A method, computer-readable storage medium, and boot server that, in an embodiment, receive a command that requests a name of a boot image and a network address of a boot server that contains the boot image, invoke a plug-in to determine the name of the boot image based on an address of a client that sent the command, and send the name of the boot image and the network address of the boot server to a client that sent the command. In various embodiments, the address of the client may be a network address or a MAC (Media Access Control) address. The client retrieves the boot image via the name, and the boot image initializes the client when executed at the client. The name of the boot image is changed to a second name and sent to the client in response to another command. | 02-19-2009 |
20090055639 | Methods and system for modular device booting - The present invention a method for modular device booting comprising retrieving a first boot code from a non-volatile memory element, receiving a memory access request from at least one subsystem, said memory access including at least a boot status indication indicating a memory region and a memory address, if said received address and region match a predefined address and region, associating said at least one subsystem with a corresponding subsystem boot code address included in said retrieved first boot code, retrieving a corresponding subsystem boot code from said associated boot code address, and transferring said boot code to said corresponding subsystem. | 02-26-2009 |
20090055640 | Masking a Hardware Boot Sequence - One of the processors of a multiprocessor system is chosen to be a boot processor. The other processors of the multiprocessor system execute masking code that generates electromagnetic and/or thermal signatures that mask the electromagnetic and/or thermal signatures of the actual boot processor. Such masking may involve running the same boot code as the boot processor but without obtaining access to security information, such as the security key for accessing the system. The electromagnetic and/or thermal signatures generated by the execution of the masking code preferably approximate the electromagnetic and/or thermal signatures of the actual boot code executing on the boot processor. In this way, it is difficult to distinguish which processor is the actual boot processor. | 02-26-2009 |
20090063834 | Auto-Switching Bios System and the Method Thereof - An auto-switching BIOS system and the method thereof, switches to dual BIOS by a hardware control circuit. After the system has been started with the first BIOS to the predetermined period of time and the BIOS_READY signal is detected as disabled, the hardware control circuit switches the system from the first BIOS to the second BIOS and restarts the system with the second BIOS. | 03-05-2009 |
20090063835 | Method for firmware isolation - In one embodiment, the present invention includes a method for determining if an isolation driver is present and a processor supports virtualization, launching the isolation driver in a first privilege level different than a system privilege level and user privilege level, creating a 1:1 virtual mapping between a virtual address and a physical address, using the isolation driver, and controlling access to a memory page using the isolation driver. Other embodiments are described and claimed. | 03-05-2009 |
20090063836 | Extended fault resilience for a platform - In one embodiment, the present invention includes a method for allocating a fail-over memory region, determining if multiple processors have reached a rendezvous state, and verifying a memory failure in a system software memory region associated with a non-rendezvousing processor and sending a message to the non-rendezvousing processor to update a range register to the fail-over memory region. Other embodiments are described and claimed. | 03-05-2009 |
20090063837 | User influenced loading sequence - There is provided a method for altering a sequence in which programs and content are loaded upon startup of an electronic device. A user may change the loading sequence by selecting a program or content before the loading sequence has finished. In addition, the altered loading sequence may be saved and utilized when the electronic device is powered on again. There is also provided a tangible, machine-readable medium for performing the described method. Finally, there is provided an electronic device having a memory device for storing a loading program that defines a loading sequence, a processor for loading programs and content based on the loading sequence, and a user interface for delivering user input to the loading program to alter the loading sequence. | 03-05-2009 |
20090063838 | MULTI-OPERATING SYSTEM DOCUMENT EDITING MODE FOR BATTERY POWERED PERSONAL COMPUTING DEVICES - Embodiments of the present invention provide a method, system and computer program product for a low power document editing mode for mobile computing devices. In an embodiment of the invention, a battery powered computing device can be configured for power optimized document editing, the computing device. The device can include a central processing unit (CPU), both coupled to a battery, memory, fixed storage and a display within a single computing case. The device also can include a primary personal computing operating system and also an auxiliary low-power consumption operating system each stored in fixed storage, each including a configuration to access an editable document in the fixed storage. Finally, the device can include a boot read only memory (ROM) programmed to selectively bootstrap into either the primary personal computing operating system or the auxiliary low-power consumption operating system. | 03-05-2009 |
20090063839 | LOW POWER DATA TRANSFER MODE FOR BATTERY POWERED PERSONAL COMPUTING DEVICES - Embodiments of the present invention provide a method, system and computer program product for a low power data transfer mode for mobile computing devices. In an embodiment of the invention, a method for low power data transfer in a battery powered computing device can be provided. The method can include powering up a battery powered computing device, booting into a primary personal computing operating system in the device and storing a document into fixed storage for the device, and subsequently re-booting into an auxiliary low-power consumption operating system in the device, establishing a short range radio frequency communications link between the battery powered computing device and an external pervasive device, and transmitting the stored document to the pervasive device over the short range radio frequency communications link. | 03-05-2009 |
20090063840 | Information Processing Apparatus and Program - If a defect flag stored in a CF | 03-05-2009 |
20090063841 | MOTHERBOARD, COMPUTER SYSTEM AND MULTI-MONITORING METHOD THEREOF - A computer system includes a center processor, a monitoring unit, a water-cooling system and a basic input output system (BIOS) unit. The monitoring unit is coupled to the central processor, and it is used for monitoring a plurality of processor working states of the central processor and generating a plurality of signals. The water-cooling system is coupled to the monitoring unit, and then the monitoring unit is allowed to monitor a plurality of system working states of the water-cooling, system, wherein each of the system working states is respectively corresponding to one of the processor working states. The BIOS unit is coupled to the monitoring unit, and it is used for outputting a plurality of control commands to adjust the operation of the central processor and the water-cooling system according to the signals and the setting value of a user. | 03-05-2009 |
20090063842 | PRINTER - A printer includes: a nonvolatile storage unit, storing a plurality of types of software and enable keys for the respective pieces of the software; and a software update unit, when update information including several pieces of software and verification keys and new enable keys for the respective pieces of the software is provided, determining, whether or not the enable key in the nonvolatile storage unit pertaining to the corresponding software has a predetermined relationship with the verification key in the update information, with respect to each of the pieces of the software in the update information, and performing rewrite processing for rewriting the software and the enable key in the nonvolatile storage unit respectively to the software and the new enable key in the update information, with respect to each of the pieces of the software for which the enable key has the predetermined relationship with the verification key. | 03-05-2009 |
20090063843 | Systems and Methods for Booting a Codec Processor over a High Definition Audio Bus - Systems and methods for booting a programmable processor such as a DSP that is incorporated into an HDA codec. The codec and a system memory containing boot program instructions are connected to an HDA bus. In a first mode, the DSP receives boot program instructions via the HDA bus and boots using these instructions. In a second mode, the DSP boots from instructions that are contained in a memory that is connected to the DSP. In one embodiment, the memory connected to the DSP is a component of a plug-in card, and the DSP is configured to determine whether the plug-in card is present, then boot from the memory on the plug-in card if it is present or boot from the system memory via the HDA bus if the plug-in card is not present. | 03-05-2009 |
20090070574 | Remote diagnostic apparatus - Example apparatus and methods associated with remote diagnostics are described. One apparatus embodiment includes a logic to determine a state of a device associated with a computing platform to which the apparatus is operably connected. The apparatus embodiment may include logic to provide a signal to a remote logic regardless of the state of the computing platform. The apparatus embodiment may also include logic to receive a signal from a remote logic regardless of the state of the computing platform. The apparatus may facilitate actions associated with remote diagnostics including, inventorying add-on devices, controlling add-on device diagnostic execution, and selectively configuring the computing platform based on add-on device diagnostic results. | 03-12-2009 |
20090070575 | MEMORY WITH DATA SYNCHRONIZATION FROM AND FOR A DRIVE CONTROLLER OF A MACHINE - The aim of the invention is to improve the start-up of an electrical machine drive control system comprised of at least one machine ( | 03-12-2009 |
20090070576 | SYSTEM AND METHOD FOR PROVIDING A SECURE COMPUTING ENVIRONMENT - A system and method for providing a secure computing environment to untrusted computer systems is described. A carrier media and an interface are provided, the interface being connectable to a computer to enable communication between the computer and the carrier media. The carrier media encodes a secure computing environment and a boot system, upon connection of the system via the interface to a computer system and booting of the computer system, the boot system is operative to take over the boot process of the computer system and to authenticate the user, wherein upon successful authentication, the boot system is arranged to load the secure computing environment on the computer system, the secure computing environment being configured to prevent predetermined interaction from outside the secure computing environment when it is running. | 03-12-2009 |
20090077364 | DATA-PROCESSING ARRANGEMENT - A data-processing arrangement (MPS) comprises a main processor (MPR) and an auxiliary processor (APR). A system-program code (SYS) causes the main processor to write an application-program code (APCi+1) into a shared memory (DPRAM). The system-program code further causes the main processor to write an address indication, which indicates where the application-program code has been written into the shared memory, into a predefined memory location. A startup-program code (SPC) causes the auxiliary processor to retrieve the address indication from the predefined memory location so as to subsequently transfer the application-program code from the shared memory to an application-program memory (APM), which belongs to the auxiliary processor. | 03-19-2009 |
20090077365 | System and method for analyzing CPU performance from a serial link front side bus - Monitoring of boot progress for a multiprocessor information handling system is performed with a test module running on a CPLD. RAM integrated in the CPLD stores boot progress information passed through an I/O buffer located between the processors and the firmware that boots the processors. Downloading of the boot progress from the RAM to an external device, such as through a serial port, provides a processor trace that is analysis and debugging of the firmware by recording processor operations through the boot progress. | 03-19-2009 |
20090077366 | Workflow Management to Automatically Load a Blank Hardware System with an Operating System, Products, and Service - The exemplary embodiments provide a computer implemented method, apparatus, and computer usable program code for managing a workflow for assembling a data processing system according to a specific customized software configuration. An installation request from a remote data processing system is received. The installation request comprises an identity associated with the remote data processing system. An order associated with the identity is retrieved. A process configuration based on the order is determined. A system image associated with the process configuration is retrieved, forming an associated system image. The associated system image is transferred to the remote data processing system. | 03-19-2009 |
20090077367 | MANAGING REBOOT OPERATIONS - The disclosure provides a mechanism which is activated when a user opts to hibernate their computer (at the end of the day) rather than switching it off. In particular, on receipt of a hibernate request, an embodiment provides a mechanism for determining whether (as a result of, for example, a distribution or installation of software to a computer) there are any outstanding reboot operations for the computer. | 03-19-2009 |
20090077368 | Controller for a Mass Memory and Method for Providing Data for a Start Process of a Computer - In the process for providing data for a start process of a computer by a controller ( | 03-19-2009 |
20090083534 | REMOTE PC BOOTUP VIA A HANDHELD COMMUNICATION DEVICE - A method computer usable medium and computer system circuitry are disclosed for starting or “booting up” a computer from a remote location using a remote command device such as a cellular telephone. The method and system includes a secure means for remotely storing and transmitting security passwords. | 03-26-2009 |
20090083535 | INFORMATION PROCESSING APPARATUS - An information processing apparatus includes: a connection port to which an external device is connected; and a processor that executes a BIOS and runs an operating system, wherein, when executing the BIOS, the processor operates to: determine whether or not the external device is connected to the connection port; continues to perform a legacy process and boot the operating system when determined that a prescribed type of the external device is connected; and terminates the legacy process and boot the operating system when determined that the prescribed type of the external device is not connected. | 03-26-2009 |
20090089566 | SUPPORTING ADVANCED RAS FEATURES IN A SECURED COMPUTING SYSTEM - Systems and methods for enabling Reliability, Availability & Serviceability features after launching a secure environment under the control of LaGrande Technology (LT), or comparable security technology, without compromising security are provided. In one embodiment, the method comprises adding at least one specific capability to a processor to enable at least one of CPU hot-plug, CPU migration, CPU hot removal and capacity on demand. | 04-02-2009 |
20090089567 | Applying Firmware Updates To Servers In A Data Center - Applying firmware updates to servers in a data center, the servers including one or more active servers and a standby server, each server mapped to separate remote computer boot storage, including applying the firmware updates to the standby server; selecting an active server for firmware updating; powering off the selected active server by the system management server; remapping the standby server to the remote computer boot storage for the selected active server; rebooting the standby server from the remote computer boot storage for the selected active server, designating the standby server as an active server; remapping the selected active server to the remote computer boot storage formerly mapped to the standby server; and rebooting the selected active server from the remote boot storage formerly mapped to the standby server, designating the selected active server as a standby server. | 04-02-2009 |
20090089568 | Securely Launching Encrypted Operating Systems - Tools and techniques for securely launching encrypted operating systems are described herein. The tools may provide computing systems that include operating systems (OSs) that define boot paths for the systems. This boot path may include first and second OS loader components. The first loader may include instructions for retrieving a list of disk sectors from a first store, and for retrieving these specified sectors from an encrypted second store. The first loader may also store the sectors in a third store that is accessible to both the first and the second loader components, and may invoke the second loader to try launching the OS using these sectors. In turn, the second loader may include instructions for retrieving these sectors from the third store, and for unsealing a key for decrypting these sectors. The second loader may then decrypt these sectors, and attempt to launch the OS from these sectors. | 04-02-2009 |
20090089569 | MULTI-OS (OPERATING SYSTEM) BOOT VIA MOBILE DEVICE - A system that facilitates different levels of operating system (OS) boot so as to provide users with rapid access to certain mobile device functionalities, security, applications, etc. is provided. An OS can be loaded in phases or stages commensurate with policies, preferences, actions, context, etc. Similarly, a particular OS or group of OSs can be loaded to address a particular scenario or requirement. | 04-02-2009 |
20090089570 | Method, system and apparatus for providing a boot loader of an embedded system - A method, system and apparatus for executing a boot loader for an embedded system including a system-on-chip (SOC) processor coupled to a memory including first boot loader code for implementing a first boot loader stored in a first sector and second boot loader code for implementing a second boot loader stored in a second sector determines which of the first boot loader code and second boot loader code is younger; if the second boot loader code is determined to be younger than the first boot loader code, a swapping operation is performed so that the second boot loader code is associated with the first sector and the first boot loader code is associated with a different sector, and the boot loader code associated with the first sector is executed. | 04-02-2009 |
20090089571 | MOTHERBOARD AND START-UP METHOD THEREOF - A motherboard comprises a first unit which includes most components that are common in a group of motherboards which have a same chip set, a second unit which includes components that are different in the group of motherboards, and a BIOS Bin file which is loaded in the first unit. The BIOS Bin file comprises a share module, a loading module unit which includes a plurality of loading modules each corresponding to one type of motherboard, and a startup module which identifies the type of the motherboard according to a voltage of pre-selected GPIO Pins, and reads one of the loading modules corresponding to that type of motherboard to identify and initiate the second unit, and reads the share module to identify and initiate the first unit. | 04-02-2009 |
20090089572 | BOOTING SYSTEM, IMAGE FORMING APPARATUS HAVING THE SYSTEM AND CONTROL METHOD THEREOF - A booting system including a boot code transmission control unit to sequentially execute a booting operation concurrently with storing boot codes stored in a NAND flash memory in an internal memory. The boot code transmission control unit includes storage units to store addresses of the boot codes stored in the internal memory and an address of a boot code to be accessed by a CPU core for the execution of the booting operation, respectively. These addresses are checked by monitoring a memory interface and a bus interface. When the boot code addresses are the same, the boot code transmission control unit transmits a boot code corresponding to the same address, among the boot codes stored in the internal memory, to the CPU core so that the CPU core can sequentially execute the booting operation. | 04-02-2009 |
20090089573 | MULTI PROCESSOR SYSTEM HAVING DIRECT ACCESS BOOT AND DIRECT ACCESS BOOT METHOD THEREOF - A multiprocessor system having a direct access boot operation and a direct access boot method are provided to substantially reduce a boot error of processor that does not provide a memory link architecture in the multiprocessor system. In an embodiment of the invention, a multiprocessor system includes: a first processor configured to perform a first predetermined task; a second processor configured to perform a second predetermined task; a multiport semiconductor memory device coupled to the first processor and the second processor, the multiport semiconductor memory device including at least one shared memory area, the multiport semiconductor memory device configured to provide access to the at least one shared memory area by the first processor and the second processor; and a non-volatile memory device coupled to the first processor and the second processor, the non-volatile memory device storing a first boot code associated with the first processor and a second boot code associated with the second processor, the multiprocessor system configured to provide the first processor direct access to the non-volatile memory area during a boot operation and indirect access to the non-volatile memory area otherwise. | 04-02-2009 |
20090094447 | Universal serial bus flash drive for booting computer and method for loading programs to the flash drive - The present invention relates to a universal serial bus (USB) flash drive loaded with operating system and application programs for booting a computer when plugged into the computer, wherein memory of the flash drive is partitioned as a read-only active area and a writeable data storage area, and the operating system and application programs are stored in the active area; and the operating system is executed unrelated to hardware. The present invention also relates to a method for loading programs to the USB flash drive. | 04-09-2009 |
20090094448 | Electronic Device and Related Method for Enhancing Convenience of a Computer System - An electronic device and related method for enhancing convenience of a computer system includes a memory unit for storing a plurality of boot-up configuration files and a plurality of human characteristic signals corresponding to the plurality of boot-up configuration files, a human characteristic reception unit for receiving a human characteristic, and a logic unit coupled to a power switch, the memory unit, and the human characteristic reception unit, for comparing the human characteristic received by the human characteristic reception unit and the plurality of human characteristic signals stored in the memory unit for generating a comparison result when the power switch is turned on, and performing a boot-up procedure to turn on the computer system according to the comparison result. | 04-09-2009 |
20090094449 | Method and Apparatus to Prevent Vulnerability to Virus and Worm Attacks Through Instruction Remapping - A method, apparatus, and computer instructions for processing instructions by a processing unit. An instruction set is dynamically set for the processing unit using a selected instruction map. The selected instruction map is selected as one being different from a normal instruction map for the processing unit. The instructions are processed at the processor using the instruction set. A set of authorized instructions are encoded using the selected instruction map. | 04-09-2009 |
20090106543 | BOOT BLOCK FEATURES IN SYNCHRONOUS SERIAL INTERFACE NAND - Embodiments are provided for protecting boot block space in a NAND memory device connected to a host device via an SPI interface. One such method includes programming a boot block password into the NAND memory device such that the host device is required to provide the boot block password in order to access the boot block space. A counter may be provided to track the number of times the host device provides an incorrect password, permanently locking the boot block space if the counter reaches a predetermined value. A further method includes associating each of various areas of the boot block space with at least one write lock bit, setting the write lock bit to a lock enable or lock disable value, and locking or unlocking an area of the boot block space depending on the value of its associated write lock bit. Areas of the boot block space may include a single boot block page, a single boot block, or a plurality of boot blocks. | 04-23-2009 |
20090106544 | FUNCTION MANAGEMENT SYSTEM AND METHOD - A function management system includes a power source, an electronic switch, a plurality of function modules, and a function management module. The power source is for supplying power. The electronic switch is for controlling the power to the function management system. The function modules are for executing various functions. The function management module is for storing a plurality of sub boot-up programs corresponding to the function modules. Each sub boot-up program is used for booting up a corresponding function module. A function management method is also provided. | 04-23-2009 |
20090106545 | BOOTING METHOD FOR COMPUTER SYSTEM - A booting method for a computer system with a keyboard and a central processing unit (CPU). In the present method, the keyboard is initialized first. After that, the CPU is initialized in turn. Finally, other hardware devices of the computer system are initialized. The method modifies the order of the hardware initializations so as to determine whether to use system default values or BIOS setup values set by a user to do the initializations based on an input signal received by the keyboard before initializing the CPU. As a result, the situation of using the incorrect BIOS setup values for initializations, which leads to failure in booting the computer system, can be avoided. | 04-23-2009 |
20090113195 | System and Method for Extension of the BIOS Boot Specification - A system and method is disclosed for extending the BIOS Boot Specification. The specification is extended to accommodate the identification of a greater number of bootable devices. The specification is also extended so that the identifier for each bootable device identifies the default boot order of the device. The specification is also extended to provide additional information about the type of each bootable device and whether each bootable device is an onboard or add-in device. The extension of the BIOS Boot Specification also allows for the designation of certain entries as placeholders for devices that that are supported by the computer system, but not present in the computer system. | 04-30-2009 |
20090113196 | Method and systems for advanced reprogrammable boot codes and in-application programming of embedded microprocessor systems - This invention relates to an advanced system and method of reprogrammable boot codes and In Application Programming (IAP) of embedded systems by booting up with boot loader to shadow program codes on to an internal high speed SRAM and extending contiguously to external higher space memory for runtime applications, and supporting on-line IAP to update run-time firmware or boot loader driver through network communication by utilizing advanced address remapping scheme as well as supporting In System Programming (ISP) to program initial Flash memory via ISP adaptor. | 04-30-2009 |
20090113197 | EXPEDIENT PREPARATION OF MEMORY FOR VIDEO EXECUTION - A computer system that initializes a fraction of the computer system's memory for execution of video during booting of the computer system is provided. The computer system can include a first portion of BIOS code on a ROM device, wherein the first portion includes instructions for initializing the fraction. The computer system further can include a second portion of BIOS code that copies itself to the fraction upon completion of initialization of the fraction, wherein the second portion executes on the fraction and wherein the second portion initializes system memory and initializes a video buffer. The computer system further can include a copy of the second portion located on the ROM device, wherein the copy of the second portion executes until video buffer initialization is completed but before all of the system memory is initialized. Further, the video buffer displays video before all of the computer system's memory is initialized. | 04-30-2009 |
20090113198 | Methods, Systems and Media for Configuring Boot Options - Implementations described herein generally provide methods of configuring boot options. One method may generally include receiving on a remote management information handling system (IHS), boot information relating to a remotely configured HIS, using the boot information on the remote management IHS to create boot options and sending the boot options from the remote management IHS to the remotely configured IHS. | 04-30-2009 |
20090119497 | System and Method for Managing Booting of an Information Handling System - Systems and methods for managing booting of an information handling system are disclosed. A method for managing the booting of an information handling system may include receiving user input for booting an information handling system to a first partition or a second partition. The user input may be used to determine whether the received user input is for booting to the first partition or to the second partition. In response to determining that the received user input is for booting to the second partition, a determination may be made whether the information handling system is authorized to boot to the second partition. In response to determining that the information handling system is authorized to boot to the second partition, the information handling system may be booted to the second partition. In response to determining that the information handling system is not authorized to boot to the second partition, the information handling system may be booted to the first partition. | 05-07-2009 |
20090119498 | HOT-PLUGGING A MEMORY DEVICE - An extensible firmware interface (EFI) framework is to enable hot-plugging and hot-removal of memory devices. The security phase of the EFI may enable a cache to operate as RAM (CAR mode) to support execution of pre-EFI (PEI) tasks. In one embodiment, the PEI phase may move the memory reference code (MRC) as a driver to the driver execution phase and hand-over the CAR information to the driver execution environment (DXE). The MRC driver may be registered as a run-time API, which may be called by the operating system to receive a dynamically created memory map. In other embodiment, the PEI phase executes the MRC and may hand-over the memory information and a memory pointer to the MRC to the DXE. The OS may call the DMD driver provisioned in the DXE, which in turn may call the MRC provisioned in the PEI to dynamically create a memory map. | 05-07-2009 |
20090119499 | METHOD AND MICRO-SYSTEM FOR UPDATING CONFIGURATIONS OF TARGET SYSTEM IN COMPUTER - A technique for updating configurations of a target system in a computer. The method comprises booting, based on Preboot Execution Environment technology, a micro-system for updating configurations of a target system before booting the target system, the micro-system performing the steps of: (a) acquiring target configuration packages via a network from a server; (b) extracting target configuration data from said target configuration packages; and (c) updating the configurations of said target system by using said target configuration data, wherein said micro-system is independent of said target system. | 05-07-2009 |
20090125709 | System And Method For A Remote Information Handling System Boot - In an information handling system (IHS), providing an IHS boot includes forcing the IHS to power on or reboot, retrieving a virtual serial peripheral interface (SPI) boot image using a virtual SPI bus, booting the IHS to the virtual SPI boot image, turning off the virtual SPI boot image, and updating a real SPI boot image. | 05-14-2009 |
20090125710 | METHOD AND APPARATUS FOR BOOTING HOST - Provided are a method and a device for booting a host embodying a downloadable conditional access system (DCAS), wherein one of a plurality of pre-determined booting modes is decided as a booting mode of the host based on first information indicating whether a host can communicate with a broadcasting service provider and second information indicating whether a software-based security client providing information required for decrypting broadcasting data is installed to a hardware-based security module connected to the host, and the host is booted in the decided booting mode. | 05-14-2009 |
20090132797 | Methods, Media and Apparatus for Booting Diskless Systems - The disclosure provides a system, method, and computer readable medium for booting a diskless client in an information handling system (IHS). Cached boot data is stored in a non-volatile memory of the diskless client. The diskless client sends a boot request with an identifier and receives a boot reply containing an image signature associated with the identifier. The diskless client determines whether there is a match between a cached image signature and the received image signature. If there is a match, the diskless client boots with the cached boot data. If there is not a match, the cached boot data is invalidated and new boot data is requested and received from a server. The diskless client stores the new boot data in the non-volatile memory and boots with the new boot data. The cached boot data may be update when network traffic is below a predetermined level and/or an administrator change to boot data affects a plurality of diskless clients. The diskless client request and receives updated boot data stores the updated boot data in the non-volatile memory. | 05-21-2009 |
20090132798 | ELECTRONIC DEVICE AND METHOD FOR RESUMING FROM SUSPEND-TO-MEMORY STATE THEREOF - An electronic device and a method for resuming from a suspend-to-memory (S3) state thereof are provided. The electronic device comprises a detecting circuit, a storage unit and a booting module. The detecting circuit outputs a state change value when detecting a state variation of any non-hot plug device. The storage unit is used for storing the state change value output from the detecting circuit. When the electronic device is resumed from the S3 state to the working state, a normal booting procedure is performed on the electronic device if the state change value is detected by the booting module. | 05-21-2009 |
20090138694 | SPI AUTO-BOOT MODE - Systems and methods of detecting an auto-boot mode and booting data from a serial peripheral interface to a processor without the need of a read instruction utilizing a serial peripheral interface having an auto-boot mode detector are provided. In one embodiment, a serial peripheral interface comprises a serial processing component configured to serially communicate data between the processor and at least two peripherals, and an auto-boot component operably coupled to the serial processing component, comprising an auto-boot mode detector configured to determine whether a boot mode exists based on detecting whether serial input data is received during a predetermined wait state, and configured to selectively boot data to a start address associated with the processor based on the boot mode determination. | 05-28-2009 |
20090138695 | Method and apparatus for restoring system using virtualization - A display device includes a display panel and a fixing member fixed to the panel, the fixing member being formed of a resin material and being disposed to cover at least a portion of each surface of the display panel and increases durability of the display panel against external impact applied thereto and decreases thickness of the display device. | 05-28-2009 |
20090144531 | BOOTING WITH SUB SOCKET PARTITIONING - A method of booting up a computer system comprising a first multi-cored processor comprising a first plurality of cores and a second multi-cored processor comprising a second plurality of cores is disclosed. The method may comprise configuring a first partition comprising a first one or more cores from the first plurality of cores and from the second plurality of cores, configuring a second partition comprising a second one or more cores from the first plurality of cores and from the second plurality of cores, and configuring a third partition comprising a third one or more cores from the first plurality of cores and one or more cores from the second plurality of cores. | 06-04-2009 |
20090144532 | EFFICIENT METHOD FOR OPERATING SYSTEM DEPLOYMENT - Method and computer storage media for efficiently deploying an operating system are provided. A virtual hard drive file is received by a computing device. Upon receipt of the virtual hard drive file, the computing device is enhanced to expose and mount the virtual hard drive as a drive and boot option for the computing device. Thereafter, an initial boot sequence may be commenced utilizing the virtual hard drive file as the boot source. In some embodiments, a boot manager enhancer and a translator are utilized to do one or more of expose, mount and translate the virtual hard drive file. In some embodiments, a virtual SCSI miniport driver is utilized to do one or more of expose, mount, and translate the virtual hard drive file. | 06-04-2009 |
20090144533 | Firmware exclusive access of a peripheral storage device - A method includes searching a peripheral storage device for a key during a firmware boot process of a computer system. Operating system access to the peripheral storage device is disabled if the key exists. Another method includes disabling operating system access to a peripheral storage device coupled to a pre-determined attachment point of a computer system during a firmware boot process of the computer system. | 06-04-2009 |
20090144534 | Data Processing Systems and Methods - Various improvements to data processing systems involve enhancements to BIOS functionality, use of identifiers associated with specific instances of hardware, and data hiding techniques—sometimes alone, sometimes in combination. Many of these improvements can be applied to increase the security of computer systems, and networks of which they form part. | 06-04-2009 |
20090144535 | Method for automatically restoring system configuration with a single key - A method for automatically restoring a system configuration with a single key in a computer having a power button is provided. The method includes detecting a press mode of the power button; determining a relevant restoring item according to the press mode; performing a process for restoring the system configuration corresponding to the restoring item, which aims at updating/recovering the system configuration, or clearing the system configuration setting stored in a CMOS memory; and performing a normal boot process. | 06-04-2009 |
20090144536 | Monitoring method and monitor apparatus - A monitoring method and a monitor apparatus thereof are disclosed. The monitor apparatus is used to monitor an USB port of a computer. The monitor apparatus comprises an input/output control unit and a basic input/output system code storage unit. The basic input/output system code storage unit is used to store a basic input/output system code. A monitor method comprises following steps: executing the basic input/output system code; determining whether the USB port connects with a USB device or not; if the USB port connects with a USB device, reading out an identification of the USB device; determining whether the identification is a certified identification or not; and executing a correspondingly process if the identification is not a certified identification. | 06-04-2009 |
20090144537 | INFORMATION PROCESSING APPARATUS AND METHOD FOR STARTING UP INFORMATION PROCESSING APPARATUS - An information processing apparatus includes: a power button; a switching unit that switches a plurality of peripheral devices connected to the apparatus between a detectable state and an undetectable state; a determination unit that determines whether the start-up operation is a normal start-up operation for starting up all of the peripheral devices or a specific start-up operation for starting up a specific peripheral device that is selected from among the peripheral devices; a first switching control unit that controls the switching unit to switch the specific peripheral device to the detectable state and to switch a non-specific peripheral device that is selected from among the peripheral devices except the specific peripheral device to the undetectable state; and a second switching control unit that controls the switching unit to switch the non-specific peripheral device to the detectable state after the specific peripheral device is detected by the operating system. | 06-04-2009 |
20090144538 | Patch installation at boot time for dynamically installable, piecemeal revertible patches - A method for booting a computer operating system is provided. A boot loader is loaded from a first flash memory to a random access memory and executed. In one embodiment, the boot loader loads from a second flash memory to a random access memory an operating system file system image archive, installs the operating system file system image archive as a root file system, loads from the second flash memory multiple operating system patches stored separately from the base operating system file system image archive, and installs the multiple operating system patches over the root file system. In another embodiment, the boot loader loads and executes an initialization script that performs the operations instead of the boot loader. | 06-04-2009 |
20090150660 | PRE-BOOT ENVIRONMENT POWER MANAGEMENT - A pre-boot environment is disclosed that manages power of a computing device prior to an operating system runtime phase. The pre-boot environment may be implemented in a computing device having a storage device to store an operating system, a firmware device to store firmware having a boot loader to load and initiate execution of the operating system, and a processor to execute the firmware and the operating system. The firmware in response to being executed by the processor may result in the computing device monitoring operating conditions of the computing device, and initiating a power management response based upon the operating conditions of the computing device and a power management policy. | 06-11-2009 |
20090150661 | Information Processing Apparatus and Program - An information processing apparatus including: a first recording medium which stores a first program; a connection section which is capable of connecting to a second recording medium outside of the information processing apparatus; an instruction input section to input, while the information processing apparatus is in an activated state, an instruction for booting a second program stored in the second recording medium that is connected to the connection section on booting of the BIOS; and a controller which, performs a check when booting of a BIOS, if the second recording medium is connected and the instruction has been input while the information processing apparatus is in an activated state; in case when the second recording medium is connected and the instruction has been input is confirmed, the control section boots the second program; and in case when it is not confirmed, the control section boots the first program. | 06-11-2009 |
20090158020 | System Backup And Recovery Solution Based On BIOS - A system performs system initialization for a computing device, comprising a module to back up one or more files of the computing device in response to a backup request and to restore one or more files of the computing device in response to a recovery request; and a point managing module to set up a backup point that comprises information based on the backup request and locate one or more backup points for the restoration operation. | 06-18-2009 |
20090158021 | METHODS OF USING BIOS INFORMATION WHEN BOOTING INFORMATION HANDLING SYSTEMS AND MACHINE-EXECUTABLE CODE FOR CARRYING OUT THE METHODS - A method of using BIOS information can include exporting first BIOS information from a first information handling system. The method can further include initiating a boot sequence for the second information handling system and importing second BIOS information into a second information handling system after initiating the boot sequence and before initiating an operating system, wherein the second BIOS information is associated with the first BIOS information. The method can further include initiating an operating system of the second information handling system after importing the second BIOS information. The first and second BIOS information may be the same, or the second BIOS information may be derived from the first BIOS information. The first and second information handling systems may be the same or different. In one embodiment, the first BIOS information can be translated into a text file for editing before using the second BIOS information during a boot sequence. | 06-18-2009 |
20090158022 | SNOOP FILTER OPTIMIZATION - A snoop filter optimization system includes one or more subsystems to operate a snoop filter, determine information that that affects operation of the snoop filter, and adjust operation of the snoop filter relative to the information that affects operation of the snoop filter. | 06-18-2009 |
20090158023 | ADAPTIVE SYSTEM BOOT ACCELERATOR FOR COMPUTING SYSTEMS - An acceleration mechanism for boot-up processing in a computing system is provided. The acceleration mechanism relies on recording most, if not all, of the read transactions, associated with requests and retrievals made during a boot-up and, in some aspects most, if not all, of the write transactions, associated with requests and stores made during a shutdown process. Prior to executing the boot-up process, data associated with the transactions is pre-fetched based on the recorded information and used to make the requests or information retrievals during the ensuing boot-up process. Additionally, since the mechanism of the present innovation provides for continual recording and the transaction data, the acceleration of the boot-up process can be adaptive even if hardware additions/changes or any other changes that affect the boot-up or shutdown process occur. | 06-18-2009 |
20090158024 | DUAL BIOS CIRCUIT - A dual BIOS circuit includes a first BIOS chip, a second BIOS chip, and a transistor. The first and the second BIOS chip include a setup program configured for setting the voltage of a GPIO pin of a Southbridge chip. The first and the second BIOS chip are connected to the Southbridge chip. The gate of the transistor is connected to the GPIO pin of the Southbridge chip. The drain of the transistor is connected to a power supply via a resistor, and connected to a detecting pin of the Southbridge chip. The source of the transistor is grounded. The power supply is connected to a signal pin of the Southbridge chip. The first or second BIOS chip is selected to operate according to the voltage level at the detecting pin of the Southbridge chip. | 06-18-2009 |
20090158025 | DUAL BIOS CIRCUIT - A dual BIOS circuit includes a first BIOS chip, a second BIOS chip, a power supply, and a switch. The first BIOS chip is connected to a Southbridge chip of a motherboard via a bus. The second BIOS chip is connected to the Southbridge chip of a motherboard via another bus. The power supply is connected to signal pin of the Southbridge chip. The switch includes a handle. The first terminal of the switch is connected to the a detecting pin of the Southbridge chip. The second terminal of the switch is connected to the power supply. The third terminal of the switch is grounded. The first or second BIOS chip is selected to operate according to the voltage level at the detecting pin of the Southbridge chip. | 06-18-2009 |
20090158026 | METHOD AND DEVICE FOR SECURELY CONFIGURING A TERMINAL BY MEANS OF A STARTUP DATA STORAGE DEVICE - Method of configuring a terminal ( | 06-18-2009 |
20090158027 | ELECTRONIC DEVICE HAVING AN ALTERABLE CONFIGURATION AND METHODS OF MANUFACTURING AND CONFIGURING THE SAME - An electronic device having an alterable configuration includes a non-volatile memory configurable to include at least a first partition and a second partition, the non-volatile memory storing a boot ROM. The boot ROM is operable when executed by a processor of said electronic device to, in the event that a third partition is available, boot an operating system in the third partition, the operating system operable when booted to cause the third partition to be deleted and the second partition to be expanded to encompass memory freed by the deletion; and otherwise boot an operating system in the first partition. | 06-18-2009 |
20090164769 | POLICY BASED PROVISIONING OF SHARED BOOT IMAGES - A method for policy based provisioning of shared boot images includes querying a storage name server for boot target that is in an accessible discovery domain. Boot target information about the boot target is received. A login request is sent to the boot target. The login request includes a flag specifying whether the login request is a first login request after a reboot. | 06-25-2009 |
20090164770 | HYPERVISOR RUNTIME INTEGRITY SUPPORT - A method and system are disclosed. In one embodiment the method includes computing, during runtime, an active hash value of a hypervisor on a computer platform using an authenticated integrity agent. The method also includes comparing the active hash value to a registered hash reference value. The method also includes verifying the integrity of the hypervisor when the active hash value and the registered hash reference value match. | 06-25-2009 |
20090164771 | METHOD AND APPARATUS FOR QUICKLY REANIMATING DEVICES FROM HIBERNATION - A system that causes a computing device to enter a hibernation mode. During operation, the system creates a hibernation image for the computing device by identifying processes that do not have visible user interface elements, and generating the hibernation image so that processes with visible user interface elements can be reanimated from the hibernation image first to get the computing device reanimated quickly, while the identified processes are reanimated later. Next, the system stores the hibernation image in non-volatile storage. The system then causes the computing device to enter the hibernation mode, wherein the active state of the computing device is preserved in non-volatile storage while power to volatile storage is turned off. | 06-25-2009 |
20090172376 | METHODS, APPARATUSES, AND COMPUTER PROGRAM PRODUCTS FOR PROVIDING A SECURE PREDEFINED BOOT SEQUENCE - An apparatus for providing a secure predefined boot sequence may include a processor. The processor may be configured to verify a predefined boot sequence certificate that defines a boot sequence for a device, verify one or more software elements referenced by the predefined boot sequence certificate, and execute one or more software elements that have been verified in the sequence defined by the predefined boot sequence certificate. Corresponding methods, systems, and computer program products are also provided. | 07-02-2009 |
20090172377 | METHOD AND APPARATUS FOR BOOTING A PROCESSING SYSTEM - Machine-readable media, methods, apparatus and system for booting a processing system are described. In an embodiment, whether to launch an open operating system or a closed operating system to boot a processing system may be determined. A key may be retrieved from a processor register of the processing system and used to decrypt an encrypted version of the closed operating system based at least in part on a determination of booting the processing system with the closed operating system. In another embodiment, the processor register stored with the key may be flushed based at least in part on a determination of booting the processing system with the open operating system. | 07-02-2009 |
20090172378 | METHOD AND SYSTEM FOR USING A TRUSTED DISK DRIVE AND ALTERNATE MASTER BOOT RECORD FOR INTEGRITY SERVICES DURING THE BOOT OF A COMPUTING PLATFORM - A trusted hard disk drive (“THDD”) contains cryptographic primitives and support functions in a trusted partition (“TP”). In particular, a master boot record (“MBR”) of the THDD is replaced with an alternative MBR and the normal MBR is stored elsewhere on the THDD. The program(s) loaded from the alternative MBR performs measurements of the TP. The TP, in turn, performs all necessary measurements of the MBR, a personal computer platform's OS, and the OS-present applications, including a platform trust service (“PTS”) kernel. The program(s) also performs functions to clear the PC platform's state such that any events that occurred prior to its execution do not alter the functionality of the OS-present applications. This may include clearing the PC's microprocessor, system memory and cache, for example. DRTM types of system resets may also be performed after the PC's OS has booted to force system clears without requiring OS or VMM infrastructure. | 07-02-2009 |
20090172379 | SYSTEM AND METHOD TO ENABLE PARALLELIZATION OF EARLY PLATFORM INITIALIZATION - In some embodiments, the invention involves reducing the time required for a platform to boot to its target application/operating-system using parallelization of firmware image content decompression and loading. An embodiment dispatches alternate processing agents as a means to intelligently assist in off-loading some of the initialization tasks so that the main processor may share the burden of boot tasks. In at least one embodiment, it is intended to build firmware images that facilitate parallelization, utilizing co-processing agents that can split these transactions across various processing agents. Other embodiments are described and claimed. | 07-02-2009 |
20090172380 | BOOTING AN INTEGRATED CIRCUIT - An integrated circuit comprising: a processor; a plurality of external pins operatively coupled to the processor; and a permanently written memory operatively coupled to the processor, the memory having a plurality of regions each storing one or more respective boot properties for booting the processor. The processor is programmed to select one of the regions in dependence on an indication received via one or more of the external pins, to retrieve the one or more respective boot properties from the selected region, and to boot using the one or more retrieved boot properties. | 07-02-2009 |
20090172381 | ENHANCED NETWORK AND LOCAL BOOT OF UNIFIED EXTENSIBLE FIRMWARE INTERFACE IMAGES - Techniques and architectures to provide high assurance image invocation in a pre-boot environment. These techniques may augment implementations of the Unified Extensible Firmware Interface (UEFI) to invoke UEFI images using Trusted Execution Technology (TXT). This can operate to combine pre-boot secure flows, such as UEFI image invocation, with the secure launch instruction set extensions of TXT. This may entail combination of the UEFI StartImage instruction with the SMX leaf SENTER instruction. This may operate to allow original equipment manufacturer (OEM) firmware as a guard and that uses UEFI and TXT access control logic at the same instance to pass control to the operating system (OS). | 07-02-2009 |
20090172382 | Multi-function computer system - A multi-function computer system includes a host apparatus, a display and a boot mode switching unit. The display is electrically connected to the host apparatus. The boot mode switching unit electrically connected to the host apparatus may be switched between a first mode and a second mode. In the first mode, the boot mode switching unit controls the host apparatus to boot into a first operation environment. In the second mode, the boot mode switching unit controls the host apparatus to boot into a second operation environment different from the first operation environment. | 07-02-2009 |
20090172383 | BOOTING AN INTEGRATED CIRCUIT - An integrated circuit comprising: a processor; a plurality of external pins operatively coupled to the processor; and a permanently written memory operatively coupled to the processor, the memory having a plurality of regions each storing one or more respective boot properties for booting the processor. The processor is programmed to select one of the regions in dependence on an indication received via one or more of the external pins, to retrieve the one or more respective boot properties from the selected region, and to boot using the one or more retrieved boot properties. | 07-02-2009 |
20090172384 | SYSTEMS AND METHODS FOR CONFIGURING, UPDATING, AND BOOTING AN ALTERNATE OPERATING SYSTEM ON A PORTABLE DATA READER - Systems and methods are provided for updating configuration settings, updating an OS image, and booting an alternate OS on a portable data reader including a reading engine for reading data from an object. Configuration settings of a portable data reader may be updated by detecting whether a storage device having a set of updated configuration settings stored thereon has been coupled to the portable data reader and, if so, updating one or more configuration settings on the portable data reader with one or more of the updated configuration settings from the storage device. | 07-02-2009 |
20090177877 | REMOTE BIOS FOR SERVERS AND BLADES - A method for implementing a remote basic input/output system (BIOS) on a multi-blade server is provided. A remote BIOS partition is created on a management module of the multi-blade server for each blade of the multi-blade server residing on the management module. BIOS settings for operation on a first blade of the multi-blade server are defined. | 07-09-2009 |
20090187753 | SEPARATE POWER ISLAND FOR HIGH PERFORMANCE PROCESSOR - Separate power island for high performance processor. A multi-processor design is presented in which each of the processors is implemented in separately powered portions of a circuitry (e.g., an integrated circuit). One of the processors can be a main application processor, and another of the processors can be a baseband processor. In addition, the each of the processors can be implemented using different types of circuitry (e.g., one of the processors [such as the main application processor] is implemented using higher performance/higher leakage circuitry that another of the processors [such as the baseband processor]). One of the processors (e.g., main application processor) can be powered down when not needed thereby providing energy/power conservation which can be vital is handheld communication device applications such as wireless handheld communication devices. | 07-23-2009 |
20090187754 | SYSTEM WITH AT LEAST TWO BIOS MEMORIES - A system with at least two basic input-output system (BIOS) memories includes a chip unit, a control unit, and two or more BIOS memories. The chip unit includes a control pin. The control unit includes an enable pin and N output pins. The enable pin of the control unit is connected to the control pin of the chip unit. Each of the N BIOS memories is connected to one of the N output pins of the control unit correspondingly. The chip unit is configured to start the control unit. The control unit is configured to start the N BIOS memories according to voltages of the output pins of the control unit. N is an integer greater than one. | 07-23-2009 |
20090187755 | Computer System and Method for Recording Operating Information Thereof - A computer system and a method for recording operating information are disposed. The computer system includes a storage unit and a first memory unit. The storage unit includes an operating system. The first memory unit includes a BIOS and a detecting program, and it is electrically connected to the storage unit. The computer system is capable of detecting whether an event relating to the BIOS occurs by the detecting program under the operating system, and then operating information of the event is recorded. | 07-23-2009 |
20090193242 | COMPUTER SYSTEM WITH DUAL BASIC INPUT OUTPUT SYSTEM AND OPERATION METHOD THEREOF - A computer system including a central processing unit (CPU), a chipset, a first bus, a second bus, a first memory, a second memory, and a logic control circuit is disclosed. The chipset is coupled to the CPU. The first bus and the second bus are respectively coupled to the chipset. The first memory is coupled to the chipset through the first bus for storing a first basic input output system (BIOS). The second memory is coupled to the chipset through the second bus for storing a second basic input output system (BIOS). The logic control circuit detects a state of the first bus and controls the chipset to select to access the first memory through the first bus or select to access the second memory through the second bus according to the state of the first bus. | 07-30-2009 |
20090193243 | Dual Mode Power-Saving Computing System - The present invention relates to a data processing system comprising both a high performance computing sub-system having typical high power consumption and a low performance subsystem requiring less power. The data processing system acts as a single computing device by moving the execution of software from the low performance subsystem to the high performance subsystem when high computing power is needed and vice versa when low computing performance is sufficient, allowing in the latter case to put the high performance subsystem into a power saving state. The invention relates also to related algorithms. | 07-30-2009 |
20090193244 | Computer System and Legacy Boot Method for the Computer System - A computer system including no basic input/output system (BIOS) for operating bootstrap used in initial activation of a legacy operation system is allowed to perform booting of legacy operation system therefor and includes a central processing unit (CPU) and a memory, in which extended firmware and bootstrap program are stored. The extended firmware includes BIOS emulator and a plurality of device drivers. The extended firmware uses the device driver to make the BIOS emulator perform emulation of BIOS operation in response to a BIOS call issued by the bootstrap program. | 07-30-2009 |
20090193245 | PARALLELIZING MULTIPLE BOOT IMAGES WITH VIRTUAL MACHINES - A system and method are presented for converting a multi-boot computer to a virtual machine. Existing boot images on a multi-boot computer are identified and converted into virtual machine instances. Each virtual machine instance represents an operating system and is capable of running at the same time. Finally, a new hosting operating system is installed. The new hosting operating system launches and manages the converted virtual machine instances. | 07-30-2009 |
20090198988 | METHOD FOR VERIFYING REFRESHED BIOS CONTENT - A method for verifying refreshed BIOS content includes the following steps. A virtual machine (VM) is established in a computer waiting for a system BIOS update by the use of a paravirtualization technique. The VM is booted. A new BIOS file content is copied to an address space in a designated range of a memory of a computer host. The computer host is booted with the content of the new BIOS file, and the paravirtual operating system runs on the same hardware platform of the computer host. And, whether the virtual operating system adopting the new BIOS file content runs normally or not is verified to confirm the correctness and safety of the content of the new BIOS file. | 08-06-2009 |
20090198989 | BIOS FOR A COMPUTING DEVICE WITH HANDHELD AND EXTENDED COMPUTING UNITS - A handheld computing unit includes a processing module, a main memory interface, a baseband processing module, an RF section, input/output (I/O) interfaces, a bus structure, a handheld connection structure, and a ROM. The ROM includes a first section for storing a power on self test (POST) of basic input/output system (BIOS) and a second section for storing a boot loader of the BIOS. The boot loader includes a remote mode operating system boot loader and a docked mode operating system boot loader. The remote mode operating system boot loader is used to load a remote mode operating system when in a remote mode and the docked mode operating system boot loader is used to load a docked mode operating system when in a docked mode, which includes at least a portion of the remote mode operating system. | 08-06-2009 |
20090198990 | Accessory support system for remote inspection device - A remote inspection apparatus has an active display unit receiving image data in digital form and graphically rendering the image data on an active display. A communication medium connects devices to the active display unit, such as an imager head capturing the image data. A computer readable medium records one or more instances of software for operating the one or more devices. A computer processor located in the active display unit that operates a boot loader program to detects and sequentially interrogate the devices by different protocols in order to determine appropriate software to load and operate the devices. | 08-06-2009 |
20090198991 | TRUSTED BOOT - In one embodiment, a method for trusted booting of a cryptographic processor system is disclosed. Default image(s) is loaded into a field-programmable logic chip or circuit (FPLC). The default image(s) cannot perform cryptographic processing, but can perform a first algorithm that is unclassified. A processor, internal or external to the FPLC, can be used with the default image. A multi-layer or multi-part key has portions stored in two different places. A protected image is decrypted with the multi-layer key using the first algorithm and loaded into the FPLC. Cryptographic processing is performed using a second algorithm classified by the government. | 08-06-2009 |
20090198992 | HANDHELD COMPUTING UNIT WITH MERGED MODE - A handheld computing unit includes a hardware section, an application section, and an operating system section. The hardware section and operating system section are operable to: detect another device; determine whether to merge functionality with the other device; and when it is determined to merge functionality with the other device, initiate a reboot of the handheld computing unit and of the other device in a merged mode, wherein, in the merged mode, the hardware section and a hardware section of the other device function as a single hardware section and the operating system section and an operating system section of the other device function as a single operating system section. | 08-06-2009 |
20090204803 | HANDLING OF SECURE STORAGE KEY IN ALWAYS ON DOMAIN - Techniques for handling a secure storage key maintain the key in an always on domain and restore the key to the encryption/decryption engine when the engine is turned back on. The secure storage key however is only accessible by the boot loader code, which provides a secure chain of trust. In addition, the techniques allow the secure storage key to be updated. | 08-13-2009 |
20090210689 | REMOTE MANAGEMENT OF UEFI BIOS SETTINGS AND CONFIGURATION - In an information handling system (IHS), remote management of basic input/output system (BIOS) settings and configuration includes maintaining a BIOS setting/configuration database, providing an application to communicate a BIOS setting/configuration from the database to a BIOS system, determining whether the BIOS setting/configuration communicated from the database to the BIOS system is a special BIOS configuration capsule packet, and validating BIOS setting/configuration. | 08-20-2009 |
20090210690 | METHOD OF UPDATING BASIC INPUT OUTPUT SYSTEM AND MODULE AND COMPUTER SYSTEM IMPLEMENTING THE SAME - A method for recovering a BIOS unit, an updating module thereof and a computer system are provided. When the computer system is in a standby mode, and the updating module is coupled with the computer system and detects that a first start unit is enabled, data in the BIOS unit of the computer system are overwritten with program codes stored in the storage unit. | 08-20-2009 |
20090210691 | Memory System and Memory Management Method Including the Same - A booting method of a digital processing having a first processor and a second processor is provided. An interface between the first processor and the outside is stopped. A second processor program code is transmitted to a second memory from a first memory. A second stage loader (SSL) for the first processor is transmitted to a buffer of the second processor from the first memory. A first processor program code is transmitted to the second memory from the first memory under the control of the second processor and an interface between the first processor and the outside is resumed. The first processor program code is downloaded fast into the second memory to decrease booting time of the digital processing system. | 08-20-2009 |
20090217023 | Method for upgrading a microprocessor-controlled device with a new software code via a communication network - In a method for equipping a microprocessor-controlled device with new software code via a communication network, the device has a non-volatile program memory, with two memory areas, a first memory area and a second memory area. The first memory area (boot sector) is provided for a basic program, which provides a first operating system and first functionalities of the device, and the second memory area (update sector) is provided for the software code to be transferred. The first memory area is protected by hardware means against overwriting. The following method steps are performed. First, there is a system boot with the basic program from the first memory area. In such case, a system variable UPDATE is read. In case this has the value “perform update”, an invocation of a function “perform firmware update” occurs. Then this variable is set to the value “invalid firmware”. Next, a connection is established to a superordinated unit and the new software code is transferred into the device. Following storage of the new software code in the second memory area, a test of the new software code for bit error is performed. In case bit errors have occurred during the transfer, a new system boot is performed. If no bit errors have occurred, the new software code is executed from the second memory area and the system variable UPDATE is written with the value “valid firmware”. Through this method, a safe equipping of microprocessor-controlled devices with new software code via a communication network is possible. | 08-27-2009 |
20090217024 | Recovering from Hard Disk Errors that Corrupt One or More Critical System Boot Files - A system, method, and program product is provided that recovers from a sector error affecting a critical file. A damaged sector prevents a critical file from being read prevents the computer system from booting. A controller records a sector number corresponding to the damaged sector. The system is rebooted using an alternative boot media. The system accesses the primary nonvolatile storage media after the rebooting. The damaged sector number is read from the error log and a file map is used to determine the critical file that is stored in the damaged sector. A backup copy of the critical file is retrieved from a backup media. The backup copy is written to the primary media using undamaged sectors and the critical file is mapped to the undamaged sectors. The system is subsequently booted successfully from the primary nonvolatile storage media. | 08-27-2009 |
20090217025 | Method and System for Implementing a Diagnostic or Correction Boot Image Over a Network Connection - The present invention is directed to a system that initiates specific maintenance and diagnostic boot images on remote computers. The system is used to select a particular remote device over a network. A particular new boot image is also selected, and that boot image is tailored to operate a maintenance or diagnostic function on the target machine. The new boot image is downloaded to the target, and the target is rebooted with the new boot image. The new boot image is selected from other specific boot images. Upon reboot, the new boot image performs the diagnostic or maintenance routines on the remote target machine. At some predetermined point, the original boot image is swapped back, and the machine rebooted once again. This returns the machine to its original image. | 08-27-2009 |
20090222651 | S3 BIOS OPERATING SYSTEM SWITCH - Arrangements for employing a system BIOS (basic input/output system) to handle email during a suspended state (such as an “S3” state as will be better understood herebelow). Preferably, the BIOS is employed to “jump” between two suspended images such that, e.g., two more powerful OS's can be employed to manage the mail function. | 09-03-2009 |
20090222652 | EMBEDDED MEMORY PROTECTION - One embodiment of the present application includes a microcontroller ( | 09-03-2009 |
20090222653 | COMPUTER SYSTEM COMPRISING A SECURE BOOT MECHANISM - A secure boot processing may be accomplished on the basis of a non-volatile memory that is an integral part of the CPU and which may not be modified once a pre-boot information may be programmed into the non-volatile memory. During a reset event or a power-on event, execution may be started from the internal non-volatile memory, which may also include public decryption keys for verifying a signature of a portion of a boot routine. The verification of the respective portion of the boot routine may be accomplished by using internal random access memories, thereby avoiding external access during verification of the boot routine. Hence, a high degree of tamper resistance may be obtained, for instance, with respect to BIOS modification by exchanging BIOS chips. | 09-03-2009 |
20090240933 | Computer system architecture and operating method for the operating system thereof - In order to develop a mobile operating system for a computer, first the mobile operating system must be independent from the computer hardware device. Therefore, the present invention discloses a new computer system architecture which loads a Transient Resident Operating System (TROS) from an external device and provides a predefined hardware device driver to the operating system, and then the TROS can be stored into a portable memory storage device to be a Mobile Operating System (MOS). By applying the technique disclosed in the present invention, the TROS can work beyond the Intrinsic Operating System (IOS) of the computer without the mutual interference from each other, such that a computer environment with a Parasitic Operating System (POS) is created. | 09-24-2009 |
20090240934 | COMPUTER SYSTEM WITH DUAL BOOT-PROGRAM AREA AND METHOD OF BOOTING THE SAME - A computer system with a dual boot-program area, comprises: a processing unit; a BIOS ROM having a primary boot-program area, a secondary boot-program area, and a BIOS main-code area, wherein a first code is both stored at a first address of the primary boot-program area and a second address of the secondary boot-program area; and a BIOS-switching circuit, connected to the BIOS ROM, further comprising a detecting circuit and an address-switching circuit. The detecting circuit can control the address-switching circuit to be operated in an enable mode or a disable mode. A command, issued from the processing unit and for retrieving the first code, is sent to the first address after a power button of the computer system is pressed if the address-switching circuit is operated in the disable mode; or, the command is sent to the second address if the address-switching circuit is operated in the enable mode. | 09-24-2009 |
20090249052 | BOOTING AN ELECTRONIC DEVICE USING FLASH MEMORY AND A LIMITED FUNCTION MEMORY CONTROLLER - A BIOS may provide bad block and wear-leveling services to a flash memory during a boot cycle until a full-functioned memory controller, such as a software memory controller, is available. After the full-functioned memory controller is available, the controller may use data passed by the BIOS to determine what, if any, steps to take to account for write activity during the boot process. Alternatively, the BIOS may use a reserved portion of flash memory so that wear leveling for boot-related data, such as a shut-down flag, is not needed. | 10-01-2009 |
20090249053 | METHOD AND APPARATUS FOR SEQUENTIAL HYPERVISOR INVOCATION - In some embodiments, the invention involves a system and method for invoking a series of hypervisors on a platform. A hardware-based secure boot of a chained series of virtual machines throughout the life of the pre-operating system (OS) firmware/BIOS/loader/option ROM execution, with component-wise isolation of the pre-extensible firmware interface (PEI) and driver execution environment (DXE) cores is utilized. In an embodiment, a Cache-As-RAM (CAR) based hypervisor, executing directly from Flash memory manages sequential invocation of a next hypervisor. Other embodiments are described and claimed. | 10-01-2009 |
20090249054 | METHOD FOR BOOTING COMPUTER DEVICE - A method for booting a computer device includes steps of executing the POST and loading a commercial film form a storage unit into a volatile memory unit, wherein the computer device can update the commercial film via connecting to a network. Then the operating system is loaded. | 10-01-2009 |
20090249055 | SYSTEM AND METHODS FOR BOOTING ELECTRONIC DEVICES - The invention provides a boot method capable of reducing boot time even in the case of a change in the configuration of boot files. A boot file is booted from a hard disk drive in a computer equipped with a multitasking operating system. A plurality of tasks are observed, the tasks being created and sequentially executed in order to read out boot files. This observation is carried out at the corresponding boot and a log in the past boot is not used. On the basis of the observed boot files, a prefetch boot file is selected. The entire selected prefetch boot file is filled into a boot cache. The boot file is loaded from the boot cache to a main memory. | 10-01-2009 |
20090249056 | APPARATUS AND METHOD FOR RETRIEVING NON-VOLATILE ITEMS IN PORTABLE TERMINAL - Provided are an apparatus and a method for reducing a booting time by separately storing Non-Volatile (NV) items for at least one frequency band supported by a portable terminal in a non-volatile memory, and retrieving the stored NV items from a memory to which the stored NV items are copied whenever a booting process is performed. The apparatus includes a memory and a controller. The memory stores the file system including NV items including parameters used for driving and initializing a portable terminal. The controller generates and stores NV items representing transmission/reception performance values for the at least one frequency band supported by the portable terminal from the parameters, and copies the stored NV items during a booting process of the portable terminal. | 10-01-2009 |
20090249057 | NETWORK STORAGE TARGET BOOT AND NETWORK CONNECTIVITY THROUGH A COMMON NETWORK DEVICE - The present disclosure includes systems and techniques relating to booting to a network storage target. In general, in one implementation, a bus-to-network device driver is loaded during a machine boot, where the bus-to-network device driver is capable of sending machine bus commands over a network, providing access to the network for a network device driver, and distinguishing between received responses to the machine bus commands and other network traffic corresponding to the network device driver. Loading of the bus-to-network device driver can occur in response to an operating system load of bus drivers. For example, the bus-to-network device driver can be an iSCSI driver, and the operating system load of bus drivers can be the operating system load of SCSI drivers. | 10-01-2009 |
20090254741 | HOST PERIPHERAL SYSTEM AND METHOD FOR LOADING AN EXTERNAL PROGRAM CODE TO A HOST FOR SETTING UP A TRANSMISSION MECHANISM WHEN BOOTING - When booting a host, a host peripheral system sends a boot code to the host for controlling the booting operation of the host via a serial transmission line, and loads an external program code into the host. After setting up a transmission mechanism through executing the external program code, the host can forward a write command to the host peripheral system for writing the data provided by the external program code to the command identification sector of the non-volatile memory of the host peripheral system, and the host peripheral system is capable of identifying the data as a command and executes functional operations corresponding to the command. After finishing the functional operations, the host peripheral system forwards a finish signal to the host, and the host is able to send a read command for fetching the data signal generated in the functional operations. | 10-08-2009 |
20090254742 | NAVIGATION SYSTEM AND METHOD WITH SWITCHABLE MULTI-LANGUAGE INTERFACES - A navigation system and method that allows switching between multi-language operating interfaces. It provides multi-language operating interfaces in the storage unit of the navigation system. During the navigation system operation, the user is prompted by Basic Input Output System (BIOS) to select a language of operating interface to display. The navigation system is then installed by executing the index file of the selected language to display the navigation system operating interface in the selected language. | 10-08-2009 |
20090259836 | RUNNING OPERATING SYSTEM ON DYNAMIC VIRTUAL MEMORY - A method making possible booting up and running a system image of an operating system together with diskspace or drivespace, either free or stored with data or application files, for use on the type of storage medium, such as but not limited to internal physical memory or internal RAM, that virtual memory allocated out of the system memory pool upon boot-up can be and is used for mapping for access of such type of storage medium by the operating system under concern in device(s), including computer system(s) or computer-controlled device(s) or operating-system-controlled device(s) capable of running the operating system under concern. | 10-15-2009 |
20090259837 | COMPUTER SYSTEM - A computer system including a first memory unit, a second memory unit and a switch unit is provided. The first memory unit stores a first BIOS. The second memory unit stores a second BIOS. The switch unit has a first configuration and a second configuration. Upon the computer system being started, the switch unit receives an enable signal. When the switch unit is in the first configuration, the enable signal is provided to the first memory unit to start the first basic input/output system. When the switch unit is in the second configuration, the enable signal is provided to the second memory unit to start the second basic input/output system. | 10-15-2009 |
20090265537 | COMPUTER SYSTEM, BIOS STRUCTURE AND BOOT METHOD THEREOF - A BIOS structure is adapted for a computer system. The BIOS structure provided by the present invention has a boot block. In addition, the boot block is divided into a stationary data sector and an updatable data sector. When the BIOS needs to be updated, program codes of the BIOS are updated from the updatable data sector. Furthermore, the computer system determines to execute the program codes of the BIOS from the stationary data sector or the updatable data sector according to a status value. | 10-22-2009 |
20090271600 | METHOD OF USING AN INFORMATION HANDLING SYSTEM HAVING A BOOT FILE, AND AN INFORMATION HANDLING SYSTEM AND MACHINE-EXECUTABLE CODE FOR CARRYING OUT THE METHOD - An information handling system and a method of using it can allow the information handling system to be started or restarted and have an operating system loaded, even if a boot variable within a persistent memory is currently invalid. The method can detect and determine a hardware path name to a new drive that has an operating system. The new drive can have a relative path name to boot entries that include a pointer to a boot file. The boot file can be executed to run a boot loader that loads the operating system. During loading of the operating system, other boot entries within the drive can provide boot parameters. The boot variable within persistent memory, and potentially the relative path name or boot parameter(s) can be updated on the new drive. In a particular embodiment, the information handling system can include a unified extensible firmware interface (UEFI). | 10-29-2009 |
20090271601 | METHOD, DEVICE, AND SYSTEM FOR PRE-MEMORY SYMMETRIC MULTIPROCESSING FLOW - A cache-as-RAM (CAR) system of a multi-processor system that includes a plurality of processors may be initialized. The CAR system may assign a physical data address range for each of the plurality of processors such that the physical data address ranges allocated to all of the plurality of processors overlap with each other. A boot code stream may be executed with the CAR appearing to the executing boot stream as a memory store for executing the boot code stream. Other embodiments are described and claimed. | 10-29-2009 |
20090271602 | Method for Recovering Data Processing System Failures - A method for recovering from software and/or hardware failures occurred in a data processing system is disclosed. A current version of boot code and an updated version of boot code are stored in a first memory region and a second memory region, respectively, of a non-volatile memory of the data processing system. The updated version of boot code is periodically replaced by a latest version of boot code downloaded from a support center. After an occurrence of a system crash, a determination is made if the system crash was caused by a known problem that can be remedied by the updated version of boot code. If so, the data processing system is rebooted using the updated version of boot code. Otherwise, data related to the system crash is collected, and the data processing system is rebooted using the current version of boot code. | 10-29-2009 |
20090271603 | EMBEDDED SYSTEM AND STARTUP METHOD THEREOF - An embedded system includes a controller and a memory. The memory includes a primary firmware module, a backup firmware module, and a boot loader module. The primary firmware module has a primary firmware id_address. The backup firmware module has a backup firmware id_address. The boot loader module has a boot loader id_address. The controller is capable of activating the boot loader module to check status of the primary firmware module via the primary firmware id_address. Upon the condition that status of the primary firmware module is ok, the controller is capable of activating the primary firmware module. Upon the condition that status of the primary firmware module is not ok, the controller is capable of activating the backup firmware module via the backup firmware id_address. | 10-29-2009 |
20090271604 | APPARATUS AND METHOD TO DRIVE DEVICES - A device driving apparatus includes a storage unit to store a plurality of device driving programs, a plurality of devices to receive the plurality of device driving programs, and a switching unit to transfer the plurality of device driving programs. | 10-29-2009 |
20090271605 | METHOD AND APPARATUS FOR RESTORING SYSTEM USING VIRTUALIZATION - A method and apparatus to restore a system using virtualization, the method including: if a system restoration at a target restoration time point from among at least one restoration time points is requested, generating a virtualization layer; if a use of a system is requested by an application layer, accessing the target restoration time point using the virtualization layer; and performing a system restoration at the accessed target restoration time point. | 10-29-2009 |
20090271606 | INFORMATION PROCESSING DEVICE AND INFORMATION PROCESSING SYSTEM - According to one embodiment, an information processing device includes an acquisition module configured to get information for executing an authentication process and information on power-on security policy, from a server connected to a network during power-on, a storage module configured to store the information on power-on security policy in a storage device, an authentication module configured to execute the authentication process by using the information for executing the authentication process, a boot module for executing a process of booting an operating system, when the authentication process has succeeded, and a power-on security policy execution module configured to execute a process which is based on a power-on security policy stored in the storage device, when the information for executing the authentication process and the information on power-on security policy cannot be got. | 10-29-2009 |
20090276613 | METHOD OF SHARING BASIC INPUT OUTPUT SYSTEM, AND BLADE SERVER AND COMPUTER USING THE SAME - A blade server is provided. The blade server includes at least one motherboard, and a backplane. The backplane is coupled to the at least one motherboard, and includes a memory unit and a switch unit. The memory unit is adapted for storing a BIOS. The switch unit is coupled between the motherboard and the memory unit, for coupling the memory unit to one of the at least one motherboard. The present invention is adapted for using less memory units when configuring a blade server. | 11-05-2009 |
20090276614 | SERVO DEVICE AND METHOD OF SHARING BASIC INPUT/OUTPUT SYSTEM - A servo device and a method of sharing a basic input/output system (BIOS) include a plurality of mainboards, a circuit board, and a memory unit, and a switching unit disposed on the circuit board. A single memory unit stores a plurality of BIOS entity program segments respectively corresponding to a mainboard model, and transmits the BIOS entity program segments corresponding to the model of the mainboard for receiving the BIOS to the mainboard through the switching unit, so that the mainboards of various models may share the BIOS. | 11-05-2009 |
20090276615 | SERVO DEVICE AUTO-BOOTED UPON POWER SUPPLY RECOVERY AND METHOD THEREOF - A servo device auto-booted upon power supply recovery and a method thereof include a plurality of mainboards, a circuit board, a power supply, a memory unit, an auto-booting unit, and a switching unit. The switching unit and the memory unit storing a basic input/output system (BIOS) are disposed on the circuit board. The auto-booting unit outputs a selection signal when the power supply recovers the supply of power after an abnormal power failure, and then the switching unit transmits the BIOS to each mainboard sequentially according to the selection signal, so as to finish the auto-booting of the entire servo device. | 11-05-2009 |
20090276616 | SERVO DEVICE AND METHOD OF SHARED BASIC INPUT/OUTPUT SYSTEM - A servo device and method of a shared basic input/output system (BIOS) include a plurality of mainboards, a circuit board, and a switching control unit. When a disk boot failure event of the mainboard occurs, a transmission path is conducted between the mainboard where the disk boot failure event occurs and a memory unit of another mainboard according to a control signal generated by the switching control unit in response to the disk boot failure event of the mainboard, such that the mainboard shares the BIOS. | 11-05-2009 |
20090276617 | COMPUTER SYSTEM COMPRISING A SECURE BOOT MECHANISM ON THE BASIS OF SYMMETRIC KEY ENCRYPTION - A CPU, a computer system and a secure boot mechanism are provided in which a symmetric encryption key may be incorporated into a non-volatile memory area of the CPU core, thereby substantially avoiding any tampering of the encryption key by external sources. Moreover, pre-boot information may be internally stored in the CPU and may be retrieved upon a reset or power-on event in order to verify a signed boot information on the basis of the internal symmetric encryption key. Furthermore, the BIOS information may be efficiently updated by generating a signature using the internal encryption key. | 11-05-2009 |
20090276618 | Portable device and method for externally generalized starting up of a computer system - An improved portable device for start-up of a computer system is disclosed. This portable device for externally starting up a computer system comprises a connection interface to the computer system and a data medium comprising data and executable codes of a host operating system that can be activated by a start-up program of the computer system and configured to automatically detect hardware and/or software elements of the computer system and to activate the corresponding computer drivers. The data medium further comprises data and executable codes of a management software interface, configured to present the computer drivers activated by the host operating system in the form of at least one predetermined generic computer driver, and data and executable codes of a guest operating system that can be activated by the management software interface and configured to manage the hardware and/or software elements on the computer system using the predetermined generic computer driver. | 11-05-2009 |
20090282232 | MEMORY DEVICE BOOT COMMAND - Memory devices and methods facilitate initiation and termination of boot data output from a memory device through the use of received commands. For example, boot data output is initiated in response to a command indicative of a desire to enter a boot mode of operation. The initiate boot command may include a base command and a unique argument indicative of a desire to enter the boot mode of operation. Boot data output may be terminated by a received command indicative of a desire to terminate the boot mode of operation. The terminate boot command may include the same base command as the initiate boot command with any argument other than the argument indicative of a desire to enter the boot mode of operation. | 11-12-2009 |
20090282233 | TESTING AND ALERT DEVICE AND METHOD FOR POWER LEAKAGES - A testing and alert device for power leakages of a computer includes a basic input/output system (BIOS) chip located on a motherboard of the computer, a south bridge chip connected to the BIOS chip, and an alarm device controlled by the BIOS chip. The south bridge chip has a first general purpose input/output terminal capable of being coupled to a ground of an exterior power source. The BIOS chip is capable of detecting the input signal of the first general purpose input/output terminal of the south bridge chip and outputting an alarm command to initiate the alarming device when the input signal from the first general purpose input/output terminal is at a high level. | 11-12-2009 |
20090282234 | REMOTE CONNECTION BETWEEN INTERMEDIARY DEVICE AND COMPUTING DEVICE VIA CENTRAL AUTHORITY SOFTWARE - Upon an intermediary device on a network being turned on, controlling system software at the intermediary device is booted such that no public network address is ever assigned to the intermediary device. The intermediary device sends a boot message over the network to central authority software running on one or more first computing devices on the network. The central authority software in response sends messages over the network to the intermediary device and to a second computing device on the network to establish a private tunnel with one another. The intermediary device and the second computing device establish the private tunnel with one another over the network. The intermediary device then opens a remote connection to the second computing device through the private tunnel so that peripherals connected to the intermediary device as if they were directly connected to the second computing device. | 11-12-2009 |
20090282235 | METHOD, ELEMENT AND CIRCUIT BOARD FOR CONTROLLING SHUTDOWN OF ELECTRONIC DEVICE - The invention provides a method, an element and a circuit board for controlling an electronic device to be shut down. The method according to the invention includes the steps as follows. First, a power control signal is received, and the duration of the power control signal at a preset signal level is calculated. Then, whether the duration is greater than a threshold value is determined. If yes, an interrupt signal is generated and transmitted to a processing module of the electronic device to drive the processing module to set the preset mechanism of the electronic device according to the interrupt signal. | 11-12-2009 |
20090287915 | Procedure for Booting a First Computer Using the Operating System of a Second Computer - A method for operating at least one first computer entity with an operating system of a second computer entity, | 11-19-2009 |
20090287916 | GRID COMPUTING RESOURCES AND A METHOD OF USE THEREOF - A method of using an information handling system can include communicating accessibility of a resource to a grid system, powering down the information handling system, receiving a wake request from the grid system, booting the information handling system into a grid mode where the resource is accessible to the grid system. Machine-executable code for an information handling system can include a method for indicating that a resource in the information handling system is accessible to a grid system, communicating that the resource is accessible to the grid system, and placing the information handling system into a low power state. An information handling system can include a processor that can indicate that a resource is accessible to a grid system, communicate to the grid system that the resource is accessible, and place the information handling system into a low power state. | 11-19-2009 |
20090287917 | SECURE SOFTWARE DISTRIBUTION - To protect against software piracy, a storage media has a cryptographically protected area that stores software to be installed onto a target device, such as a computer. The storage media may include a non-secure area holding boot files and an installation program. The installation program may gather target device-specific data for use by a certifying authority in generating a key that allows access to the secure area of the storage media only during the installation process. In this manner, a user never has access to the raw installation files, limiting the ability to copy and distribute those files for installation on non-authorized computers. The certifying authority may also prepare target device-specific data applied to the software before installation to create a custom software image that will only execute on the target device and that can be verified by the host OS prior to execution, allowing integrity confirmation. | 11-19-2009 |
20090287918 | MANAGING EXTENSIBLE FIRMWARE INTERFACE (EFI) BOOT DATA - A computer system has extensible firmware interface firmware. The EFI firmware loads incomplete virtual boot data from a resource manager and then completes the boot data. The completed boot data is used to find an operating-system image to boot. The complete virtual boot data is transferred to the resource manager. | 11-19-2009 |
20090287919 | Electronic Device - An electronic device includes a power supply unit, a control unit, a first boot circuit, and a data encryption unit. The control unit outputs a boot signal for causing the power supply unit to start supplying power. The first boot circuit interconnects the power supply unit and the control unit for transmitting the boot signal. The data encryption unit is for interconnecting the power supply unit and the control unit so as to form a second boot circuit through which the boot signal is transmitted and for cutting off the first boot circuit. | 11-19-2009 |
20090292910 | SYSTEM AND METHOD OF ACCESSING BIOS CHANGE SUMMARY INFORMATION WITHIN A BIOS OPERATING ENVIRONMENT - A system and method of accessing basic input output system (BIOS) change summary information within a BIOS operating environment is disclosed. According to an aspect, a basic input output system (BIOS) set-up interface is disclosed. The BIOS set-up interface includes a navigation routine accessible via a BIOS set-up menu and operable to initiate displaying a secondary user display interface. The BIOS set-up interface further includes a BIOS change summary interface accessible using the secondary display user interface and configured to display BIOS set-up changes made using the BIOS set-up menu. | 11-26-2009 |
20090292911 | Boot test system and method thereof - A boot test system applied to test a cold boot in a target computer is provided. The boot test system includes a host computer and an autorun module. The host computer is used to test the target computer to turn power on/off and output a power-on signal and a power-off signal to the target computer based on a feedback signal. The autorun module installed in the target computer is used to output the feedback signal to the host computer during the boot of the target computer. Whereby, the present invention retains a fail result of the boot of the target computer for debugging by a worker. | 11-26-2009 |
20090292912 | STORAGE MEDIUM STORING MASTER BOOT RECORD, COMPUTER SYSTEM HAVING THE SAME AND BOOTING METHOD OF THE COMPUTER SYSTEM - A storage medium storing a master boot record, a computer system having the same, and a booting method of the computer system, the storage medium including: a first sector to store a first master boot record including an execution code for grasping command information and implementing a preset control according to the command information; a first data storage region to store a first data file for booting; a second sector to store a second master boot record to implement booting based on the first data file; a second data storage region to store a second data file for booting; and a third sector to store a third master boot record to implement booting based on the second data file. | 11-26-2009 |
20090300343 | METHOD AND APPARATUS FOR CHANGING BIOS PARAMETERS VIA A HOT KEY - An apparatus for changing BIOS parameters via a hot key, including a control unit, a microprocessor, a first memory, a second memory, a third memory and a keyboard. The first memory saves BIOS code while the third memory saves N parameter banks of BIOS. When the apparatus performs a keyboard-scanning process during power-on, the apparatus determines whether at least one hot key is triggered. If the hot key is triggered, the apparatus selects one of the N parameter banks. Then the BIOS performs a corresponding operation based on the selected parameter bank. The invention provides a method for changing BIOS parameters via a hot key through the apparatus. | 12-03-2009 |
20090307474 | STORING A DEVICE MANAGEMENT ENCRYPTION KEY IN A NETWORK INTERFACE CONTROLLER - A device management system for securely storing an encryption key associated with a device management session. The device management system includes an encryption key generator to generate an encryption key, a client device to receive an encrypted bootstrap data file transmitted by a base station, and a network interface controller coupled to the client device, the network interface controller to store the encryption key separate from a system memory of the client device. Embodiments of the device management system ensure user credentials do not exist in the client device in plaintext form outside of the network interface controller, thus preventing software and/or malware executed on the host from extracting such credentials. | 12-10-2009 |
20090307475 | METHOD AND APPARATUS FOR PERFORMING MULTIPLE COMPUTER BOOTUPS IN MINIMAL MODE - A computer implemented process performs a plurality of computer bootups in minimal mode. Login authentication is disabled during the computer bootups. All startup programs and services not required to install new software are disabled during the computer bootups. New software is installed during the computer bootups. During the final computer bootup, the disabled startup programs and services are enabled to restore the computer to normal operating condition. | 12-10-2009 |
20090307476 | SYSTEM AND METHOD OF DELAYING POWER-UP OF AN INFORMATION HANDLING SYSTEM - A system and method of delaying power-up of an information handling system is disclosed. According to an aspect, a method of powering an information handling system can include detecting a delay power-up setting within a basic input output system (BIOS) of a particular information handling system using a management controller. The management controller can be configured to delay power-up of the particular information handling system. The method can further include enabling a power-up of the particular information handling system in response to the delay power-up setting using the management controller. | 12-10-2009 |
20090307477 | INSTALLATION OF SOFTWARE ONTO A COMPUTER - An indication is received from a user to initiate installation of an operating system onto a storage device of a computer. The storage device is partitioned into an original partition and a new partition. Installation software for the operating system is loaded onto the new partition. The computer is booted into the installation software on the new partition. The operating system is installed onto the original partition via the installation software on the new partition. The computer is then re-booted into the operating system on the original partition and the new partition is removed from the storage device. | 12-10-2009 |
20090307478 | PLATFORM BOOT WITH BRIDGE SUPPORT - A method for booting a processing device, the processing device comprising a first and a second processing unit, the method comprising: detecting by the first processing unit, whether at least one boot configuration parameter is accessible from a non-volatile storage medium of the processing device, the at least one configuration parameter being indicative of a boot interface; if said at least one configuration parameter is available, forwarding at least a part of the detected at least one configuration parameter by the first processing unit to the second processing unit; otherwise detecting by at least one of the first and second processing units whether a boot interface is available to the processing device; booting at least the second processing unit from the indicated or detected boot interface. | 12-10-2009 |
20090307479 | COMPUTER EXECUTION SYSTEM FOR STARTING PROGRAM QUICKLY AND METHOD THEREOF - A computer execution system and a method thereof for starting at least a program quickly after a computer is booted are provided. First, a file list is stored. The file list includes multiple file names of start files which are necessary when the program is started. When the computer is booted, the start files corresponding to the file names in the file list are retrieved from a low-speed storage device and stored in a high-speed storage device. Afterwards, when the program is started, it is executed by cooperating with the start files in the high-speed storage device. Thus, the program is started quickly. This not only saves a user's time in waiting, but also increases the working efficiency of the user. | 12-10-2009 |
20090307480 | ELECTRONIC EQUIPMENT, IMAGE FORMING APPARATUS, STARTING METHOD OF ELECTRONIC EQUIPMENT, AND COMPUTER PROGRAM PRODUCT - Each of a plurality of control units starts the control unit with one of a first start method and a second start. When a first control unit among the control units starts with a second start method, the first control unit instructs a second control unit among the control units to start with the second start method. Thus, all the control units are started with the same start method. | 12-10-2009 |
20090307481 | APPARATUS AND METHOD FOR BOOTING A SYSTEM - A method and apparatus for booting a system are provided. The apparatus may comprise a boot block and a baseboard management controller coupled together in the system. The baseboard management controller may be configured to receive a request from the boot block for a basic input/output system image; determine at least one location to access the basic input/output system image; and obtain the basic input/output system image from the at least one location. | 12-10-2009 |
20090319766 | PROVISIONING AN UNKNOWN COMPUTER SYSTEM - A method of provisioning an unknown computer system is disclosed. The method includes detecting a computer system to be provisioned, determining that the computer system is unknown to a configuration management system, and identifying a global identifier and a digital certificate to be used to provision the computer system. The method further includes communicating the global identifier and the digital certificate from a network based boot strap server or from boot strap media to the computer system prior to loading an operating system onto the computer system. | 12-24-2009 |
20090319767 | DATA PROCESSING APPARATUS - The present invention provides a data processing apparatus realizing reduced load on a host CPU and improved performance. An arithmetic unit includes an SIMD processor for processing a plurality of pieces of data by a single instruction, and a second CPU coupled to the SIMD processor via an arithmetic unit bus and controlling the SIMD processor. A host system includes a host CPU for controlling the entire data processing apparatus, a built-in memory and a peripheral circuit coupled to the host CPU via a first bus, and a peripheral circuit coupled to a second bus. The second CPU accesses an external flash/ROM via the arithmetic unit bus and the first bus, and the SIMD processor accesses an external memory via the second bus. Therefore, the load on the host CPU can be reduced, and the performance of the entire apparatus can be improved. | 12-24-2009 |
20090319768 | COMPUTER, REMOTE ACTIVATION METHOD, AND REMOTE ACTIVATION PROGRAM - To activate respective OSs separately through a network even in a virtual machine in which a plurality of OSs are installed, an M-packet acquiring unit acquires a received magic packet. An address detecting unit detects a MAC address that is stored in the magic packet. A control-list storage unit records correspondence between MAC addresses and guest OSs, and defines whether to activate the respective OSs by a remote operation. An activation determining unit refers to the control-list storage unit and determines whether to activate a guest OS that corresponds to the MAC address stored in the magic packet. A guest-OS control unit activates a guest OS that is determined to be activated by the activation determining unit. | 12-24-2009 |
20090327678 | Enhancing Security of a System Via Access by an Embedded Controller to A Secure Storage Device - System and method for performing pre-boot security verification in a system that includes a host processor and memory, an embedded microcontroller with an auxiliary memory, e.g., an on-chip ROM, or memory controlled to prohibit user-tampering with the contents of the memory, and one or more pre-boot security components coupled to the embedded microcontroller. Upon power-up, but before host processor boot-up, the embedded microcontroller accesses the auxiliary memory and executes the program instructions to verify system security using the one or more pre-boot security components. The one or more pre-boot security components includes at least one identity verification component, e.g., a smart card, or a biometric sensor, e.g., a fingerprint sensor, a retinal scanner, and/or a voiceprint sensor, etc., and/or at least one system verification component, e.g., TPM, to query the system for system state information, and verify that the system has not been compromised. | 12-31-2009 |
20090327679 | OS-MEDIATED LAUNCH OF OS-INDEPENDENT APPLICATION - A system, method, and computer readable medium for an operating system (OS) mediated launch of an OS dependent application is disclosed. An application running within an OS may operate outside an OS environment by constructing for example a capsule file, passing the capsule file to firmware interface, and restarting the system. The firmware interface may load various drivers and applications contained within the capsule file and execute them to perform a task. Upon completion of the task, the OS is booted again and the original application may resume control, making use of any information stored by the firmware interface in a dedicated status table or file. Other embodiments may be employed, and other embodiments are described and claimed. | 12-31-2009 |
20090327680 | Selecting a Random Processor to Boot on a Multiprocessor System - Pervasive logic is provided that includes a random event generator. The random event generator randomly selects which processor of a plurality of processors in the multiprocessor system is to be a boot processor for the multiprocessor system. A corresponding configuration bit for the randomly selected processor is set to identify the processor as a boot processor. Based on the setting of the configuration bits for each processor in the plurality of processors, a selection of a security key is made. The security key is then used to decrypt the boot code for booting the multiprocessor system. Only the randomly selected boot processor is able to select the correct security key for correctly decrypting the boot code, which it then executes to bring the system to an operational state. | 12-31-2009 |
20090327681 | SELF TEST INITIALIZATION - A system to perform an information handling system (IHS) initialization includes one or more subsystems to receive a command to power on the IHS, initialize a processor cache memory to emulate a random access memory (RAM), determine whether a manufacturing self test is being performed on the IHS, and in response to the manufacturing self test being performed, complete the initialization without a complete memory initialization. | 12-31-2009 |
20090327682 | System and Method for Transferring Configuration Information to an Embedded Device Using a Command Line Interface - A system and method is disclosed for transferring configuration information to an embedded device associated with an option ROM during those periods in which the option ROM is disabled. The method of the present invention involves the enumeration of PCI devices within the system and the determination of whether the PCI devices are associated with an option ROM and whether the option ROM is enabled. If the embedded device is associated with an option ROM and if the option ROM is not enabled, the option ROM is loaded to a shadow memory and the command-line interface of the option ROM is called to transfer configuration data to the embedded device. The option ROM is later removed from shadow memory to remove the footprint of the option ROM in shadow memory. | 12-31-2009 |
20090327683 | SYSTEM AND METHOD TO ACCELERATE ACCESS TO NETWORK DATA USING A NETWORKING UNIT ACCESSIBLE NON-VOLATILE STORAGE - In some embodiments, the invention involves a network controller having a pattern matching unit to identify whether boot file requested from a network accessible storage device for booting are stored locally in non-volatile memory accessible to the network controller. When required boot files are stored locally, the locally stored files are sent to the processor to boot the operating system. In an embodiment, retrieved boot files are automatically cached by the network controller in the accessible non-volatile memory. In other embodiments, a service operates to ensure coherency between locally store boot files and the boot filed stored on the network accessible storage. In another embodiment, data other than boot files may be stored and retrieved from the non-volatile memory. Other embodiments are described and claimed. | 12-31-2009 |
20090327684 | Apparatus and method for secure boot environment - In some embodiments, a processor-based system may include at least one processor, at least one memory coupled to the at least one processor, a boot block stored at a first memory location, a capsule update stored at a second memory location, a startup authenticated code module to ensure the integrity of the boot block upon a restart of the processor-based system, code which is executable by the processor-based system to cause the processor-based system to validate the boot block with the startup authenticated code module upon the restart of the processor-based system, and, if the boot block is successfully validated, to validate the capsule update for the processor-based system with the startup authenticated code module. Other embodiments are disclosed and claimed. | 12-31-2009 |
20090327685 | Efficient root booting with solid state drives and redirection write snapshots - A system and method for root booting includes a plurality of computing devices that each boot from a read-only base volume of an attached storage device that includes data common to the computing devices. The attached storage device also includes a plurality of volumes, each dedicated to one of the computing devices, which are redirect on write snapshots of the read-only base volume including unique items for the respective computing device. The read-only base volume may be stored in one or more solid state drives which may be configured as a RAID (redundant array of independent disks) and/or mirrored with one or more other storage drives. The plurality of volumes may each be stored in one or more hard disk drives which may be configured as a RAID. The attached storage device may be operable to add common data to the read-only base volume. | 12-31-2009 |
20100005281 | POWER-ON INITIALIZATION AND TEST FOR A CASCADE INTERCONNECT MEMORY SYSTEM - A memory buffer, memory system and method for power-on initialization and test for a cascade interconnect memory system. The memory buffer includes a bus interface to links in a high-speed channel for communicating with a memory controller via a direct connection or via a cascade interconnection through an other memory buffer. The interface is operable in a SBC mode and a high-speed mode. The memory buffer also includes a field service interface (FSI) slave for receiving FSI signals from a FSI master. In addition, the memory buffer includes logic for executing a power-on and initialization training sequence initiated by the memory controller. | 01-07-2010 |
20100005282 | METHOD AND APPARATUS FOR BOOTING FROM A FLASH MEMORY - Techniques for booting a computing device with a flash memory without knowledge of parametric information of the flash memory are described herein. In one embodiment of the invention, the computing device receives input requesting the computing device to begin operation and executes a set of one or more instructions stored in a non-volatile memory. The execution of the set of instructions configures a first read routine for accessing the flash memory based on a common denominator format of candidate flash memories, and the first read routine is not configured based on information located in a flash memory identification table. The computing device reads a bootstrapping code image based on the first read routine into a volatile memory and executes that first bootstrapping code image. Other methods and apparatuses are also described. | 01-07-2010 |
20100005283 | COMPUTER SYSTEM AND CONTROL METHOD OF THE SAME - A computer system includes a device which transmits data through a predetermined interface and outputs first recognition information in response to a predetermined power on self test (POST) control signal, a device controller which has second recognition information about whether the device is mounted, and a system controller which outputs the POST control signal to the device when powering on, and recognizes the device on the basis of the first recognition information and the second recognition information. | 01-07-2010 |
20100005284 | DEVICE HAVING SHARED MEMORY AND METHOD FOR TRANSFERRING CODE DATA - The present invention relates to a device having a shared memory and a code data transmitting method. According to an embodiment of the present invention, the digital processing device can include n processors, n being a natural number of 2 or greater; and a shared memory, coupled to each of the processors through independent buses and having a boot section allotted, the boot section being for writing a boot program code to be used for booting of at least one processor. | 01-07-2010 |
20100005285 | COMPUTER SYSTEM AND METHOD OF BOOTING THE SAME - Provided are a computer system and a method of booting the same. The computer system includes: a first storage unit for storing a booting-related program including an operating system program and data, the stored program and data being retained even when a power voltage is not supplied; and a second storage unit for storing data, the data being lost when the power voltage is not supplied for a predetermined time or longer. The method includes: a first step of performing a booting operation using the booting-related program stored in the first storage unit and storing the booting-related program stored in the first storage unit in the second storage unit when the second storage unit is detected and the booting-related program is not stored in the second storage unit; a second step for performing a booting operation by executing the booting-related program stored in the second storage unit when the second storage unit is detected and the booting-related program is stored in the second storage unit; and a third step of backing up the booting-related program stored in the second storage unit to the first storage unit when a predefined backup condition is met. | 01-07-2010 |
20100005286 | METHOD FOR BOOTING COMPUTER SYSTEM - A method for booting a computer system is provided. In the method for booting the computer system, a memory space is created using a BIOS to simulate a virtual disk. The virtual disk is used to execute operations which have to be executed via a floppy disk drive. The operations are executed in the virtual disk via the BIOS. Thus, the floppy disk drive is not needed, and the cost is reduced. In addition, time consumed in reading data from the floppy disk is reduced, and installing speed also increases. | 01-07-2010 |
20100011199 | Method and device of bootloader-to-go - A method comprising two steps is provided for a simplified on-site bootloading process. Step 1: having a computer or similar device preload initialization instructions and executable codes to an intermediate device. Step 2: having that said device transfer such initialization instructions and executable codes to the operating device. The intermediate device named “bootloader-to-go” is provided in this invention. The said bootloader-to-go device provides the uncomplicated transferring of the initialization instructions and executable codes to the operating device without complex configuration steps. The said bootloader-to-go device is handheld, operated by a single operating switch and is equipped with versatile I/O bus connections compatible to operating devices with various I/O types. There is no need of a hosting computer or similar device on site, the bootloading speed is not controlled by a hosting computer, and therefore the bootloading time is predictable and can be repeated. | 01-14-2010 |
20100011200 | METHOD AND SYSTEM FOR DEFENDING SECURITY APPLICATION IN A USER'S COMPUTER - Protecting the integrity and the effectiveness of a security agent that is installed in a user's device while the user's device operates online or offline. The security agent may be used for enforcing a security policy required by an organization or network to which the user's computer belongs. One aspect of exemplary embodiments of the present invention is to associate the content of one or more storage devices of the user's computer with the security agent and with a boot-loader program used by the user's computer. | 01-14-2010 |
20100011201 | COMPUTER SYSTEM AND CONTROL METHOD THEREOF - A control method of a computer system, including setting whether to enable a connection with at least one peripheral device in an operating system of the computer system to transmit and receive data; and enabling or disabling the connection with the at least one peripheral device based on the setting when the computer system is booted. | 01-14-2010 |
20100011202 | MULTI-STAGE BOOT PIN SAMPLING - In accordance with embodiments, a method for configuring an electronic device during a power-on sequence includes sampling a boot pin state multiple times. The method also includes storing a value corresponding to each sampled boot pin state, wherein the stored values comprise one of four different states for a single boot pin. | 01-14-2010 |
20100011203 | CONTROL PROTOCOL FOR IMAGE ENUMERATION AND TRANSFER - A control protocol is used to deploy and install an operating system image on a client. The data structure of the control protocol includes an operation code corresponding to an operation associated with the deployment and installation of the operating system image on the client. When a server receives a request packet from the client, the server parses the request packet and sends the parsed request packet to a provider. The provider then executes the operation associated with the operation code and generates a return value. The return value is sent to the server. The server then composes a reply packet including the return value and transmits the reply packet to the client. | 01-14-2010 |
20100011204 | Method and System for Image Management in a Computing System - A method and system for migrating data to a build-to-order computing system is provided. The method comprises storing an image at a remote site. The image comprises data stored on a computing system. An order is received to provide a second computing system to a customer. Access to the image is provided to the second computing system such that the second computing system can store the image. | 01-14-2010 |
20100017588 | SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT FOR PROVIDING AN EXTENDED CAPABILITY TO A SYSTEM - A system, method, and computer program product are included for providing an extended capability to a system. In operation, a request to boot a system is identified. Additionally, in response to the request, extended capability code is returned. Furthermore, the extended capability code is capable of being executed to provide an extended capability. | 01-21-2010 |
20100017589 | Provision of Remote System Recovery Services - In an illustrative embodiment, a computer implemented method for providing remote system recovery services is provided. The computer implemented method generates bootable system recovery images to form a set of bootable system recovery images, creates a list of authorized users from a set of subscribers, and receives a request for a bootable system recovery image, including a subscriber identifier, to form a received request. The computer implemented method further authenticates the subscriber identifier in the received request and sends the bootable system recovery image to the subscriber. Responsive to a determination that the user selected additional services, the computer implemented method performs the selected services. | 01-21-2010 |
20100017590 | Method and Related Computer System Capable of Executing Programs for a Computer System - A method capable of executing programs for a computer system operating in a shut down state includes generating a control instruction while a key of the computer system is pressed down; storing the control instruction; and performing actions according to the control instruction when the computer system is booted up. | 01-21-2010 |
20100017591 | METHOD FOR BOOTING AN OPERATING SYSTEM - A method for accelerating an operating system boot process is disclosed. In one exemplary embodiment, during a first operating system boot, information regarding the physical locations of disk access performed by the operating system to complete the boot are recorded and stored in a control data file. The control data file is used during a second operating system boot to predict which data will be required during the second operating system, and to populate a cache with that data. The cache can then be used to improve the second operating system boot to improve the boot tine. In one embodiment, the information is independent of a file system of the operating system. In another embodiment, the cache can be populated by copying data from a mass storage device to a cache, and when the data is used, it can be moved from the cache to another cache. | 01-21-2010 |
20100017592 | Grid processing control apparatus - According to an aspect of the embodiment, a grid processing control apparatus includes a grid OS being an OS dedicated to grid computing, a general-purpose OS being an OS other than the grid OS, and an OS boot up unit selectively allowing the grid OS or the general-purpose OS to operate. The OS boot up unit allows only the grid OS to operate during grid use term when the grid OS is operated, and allows only the general-purpose OS to operate during general-purpose OS use term when the general-purpose OS is operated. | 01-21-2010 |
20100023739 | METHOD AND APPARATUS FOR BOOTING A PROCESSING SYSTEM - Machine-readable media, methods, apparatus and system for booting a processing system are described. In an embodiment, whether an encrypted version of a closed operating system is authentic may be determined. The encrypted version of the closed operating system may be decrypted with a key retrieved from a processor register to provide the closed operating system, based at least in part on a determination that the encrypted version of the closed operating system is authentic. Then, whether the closed operating system is authentic may be determined and a virtual machine may be created so that the closed operating system may be launched in the virtual machine, if the closed operating system is authentic. | 01-28-2010 |
20100023740 | DIAGNOSTIC UTILITY AND METHOD FOR A DATA STORAGE DEVICE - The disclosure is related to systems and methods of a diagnostic utility for a data storage device. Further, the present disclosure is also related to monitoring host activity and storing information related to the host activity in a nonvolatile cache of a data storage device. In a particular embodiment, a method includes monitoring a host computer for an occurrence of data storage device related activity and storing information based on the data storage device related activity in a nonvolatile memory of a removable data storage device. | 01-28-2010 |
20100023741 | METHOD FOR SETTING BIOS AND RECREATING CHECKSUM VALUE - A method is used for setting a basic input output system (BIOS) and recreating a checksum value in a computer. The BIOS is stored in a complementary metal-oxide semiconductor (CMOS). The method includes modifying an original BIOS value to a new BIOS value, writing a preset value into a setting storage unit of the CMOS, checking a value in the setting storage unit against the preset value, recreating a new checksum value based on the new BIOS value, overwriting an original checksum value with the new checksum value, and clearing the setting storage unit. The checking and the recreating steps are executed before a BIOS checksum validation of the computer during a computer initialization process when the computer is restarted. | 01-28-2010 |
20100023742 | BIOS SHARING SYSTEM IN A HIGH DENSITY SERVER AND METHOD THEREOF - A BIOS sharing system in a high density servers includes a plurality of servers, a BIOS (Basic Input Out System), a switch and a micro controller. Each server has a motherboard hardware and a BMC (Baseboard Management Controller), wherein each BMC is operable to output a status order in response to a control information of each motherboard hardware. The BIOS is operable to initialize each motherboard hardware before the motherboard hardware being operating. The switch is interconnected between the BIOS and each server for selectively switching to one of the servers such that the BIOS is loaded to the one of the servers for initializing. The micro controller is interconnected between the switch and each BMC, wherein the micro controller is operable to order the switch for selectively switching to one of the servers in response to the status order. | 01-28-2010 |
20100023743 | METHODS AND APPARATUS FOR INTEGRITY MEASUREMENT OF VIRTUAL MACHINE MONITOR AND OPERATING SYSTEM VIA SECURE LAUNCH - Methods and apparatus to measure the integrity of a virtual machine monitor and an operating system via secure launch are disclosed. In one example, a method measures a first characteristic of a virtual machine monitor, stores the first measured characteristic in a first hardware protected location, measures a second characteristic of an operating system with the virtual machine monitor, wherein the measuring of the second characteristic is initiated by the operating system, and stores the second measured characteristic in a second hardware protected location. | 01-28-2010 |
20100023744 | Interface Monitoring Device, Computer System, and Method for Monitoring a Differential Interface Port - An interface monitoring device can be used with at least one differential interface port with a positive and a negative data line for connecting a peripheral device. The interface monitoring device has a monitoring circuit and a deactivation circuit. The monitoring circuit is designed to monitor at least one signal level dependent on the signal level of the positive and/or the negative data line and the deactivation circuit is designed to stop data traffic via the positive and/or the negative data line of the at least one interface port. | 01-28-2010 |
20100023745 | MEMORANDUM-PRESENTING METHOD AND COMPUTER SYSTEM USING THE SAME - A memorandum-information presenting method and a computer system using the method are provided. The computer system allows the memorandum-information to be presented and/or edited during a booting procedure, for example, while executing BIOS codes, initializing various components, checking hardware, allocating resources, or assisting to load an operating system. Accordingly, a user may read or edit the information without waiting for the computer system to successfully enter an operating system. | 01-28-2010 |
20100031012 | CORE INITIALIZATION CODE VALIDATION - Files essential to the boot sequence are validated as they are executed. As core boot files are loaded and executed by a computers a hash of the files is created and extended into configuration registers. Core operating system files are verified by the boot loader using a digital signature, and the public key used to verify the digital signature is recorded in a configuration register. Core operating system files verified by the boot loader include a list of hash values, which is used by the operating system to validate the other files as they are executed. User assurance that the system has booted correctly is achieved by comparing the state of configuration registers to previously stored values reflecting the expected state of the registers. Upon the state of the configuration registers matching what is expected, data previously selected by the user is retrieved and recognized by the user. | 02-04-2010 |
20100031013 | INJECTION MOLDING SYSTEM AND PARAMETER SETTING METHOD THEREOF - An injection molding machine system for setting system parameters provides an interface unit displaying a boot interface, a common module interface, a new module setting interface, and a main operating interface. If not all the system parameter values need be modified, the system parameters are loaded on the boot interface and the main operating interface are started. If some of the system parameter values need be modified, the system parameter values are loaded, modified, and saved on the common module interface and the main operating interface are started. If all the system parameter values need be set, the system parameter values are saved on the new module setting interface and the main operating interface are started. If the system parameter values modified need be fine-tuned, the system parameter values are fine-tuned on the main operating interface. | 02-04-2010 |
20100037041 | Booting a Computer System from Central Storage - A filter driver that is loaded during an initial part of the boot process enable operating systems that are not capable of booting from central storage to be booted from central storage. According to this technique, an initial set of operating system files is loaded into system memory from a local storage volume. The initial set of files includes a small subset of all of the operating system files and includes a boot loader, a kernel, boot time drivers, a file system driver, and a filter driver. The filter driver takes control over the loading of the remainder of the operating system files, so that these files are loaded from central storage instead of the local storage volume. | 02-11-2010 |
20100037042 | SYSTEM FOR SWITCHING BIOS SET-VALUES - An exemplary system for switching BIOS set-values includes a south bridge chip, a memory unit, a switching unit, and a BIOS chip. The south bridge chip is connected to the memory unit and the switching unit, and connected to the BIOS chip via a bus. The memory unit is configured for storing a plurality of groups of predetermined BIOS set-values. The switching unit controls the south bridge chip to selectively read a group of BIOS set-values from the memory unit, and then to write the group of BIOS set-values into the BIOS chip. | 02-11-2010 |
20100037043 | STORAGE DEVICE SELECTION AND SWITCHING SYSTEM - A storage device control system is disclosed for selecting a storage device to connect to a computer from a plurality of available storage devices and for controlling the manner in which the storage devices can be connected to the computer. | 02-11-2010 |
20100042820 | SELF-RESTARTING NETWORK DEVICES - A method and apparatus for self-monitoring to identify an occurrence of a threshold and rebooting in response to the occurrence of the threshold is provided. In an embodiment, a data processing apparatus comprises one or more processors; logic coupled to the one or more processors and comprising one or more stored sequences of instructions which, when executed by one or more processors, cause the one or more processors to obtain a threshold associated with the apparatus; self-monitor the apparatus to identify an occurrence of the threshold; and self-reboot the apparatus responsive to the occurrence of the threshold. | 02-18-2010 |
20100042821 | Methods and systems for providing manufacturing mode detection and functionality in a UEFI BIOS - Methods and systems are described for managing manufacturing modes in a unified extensible firmware interface (UEFI) basic input output system (BIOS). The UEFI BIOS can include a PEI (pre-EFI) manufacturing mode driver, a PEI interface, PEI drivers, a DXE (driver execution environment) manufacturing mode driver, a DXE interface, DXE drivers, a SMM (system management mode) manufacturing mode driver, a SMM interface, and SMM drivers. Manufacturing mode data is stored and accessed through a PEI manufacturing mode driver, a DXE manufacturing mode driver, or a SMM manufacturing mode driver, and/or any combination thereof. The PEI interface is used to communicate manufacturing mode data between PEI drivers and the PEI manufacturing mode driver. The DXE interface is used to communicate manufacturing mode data between DXE drivers and the DXE manufacturing mode driver. And the SMM interface is used to communicate manufacturing mode data between SMM drivers and the SMM manufacturing mode driver. | 02-18-2010 |
20100042822 | METHOD FOR LOADING SYSTEM LOCKED PRE-INSTALLATION CERTIFICATION - A method is used for loading a System Locked Pre-installation (SLP) certification from a basic input output system (BIOS) of a computer. The BIOS includes a boot block section and a main section for initializing the hardware of the computer after executing the boot block section. The method includes determining if a set value in a predetermined address of the boot block section is equal to a preset value upon booting the computer; executing the main section of the BIOS directly and the SLP certification being disabled if matching, loading the SLP certification into a read only memory (ROM) of the computer and the SLP certification being enabled if not matching, and executing the main section of the BIOS. | 02-18-2010 |
20100042823 | Method, Apparatus, and Product for Providing a Scalable Trusted Platform Module in a Hypervisor Environment - A method, apparatus, and computer program product are described for implementing a trusted computing environment within a data processing system where the data processing system includes a single hardware trusted platform module (TPM). Multiple logical partitions are provided in the data processing system. A unique context is generated for each one of the logical partitions. When one of the logical partitions requires access to the hardware TPM, that partition's context is required to be stored in the hardware TPM. The hardware TPM includes a finite number of storage locations, called context slots, for storing contexts. Each context slot can store one partition's context. Each one of the partitions is associated with one of the limited number of context storage slots in the hardware TPM. At least one of the context slots is simultaneously associated with more than one of the logical partitions. Contexts are swapped into and out of the hardware TPM during runtime of the data processing system so that when ones of the partitions require access to the hardware TPM, their required contexts are currently stored in the hardware TPM. | 02-18-2010 |
20100042824 | HARDWARE TRUST ANCHORS IN SP-ENABLED PROCESSORS - A trust system and method is disclosed for use in computing devices, particularly portable devices, in which a central Authority shares secrets and sensitive data with users of the respective devices. The central Authority maintains control over how and when shared secrets and data are used. In one embodiment, the secrets and data are protected by hardware-rooted encryption and cryptographic hashing, and can be stored securely in untrusted storage. The problem of transient trust and revocation of data is reduced to that of secure key management and keeping a runtime check of the integrity of the secure storage areas containing these keys (and other secrets). These hardware-protected keys and other secrets can further protect the confidentiality and/or integrity of any amount of other information of arbitrary size (e.g., files, programs, data) by the use of strong encryption and/or keyed-hashing, respectively. In addition to secrets the Authority owns, the system provides access to third party secrets from the computing devices. In one embodiment, the hardware-rooted encryption and hashing each use a single hardware register fabricated as part of the computing device's processor or System-on-Chip (SoC) and protected from external probing. The secret data is protected while in the device even during operating system malfunctions and becomes non-accessible from storage according to various rules, one of the rules being the passage of a certain time period. The use of the keys (or other secrets) can be bound to security policies that cannot be separated from the keys (or other secrets). The Authority is also able to establish remote trust and secure communications to the devices after deployment in the field using a special tamper-resistant hardware register in the device, to enable, disable or update the keys or secrets stored securely by the device. | 02-18-2010 |
20100042825 | System and Method for Network Image Propagation without a Predefined Network - A system and method for network image propagation without a predefined network advantageously allows customers to automatically perform several system BOS installation or mksysb restoration over a virtual network with no predefined network and minimal installer configuration overhead. A method for network image propagation comprises: identifying a plurality of logical partitions residing in the logically partitioned terminal; configuring a temporary virtual network to connect said plurality of logical partitions to each other, wherein each one of the logical partitions is assigned at least one of a virtual Internet Protocol (IP) address and a virtual Media Access Control (MAC) address; installing an application image on at least one of the logical partitions via the temporary virtual network; deconfiguring the temporary virtual network; and assigning at least one of a physical IP address and a physical MAC address to said at least one logical partition on which the application has been installed. | 02-18-2010 |
20100049961 | UPDATE METHOD FOR BASIC INPUT/OUTPUT SYSTEM AND UPDATE SYSTEM THEREOF - An update method for a basic input/output system (BIOS) and an update system thereof are provided. Firstly, a program code of a boot block included in a main BIOS block is executed to detect whether the main BIOS block is crashed. A program code of the BIOS is stored in the main BIOS block. A BIOS image file is searched from a storage device when the main BIOS block is crashed, which includes a program code of a graphical user interface (GUI) and a plurality of update files. The program code of the GUI is executed to display graphic updating information of the BIOS. One of the update files is selected by a control command to update the main BIOS block. Therefore, the needed update file can be selected to update the BIOS by graphically display the updating information of the bios, thereby improving the update efficiency and usage convenience. | 02-25-2010 |
20100049962 | METHOD FOR LOADING AND UPDATING CENTRAL PROCESSING UNIT MICROCODE INTO BASIC INPUT/OUTPUT SYSTEM - The present invention relates to a method for loading a central processing unit microcode into a basic input/output system and a method for updating the central processing unit microcode of the basic input/output system. A system management interrupt instruction is applied to inform the basic input/output system an address and a length of the central processing unit microcode. Then, the basic input/output system performs an interrupt instruction to load the central processing unit microcode to a specific block of the basic input/output system. | 02-25-2010 |
20100058041 | Method and Apparatus for Secure Instantly-On Computer System - A method and apparatus for an instantly-on computer system is presented. A computer that incorporates fast non-volatile primary memory for storing the operating system, resulting in an instant-on or instant-booting of the computer. Large parts of the operating system code and application code are stored in non-volatile write-protectable areas that cannot be modified by malicious sources, resulting in a secure computer. It solves the problem from typical computers having to load the operating system and applications from a slow device such as the hard disk to the main memory. This loading is avoided by permanently housing the operating system in a non-volatile main memory. The system also solves the problem of corruption of operating system areas from malicious sources. The memory contains writeable and write-protected areas and a memory controller controls the access to the various regions of the memory. | 03-04-2010 |
20100058042 | Techniques for Booting a Stateless Client - A technique for booting a stateless client includes booting a virtual machine (VM) monitor on the client. The VM monitor is stored in a non-volatile memory area of a memory subsystem (of the client) and a first portion of an operating system (which does not include any state information for the operating system) is stored in the non-volatile memory area of the client. Booting of the operating system for the client is initiated and a remote storage (that stores a second portion of the operating system that includes state information for the operating system) is accessed via a communication link. Booting of the operating system for the client is completed using the second portion of the operating system. | 03-04-2010 |
20100058043 | ENHANCED CAPABILITIES IN PROVISIONING - Some embodiments of enhanced capabilities in provisioning on computing machines in a networked system have been presented. In one embodiment, a software vendor deploys a centralized server to an internal network of a customer. The provisioning capabilities of a centralized server are extended to support an additional type of platform by downloading a set of kickstart files associated with the additional type of platform from a software vendor. The centralized server may provision on a computing machine coupled to the centralized server within the internal network based on a type of a platform of the computing machine using one or more of the plurality of kickstart files. | 03-04-2010 |
20100058044 | MULTIPROCESSOR COMMUNICATION DEVICE AND METHODS THEREOF - During a boot process of a data processing device having a master bootstrap processor device and multiple slave processor devices, memory associated with the master bootstrap processor is not accessible. Accordingly, the master bootstrap processor communicates configuration information to a slave processor by writing configuration information to a register associated with the slave processor. The slave processor communicates an acknowledgment to the master bootstrap processor in response to reading the configuration information. | 03-04-2010 |
20100058045 | METHOD AND APPARATUS FOR FAST BOOTING A PORTABLE COMPUTING DEVICE ALLOWING FOR IMMEDIATE OPERATION - The present invention discloses a portable computing device ( | 03-04-2010 |
20100058046 | Method and Apparatus for Secure Instantly-Available Applications in a Computer System - A method and apparatus for instantly-available applications in a computer system is presented. A computer that incorporates fast non-volatile primary memory for storing the application software and/or operating system, resulting in an instant-on computer is presented. Large parts of the application code and/or operating system code are stored in non-volatile write-protectable areas of the memory that cannot be modified by malicious sources, resulting in a secure computer. It solves the problem of typical computers having to load the applications from a slow device such as the hard disk to the main memory. This loading is avoided by permanently housing the applications in a non-volatile main memory. The system also solves the problem of corruption of application software areas from malicious sources. The memory system contains writeable and write-protected areas and a memory controller that controls the access to the various regions of the memory. | 03-04-2010 |
20100058047 | ENCRYPTING A UNIQUE CRYPTOGRAPHIC ENTITY - A method of encrypting a unique cryptographic entity (UCE), where a client device receives a global-key (GK-) encrypted UKD comprising a GK-encrypted UCE and a GK-encrypted unit key number (UKN). The client device verifies that the GK-encrypted UKN is the same as a pre-provisioned value and then decrypts the GK-encrypted UKD using a global key (GK). The client device then re-encrypts the decrypted UKD using a device user key (DUK) to determine a DUK-encrypted UCE and a DUK-encrypted UKN. The DUK-encrypted UKN is verified as not equal to the GK-encrypted UKN. The DUK-encrypted UKN is then appended to the DUK-encrypted UCE to form a DUK-encrypted UKD and stored in a memory. | 03-04-2010 |
20100064125 | PROGRAMMABLE DEVICE AND BOOTING METHOD - A programmable device is provided, comprising a memory for storage of an encrypted boot loader, and a processing unit coupled to the memory. In the processing unit, a boot straper decrypts the encrypted boot loader into a plurality of boot loader instructions when the programmable device is initialized. A core executes boot loader instructions to accordingly load and execute an operation system. | 03-11-2010 |
20100064126 | Method and system for providing hybrid-shutdown and fast startup processes - A system and corresponding method are disclosed to provide hybrid-shutdown and fast startup processes. The system allows a computer to quickly return to its last state before power-off instead of going through the hardware enumeration and configuration of a normal full system boot. The system enables fast system startup regardless of the number of pre-loaded software as long as there is no hardware configuration change since the previous power-off. Therefore, PC manufacturers can freely add value-add software without compromising the boot time. The system is integrated into the computer's power-off path, thus delivering a true power-off state and the lowest power consumption level. | 03-11-2010 |
20100064127 | METHOD FOR UPDATING BASIC INPUT/OUTPUT SYSTEM AND METHOD FOR REPAIRING THEREOF - The invention relates to a method for updating a basic input/output system (BIOS) and method for repairing the BIOS. A part of a program code of the BIOS is stored in a backup memory block in advance. If the BIOS fails to update, the backup program code can be adopted to start up a computer system and then the BIOS will be repaired. | 03-11-2010 |
20100070744 | BOOT DRIVE SELECTION - A boot drive of a computing system is identified during at least two runtime environment of the computer system. The computer system includes at least two storage devices. An indicia is created on a selected storage device. The at least two storage devices are scanned for the indicia during a subsequent runtime environment of the computer system after the first runtime environment. | 03-18-2010 |
20100070745 | COMPUTER SYSTEM AND METHOD FOR BOOTING UNDER LOW TEMPERATURE STATE - A method for booting a computer system under a low temperature state is disclosed. When a trigger signal of a pressed power button on the computer system is detected, a hard disk temperature will be obtained via a temperature sensor to determine whether the hard disk temperature is less than a first predetermined temperature. If the hard disk temperature is less than the first predetermined temperature, a heater is activated to heat the hard disk and a low temperature event will be set. Next, if the hard disk temperature has reached or is greater than the second predetermined temperature, the computer system will be under activation. Then before a loading component of the computer system is activated, the low temperature event will be read. Therefore, output loading of the loading component is decreased to activate an system component of the computer system with a low loading state. | 03-18-2010 |
20100070746 | METHOD FOR BOOTING SYSTEM UNDER LOW TEMPERATURE STATE AND COMPUTER DEVICE USING THE SAME - A method for booting a computer device under a low temperature state is provided. A trigger signal is detected when a power button is pressed. A hard disk temperature of a hard disk is obtained via a temperature sensor to determine whether the hard disk temperature is less than a first predetermined temperature. If so, a heater is activated to heat the hard disk until the hard disk temperature is greater than the first predetermined temperature. If the hard disk temperature is greater than the first predetermined temperature, the heater is turned off and afterwards a voltage of a battery cell is checked if the voltage has reached a predetermined voltage. If the voltage of the battery cell has reached the predetermined voltage, a system component of a computer device is activated. | 03-18-2010 |
20100070747 | MANAGING CACHE DATA AND METADATA - Embodiments of the invention provide techniques for managing cache metadata providing a mapping between addresses on a storage medium (e.g., disk storage) and corresponding addresses on a cache device at data items are stored. In some embodiments, cache metadata may be stored in a hierarchical data structure comprising a plurality of hierarchy levels. Only a subset of the plurality of hierarchy levels may be loaded to memory, thereby reducing the memory “footprint” of cache metadata and expediting the process of restoring the cache metadata during startup operations. Startup may be further expedited by using cache metadata to perform operations associated with reboot. Thereafter, as requests to read data items on the storage medium are processed using cache metadata to identify addresses at which the data items are stored in cache, the identified addresses may be stored in memory. When the computer is later shut down, instead of having to transfer the entirety of the cache metadata from memory to storage, only the subset of the plurality of hierarchy levels and/or the identified addresses previously loaded to memory may be transferred (e.g., to the cache device), thereby expediting the shutdown of the computer. | 03-18-2010 |
20100070748 | Device and methods for simulating controller area network signals - The invention relates to a device of generating simulation signals for Controller Area Network (CAN). The device in this invention simulates CAN data streams normally generated by electronic control units (ECUs) in automobiles, vehicles, boats, etc. without the presence of these ECUs. The device in this invention has a visual display of simulated signals' values. In addition, this invention reveals a remote terminal method and software. The remote terminal software in this invention can control the simulated signal via graphic user interfaces. The remote terminal software in this invention also displays the precise values of simulated signals via graphic user interfaces. Furthermore, this invention presents an advantageous method using a license identification management technique to change the functionality and features of the simulation device without any hardware modifications and without sending the device back to the device manufacturer. | 03-18-2010 |
20100070749 | Embedded Electronic Device and Booting Method Thereof - An embedded electronic device and a booting method thereof are provided. The embedded electronic device, for downloading an initiation image from one of a plurality of initiation image source devices according to at least one option pin, comprises a boot memory, for storing a boot code and a plurality of initiation image source sequence tables; a microprocessor, for executing the boot code and downloading the initiation image according to one of the initiation image source sequence tables; a register, for storing a status of the at least one option pin; and a bus, coupled to the boot memory, the microprocessor and the register, for transmitting data between the boot memory, the microprocessor and the register; wherein the initiation image source sequence table is selected according to the status stored in the register, and the sequence of the initiation image source devices accessed by the microprocessor is determined according to the initiation image source sequence table. | 03-18-2010 |
20100070750 | IMAGE PROCESSING APPARATUS AND PROGRAM STARTING UP METHOD - An image processing apparatus has first through n-th pluralities of programs which, when executed by a computer processor, perform respectively first through n-th functions of the image processing apparatus, where n denotes an integer more than 1, and starts up, on a function-by-function basis, the first through n-th pluralities of programs respectively corresponding to the first through n-th functions. The image processing apparatus starts up, in a predetermined sequence, respective programs included in any one plurality of programs among the first through n-th pluralities of programs to a state in which the plurality of programs performs a corresponding function. | 03-18-2010 |
20100070751 | Preloader - This disclosure describes techniques and/or apparatuses for reducing the total time used to boot up a computer and load applications onto the computer. | 03-18-2010 |
20100070752 | Stable Active X Linux based operating environment - An engine, system and method of providing a stable ActiveX Linux-based operating system. The engine, system and method include a plurality of computing hardware, capabilities for booting the plurality of computing hardware using a Linux operating system, and capabilities for accessing, via a scripting compatibility layer that ports non-native applications to the Linux operating system, of an ActiveX enabled web browser that is non-native to the Linux operating system. | 03-18-2010 |
20100077190 | Method To Retain Crucial Thin Client System Settings - A system comprises a first non-volatile storage device that contains an operating system. The system also comprises a second non-volatile storage device that contains basic input/output system (BIOS) code and at least one parameter used by the operating system or by a network interface, and not by the BIOS code. | 03-25-2010 |
20100077191 | INFORMATION PROCESSOR, EXTERNAL MEMORY AND CONTROL METHOD - An information processor includes a system control unit configured to start up one operating system, a drive unit configured to be driven in response to start-up of the one operating system, an external memory storing another operating system, and an interface (I/F) for the external memory which is connected to the external memory. The system control unit serves to stop the drive unit by being connected to the I/F for the external memory and to start up the other operating system from the external memory. | 03-25-2010 |
20100077192 | COMPUTER, BOOTING SOFTWARE PRODUCT AND COMPUTER BOOTING METHOD - A computer includes an application system, a storage device and a basic input output system (BIOS). The application system can be respectively coupled to the storage device and the BIOS, set at least a multimedia file as a preset playing file according to an input instruction and store the preset playing file into the storage device. The application system can further generate a log file according to the input instruction and the storage position of the preset playing file, wherein the log file is sent to the BIOS. The BIOS has a file access module, so that the BIOS can acquire the preset playing file from the storage device according to the log file for playing during booting the computer. | 03-25-2010 |
20100077193 | METHOD AND APPARATUS FOR ASSIGNING A MEMORY TO MULTI-PROCESSING UNIT - A memory mapping apparatus for a multi-processing unit includes at least one memory matching unit configured to perform matching between a plurality of processing units and a plurality of memories, a memory controller configured to perform access control and arbitration for the respective memories, a memory mapping unit configured to include a window map for the respective processing units, make correspond the memories to the respective processing units with reference to the window map, and assign part of the entire address region of the corresponding memory, and a window map change unit configured to change a window map for a processing unit in which a request to use the memory has occurred in response to a request to use the memory from any one of the processing units. | 03-25-2010 |
20100077194 | TURBO BOOT SYSTEMS AND METHODS - A computer system includes a hard disk drive and a non-volatile semiconductor memory. The hard disk drive stores a first set of data that includes boot up data. The non-volatile semiconductor memory is distinct from semiconductor memory of the hard disk drive and semiconductor memory of a host of the computer system. A turbo boot driver module stores the boot up data in the non-volatile semiconductor memory and transfers the boot up data from the non-volatile semiconductor memory to a file system of the host during a boot up mode of the host. | 03-25-2010 |
20100077195 | METHOD AND A MEMORY UNIT FOR BOOTING A SERVER - The invention relates to a server with at least one removable storage unit. This removable storage unit is designed to boot a server. The removable storage unit, which is for example a memory card, comprises a non-writable storage, which stores a boot-loader and reference installation files, and a writable secondary storage, which is designed to store installation files. The boot-loader checks a data content of the secondary storage and a data content of a primary storage of the server. In case the secondary storage is not empty and the primary storage is either empty or comprises a different data content than the secondary storage, the boot-loader stores the data content of the secondary storage in the primary storage of the server. | 03-25-2010 |
20100077196 | COMPUTER AND METHOD FOR CONNECTING COMPUTER TO NETWORK DISK - A computer includes a BIOS and a communication system. The BIOS includes a disk access interface module and a ram disk. The disk access interface module accesses a remote disk, and the ram disk stores data retrieved from the remote disk. The communication system includes a storage medium having a preset format and a communication protocol layer module. The storage medium having the preset format has a network chip driver to allow the BIOS to call and connect to the network. Thus, the computer may communicate with the remote disk. The communication protocol layer module makes the computer communicate with the remote disk through the network chip driver. | 03-25-2010 |
20100077197 | NON-VOLATILE MEMORY CACHE PERFORMANCE IMPROVEMENT - In order to provide a more efficient persistent storage device, one or more long-term storage media are included along with a non-volatile memory. In one embodiment, one portion of the non-volatile memory is used as a write buffer and a read cache for writes and reads to the long-term storage media. Interfaces are provided for controlling the use of the non-volatile memory as a write buffer and a read cache. Additionally, a portion of the non-volatile memory is used to provide a direct mapping for specified sectors of the long-term storage media. Descriptive data regarding the persistent storage device is stored in another portion of the non-volatile memory. | 03-25-2010 |
20100082960 | PROTECTED NETWORK BOOT OF OPERATING SYSTEM - Methods and apparatus are disclosed to protect an operating system booted by a client computing device and provided by a server computing device. One such method includes requesting a trusted platform module of the client computing device to unseal a sealed encryption key, and receiving an encrypted operating system via a network in response to initiating a boot process of the client computing device. The illustrative method also includes decrypting the encrypted operating system received via the network using an unsealed encryption key obtained in response to requesting the trusted platform module to unseal the sealed encryption key, and executing the decrypted operating system. | 04-01-2010 |
20100082961 | Apparatus and method to harden computer system - In some embodiments, a processor-based system may include a processor, the processor having a processor identification, one or more electronic components coupled to the processor, at least one of the electronic components having a component identification, and a hardware security component coupled to the processor and the electronic component. The hardware security component may include a secure non-volatile memory and a controller. The controller may be configured to receive the processor identification from the processor, receive the at least one component identification from the one or more electronic components, and determine if a boot of the processor-based system is a provisioning boot of the processor-based system. If the boot is determined to be the provisioning boot, the controller may be configured to store a security code in the secure non-volatile memory, wherein the security code is based on the processor identification and the at least one component identification. Other embodiments are disclosed and claimed. | 04-01-2010 |
20100082962 | Flash memory device for booting a computing device including embedded general purpose operating system - Methods and apparatus involve booting a computing device from a flash device. The flash device has memory partitions, including a read-only and a read/write partition. The read-only includes an operating system for use by the computing device and defines an initial system state. The read/write is configured to store a delta from the initial system state. Upon booting the computing device subsequent to an initial boot, the delta and the initial system state together define the whole system state. In other features, a write engine from the read-only partition tracks changes to the initial system state and writes some, but not all of the changes back to the read/write partition thereby minimizing a number of writes to the flash memory. In this manner, the speed of the flash memory can be used to quickly boot/reboot a computing device, while avoiding the wear limits associated with writing to flash devices. | 04-01-2010 |
20100082963 | Embedded system that automatically updates its software and the method thereof - An embedded system that automatically updates its software and the method thereof are provided. A boot code in the boot module determines whether the operating system (OS) image file is abnormal. The determination result determines whether the embedded system automatically updates its software. This solves the problem that the user cannot update the software in the embedded system. This helps reducing the manpower and cost for updating software in the conventional embedded system. It also enhances the usage convenience and market competition thereof. | 04-01-2010 |
20100082964 | METHOD OF CONFIGURING COMPUTERS WITH EXPANSION CARDS - A method of configuring a computer with an expansion card to process a basic input output system (BIOS) program thereof, includes performing an expansion card detecting program to detect and identify the expansion card by reading signals from an identifying finger of the expansion card, and loading a configuration program associated with the detected expansion card of the BIOS program. | 04-01-2010 |
20100082965 | INFORMATION PROCESSING APPARATUS AND METHOD OF CONTROLLING INFORMATION PROCESSING APPARATUS - According to an aspect of the present invention, there is provided an information processing apparatus configured to be operated by an operating system, including: a display device; a BIOS-ROM configured to store a BIOS program to be executed before starting the operating system; a memory configured to store image data to be displayed on the display device before starting the operating system during an execution of the BIOS program; a processor configured to execute a compression determination program configured to determine whether the image data are stored in the memory in a compression state or in a non-compression state and an expansion program configured to expand the image data stored in the compression state through an execution of the determination program; and a display controller configured to display, on the display device, the expanded image data. | 04-01-2010 |
20100082966 | METHOD FOR COMPUTER STARTUP PROTECTION AND SYSTEM THEREOF - A method for computer startup protection, wherein the method includes steps that a computer powers up, and loads and executes a dynamic password computer startup protection program; the dynamic password computer startup protection program receives a password entered by a user; the password is obtained by the user via sending a dynamic password generating command to a dynamic password device; then the dynamic password computer startup protection program determines whether the password is valid, if so, the dynamic password computer startup protection program loads a computer startup program of the computer; otherwise the dynamic password computer startup protection program does not load the computer startup program of the computer. A system includes a computer and a dynamic password generating device. | 04-01-2010 |
20100082967 | METHOD FOR DETECTING MEMORY TRAINING RESULT AND COMPUTER SYSTEM USING SUCH METHOD - A method for detecting a memory training result includes the following steps. Firstly, a computer system is booted. Then, a memory training program included in a basic input output system of the computer system is executed, thereby obtaining a plurality of reading time parameters and a plurality of writing time parameters. Afterwards, the reading time parameters and the writing time parameters are recorded into a non-volatile memory. The computer system includes a central processing unit, a memory device, a chipset, a basic input output system, and a non-volatile memory. The memory device includes a memory module. The chipset is connected to the memory module and the central processing unit, and includes a memory controller. The basic input output system is connected to the chipset and includes a memory training program. The non-volatile memory is connected to the chipset. | 04-01-2010 |
20100082968 | PROCESSOR BOOT SECURITY DEVICE AND METHODS THEREOF - A method of securing network authentication information at a data processing device includes determining a boot source from which to boot the device and comparing the boot source to an expected source. If the boot source is not the expected source, access to the network authentication information is inhibited, such as by disabling access to the portion of memory that stores the authentication information. Further, if the boot source is the expected source, boot code authentication information is retrieved from memory and verified during the boot sequence. If the device authentication information is not authenticated, access to the network authentication information is inhibited. Accordingly, access to the network authentication information is allowed only if the data processing device is booted from an expected source, and only if the boot code is authenticated, thereby reducing the likelihood of unauthorized access to the network authentication information. | 04-01-2010 |
20100082969 | EMBEDDED DEVICE FOR IMPLEMENTING A BOOT PROCESS ON A HOST - An embedded device, for implementing a boot process on a host, is provided. This embedded device includes servers supporting various industry-standard Internet protocols and services related to the boot process. This embedded device also includes a storage medium that stores boot options for multiple Operating Systems (OSs). | 04-01-2010 |
20100088499 | SEAMLESS DATA MIGRATION - Provided are techniques for migrating data. Contents are sealed to one or more registers. In response to determining that secure backup is enabled, platform metrics are stored in a private store. An out-of-band request is received. A response to the out-of-band request is provided using the stored platform metrics. | 04-08-2010 |
20100088500 | MULTIPLE GUEST O.S. BOOT FOR SERVER COMPONENT SETUP - A hypervisor boots all guest operating systems needed to setup/update server components as detected by an update utility. The update utility, after detecting server components, is booted into each guest O.S. so that the components are updated in parallel without having to sequentially boot the utility into a guest O.S., update its component, then shut down and re-boot into another guest O.S. | 04-08-2010 |
20100088501 | Post speedup in oprom systems with intervention support - Techniques related to personal computers and devices sharing similar architectures are disclosed. Particularly shown is a system and method for enabling improved computer initialization speed achieved by methods including causing apparently premature timeouts when fruitlessly waiting for human intervention. | 04-08-2010 |
20100088502 | Method for Storing Boot Time - A method for storing boot time is performed by a computer product having a programmable read-only memory with a basic/input output system resident therein. The method includes the steps of:
| 04-08-2010 |
20100095104 | Administering Computer Processor Execution Of Basic Input/Output Services Code - Administering computer processor execution of BIOS code that includes a primary BIOS code and a recovery BIOS code stored in ROM, the ROM operatively coupled to a control module and the processor, where administering processor execution of the BIOS code includes determining, by the control module, a size of the ROM; generating, by the control module in dependence upon the size of the ROM, an address for the primary BIOS code and an address for the recovery BIOS code; starting, by the control module, operation of the processor for execution of the primary BIOS code including providing, to the processor, the address for the primary BIOS code; and if executing the primary BIOS code fails, restarting, by the control module, operation of the processor for execution of the recovery BIOS code including providing, to the processor, the address for the recovery BIOS code to the processor. | 04-15-2010 |
20100095105 | SYSTEM AND METHOD FOR DETERMINING AN OPTIMUM NUMBER OF REMOTELY-BOOTED INFORMATION HANDLING SYSTEMS - Systems and methods for reducing problems and disadvantages associate with remotely booting multiple information handling systems are disclosed. A method may include obtaining system-specific parameters regarding a system including a plurality of remotely-booted clients, the system-specific parameters including a average client boot time threshold. The method may also include generating a plurality of client boot threads based on at least one or more of the system-specific parameters. The method may additionally include measuring an actual average client boot time of the plurality of client boot threads. The method may further include determining a number of remotely-booted clients for substantially simultaneous remote booting based on at least the actual average client boot time and the average client boot time threshold. | 04-15-2010 |
20100095106 | BOOT ALGORITHM - A method, chip and computer program product for booting from a secondary boot source. In one embodiment, the method includes: (1) retrieving primary boot code from an on-chip primary boot source on the same chip as a processor, the primary boot code comprising at least a boot discovery algorithm for determining the location of an external secondary boot source external to said chip, (2) executing the primary boot code on the processor, including the boot discovery algorithm, thus operating the processor to check each of a plurality of locations to determine the location of the external secondary boot source, (3) retrieving the secondary boot code from the determined location and (4) continuing the booting of the processor by executing the secondary boot code on the processor. | 04-15-2010 |
20100100719 | METHOD FOR REDUCING BOOTING TIME AND COMPUTER USING THE SAME - The invention provides a method for reducing booting time and a computer using the same. The method includes the following steps. The computer is shut down. After the step of shutting down the computer, the computer is booted up to make the computer enter into a power-saving mode. Thus, when a user performs an operation to boot up the computer, the computer resumes a normal state from the power-saving mode. | 04-22-2010 |
20100100720 | COMPUTER SYSTEM HAVING DUAL BIOS PROGRAM PROTECTING FUNCTION AND CONTROL METHOD THEREOF - A dual BIOS program protecting method is provided for protecting a first BIOS program and a second BIOS program of a computer system. Firstly, a flag is switched from a first status to a second status during the refreshing of the first BIOS program. If the first BIOS program is successfully refreshed, the flag is switched from the second status to the first status. If the flag is in the second status when the computer system is booted, a first control signal is generated and the second BIOS program enters a write protection mode according to the first control signal. | 04-22-2010 |
20100106953 | METHOD FOR PATCHING ROM BOOT CODE - The present invention relates to a method for patching a boot code stored on ROM comprising the steps of (a) storing at least one patching command for said boot code in a PROM; (b) loading said boot code from said ROM to a memory; (c) reading said at least one patching command from said PROM; (d) patching at least one command of said boot code residing in said memory with said at least one patching command from said PROM; and (e) executing the patched boot code. | 04-29-2010 |
20100106954 | Multi-Layer Content Protecting Microcontroller - The present invention relates to a microcontroller designed for protection of intellectual digital content. The microcontroller includes a secure CPU, a real-time cipher, and a user programmable multi-layer access control system for internal memory realized by programmable nonvolatile memory. Programmable nonvolatile memory allows in-system and in-application programming for the end user. The programmable nonvolatile memory is mainly used for program code and operating parameter storage. The multiple-layer access control is an integral part of the CPU, providing confidentiality protection to embedded digital content by controlling reading, writing, and/or execution of a code segment according to a set of user-programmed parameters. The cipher incorporates a set of cryptographic rules for data encryption and decryption with row and column manipulation for data storage. All cryptographic operations are executed in parallel with CPU run time without incurring additional latency and delay for system operation. | 04-29-2010 |
20100106955 | METHODS AND SYSTEMS FOR RECOVERING A COMPUTER SYSTEM USING A STORAGE AREA NETWORK - Methods and systems for recovering and booting a computer system using a SAN. The computer system comprises a local storage device. A request for writing data to a boot volume on the local storage device is received. The data is written to the local storage device, as well as to the SAN at substantially the same time as receiving the request. The computer system can then be booted using the data written to the SAN. | 04-29-2010 |
20100106956 | BIOS SWITCHING SYSTEM AND A METHOD THEREOF - A BIOS switching system applicable to a computer system is provided. The BIOS switching system includes an input module and a memory module, and the memory module further includes a plurality of BIOS's, an option recording block, and a boot-up management block. The input module produces a switching signal according to a user input. The boot-up management block determines whether replacing an execution option block's data in the option recording block is necessary or not based on the switching signal. The data of the execution option block is identification data of one of the BIOS's. The boot-up management block executes the BIOS indicated by the data of the execution option block while the computer system boots up. | 04-29-2010 |
20100106957 | PROGRAMMING AND CONFIGURATION IN A HEATING, VENTILATION AND AIR CONDITIONING NETWORK - Various embodiments of systems and methods of creating a memory of an HVAC device. A bootloader code is stored into a first protected memory of the HVAC device. A device designator is stored into a second protected memory of the HVAC device. A control serial number is stored into a third protected memory of the HVAC device. A control part number is stored into a fourth protected memory of the HVAC device. An application data is stored into a separate application memory of the HVAC device. | 04-29-2010 |
20100115256 | METHOD, APPARATUS, AND SYSTEM FOR QUIESCING A BOOT ENVIRONMENT - An apparatus, system, and method are disclosed for quiescing a boot environment. A reservation module reserves a portion of a first storage device. A store module stores an update boot image to the reserved portion. A detection module detects the update boot image stored on the first storage device when the computer boots and executes the update boot image in place of a standard boot image in response to detecting the update boot image. The update boot image places a computer in a known quiescent state. | 05-06-2010 |
20100115257 | Systems and Methods to Provide Failover Support for Booting Embedded Hypervisor From an Internal Non-Volatile Memory Card - The present disclosure further relates to information handling systems with failover support for booting an embedded hypervisor, the information handling system. For example, an information handling system with failover support may comprise a processor; one or more applications configured to be executed, at least in part, by the processor; a memory communicatively coupled to the processor and comprising a basic input/output system (BIOS), the BIOS comprising a BIOS universal serial bus (USB) driver, the BIOS USB driver comprising a mass storage device driver; a primary internal embedded hypervisor non-volatile memory (NVM) card communicatively coupled to the memory, the first NVM card comprising a first bootable hypervisor image; and a back up internal embedded hypervisor NVM card communicatively coupled to the memory, the second NVM card comprising a second bootable hypervisor image. | 05-06-2010 |
20100115258 | IMAGE PROCESSING APPARATUS AND CONTROL METHOD THEREOF - Disclosed are an image processing apparatus and a control method of the image processing apparatus. The image processing apparatus includes: a storing unit in which booting data for system booting is stored; a random access memory (RAM) in which the booting data is loaded; a central processing unit which loads the booting data in the RAM if system power supply is turned off, and refers to the booting data loaded in the RAM to perform the system booting if the system power supply is turned on; and a control unit which cuts off power supply to the central processing unit, and controls the RAM to operate in a low power mode in which power is supplied to the RAM to maintain the booting data loaded in the RAM while the system power supply is turned off | 05-06-2010 |
20100122075 | METHOD FOR CONTROLLING BOOT SEQUENCE OF SERVER - A method for controlling a boot sequence of a server includes the following steps. A boot image is created, and a first proxy server program is placed into the boot image. The first proxy server program communicates with a management server. The boot image is restored on a rewritable removable storage device, so as to enable the rewritable removable storage device to boot a managed target server. A second proxy server program is installed and executed in the management server. A basic input/output system (BIOS) of the target server is set to enable the rewritable removable storage device to act as a first boot device. Boot files in the rewritable removable storage device are modified through the first proxy server program or the second proxy server program according to a boot instruction received from the management server, thereby controlling a boot sequence of the target server. | 05-13-2010 |
20100122076 | SECURITY METHOD - A security method for verifying a client device comprising: loading and executing a boot loader at the client device which establishes a connection to a boot compliance server; sending a first cryptographic element from the boot compliance server to the client device; generating a first cryptographic response with the first cryptographic element based on at least part of the boot loader and sending the first cryptographic response to the boot compliance server for verification; and continuing the boot process upon successful verification of the first cryptographic response. | 05-13-2010 |
20100125724 | COMPUTER DEVICE HAVING INITIALIZATION SETTING FUNCTION AND METHOD FOR MAKING INITIALIZATION SETTING FOR COMPUTER - A computer device having an initialization setting function and a method for making an initialization setting for a computer are provided. The computer device includes a BIOS, a button which generates a pressing frequency or a pressing time when it is pressed and a main body interface unit connected to the button or the BIOS to transmit signals. The main body interface unit generates a corresponding operation instruction according to the pressing frequency or the pressing time and makes the BIOS execute the operation instruction. | 05-20-2010 |
20100131746 | Method and apparatus to support separate operating systems in partitions of a processing system - A processing system with multiple processing units may support separate operating systems (OSs) in separate partitions. During an initialization process, a preboot manager in the processing system may copy software to a sequestered area of memory in the processing system. The preboot manager may also configure the processing system to hide the sequestered area of memory from a first partition of the processing system. Also, the preboot manager may use a first processing unit in the processing system to boot an OS on the first partition, and the preboot manager may transmit a boot trigger from the first processing unit to a second processing unit in the processing system. The boot trigger may cause the second processing unit to use the software in the sequestered area of memory to boot a second partition of the processing system. Other embodiments are described and claimed. | 05-27-2010 |
20100131747 | INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND STORAGE MEDIUM - An information processing system includes a first information processing apparatus and a second information processing apparatus being compatible therewith. A second semiconductor memory is configured to include a first semiconductor memory, and both of the first semiconductor memory and the second semiconductor memory are able to be detached to and attached from the first information processing apparatus and the second information processing apparatus. Each of the first semiconductor memory and the second semiconductor memory receives an encrypted command from the attached information processing apparatus in a secure mode, and transmits encrypted data according to the decrypted command. Furthermore, an area only provided to the second semiconductor memory is made accessible by the second information processing apparatus. | 05-27-2010 |
20100131748 | COMPUTER SYSTEM WITH REDUCED STORAGE DEVICE AND ASSOCIATED BOOTING METHOD - A computer system with integrated storage device for storing both a basic input/output system (BIOS) code and an operating system (OS) code and an associated booting method are provided. The computer system includes a central processing unit, a storage device controller and the storage device. The BIOS code and the OS code are stored in an invisible are and a visible area of the storage device, respectively. At first, the storage device controller is activated to read data from an architecture information area of the storage device to perform initialization. Then, the initialized storage device controller converts a read-only memory access command issued from the central processing unit into a suitable format to control loading of the BIOS code from the invisible area. At last, the storage device controller controls loading of the OS code from the visible area to finish the booting of the computer system. | 05-27-2010 |
20100138641 | Mechanism for enabling a program to be executed while the execution of an operating system is suspended - A mechanism is provided for enabling an auxiliary program to be executed in a computer system, after an operating system has been loaded and executed, without rebooting the computer system. This may be achieved by suspending execution of the operating system, executing the auxiliary program while execution of the operating system is suspended, and then resuming execution of the operating system. In suspending execution of the operating system, state information defining a current state of the computer system is saved. In resuming execution of the operating system, the saved state information is used to restore the computer system to the current state. No state information or data should be lost as a result of suspending and resuming execution of the operating system. From the viewpoint of the operating system and the applications (if any) executing within the environment provided by the operating system, execution of the auxiliary program is transparent. | 06-03-2010 |
20100138642 | INFORMATION HANDLING SYSTEMS INCLUDING NETWORK ADAPTERS AND METHODS OF BOOTING THE INFORMATION HANDLING SYSTEMS USING BOOT CONFIGURATION INFORMATION FROM REMOTE SOURCES - A system can be operable to receive boot configuration information from a remote source independent of the type of initiator (e.g., software or hardware) used by an information handling system. The information handling system having the initiator can be coupled to the remote source, which includes the boot configuration information, and a storage array that includes a boot image. While operating within a pre-operating system (pre-OS) environment, the information handling system can create a boot configuration table and populate the boot configuration table with the boot configuration information. The boot configuration information can include an address for the boot image and information for configuring an OS initiator to be used when loading the OS. | 06-03-2010 |
20100138643 | Media controller - A media controller is disclosed, which is a memory storing device, made up of an operating system and a piece of multimedia software, where the operating system is made merely for the multimedia software and available for the booting. And the multimedia software is an application program running on the operating system and is able to fetch the songs stored in the computer for overdubbing and sound effects processing. The selection of the memory storing device is the first priority to read during the booting. Once the new setting is saved, the computer is then ready to reboot. The memory storing device then takes charge of the execution of the operating system in the memory storing device. A user is then ready to run the multimedia software on the operating system, and further to operate the input device to fetch the songs stored in the computer for overdubbing and sound effects processing, to greatly achieve the stable playing of sound effects by making use of the existing computer equipment. | 06-03-2010 |
20100146255 | MOTHERBOARD, STORAGE DEVICE AND CONTROLLER THEREOF, AND BOOTING METHOD - A motherboard, a storage device and a controller thereof and a booting method are provided. In the present invention, when powered on, an unfetch signal is transmitted to a central processor unit (CPU) by a controller such that an operation of the CPU is suspended. Next, a system firmware in the storage device is loaded by the controller. After the system firmware is loaded, a fetch-done signal is transmitted to the CPU by the controller such that the CPU starts executing a booting procedure. | 06-10-2010 |
20100146256 | Mixed-Mode ROM/RAM Booting Using an Integrated Flash Controller with NAND-Flash, RAM, and SD Interfaces - A Secure Digital (SD) flash microcontroller includes a memory interface to SRAM or DRAM, a flash-memory interface, and a SD interface to an SD bus. The flash memory can be on a flash bus or on the SD bus. The microcontroller is booted from boot code stored in the flash memory. An initial boot loader is read from the first page of flash by a state machine and written to a small RAM. A central processing unit (CPU) in the microcontroller reads instructions from the small RAM, executing the initial boot loader, which reads more pages from flash. These pages are buffered by the small RAM and written to a larger DRAM. Once an extended boot sequence is written to DRAM, the CPU toggles a RAM_BASE bit to cause instruction fetching from DRAM. Then the extended boot sequence is executed from DRAM, copying an OS image from flash to DRAM. | 06-10-2010 |
20100153696 | Pre-boot securing of operating system (OS) for endpoint evaluation - Methods and apparatus involve evaluating endpoint computing assets. The endpoint has both a traditional operating system for applications, and the like, and another operating system during a pre-boot phase of operation. During use, the traditional operating system identifies a last evaluation status of the computing device at a time just prior to shutting down. Upon a next booting, the pre-boot operating system loads and examines [reads] the last evaluation status. If the last evaluation status requires any completion action in order to comply with a predetermined computing policy, either or both the operating systems attend to its effectuation, including communication/handoff by way of one or more security agents. In a variety of ways, effectuation occurs by: determining a present location of the computing device, quarantining the computing device from certain network traffic; VPN enforcement; patching applications; firewall involvement; etc. Computer program products are also disclosed. | 06-17-2010 |
20100153697 | Methods and systems for embedded user authentication and/or providing computing services using an information handling system configured as a flexible computing node - Methods and systems for providing embedded user authentication and/or providing computing services using an information handling system configured as flexible computing node, and which may be implemented to perform preboot authentication of users. The flexible computing node may also be configured to provision the appropriate work environment for a given user based on one or more user parameters (e.g. entitlements, location, network connection, and/or other parameters). | 06-17-2010 |
20100153698 | HARD DISK TEMPERATURE MONITORING DEVICE AND HARD DISK TEMPERATURE MONITORING METHOD - A hard disk temperature monitoring device for monitoring a temperature of a hard disk in a computer system is provided. A hard disk stores an operating system. A basic input/output system (BIOS) has a setting configuration. When the setting configuration is a first setting value, operation of the hard disk is restored. When the setting configuration is a second setting value, the operation of the hard disk is stopped. A thermal sensor detects a temperature of the hard disk. A keyboard controller (KBC) is electrically connected to the thermal sensor via a data transmission channel for detecting the temperature of the hard disk in real time. If the KBC detects that the temperature of the hard disk rises to a first predetermined temperature, the setting configuration is set to the second setting value, and the BIOS stops the operation of the hard disk according to the second setting value. | 06-17-2010 |
20100153699 | SUPPRESSING POWER SUPPLY NOISE USING DATA SCRAMBLING IN DOUBLE DATA RATE MEMORY SYSTEMS - Embodiments are generally directed to systems, methods, and apparatuses for suppressing power supply noise using data scrambling in double data rate memory systems. In some embodiments, an integrated circuit includes a transmit data path to transmit data to one or more memory devices. The transmit data path may include scrambling logic to generate, in parallel, N pseudo random outputs that are uncorrelated with each other. The output data and the pseudo random outputs are input to XOR logic. The transmit data path transmits the output the of XOR logic which has a substantially white frequency spectrum. Other embodiments are described and claimed. | 06-17-2010 |
20100161952 | PERFORMANCE OPTIMIZATIONS BY DYNAMIC REDUCTION OF FILE ALLOCATION TABLES - Performance optimizations by dynamic reduction of file allocation tables (FAT). A method of a file system includes reading a boot sector to determine a count of FAT instances. The method may set a count of FAT instances referred to in a boot sector to one if the count is greater than one. The method may modify the boot sector to refer to a data sector including a FAT instance as a reserved data sector. In addition, the method may include setting the count of FAT instances to one during at least one of a periodic operation of a dedicated application program interface and a file system mounting. | 06-24-2010 |
20100161953 | HANDLING SENSORS IN A CONTEXT AWARE PLATFORM - The context engine of a context aware platform may comprise a provider manager coupled to context providers and the provider manager may communicate with the context providers using application programming interfaces (API). To optimize the use of system resources, the provider manager may load/unload the context providers based on value of a load field of a hint signal or on prediction values. The context providers is to activate a first set of sensors of the plurality of sensors if the preferred activity level for the first set of sensors is set to activate state in the hint signal. The context providers is to deactivate a second set of sensors of the plurality of sensors if the preferred activity level for the first set of sensors is set to deactivate state in the hint signal. | 06-24-2010 |
20100161954 | COMPUTER START-UP SYSTEM, COMPUTER START-UP METHOD, AND COMPUTER START-UP PROGRAM - To start-up a computer system promptly at the time of power-on. The system includes an expansion card having an initialization command set in advance and a main body unit on which the expansion card is mounted. The main body unit includes a central processing section for executing initialization of the expansion card at the time of power-on based on the initialization command, a history holding section for storing the initialized expansion card, and a dictionary section for storing a common command which is the initialization command common to different expansion cards. The central processing section executes the common command, and also executes the initialization command set in the expansion card other than the expansion card stored in the history holding section and not included in the common command. | 06-24-2010 |
20100169630 | Pre-boot Recovery of a Locked Computer System - Embodiments of the present disclosure provide methods, apparatuses, articles, and removable storage devices for pre-boot recovery of a locked computer system. Other embodiments may also be described and claimed. | 07-01-2010 |
20100169631 | AUTHENTICATION FOR RESUME BOOT PATH - Methods and systems to perform an authentication operation after resuming from a sleep state are presented. In one embodiment, a method includes starting a boot process from a sleep state. The method further includes providing platform services to support an authentication operation as part of the boot process and determining whether to complete the boot process based at least on results of the authentication operation. | 07-01-2010 |
20100169632 | Component Configuration Mechanism for Rebooting - Aspects of the invention support a component configuration mechanism when rebooting a circuit module ( | 07-01-2010 |
20100169633 | SYSTEM AND METHOD TO SECURE BOOT BOTH UEFI AND LEGACY OPTION ROM'S WITH COMMON POLICY ENGINE - In some embodiments, the invention involves using a policy engine during boot, in the driver execution environment (DXE) phases to authenticate that drivers and executable images to be loaded are authenticated. Images to be authenticated include the operating system (OS) loader. The policy engine utilizes a certificate database to hold valid certificates for third party images, according to platform policy. Images that are not authenticated are not loaded at boot time. Other embodiments are described and claimed. | 07-01-2010 |
20100169634 | SYSTEM AND METHOD FOR SELF-CLOCKING OS KERNEL BOOT - In some embodiments, the invention involves a system and method to enable a mobile device to utilize self-clocking during boot. In at least one embodiment, a platform has at least one processor core coupled to an internal timer. For an X86 processor, the internal timer may reside in an advanced programmable interrupt controller. A boot kernel executing on the platform is configured to use the internal timer early in the boot phase, when the platform is not compliant with legacy PC/AT architecture. If the platform does conform to the legacy architecture, then the boot may use an external clock for timing and clocking early in boot. In both cases, the internal timer is calibrated to the external clock before completing the boot phase. Other embodiments are described and claimed. | 07-01-2010 |
20100169635 | METHOD AND SYSTEM TO FACILITATE CONFIGURATION OF A HARDWARE DEVICE IN A PLATFORM - A method and system to allow the secure configuration of the configurable feature(s) of a hardware device in a platform. The configuration of the configurable feature(s) of the hardware device is performed with protection against software attacks. A management module determines that the platform is authorized to configure at least one configurable feature of the hardware device and configures each of the configurable feature(s) based on a received configuration message. | 07-01-2010 |
20100169636 | System and Method For a Secure I/O Interface - A security processor performs all or substantially all security and network processing to provide a secure I/O interface system to protect computing hardware from unauthorized access or attack. The security processor sends and receives all incoming and outgoing data packets for a host device and includes a packet engine, coupled to a local data bus, to process the incoming and outgoing packets. The processor further comprises a cryptographic core coupled to the packet engine to provide encryption and decryption processing for packets processed by the packet engine. The packet engine also handles classification processing for the incoming and outgoing packets. A modulo engine may be coupled to the local data bus. | 07-01-2010 |
20100174894 | Method, Apparatus, and System for Configuring an Operating System on a Target Computer - A method, apparatus, and system are disclosed for configuring an operating system on a target computer. A configuration module configures a target computer as a diskless client. A boot module boots the target computer to a setup state. A communication module establishes communications between the target computer, a donor storage device of a donor computer, and a virtual disk. A copy module copies a configuration image from the donor storage device to the virtual disk. The configuration image comprises an operating system and a software configuration installed on the donor computer. A modification module modifies the configuration image on the virtual disk to conform to a hardware configuration of the target computer. | 07-08-2010 |
20100174895 | RAPID-BOOT COMPUTING DEVICE WITH DUAL OPERATING SYSTEMS - A computing device is booted in a manner that enables a software application to begin execution with minimal delay. When the device is powered up, a first processor begins booting under control of a first operating system, and a second processor begins booting under control of a second operating system. The first operating system is of a type that generally takes longer to complete booting than the second operating system. As soon as the second processor has booted up, it begins controlling execution of a software application. Then, when the first processor has booted up, control over the software application is transferred from the second processor to the first processor. | 07-08-2010 |
20100180108 | Electronic device and method for secure operating system update in embedded system - An electronic device and method for secure embedded operating system update within embedded system. The embedded system includes a random-access memory, a non-volatile storage unit and a processing unit. The non-volatile storage unit defines a boot sector, a first sector and a second sector and contains a boot loader in the boot sector, an initialization variable in the boot sector and an embedded operating system in the first sector. The second sector is provided for storing another embedded operating system. The processing unit is coupled to the random-access memory and the non-volatile storage unit and is capable of executing the boot loader in order to copy one of the embedded operating systems from either the first sector or the second sector of the non-volatile storage unit into the random-access memory according to the current value of the initialization variable and then executing the loaded embedded operating system. | 07-15-2010 |
20100180109 | System for Registering and Initiating Pre-Boot Environment for Enabling Partitions - A method for registering and initiating a pre-boot environment for enabling partitions. The method provides a basic input output system (CIOS) with an application program interface (API) that accesses a Logical Clock Address (LCA) sector number when a boot configuration flag is set, the LCA sector number stores an operating environment manager which then boots the information handling system to an appropriate partition. | 07-15-2010 |
20100185841 | DETERMINING ADDRESSES OF ELECTRICAL COMPONENTS ARRANGED IN A DAISY CHAIN - In one aspect, a system includes electrical components arranged in a daisy chain that include a first electrical component disposed at a first end of the daisy chain and a second electrical component disposed at an opposite end of the daisy chain than the first end. Each of the first and second electrical components includes an input port, an output port and a common port. The input port of the first electrical component is coupled to one of a supply voltage port or ground and the common ports of the first and second electrical components are coupled to the other one of the supply voltage or the ground. An address of the second electrical component is determined before addresses of the other of the electrical components are determined, and the addresses of the electrical components determine a position of an electrical component with respect to the other of the electrical components in the daisy chain. | 07-22-2010 |
20100185842 | COMPUTER SYSTEM WITH TWO OPERATING DEVICES AND CONTROL METHOD THEREOF - A computer system includes at least a first and a second operating device and a control module. The control module sends at least one signal to a central processing unit for managing and controlling the first and the second operating device, and copying the contents of any one of the two operating devices to the other operating device, so that both of the first and second operating devices include an operating system, and the computer system can select any one of the first and second operating devices for booting the operating system and power off or power on the other non-selected operating device. | 07-22-2010 |
20100185843 | HARDWARE ENCRYPTING STORAGE DEVICE WITH PHYSICALLY SEPARABLE KEY STORAGE DEVICE - Storage devices can provide for hardware encryption and decryption of data stored by them. The hardware cryptographic functions can be applied with reference to cryptographic information of a communicationally, and physically, separable key device. Disconnection of the separable key device can render encrypted data inaccessible. Destruction of the separable key device can result in virtual destruction of the encrypted data. The cryptographic information on the separable key device can be provided by a storage device manufacturer, or by a provisioning computing device. The separable key device can be directly communicationally coupled to a provisioning computing device or it can establish a secure communication tunnel with the provisioning device through a computing device to which the separable key device is communicationally coupled. Cryptographic information can be provided by, and deleted from, the provisioning computing device prior to completion of the booting of that device. | 07-22-2010 |
20100185844 | EVASION OF POWER ON SELF TEST DURING AN OPERATING SYSTEM INITIATED REBOOT - A system and method to evade the power on self test during an operating system initiated reboot is disclosed. In one embodiment, a method for optimizing reboot process of a computer includes determining a status of a power on self test (POST) performed during a prior booting of the computer when an operating system (OS) initiated rebooting of the computer is triggered, loading information obtained during the POST of the prior booting of the computer into a basic input output system (BIOS) of the computer if the status of the POST performed during the prior booting of the computer indicates a success of the POST, and performing the rebooting of the computer using the information, wherein a subsequent POST associated with the rebooting of the computer is skipped during the rebooting of the computer. | 07-22-2010 |
20100185845 | SECURE BOOT TERMINAL, SECURE BOOT METHOD, SECURE BOOT PROGRAM, RECORDING MEDIUM, AND INTEGRATED CIRCUIT - A terminal that performs secure boot processing when booting, thereby booting reliably even if, during updating of a software module, the power is cut off or the update is otherwise interrupted. The terminal comprises a CPU, a software module storage unit, a certificate storage unit, an updating unit for updating the software module and certificate, a security device provided with a configuration information storage unit for storing the configuration information of the software module, an alternate configuration information storage unit for storing the configuration information of a software module in the configuration before the update, and a boot control unit for verifying and executing the software module by using the certificate. The terminal verifies the certificate of the software module by comparing the configuration information stored by the configuration information storage unit with the configuration information stored by the alternate configuration information storage unit. | 07-22-2010 |
20100185846 | COMPUTER PRODUCT, STORAGE DEVICE, AND FIRMWARE MANAGEMENT METHOD - According to one embodiment, an electronic apparatus includes a plurality of storage modules, a rewrite module, a start module, and a switch module. The storage modules store a plurality of firmware items, respectively. The rewrite module rewrites at least one of the firmware items other than a firmware item being executed with a new firmware item. The start module starts the electronic apparatus with one of the firmware items. The switch module switches, when abnormality is detected in the firmware item for starting the electronic apparatus, the firmware item to another firmware item to start the electronic apparatus. | 07-22-2010 |
20100191945 | PORTABLE DEVICE WITH USER INTERFACE - A portable device ( | 07-29-2010 |
20100191946 | APPARATUS, SYSTEM, AND METHOD FOR IMPROVING USER BOOT VIA A STORAGE AREA NETWORK - An apparatus, system, and method are disclosed for remotely booting a client from a storage area network (“SAN”). A connection module enables a client, such as a diskless client, to connect to two or more storage area networks (“SANs”), the SANs belonging to a group of redundant SANs, each SAN in the group redundantly storing at least a portion of substantially identical operating system data for the client. The boot module enables the client to remotely boot an operating system from the two or more redundant SANs. The boot module makes at least one read request to each of the two or more connected SANs, each read request configured to retrieve a disparate portion of the operating system data for loading the operating system onto the client. The boot module loads the operating system onto the client using a combination of data retrieved from the two or more connected SANs. | 07-29-2010 |
20100191947 | MOBILE TERMINAL AND METHOD FOR CONTROLLING ACCESSING OF DEVICE THEREOF - A mobile terminal and its device accessing control method are disclosed. When power is applied to the terminal, the terminal executes BIOS information. When certain identification information (ID) is received, whether or not the received identification information is registered one. If the inputted identification information is a registered one, a device and/or application is initialized or the use of the device and/or application is prevented and an operating system is booted according to corresponding device setting information. | 07-29-2010 |
20100191948 | BOOT CONTROL METHOD OF COMPUTER SYSTEM - A computer system comprises two or more computers including at least one standby computer and a management computer which controls the computers. The management computer manages unique identification information which is assigned to an Ethernet controller of each computer. When a failure has occurred to an active computer, the management computer sets the unique identification information which has been assigned to the Ethernet controller of the failed computer to the Ethernet controller of the standby computer and the standby computer boots up a software image for the failed computer by use of the unique identification information which has been set to its Ethernet controller by the management computer. | 07-29-2010 |
20100191949 | INFORMATION PROCESSING TERMINAL AND FALSIFICATION VERIFICATION METHOD - An information processing terminal that performs falsification verification at the time of bootstrapping thereof includes: a state sensor that senses a connection of an external connector or a data reception via the external connector, to judge whether or not a program stored in the information processing terminal is in a rewritable state; a flag storage that stores a flag referred to at the time of bootstrapping of the information processing terminal therein; a flag controller that turns on the flag according to a judged result that the program is in the rewritable state by the state sensor to record the turn-on flag in the flag storage; and a falsification verifier that judges whether or not it is necessary to carry out falsification verification according to a status of the flag, and performs falsification verification of the program only in the case in which the flag in the flag storage is turned on, at the time of bootstrapping of the information processing terminal. | 07-29-2010 |
20100191950 | System and Method for Processing Booting Failure of System - A method for processing booting failure of a computer system is adapted for being performed at a computer. The method includes the following steps. First, a parameter selecting signal is generated according to a triggering signal by a control module. Second, a driving parameter is chosen from a look-up table according to the parameter selecting signal by a basic input output system (BIOS), and the driving parameter is loaded into the BIOS and provided to a driving module. Third, a memory is driven according to the driving parameter by the driving module. Fourth, the driving parameter is stored by BIOS. | 07-29-2010 |
20100191951 | PROVISIONED FIRMWARE UPDATES USING OBJECT IDENTIFIERS - Methods, devices, and systems are provided for remotely updating provisioning data in devices or a population of devices. An update message is generated that includes an Object Identifier (OID) that uniquely identifies eligible devices or components for the provisioning data update. If an eligible device receives the update message, then the new provisioning data is loaded on the device, thereby replacing the old provisioning data on the device. | 07-29-2010 |
20100199078 | METHOD OF SAFE AND RECOVERABLE FIRMWARE UPDATE AND DEVICE USING THE SAME - A safe and recoverable firmware update method which for a remote embedded electronic device and the device thereof. The method includes reading an update status in a flash memory, and determining the update status. If the update status is “DEFAULT”, a default firmware is executed. If the update status is not “DEFAULT”, the update status is further determined if it is “UPDATED”. If the update status is “UPDATED”, a configuration area is set as “BOOTING” and a new firmware is executed. If the update status is not “UPDATED”, the update status is determined if it is “RUNNEW”. If the update status is “RUNNEW”, a new firmware and an update validation method are executed. If the update validation method gets an update completion validation message, the update status is set as “RUNNEW”. If the update status is not “RUNNEW”, a default firmware is executed. | 08-05-2010 |
20100199079 | ROUTER DEVICE - The router device is able to use either battery power or a commercial power supply, and when using battery power detects battery voltage and indicates the level of battery voltage with an LED. When the router device is using battery power, writing of the firmware is disabled. Further, writing of settings information write is disabled when battery voltage goes below a second threshold value; and supply of power to the CPU is subsequently interrupted when battery voltage goes below a first threshold value. In this way the router device of the invention avoids problems occurring due to a drop in battery voltage when using battery power. | 08-05-2010 |
20100199080 | Method and System for Diagnosing and Programming Industrial Vehicles - A method and system for diagnosing and programming industrial vehicles, especially lift trucks, is provided. The method and system utilizes a computer that is connected to an area network having at least one server, e.g. the internet. The computer is also connected through an electronic interface to a lift truck's data bus. | 08-05-2010 |
20100199081 | APPARATUS AND METHOD FOR DOWNLOADING CONTENTS USING AN INTERIOR MASS STORAGE IN A PORTABLE TERMINAL - A method and apparatus for downloading content to a large-capacity internal memory in a portable terminal are provided. The method includes performing a booting process of the portable terminal at the occurrence of a booting event, examining whether a Universal Serial Bus (USB) port is enabled during the booting process, if the USB port is enabled, receiving data through the USB port before driver loading, and storing the received data into the large-capacity internal memory and performing the booting process. | 08-05-2010 |
20100199082 | MICROPROCESSOR BOOT-UP CONTROLLER, NONVOLATILE MEMORY CONTROLLER, AND INFORMATION PROCESSING SYSTEM - An information processing apparatus has a multi-valued NAND nonvolatile memory including a plurality of word lines and a plurality of memory cells connected to the respective word lines. Each memory cell has a plurality of threshold voltages, and is divided into a first and a second storage area. A program code is stored in the first storage area, and user data is stored in the second storage area. The apparatus also includes a volatile memory to which the program code is transferred from the multi-valued NAND nonvolatile memory. The apparatus further includes a CPU connected to the volatile memory and configured to operate based on the program code transferred to the volatile memory. | 08-05-2010 |
20100205420 | SYSTEM AND METHOD FOR REALIZING REMOTE TEST ON COMPUTER APPARATUS WITHOUT STORAGE DEVICE - A system and a method for realizing a remote test on a computer apparatus without a storage device are described, in which a client is enabled to select a desired operating system image file from a server and use the operating system image file to provide an initial processing on an operating system of the client. The testing method includes initializing a virtual disk in the client, registering the virtual disk to a basic input and output system (BIOS) of the client, connecting to a server over network according to connection information in the virtual disk, loading boot information into the client from the server, and performing a boot procedure on the client according to the boot information. Therefore, during a booting process of the client, a virtual disk is initialized in the server, so as to be used for booting the client. | 08-12-2010 |
20100205421 | Recovery System Using Selectable and Configurable Snapshots - A recovery system for a computer operating system and applications is described which uses selectable and configurable snapshots. In one example, a start-up sequence of the computer system is initiated, a plurality of snapshots in a hidden section of a mass storage device are identified before loading an operating system for the computer system, each snapshot containing an operating system, applications, and computer system configuration settings. One of the plurality of snapshots is booted including loading the operating system and applications of the one snapshot, and the start-up sequence is completed. | 08-12-2010 |
20100205422 | METHOD FOR SETTING BASIC INPUT/OUTPUT SYSTEM - A BIOS (Basic Input/Output System) setting method is disclosed, which is applicable to a computer equipped with a MEMORY a CMOS RAM (Complementary Metal Oxide Semiconductor Random Access Memory), and a BIOS-ROM (Basic Input/Output System Read-Only Memory) storing a first setting document. The BIOS setting method includes: providing a setting interface to allow a user to perform settings so as to form a second setting document; storing the second setting document in the BIOS-ROM; and loading the first and second setting documents to the MEMORY during a POST (Power On Self Test) process of the computer; saving the first setting document, or alternatively revising the first setting document and/or combining the first setting document with the second setting document according to the second setting document if loaded, so as to form a third setting document; and loading the third setting document to the CMOS RAM to perform a system initialization according to the third setting document. | 08-12-2010 |
20100205423 | BIOS, COMPUTER DEVICE AND METHOD FOR RECOVERING BIOS - The invention provides a Basic Input/Output System (BIOS), a computer device and a method for recovering the BIOS. The BIOS includes a first boot block, a second boot block and a main BIOS block. The computer device includes a control chip disposed therein and said BIOS. When the programs in the first boot block and the main BIOS block are damaged, the second boot block can be selected so as for the BIOS to boot from the second boot block. Meanwhile, a recovery module of the second boot block can be utilized to recover the first boot block and/or the main BIOS block. | 08-12-2010 |
20100205424 | METHOD FOR BOOTING COMPUTER SYSTEM AUTOMATICALLY - A method for booting a computer system automatically includes steps as follows. A booting time point is set. The computer system is booted at the booting time point. A standby mode is entered immediately after the computer system is booted. | 08-12-2010 |
20100211766 | Nonvolatile memory device including a buffer RAM and boot code management method thereof - A nonvolatile memory device may includes a cell array to store a boot code; a boot RAM to store the boot code; a data RAM to store user data being exchanged with the external device; and a controller to separately store a boot code provided from the cell array in the boot RAM and the data RAM when a booting operation is performed. | 08-19-2010 |
20100211767 | COMPUTER SYSTEM, MEMORY CIRCUIT ON MOTHERBOARD AND BOOTING METHOD THEREOF - A method for booting a computer system is disclosed. The computer system has a main memory. The method includes the steps of providing a backup memory, replacing the main memory by the backup memory when the computer system is booted and the main memory fails to operate normally, and decompressing the program codes of the BIOS to the backup memory to perform the backup booting procedure. | 08-19-2010 |
20100211768 | SYSTEM FOR PERFORMING HARDWARE CALIBRATION DURING STARTUP, AND METHOD OF CALIBRATION - Disclosed is a system including: a calibration executing unit that performs a calibration on hardware during the system startup so as to allow the system to properly operate; and a correction data retaining unit that retains a piece of correction information in association with an environmental condition during the calibration, the correction information indicating a setting for the hardware calibrated by the calibration executing unit. If the correction data retaining unit retains the correction information associated with an environmental condition equivalent to the environmental condition at a time when the system is started up, the calibration executing unit performs the hardware setting on the basis of the retained correction information instead of calibrating the hardware. | 08-19-2010 |
20100211769 | Concurrent Execution of a Smartphone Operating System and a Desktop Operating System - A non-smartphone computing system, such as a laptop or desktop personal computer, can be booted into either or both a smartphone operating system and a desktop operating system. The smartphone operating system may be booted first to allow use of the functionality provided by the smartphone operating system while the desktop operating system is booting. Through an appropriate user action, such as the selection of a pre-defined key, key sequence, or by use of a switch, the computing system can dynamically switch between the smartphone operating system and the desktop operating system. Files and folders can also be synchronized and/or shared between the smartphone operating system and the desktop operating system, thereby providing access to these files from each respective operating system even while the other operating system is not executing. | 08-19-2010 |
20100217963 | System, method and computer-readable medium for providing and executing a sequence of launch of applications at boot-up - Methods, systems and computer-readable medium for enabling a user to direct a computational device to store a desired sequence of launch of software applications stored within, or accessible to, the computational device are provided. The user may direct the computational device to initiate a boot-up of an operating system of the computational device while integrating a launch of software applications as instructed by the stored sequence of launch. The computational device may be enabled for communication with an electronic communications network, e.g., the Internet or a telephony system, and at least software application may be downloaded from the electronic communications network. The additional application may be downloaded from a server upon direction of an OEM, marketer or other member of the stream commerce from which the computer was acquired or provided. | 08-26-2010 |
20100217964 | METHOD AND APPARATUS FOR CONTROLLING ENABLEMENT OF JTAG INTERFACE - A method, device and system for controlling JTAG interface enablement within a communication device. The JTAG interface can be selectively enabled based on the receipt of an encrypted access token generated by an access token server. The access token server generates the access token in response to an end user providing appropriate device-specific information. The access token includes appropriate information that, upon appropriate authentication and decryption, can temporarily device bind the boot code image of the device in a manner that enables the JTAG interface. Alternatively, the access token includes appropriate information that instructs the general purpose processor to choose between JTAG interface enablement information and JTAG interface disablement information for use with the boot code image of the device. The access token can include expiration information that causes an enabled JTAG interface to revert back to its disabled status upon expiration of the access token. | 08-26-2010 |
20100217965 | Method of centralized ethernet network shutdown - A method is disclosed of centralized Power over Ethernet network shutdown, which comprises the steps of:
| 08-26-2010 |
20100217966 | Computing system, booting method and code/data pinning method thereof - The booting method of a computing system includes determining whether boot data of an operating system is pinned to a main memory, reading boot data from a storage device to pin the read boot data to the main memory when relocation of the pinned boot data is required, and performing a booting operation using the pinned boot data. | 08-26-2010 |
20100217967 | REAL-TIME COMMUNICATION SECURITY FOR AUTOMATION NETWORKS - A framework, device and method are disclosed for providing broadcast communication security over Ethernet within an automation system, wherein a security plug provides secure working of the automation system. The security plug can be implemented using ASIC/FPGA technology to provide compatibility with existing systems and an intuitive plug-and-play model. An exemplary system can address jitter-sensitivity by providing a real-time architecture, with minimal transmission latencies. The security plug can have separate security and communication modules that make provisions for protocol independent working of the security plug, within these networks. The method can include bootstrapping, secret key establishment and secure communication, for providing real-time guarantees. | 08-26-2010 |
20100223451 | BOOT CONTROL METHOD AND APPARATUS - A boot control method of a program in an information processing apparatus to which a device can be connected, the method including a search step of searching for a running program that is running on the information processing apparatus when the device is connected, a determination step of determining whether the running program found in the search step includes a program unfit for concurrent running that is unsuited for concurrent running with preset device-corresponding software that is booted in response to connection of the device, and a boot step of booting the device-corresponding software if the running program does not include the program unfit for concurrent running and performing control so as not to boot the device-corresponding software if the running program includes the software unfit for concurrent running. | 09-02-2010 |
20100223452 | CENTRAL PROCESSING UNIT CAPABLE OF MULTI-BOOT USING DESJOINT MEMORY SPACES - A central processing unit capable of multi-boot using disjoint memory spaces. The central processing unit comprises a plurality of internal registers communicably coupled to each of a plurality of disjoint memory spaces. The internal registers may be configured to designate one or more of the memory spaces as an active memory space or a standby memory space. | 09-02-2010 |
20100223453 | INTEGRATED CIRCUIT FOR VALIDATING AND DECRYPTING SOFTWARE DATA - An integrated circuit is provided. The IC runs a boot program that verifies programs before the programs can be loaded onto, or run by, the IC by verifying whether the programs are signed with a boot key, verifies, with the boot program, a developmental boot program signed with the boot key which verifies developmental programs before the developmental programs can be loaded onto, or run by, the IC by verifying whether the IC has a predetermined identifier, and loads the verified developmental boot program and run the loaded developmental booth program thereby enabling loading or running of the developmental programs on the IC if the IC has the predetermined identifier. The IC is programmed with program code configured to receive encrypted software data, decrypt the software data, and validate the software data. The decrypted software is executed only when the validation is successful. | 09-02-2010 |
20100228959 | COMMUNICATION DEVICE AND METHOD FOR STARTING UP THE COMMUNICATION DEVICE - A method for starting up the communication device includes searching a non-volatile storage unit of the communication device for start up data of the communication device according to a predetermined identifier of the start up data, loading the start up data into a volatile storage unit of the communication device, starting the communication device according to the start up data in the volatile storage unit. The method also includes searching the non-volatile storage unit for data except for the start up data, load the data except for the start up data into the volatile storage unit. | 09-09-2010 |
20100235615 | METHOD AND SYSTEM FOR DISCOVERY OF A ROOT FILE SYSTEM - A method for discovery of a root file system that includes obtaining a tag corresponding to a boot image for an operating system, identifying, by a boot loader, a location of the boot image having a predefined value matching the tag, loading a kernel of the operating system retrieved from the boot image, and transferring execution to the kernel, wherein the boot loader provides the tag for the location to the kernel. The method further includes identifying, by the kernel, the location of the root file system based on the tag provided by the boot loader, and executing the operating system on a processor using the root file system identified by the kernel. | 09-16-2010 |
20100235616 | METHOD AND SYSTEM FOR DISPLAYING INFORMATION ON INSTALLED UNITS - An exemplary embodiment of the present invention provides a method for providing information about units installed in a computing device. The method includes identifying an installed unit prior to an initialization of an operating system and obtaining information about the installed unit, wherein the information comprises a regulatory identification number, a manufacturer's logo, or a combination thereof. The method also includes receiving a request to provide information about the installed unit and providing the information about the installed unit. | 09-16-2010 |
20100235617 | SYSTEM RECOVERY METHOD AND EMBEDDED SYSTEM WITH AUTOMATIC RECOVERY FUNCTION - A system recovery method and an embedded system with an automatic recovery function used between a network and a server are introduced. The embedded system includes a nonvolatile memory storing a first part program code and a processor electrically connected to the nonvolatile memory and the network. The method includes the following steps, the embedded system enters a boot process; when the processor of the embedded system in the boot process determines that the first part program code in the nonvolatile memory does not satisfy a first specific condition, the processor transmits a signal through the network to establish a signal connection with the server; and the processor downloads a backup program code from the server through the network for execution to complete the boot process. | 09-16-2010 |
20100235618 | START-UP OF COMPUTING SYSTEMS - A computing device is provided that includes a computing unit, which has a working memory and a processing unit, and a boot memory having control instructions for operating the computing device. The control instructions are stored in boot memory and are to be transferred to the computing unit at start-up of the computing device. A boot control unit is connected to the computing unit by at least a first and a second interface and connected to the boot memory by a third interface. The boot control unit is configured to transfer a first part of the control instructions from the boot memory via the first interface to the computing unit and to transfer a second part of the control instructions from the boot memory via the second interface to the computing unit. | 09-16-2010 |
20100241837 | COMPUTER WITH BOOTABLE RESTORATION - A bootable restoration computer includes: at least one mass storage device; at least two mass storage device partitions in the at least one mass storage device, including first and second partitions; a partition image restoration program; at least one partition image; at least one human interface device; a primary operating system with graphical user interface; a secondary operating system; and, a boot loader responsive to the human interface device that provides for selecting between the primary secondary operating systems. The primary operating system resides on the first partition and is configured so that its standard locations for storing user-created files are folders rooted on at least one of any partition other than the first partition. The at least one partition image is an image of the first partition, and resides on at least one of any partition other than the first partition. If no opportunity is taken to select the secondary operating system in a predefined time, the computer loads the primary operating system. If the opportunity is taken, the partition image restoration program restores the partition image to the first partition. | 09-23-2010 |
20100241838 | METHOD AND SYSTEM FOR FIRMWARE UPDATES - A method for updating computing device firmware may comprise: (a) receiving a transmission of firmware update data; (b) writing the firmware update data to a firmware update data partition; and (c) writing the firmware update data to an active firmware partition. | 09-23-2010 |
20100241839 | Loading operating systems using memory segmentation and ACPI based context switch - Methods, systems, apparatuses and program products are disclosed for managing multiple OSes within a single computer and the like. | 09-23-2010 |
20100241840 | SYSTEM AND METHOD FOR RESOURCE ASSIGNMENT - A resource assignment system includes a driver on an option ROM mounted on a PCI (Peripheral Components Interconnect) device, arranged on a memory by a BIOS (Basic Input/Output System), and configured to perform hardware resources assignment under a Pre-Boot environment; and an OS driver arranged on the memory by the BIOS, and configured to perform the hardware resource assignment under an OS environment. The BIOS includes a resource management table which shows a range of an I/O space to be assigned to a bridge device in a layer higher than that of the PCI device which requests the I/O space; and an ACPI table which is used to notify a hardware configuration and data to use an extended I/O space to the OS. The resource management table includes a Pre-Boot table in which assignment of a first granularity to a Legacy-I/O space for a Pre-Boot environment is defined; and an OS table in which assignment of a second granularity to the extended I/O space for an OS environment is defined. | 09-23-2010 |
20100241841 | System and Method for Securing Executable Code - A system and method for the secure storage of executable code and the secure movement of such code from memory to a processor. The method includes the storage of an encrypted version of the code. The code is then decrypted and decompressed as necessary, before re-encryption in storage. The re-encrypted executable code is then written to external memory. As a cache line of executable code is required, a fetch is performed but intercepted. In the interception, the cache line is decrypted. The plain text cache line is then stored in an instruction cache associated with a processor. | 09-23-2010 |
20100250910 | COMPUTER SYSTEM AND SETTING MANAGEMENT METHOD - In a computer system including a server having a BIOS and a management module, the server includes therein a memory area and a server controller, and the management module includes therein a backup memory area and a management-module controller. When the BIOS changes the BIOS setting, the BIOS stores the BIOS setting into both of the memory area and the backup memory area by way of the server controller and the management-module controller. Here, the management module operates independently of the server. Accordingly, when a BIOS-setting read request is issued from the outside, the management-module controller makes the response to the request source by reading the data stored into the backup memory area. | 09-30-2010 |
20100250911 | SENSOR FOR USE IN AUTOMATION TECHNOLOGY AND METHOD FOR CONFIGURING A SENSOR - The present invention is directed to a sensor for use in automation technology for detecting a measurand, particularly for detecting objects or articles, and a method for configuring a sensor. The sensor includes: a sensor element for measuring a physical variable; a first connecting means for connecting the sensor to a peripheral unit in an operating mode; and a control/evaluation unit for controlling the sensor element, for processing a measured signal from the sensor element and for outputting an output signal to the first connecting means, which control/evaluation unit has a memory for the storage of at least configuration data and program data of the sensor; wherein a second connecting means connects the sensor to an external computer for a configuring mode; in the memory of the control/evaluation unit there is stored configuring software, which can be uploaded into a RAM of an external computer when the sensor is connected to the external computer; and the configuring software is adapted for automatic configuration of the sensor or interactive configuration thereof by a user. | 09-30-2010 |
20100250912 | COMPUTING DEVICE DEPLOYMENT USING MASS STORAGE DEVICE - Computing device deployment and configuration using a mass storage device is provided. A generic computing device is provided to a customer or end user. A mass storage device is used to distribute configuration information to the generic computing device. The configuration information includes customer-specified or ordered software applications or other features. The configuration information can also include updates to the computing device system software. The customer or end user couples the mass storage device to the generic computing device in order to load the configuration information into the computing device. After the configuration information is loaded, the computing device is configured for the customer's use. Further features, such as creating customized images, are also provided. | 09-30-2010 |
20100262817 | USER SELECTABLE DATA WIPE - A data storage device includes a computer-readable medium encoded with a computer program that, when executed communicates with a basic input/output system (BIOS), receives a user selection from the BIOS to wipe the data storage device and performs a wipe of the data storage device. In an embodiment, the wipe of the data storage device includes writing a series of | 10-14-2010 |
20100262818 | Computer system and method of booting the same - A computer system and a method of booting a computer system using a solid state drive (SSD) as a main storage device is provided. The method includes mapping an address of a memory included in the SSD to an address used by a central processing unit (CPU) to select a boot code, uploading the boot code of an operating system (OS) stored in a non-volatile memory block included in the SSD to the memory included in the SSD, generating an interrupt signal based on a progress rate of the boot code upload, and performing a boot operation based on the boot code uploaded to the memory included in the SSD in response to the interrupt signal. | 10-14-2010 |
20100262819 | METHOD AND APPARATUS FOR IMPLEMENTING MULTIPLE SERVICE PROCESSING FUNCTIONS - A multi-service processing method, including: configuring different cores of a multi-core processor to process different services; and sending received packets to the cores in the pre-defined service processing sequence. The multi-core processor apparatus, includes the configuration management unit, the packet distributing unit, and the multi-core processor. The method and apparatus can save investments in devices while implementing multiple service processing functions. | 10-14-2010 |
20100262820 | METHOD OF CONTROLLING A PDA PHONE AND PDA PHONE USING THE SAME - A method for controlling a PDA (personal digital assistant) phone is provided. A first interface configuration file and a second interface configuration file are provided. An interface selection command is received, designating the first or second interface configuration file. A first boot procedure is performed. The first or second interface configuration file is loaded and displayed as an operation interface of the PDA phone. | 10-14-2010 |
20100268925 | SYSTEM AND METHOD FOR POPULATING A DEDICATED SYSTEM SERVICE REPOSITORY FOR AN INFORMATION HANDLING SYSTEM - An information handling system includes a processor, a memory device coupled to the processor, and a dedicated system service repository (DSSR) coupled to the processor. The DSSR is configured to store a base image that includes a plurality of partitions and a first system configuration image, wherein the first system configuration image is stored in a first partition of the plurality of partitions, wherein the first system configuration image is configured to provide in-band and/or out-of-band managed access to the DSSR when executed; and by accessing the first system configuration image, the DSSR is populated with a second system configuration image, wherein the second system configuration image is stored in a second partition of the plurality of partitions. | 10-21-2010 |
20100268926 | Method and Apparatus for Preventing BIOS from Failing to Enter Boot Program - A method and an apparatus for preventing a basic input/output system (BIOS) from failing to enter a boot program are adapted to solve the problem that when a central processing unit (CPU) executes a first instruction after a computer is powered on, a start address to be executed is erroneously set as another corresponding start address, resulting in that a BIOS cannot enter a boot program. In the method of the present invention, a jump instruction is written to the corresponding start address, so as to enable an execution instruction to jump to a boot block of the BIOS when the start address is erroneously set in the computer, thus performing a normal boot operation. Moreover, in the present invention, a step for checking a register that may cause the start address to be inverted to the corresponding start address is further added to the BIOS program, such that in each boot process, the value of the register can be pre-checked and overwritten when an error occurs, so as to avoid the problem of false pointing next time the computer is booted. | 10-21-2010 |
20100268927 | Booting An Operating System Of A System Using A Read Ahead Technique - In one embodiment, the present invention includes a method for generating a list of files accessed during an operating system (OS) boot process to profile the OS boot process, and optimizing the list of files to generate an optimized file list for use in future OS boot processes, where the optimizing is according to a first optimization technique if the files were accessed from a solid state medium and according to a second optimization technique if the files were accessed from a rotating medium. Other embodiments are described and claimed. | 10-21-2010 |
20100268928 | DISABLING A FEATURE THAT PREVENTS ACCESS TO PERSISTENT SECONDARY STORAGE - During a boot block part of a boot procedure in an electronic device having a persistent secondary storage, a feature that prevents access to the persistent secondary storage is disabled. The persistent secondary storage is accessed during the boot block part of the boot procedure to retrieve information to perform a predetermined task. | 10-21-2010 |
20100274998 | METHOD AND SYSTEM FOR PROVIDING A DATA MODULE LOCK TO DEVICE HARDWARE - Systems and methods for confirming that a circuit card is compatible with a computer in which it is installed includes accessing a list of compatible circuit cards stored in the computer's nonvolatile memory, determining if the circuit card is included in the list of compatible circuit cards; and storing operating software on the circuit card only if the circuit card is included in the list of compatible circuit cards. The list of compatible circuit cards can be the Plug-and-Play Identification (PnP ID) list stored in the computer's BIOS data. Power may be removed from the circuit card if the circuit card is not include in the list of compatible circuit cards. | 10-28-2010 |
20100274999 | CONTROL SYSTEM AND METHOD FOR MEMORY - A control system for a number of memories includes a processor, a control chip, and an expansion chip. The processor is connected to a basic input and output system and the control chip. The control chip is also connected to a number of first memory cards and the expansion chip. The expansion chip is also connected to a number of second memory cards. | 10-28-2010 |
20100275000 | COMPUTER MOTHERBOARD WITH BASIC INPUT OUTPUT SYSTEM CAPABLE OF BUILT-IN CONFIGURATION DISPLAY - The present invention is a computer motherboard with a Basic Input Output System (BIOS) capable of built-in configuration display, characterized in that the BIOS includes a first means and a second means. The first and second means are code internally provided in the BIOS and executable by a CPU of the computer motherboard in an execution environment preset by the BIOS. The first means enables acquisition of CPU configuration data stored on the CPU and configuration data for displaying the CPU. The second means enables acquisition of memory module configuration data stored on at least a memory module and configuration data for displaying the memory module. After the computer motherboard enters a BIOS setup utility, a user selects an option of execution of the first or second means to execute CPU and memory configuration display without using an operating system. | 10-28-2010 |
20100275001 | INFORMATION PROCESSOR - According to one embodiment, an information processor, includes: a storage module which stores a plurality of charging modes associated with a plurality of external devices to be charged when an operating system is not in operation; an input module which receives a charging mode selection request; and a test module which receives the charging mode in the received selection request from the storage module, and tests the charging mode on at least one of the external devices connected to the information processor. | 10-28-2010 |
20100275002 | IMAGING APPARATUS AND START-UP METHOD OF IMAGING APPARATUS - An imaging apparatus includes: an imaging processing unit configured to image a subject and output imaging data; a temporary storage medium configured to temporarily store the imaging data output from the imaging processing unit; an imaging control unit configured to control the imaging processing unit; a storage control unit configured to store, in a storage medium detachably mounted to a device main unit, the imaging data temporarily stored in the temporary storage medium; and a request unit configured to request the device main unit for execution of start-up processing; wherein, upon the start-up processing being requested from the request unit, start-up processing of the imaging control unit and the storage control unit are executed in parallel. | 10-28-2010 |
20100275003 | SYSTEM AND METHOD FOR EXPRESS EXECUTION OF INTERNET SERVICE ACCESSING - A method for express execution of internet service accessing with a touch-control interface for a computer system is provided. A computer system is installed with a first operating system in a data storage therein. The method includes the following steps: the computer system executing the BIOS of the computer system; before loading and executing the first operating system, the computer system detecting and activating a touch-control display device; the touch-control display device displaying executive item icons representing internet service accessing programs; detecting the executive item icon selection by the user; based on the selection, loading and executing the first operating system; and executing the internet service accessing program corresponding to the selected executive item icon. | 10-28-2010 |
20100275004 | SYSTEM AND METHOD FOR EXPRESS EXECUTION OF NAVIGATION FUNCTION - A method for express execution of navigation function is provided. A computer system is installed with a first operating system in a data storage device therein. The method includes the following steps: the computer system executing the BIOS of the computer system; before loading and executing the first operating system, the computer system detecting and activating a touch-control display device; the touch-control display device displaying an executive item icon representing the navigation function; detecting the executive item icon selection by the user; based on the selection, loading and executing the first operating system; and executing the navigation function corresponding to the selected executive item icon. | 10-28-2010 |
20100287363 | METHOD AND SYSTEM FOR SECURE SOFTWARE PROVISIONING - A method and system for the provisioning of software that enable large scale installation and management of software in computer units in a highly secure manner. The BIOS of the target computer unit is adapted such that upon power up the system attempts to boot from an external media. The BIOS features functions within the code for the implementing a system watchdog for assuring the system remains in a known state, a function for digital signature verification, and loads drivers for a file system. The external media includes the operating system (OS) image and other bootstrap files, each having been digitally signed with an asymmetric private key that corresponds to the public key. A programmable read-only parameter memory on the motherboard is configured to store the public keys and the (failure) state of the system independently of the primary and secondary media enabling reboot from an alternative boot path. | 11-11-2010 |
20100287364 | BOOT SYSTEMS AND METHODS, AND RELATED DEVICES - Boot systems and methods are provided. The boot system includes an IO (Input/Output) chip, a memory device, and a BIOS (Basic Input/Output System). The memory device is coupled to the IO chip, and includes at least a rescue OS (Operating System). The BIOS reads the rescue OS from the memory device via the IO chip, and boots an electronic device based on the rescue OS. | 11-11-2010 |
20100287365 | DEPLOYMENT OF BOOT IMAGES IN DISKLESS SERVERS - In one embodiment, a system, comprises a first computer system comprising at least a first diskless server, at least a first RAID controller coupled to the first diskless server, at least a first storage pool coupled to the RAID controller, and a remote management server coupled to the RAID controller via a an out-of-band communication link. The remote management server comprises a boot management module which, when executed, initiates a command to instruct the RAID controller to create at least a first logical volume in a memory module coupled to the RAID controller, transmits the command to the RAID controller via the out-of-band communication link, and transmits a boot image from the remote management server to the RAID controller via the out-of-band communication link. The RAID controller creates the first logical volume for the boot image in response to the command, and stores the boot image in the first logical volume. | 11-11-2010 |
20100293365 | METHOD AND APPARATUS FOR SYSTEM AND SOFTWARE QUICK LAUNCH - A method includes launching a software application having a standard start-up mode, determining whether or not a set of application launch settings have been saved for the software application, running the software application in an alternative start-up mode if the set of application launch settings have been saved, and displaying images that are generated by a main portion of the software application. Another method includes begin performing a booting-up of a processor based system, determining whether or not a set of system launch settings have been saved, reading the set of system launch settings to determine an identity of a software application that should be automatically launched if the set of system launch settings have been saved, and automatically initiating a launching of the software application. A system and one or more computer programs are adapted to cause a processor based system to execute the above steps. | 11-18-2010 |
20100293366 | FREQUENCY AND SYMBOL LOCKING USING SIGNAL GENERATED CLOCK FREQUENCY AND SYMBOL IDENTIFICATION - Methods and systems are described for displaying video data after a hot plug event during a start-up dead period. In particular, approaches for receiving data, determining whether link training can be performed and, if not, self-configuring a receiver to display the information in a proper format even during the dead period. | 11-18-2010 |
20100299510 | BLUETOOTH PRE-BOOT AUTHENTICATION IN BIOS - The disclosed invention includes, among other things, methods and techniques for controlling usage of a computing device in the form of a Bluetooth® capable portable electronic device that provides for authentication of the computing device prior to any operating system being loaded onto the computing device. The portable electronic device operates cooperatively with the computing device to provide authentication information, such as the portable electronic device's Bluetooth device information. Previously developed implementations have shortcomings especially in the degree of security provided that are overcome by the present invention, especially its operation in a pre-boot environment. | 11-25-2010 |
20100299511 | Method of Masking the End-of-Life Transition of an Electronic Device, and a Device Including a Corresponding Control Module - A method of masking the end-of-life transition of a microprocessor electronic device including reprogrammable non-volatile memory containing an end-of-life state variable. On booting, the value of the variable is loaded into RAM. After executing any current command, it is verified whether the value of the variable stored in RAM is FALSE. If the response is negative, the end-of-life transition is executed. Otherwise, initialization or execution of the command is continued. On detecting an intrusive attack, it is instantiated by writing the TRUE value to the end-of-life state variable in RAM only and then deferring writing of the TRUE value to the variable in the non-volatile memory until the next write operation. The invention is applicable to any electronic device, smart card, etc. | 11-25-2010 |
20100299512 | Network Boot System - To minimize network access to a server in a network boot system. A server which stores an OS operating on a client terminal and a client terminal which includes a physical storage device are connected to each other over a network. The client terminal includes a physical memory and a network interface, and the OS includes a network driver for driving the network interface, a filter driver for converting access to a local bus of the client terminal into access to the network, and a read cache driver for driving the storage device. The read cache driver caches data which is read out from the server by the filter driver in the storage device. | 11-25-2010 |
20100299513 | MEMORY APPARATUS AND METHOD THEREFOR - A memory apparatus and an operation of the memory apparatus which allow quick booting are provided. The memory apparatus includes a volatile memory, a non-volatile memory, and a memory control unit to control input/output of data stored in the volatile memory and the non-volatile memory. The memory control unit restores data, according to a control command input from outside of the memory apparatus, from the non-volatile memory to the volatile memory in an on-demand fashion during booting. | 11-25-2010 |
20100299514 | HOST BUILD AND REBUILD SYSTEM AND METHOD - Methods of building a host computer system. The methods may comprise the steps of discovering hardware components present at the host and determining whether the hardware components are certified. The methods may also comprise the step of determining whether a build of the host is requested. According to various embodiments, a profile may also be downloaded to the host. The profile may comprise an indication of an operating system, an indication of an application, and an indication of a configuration parameter. The methods may also comprise the steps of installing the operating system to the host; installing the application to the host; and configuring the host according to the configuration parameter. | 11-25-2010 |
20100306519 | SYSTEM AND METHOD FOR MAINTAINING THE SECURITY OF MEMORY CONTENTS AND COMPUTER ARCHITECTURE EMPLOYING THE SAME - A secure memory system and a method of maintaining the security of memory contents. One embodiment of the system includes: (1) a security control module configured to transmit a system memory secure mode signal and processor secure mode signal to place the system in a secure mode, (2) a secure memory bridge coupled to the security control and system memory and configured to encrypt and decrypt data associated with the system memory based on a state of the system memory secure mode signal and (3) a boot processor coupled to the security control module and the secure memory bridge and configured to transmit requests to the secure memory bridge in the secure mode and an unsecure mode. | 12-02-2010 |
20100306520 | ELECTRONIC APPARATUS AND BOOTING METHOD OF THE SAME - An electronic apparatus and a booting method of the same are provided. The booting method of the electronic apparatus, including a non-volatile first storage unit storing a device initialization file and a device execution file, and a volatile second storage unit, includes: loading the device execution file from the first storage unit into the second storage unit at an initial booting; generating reference information about the loaded device execution file; maintaining power supplied to the second storage unit when the electronic apparatus is turned off; loading and executing the device initialization file from the first storage unit into the second storage unit at a rebooting; and executing the device execution file stored in the second storage unit with reference to the reference information. | 12-02-2010 |
20100306521 | METHOD AND SYSTEM FOR ISCSI BOOT IN WHICH AN ISCSI CLIENT LOADS BOOT CODE FROM A HOST BUS ADAPTER AND/OR NETWORK INTERFACE CARD - Certain aspects of a method for iSCSI boot may include loading boot BIOS code from a host bus adapter or a network interface controller (NIC) by an iSCSI client device. A connection may be established to an iSCSI target by the iSCSI client device after loading the boot BIOS code. The boot BIOS code may be chained to at least one interrupt handler over iSCSI protocol. An operating system may be remotely booted from the iSCSI target by the iSCSI client device based on chaining the interrupt handler. An Internet protocol (IP) address and/or location of the iSCSI target may be received. At least one iSCSI connection may be initiated to the iSCSI target based on chaining at least one interrupt handler. The iSCSI target may be booted in real mode if at least one master boot record is located in the memory. | 12-02-2010 |
20100306522 | Method and system of file manipulation during early boot time using portable executable file reference - A system and method for enabling access to user-level data is described. One embodiment includes accessing a user-level portable executable (PE) file. In this embodiment, the boot-loader registry of a computer is modified during an installation period to include a reference to the user-level PE file. The operating system uses the reference during an early boot-time to image the PE file into memory as a boot-file. | 12-02-2010 |
20100306523 | RESTORING A SOURCE FILE REFERENCED BY MULTIPLE FILE NAMES TO A RESTORE FILE - Provided are a method, system, and program for restoring a source file referenced by multiple file names to a restore file. An operation is processed to restore a source file having a first file name to a restore file, wherein the source file is in a state of being accessed by a process. A determination is made as to whether a second file name references the source file. A first temporary file name and a second temporary file name are created that both reference the restore file in response to determining that the second file name references the source file. The first temporary file name is renamed to the first file name and the second temporary file name is renamed to the second file name. After the renaming of the first and second temporary file names, the first and second file names reference the restore file. | 12-02-2010 |
20100313004 | RESTART SUPPORT DEVICE - Provided is a restart support program which executes a method of supporting restart of the system in a computer when the system in which a sequence flow representing an order in which a plurality of processings are executed, one or more objects which are processing targets in each processing, and one or more operations for each object are defined has stopped execution in certain processing. The restart support program stores version information related to a version of an object which transitions with an operation in association with each processing for each object. When the system has stopped execution in certain processing, the restart support program determines processing in which execution has to be restarted from among a plurality of processings based on success and failure of processing, an object and version information of each object which are stored in association with processing, and an object and version information of each object which are actually stored in the system. | 12-09-2010 |
20100318780 | HIERARCHICAL SERVICES STARTUP SEQUENCING - Exemplary methods, system, and computer program product embodiments for managing services within a data storage subsystem using a processor in communication with a memory device during a startup sequence are provided. At least one service facilitated by a provider is provided. At least one requirement is linked to the at least one service. The at least one service and the at least one requirement are incorporated into a specification file. A directed acyclic graph, interrelating the at least one service and an additional service based on the at least one requirement, is constructed. The directed acyclic graph is traversed using an initialization process to generate a determination which of an available plurality of services to provide. The determination further includes an analysis of the which of the available plurality of services to provide in view of at least one hardware resource in the data storage subsystem. | 12-16-2010 |
20100318781 | SECURE BOOT WITH OPTIONAL COMPONENTS METHOD - A method to allow a device to boot in a secure fashion, even though some of the components within the secure device's firmware may not be present, not correctly authorized, or not correctly operating. | 12-16-2010 |
20100325403 | Half duplex GPIO firmware debugger - Methods, systems, apparatuses and program products are disclosed for communications such as may be used for debugging computers and similar electronic products at a level suitable for low level firmware. This may find application, for example, in environments after cache initialization around the time of memory bring up or motherboard device enumeration but including durability into and beyond software loading. | 12-23-2010 |
20100325404 | Updating Programmable Logic Devices - Updating programmable logic devices (‘PLDs’) in a symmetric multiprocessing (‘SMP’) computer, each compute node of the SMP computer including a PLD coupled for data communications through a bus adapter, the bus adapter adapted for data communications through a set of one or more input/output (‘I/O’) memory addresses, including configuring the primary compute node with an update of the configuration instructions for the PLDs; assigning, by the PLDs at boot time in an SMP boot, a unique, separate set of one or more I/O addresses to each bus adapter on each compute node; and providing, by the primary compute node during the SMP boot, the update to all compute nodes, writing the update as a data transfer to each of the PLDs through each bus adapter at the unique, separate set of one or more I/O addresses for each bus adapter. | 12-23-2010 |
20100325405 | METHOD OF RUNNING MULTIPLE OPERATING SYSTEMS ON AN X86-BASED COMPUTER - Two or more distinct operating systems (OSs) are loaded simultaneously and run on an x86 computer system. Each OS is booted serially and in such a way that the OS resides in a separate memory footprint than the other OSs by partitioning the memory map. The partition of the memory map includes a low memory region, dedicated memory partitions for storing each OS, and dedicated regions for storing shadows of the low memory region and the ACPI for each OS. Switching between the two or more resident OSs is performed by sleeping the current OS and then resuming the desired OS using the shadow previously stored for the desired OS. None of the resident OSs require any modification in order to run in this fashion. | 12-23-2010 |
20100325406 | COMPUTER SYSTEM AND MANAGEMENT DEVICE - A cloud computing system is provided in order to meet the requirement for efficiently processing a large amount of information, and to meet the requirement for stable performance. This is achieved by a computer system including a user terminal, a plurality of servers connected to the user terminal through a network to provide services to the user terminal, and a management device for managing a server for providing a service to the user terminal. In the computer system, the user terminal transmits the boot information indicating one boot mode among fix boot, first boot, and not-first boot, to the management device. The management device selects a server for providing a service to the user terminal based on the boot information. Then, the selected server provides the service to the user terminal. | 12-23-2010 |
20100325407 | Electronic Digital Device - There is provided an electronic device comprising an FPGA unit (100), a first and a second memory (210, 220) for storing boot data for the FPGA unit and a digital potentiometer (300) for storing a first and a second setting. In the first setting of the potentiometer the first memory (210) is coupled to the FPGA unit (100) and in the second setting of the potentiometer the second memory (220) is coupled to the FPGA unit (100) for booting. | 12-23-2010 |
20100325408 | Method and Apparatus for Maintaining a Partition When Booting Another Partition - In a processing system with a main partition and a sequestered partition, the main partition sends an interrupt to the sequestered partition before calling an operating system (OS) boot loader for the main partition. The sequestered partition may then enter an interrupt handler. After the sequestered partition enters the interrupt handler, an address line of the processing system may be disabled, and the OS boot loader for the non-sequestered partition may be called. The sequestered partition may then determine whether the address line has been re-enabled. The sequestered partition may remain in the interrupt handler until after the address line has been re-enabled. Other embodiments are described and claimed. | 12-23-2010 |
20100325409 | DISPLAY DEVICE TO PROVIDE INFORMATION TO USERS DURING BOOTING PROCEDURE - A display device is provided that may include a memory to store a boot screen data to be provided when booting the display device, an interface unit to receive the stored boot screen data and another boot screen data, and a processor to change the stored boot screen data into the other boot screen data that is received in the interface unit, and to control to outputting the boot screen data when booting according to a boot code that includes a command for outputting the boot screen data. A display unit may output the boot screen data according to control of the processor. | 12-23-2010 |
20100325410 | SYSTEM AND METHOD FOR MANAGEMENT AND INSTALLATION OF OPERATING SYSTEM IMAGES FOR COMPUTERS - Shown is a method and system for provisioning a target computer with an operating system, which calls for booting the target computer in a pre-operating system environment, collecting configuration information for the target computer, and transmitting the configuration information to a predetermined server. The approach shown also provides for searching a database in the server for a pre-existing operating system image corresponding to the configuration information from the target computer. If a corresponding operating system image is found, then the present approach involves transferring the pre-existing operating system image to the target computer and installing the pre-existing operating system image on the target computer. | 12-23-2010 |
20100332813 | SYSTEM AND METHOD FOR UTILIZING A PROTECTED/HIDDEN REGION OF SEMICONDUCTOR BASED MEMORY/STORAGE - A method for accessing a protected area of a solid-state storage device via firmware control is described. During system initialization, firmware components are loaded and executed to initialize a computer system. These firmware components include a firmware driver for accessing solid-state storage devices connected to the computer system. The system firmware enables a protected area on a solid-state storage device's media to be accessed under firmware control. After firmware accesses, the protected area is closed from access by non-firmware entities by “hiding” the true size of the media such that those entities are unaware of this area of the media. Mechanisms are disclosed for providing firmware access to the protected area only during pre-boot, and for both pre-boot and run-time operations. The firmware-controlled media access scheme may be used to load firmware stored on solid-state media during pre-boot and to store system information in the protected area during pre-boot and/or run-time operations. | 12-30-2010 |
20100332814 | PORTABLE LIGHT WEIGHT LDAP DIRECTORY SERVER AND DATABASE - A lightweight embedded directory server with portable LDAP data is disclosed. The directory server and database comprises a processing chip, an on-chip processing unit, an on-chip memory system, and an on chip input/output system. The memory system stores an embedded operating system and an embedded directory server, and is also used for storing data to be processed by the processing unit. The input/output system is provided for connecting the processor chip to one or more applications for supplying directory services to the one or more applications. A portable memory device stores a directory database, and, in use, this memory device is releasably connected to the on chip input/output system. An on-chip driver is used to perform read and write operations on the portable memory device; and a boot loader software program is used for starting execution of the embedded directory service. | 12-30-2010 |
20100332815 | PERIPHERAL CONTROL MODULE, COMPUTER SYSTEM, AND OPERATION METHOD THEREOF - This invention provides a peripheral control module, a computer system, and an operation method thereof. The peripheral control module is for a computer system. The computer system includes a power switch capable of outputting a power signal. The peripheral control module includes a control unit and a control circuit. The control unit has a program code for controlling a peripheral module. The control circuit is coupled with the power switch and the control unit for receiving the power signal and outputting a switching signal to the control unit, and the control circuit resets the program code to an initial state before the control unit receives the switching signal. This invention further provides a computer system using the peripheral control module and an operation method thereof. | 12-30-2010 |
20100332816 | RESILIENCY AGAINST FIELD-UPDATED SECURITY ELEMENTS - User terminal resilience to application elements may be provided. Upon initialization, a user terminal may detect elements associated with the user terminal's operation. The user terminal may load each of the elements in turn and determine whether the element causes a fault in the user terminal. Elements that result in a fault may be disabled from being loaded in the future. | 12-30-2010 |
20110004747 | Initializing Femtocells - A femtocell may be initialized on a network by automatically contacting a network service provider. The access point then automatically downloads an initial configuration from a bootstrap server belonging to the network service provider. In some cases, a femtocell access point may automatically determine, after boot up, whether it was pre-provisioned with credentials to authenticate itself with the network service provider. If so, it may use a domain name service to obtain an address of a bootstrap server. Otherwise, it may use dynamic host configuration protocol to discover the bootstrap server's Internet Protocol address. | 01-06-2011 |
20110010532 | BOOTING METHOD AND COMPUTER SYSTEM USING THE BOOTING METHOD - A booting method adaptable to a computer system having a processor, a memory and a bootable medium, wherein the bootable medium has an operating system, the booting method comprises the steps of activating a basic input/output system (BIOS); reserving a reserved area in the memory according to a setting of a setting space; copying the operating system from the bootable medium to the reserved area as an operating system copy; and activating the operating system copy from the reserved area. | 01-13-2011 |
20110016300 | APPARATUS AND METHOD FOR FAST BOOTING COMPUTER SYSTEM - An apparatus and method for fast booting a computer system are provided. When a system power-off is requested in a computer system such as a desktop of notebook computer, a boot code comprising a BIOS code or the BIOS code and an OS kernel code is written to a specific area of a RAM, and then the computer system is turned off while continuously supplying power to the specific area of the RAM. When a system power-on is requested, the boot code written to the specific area of the RAM is executed to fast boot the computer system, thus effectively reducing a user's standby time until the completion of the system boot process. | 01-20-2011 |
20110016301 | SYSTEM AND METHOD FOR INITIATING A MULTI-ENVIRONMENT OPERATING SYSTEM - Various embodiments of the present invention provide a mobile computing device that operates multiple, co-existing and independent operating system environments on a common kernel. A booting process for initiating a multiple operating system environment is also provided. Additionally, various embodiments of the present invention include processes for managing a switch between one operating system environment to a second operating system environment. | 01-20-2011 |
20110016302 | INFORMATION PROCESSING APPARATUS, STORAGE MEDIUM, AND DATA RESCUE METHOD - According to one embodiment of an information processing apparatus includes: a storage medium including, a first partition that stores a first operating system and data, and a second partition that stores a second operating system and a data rescue program; a switch that allows a user to enter a command for booting the second operating system; and a boot control section that boots the second operating system when the command is entered. The data rescue program is executed when the second operating system is booted, and performs at least one of recovering and backing up the data stored in the first partition. | 01-20-2011 |
20110016303 | INFORMATION DEVICE, STORAGE MEDIUM AND INITIAL STATE RESTORATION METHOD - An information device has a storage medium storing information items which includes a first program provided on a first partition, a second program and data provided on a second partition to restore the first program on the first partition to a predetermined state, a boot block which causes system activation from one of the first partition and the second partition, and an active-partition switching program which indicates, to the boot block, one of the first and second partitions. An input/output system activates the active-partition switching program when a specific operation is performed. The active-partition switching program indicates to the boot block that system activation is to be executed from the second partition. | 01-20-2011 |
20110022828 | NON-DISRUPTIVE METHODS FOR UPDATING A CONTROLLER OF A STORAGE SYSTEM - A non-disruptive method for updating firmware in a first controller | 01-27-2011 |
20110022829 | FLASH STORAGE SYSTEM AND METHOD FOR ACCESSING A BOOT PROGRAM - A computing system includes a flash storage device that loads a boot program from a flash storage of the flash storage device to a random access memory of the flash storage device. A processor of the computing system then accesses the boot program from the random access memory and executes the boot program. | 01-27-2011 |
20110022830 | Boot Block - A machine including a processor, a boot block including an immutable segment and a mutable segment, one or more BIOS images stored on the mutable segment of the boot block, and a BIOS manager executed by the processor from the immutable segment of the boot block and configured to determine whether a BIOS of the machine is valid and launch a BIOS replacement process when the BIOS is invalid. | 01-27-2011 |
20110022831 | Method for Operation System Startup - A method for operation system startup includes steps of switching on hardware startup; determining whether there is a trigger signal; reading an initial parameter from a storage device, and loading the initial parameter into a startup program when there is no trigger signal, executing the startup program; and entering operational system. | 01-27-2011 |
20110022832 | MULTI-OPERATING SYSTEM (OS) BOOTING APPARATUS, MULTI-OS BOOTING PROGRAM, RECORDING MEDIUM, AND MULTI-OS BOOTING METHOD - In a multi-OS booting apparatus, when loading the second OS, contents of the second OS is prevented from being referred to by other programs. The first OS | 01-27-2011 |
20110029764 | BIOS FIELD MAPPING - BIOS field mapping includes generating basic input/output system (BIOS) information by defining property identifications using a visual form code language and determining that a proprietary set-up service is accessible. The BIOS field mapping then includes converting the visual form code language to a binary format and storing the property identifications in binary format on a setup database as data hidden from an operating system. A BIOS driver may then request the property identifications causing a transfer of the property identifications to the BIOS driver. | 02-03-2011 |
20110029765 | COMPUTING DEVICE BOOTING UTILIZING DISPERSED STORAGE - A computing device boot-up method begins by a processing module detecting a boot-up of the computing device. The method continues with the processing module addressing a distributed basic input/output system (BIOS) memory to retrieve a plurality of error coded BIOS data slices. The method continues with the processing module reconstructing BIOS data from the plurality of error coded BIOS data slices using an error coding dispersal function. The method continues with the computing device booting up in accordance with the BIOS data. | 02-03-2011 |
20110029766 | SYSTEM, APPARATUS, AND METHOD FOR BIOS LEVEL CONTEXTUAL CONFIGURATION OF RESOURCES - A system and method for a contextual control of resources of a computer. A plurality of detection modules may inform a configuration module of context changes and events. A database may store a plurality of configuration parameters and policies. A configuration module may configure a BIOS of a computer according to events, context and configuration policies. Other embodiments are described and claimed. | 02-03-2011 |
20110035574 | Running a Computer from a Secure Portable Device - An operating system is booted from a secure peripheral device on a host computer. The secure peripheral device, which includes a memory, is communicatively coupled with the with the host computer. A first operating system is booted from the memory of the secure peripheral device. A secondary operating system is launched on the first operating system. | 02-10-2011 |
20110035575 | MULTIPROCESSOR SYSTEM COMPRISING MULTI-PORT SEMICONDUCTOR MEMORY DEVICE - A multiprocessor system comprises first and second processors connected to a multi-port semiconductor memory device. The multi-port semiconductor memory device comprises a shared memory area and a plurality of mailbox areas used for inter-processor communication. The first and second processors use a single nonvolatile memory device for storing boot data and transmit information for booting via the shared memory area. | 02-10-2011 |
20110040958 | METHOD OF SWITCHING COMPUTER OPERATING SYSTEMS - The present invention relates to a method of switching operating systems in a computer, with which the computer executes the procedure of switching different operating systems. A first operating system executes a process of switching to a second operating system. A process of restoring backup data of a BIOS is executed. The BIOS reads computer system information of an initial state backed up in a memory of the computer and configures the computer to make the computer restored to the initial state of booting. The BIOS calls and executes an interruption service to search a loader of the second operating system. The loader loads the second operating system into the memory. The second operating system boots up and is entered. | 02-17-2011 |
20110040959 | IMAGE REPRODUCING APPARATUS AND METHOD - An image reproducing apparatus and method of controlling the image reproducing apparatus are provided. The method of controlling the image reproducing apparatus includes: determining whether external power is supplied; performing a first booting operation when the external power is supplied; and controlling the image reproducing apparatus to operate in a sleep mode if an operation start signal is not received until the booting operation is completed. The method further includes controlling the image reproducing apparatus to perform a second booting operation to operate in a normal mode after an operation start signal is received. The method further includes performing a resuming operation so that the image reproducing apparatus operates in a normal mode when the operation start signal is received while the image reproducing apparatus operates in the sleep mode. The method further includes operating in an end mode when the sleep mode continues for a predetermined time or longer. | 02-17-2011 |
20110040960 | Method and System for Securely Updating Field Upgradeable Units - Devices and methods for securely upgrading devices, such as field upgradeable units, are disclosed. In response to receiving an update object, a device may determine whether a predefined location of memory includes a predetermined value. Based on the value in the predefined location, the device may store the received update object in a verification portion of the memory. After verifying the authenticity of the update object, the device may copy the update object from the verification portion of the memory to an inactive portion. The inactive portion of the memory can be swapped with an active portion of the memory, such that the inactive portion becomes active. | 02-17-2011 |
20110040961 | BINDING DATA TO A COMPUTING PLATFORM THROUGH USE OF A CRYPTOGRAPHIC MODULE - Using a cryptographic co-processor ( | 02-17-2011 |
20110047366 | BOOTING IN SYSTEMS HAVING DEVICES COUPLED IN A CHAINED CONFIGURATION - The present disclosure includes methods, devices, and systems for booting in systems having devices coupled in a chained configuration. One or more embodiments include a host and a number of devices coupled to the host in a chained configuration, wherein at least one of the number of devices is a bootable device and the at least one bootable device is not directly coupled to the host. | 02-24-2011 |
20110047367 | Combining Resources of Multiple Bios Roms and Managing Them As A Single Entity - A method and related computer program product for combining resources of multiple RAID controllers and managing them as a single entity, comprising searching the RAID controllers for the most appropriate version of the firmware to be executed, determining whether a more appropriate version of the firmware was previously loaded into system memory, unloading inappropriate versions of the firmware, loading the most appropriate version of the firmware and initializing all RAID controllers as a commonly managed entity having combined resources. | 02-24-2011 |
20110055534 | Management Method for Security of Computer Device - A management method is adapted for a computer device. The management method comprises: firstly turning on a power source of the computer device; then performing a power-on verification procedure by a BIOS of the computer device; determining whether passing through a power-on verification according to a result of performing the power-on verification procedure; starting an OS of the computer device if passing through the power-on verification; and crashing the computer device if not passing through the power-on verification. | 03-03-2011 |
20110055535 | Method of Converting Personal Computers Into Thin Client Computers - A system repurposes a personal computer operating with a conventional personal computer operating system, such as Windows® operating system, into a thin client computer system without requiring that the hard drive of the personal computer be re-formatted to remove the previous operating system. The personal computer has its boot loader configuration file edited to include a call to a thin client boot loader file to execute the thin client operating system stored on the personal computer hard drive instead of the previous operating system of the personal computer. The repurposed personal computer can be returned to the previous operating system by electing to bypass the thin client operating system. As a thin client computer, the repurposed personal computer is managed from a central server and can access applications and data on remote servers instead of using the application programs on the hard drive or the capability of storing data on the personal computer hard drive. | 03-03-2011 |
20110055536 | FILE SYSTEM FOR DUAL OPERATING SYSTEMS - Methods, systems, apparatuses and program products are disclosed for managing, activating and controlling file systems sharing among two or more O/S (Operating Systems) and/or the like within a computing apparatus or within a single computer operational session or context. | 03-03-2011 |
20110055537 | ELECTRONIC DEVICE AND BOOTING METHOD THEREFOR - An electronic device of multiple operating systems includes a mode selecting module, an operating system selecting module, and a boot loader module. The mode selecting module is capable of selecting a desired booting mode. The operating system selecting module is capable of selecting one of the operating systems according to the selected booting mode. The boot loader module is capable of loading the selected operating system. A booting method for the electronic device is also disclosed. | 03-03-2011 |
20110055538 | METHOD AND APPARATUS FOR CONTROLLING OPERATION OF BOOTING VIDEO IMAGE REPRODUCING APPARATUS - A method of controlling an operation of booting an image reproducing apparatus is provided. The method includes: receiving an input signal for powering off the image reproducing apparatus; receiving from a main processor a memory address where an operation status of the image reproducing apparatus is stored, according to the received input signal; storing the received memory address; and converting a system of the image reproducing apparatus into a sleep by the sub-processor. | 03-03-2011 |
20110055539 | INFORMATION PROCESSING APPARATUS, AND COMPUTER-READABLE STORAGE MEDIUM HAVING STARTUP/SHUTDOWN CONTROL PROGRAM STORED THEREIN - An information processing apparatus includes a nonvolatile memory, a volatile memory, and a process control section. A startup program to be required when starting up the information processing apparatus has previously been stored in the nonvolatile memory. When a command to start up the apparatus is received, it is determined whether or not the startup program is present in the volatile memory. When the startup program is absent, the startup program is loaded from the nonvolatile memory into the volatile memory. Thereafter, when a command to turn off the power of the information processing apparatus is received, supply of power to other components of the information processing apparatus than the volatile memory is stopped while maintaining supply of power to the volatile memory, thereby to shutdown the power of the information processing apparatus. | 03-03-2011 |
20110055540 | Pre-Boot Loader for Reducing System Boot Time - A pre-boot loader reduces the boot time of an operating system (OS). An OS is typically loaded by its own OS loader. A pre-boot loader is typically a software module in the system firmware or the pre-boot environment that loads the OS loader, which in turn loads the OS. In one embodiment, the pre-boot loader bypasses part or all of the steps performed by the OS loader, which shortens the loading time of the OS loader and the OS. In another embodiment, bypassing the steps of the OS loader reduces dependency on the system firmware functions. The system firmware takes advantage of this to further reduce boot time, by executing the pre-boot loader earlier instead of waiting until the full completion of system initialization by the system firmware. | 03-03-2011 |
20110055541 | METHOD AND APPARATUS FOR BOOTING HIBERNATION IN A PORTABLE TERMINAL - A method and apparatus for hibernation booting in a mobile terminal supporting two processors are provided. In the hibernation booting method, when power is turned on, a master processor performs hibernation booting. A slave processor performs normal booting under control of the master processor. The master processor and the slave processor determine data needing synchronizing, and perform synchronization depending on whether the data needing synchronizing have been changed. | 03-03-2011 |
20110055542 | METHOD FOR ACTIVATING OS, AND PROTOCOL CONVERTER - A protocol converter includes a MBR emulation unit connectable to a connector for an internal hard disk drive and configured to provide MBR in response to a request from a system BIOS, a first interface configured to acquire an OS from a remote hard disk drive through a network in response to an OS acquisition request from a secondary boot loader, a second interface configured to provide the secondary boot loader with the OS acquired by the first interface, and a conversion unit configured to perform conversion between a first protocol to be used by the first interface and a second protocol to be used by the second interface. | 03-03-2011 |
20110055543 | WIMAX TERMINAL AND A STARTING METHOD THEREOF - The present invention discloses a starting method of a WiMAX terminal and a terminal thereof, wherein, the starting method comprises: step S202, calculating a load command and a firmware required to be loaded for starting the terminal in advance to obtain a first firmware Hash and a first load command Hash, and storing the first firmware Hash and the first load command Hash in a predefined memory of the terminal; step S204, in response to a starting operation of the terminal, performing starting process and starting a boot loader; step S206, the boot loader executing the load command transmitted by a driver of the terminal to download the firmware to the terminal; step S208, the boot loader calculating a second firmware Hash of the downloaded firmware and a second load command Hash of the load command transmitted by the driver; step 210, the boot loader judging whether the first firmware Hash matches with the second firmware Hash, and judging whether the first load command Hash matches with the second load command Hash, and permitting to start the terminal under the circumstances that the first firmware Hash matches with the second firmware Hash and the first load command Hash matches with the second load command Hash. | 03-03-2011 |
20110060897 | DEVICE BOOTUP FROM A NAND-TYPE NON-VOLATILE MEMORY - Systems and methods are provided for using a NAND-type non-volatile memory (“NVM”), such as NAND flash memory, to store NV pre-boot information for a bootloader (e.g., a second state bootloader) or an operating system. The NV pre-boot information can include, for example, environment variables storing the configuration or state of an electronic device. In some embodiments, an electronic device including the NAND-type NVM may allocate a portion of the super blocks in the NAND-type NVM to storing the NV pre-boot information. The electronic device may store a redundant copy of the NV pre-boot information into the allocated portion of each IC die of the NAND-type NVM. | 03-10-2011 |
20110060898 | COMPUTER MOTHERBOARD WITH BASIC INPUT OUTPUT SYSTEM CAPABLE OF BUILT-IN BIOS FRESH - A computer motherboard with a Basic Input Output System (BIOS) is characterized by built-in BIOS fresh. The BIOS includes a first means and a second means. The first and second means are code internally provided in the BIOS and executable by a CPU of the computer motherboard in an execution environment preset by the BIOS. The first means selects a BIOS update file stored in a storage device. The second means enables the BIOS update file to be refreshed in a BIOS memory. After the computer motherboard enters a BIOS setup utility, a user selects an option of execution of the first or second means to let BIOS fresh takes place without using an operating system. | 03-10-2011 |
20110060899 | POWER ON CERTIFICATION METHOD FOR PERSONAL COMPUTER AND POWER ON CERTIFICATION SYSTEM THEREOF - A power on certification method for a personal computer (PC) and a power on certification system thereof are described. The power on method includes the following steps. At least one booting certification device is connected to a PC. The PC is booted, and a basic input output system (BIOS) is run. The BIOS is made to retrieve recognition information of the booting certification device through a verification procedure, so as to judge whether the recognition information is consistent with verification information stored in the PC. After the booting certification device passes through the verification procedure, the PC completes other procedures in the BIOS, and enters an operating system. | 03-10-2011 |
20110060900 | METHOD, SYSTEM, CORRESPONDING DEVICE, AND COMMUNICATION TERMINAL FOR PROVIDING MBMS SERVICE - A method, a system, a security device, a service control device, and a communication terminal for providing a Multimedia Broadcast/Multicast Service (MBMS) service are provided. The method includes the following steps: A service control module in an IP Multimedia Subsystem (IMS) system carries out service authorization according to a service authorization request, and obtains an authorization-passed result. The service control module sends the authorization-passed result to a security module. The security module obtains the authorization-passed result and then sends a service decryption code of the MBMS service to UEs. In the present invention, a controlling capacity of an IMS and a bearer capacity of an MBMS are multiplexed based on an IMS system and an MBMS system to achieve IPTV services, so as to achieve the uniform authorization and uniform network management. The binding of the IPTV service with other services based on the IMS can be achieved by using the IMS, and personalized services can be provided to UEs. | 03-10-2011 |
20110066835 | METHOD AND SYSTEM FOR SECURELY PROTECTING A SEMICONDUCTOR CHIP WITHOUT COMPROMISING TEST AND DEBUG CAPABILITIES - A semiconductor chip may be operable to block the debug interfaces when the semiconductor chip boots up from the boot read-only memory (ROM). The semiconductor chip may be operable to authenticate a debug certificate received by the semiconductor chip and enable one or more debug interfaces in the semiconductor chip based on the information resulting from the authentication of the debug certificate. The debug certificate may be in a form of a cryptographic public key certificate. A unique device ID which may be generated at boot and stored in the memory may be used by the semiconductor chip to authenticate the debug certificate. The device ID may be generated using the cryptographic public key that is stored in the one-time programmable (OTP) memory in the semiconductor chip and a cryptographic hash algorithm. | 03-17-2011 |
20110066836 | OPERATING SYSTEM BOOTING METHOD, COMPUTER, AND COMPUTER PROGRAM PRODUCT - According to one embodiment, a CPU boots a small OS having a function of executing a target application, boots the target application on the booted small OS, and boots a CPU dispatcher for switching an execution OS. The CPU boots a rich OS capable of executing applications larger in number than applications executed by the small OS by using the CPU dispatcher, in a background of the small OS, while causing the target application booted on the small OS to run. After the rich OS is booted, the CPU boots the target application on the booted OS separately from the target application running on the small OS. The CPU passes an execution state of the target application running on the small OS to the target application booted on the rich OS and shifting the execution OS from the small OS to the rich OS. | 03-17-2011 |
20110066837 | Single-Chip Flash Device with Boot Code Transfer Capability - A Multi-Media Card (MMC) Single-Chip Flash Device (SCFD) contains a MMC flash microcontroller and flash mass storage blocks containing flash memory arrays that are block-addressable rather than randomly-addressable. An initial boot loader is read from the first page of flash by a state machine and written to a small RAM. A central processing unit (CPU) in the microcontroller reads instructions from the small RAM, executing the initial boot loader, which reads more pages from flash. These pages are buffered by the small RAM and written to a larger DRAM. Once an extended boot sequence is written to DRAM, the CPU toggles a RAM_BASE bit to cause instruction fetching from DRAM. Then the extended boot sequence is executed from DRAM, copying an OS image from flash to DRAM. Boot code and control code are selectively overwritten during a code updating operation to eliminate stocking issues. | 03-17-2011 |
20110066838 | INFORMATION PROCESSING DEVICE, INFORMATION PROCESSING METHOD, AND COMPUTER PROGRAM AND INTEGRATED CIRCUIT FOR THE REALIZATION THEREOF - The present invention provides an information processing apparatus that is capable of continuously performing secure boot between module groups in the case where software of a terminal device consists of module groups provided by a plurality of providers, while keeping independence between the providers. The information processing apparatus is provided with a linkage certificate that contains a first configuration comparison value | 03-17-2011 |
20110066839 | System And Method For Providing A System Management Command - Exemplary embodiments of the present invention disclosed herein relate to a method of providing a system management command. The method comprises receiving from an authorized requestor information identifying the electronic device and a request to issue a system management command to the electronic device. The method additionally comprises providing, in response to the request, a system management command, information identifying a source of the command as a trusted source and the information identifying the electronic device. Also disclosed are an electronic device and a computer system according to the invention. | 03-17-2011 |
20110072254 | METHOD AND SYSTEM FOR SECURED DYNAMIC BIOS UPDATE - In some embodiments, the invention involves providing a secure BIOS update to selective user operating systems in a platform conforming to virtualization technology. In an embodiment, a provision agent in a service operating system identifies requests for BIOS updates received from a management console and forwards authorized update requests to a virtual machine monitor (VMM) for processing the updates according to platform policy. An update may be applied immediately to some user operating systems and be delayed in others. Some updates may require an immediate reboot of the platform. Other embodiments are described and claimed. | 03-24-2011 |
20110072255 | PROVISIONING OF OPERATING ENVIRONMENTS ON A SERVER IN A NETWORKED ENVIRONMENT - The illustrative embodiments disclose a computer implemented method, apparatus, and computer program product for provisioning a server on a network. In one embodiment, the process sends a server identifier to a management server in response to receiving a boot command. The management server uses the server identifier for identifying a designated operating environment for the server to form a designated operating environment identifier. The process then receives, from the management server, the designated operating environment identifier and a first bootstrap code. The process uses the first bootstrap code to extract information for identifying a local operating environment on the server. Thereafter, the process compares the local operating environment to the designated operating environment and initiates a final boot sequence of the server based on the comparison of the local operating environment and the designated operating environment. | 03-24-2011 |
20110072256 | EFFICIENT METHOD FOR OPERATING SYSTEM DEPLOYMENT - Method and computer storage media for efficiently deploying an operating system are provided. A virtual hard drive file is communicated by a computing device, such as a server. The virtual hard drive file may be compounded with a boot manager enhancer and/or a translator. Upon receipt of the virtual hard drive file, a computing device is enhanced to expose and mount the virtual hard drive as a drive and boot option for the computing device. Thereafter, an initial boot sequence may be commenced utilizing the virtual hard drive file as the boot source. In some embodiments, a boot manager enhancer and a translator are utilized to do one or more of expose, mount, and translate the virtual hard drive file. In some embodiments, a virtual SCSI miniport driver is utilized to do one or more of expose, mount, and translate the virtual hard drive file. | 03-24-2011 |
20110078428 | PORTABLE DESKTOP DEVICE AND METHOD OF HOST COMPUTER SYSTEM HARDWARE RECOGNITION AND CONFIGURATION - A portable desktop device and method for host computer system hardware recognition and configuration are provided. The portable desktop device causes on a first boot, the host computer system to recognize hardware devices connected thereto, and to configure hardware configuration files of the portable desktop O/S in accordance with the recognized hardware. Once the hardware configuration files have been configured, the system is rebooted. On the second boot, the host computer determines that the portable desktop has been configured for its hardware, and initiates start-up of the portable desktop. | 03-31-2011 |
20110078429 | ELECTRONIC DEVICE AND BOOTING METHOD THEREFOR - An electronic device with a plurality of operating systems includes a mode selecting module, a firmware module, an operating system selecting module and a boot loader module. The mode selecting module selects a desired booting mode from a plurality of booting modes. The booting modes includes a manufacture booting mode, a normal booting mode, a rescue booting mode, and a recover booting mode. The firmware module stores the manufacture booting mode, the normal booting mode, the rescue booting mode, and the recover booting mode. The operating system selecting module selects from a plurality of operating systems according to the selected booting mode. The boot loader module loads the selected operating system. A booting method for the electronic device is also disclosed. | 03-31-2011 |
20110078430 | GAMING MACHINE HAVING A SECURE BOOT CHAIN AND METHOD OF USE - An electronic gaming machine (EGM) comprises a memory storing boot program code comprising first code; a central processing unit (CPU) arranged to access the memory and initiate a boot process by reading the first code from the memory; and a monitoring device having or with access to validation code and arranged to take at least one protective action if the first code does not match the validation code. | 03-31-2011 |
20110078431 | Information processing apparatus, method of controlling information processing apparatus, and semiconductor device - In an information processing apparatus that includes a first and second semiconductor devices that are connected to each other and also includes a system control device that is connected to the first and second semiconductor devices, the timers that are mounted on the semiconductor devices are all synchronized by successively performing a timer correction process between a semiconductor device in which the timer is synchronized and a semiconductor device, adjacent to the semiconductor device, in which the timer is not synchronized, and, when an error occurs in the information processing device, the value in the synchronized timer and the error information are stored in a predetermined register. | 03-31-2011 |
20110078432 | RETRIEVING BOOT INSTRUCTIONS FROM NONVOLATILE MEMORY - Systems and processes for booting a device can be implemented by detecting a reset signal associated with the device and retrieving a predetermined page of data from a nonvolatile memory location into a register associated with the nonvolatile memory. The nonvolatile memory may be designed and implemented such that each page of data is retrieved from the nonvolatile memory as a unit, and the page of data includes instructions for use in booting the device. A command to read data stored in the register is received, and the command can include an address identifying a location of one or more instructions within the register. In response, the one or more instructions are retrieved from the register for execution by a processor. | 03-31-2011 |
20110078433 | SYSTEMS AND METHODS FOR INSTALLING A BOOTABLE VIRTUAL STORAGE APPLIANCE ON A VIRTUALIZED SERVER PLATFORM - One embodiment is a method for installing a virtual storage appliance on a host server platform. One such method comprises: providing an installation package to a host server platform, the installation package comprising an installation script for installing an I/O virtual machine (IOVM), an IOVM boot console, and an IOVM management module; running the installation script to create a hidden boot partition on a boot disk and copy the IOVM boot console and the IOVM management module to the hidden boot partition; rebooting the host server platform; loading the IOVM boot console and the IOVM management module from the hidden boot partition; configuring a disk array via the IOVM management module; for each disk in the array, creating a hidden boot partition and replicating the IOVM boot console and the IOVM management module; and installing a virtual storage environment using the IOVM boot console as a storage driver. | 03-31-2011 |
20110083002 | SYSTEM AND METHOD PROVIDING A PLUGGABLE ARCHITECTURE FOR TASK MANAGEMENT ON COMPUTERS - A system and method retrieve an image using a first computer processor, and transmit the image from the first computer processor to a second remote computer processor. The first computer processor and the second remote computer processor are coupled via a network connection. The image is received at the network connection, and the image is a lightweight operating system that is configured to be stored in and execute in a virtual memory coupled to the second remote computer processor. The second remote computer processor is not equipped with additional hardware or an agent to receive or execute the image. | 04-07-2011 |
20110083003 | System And Method For Safe Information Handling System Boot - Information handling system security is maintained by locking the information handling system from boot of an operating system with a service processor of the information handling system. The service processor obtains authorization for boot from a third party authentication service by providing authentication information to the authentication service and requiring a successful authentication for boot. For example, the service processor releases a token upon successful authentication to authorize boot. In one embodiment, the authentication service sends a token to the service processor for the service processor to use to authorize boot. | 04-07-2011 |
20110083004 | PERFORMING RECOVERY OF A HEADLESS COMPUTER - To perform recovery of a headless computer, a direct connection is established by the headless computer with a recovery computer over a network link. After establishing the direct connection, the headless computer is initiated in recovery mode. The headless computer receives a recovery routine from the recovery computer, and the recovery routine is executed in the headless computer to implement a procedure to receive a recovery image from the recovery computer. The recovery image upon loading in the headless computer causes loading of software for recovery of the headless computer. | 04-07-2011 |
20110083005 | Enabling a heterogeneous blade environment - In one embodiment, the present invention includes a method for receiving a request for power-up of a first blade of a chassis, enabling the first blade to power-up in a reduced boot mode and receiving a communication including characteristic information and policy information associated with the first blade, and analyzing the characteristic information and the policy information to determine a policy and a boot configuration for the first blade. Other embodiments are described and claimed. | 04-07-2011 |
20110083006 | Network Boot System - In a network boot system, a client terminal is caused to detect a revision of a virtual disk so as to decide operations of a read cache driver. The client terminal has a physical storage device. An operating system operating on the client terminal has a read cache mechanism that read-caches data that has been read out from a boot server. The read cache mechanism includes a filter driver for converting an access to a local bus of the client terminal into an access to the network, and a read cache driver for driving a storage device. The data in the virtual disk is compared with the revision of the read cache data. The operations of the read cache driver are decided based on the comparison result. | 04-07-2011 |
20110083007 | RECORDING DEVICE AND METHOD FOR ACTIVATING THE SAME - A recording device ( | 04-07-2011 |
20110087870 | COMPUTING DEVICE WITH DEVELOPER MODE - Methods and apparatus for implementing modes of operation of computing device are disclosed. An example apparatus includes a mode-selection input device having a first state and a second state. The example apparatus also includes firmware operably coupled with the mode-selection input device. In the example apparatus, when the mode-selection input device is in the first state, the firmware is configured to cause the computing device to operate in a first mode of operation, a user mode. In the example apparatus, when the mode-selection input device is in the second state, the firmware is configured to cause the computing device to operate in second mode of operation, a developer mode. | 04-14-2011 |
20110087871 | CONSUMER ELECTRONIC DEVICE AND METHOD OF CONTROLLING A CONSUMER ELECTRONIC DEVICE - A method and apparatus for controlling a consumer electronics (CE) device, are provided. The method includes determining, when a touch is sensed, whether the touch corresponds to a booting request, and performing a booting operation when the touch is a booting request; and controlling the CE device to operate in a sleep mode when an operation start signal is not received until the booting operation is completed, and controlling the CE device to operate in a normal mode when an operation start signal is received before the booting operation is completed. The apparatus includes a touch sensing unit; which senses a touch to the CE device; a determining unit which determines whether the touch sensed by the touch sensing unit corresponds to a booting request; a booting unit, and a control unit controlling the CE device. | 04-14-2011 |
20110087872 | Firmware Verified Boot - Methods and apparatus for verifying a boot process of a computing system are disclosed. An example computer-implemented method includes reading, by a computing system during a boot process, a header section of a read-write portion of firmware of the computing system. The example method further includes generating, using a first cryptographic hash algorithm, a message digest corresponding with the header. The example method also includes decrypting, using a first public-key, an encrypted signature corresponding with the header. The example method still further includes comparing the message digest corresponding with the header and the decrypted signature corresponding with the header. In the event the message digest corresponding with the header and the decrypted signature corresponding with the header match, the example method includes continuing the boot process. In the event the message digest corresponding with the header and the decrypted signature corresponding with the header do not match, the example method includes halting the boot process. | 04-14-2011 |
20110087873 | INFORMATION PROCESSING APPARATUS AND ITS CONTROL METHOD - An information processing apparatus includes: a first recording medium that stores a first system controller for allowing to execute boot processing of the information processing apparatus and is accessed by using a first access path in a tree structure or by using a second access path based on a first conversion table representing a correspondence between the first and second access path; a memory disk generation section allowing to secure a memory disk section that operates as a second recording medium and is accessed by using a third access path; a conversion table generation section allowing to generate a second conversion table representing a correspondence between the second and third access path; and a duplication controller allowing to copy the first system controller onto the memory disk section as a second system controller and allowing to duplicate the first and second system controllers based on the second conversion table. | 04-14-2011 |
20110093689 | System and Method for Bios and Controller Communication - A system and method for BIOS and controller communication. An information handling system comprises a central processing unit coupled to a memory. The memory further comprises a BIOS. The information handling system further comprises a controller coupled to a nonvolatile memory, and a register coupled to the central processing unit and the controller. The controller is operable to initialize communication with the BIOS, and service commands from the BIOS. The central processing unit is operable to initialize communication with the controller, and send commands to the controller. | 04-21-2011 |
20110093690 | System and Method for a Managed Bios - In accordance with the present disclosure, a system and method for a managed BIOS is disclosed. A software for a BIOS in an information handling system is provided on a computer readable medium. A first code, for execution on a central processing unit (CPU), is operable to initiate a connection to a management controller through a controller, send a message to the management controller through the controller, and receive a message from the management controller through the controller in response to a system management interrupt. The first code is also operable to stall a power-on procedure if it is able to determine a plurality of bootable devices before the connection to the management controller is ready. The first code is further operable to stall the power-on procedure before releasing control to an operating system if the management controller is active. | 04-21-2011 |
20110093691 | MULTI-ENVIRONMENT OPERATING SYSTEM - A device with multiple, co-existing, and independent environments interacting with a common kernel, and related methods of operation, are disclosed herein. Operation is altered or dependent on the device being or entering a docked mode. | 04-21-2011 |
20110093692 | METHOD OF UPDATING IDENTIFICATION DATA OF A COMPUTER SYSTEM AND RELATED COMPUTER SYSTEM - A method of updating an identification datum of a computer system includes starting BIOS when the computer system is powered on, starting a power on self test (POST) program in BIOS, the POST program detecting whether a memory unit stores an identification datum not being input yet, determining whether to input the identification datum into the computer system according to a result of detecting whether the memory unit stores the identification datum by the POST program. | 04-21-2011 |
20110093693 | BINDING A CRYPTOGRAPHIC MODULE TO A PLATFORM - One embodiment is a computer system having firmware that shares a secret with a cryptographic co-processor to determine if the cryptographic co-processor has been tampered with or removed from the computer system. | 04-21-2011 |
20110099359 | Controlling A Device's Boot Path With Disk Locking - The computing system whose boot path is controlled by data locking comprised of: a processing device capable of executing instructions, including BIOS instructions for determining the booting priority of at least an application memory storage device and a services memory storage device, wherein the applications memory storage device and the services memory storage device are electrically coupled to the processing device, wherein the BIOS instructions set the booting priority of the services memory storage device higher than the priority of the application memory storage device and wherein the services memory storage device is capable of being locked and unlocked. | 04-28-2011 |
20110099360 | Addressing Node Failure During A Hyperswap Operation - A method, system, and article are provided to enable a Hyperswap operation in a clustered computer system. Each node in the system is configured with flash memory, with a hierarchical list of boot volumes therein. Following a Hyperswap operation, the current boot volume is communicated to each node in the cluster and each node joining the cluster. All previously inactive nodes that were booted from the improper boot volume are re-booted from the correct and the flash memory is amended to reflect the correct boot volume. | 04-28-2011 |
20110099361 | Validation And/Or Authentication Of A Device For Communication With Network - A device may include a trusted component. The trusted component may be verified by a trusted third party and may have a certificate of verification stored therein based on the verification by the trusted third party. The trusted component may include a root of trust that may provide secure code and data storage and secure application execution. The root of trust may also be configured to verify an integrity of the trusted component via a secure boot and to prevent access to the certain information in the device if the integrity of the trusted component may not be verified. | 04-28-2011 |
20110099362 | INFORMATION PROCESSING DEVICE, ENCRYPTION KEY MANAGEMENT METHOD, COMPUTER PROGRAM AND INTEGRATED CIRCUIT - For the keys in a key tree group composed of root keys for each of multiple stakeholders, a shared key is generated between the multiple stakeholders, and access restrictions with respect to the generated shared key are flexibly set. A shared key control unit and a tamper-resistant module are provided for each of the multiple stakeholders. The shared key is set based on stakeholder dependency relationships. After the shared key is set, access to the shared key is controlled so that access is not possible by malicious stakeholders, so as to maintain the security level. | 04-28-2011 |
20110107073 | BOOTING A COMPUTER DEVICE - A method of booting a computing device includes, responsive to said computing device powering on, loading a first lightweight operating system on said computing device and executing an instant-on application through said lightweight operating system. The method further includes, during execution of said instant-on application, loading a hypervisor on said computing device and migrating said instant-on application to a first virtual machine executing a second lightweight operating system implemented by said hypervisor. The method further includes loading a full-feature operating system on a second virtual machine implemented by said hypervisor. | 05-05-2011 |
20110107074 | Electronic Device Capable of Automatically Setting up Operating Systems and Related Method and System - To reduce human resource cost, a method of automatically, consecutively setting up multiple operating systems, for an electronic device operating in an operating system, includes clearing a partition sector of the electronic device during operation of the operating system to generate an emptied boot record status, and setting up a target operating system according to the emptied boot record status and a setup procedure associated with the target operating system when the electronic device reboots. | 05-05-2011 |
20110107075 | NETWORK DEVICE AND NETWORK CONTROL DEVICE IN WIRELESS BODY AREA NETWORK, AND SECURE WAKE-UP METHOD AND WAKE-UP AUTHENTICATION CODE GENERATION METHOD OF NETWORK DEVICE AND NETWORK CONTROL DEVICE - A network device and a network control device in a Wireless Body Area Network (WBAN), and a secure wake-up method and a wake-up authentication code (WAC) generation method of the network device and the network control device are provided. The network device includes a wake-up circuit to receive a wake-up radio signal from a network control device using a Radio-Frequency Identification (RFID) receiver, to compare a WAC contained in the received wake-up radio signal with a WAC stored in advance, and to determine whether to wake up a main circuit unit, the network control device being contained in the WBAN; and the main circuit unit to be woken up in response to an interrupt signal from the wake-up circuit. | 05-05-2011 |
20110107076 | SYSTEM COMPRISING ELECTRONIC DEVICE AND EXTERNAL DEVICE STORING BOOT CODE FOR BOOTING SYSTEM - An electronic information system comprises an external storage device and an application processor. The external storage device stores boot code and the application processor is adapted to receive the boot code from the external storage device and to perform a system booting operation during a power-up operation by executing the boot code. | 05-05-2011 |
20110113226 | Distribution Of Software Updates - Methods, apparatuses, and systems for distribution of software updates are described. A file representing a difference between a first software stack and a second software stack and a task sequence may be received at a computer. The task sequence may represent instructions for installing the second software stack on the computer using the file and a stored image that represents the first software stack. The computer then may execute the task sequence to use the file and the stored image to install the second software stack on the computer. In one example, a second file representing a difference between the first software stack and a third software stack may be received by the computer, and the task sequence may include further instructions for installing the second software stack based on the first file, the second file, and the stored image. | 05-12-2011 |
20110113227 | ELECTRONIC EQUIPMENT AND BOOT METHOD, STORAGE MEDIUM THEREOF - An electronic equipment is provided, which includes a plurality of boot devices and a basic input/output system (BIOS). The BIOS is electrically coupled to the boot devices and used for recording driving parameters of the boot devices and a driving sequence of the driving parameters. The BIOS drives the boot devices by using the driving parameters according to the driving sequence, so as to perform a system booting operation of the electronic equipment. When any one of the boot devices accomplishes the system booting operation, the BIOS adjusts a driving parameter corresponding to the boot device as a first order of the driving sequence, so that the boot device becomes a first selected system booting device. Furthermore, a boot method for an electronic equipment and a storage medium thereof are provided. | 05-12-2011 |
20110113228 | Rules-Based, Mode-Driven Manager for Timer Bounded Arbitration Protocol Based Resource Control - An example apparatus includes a processor, a memory, and an interface that connects the processor, the memory, and a set of components. The set of components includes a first component configured to acquire a mode from members of an HA cluster and a second component configured to enforce mode pairing rules for members of the HA cluster. Once the desired mode pairing has been determined, a third component takes actions configured to either achieve the mode pairing according to rules for members of the HA cluster or to selectively force a hardware reset of one or more members of the HA cluster upon determining that a split brain scenario is possible based, at least in part, on the mode of the members of the HA cluster. The example apparatus therefore implements a rules-based manager for timer bounded arbitration protocol based resource control. | 05-12-2011 |
20110113229 | Method for Shortening the Boot Time of a Computer System - A computer system having an operating environment configured for enabling boot up in a relatively short time is disclosed. A hard disk is utilized to store a boot file. A run process list registers a process to be run during boot up. When the computer system is being booted up, if the run process list registers a process to load the boot file, a process control unit does not control a process management unit, so that the process is run as usual. If the process is not registered, the process management unit suspends the process. When the suspended process is called by another process later, the process control unit makes the process resumed on demand. | 05-12-2011 |
20110113230 | APPARATUS AND METHOD FOR SECURING AND ISOLATING OPERATIONAL NODES IN A COMPUTER NETWORK - A system and method for securing firmware from malware in a computer processing system having a trusted node daughterboard connected to at least one operational node motherboard. The method includes the steps of sending a power on signal from the trusted node daughterboard to the operational node motherboard when it is desired to utilize the operational node motherboard for computer processing purposes. Pre-boot data is then requested from the operational node motherboard and is sent from the trusted node daughterboard to the operational node motherboard to enable operation of the operational node motherboard. | 05-12-2011 |
20110113231 | SYSTEM AND METHOD FOR PROVIDING SECURE RECEPTION AND VIEWING OF TRANSMITTED DATA OVER A NETWORK - A method and system for securely opening an e-mail attachment in a computer processing environment having a trusted node daughterboard connected to at least one operational node motherboard with an e-mail processing system operatively coupled to the trusted node daughterboard. The method includes the steps of when an e-mail attachment is to be opened, sending a power on signal from the trusted node daughterboard to the operational node motherboard when it is desired to utilize the operational node motherboard for opening an e-mail attachment. Pre-boot data is then requested from the operational node motherboard and is sent from the trusted node daughterboard to the operational node motherboard to enable operation of the operational node motherboard for securely opening an e-mail attachment. | 05-12-2011 |
20110113232 | METHODS, APPARATUSES, AND COMPUTER PROGRAM PRODUCTS FOR MEMORY MANAGEMENT IN DEVICES USING SOFTWARE DEFINED RADIOS - An apparatus may include a processor configured to maintain a profile comprising data about software defined radio usage. The processor may be further configured to determine a subset of the plurality of software defined radios. The processor may be additionally configured to determine computing resources required for loading an available software defined radio that is not currently loaded into the memory based at least in part upon the maintained profile and the determined subset. The processor may also be configured to determine based at least in part upon the determined required computing resources whether sufficient computing resources are available for loading the available software defined radio into the memory. The processor may further be configured to initiate a reboot of loaded software defined radios if sufficient computing resources are not available for loading the available software defined radio. Corresponding methods and computer program products are also provided. | 05-12-2011 |
20110119474 | Serial Peripheral Interface BIOS System and Method - Various embodiments disclosed herein are directed to a serial peripheral interface-based (SPI-based) BIOS system for improved upgrading of a BIOS software image in a gaming machine. The system includes a flash BIOS chip and a SPI BIOS chip. The flash BIOS chip is operable to be written to by an Intel chipset for storage of an onboard Ethernet controller's information, wherein the flash BIOS chip may contain a new BIOS software image. The SPI BIOS chip comprises a traditional BIOS including gaming extensions to the BIOS. The SPI BIOS chip can be disabled from write actions at a jumper/circuit level. When a SPI BIOS write enable jumper circuit is ON, a write protect pin of the serial peripheral interface BIOS is in the disabled state. In this regard, when the write protect pin is in the disabled state, the SPI BIOS content may be updated to the new BIOS software image from a BIOS install compact flash. When the BIOS write enable jumper circuit is OFF, the write protect pin of the serial peripheral interface BIOS is in enabled state. In this regard, when the write protect pin is in the enabled state the serial peripheral interface BIOS content cannot be updated | 05-19-2011 |
20110119475 | GLOBAL SYNCHRONIZATION OF PARALLEL PROCESSORS USING CLOCK PULSE WIDTH MODULATION - A circuit generates a global clock signal with a pulse width modification to synchronize processors in a parallel computing system. The circuit may include a hardware module and a clock splitter. The hardware module may generate a clock signal and performs a pulse width modification on the clock signal. The pulse width modification changes a pulse width within a clock period in the clock signal. The clock splitter may distribute the pulse width modified clock signal to a plurality of processors in the parallel computing system. | 05-19-2011 |
20110119476 | HARDWARE RESET BUTTON EQUIVALENT SOFTWARE RESET METHOD FOR NETWORK DEVICE - A software reset method that can be used to reset a network device | 05-19-2011 |
20110119477 | MEMORY SYSTEM AND MEMORY MANAGEMENT METHOD INCLUDING THE SAME - A multi-processor system includes a first processor, a second processor communicable with the first processor, a first non-volatile memory for storing first codes and second codes to respectively boot the first and second processors, the first memory communicable with the first processor, a second volatile memory designated for the first processor, a third volatile memory designated for the second processor, and a fourth volatile memory shared by the first and second processors. | 05-19-2011 |
20110125990 | COMPUTING DEVICE AND METHOD FOR WIRELESS REMOTE BOOT IN A NETWORKED ENVIRONMENT - In some embodiments, a secure authenticated remote boot of computing device over a wireless network is performed in a pre-boot execution environment (PXE) using active management technology (AMT) for remote discovery. In these embodiments, a management engine (ME) may maintain full control of a wireless interface and a wireless connection as booting begins. The ME may relinquish control of the wireless interface after a PXE timeout, in response to a shutdown command, or once the device has booted. The ME controls the use of an operating system received from a remote location. | 05-26-2011 |
20110125991 | FAST RESTART ON A VIRTUAL MACHINE - Media, methods, and computer systems are provided for performing a quick restart of applications in a virtual machine of the computer system. The virtual machine is configured with a critical object array that identifies the critical applications. In response to a quick restart request, the garbage collector operates in a quick restart mode to remove all objects for each application that is not in critical object array. | 05-26-2011 |
20110125992 | SYSTEM TOOL PLACEMENT IN A MULTIPROCESSOR COMPUTER - A multiprocessor computer system comprises a plurality of nodes and an application placement module operable to place an application on a selected group of the compute nodes. The application placement module includes a system tool helper operable to manage operation of a system tool on the selected group of the compute nodes, the system tool operable to monitor execution of the application. Managing system tool operation comprises at least one of distributing, executing, and ending the system tool on one or more compute nodes. | 05-26-2011 |
20110125993 | DISPLAY APPARATUS AND CONTROL METHOD THEREOF - A display apparatus is provided, including: a signal processing unit which comprises at least one device, and processes a received image signal to display an image; a volatile memory unit which comprises a first memory area allotted to an application for displaying the image and a second memory area that is different from the first memory area; and a control unit which allots the second memory area to the at least one device if the application is not updated, and allots at least a part of the second memory area for updating the application if the application is updated. | 05-26-2011 |
20110125994 | METHODS AND SYSTEMS FOR SECURE ONLINE BROWSING - An external operating system (OS) that is separate from the internal OS of a computer is provided. The external OS may be stored on a USB device, a CD ROM, or other devices. The device that stores the external OS may be removable or non-removable, may have an internal flash memory of varying sizes, and may include browser software. The external OS, flash memory size and browser software may be customizable according to user requirements. The computer may boot up from the device into the external OS, rather than into the internal OS of the computer. Once the computer is booted up, the user has the ability to browse online, with all transactions occurring in the external OS, partitioned from the user's internal computer hard drive, thereby preventing infecting the computer by malware or other malicious software. | 05-26-2011 |
20110125995 | METHOD AND APPARATUS FOR DOWNLOADING SECURE MICRO BOOTLOADER OF RECEIVER IN DOWNLOADABLE CONDITIONAL ACCESS SYSTEM - A method and apparatus for downloading a Secure Micro (SM) bootloader of a receiver in a Downloadable Conditional Access System (DCAS) is provided. The method includes generating, by a transmitter, an SM bootloader for the receiver and adding the generated SM bootloader to firmware to be transferred to the receiver, sending, by the transmitter, the firmware to the receiver, and performing, by the receiver, registration by receiving the firmware, locating an SM bootloader in the firmware, and registering the located SM bootloader. In the DCAS, a receiver may download or install an SM bootloader through an online or offline procedure. | 05-26-2011 |
20110125996 | System And Method For Supporting Multiple Hardware Platforms With A Single Disk Image - Exemplary embodiments of the present invention disclosed herein relate to a method and system for providing data in response to a request. An exemplary method comprises receiving a request for data and determining whether the request contains a specific pattern of data intended to enable a patching process. The exemplary method further comprises providing a response containing patched data if the request contains the specific pattern of data and providing a response containing un-patched data if the request does not contain the specific pattern of data. | 05-26-2011 |
20110131399 | Accelerating Wake-Up Time of a System - A method for accelerating a wake-up time of a system is disclosed. The method includes scrubbing and making available for allocation a minimum amount of memory, executing a boot-up operation of an operating system stored on the system, and scrubbing and making available for allocation an additional amount of memory in parallel with and subsequent to the boot-up operation of the operating system. The system may include one or more nodes, each of the nodes having a minimum node resource configuration associated therewith that corresponds to a minimum number of processors included in a node that are required to be activated in order to activate the node. The system may further include one or more partitions, where each partition encompasses at least one node. Each partition may be assigned a priority in relation to other partitions, and the partitions may be successively activated based on the assigned priorities. | 06-02-2011 |
20110131400 | METHOD AND COMPUTER SYSTEM FOR THERMAL THROTTLING PROTECTION - An automatic thermal throttling protection method is described. a computer system executes a main BIOS for initializing an embedded controller when the computer system is power on or boots. And the sub BIOS of the embedded controller is also executed. The sub BIOS of the embedded controller obtains an upper temperature limit and a lower temperature limit set by the main BIOS, and obtains a temperature of the CPU through a thermal sensor. The sub BIOS of the embedded controller compares the temperature of the CPU with the upper temperature limit. When the temperature of the CPU is higher than the upper temperature limit, the sub BIOS sends a system control interrupt event to the main BIOS through the embedded controller. When receiving the SCI event, the main BIOS enables a throttling function to perform a throttling operation on the CPU or shuts down the computer system. | 06-02-2011 |
20110131401 | AUTHENTICATION SYSTEM FOR GAMING MACHINES AND RELATED METHODS - Various embodiments disclosed herein are directed to gaming devices having a secured basic input/output system (BIOS) and methods for determining the validity of the gaming device's BIOS. According to one embodiment, the gaming device includes a secured module for authenticating the BIOS of the gaming device. During the boot-up process, the secured module selects a challenge from a plurality of challenges, and the selected challenge is issued to the BIOS. The BIOS generates a response to the challenge, and the secured module determines whether the BIOS response matches the calculated response of the secured module. If the BIOS response matches the secured module response, the gaming device continues the boot process. Otherwise, the boot process is halted by the gaming device. | 06-02-2011 |
20110131402 | METHOD AND APPARATUS FOR SECURE EXECUTION USING A SECURE MEMORY PARTITION - A processor capable of secure execution. The processor contains an execution unit and secure partition logic that secures a partition in memory. The processor also contains cryptographic logic coupled to the execution unit that encrypts and decrypts secure data and code. | 06-02-2011 |
20110131403 | VERIFYING FIRMWARE - Systems, methods, and other embodiments associated with updating firmware for a chip are described. One example method may include performing an external verification of updated firmware received and stored external to the chip to determine if the updated firmware is authentic. Upon determining that the updated firmware is authentic, the updated firmware is loaded into the chip. An internal verification of the updated firmware within the chip is performed to determine that the updated firmware is authentic. The internal verification is assured to succeed based on the external verification. Because the internal verification will succeed, the chip avoids reverting to a default firmware. | 06-02-2011 |
20110138160 | STORAGE APPARATUS AND ITS PROGRAM PROCESSING METHOD AND STORAGE CONTROLLER - Even if each processor core uses the same logical address, a processing-target program corresponding to each processor core can be selected. A logical address of multiple address mapping tables is set to a same logical address in correspondence with an embedded OS program or a RAID management program, and a physical address is set to a different physical address in correspondence with the actual storage destination of an embedded OS program or a RAID management program. Each processor core, on start-up, uses a self address mapping table to execute address mapping processing with each processor core based on the same logical address, selects an embedded OS program or a RAID management program according to the physical address obtained in the address mapping processing, and executes processing according to the selected program. | 06-09-2011 |
20110138161 | INPUT/OUTPUT DEVICE INCLUDING A HOST INTERFACE FOR PROCESSING FUNCTION LEVEL RESET REQUESTS IN A SPECIFIED TIME - An I/O device includes a host interface configured to process function level reset (FLR) requests in a specified amount of time. The host interface includes a control unit and groups of configuration space registers, each group corresponding to a function. The host interface also includes application availability registers, each associated with a respective function, and which may indicate whether application hardware within the respective function is available for access by a corresponding application device driver. The I/O device also includes application hardware resources associated with a respective function. In response to receiving an FLR request of a particular function, the control unit may cause the associated application availability register to indicate that the application hardware within the particular function is not available to the driver. The control unit may reset the corresponding configuration space registers within a predetermined amount of time and reset the associated application hardware resources. | 06-09-2011 |
20110138162 | RECONFIGURABLE LOAD-REDUCED MEMORY BUFFER - A memory module can include a data buffer having a data bus interface and a dynamic random access memory (DRAM) coupled to the data buffer. The memory module may also include a switch connected in parallel with the data buffer, wherein the switch can selectively bypass the data buffer. In one example, the memory module also includes a registered buffer having an address bus interface, where the switch may selectively bypass the data buffer based on a program signal obtained from an address bus via the address bus interface. | 06-09-2011 |
20110138163 | DUAL-BOOT CONTROL METHOD AND DUAL-BOOT COMPUTER - There is provided a dual-boot control method for a personal computer capable of being connected with the Internet by way of a router in an information processor connected with a dedicated network. In this method, when the personal computer is booted, an MBR program and an OS program are read, prior to a HDD, from an attachable and detachable storage medium mounted in a storage medium mounting unit, and when the HDD is utilized, route setting is applied to the information processor, as part of an information transmission line; when the storage medium is utilized, route setting is implemented in such a way that the connection with the Internet is broken. Accordingly, there can be maintained the high security in which virus infection and hacking are eliminated. | 06-09-2011 |
20110138164 | DIGITAL BROADCAST RECEIVER AND BOOTING METHOD OF DIGITAL BROADCAST RECEIVER - A digital broadcast receiver and a booting method of the digital broadcast receiver are disclosed herein. A method of secure booting of a system in a digital broadcast receiver comprises aligning a plurality of interleaved portions to generate a digital signature, respectively, with an entire firmware image, generating a digital signature of each interleaved portion, selecting a specific interleaved portion, generating a first message digest to read a region of the selected interleaved portion in the entire firmware image and a second message digest from the digital signature of the selected interleaved portion and verifying the firmware image based on the first and second message digest and booting the system in the digital broadcast receiver. | 06-09-2011 |
20110138165 | SYSTEM AND METHOD FOR PHYSICAL TO VIRTUAL DISK RE-LAYOUT - A method and device may, in a computing system executing a operating system and having a mass storage device, rewrite the boot sector of the operating system on the storage device to execute a hypervisor operating system in a boot process, copy a file including the hypervisor kernel to a first sub-area on the storage device, copy software components of the hypervisor to a second sub-area on the storage device, boot to execute the hypervisor as an operating system, execute the operating system, retrieve information indicative of absolute mapping of sectors used by the operating system on the storage device, allocate for the sectors on a third sub-area of the mass storage device, perform a second boot to run the hypervisor as a host operating system, and execute the operating system as guest operating system. | 06-09-2011 |
20110138166 | Extensible Pre-Boot Authentication - In one embodiment, the present invention includes a method for obtaining a pre-boot authentication (PBA) image from a non-volatile storage that is configured with full disk encryption (FDE), and storing the PBA image in a memory. Then a callback protocol can be performed between a loader executing on an engine of a chipset and an integrity checker of a third party that provided the PBA image to confirm integrity of the PBA image, the PBA image is executed if the integrity is confirmed, and otherwise it is deleted. Other embodiments are described and claimed. | 06-09-2011 |
20110145558 | Virtual Bus Device Using Management Engine - A management engine may be used to trap configuration cycles during the boot process and thereafter in response to operating system enumeration. As a result, a virtual bus device can be created. The bus device may be used to provision software to the platform even when the operating system is corrupted or non-functional. | 06-16-2011 |
20110154005 | AUTOMATED BATTERY CALIBRATION - A computing device executes a boot process. During boot process execution, the computing device initiates automatic calibration of a battery connected to the computing device. | 06-23-2011 |
20110154006 | MECHANISM FOR DETECTING A NO-PROCESSOR SWAP CONDITION AND MODIFICATION OF HIGH SPEED BUS CALIBRATION DURING BOOT - Memory channel training parameters are function of electrical characteristics of memory devices, processor(s) and memory channel(s). Training steps can be skipped if the BIOS can determine that the memory devices, motherboard and processor have not changed since the last boot. Memory devices contain a serial number for tracking purposes and most motherboards contain a serial number. Many processors do not provide a mechanism by which the BIOS can track the processor. Described herein are techniques that allow the BIOS to track a processor and detect a swap without violating privacy/security requirements. | 06-23-2011 |
20110154007 | Low energy boot options for devices - A method includes determining an amount of energy in a consumable energy source, such as a battery, that forms part of a device. The method further includes facilitating selection of a next software boot mode for the device from a plurality of possible software boot modes based at least on the determined amount of energy in the consumable energy source. The next software boot mode can be, by example, one of booting a reduced energy user interface enabling the composition and storage of at least one message, booting a reduced energy user interface with a communication protocol stack enabling the composition and transmission of at least one message, and booting a communication protocol stack enabling the transmission of at least one stored message. | 06-23-2011 |
20110154008 | ELECTRONIC DEVICE AND METHOD FOR BOOTING UP AND SHUTTING DOWN THE ELECTRONIC DEVICE - A method for booting up and shutting down an electronic device is applied in the electronic device. The electronic device includes a processor, a first storage, and a second storage. The speed of the processor accessing data from the first storage is faster than the speed of the processor accessing data from the second storage. The second storage stores the boot data for booting up the electronic device. The method includes: receiving signals for booting up the electronic device; detecting whether the first storage stores the boot data; and obtaining the boot data from the first storage to boot up the electronic device if the first storage stores the boot data. A related electronic device is also provided. | 06-23-2011 |
20110154009 | REMOTE MANAGEMENT OF UEFI BIOS SETTINGS AND CONFIGURATION - In an information handling system (IHS), remote management of basic input/output system (BIOS) settings and configuration includes maintaining a BIOS setting/configuration database, providing an application to communicate a BIOS setting/configuration from the database to a BIOS system, determining whether the BIOS setting/configuration communicated from the database to the BIOS system is a special BIOS configuration capsule packet, and validating BIOS setting/configuration. | 06-23-2011 |
20110161645 | CONTENT SECURING SYSTEM - In a method for securing content in a system containing a security processor configured to control access to the content by a main processor, in which main processor being configured to send heartbeats to the security processor, a determination as to whether at least one heartbeat was received within a predicted time interval is made and in response to a determination that at least one heartbeat was not received with the predicted time interval, access to the content by the main processor is ceased. | 06-30-2011 |
20110161646 | Method for performing quick boot and general boot at bios stage - A method for performing a quick boot and a general boot at a basic input output system (BIOS) stage is described. A computer is powered on. An embedded controller firmware or a BIOS determines whether a quick boot key is pressed. If the quick boot key is not pressed, a boot flag is changed from Quick Boot to General Boot. If the quick boot key is pressed, the BIOS determines whether the boot flag is set to Quick Boot. If it is determined that the boot flag is set to Quick Boot, an initialization of drivers preset by the quick boot is performed, and uninitialized drivers are initialized at a stage when an operating system is started. If it is determined that the boot flag is set to General Boot, an initialization of all drivers is performed. | 06-30-2011 |
20110161647 | BOOTABLE VOLATILE MEMORY DEVICE, MEMORY MODULE AND PROCESSING SYSTEM COMPRISING BOOTABLE VOLATILE MEMORY DEVICE, AND METHOD OF BOOTING PROCESSING SYSTEM USING BOOTABLE VOLATILE MEMORY DEVICE - A bootable volatile memory device comprises a volatile memory area configured to be written to and read from by a host processor, a boot code area configured to store bootstrap code before a boot procedure is performed by the host processor, a first chip select terminal configured to output a signal used as a chip select signal where the host processor performs the boot procedure by reading the bootstrap code from the boot code area, and a second chip select terminal configured to output a signal used as a chip select signal where the host processor writes and reads data to and from the volatile memory area. | 06-30-2011 |
20110161648 | SOFTWARE LOADING METHOD AND APPARATUS - A method and an apparatus that enable loading of computer programs to a trusted computing platform. The computer program loading is enabled by executing a first program loader ( | 06-30-2011 |
20110161649 | SYSTEMS AND METHODS FOR BOOTING A BOOTABLE VIRTUAL STORAGE APPLIANCE ON A VIRTUALIZED SERVER PLATFORM - One embodiment is a method for booting a bootable virtual storage appliance on a virtualized server platform. One such method comprises: providing a virtual storage appliance on a server platform, the virtual storage appliance configured to manage a disk array comprising a plurality of disks, and wherein at least one of the disks comprises a hidden boot partition having a boot console; powering up the server platform; loading boot code on the server platform; loading the boot console from the hidden boot partition; and the boot console loading boot components for a virtualization environment. | 06-30-2011 |
20110161650 | PROCESSOR SYSTEM - An electronic circuit includes a more-secure processor having hardware based security for storing data. A less-secure processor eventually utilizes the data. By a data transfer request-response arrangement between the more-secure processor and the less-secure processor, the more-secure processor confers greater security of the data on the less-secure processor. A manufacturing process makes a handheld device having a storage space, a less-secure processor for executing modem software and a more-secure processor having a protected application and a secure storage. A manufacturing process involves generating a per-device private key and public key pair, storing the private key in a secure storage where it can be accessed by the protected application, combining the public key with the modem software to produce a combined software, signing the combined software; and storing the signed combined software into the storage space. Other processes of manufacture, processes of operation, circuits, devices, wireless and wireline communications products, wireless handsets and systems are disclosed and claimed. | 06-30-2011 |
20110161651 | DETERMINING ELECTRICAL COMPATIBILITY AND/OR CONFIGURATION OF DEVICES IN A PRE-BOOT ENVIRONMENT - In at least some embodiments, a system comprises a plurality of electrical devices and management logic coupled to the electrical devices. While the electrical devices are each in a pre-boot environment, the management logic obtains information from the electrical devices and uses the information to determine electrical compatibility of, and/or configure, the electrical devices. | 06-30-2011 |
20110167249 | COMPUTER SYSTEM AND METHOD CAPABLE OF REMOTELY RESTORING OPERATING SYSTEM - A computer system and a method for remotely restoring, upgrading, or booting an operating system (O.S). A communication unit communicates with an external device in which a restoring image of the operating system is stored. A user's input request for initialization, causes a controller to perform an initialization according to a power-on input, including checking whether or not a request for restoring the O.S. has been received from a user prior to starting a boot of the operating system. If a request for restoring the operating system is received, the restoring image stored in the external device is accessed through the communication unit to restore the operating system installed in the computer system. | 07-07-2011 |
20110167250 | METHODS FOR REMOTE PROVISIONING OF ELETRONIC DEVICES - There is provided a method and system to automatically provide software and/or firmware updates to the electronic devices, particularly mobile devices used by consumers such as portable health-care data interchange devices. There is also provided a method and system of updating software in electronic devices without requiring a wired data interface to affect changes. There is also provided a method and system for tracking the configuration of electronic devices that are sold to and configured by particular consumers, especially consumers/patients using electronic devices related to health care. Further, there are also provided a methods and systems for integrating the purchase, and ordering, and software configuration of electronic devices. | 07-07-2011 |
20110167251 | INFORMATION PROCESSING APPARATUS AND CONTROL METHOD THEREOF - An information processing apparatus including an apparatus body and a system control apparatus. The apparatus body includes a first processing unit that executes an arithmetic operation; a first storage unit that stores configuration information of the first processing unit; and a first control unit that controls a readout of the configuration information. The system control apparatus includes a second storage unit that stores a program for controlling the system control apparatus and diagnosis procedures of the information processing apparatus; a second processing unit that reads the program and executes the program; and a second control unit that detects the first processing unit by reading the configuration information via the first control unit on the basis of the diagnosis procedures stored in the second storage unit simultaneously with the execution of the program by the second processing unit. | 07-07-2011 |
20110167252 | Separate power island for high performance processor that reboots to second boot sector - Separate power island for high performance processor. A multi-processor design is presented in which each of the processors is implemented in separately powered portions of a circuitry (e.g., an integrated circuit). One of the processors can be a main application processor, and another of the processors can be a baseband processor. In addition, the each of the processors can be implemented using different types of circuitry (e.g., one of the processors [such as the main application processor] is implemented using higher performance/higher leakage circuitry that another of the processors [such as the baseband processor]). One of the processors (e.g., main application processor) can be powered down when not needed thereby providing energy/power conservation which can be vital is handheld communication device applications such as wireless handheld communication devices. | 07-07-2011 |
20110167253 | Multi-processor systems and methods thereof - Multi-processor systems and methods thereof are provided. In an example, the multi-processor system may include a boot memory including a plurality of boot codes, each of the plurality of boot codes configured to facilitate an initialization process at one of a plurality of intellectual property (IP) blocks, each of the plurality of IP blocks having shared access to the boot memory. In another example, the multi-processor system may receive, from a first processor, a request to provide one of a plurality of boot codes from a boot memory, the received request sent in response to a system initializing signal, may read the requested boot code from the boot memory and may transfer, from a second processor, the read boot code to the first processor. | 07-07-2011 |
20110173426 | METHOD AND SYSTEM FOR PROVIDING INFORMATION TO A SUBSEQUENT OPERATING SYSTEM - A method for transferring execution to a subsequent operating system. The method includes rebooting a computer system. Rebooting the computer system includes initializing an in-kernel boot loader. The in-kernel boot loader executes in a kernel of an initial operating system. Rebooting the computer system further includes populating, by the in-kernel boot loader, an initialization data structure using system data gathered during the execution of the initial operating system, loading, by the in-kernel boot loader, the subsequent operating system, and transferring control of the computer system from the initial operating system to the subsequent operating system. The subsequent operating system accesses the initialization data structure to identify available hardware. The method further includes executing the subsequent operating system on the available hardware of the computer system. | 07-14-2011 |
20110173427 | System and Method for Personalizing Devices - A system and method for personalizing a device is disclosed herein. A user configures a plurality of settings associated with a device. Each setting is identified as a user setting or a platform setting. The user settings are stored in a personalization virtual object with the user. Platform settings are stored separately from the personalization virtual object. Software for personalizing a device provided on a computer readable medium is disclosed herein. The software comprises a code for execution on a central processing unit operable to configure a plurality of settings associated with a device by a user. The software identifies each setting as a user setting or a platform setting. The user settings are stored in a personalization virtual object associated with the user, and the platform settings are stored separately from the personalization virtual object. | 07-14-2011 |
20110173428 | COMPUTER SYSTEM, METHOD FOR BOOTING A COMPUTER SYSTEM, AND METHOD FOR REPLACING A COMPONENT - The invention relates to a computer system ( | 07-14-2011 |
20110173429 | METHOD AND APPARATUS TO MINIMIZE COMPUTER APPARATUS INITIAL PROGRAM LOAD AND EXIT/SHUT DOWN PROCESSING - A method to reduce and thereby improve the initial program load time of a computing apparatus operating system and thus provides for near instantaneous user interaction. When practicing the instant invention, a computing apparatus operating system or application processing component is loaded neither sequentially nor completely, but rather on an as required basis. The invention's “required only” loading of processing components persist through subsequent operation and shut down of the computing apparatus with each loaded task creating a checkpoint record of processing modifications to non-volatile memory. Such checkpointing allows shut down processing of the apparatus to consist of merely flushing memory buffers in the apparatus checkpointed non-volatile memory of the apparatus to permanent storage and powering off of the apparatus, with subsequent initial program load (IPL) sequencing referencing the checkpointed records to minimize future system initialization elapsed time. | 07-14-2011 |
20110173430 | IT Automation Appliance Imaging System and Method - A system, method, and computer program product for harvesting an image from a local disk of a managed endpoint to an image library is provided. In an embodiment of the method for harvesting an image, a managed endpoint is provided with a boot image that causes the endpoint to instantiate a RAM disk and execute the boot image from the RAM disk. The boot image is used to harvest an image by determining data on a local disk of the managed endpoint to be included in the image that are not already stored in the image library. In one embodiment, this is done by comparing hashes calculated on the data on the local disk to hashes of data in the image library. The data not already stored in the image library are then copied to the image library. | 07-14-2011 |
20110179259 | METHOD FOR INTEGRATING OPERATING SYSTEM INTO BIOS CHIP AND METHOD FOR BOOTING OPERATING SYSTEM INTEGRATED INTO BIOS CHIP - A method for integrating an operating system (OS) into a basic input output system (BIOS) chip and to boot a computer using programs stored in the BIOS. A bootable image file of the OS is integrated with a virtual disk program and other BIOS instructions and stored into the BIOS chip. When the computer is powered up and upon the condition that an OS in a hard disk of a computer system is damaged, the OS in the BIOS chip is executed. | 07-21-2011 |
20110179260 | METHOD FOR INTEGRATING OPERATING SYSTEM INTO BIOS CHIP AND METHOD FOR BOOTING OPERATING SYSTEM FROM SERVER - A method for integrating an operating system (OS) into a basic input output system (BIOS) chip and to boot a computer system using an image file stored in a server. A bootable image file of the OS is integrated with a virtual disk program and other BIOS instructions and stored into the BIOS chip. When the computer system is powered up, the OS stored in the BIOS can be booted to allow the another OS stored in the server to be downloaded into the harddisk and executed. The BIOS OS can also allow an OS stored on the local drive to be executed. | 07-21-2011 |
20110179261 | METHOD FOR CONTROLLING NETWORK CONTROLLER, NON-TRANSITORY COMPUTER READABLE RECORDING MEDIUM, AND INFORMATION PROCESSING APPARATUS - A method for controlling a network controller, including: preferentially booting a network controller assignment controlling driver before at least one of a network controller controlling driver for EFI and a network controller controlling driver for legacy BIOS initializes the network controller, the network controller assignment controlling driver deciding whether to operate the network controller by either of the EFI or the legacy BIOS, based on preset setting data of the network controller; and exclusively acquiring a driver providing a protocol used for initialization of the network controller by the network controller assignment controlling driver when the setting data of the network controller is an instruction to initialize the network controller for the legacy BIOS. | 07-21-2011 |
20110179262 | APPARATUS AND METHOD FOR BOOTING IN COMPUTER DEVICE WITH BUILT-IN COMMUNICATION MODULE - An apparatus and method control booting in a mobile device with a built-in communication module to prevent a service user from using the mobile device for other purposes and to prevent the service user from subscribing to another service provider. A method includes determining, during a booting operation, whether the communication module is mounted with a USIM. A forced booting termination message is displayed if the communication module is not mounted with the USIM. And power supply is interrupted after a predetermined time from displaying the forced booting termination message. | 07-21-2011 |
20110179263 | STORAGE SYSTEM FOR A STORAGE POOL AND VIRTUAL VOLUMES - This invention provides a storage system to store data used by computers. A storage system coupled to a computer and a management apparatus, includes storage devices accessed by the computer and a control unit that controls the storage devices, in which the control unit performs the following operations: setting, in the storage devices, a first virtual device including a first logical device; setting a second virtual device which including a second logical device, which is a virtual volume accessed by the computer; allocating an address of the first logical device to the second logical device; and changing the allocation to change storage areas of the virtual volume. | 07-21-2011 |
20110179264 | Clearing Secure System Resources In A Computing Device - Systems and methods of clearing system resources are disclosed. One example method includes the step of detecting a failure to clear a secure portion of a system resource in a device. The method also includes the step of powering off the system resource for a period of power-off time that is sufficient to clear data from the system resource, where the power off is responsive to the failure detection. The method also includes the step of unlocking the secure portion of the system resource, where the unlock is responsive to the period of power-off time having elapsed. | 07-21-2011 |
20110185162 | METHOD AND SYSTEM TO TRANSMIT CODE TO A SYSTEM ON A CHIP (SOC) - A method and system to transmit code to a System on Chip (SOC) from a host processor using a host-side driver is provided herein. The SOC and host processor are coupled by a bus. The host driver receives an overlay from an application layer and stores the overlay. The host driver receives an IOCTL to be transmitted to the SOC. The host driver determines whether an input/output control (IOCTL) value of the IOCTL to be transmitted to the SOC corresponds to an IOCTL value in one of the stored overlays. The host driver transmits an overlay to the SOC if the IOCTL value of the IOCTL to be transmitted is equal to at least one IOCTL value in the overlay. The host driver then transmits the IOCTL to the SOC. | 07-28-2011 |
20110185163 | MULTI-ROOT PCI EXPRESS SWITCH, BOOT METHOD THEREOF, AND MULTI-ROOT PCI MANAGER PROGRAM - Provided is an MRA (multi-root aware) PCI express switch accommodating a plurality of root complexes. The MRA PCI express switch includes: a setting register storing necessary information to set a PCI tree based on a switch connection topology and a physical connection state; and a virtual switch bridge controller storing necessary information to establish a virtual PCI tree, irrespective of a status of the setting register. The root complexes can be booted based on the information in the virtual switch bridge controller. | 07-28-2011 |
20110185164 | Information processing apparatus and boot completion notification program - In an information processing apparatus, a stopwatch unit detects boot-up of an information processing apparatus, and measures as a boot time a time elapsed from the detection of the boot-up. A determination unit determines whether the boot time has reached notification timing. An output unit outputs a boot completion notification when the determination unit determines that the boot time has reached the notification timing indicated by boot completion notification timing information as a result of comparison therebetween. | 07-28-2011 |
20110185165 | INFORMATION PROCESSING DEVICE, INFORMATION PROCESSING METHOD, INFORMATION PROCESSING PROGRAM, AND INTEGRATED CIRCUIT - It is possible to update and re-seal sealed data having a usability condition of matching with predetermined terminal environment information during a secure boot without rebooting a terminal when a program using the sealed data is updated. An information processing terminal ( | 07-28-2011 |
20110191573 | MULTI-MOTHERBOARD SERVER SYSTEM - A multi-motherboard server system, having a management board and a plurality of motherboards, is disclosed. The multi-motherboard server system is applicable to a sever system. The management board has a BMC, and the motherboards are respectively connected to the management board. The BMC can transmit data to a far-end control system through sideband communication. | 08-04-2011 |
20110191574 | METHOD AND APPARATUS FOR BINDING TPM KEYS TO EXECUTION ENTITIES - A method and apparatus for binding trusted platform module (TPM) keys to execution entities are described. In one embodiment, the method includes the receipt of an authorization request issued by an execution entity for authorization data. According to the authorization request, the execution entity may be measured to generate an entity digest value. Once the entity digest value is generated, a platform reference module may grant the authorization request if the entity digest value verifies that the execution entity is an owner of the key held by the TPM. Accordingly, in one embodiment, a platform reference module, rather than an execution entity, holds the authorization data required by a TPM to use a key owned by the execution entity and held within sealed storage by the TPM. Other embodiments are described and claimed. | 08-04-2011 |
20110191575 | IC CHIP, INFORMATION PROCESSING APPARATUS, SOFTWARE MODULE CONTROL METHOD, INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING METHOD, AND PROGRAM - An IC chip, an information processing apparatus, a software module control method, an information processing system, an information processing method, and a program for allowing a plurality of software modules to ensure their respective security when operating are provided. An information processing system is provided to include a reader/writer and a portable communication terminal accessed by the reader/writer through near-field communication. In the portable communication terminal, a memory access management module stores a map regarding a plurality of software modules J and F for handling information exchanged in accordance with different noncontact communication principles while managing the software modules J and F based on the map. Another software module A performs mapping of the map for permitting or inhibiting the operations of the plurality of software modules. | 08-04-2011 |
20110197052 | Fast Machine Booting Through Streaming Storage - Described is a technology by which a virtual hard disk is maintained between a far (e.g., remote) backing store and a near (e.g., local) backing store, which among other advantages facilitates fast booting of a machine coupled to the virtual hard disk. Read requests are serviced from the near backing store (e.g., a differencing layer) when the data is available thereon, or from the far backing store (e.g., a base layer) when not. The near backing store may be configured with a cache layer that corresponds to the base layer and a write differencing layer that stores writes, or a single differencing layer may be used for both caching read data and for storing write data. A background copy operation may be used to fill the cache until the far backing store data is no longer needed. | 08-11-2011 |
20110197053 | SIMPLIFYING MANAGEMENT OF PHYSICAL AND VIRTUAL DEPLOYMENTS - A deployment system allows an administrator to convert virtual deployments to physical deployments so that an administrator can easily move between the virtual and physical world. The deployment system allows an administrator to directly deploy an operating system image in the form of a VHD file to the hard disks of a physical machine as a directly bootable and natively installed operating system. Thus, the deployment system relieves administrators from separately managing physical and virtual deployment images. Instead, administrators can manage only virtual deployment images and convert virtual images to physical deployments as needed. | 08-11-2011 |
20110197054 | METHOD AND SYSTEM FOR NAND FLASH SUPPORT IN AN AUTONOMOUSLY LOADED SECURE REPROGRAMMABLE SYSTEM - A boot code may be segmented to allow separate and independent storage of the code segments in a manner that may enable secure system boot by autonomous fetching and assembling of the boot code by a security sub-system. The code fetching may need to be done without the main CPU running on the chip for security reasons. Because the boot code may be stored in memory devices that require special software application to account for non-contiguous storage of data and/or code, for example a NAND flash memory which would require such an application as Bad Block Management, code segments stored in areas guaranteed to be usable may enable loading remaining segment separately and independently. Each of the code segments may be validated, wherein validation of the code segments may comprise use of hardware-based signatures. | 08-11-2011 |
20110197055 | FIRMWARE STORAGE MEDIUM WITH CUSTOMIZED IMAGE - In at least some embodiments, a computer system includes a processor and a firmware storage medium in communication with the processor. The firmware storage medium stores a default image invoked during a boot process and selectively stores a customized image. If the customized image is stored by the firmware storage medium, the boot process selectively substitutes at least part of the default image with at least part of the customized image. | 08-11-2011 |
20110202751 | USER TERMINAL, SERVER AND CONTROLLING METHOD THEREOF - A user terminal is provided, including a communication interface unit which receives an application content at least part of which is encrypted, a storage unit which stores the received application content, a decryption unit which decrypts the application content, a user interface unit which receives a command to execute the application content, and a controlling unit which controls the decryption unit to install an application content stored in the storage unit in an encrypted state and decrypt the installed application content according to the execution command. Accordingly, an application, which is an executable content, may be downloaded and installed in a user terminal, and used and updated safely. | 08-18-2011 |
20110202752 | SEMICONDUCTOR DEVICE INCLUDING ENCRYPTION SECTION, SEMICONDUCTOR DEVICE INCLUDING EXTERNAL INTERFACE, AND CONTENT REPRODUCTION METHOD - A secure LSI device | 08-18-2011 |
20110208953 | EVENT TIME MANAGEMENT IN AN ELECTRIC VEHICLE CHARGING STATION WITHOUT A BATTERY-BACKED REAL TIME CLOCK - An electric vehicle charging station, which does not include a battery-backed Real Time Clock, is in a charging station network managed by a charging station network server. Upon booting, the charging station requests actual real time from a remote source. While the charging station has not received the actual real time, it records the time of charging station specific events in a local system time format that resets when the charging station loses power. The charging station maintains the events recorded in their local system time until actual time is received. When actual real time is received, the charging station synchronizes its local system clock with the actual real time and converts the time of each event into real time format. When actual time is received, the charging station converts the time of each event into real time format. After the time of the events are converted to real time format, they are communicated to the charging station network server for further processing. After synchronizing its local clock with actual real time, the charging station records the time of any subsequent events in actual real time. | 08-25-2011 |
20110208954 | IMPLEMENTING KNOWN SCRAMBLING RELATIONSHIP AMONG MULTIPLE SERIAL LINKS - A method and circuit for implementing known scrambling relationship among multiple serial links, and a design structure on which the subject circuit resides are provided. A transmit Linear Feedback Shift Register (LFSR) is provided with each of the multiple serial links for scrambling transmitted data. A receive Linear Feedback Shift Register (LFSR) is provided with each of the multiple serial links for descrambling received data. Each of the transmit LFSRs is initialized to a unique value. Each transmit LFSR conveys a current unique value to a receive LFSR for synchronizing the transmit LFSR and receive LFSR to begin scrambling and descrambling data. | 08-25-2011 |
20110208955 | MACHINE-READABLE STORAGE MEDIA FOR DISPLAY OF A BASIC INPUT/OUTPUT SYSTEM (BIOS) PRODUCTIVITY DISPLAY - Example embodiments relate to a machine-readable storage medium encoded with instructions executable by a processor of a computing device including a display device. The machine-readable storage medium may include instructions that access a stored indication upon boot-up of the computing device using a Basic Input Output System (BIOS). In addition, the machine-readable storage medium may include instructions that determine, using the stored indication, whether an operating system (OS) of the computing device exited properly, and instructions that display a BIOS productivity display using the display device when it is determined that the computing device exited properly. Still further, the machine-readable storage medium may include instructions that permit the OS to display a recovery display when it is determined that the OS did not exit properly. | 08-25-2011 |
20110208956 | CONTROL DEVICE FOR A VEHICLE AND METHOD FOR A DATA UPDATE FOR A CONTROL DEVICE FOR A VEHICLE - A control device for a vehicle and a method for a data update for a control device for a vehicle are provided, in which a first memory is provided that has a first area in which a bootloader is provided and that has a second area in which at least one application program is provided. Furthermore, a second memory is provided, in which first data for the at least one application program are provided. Furthermore, an interface is provided that provides second data for an update at least of one part of the first data. In addition, a control circuit is provided that calls up the bootloader for the update of the at least one part of the first data by the second data. The bootloader extracts from the second area of the first memory third data that indicate the third area of the second memory in which the second data for the update are to be written. | 08-25-2011 |
20110208957 | BIOS BOOTABLE RAID SUPPORT - A computing apparatus comprises a persistent storage comprising a system code that implements Redundant Array of Independent Disks (RAID) protection on a boot volume. | 08-25-2011 |
20110213953 | System and Method for Measuring Staleness of Attestation Measurements - A method is provided for determining with a first device, staleness of attestation measurements at a second device. The method includes booting up the second device at a first time, the second device having a communication portion, a security portion, a basic input/output system and a trusted protection module. Further, the method includes generating an initial counter based on the booting up of the second device at the first time. A current counter is then generated based on a second time after the first time. The method additionally includes providing a request to the second device from the first device, the request requesting booting information and current information, the booting information being based on the initial counter, the current information being based on the current counter. Still further, the method includes providing a response to the first device from the second device, the response including the booting information and the current information. Finally, the method includes determining, via the first device, the generated initial counter and the current counter based on the response. | 09-01-2011 |
20110213954 | METHOD AND APPARATUS FOR GENERATING MINIMUM BOOT IMAGE - A boot image generating method including erasing code used to execute an application that is executing in a device at a predetermined time from a volatile memory of the device; storing data used to execute the application in a non-volatile memory; and generating a boot image including at least one selected from the group consisting of a code used to execute an Operating System (OS) of the device and data used to execute the OS at the predetermined time. | 09-01-2011 |
20110213955 | MEMORY INITIALIZATION METHOD, NON-TRANSITORY COMPUTER-READABLE RECORDING MEDIUM RECORDING AN INITIALIZATION PROGRAM, AND INFORMATION PROCESSING APPARATUS - A memory initialization method in a boot sequence of an information processing apparatus having a memory and a plurality of processors sharing the memory, the memory initialization method includes initializing a first area of the memory required for an operation of the firmware and a second area of the memory required for a kernel activation by executing the firmware stored in a first storage by a first processor, storing the kernel to the initialized second area from a second storage by executing the firmware by the first processor, making a second processor activate and execute the kernel stored in the second area by executing the firmware by the first processor, and initializing a remaining area of the memory by the kernel executed by the second processor and the firmware executed by the first processor in parallel. | 09-01-2011 |
20110219223 | Power control system, power control method, and computer system thereof - A power control system, a power control method, and a computer system thereof are disclosed. The power control system comprises a control module for receiving a control signal. A power management module is used for receiving a power signal and outputting an auxiliary power. A first switch module receives the control signal and controls the power management module to output the auxiliary power to the control module by the control signal. A second switch module controls the first switch module. After receiving the control signal, the control module determines whether the control signal is continuously received until a predetermined time. If yes, the control module controls the first switch module to transmit the auxiliary power continuously with the second switch module and receives the power signal to execute a boot procedure. | 09-08-2011 |
20110219224 | COMPUTER SYSTEM AND ITS HW ABSTRACTION METHOD - A computer system includes an ACPI (Advanced Configuration and Power Interface) that abstracts HWs (hardwares) as objects arranged on an ACPI tree which is a virtual space, an OS (Operating System) that recognizes a configuration of the HW through the ACPI, a virtual HW provided between the ACPI and HW and includes a memory area in which locations storing information for each HW are arranged in the same arrangement as the objects on the ACPI tree, and a BIOS (Basic Input/Output System) that previously refers to the HW and stores information for each HW in the memory area of the virtual HW at a location corresponding to the HW. The ACPI refers not directly to the HW but to the memory area of the virtual HW to obtain information for each HW, thereby allowing the OS to recognize the HW configuration from the information for each HW. | 09-08-2011 |
20110225404 | METHOD FOR BOOTING PORTABLE OBJECTS WITH MULTIPLE COMMUNICATION INTERFACES - A boot sequence method comprises a determination step | 09-15-2011 |
20110225405 | MANAGING A COMPUTING DEVICE - Methods, computer-readable media, and systems are provided for managing a target computing device. One method for managing the target computing device includes loading a service operating system into non-persistent memory of the target computing device having a persistent memory that is initially devoid of a functional operating system. The service operating system includes an embedded global shell agent. The global shell agent is executed thereby configuring the target computing device for remote management within an interactive command shell function before loading an operating system into persistent memory of the target computing device. The global shell agent is operable to examine and modify filesystems on the target computing device. | 09-15-2011 |
20110225406 | System and Method for Pre-Operating System Encryption and Decryption of Data - Systems and methods for reducing problems and disadvantages associated with traditional approaches to encryption and decryption of data are provided. An information handling system may include a processor, a memory communicatively coupled to the processor, an encryption accelerator communicatively coupled to the processor, and a computer-readable medium communicatively coupled to the processor. The encryption accelerator may be configured to encrypt or decrypt data in response to a command from the processor to perform an encryption or decryption task upon data associated with an input/output operation. The computer-readable medium may have instructions stored thereon, the instructions configured to, when executed by the processor: (i) monitor for input/output operations occurring prior to loading of an operating system into the memory; and (ii) in response to detection of an input/output operation, communicate a command to the encryption accelerator to perform an encryption or decryption task upon data associated with an input/output operation. | 09-15-2011 |
20110225407 | System and Method for Recovering From an Interrupted Encryption and Decryption Operation Performed on a Volume - Systems and methods for reducing problems and disadvantages associated with traditional approaches to encryption and decryption of data are provided. An information handling system may include a processor, a memory communicatively coupled to the processor, and a computer-readable medium communicatively coupled to the processor. The computer-readable medium may have instructions stored thereon, the instructions configured to, when executed by the processor: (i) periodically store, during an encryption or decryption operation performed on the computer-readable medium, one or more variables indicative of an encryption status of a volume of the computer-readable medium; (ii) determine, based on the one or more variables, whether the volume is in a partially encrypted or decrypted state; and (iii) in response to a determination that the volume is in a partially encrypted or decrypted state, boot from the volume and continue the encryption or decryption operation. | 09-15-2011 |
20110225408 | CACHE BOOT MECHANISM - A block device driver performs system boot using cache data and thus provides a mechanism that reduces disk/IO waiting time during system boot. | 09-15-2011 |
20110225409 | Method and Apparatus for Software Boot Revocation - A composite customer ID (CCID) is stored in the OTP memory of integrated circuit chipsets used by a number of different customers. The CCID includes individual customer IDs (CIDs) at defined index positions, each corresponding to a different customer. Each chipset allows or disallows software booting, based reading a certificate index value from a given customer's certificate, reading an OTP CID from OTP, as pointed to the by certificate index value, and evaluating the OTP CID with a certificate CID read from the certificate. Thus, while CCID carries information for a plurality of customers, each customer's certificate points only to that customer's OTP CID, which can be changed to revoke that customer's certificate without revoking the other customers' certificates. The CCID also may include a version number, where the chipsets allow or disallow software booting based on evaluating the certificate version number in view of the CCID version number. | 09-15-2011 |
20110225410 | ELECTRONIC DEVICE AND BOOTING UP METHOD - An electronic device includes a micro control unit (MCU), a non-volatile random access memory (NVRAM), and a watch dog. The electronic device detects a standby instruction and then enters a standby mode according to the standby instruction. A boot loader stored in the NVRAM boots the electronic device when the MCU detects a starting instruction. The electronic device triggers the watch dog to time a preset period when the boot loader boots the electronic device and boots up with a fast mode. The electronic device determines if the watch dog times out, and boots up with a normal mode when the electronic device does not boot up with the fast mode before the watch dog times out. | 09-15-2011 |
20110225411 | STORAGE PROCESSING DEVICE AND PROGRAM | 09-15-2011 |
20110225412 | BOOTING AN OPERATING SYSTEM OF A SYSTEM USING A READ AHEAD TECHNIQUE - In one embodiment, the present invention includes a method for generating a list of files accessed during an operating system (OS) boot process to profile the OS boot process, and optimizing the list of files to generate an optimized file list for use in future OS boot processes, where the optimizing is according to a first optimization technique if the files were accessed from a solid state medium and according to a second optimization technique if the files were accessed from a rotating medium. Other embodiments are described and claimed. | 09-15-2011 |
20110225413 | METHOD, SYSTEM AND ARTICLE OF MANUFACTURE FOR SYSTEM RECOVERY - Provided are a method, system, and article of manufacture for system recovery. An operating system and a backup copy of the operating system are both maintained in a partition of a computational device. A boot loader receives an indication to load the backup copy of the operating system. The boot loader loads the backup copy of the operating system. The computational device is rebooted with the loaded backup copy of the operating system. | 09-15-2011 |
20110231638 | Preinstalled operating system instances stored on removable storage devices - One or more removable storage devices inserted into a computing device store a number of different preinstalled operating system instances. The computing device has a number of logical partitions. Each logical partition is independently executed on the computing device. Each logical partition is mapped to and uses one of the different preinstalled operating system instances. As such, a given preinstalled operating system instance to which a given logical partition is mapped is used by the given logical partition without ever having to be installed on the given logical partition. | 09-22-2011 |
20110231639 | POWER LOCK-UP SETTING METHOD AND ELECTRONIC APPARATUS USING THE SAME - A power lock-up setting method and an electronic apparatus using the same are provided. The power lock-up setting method includes following steps. A trigger signal generated by a pressed power switch is received by a pin of a GPIO interface and transmitted to a control unit, such that the control unit starts the electronic apparatus, and a power-on-self-test of a logic processing unit is performed by a processing module. Whether the GPIO interface is set to a power lock-up state is determined by the logic processing unit. If so, a level of the pin is set to a disable level. An operating system is loaded by the processing module to perform an operating system booting process. Accordingly, when the electronic apparatus is under an operating environment of the operating system, the trigger signal is forbidden to be transmitted to the control unit when being generated again. | 09-22-2011 |
20110231640 | METHODS AND APPARATUS FOR PRIORITY INITIALIZATION OF A SECOND PROCESSOR - Methods and systems provide for activating a second processor by a first processor in a dual processor device early within an initialization routine to enable the second processor to help complete initialization operations. The first processor may prepare a second processor chip for start up, configure the second chip's pins, program the second processor, download a firmware image on the second processor, and initiate operations on the second processor. By performing this initialization early within the initialization routine, the second processor can assist in the initialization routine. | 09-22-2011 |
20110231641 | INFORMATION-PROCESSING APPARATUS AND METHOD OF STARTING INFORMATION-PROCESSING APPARATUS - An information-processing apparatus includes a main system that presents a function as the information-processing apparatus and has a function of acquiring time information from a time server, and a subsystem managing the main system. The main system starts up in start mode which is either an ordinary-start mode or a specified mode provided to acquire the synchronized time information from the time server based on a start-mode instruction issued from the subsystem. The subsystem starts up the main system in the specified mode when starting the main system being at rest, wherein the subsystem revises management-system time obtained from a clock device, which is controlled by the subsystem, based on the synchronized time information acquired through the main system started in the specified mode, and restarts the main system in the ordinary-start mode by determining the revised management-system time to be initial time used to start the main system. | 09-22-2011 |
20110231642 | Systems and Methods for Accelerated Loading of Operating Systems and Application Programs - Systems and methods for providing accelerated loading of operating system and application programs upon system boot or application launch are disclosed. In one aspect, a method for providing accelerated loading of an operating system comprises the steps of: maintaining a list of boot data used for booting a computer system; preloading the boot data upon initialization of the computer system; and servicing requests for boot data from the computer system using the preloaded boot data. In another aspect, a method for providing accelerated launching of an application program comprises the steps of: maintaining a list of application data associated with an application program; preloading the application data upon launching the application program; and servicing requests for application data from a computer system using the preloaded application data. | 09-22-2011 |
20110231643 | INFORMATION PROCESSING DEVICE, POWER SUPPLY CONTROL METHOD AND STORAGE MEDIUM - An information processing device includes: a power-off detection unit for detecting a signal relating to a power-off operation of a user; an application program termination unit for terminating a predetermined application program when the power-off operation is performed; and a control unit for passing control, after the termination of the application program, to a state in which normal execution can be started faster than normal power-off, and power consumption is lower than in the normal execution. | 09-22-2011 |
20110238969 | INTELLIGENT BOOT DEVICE SELECTION AND RECOVERY - Techniques for recovering virtual machine state and boot information used to boot an installed guest operating system on systems where the information has either been lost or is not present are described. | 09-29-2011 |
20110238970 | System and method to lock electronic device - A method to lock an electronic device comprising an operating system comprises placing the electronic device in a disable state in which the processor is blocked from accessing the operating system, receiving a first unlock password from a remote source during a power-up operation of the electronic device, and placing the electronic device in a temporary unlock state which allows the processor to boot the operating system for a predetermined period of time when the first unlock password matches a password stored in the electronic device. Other embodiments may be described. | 09-29-2011 |
20110238971 | Method of managing a solid state drive, associated systems and implementations - One embodiment of a method includes loading, by a memory controller, a boot image from a solid state drive to an operating memory of a computing system during an initialization operation of the computing system. The initialization operation initializes components of the computing system. | 09-29-2011 |
20110238972 | Secure Bootstrapping for Wireless Communications - A mutual authentication method is provided for securely agreeing application-security keys with mobile terminals supporting legacy Subscriber Identity Modules (e.g., GSM SIM and CDMA2000 R-UIM, which do not support 3G AKA mechanisms). A challenge-response key exchange is implemented between a bootstrapping server function (BSF) and mobile terminal (MT). The BSF generates an authentication challenge and sends it to the MT under a server-authenticated public key mechanism. The MT receives the challenge and determines whether it originates from the BSF based on a bootstrapping server certificate. The MT formulates a response to the authentication challenge based on keys derived from the authentication challenge and a pre-shared secret key. The BSF receives the authentication response and verifies whether it originates from the MT. Once verified, the BSF and MT independently calculate an application security key that the BSF sends to a requesting network application function to establish secure communications with the MT. | 09-29-2011 |
20110246755 | Method and System for Automated Operating System Image Loading - A method, system, and article for dynamic management of two or more operating system images for at least two client machines operating in a computer system sub-network. Different physical areas of the sub-network support separate image of the operating system images. As the client machines may be individually subject to movement within the sub-network, an appropriate operating system image is dynamically selected and uploaded to one or more of the individual client machines based upon the physical location thereof. | 10-06-2011 |
20110246756 | PROTOCOL FOR AUTHENTICATING FUNCTIONALITY IN A PERIPHERAL DEVICE - A protocol provides authentication of peripheral devices by a computing device to which the peripheral device connects. Computing devices include a verifier with a public key that authenticates multiple associated private keys. Private keys are embedded on peripheral devices. When the verifier is able to authenticate a connected peripheral, particular functionality is enabled that may not be enabled for peripherals that do not authenticate. | 10-06-2011 |
20110246757 | UNATTENDED SECURE REMOTE PC CLIENT WAKE, BOOT AND REMOTE LOGIN USING SMART PHONE - Methods and systems to allow an authorized user to remotely awaken, boot, and login to a computer in a secure manner. The user and computer may communicate using a short message service. (SMS). The user may communicate with the computer using a mobile device, such as a smart phone. The user may initially provide a wake-up message to the computer, which may then respond by asking for one or more boot passwords. In an embodiment, these boot passwords may be basic input/output system (BIOS) passwords that are required for the loading and operations of the computer's BIOS. The user may then provide these one or more passwords to the computer. The computer may further request an operating system (OS) login password. The user may then provide this password to the computer. In an embodiment, all passwords may be provided to the computer in encrypted form. Moreover, authentication measures may be used to provide assurance that the user is legitimate. | 10-06-2011 |
20110246758 | MEDIA DATA PLAYBACK DEVICE AND REBOOT METHOD THEREOF - A media data playback device comprises first and second nonvolatile memories. The first nonvolatile memory stores a boot loader and a kernel of an operating system in a compressed format. The second nonvolatile memory serves as a main memory of the device. A processor executes the boot loader to load and decompress the kernel from the first nonvolatile memory to the second nonvolatile memory in response to a boot command. When receiving a shutdown command, the processor determines whether to perform a portion of bootstrapping processes of the device in response to the shutdown command before actually shutdown the device. | 10-06-2011 |
20110246759 | METHOD FOR BOOSTING AN ELECTRONIC DEVICE WITH MULTIPLE PROCESSING UNITS, AND ELECTRONIC DEVICE FOR IMPLEMENTING THE SAME - A method for reducing booting time is to be implemented by an electronic device including first and second processing units, a cache memory, and a storage medium. The method includes the steps of: configuring the first processing unit for executing a set of program instructions for initializing hardware equipments of the electronic device; configuring the first processing unit for loading at least one library from the storage medium into the cache memory after initializing the hardware equipments of the electronic device, the at least one library being specified for use by the second processing unit; and configuring the second processing unit for booting a kernel of an operating system associated with the second processing unit after initializing the hardware equipments of the electronic device. | 10-06-2011 |
20110246760 | ELECTRONIC DEVICE AND ELECTRONIC DEVICE SYSTEM - According to one embodiment, an electronic device system includes a first controller and an electronic device. The first controller includes a command terminal for outputting a command to an electronic device and a plurality of data terminals for transmitting/receiving data. The electronic device coupled to the first controller via the command terminal and the data terminals, the electronic device stores a boot information, wherein when power is turned on, the first controller generates a signal and supplies the signal from one of the data terminals to the electronic device, and receives the boot information read from the electronic device in accordance with the signal. | 10-06-2011 |
20110252224 | NETWORK-BASED OPERATING SYSTEM MOBILITY - For operating system mobility across heterogeneous computing platforms, a method may include periodically identifying whether an operating system is active until a determination that the operating system is inactive. Upon the determination that the operating system is inactive, one of a plurality of boot profiles that are each stored in association with a respective one of a plurality of computing platforms may be selected. The at least one boot profile may be associated with a target computing platform. The selected boot profile may be used in a booting process for booting the operating system on the target computing platform. | 10-13-2011 |
20110252225 | COMPUTER SYSTEM AND BOOTUP AND SHUTDOWN METHOD THEREOF - A computer system and a bootup and shutdown method thereof are provided. The computer system includes a memory, a chipset, a basic input/output system (BIOS), and an embedded controller, and an operating system (OS) is executed in the computer system. In the shutdown and bootup method, the embedded controller is notified to prepare to enter into a standby mode when the BIOS intercepts a shutdown instruction issued by the OS. The content of a register of the chipset is set according to the standby mode. A current operation mode data of the computer system is retained, and power is continuously supplied to the memory to make the computer system enter into the standby mode. | 10-13-2011 |
20110258424 | Distributive Cache Accessing Device and Method for Accelerating to Boot Remote Diskless Computers - A distributive cache accessing device for accelerating to boot remote diskless computers mounted in a diskless computer equipped with WAN-bootable hardware, such as an iSCSI host bus adapter (HBA), allows to access data required to boot the diskless computers or run application programs thereon from an iSCSI target or other diskless computers having the distributive cache accessing device via a network. The retrieved iSCSI data blocks are temporarily stored in the local distributive cache accessing device. If any other diskless computer requests for the iSCSI data blocks, the temporarily stored iSCSI data blocks can be accessible to the diskless computer. Given installation of large number of diskless computers, the network traffic of the iSCSI target is alleviated and booting remote diskless computer is accelerated. | 10-20-2011 |
20110258425 | BOOT PARTITIONS IN MEMORY DEVICES AND SYSTEMS - The present disclosure includes boot partitions in memory devices and systems, and methods associated therewith. One or more embodiments include an array of memory cells, wherein the array includes a boot partition and a number of additional partitions. Sequential logical unit identifiers are associated with the additional partitions, and a logical unit identifier that is not in sequence with the sequential logical unit identifiers is associated with the boot partition. | 10-20-2011 |
20110258426 | BOOTING AND CONFIGURING A SUBSYSTEM SECURELY FROM NON-LOCAL STORAGE - According to one aspect, a multifunctional computing device having a wireless communications processor (e.g., cellular processor) and an application processor (e.g., general-purpose processor such as a CPU) share a storage device that is associated with or attached to the application processor. An example of such a multifunctional computing device may be a Smartphone device having a cellular phone and handheld computer functionalities. There is no specific storage device directly associated with or attached to the wireless communications processor (hereinafter simply referred to as a wireless processor). Instead, the wireless processor communicates with the application processor via a high speed communications link, such as a USB link, to access code and data stored in the storage device (e.g., flash memory device) associated with the application processor. | 10-20-2011 |
20110258427 | NAVIGATION DEVICE FOR VEHICLE - A navigation device for a vehicle includes: a memory device including a NAND type flash memory for storing a predetermined program and a boot program and a controller for searching a failure block in the flash memory and managing a corresponding relation between a logic block and a physical block with eliminating failure blocks; a back-up power source; a power source switch for coupling the memory device with the back-up power source; a power source for generating a predetermined voltage with using the back-up power source; a control device energized from the power source with the predetermined voltage so as to be activated; and a power source control device. The control device determines whether activation is performed for the first time. The control device executes a stand-by process, and then, executes a boot process when the activation is performed for the first time. The control device executes the boot process without executing the stand-by process when the activation is after the first time. The power source control device controls the power source to function when the power source control device receives an activation signal from the power source switch. When the power source switch stops the activation signal, the power source control device stops the operation state of the power source. | 10-20-2011 |
20110258428 | DATA PROCESSOR AND DATA PROCESSING SYSTEM - A reset controller is adopted which performs control for causing an external reset terminal to be shared for external output of a reset signal and input of a reset signal from outside, allowing a reset input from the external reset terminal in a state in which a power supply voltage is stable, and causing, when a reset factor due to turn-on of a power supply voltage or a reduction in the level of the power supply voltage is detected by a detection circuit, an input/output buffer to output a reset signal to the external reset terminal and masking the inflow of the reset signal from the input/output buffer to its input path, using a signal detected by the detection circuit. A mask period is assumed to be a period longer than a period from reset instructions to a reset release. | 10-20-2011 |
20110264901 | MODULAR INTEGRATED CIRCUIT WITH COMMON SOFTWARE - A modular integrated circuit includes a hub module that is coupled to a plurality of spoke modules via a plurality of hub interfaces. The spoke modules include a plurality of interface circuits each having a hardware address. A memory module stores the hub software and hub data and configuration data. The hub software includes a plurality of driver modules corresponding to the plurality of interface circuits. The processing module executes boot firmware to configure the plurality of driver modules based on the hardware address of each of the plurality of interface circuits. | 10-27-2011 |
20110264902 | Method and System For Suspending Video Processor and Saving Processor State in SDRAM Utilizing a Core Processor - A method and system are provided in which a multimedia processor comprises a first portion associated with a first of a plurality of power domains and a second portion associated with a second of the plurality of power domains. The first portion and the second portion of the multimedia processor are integrated on a single substrate. Data may be transferred from the first portion to the second portion and, upon completing the transfer, the first portion may be powered down and state information associated with it stored. The state information may be stored in an external SDRAM. The data in the second portion of the multimedia processor may be transferred to an external device through a peripheral module in the second portion. When a trigger event associated with the data transfer to the external device occurs, the first portion may be powered up and rebooted using the stored state information. | 10-27-2011 |
20110264903 | ELECTRONIC DEVICE AND METHOD FOR LOADING CONFIGURATION FILES USING THE SAME - A method for loading a configuration file from a remote server to an electronic device includes obtaining a default configuration file from the remote server, and executing the default configuration file to boot the electronic device, identifying a corresponding MAC list in the remote server according to hardware configurations of the electronic device, and obtaining a specific MAC value corresponding to an unused status flag from the MAC list. The method further includes obtaining a default MAC value of a network card of the electronic device, replacing the default MAC value of the network card with the specific MAC value, obtaining a specific configuration file from the remote server according to the specific MAC value, and rebooting the electronic device according to the specific configuration file. | 10-27-2011 |
20110271088 | OPERATING SYSTEM CONTEXT SWITCHING - A technique for quickly switching between a first operating system (OS) and a second OS involves deactivating the first OS and booting the second OS from memory. The technique can include inserting a context switching layer between the first OS and a hardware layer to facilitate context switching. It may be desirable to allocate memory for the second OS and preserve state of the first OS before deactivating the first OS and booting the second OS from memory. | 11-03-2011 |
20110271089 | Server Apparatus and Startup Control Method - According to one embodiment, a server apparatus includes a communication processor, a database and a controller. The communication processor starts up based on a startup program recorded in a processing memory, and performs a communication processing based on a service program recorded in the processing memory, after startup. The database stores the startup program in association with a first directory for specifying a first memory area, and stores the service program in association with a second directory for specifying a second memory area different from the first directory, The controller refers to the second directory stored in the database after the startup program starts, and reads the service program from the database based on the referred result, and further, records the read program in second memory area of the processing memory. | 11-03-2011 |
20110271090 | Providing a secure execution mode in a pre-boot environment - In one embodiment, the present invention includes a method to establish a secure pre-boot environment in a computer system; and perform at least one secure operation in the secure environment. In one embodiment, the secure operation may be storage of a secret in the secure pre-boot environment. | 11-03-2011 |
20110276795 | INFORMATION PROCESSING DEVICE AND INFORMATION PROCESSING METHOD - A method to allow a value to be written into one PCR domain, only if values from a second PCR domain are valid, thus ensuring the extension of the chain of trust between domains. | 11-10-2011 |
20110276796 | LOADING A PLURALITY OF APPLIANCES INTO A BLADE - A method for enabling a plurality of software appliances to be dynamically loaded onto a blade is described. During run-time and in response to receiving one or more sets of appliance loading instructions corresponding to one or more appliances, the one or more appliances is downloaded. Each appliance has a capability different from each other. The one or more appliances that are downloaded are stored at a first set of locations on a data store. Each of the first set of locations is different from each other. A first appliance of the one or more appliances that are stored is then installed at a second location on the data store. Then, the first appliance that is installed is booted on the blade. | 11-10-2011 |
20110283097 | IMAGING PROCESS - A user-friendly system, method, and program product for installing an image on a computer, the method comprising: booting the computer ( | 11-17-2011 |
20110283098 | ELECTRONIC DEVICE WITH OVERLAPPED BOOT TASK FETCHES AND BOOT TASK EXECUTION - In accordance with at least some embodiments, a system includes a first processor and a second processor. The system also includes a boot task storage medium that can only be accessed by one processor at a time. A boot process of the system has a first stage and a second stage. During the first stage, the first processor fetches and executes boot tasks without assistance from the second processor. During the second stage, boot task execution performed by first processor overlaps with at least one boot task fetch performed by the second processor. | 11-17-2011 |
20110289306 | METHOD AND APPARATUS FOR SECURE SCAN OF DATA STORAGE DEVICE FROM REMOTE SERVER - A method and device for providing a secure scan of a data storage device from a remote server are disclosed. In some embodiments, a computing device may include an in-band processor configured to execute an operating system and at least one host driver, communication circuitry configured to communicate with a remote server, and an out-of-band (OOB) processor capable of communicating with the remote server using the communication circuitry irrespective of the state of the operating system. The OOB processor may be configured to receive a block read request from the remote server, instruct the at least one host driver to send a storage command to a data storage device, receive data retrieved from the data storage device and authentication metadata generated by the data storage device, and transmit the data and the authentication metadata to the remote server. | 11-24-2011 |
20110296152 | BOOT MODE - A method for launching a boot mode of a device including detecting an input in response to a user accessing a power button of the device, identifying at least one characteristic of the input and a corresponding boot mode which can be launched in response to at least one of the characteristic of the input, and configuring the device to launch the corresponding boot mode. | 12-01-2011 |
20110296153 | OPTIMIZATION OF STORAGE DEVICE OPERATING PARAMETERS - Example embodiments relate to storage devices, computing devices, and machine-readable storage media that optimize storage device operating parameters for desktop and notebook computing devices. Example embodiments allow for optimization of operating parameters of a storage device for one of a desktop computing device and a notebook computing devices based on provision of a command to the storage device. In example embodiments, upon receipt of such a command, the storage device may reconfigure its operating parameters to be optimized for the particular type of system. | 12-01-2011 |
20110296154 | Automated Communication Configuration - A method for use at a user device of a communications network include utilizing a configuration file obtained from a remote device to configure a communication of an application executed at the user device without requiring user input, the configuration file including logic applied by the application to identify, from a plurality of data bearers available to the user device, a select data bearer for use in conducting the communication based on one or more parameters representative of the current operational context of the user device. The user device includes a storage module to store a configuration file obtained from a remote device and a processing module to execute an application, wherein during execution the application is to utilize logic of configuration file to identify, from a plurality of data bearers available to the user device, a select data bearer for use in conducting a communication of the application. | 12-01-2011 |
20110296155 | AUTOMATICALLY STARTING SERVERS AT LOW TEMPERATURES - This document describes various techniques for automatically starting servers at low temperatures. A server may be powered on into a heating mode responsive to determining that a temperature of the server is below an operational temperature range. The server may then be restarted when the temperature of the server has increased to a temperature that is within the operational temperature range. | 12-01-2011 |
20110296156 | System and Method for Secure Client Hosted Virtualization in an Information Handling System - A client hosted virtualization system (CHVS) includes a processor and non-volatile memory with BIOS code and virtualization manager code. The virtualization manager initializes the CHVS, authenticates a virtual machine image and launches the virtual machine based on the image. The CHVS is configurable to execute the BIOS or the virtualization manager. A client system update network includes a client update system and a CHVS with a processor, a security processor, and non-volatile memory with BIOS code and virtualization manager code that initializes the CHVS, authenticates a virtual machine image and launches a virtual machine based on the image. The CHVS is configurable to execute the BIOS or the virtualization manager. The client update system receives updates and sends them to the CHVS. The CHVS authenticates the updates with the security processor, and overwrites the non-volatile memory with the updates. | 12-01-2011 |
20110296157 | System and Method for Supporting Secure Subsystems in a Client Hosted Virtualization System - An client hosted virtualization system includes an authentication device, a processor and non-volatile memory with BIOS code and virtualization manager code. The virtualization manager initializes the client hosted virtualization system authenticates a virtual machine image, launches a portion of the virtual machine that initiates an authentication session with the authentication device, receives an authentication object from the authentication device, sends the authentication object to the portion of the virtual machine, and launches another portion of the virtual machine. The client hosted virtualization system is configurable to execute the BIOS or the virtualization manager. | 12-01-2011 |
20110296158 | HAND-HELD TEST METER WITH DISRUPTION AVOIDANCE CIRCUITRY - A hand-held test meter for use with an analytical test strip configured for the determination of an analyte in a bodily fluid sample includes a USB interface, a microcontroller block configured for boot strap loading (BSL) of data into the hand-held test meter via a serial signal and a circuit disruption avoidance block. The circuit disruption avoidance block includes a USB to serial bridge sub-block with (i) a USB input(s), (ii) a serial output(s) configured to provide a serial signal for BSL of data to the microcontroller block; and (iii) a plurality of general purpose input/outputs (GPIO). The circuit disruption avoidance block also includes a BSL enable gate/buffer sub-block. At least two of the GPIO are configured to provide BSL control signals to the microcontroller block via the BSL enable gate/buffer sub-block and the USB to serial bridge sub-block is configured to send the data to the microcontroller block via the at least one serial output. | 12-01-2011 |
20110296159 | PXE SERVER AND ELECTRONIC DEVICE AND METHOD OF DISKLESS BOOTING ELECTRONIC DEVICE - A method of diskless booting an electronic device sends a request for an IP address of the electronic device to a pre-boot execution environment (PXE) server. After receiving the request, the PXE server allocates an IP address to the electronic device, and sends a bootstrap program to the electronic device. The electronic device receives a configuration file of the electronic device from the PXE server, and executes one or more operating system kernels of the configuration file. | 12-01-2011 |
20110296160 | Method for changing booting configuration and computer system capable of booting OS - In a computer system in which a server has, in addition to a disk used for booting, an operation transfer destination disk that has the same content as the boot disk, a method for changing the disk used by the server or another server in the computer system for booting to the operation transfer destination disk is realized by changing the content of the operation transfer destination disk to enable the OS and applications installed in the operation transfer destination disk to be booted from the destination disk and by changing the setting of a boot program of the server to enable booting from the operation transfer destination disk. | 12-01-2011 |
20110302398 | KEY PROTECTORS BASED ON ONLINE KEYS - An online key stored by a remote service is generated or otherwise obtained, and a storage media (as it applies to the storage of data on a physical or virtual storage media) master key for encrypting and decrypting a physical or virtual storage media or encrypting and decrypting one or more storage media encryption keys that are used to encrypt a physical or virtual storage media is encrypted based at least in part on the online key. A key protector for the storage media is stored, the key protector including the encrypted master key. The key protector can be subsequently accessed, and the online key obtained from the remote service. The master key is decrypted based on the online key, allowing the one or more storage media encryption keys that are used to decrypt the storage media to be decrypted. | 12-08-2011 |
20110302399 | Rapid activation of service management processor subsystem for server device - A bootloader process executing on a service management processor (SMP) subsystem for a server device determines whether an initialization flag stored within non-volatile memory of the subsystem is set. The initialization flag corresponds to whether a full cold initialization process of the subsystem is to occur. In response to determining that the initialization flag has not been set, the bootloader process loads an image stored in the non-volatile memory into volatile memory of the subsystem. The image corresponds to processes properly running on the SMP subsystem after the SMP subsystem has booted, including a management process. The processes begin executing on the subsystem. The management process, determines whether a hardware configuration change within the subsystem has been made since when the image was saved to the non-volatile memory. In response to determining that the hardware configuration change has been made, the management process sets the initialization flag and rebooting the subsystem. | 12-08-2011 |
20110302400 | SECURE VIRTUAL MACHINE BOOTSTRAP IN UNTRUSTED CLOUD INFRASTRUCTURES - Techniques are described for securely booting and executing a virtual machine (VM) image in an untrusted cloud infrastructure. A multi-core processor may be configured with additional hardware components—referred to as a trust anchor. The trust anchor may be provisioned with a private/public key pair, which allows the multi-core CPU to authenticate itself as being able to securely boot and execute a virtual machine (VM) image in an untrusted cloud infrastructure. | 12-08-2011 |
20110302401 | Information processing apparatus, information processing method and recording medium - An information processing apparatus includes a receiver configured to receive a packet via a communication line, an operating processor configured to suspend an operation thereof when the information processing apparatus is in an energy saving mode, a first storage configured to store the packet received by the receiver, a determining unit including a table in which different operations of the operating processor are recorded in association with different patterns of packets and configured to determine whether to restart the operating processor when the information processing apparatus is in the energy saving mode based on a pattern of the packet stored in the first storage and the patterns of the packets in association with the operations of the operating processor recorded in the table, and a power manager configured to supply power to the operating processor based on a result determined by the determining unit to restart the operating processor. | 12-08-2011 |
20110302402 | ON-CHIP SECURITY METHOD AND APPARATUS - A boot method an apparatus are described which reduce the likelihood of a security breach in a mobile device, preferably in a situation where a reset has been initiated. A predetermined security value, or password, is stored, for example in BootROM. A value of a security location within FLASH memory is read and the two values are compared. Polling of the serial port is selectively performed, depending on the result of such comparison. In a presently preferred embodiment, if the value in the security location matches the predetermined security value, then polling of the serial port is not performed. This reduces potential security breaches caused in conventional arrangements where code may be downloaded from the serial port and executed, which allows anyone to access and upload programs and data in the FLASH memory, including confidential and proprietary information. | 12-08-2011 |
20110307690 | SYSTEM AND METHOD FOR RAPID BOOT OF SECONDARY OPERATING SYSTEM - The primary operating system of a computer such as a notebook computer is stored on disk in a hard disk drive and a smaller, secondary operating system such as an email operating system, wireless phone operating system, DVD player operating system, etc. is stored on disk and is transferred to flash memory within the HDD upon power-down of the primary operating system. In this way, should the user subsequently elect to power up the computer only for a limited secondary purpose, the user can elect to boot the associated secondary operating system from flash memory of the HDD without having to spin up the disks, saving energy and reducing boot time. | 12-15-2011 |
20110314266 | ON-DEMAND DATABASE SERVER STARTUP AND SHUTDOWN - A database startup service is launched at the boot time of a computer that is configured to receive requests to start the execution of a database server. A business application plug-in is then started in a minimal functionality mode of operation. The plug-in determines whether an action has been performed that requires access to a database. If access to the database is needed, the plug-in transmits a request to the database startup service to start the database service. Once the database server has been started, the plug-in transitions to a full functionality mode of operation where all of the functionality provided by the plug-in is enabled. The plug-in might also determine that access to the database is no longer needed. In response thereto, the plug-in may transmit a request to the database startup service to terminate the execution of the database server. | 12-22-2011 |
20110314267 | ELECTRONIC DEVICE AND COMPUTER PROGRAM PRODUCT - According to one embodiment, an electronic device includes a display module, a power button, at least one function button, a hardware controller, and a pre-OS boot processor. The display module displays display data processed by an application on an operating system (OS) or display data based on received broadcast waves. The power button is operated to power on or off the electronic device. The function button is provided separately from a hardware keyboard having a plurality of keys to control a function defined on the OS. The hardware controller is activated in response to power-on operation made on the power button and provide the OS with basic input/output mechanism with respect to hardware including the function button. The pre-OS boot processor performs a process before boot-up of the OS if a predetermined operation is made on the function button within a predetermined time since the power-on operation is made. | 12-22-2011 |
20110314268 | SD SWITCH BOX IN A CELLULAR HANDSET - A cellular handset, including a cellular base band modem, including a UART interface, and an SD host interface, a NAND flash memory, a NAND controller coupled with the NAND flash memory, a host device including a host controller, wherein the electronic host device supports an SD connection, and a convergence controller coupled with the cellular base band modem, the host device and the NAND controller, including a UART port for transferring data to and from the cellular base band modem via the UART interface, an SD port for transferring data to and from the cellular base band modem via the SD host interface, an SD port for transferring data to and from the NAND flash memory via the NAND controller, an SD port for transferring data to and from the host device via the host controller, a first mailbox into which the base band modem writes messages and from which the host device reads messages, and a second mailbox into which the host device writes messages and from which the cellular base band modem reads messages. A method is also described and claimed. | 12-22-2011 |
20110320796 | REDUNDANT POWER SUPPLY CONFIGURATION FOR A DATA CENTER - A redundant power supply configuration for a data center is provided. A method includes receiving instructions to operate power supplies at a high current mode. An individual current for each of the power supplies is calculated to total a high current at the high current mode. The power supplies are operated at the high current mode to provide the high current at the high current mode. In response to operation at the high current mode being complete, the power supplies are operated at a normal mode to provide a normal current at the normal current mode. | 12-29-2011 |
20110320797 | METHOD AND SYSTEM FOR REDUCING AN IMPACT OF MALWARE DURING A BOOTING SEQUENCE - Methods for reducing the impact of malware during a booting sequence for an interrupt driven computing device are disclosed. One or more parameters associated with an interrupt vector table (IVT) are manipulated to force the computing device into a clean state following a system level portion of the booting sequence. In another embodiment, occurring prior to the loading of an operating system or a call to a non-returnable main( ) function, one or more unused interrupt vectors in an IVT are replaced. A function filter is implemented for one or more interrupt vectors in the IVT to disallow unnecessary interrupt functions from being executed. One or more required interrupt vector functions are replaced with one or more corresponding custom vector functions. One or more memory locations are wiped if the one or more memory locations do not hold at least a portion of the IVT and/or the interrupt vector functions. | 12-29-2011 |
20110320798 | Providing Silicon Integrated Code For A System - In one embodiment, a semiconductor integrated code (SIC) may be provided in a binary format by a processor manufacturer. This SIC may include platform independent code of the processor manufacturer. Such code may include embedded processor logic to initialize the processor and at least one link that couples the processor to a memory, and embedded memory logic to initialize the memory. Other embodiments are described and claimed. | 12-29-2011 |
20110320799 | APPARATUS AND METHOD FOR NETWORK DRIVER INJECTION INTO TARGET IMAGE - A method provides network driver injection into a target image to transform the target image to be compatible with one or more source machines, for facilitating operating system streaming over a network. The method may include: facilitating access to a source system registry file of a source machine; facilitating access to a target system registry file of the target image, without copying the target image; determining whether source network interface cards of the source machine are compatible with the target image; and if the source network interface cards are not compatible with the target image, performing network interface driver injection into the target image. The target image may include an operating system. A machine-readable storage medium and apparatus are provided. A method is described for building a program for providing network driver injection into a target image to transform the target image to be compatible with computing machines. | 12-29-2011 |
20110320800 | System And Method For Booting A Computer System Using Preboot Data - Exemplary embodiments of the present invention disclosed herein relate to a method of booting a computer system using preboot data. A method in accordance with an exemplary embodiment of the present invention comprises transmitting a boot request and receiving, in response to the boot request, a boot loader that is adapted to read preboot data. The exemplary method may additionally comprise transmitting a request for boot data corresponding to the preboot data, receiving boot data corresponding to the preboot data, and booting the computer system using the boot data. | 12-29-2011 |
20110320801 | INFORMATION PROCESSING APPARATUS AND START-UP METHOD - An information processing apparatus includes, a processer, a non-volatile memory to store a plurality of programs, a volatile memory to store at least one program executed by the processor and data accessed by the program, an acceptance unit to accept context information when power supplied to the processor is resumed from a state in which power supplied to the processor is interrupted while a power supplied to the volatile memory is maintained, a selection unit to select one program from the plurality of programs stored in the non-volatile memory based on context information accepted by the acceptance unit, and a program determination unit to determine whether the one program selected by the selection unit is stored in the volatile memory. When the processor determines the one program selected by the program determination unit is stored in the volatile memory, the processor starts the one program stored in the volatile memory. | 12-29-2011 |
20110320802 | AUTHENTICATION METHOD, KEY DISTRIBUTION METHOD AND AUTHENTICATION AND KEY DISTRIBUTION METHOD - An authentication method, and a key distribution method, and an authentication and key distribution method are provided. The authentication method is adapted for a machine type communication involved with a wireless communication system, and includes the following steps. At least a user equipment (UE) transmits an application request including at least a first security material to a network application function (NAF), where the at least a first security material is not a key directly obtained through a bootstrapping procedure of a generic bootstrapping architecture. The NAF generates a second security material, which is not the key, either. The NAF replies the UE an application answer with the at least a second security material. In addition, the NAF authenticates the UE by the second security material, or the UE authenticates the NAF by the second security material. | 12-29-2011 |
20120005466 | DATA PROCESSING DEVICE AND METHOD FOR OPERATING SUCH DATA PROCESSING DEVICE - In order to provide a data processing device ( | 01-05-2012 |
20120005467 | Streaming Virtual Machine Boot Services Over a Network - Embodiments of the invention are directed to streaming virtual machine boot services over a network. An aspect of the invention includes booting a first virtual machine and recording data and metadata from a virtual machine boot image into a virtual machine boot file. The data and metadata are accessed in the process of booting the first virtual machine. The virtual machine boot image has setup information of the virtual machine type of the first virtual machine. The virtual machine boot file is configured for the virtual machine type of the first virtual machine. A descriptor is added to metadata of the virtual machine boot image, which references a location of the virtual machine boot file for the virtual machine type of the first virtual machine. When subsequently booting a second virtual machine of the same type of virtual machine as the first virtual machine, data are streamed from the virtual machine boot file to a virtual machine monitor of a second virtual machine without the need to stream data from the virtual machine boot image. | 01-05-2012 |
20120005468 | STORAGE DEVICE WITH MULTIPLE STORAGE UNITS AND CONTROL METHOD THEREOF - A storage device with multiple storage units, which is applicable to a system end. The storage device is a hard disk drive (HDD) or solid state disk (SSD) with a standard size. The storage device includes a first storage unit and at least one memory storage unit. The memory storage unit and the first storage unit serve to back up and update each other. The storage device further includes a multiplex control unit and a power control unit connected to the multiplex control unit. According to the decision of the multiplex control unit, the power control unit controls turning on/off of the first storage unit and the memory storage unit. | 01-05-2012 |
20120005469 | ELECTRONIC DEVICE CAPABLE OF STARTING UP IN LOW-TEMPERATURE ENVIRONMENT AND STARTUP METHOD THEREOF - An electronic device capable of starting up in a low-temperature environment and a startup method for starting up the electronic device in the low-temperature environment and provide a stable operation temperature. The electronic device includes a temperature detection unit, a plurality of electronic elements, a storage unit, and a control unit. The electronic elements connects to the temperature detection unit. The storage unit stores a temperature monitoring process and an operating system. The control unit electrically connects to the temperature detection unit, the electronic elements, and the storage unit. The control unit acquires an operation temperature of the electronic elements through the temperature detection unit. The control unit executes the temperature monitoring process for driving the electronic elements, and increases the operation temperature of the electronic elements, so that the operating system is executed when a working temperature of the electronic device is higher than a first rated temperature. | 01-05-2012 |
20120005470 | QUICK START-UP IMAGE FORMING APPARATUS, IMAGE FORMING METHOD, AND IMAGE FORMING SYSTEM - An image forming apparatus includes a code storage device and a code execution device to perform booting based on a boot code from the code storage device. The code execution device includes a first communication unit and a first high-speed communication unit each communicable with the code storage device. The code storage device includes: a second communication unit and a second high-speed communication unit each communicable with the code execution device; a code storage unit to store a high-speed communication standby code required of the code execution device to use the first high-speed communication unit and a high-speed code transmitted to the code execution device via the second high-speed communication unit; and a code transmission unit to transmit the high-speed communication standby code to the code execution device via the second communication unit and to transmit the high-speed code to the code execution device via the second high-speed communication unit. | 01-05-2012 |
20120005471 | BOOTING AN INTEGRATED CIRCUIT - An integrated circuit is disclosed herein. In one embodiment, the integrated circuit includes: a processor; a plurality of external pins operatively coupled to the processor; and a permanently written memory operatively coupled to the processor, the memory having a plurality of regions each storing one or more respective boot properties for booting the processor. The processor is programmed to select one of the regions in dependence on an indication received via one or more of the external pins, to retrieve the one or more respective boot properties from the selected region, and to boot using the one or more retrieved boot properties. | 01-05-2012 |
20120005472 | MANAGEMENT SERVER, BOOT SERVER, NETWORK BOOT SYSTEM, AND NETWORK BOOT METHOD - The management server saves boot images corresponding to boot nodes that are connected to itself through a network. When condition information is received from the boot server provided in each network, the management server transmits a boot image specified by the condition information to the boot server. The boot server provides the boot image received from the management server to the boot node to make the boot node perform a network boot. | 01-05-2012 |
20120011354 | BOOT LOADING OF SECURE OPERATING SYSTEM FROM EXTERNAL DEVICE - A device for establishing a secure computing environment on a host computer. The device can include an interface configured to couple to the host computer. The device can also include a configuration module configured to identify a file that comprises configuration settings of the host computer's native boot loader that is used to load the host computer's native operating system. The configuration module can create a backup copy of the configuration settings of the native boot loader. The device includes a memory that holds a secure operating system. The device can also include a modification module configured to modify the configuration settings of the host computer's native boot loader to cause the secure operating system to be loaded from the device in place of the native operating system. | 01-12-2012 |
20120017071 | Apparatus and Method Thereof for Reliable Booting from NAND Flash Memory - An apparatus for enabling booting from a NAND flash memory comprises a NAND flash controller connected to the NAND flash memory, wherein the NAND flasher memory is configured to include at least a starter section for storing boot code, the starter section includes a predefined number of blocks to store copies of the boot code duplicated in a configurable number of blocks; and a fetch emulator for fetching a valid and complete starter block that includes the boot code. | 01-19-2012 |
20120017072 | MODIFYING A VIDEO RESOLUTION OF VIDEO DATA IN A PRE-OPERATING SYSTEM ENVIRONMENT | 01-19-2012 |
20120017073 | CONFIGURATION OF A BASIC INPUT/OUTPUT SYSTEM (BIOS) OF A COMPUTING DEVICE - Example embodiments disclosed herein relate to configuring a Basic Input/Output System (BIOS) of a computing device. An embodiment of a method may present, by the computing device, a first request relating to a first functionality of the computing device controlled by one or more settings of the BIOS, and may receive a first user response corresponding to the first request. The method may also present a second request relating to a second functionality of the computing device controlled by one or more settings of the BIOS, with the second request being selected based on the first user response. The method may then receive a second user response corresponding to the second request. In addition, the method may configure at least one setting of the BIOS based on the first and second user responses. Embodiments of a related computing device and computer-readable storage medium are also disclosed. | 01-19-2012 |
20120023318 | PROVIDING PLATFORM INDEPENDENT MEMORY LOGIC - In one embodiment, the present invention includes semiconductor integrated code (SIC) corresponding to platform independent code of a processor manufacturer. This code may include embedded memory code (EMC) to initialize a memory via initialization of a memory controller, and a mapping of memory signals using an on-die termination (ODT) data structure accessible via the EMC, where the ODT data structure is provided by an original equipment manufacturer (OEM) and corresponds to a parameterized rule set for a platform dependent memory configuration of the memory. Other embodiments are described and claimed. | 01-26-2012 |
20120023319 | PERSISTING DATA ACROSS WARM BOOTS - Techniques for persisting data stored in volatile memory across a warm boot. One or more portions (referred to as “warm memory”) of volatile memory of the system can be reserved and configured such that the data stored by these portions is not affected by a warm boot thereby resulting in the data stored being persisted across a warm boot. | 01-26-2012 |
20120023320 | BIOS CHIP RECOVERY SYSTEM AND COMPUTER THEREOF - A computer having a BIOS recovery function includes a baseboard management controller (BMC) circuit, a main control circuit, a switching module and a BIOS chip. The switching module is connected to the BMC circuit and the main control circuit. The BIOS chip stores BIOS programs for the computer and is selectively connected to the BMC circuit and main control circuit by the switching module. When the BIOS programs are corrupted, the switching module selects the BMC circuit to communicate with the BIOS chip. New BIOS programs can be sent to the BIOS chip to update the corrupted BIOS programs. | 01-26-2012 |
20120023321 | COMPUTER SYSTEM - A computer system including a first memory unit, a second memory unit, a switch and a microcontroller is provided. The first memory unit stores a first basic input/output system (BIOS). The microcontroller is coupled to the first memory unit, the second memory unit and the switch. Prior to a starting of the computer system, the microcontroller reads the first BIOS in the first memory unit and stores the first BIOS to the second memory unit when the microcontroller detects that the switch is conducted. | 01-26-2012 |
20120023322 | BIOS IMAGE MANAGER - A machine and method to manage BIOS images. | 01-26-2012 |
20120030454 | SYSTEM AND METHOD FOR DYNAMICALLY CONFIGURING PROCESSING SPEEDS IN A WIRELESS MOBILE TELECOMMUNICATIONS DEVICE - There is disclosed a system and method executable in a wireless mobile communication device for dynamically configuring processing speed for a main processor in the device during device initialization. In an embodiment, the method comprises: initiating a boot-rom procedure; determining whether a battery is present in the device, and in response to the presence of the battery, determining whether the battery charge level is above a predetermined threshold; determining whether a USB connection to the device is present, and in response to the presence of a USB connection, enumerating the USB connection; and wherein, in response to the presence of the battery and the battery charge level being above a predetermined threshold, or in response to the USB connection being enumerated at a higher current, the processing speed of the main processor is increased. | 02-02-2012 |
20120030455 | Information handling system remote input/output connection system - An information handling system (IHS) remote input/output (I/O) connection system includes an enclosure having a power button, a communication bus connection point, and an audio connection point. A cable dongle extends from the enclosure. The cable dongle has a first end and a second end. The cable dongle also includes a connection from the power button on the enclosure on the first end to a communication connection point plug on the second end, which mates with a connection point plug on a remote I/O device card that enables a parallel (ACPI) S5-capable power button from the IHS to exist on the enclosure. The cable dongle further includes a communication cable coupled to the communication bus connection point on the first end and having a communication connection point plug on the second end. In addition, the cable dongle includes an audio cable coupled to the audio connection point on the first end and having an audio connection point plug on the second end. | 02-02-2012 |
20120030456 | Booting Devices Using Virtual Storage Arrays Over Wide-Area Networks - Virtual storage arrays consolidate data storage at a data center for physical and virtual computer systems at one or more branch network locations. Standalone and virtualized computer systems at a branch network location load, execute, and store their operating systems, applications, and data using virtual storage arrays and do not require any built-in or external non-volatile data storage devices such as hard disk drives or solid-state drives at the branch network location. The virtual disks of the virtual storage array are mapped to physical data storage at the data center and accessed via a WAN using storage block-based protocols. A storage block cache at the branch network location includes storage blocks prefetched based on knowledge about the computer systems at the branch network location and the behavior of their operating systems and applications. | 02-02-2012 |
20120030457 | OFFLOADING THE PROCESSING OF A NETWORK PROTOCOL STACK - A computer system is partitioned during a pre-boot phase of the computer system between a first partition and a second partition, wherein the first partition to include a first processing unit and the second partition to include a second processing unit. An Input/Output (I/O) operating system is booted on the first partition. A general purpose operating system is booted on the second partition. Network transactions are issued by the general purpose operating system to be performed by the I/O operating system. The network transactions are performed by the I/O operating system. | 02-02-2012 |
20120030458 | METHOD AND APPARATUS FOR BOOTING HOST - Provided are a method and a device for booting a host embodying a downloadable conditional access system (DCAS), wherein one of a plurality of pre-determined booting modes is decided as a booting mode of the host based on first information indicating whether a host can communicate with a broadcasting service provider and second information indicating whether a software-based security client providing information required for decrypting broadcasting data is installed to a hardware-based security module connected to the host, and the host is booted in the decided booting mode. | 02-02-2012 |
20120036346 | PARTIAL HIBERNATION RESTORE FOR BOOT TIME REDUCTION - Checkpoint snapshots of segments of system memory are taken while an operating system is booting in a computer system. The segments of system memory are stored in non-volatile memory as hibernation files. In response to detecting a request for a system reboot of the OS, an affected hibernation file, which corresponds to an affected segment of system memory that will change during the system reboot of the OS, is identified. A restoration of the system memory via a wake-up from hibernation is then initiated. The wake-up from hibernation proceeds until the affected hibernation file is reached, such that initial steps in the system reboot are bypassed. Thereafter, subsequent steps, which are after the bypassed initial steps in the system reboot, are executed. | 02-09-2012 |
20120036347 | PROVIDING FAST NON-VOLATILE STORAGE IN A SECURE ENVIRONMENT - In one embodiment, a peripheral controller coupled to a processor can include a storage controller. This storage controller can control access to a non-volatile storage coupled to the peripheral controller. The storage may include both secure and open partitions, and the storage controller can enable access to the secure partition only when the processor is in a secure mode. In turn, during unsecure operation such as third party code execution, visibility of the secure partition can be prevented. Other embodiments are described and claimed. | 02-09-2012 |
20120042156 | METHOD OF MULTIPLE BOOT MANAGER - The present invention provides a method of multiple boot manager in a computer equipped with BIOS and a storing medium. The storing medium is defined with a partition for multiple boot manager, a first partition and a second partition, wherein the partition for multiple boot manager contained with a multiple boot manager and address flags. Firstly, starting up a computer is executed for loading a first operating system located on the first partition. Then altering operating system is executed which includes: executing an application program and creating a conversational option interface for choice by the user; altering the address flag to direct the second partition. Finally, rebooting a computer is executed which includes: unloading the first OS; loading the partition for multiple boot manager; directing to the second partition according to the address flag of the partition for multiple boot manager and multiple boot manager loading the second partition; loading the second OS located on the second partition. | 02-16-2012 |
20120042157 | RAM Based Security Element for Embedded Applications - An integrated circuit includes a demodulator for receiving an encrypted message and a hardware unit coupled to the demodulator and configured to enable the demodulator to decrypt the received message. The hardware unit includes a processing unit, a read-only access memory (ROM) having a boot code causing the integrated circuit to fetch data from an external memory, a random access memory (RAM) for storing the fetched data, multiple non-volatile memory registers or fuses, and an interface unit configured to write the data stored in the RAM to an external storage in response to a backup event. The data may be encrypted using an encryption key prior to being written to the external storage. The interface unit may include a direct memory access controller. The external memory and the external storage can be a same non-volatile memory, namely a Flash device. | 02-16-2012 |
20120042158 | APPARATUS AND METHOD FOR IMPROVING CAPABILITY OF WI-FI IN WIRELESS COMMUNICATION SYSTEM - An apparatus and a method for configuring security for connection between a portable terminal supporting a Wireless-Fidelity (Wi-Fi) function and an Access Point (AP) are provided. More particularly, an apparatus and a method are provided for preventing access failure caused by an access request of a portable terminal while an AP of an un-configured mode, which is completing security setup using a Wi-Fi Protected Setup (WPS) function, is rebooted. The apparatus includes an AP for providing a terminal with a time taken to reboot after configuring security information based on a WPS function in an un-configured mode, wherein the terminal sends a request to access the AP after the rebooting has completed by determining the time taken to reboot received from the AP of the un-configured mode. | 02-16-2012 |
20120042159 | APPLICATION METHOD FOR INTEGRATING HETEROGENEOUS OPERATING SYSTEMS BASED ON THE SAME SYSTEM KERNEL - An application method for integrating heterogeneous operating systems based on the same system kernel is disclosed. The application method includes opening a master virtual console corresponding to a master operating system, opening a slave virtual console corresponding to a slave operating system in the master virtual console, and establishing a share information area for the master operating system and the slave operating system and switching to slave virtual console to operate on the slave operating system. | 02-16-2012 |
20120047356 | Isolation of Device Namespace to Allow Duplicate/Common Names in Root Volume Group Workload Partitions - A mechanism is provided for isolation of device namespace to allow duplicate or common names in root volume group workload partitions. The mechanism creates a scratch file system that contains enough information to create an execution environment for a workload partition and information about which physical volumes to use for the root volume group file systems. The mechanism then populates the root file systems on a disk in the global space. The mechanism boots the workload partition from the scratch file system and configures the devices to be exported to the workload partition based information in the scratch file system. The mechanism then renames the logical volume names to the traditional names. The mechanism then temporarily mounts the root volume group file system onto the scratch file system. | 02-23-2012 |
20120047357 | METHODS AND SYSTEMS FOR ENABLING CONTROL TO A HYPERVISOR IN A CLOUD COMPUTING ENVIRONMENT - A method for enabling control in a cloud computing environment includes initializing a portion of computing resources identified for enabling service to a user system in a cloud computing environment. The method may also include enabling service to the user system. Further, the method may include initializing another portion of the computing resources. After the service in the cloud computing environment has been enabled, cloud computing services may be provided by the host system to one or more user systems. | 02-23-2012 |
20120047358 | METHOD AND SYSTEM FOR ACCELERATING BOOTING PROCESS - A method and a system for accelerating booting process are provided. The method is adapted to an electronic device having a processor, an embedded controller, and a system memory, in which program codes of a basic input/output system (BIOS) and the embedded controller of the electronic apparatus are commonly stored in the system memory. In the method, when receiving a booting triggering signal of the electronic apparatus, the processor controls the embedded controller to cease accessing the system memory, so as to load the BIOS program code from the system memory to a cache memory and execute power-on self test (POST) procedure. After the program code is loaded, the processor controls the embedded controller to return to a normal mode so as to access the system memory and execute monitoring functions. | 02-23-2012 |
20120060021 | Method and Device For Modular Configuration Deployment At Run Time - A device includes a data interface and a memory. The memory includes a first memory area and a second memory area. The first memory area stores a base module including an operating system and boot logic operative to load a further module. The second memory area stores a module comprising a software application. The first memory area and the second memory area do not reside within a file system. | 03-08-2012 |
20120060022 | METHOD AND SYSTEM FOR ADJUSTING CPU FREQUENCY - A method for adjusting central processing unit (CPU) frequency according to the CPU utilization rate in a computer, the method includes the following steps. A Basic Input Output System (BIOS) is booted by turning on the computer. A performance monitor in the CPU is started by the BIOS. A timer is turned on by the BIOS. The system management interrupt program is read by the timer during a time period. A number of clock signals and time values is recorded by the performance monitor in two adjacent time periods. The CPU utilization rate is determined by the performance monitor according to number of clock signals, the time values, and a CPU clock speed. A CPU frequency is adjusted by the BIOS according to the CPU utilization rate. The computer's operation system (OS) is booted by the BIOS. | 03-08-2012 |
20120060023 | METHODS FOR BOOTING AN OPERATING SYSTEM USING NON-VOLATILE MEMORY - A method of booting an operating system can be provided by determining file information that is associated with files accessed during booting of an operating system by a processor. Files associated with the file information can be written into a non-volatile memory. The files can be transferred from the non-volatile memory to a volatile memory during a power on self-test of the processor. | 03-08-2012 |
20120066485 | SYSTEM AND METHOD FOR INSTALLING AND CONFIGURING A TAILORED OPERATING SYSTEM AND USER ENVIRONMENT - The systems and methods disclosed can be used for installing and configuring a tailored operating system and user environment including software products and applications on end-user computers. The systems and methods relate generally to software used to boot a computer with a maintenance operating system and to backup selected data to external storage. The software can initiate an installation of a new operating system and then restores the data that was backed up on external storage. | 03-15-2012 |
20120072710 | DIRECT SCATTER LOADING OF EXECUTABLE SOFTWARE IMAGE FROM A PRIMARY PROCESSOR TO ONE OR MORE SECONDARY PROCESSOR IN A MULTI-PROCESSOR SYSTEM - In a multi-processor system, an executable software image including an image header and a segmented data image is scatter loaded from a first processor to a second processor. The image header contains the target locations for the data image segments to be scatter loaded into memory of the second processor. Once the image header has been processed, the data segments may be directly loaded into the memory of the second processor without further CPU involvement from the second processor. | 03-22-2012 |
20120072711 | Computer Apparatus and Method for Charging Portable Electronic Device Using the Computer Apparatus - A computer apparatus and a method for charging a portable electronic device are provided. The method is implemented in a computer apparatus including a connector. The method includes: (a) detecting whether the portable electronic device is plugged and connected to the connected when the computer apparatus is in a power off state; (b) causing the computer apparatus to execute a boot process if the portable electronic device is plugged and connected to the connector; (c) determining whether the portable electronic device is a predetermined device; (d) sending a charging command to the portable electronic device such that the portable electronic device derives a charging current from the computer apparatus if the portable electronic device is the predetermined device; and (e) causing the computer apparatus to shut down before an operating system is loaded. | 03-22-2012 |
20120072712 | SEMICONDUCTOR INTEGRATED CIRCUIT AND TELEVISION - The present invention provides a low-cost semiconductor integrated circuit on which two CPUs are mounted. The semiconductor integrated circuit integrated in a single chip includes a standby microcomputer, a main microcomputer, and a block circuit which blocks a signal between both microcomputers. The standby microcomputer includes a first Read Only Memory (ROM) which stores a first boot program and a first processing unit which executes the first boot program. The main microcomputer includes a second ROM which stores a second boot program and a second processing unit which executes the second boot program. The first processing unit executes the first boot program when the first power source is switched ON, while the second processing unit executes the second boot program when the second power source is switched ON. | 03-22-2012 |
20120079259 | METHOD TO ENSURE PLATFORM SILICON CONFIGURATION INTEGRITY - Some aspects include beginning a power on self test (POST) by a BIOS for a computer system; enumerating the computer system by the BIOS; providing, based on the enumeration of the computer system by the BIOS, at least one configuration setting of the computer system to a management engine (ME) of the computer system; and applying a lock to the at least one configuration setting by the ME to manage a change to the at least one configuration setting, all prior to an ending of the POST. | 03-29-2012 |
20120079260 | BASIC INPUT-OUTPUT SYSTEM CIRCUIT AND METHOD FOR USING THE SAME - A BIOS circuit for a computer includes a baseboard management controller (BMC), a central processing unit (CPU), a main basic input-output system (BIOS) storage, and a subsidiary BIOS storage. Both the main BIOS storage and the subsidiary BIOS storage store programs for controlling the computer. The CPU executes the programs stored in the main BIOS storage to control the computer. When data of the programs stored in the main BIOS storage is missing or corrupted, the BMC copies data of the programs stored in the subsidiary BIOS storage to the main BIOS storage to recover the missing or corrupted data in the main BIOS storage. | 03-29-2012 |
20120079261 | Control Word Obfuscation in Secure TV Receiver - A device for descrambling encrypted data includes a descrambler, a secure link, and a secure element that securely transmits a control word to the descrambler in a normal operating mode. The secure element includes a first secure register, a read-only memory having a boot code, a random-access memory for storing a firmware image from an external memory, and a processor coupled to the first secure register, the read-only memory, and the random access memory. The processor executes the boot code to generate the control word, stores the control word in the first secure register, and send the stored control word to the descrambler through a secure communication link. The descrambler may include a second secure register that is connected to the first secure register through the secure link. The first and second secure registers are not scannable during a normal operation. The secure link contains buried signal traces. | 03-29-2012 |
20120079262 | START-UP CONTROL APPARATUS AND METHOD - A start-up control apparatus includes a control chip, an advanced configuration and power management interface (ACPI) controller, and a firmware. The control chip includes an analysis module and a control module. The ACPI controller is used for receiving a trigger signal and sending a start-up signal corresponding to the trigger signal to the control module if a computer system is powered off. The firmware is used for sending a status signal to the analysis module after the firmware finishes initialization. The analysis module is further adapted to send the trigger signal to the ACPI controller after receiving the status signal, and the control module is adapted to send the start-up signal to a power supply to provide power for powering on the computer system. | 03-29-2012 |
20120079263 | Method and Device for Initiating System on Chip - A method and apparatus for starting a system on chip, this method includes: enumerating all interfaces which are able to start after the system on chip is powered on and an initial boot program is started; and reading measurement data of each starting interface in sequence, and when it is detected that a certain starting interface has connected with a starting device and this starting device is the only, load a subsequent boot program from this starting interface to complete system starting. The method solves the problem that the system on chip is only able to be started in the fixed configuration from the fixed interface or device, and the system on chip is unable to be started once the external starting environment changes existing in the prior art. | 03-29-2012 |
20120084544 | METHODS AND SYSTEMS FOR PROVIDING AND CONTROLLING CRYPTOGRAPHICALLY SECURE COMMUNICATIONS ACROSS UNSECURED NETWORKS BETWEEN A SECURE VIRTUAL TERMINAL AND A REMOTE SYSTEM - Methods and systems for securely connecting a client computer having a secure boot device to a remote server over a communications network are disclosed. One method includes booting a client computer from a trusted set of processing modules stored in the secure boot device, verifying the contents of the trusted set of processing modules prior to execution of these processing modules, and providing authentication information from data stored upon the secure boot device to an authentication server to establish a secure connection to the remote server. The method also includes establishing the secure connection with the remote server using encryption keys stored on the secure boot device, and transferring data between the client computer and the remote server over the secure connection to perform transactions initiated by a user of the client computer. In the disclosed method, the remote server utilizes encryption keys associated with a unique ID from the secure boot device. | 04-05-2012 |
20120084545 | METHODS AND SYSTEMS FOR IMPLEMENTING A SECURE BOOT DEVICE USING CRYPTOGRAPHICALLY SECURE COMMUNICATIONS ACROSS UNSECURED NETWORKS - A secure boot device, method, and system for securely connecting a client computer having a secure boot device to a remote server over a communications network are disclosed. The secure boot device includes a housing having an integrated communication interface, a controller located within the housing and operatively connected to the communication interface, and a memory communicatively connected to the programmable circuit and the communication interface. The memory securely stores program instructions including a boot module, a client terminal process module, an operating system module, and a secure communications interface module. The secure communications interface module includes program instructions for communicating split and encrypted data communicated between a computing system to which the communication interface is connected and a remote computing system. | 04-05-2012 |
20120084546 | Termination-log acquiring program, termination-log acquiring device, and termination-log acquiring method - A client terminal receives, in response to a boot command issued by a user to boot the client terminal, a first start command to start monitoring. The client terminal acquires first time information, repeatedly at certain time intervals from a basic software, and stores the first time information in a storage area. The client terminal receives a termination command to terminate the basic software. If the termination command is a command to terminate the basic software by using the basic software, the client terminal stores normal termination information in the storage area. When a second start command is received, and no normal termination information is stored in the storage area, the client terminal acquires second time information from the basic software and creates, depending on a result of comparison between the second time information and the first time information, log information relating to a termination of the basic software. | 04-05-2012 |
20120084547 | METHOD AND TERMINAL OF BOOTING A COMPUTING SYSTEM - Provided is a method of booting a computing system which performs boot image transmission and device initialization in parallel. For example, using an Internal RAM and direct memory access (DMA), hardware initialization and loading of boot image from a main storage medium to a main memory are performed in parallel, thereby reducing time spent on booting. | 04-05-2012 |
20120084548 | Method and Module for Simulating Keyboard - This disclosure provides a method and a module for simulating a keyboard used in an electronic device having a hot key. The method for simulating a keyboard at least includes the following steps. First, whether the hot key is pressed is checked. If the hot key is pressed, a pressing time of the hot key is calculated. If the pressing time is over a first predetermined time, a first scanning code is sent. When the pressing time is within the first predetermined time, whether to send a second scanning code is determined according to the pressing time. | 04-05-2012 |
20120084549 | Attesting a Component of a System During a Boot Process - A method, apparatus and program product for attesting a component of a system during a boot process. The method comprises the steps of: verifying that the system is in a trusted state; in response to verifying that the system is in a trusted state, requesting an enrollment of the system wherein the requesting step further comprises the step of: retrieving enrollment data associated with the system; retrieving current input data associated with the component of the system; comparing the current input data against the enrollment data in order to determine whether the system can retain its trusted state; wherein in response to the comparing step, if the current input data matches the enrollment data, the system retains its trusted state; and accepting the trusted state until receipt of a notification, from the system having a retained trusted state, of an update to the system. | 04-05-2012 |
20120084550 | INFORMATION PROCESSING SYSTEM AND STARTUP CONTROL METHOD - An information processing system including a control apparatus and a housing includes a device that operates under control of the control apparatus, the control apparatus includes a memory that stores operability information including plural pieces of the operability information each indicate whether an device is operable under the control of the control apparatus, and a startup controller that obtains designation information designating a piece of the operability information from the housing and reads a piece of the operability information designated by the obtained designation information, wherein the startup controller requests the housing to start up the device when the read piece of the operability information indicate that the device is operable, and excludes the device from being subject to startup control when the read piece of the operability information indicates that the device is inoperable. | 04-05-2012 |
20120084551 | FAN CONTROL METHOD AND APPARATUS FOR DEVICE AREA IN INFORMATION HANDLING SYSTEM - A fan control method for an information handling system is provided. The information handling system includes a device area and a fan for providing air flow to the device area. A plurality of devices is installed on the device area. The method includes the steps of: collecting thermal data of installed devices in the device area when booting up the information handling system; determining a threshold power of the installed devices and a discreteness level of the installed devices based on the thermal data; adjusting an initial speed of the fan based on the discreteness level; and calibrating the speed of the fan to obtain an optimized speed thereof based on the threshold power and the adjusted initial speed. A fan control apparatus for an information handling system is further provided. | 04-05-2012 |
20120089825 | APPARATUS AND METHOD FOR GENERATING A BOOT IMAGE THAT IS ADJUSTABLE IN SIZE - A technique for reducing a size of a snapshot boot image by adjusting a structure of the snapshot boot image based on an analysis of a computing system. In addition, according to the technique, the overriding portions of a snapshot based boot image may be loaded first in consideration of a time of use of the system, and therefore a boot time can be reduced. | 04-12-2012 |
20120089826 | METHODS OF OPERATING MEMORY DEVICES AND ELECTRONIC SYSTEMS HAVING MEMORY DEVICES - Methods of operating memory devices and electronic systems having memory devices include initiating a boot mode of operation of the memory device in response to receiving a first command, wherein the first command comprises a pattern of two or more command signals, and terminating the boot mode of operation in response to receiving a second command, wherein the second command comprises a pattern of two or more command signals. | 04-12-2012 |
20120089827 | COMPUTING DEVICE AND METHOD TO REDUCE THE TIME NEEDED FOR THE DEVICE TO START - One example of the invention operates during the device shut-down procedure, to generate a merged command list containing the components from the various individual static command lists. The generated merged command list is then stored in non-volatile memory, and subsequently accessed on the next device start-up to control the launching of required software components. In this way, only one command list, being the merged command list, need be processed on device start-up, and hence device start-up time is reduced. | 04-12-2012 |
20120096250 | PORT THROTTLING ACROSS AN OPERATING SYSTEM RESTART DURING A HOT UPGRADE - A method includes tagging, by a processor executing a first operating system kernel, a region of a volatile memory used by a first storage area network (SAN) adapter driver coupled to a SAN adapter, and decoupling the first SAN adapter driver from the SAN adapter. A boot of a second operating system kernel is then initiated while preserving in the tagged region of the volatile memory contents stored therein. After the boot, a second SAN adapter driver is then coupled to the SAN adapter. | 04-19-2012 |
20120096251 | MEMORY TAGGING AND PRESERVATION DURING A HOT UPGRADE - A method includes tagging, by a processor executing a first operating system kernel, a region of a volatile memory coupled to the processor, and initiating a boot of a second operating system kernel while preserving in the volatile memory contents stored therein. Following the boot of the second operating system kernel, a set of parameters referencing the tagged region is retrieved from the volatile memory, and the tagged region is then used, based on the retrieved set of parameters. | 04-19-2012 |
20120096252 | PREPARING AND PRESERVING A SYSTEM CONFIGURATION DURING A HOT UPGRADE - A method includes storing, to a volatile memory coupled to a processor executing a first operating system kernel, a planned system configuration, and tagging the planned system configuration. A boot of a second operating system kernel is initiated while preserving in the volatile memory contents stored therein, and following the boot of the second operating system kernel, a set of parameters referencing the tagged planned system configuration is retrieved from the volatile memory. The planned system configuration is then used, based on the retrieved set of parameters. | 04-19-2012 |
20120096253 | METHOD FOR AUTOMATICALLY SETTING UP SYSTEM - A method for automatically optimizing a configuration of a BIOS is suitable for configurating a computer system. During a BIOS power-on self test, a running operating system predetermined index is obtained from a memory. An optimal system setting parameter corresponding to the running operating system predetermined index is obtained. The computer system is automatically set up according to the optimal system setting parameter. A booting process is performed to start an operating system. An operating system index of the operating system is obtained. The operating system index is compared with the running operating system predetermined index. When the operating system index is not equal to the running operating system predetermined index, a system setting warning is issued. The running operating system predetermined index is updated by using the operating system index as the updated running operating system predetermined index in the memory. | 04-19-2012 |
20120096254 | SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCT FOR RETRIEVING DATA AT BOOT TIME - The invention provides a system for retrieving at boot time user data stored on a computer. The computer comprises a processor coupled through a system bus to I/O devices and to a system memory, the computer further having a basic input output system (BIOS) unit operatively coupled to the system bus for loading a computer operating system during a computer boot procedure, wherein the system memory being accessible to the computer operating system via the system bus. The system comprises a boot adapter for connecting the system bus to a boot bus, a boot memory coupled to the boot bus wherein the boot memory comprises storage locations for storing the predefined user data, and program code means coupled to the BIOS unit. The program code means are operative for loading a boot operating system during the computer boot procedure, the boot operating system having instructions for accessing the boot memory during the computer boot procedure. | 04-19-2012 |
20120096255 | SERVER AND METHOD FOR MANAGING I2C BUS OF THE SERVER - In a method for managing an inter-integrated circuit (I2C) bus of a server, a bus flag is set for the I2C bus using a BMC. When the BMC requires to detect a temperature of a memory of the server, the temperature is detected by accessing a SPD chip of the server through the I2C bus if a value of the bus flag is a first value. The value of the bus flag is changed to a second value when the memory requires to be initialized by a BIOS, and a delay for a predetermined time period occurs. Configuration information of the memory is acquired by the BIOS from the SPD chip through the I2C bus when the predetermined time period is elapsed, and the memory is initialized by the BIOS according to the configuration information. The value is reset to the first value after the memory is initialized. | 04-19-2012 |
20120096256 | MOBILE DEVICE AND METHOD FOR SUPPORTING HIBERNATION FUNCTION - A method and apparatus for supporting a hibernation function in a mobile device are provided. In the method, the mobile device detects a wakeup event in a hibernation mode and, in response to the wakeup event, loads a snapshot image into a volatile memory from a snapshot image region of a nonvolatile memory. After the loading of the snapshot image, the mobile device determines whether there is a system status has been modified. If the system status has not been modified, the mobile device finishes a system boot. If the system status has been modified, the mobile device performs data synchronization and then finishes the system boot. | 04-19-2012 |
20120102305 | METHODS AND APPARATUS FOR BUILDING SYSTEM IMAGES AND SPLIT BOOTING - An example of a method for facilitating split booting includes executing a base system image file of a system, initializing components of the first computing device, loading the extended system image file, and executing the extended system image file from the first computing device without booting the first computing device. The base system image file and an extended system image file of the system are built from a single executable system image file of the system. An example of a method for building system images includes building, as a single executable file, a system image file of a system and dividing the system image file into a base system image file and an extended system image file. An example of a machine-readable storage medium having code for carrying out the method, an apparatus having the machine-readable storage medium, and an apparatus having means for carrying out the method is disclosed. | 04-26-2012 |
20120102306 | SYSTEM FOR INITIATING EXECUTION OF BIOS - A computer device comprising a display member coupled to a base member to enable variable positioning of the display member relative to the base member, and an initiating system to automatically initiate execution of a basic input output system (BIOS) based on a position of the display member relative to the base member. | 04-26-2012 |
20120102307 | METHOD AND APPARATUS INCLUDING ARCHITECTURE FOR PROTECTING SENSITIVE CODE AND DATA - A secure execution environment for execution of sensitive code and data including a secure asset management unit (SAMU) is described. The SAMU provides a secure execution environment to run sensitive code, for example, code associated with copy protection schemes established for content consumption. The SAMU architecture allows for hardware-based secure boot and memory protection and provides on-demand code execution for code provided by a host processor. The SAMU may boot from an encrypted and signed kernel code, and execute encrypted, signed code. The hardware-based security configuration facilitates preventing vertical or horizontal privilege violations. | 04-26-2012 |
20120102308 | BOOTSTRAP SYSTEM FOR DUAL CENTRAL PROCESSING UNITS - A bootstrap system for dual central processing units includes a south bridge, a first central processing unit, a second central processing unit and a switch control module. The south bridge provides enable signals and reset signals, the first central processing unit provides an identification signal and an operation signal. The second central processing unit receives the enable signals and reset signals. The switch control module receives the identification signal and the operation signal from the first central processing unit to generate a corresponding switch command signal. The south bridge is selectably and electrically connected to the first central processing unit or the second central processing unit under the control of switch command signal. | 04-26-2012 |
20120102309 | PREBOOT EXECUTION ENVIRONMENT TEST DEVICE AND METHOD - A preboot execution environment (PXE) test device includes a microprocessor, one or more indicators, a network interface, a power connector, and a storage device. The network interface connects the PXE test device with a computer. The power connector connects an external power source to supply a voltage to the PXE test device. The storage device stores a boot loader, an embedded operating system, and one or more programs. The microprocessor executes the boot loader and the embedded operating system to start the PXE test device. The one or more indicators indicate a power supply status and a starting status of the PXE test device. The microprocessor further executes the one or more programs to remotely boot the computer for test PXE of a network card in the computer. | 04-26-2012 |
20120102310 | MEMORY SYSTEM AND RESET METHOD THEREOF - Provided is a memory system that includes at least one nonvolatile memory device, a plurality of power lines and a plurality of power domains. The power lines receive a power source voltage. The power domains are respectively connected to the power lines. A reset signal is generated by using voltages which are detected from the power lines. The memory system and a reset method thereof detect the voltages of all power lines to generate a reset signal, and thus enhance reliability of data when a power is shut off. | 04-26-2012 |
20120102311 | System and Method for Configuring Option ROM - An information handling system includes a processor, a first memory, a device, and a management controller that includes a second memory. The management controller obtains configuration data for the device and stores the configuration data in the first memory while the processor is powered off, and configures the device based upon the configuration data from the first memory in response to booting the information handling system. | 04-26-2012 |
20120102312 | DECOUPLED HARDWARE CONFIGURATION MANAGER - The present disclosure relates to a technique or device to allow hardware related drivers to present a centralized configuration program and, more particularly, to a technique or device to allow hardware related drivers to present configuration information to a centralized user interface manager. | 04-26-2012 |
20120102313 | SECURE BOOT METHOD AND SECURE BOOT APPARATUS - A method to allow a device to boot in a secure fashion, even though some of the components within the secure device's firmware may be not present, not authorised, or not correctly operating. | 04-26-2012 |
20120102314 | SMART PHONE SYSTEM AND BOOTING METHOD THEREOF - The present invention provides a smart phone system, which includes a memory for storing operating systems. The memory includes: a boot zone for storing a boot load program for initialization and loading a selected bootloader into a RAM when a system hardware is powered up; bootloader zones of at least two operating systems for respectively store the bootloader of the first operating system and the second operating system; binary code zones of the at least two operating systems for respectively store binary codes of the first operating system and the second operating system. An arbitrary operating system can be selected to boot among various operating system when booting the smart phone system. Therefore, adaptability and extendibility of the smart phone can be increased without the costs of adding a hardware. | 04-26-2012 |
20120110311 | CUSTOMIZED KIOSK MODES OF OPERATION - Techniques for customized kiosk modes of operation are provided. A kiosk is configured to recognize periods of operation that are slow, moderate, or busy. A number of factors can be used to automatically recognize these periods and change the periods on demand. For each type of period (slow, moderate, or busy), the kiosk uses a different customized mode of operation so as to optimally use the kiosk for the benefit of the kiosk owner, customers interfacing with the kiosk, and marketers selling advertisements via the kiosk. | 05-03-2012 |
20120110312 | System and Method for an Access Controller Assisted Boot - Systems and methods for reducing problems and disadvantages associated with network boots are disclosed. In accordance with an embodiment of the present disclosure, an information handling system comprises a processor, a memory communicatively coupled to the processor, and an access controller communicatively coupled to the processor. The access controller has stored thereon a general pre-boot file and configured to receive boot configuration information from a management server. The access controller further configured to generate a boot script according to the boot configuration information and generate a specific pre-boot file based on the general pre-boot file and the boot script. The access controller is further configured to configure the information handling system to boot to a target based on the specific pre-boot file. | 05-03-2012 |
20120110313 | ENHANCED REBOOT COMMAND - A method and system allows a computer system to perform a network reboot in response to an enhanced reboot command. The computer system receives a command to load an operating system and interprets the command to determine whether a physical machine or a virtual machine is to be rebooted. In response to a determination that the command indicates the use of a network option, the computer system loads the operating system from a networked server, and perform rebooting according to the interpreted command with the use of the operating system. | 05-03-2012 |
20120110314 | BOOTING ACCESS METHOD AND MEMORY DEVICE OF EMBEDDED SYSTEM - A booting access method and a storage device of an embedded system are provided. The booting access method of the embedded system is applied to the storage device which includes a master boot record (MBR) section, a hidden section and a public section to improve access precision of embedded memory data. The access method includes: using the MBR section to access data of the public section when a normal booting signal is received; using a boot loader in the hidden section to update the MBR section and then accessing data of the public section when a trigger update signal is received. | 05-03-2012 |
20120117364 | Method and System for Operating a Handheld Calculator - A method for operating a handheld calculator having a controllable power domain is provided. The method includes receiving, by the handheld calculator, a signal to power down the handheld calculator, storing context information of at least one component in the controllable domain in an external memory, setting a boot indicator to indicate a quick boot on power up, and removing power from the controllable power domain. | 05-10-2012 |
20120117365 | FIRMWARE UPDATE METHOD AND SYSTEM FOR MICRO-CONTROLLER UNIT IN POWER SUPPLY UNIT - Disclosed is a firmware update system for a micro-controller unit in a power supply unit. The micro-controller unit includes a central processing unit and a flash memory connected to the central processing unit. The flash memory includes a boot program sector, a main program sector, and a temporary data sector, where the boot program sector contains a boot program and the main program sector contains a main program to be executed by the central processing unit under a normal operating mode, and the temporary data sector is set to contain a downloaded firmware code to be copied to the main program sector to replace the main program, thereby updating the flash memory. The downloaded firmware code contains a sector checksum value and a firmware signature for allowing the boot program to validate if the downloaded firmware code is valid and authentic, and the boot program sector and the main program sector are accessed by a virtual address. | 05-10-2012 |
20120117366 | METHOD FOR CONTROLLING MULTI-PORT NETWORK INTERFACE CARD - A method for controlling a multi-port Network Interface Card (NIC) is provided. In a computer using the multi-port NIC with a plurality of NIC ports, a plurality of control options is set into a Basic Input/Output System (BIOS) setup menu, so that a user individually controls the NIC ports. Furthermore, due to the characteristic that after a reference code process in the BIOS restarts a system, the set of hardware becomes effective, an action of controlling the NIC ports is set before a reference code process restarts the system. | 05-10-2012 |
20120117367 | ELECTRONIC APPARATUS AND BOOTING METHOD THEREOF - An electronic apparatus and a booting method thereof are provided. First boot partition information of the electronic apparatus recorded at previous booting is obtained. Second boot partition information at current booting is obtained. Next, the first boot partition information and the second boot partition information are compared, so as to update the first boot partition information with a changed entry. Thereafter, a boot order is decided according to the updated first boot partition information. | 05-10-2012 |
20120117368 | Method for Rapidly Booting Up a Computer System - A method for booting up a computer is disclosed. Initially, a memory image of a boot program is stored in a main memory of a computer. The memory image includes a first initialization code and a second initialization code. During the booting process of the computer, first initialization code is executed. In response to the completion of the execution of the first initialization code, the boot program is shifted to an idle state. In response to an activation event, the second initialization code is executed. | 05-10-2012 |
20120117369 | PLATFORM BOOT WITH BRIDGE SUPPORT - A method for booting a processing device, the processing device comprising a first and a second processing unit, the method comprising: detecting by the first processing unit, whether at least one boot configuration parameter is accessible from a non-volatile storage medium of the processing device, the at least one configuration parameter being indicative of a boot interface; if said at least one configuration parameter is available, forwarding at least a part of the detected at least one configuration parameter by the first processing unit to the second processing unit; otherwise detecting by at least one of the first and second processing units whether a boot interface is available to the processing device; booting at least the second processing unit from the indicated or detected boot interface. | 05-10-2012 |
20120117370 | HARDWARE DIAGNOSTICS AND SOFTWARE RECOVERY ON HEADLESS SERVER APPLIANCES - Described is a headless server appliance configured with a secondary actuation mechanism that when actuated, enters the headless server appliance into a diagnostic mode. For example, the diagnostic mode may correspond to a secondary operating system booted from a BIOS component activated by the secondary actuation mechanism. In the diagnostic mode, primitives may be communicated between a client device coupled (e.g., via a network or USB connection) to the headless server appliance, such as to provide the client device with access to the headless server appliance's hard disk. Other primitives, such as communicated via APIs, may provide the client device with access to the BIOS. The secondary operating system and/or client device may perform diagnostics and recovery operations on the headless server appliance. For example, the client device or similar source may restore or update the primary operating system image to a storage medium of the headless server appliance. | 05-10-2012 |
20120124354 | DYNAMICALLY SELECT OPERATING SYSTEM (OS) TO BOOT BASED ON HARDWARE STATES - Disclosed is a microprocessor based system with a dynamically selectable Operating System that is capable of providing unique operating systems based upon current hardware states without user intervention. The system will determine the current state of the system and select from a plurality of operating systems the best operating system to load. In normal operating conditions the system will select the most full-featured and robust operating system. If, for example, the system loses alternating-current power, the system will shutdown, reboot, and automatically select an operating system with very limited capabilities and limited power consumption to allow the system to retrieve important data from the cache and store the data to a data storage device. | 05-17-2012 |
20120124355 | SINGLE VOLUME IMAGE FILE EXTRACTION - Disclosed is a method of booting a virtual machine. A file, accessible by a privileged domain that includes an index file image and a plurality of other file images is stored. The index file image is of a predetermined, fixed size and includes a file name and a file size for each of the other images in the file. The privileged domain provides the file to one or more non-privileged virtual machines as a single disk image of the fixed size mounted on the non-privileged virtual machine. The other file images are extracted by the virtual machines based on the file names and file sizes stored in the index file image. | 05-17-2012 |
20120124356 | METHODS AND APPARATUSES FOR RECOVERING USAGE OF TRUSTED PLATFORM MODULE - Methods and systems to perform platform security in conjunction with hardware-base root of trust logic are presented. In one embodiment, a method includes determining whether a status from an authenticated code module is indicative of an error or not. The method further includes determining whether the hardware-based root of trust logic is enabled based on content in a non-volatile memory location. If the hardware-based root of trust is enabled and the status is indicative of an error, the method further includes writing to the non-volatile memory location to disable hardware-based root of trust logic during a next boot sequence. In one embodiment, a platform initializes and uses the trusted platform module in conjunction with the hardware-based root of trust logic or with a platform-based root of trust logic. | 05-17-2012 |
20120124357 | METHOD OF PROVISIONING FIRMWARE IN AN OPERATING SYSTEM (OS) ABSENT SERVICES ENVIRONMENT - Methods and apparatuses for re-instantiating a firmware environment that includes one or more firmware functions available at pre-boot time when transitioning the computing device from a first, higher power consumption state to a second, lower power consumption state. The firmware environment determines whether a cryptographic signature on a firmware volume is verified; whether hardware resources of the computing device requested by a manifest of the firmware volume are available; and whether a firmware module of the firmware volume is compatible with installed firmware of the firmware environment. If so, the firmware environment reserves space in a memory to accommodate resources used by the firmware module, and executes the firmware module with the computing device in the second, lower power consumption state. | 05-17-2012 |
20120124358 | CONFIGURATION INFORMATION RECOVERING SYSTEM AND METHOD - A basic input output system (BIOS) microchip of a card and method recovers configuration information of the BIOS microchip of the card. The BIOS microchip of the card invokes a reading function from a BIOS microchip of a motherboard to read predetermined configuration information from the BIOS microchip of the motherboard. The BIOS microchip of the card replaces the configuration information stored in the BIOS microchip of the card by the predetermined configuration information, in response to a determination that the configuration information stored in the BIOS microchip of the card is different from the predetermined configuration information. | 05-17-2012 |
20120124359 | PROGRAM PROCESSING APPARATUS - A program processing apparatus includes an internal memory An internal memory is arranged to save a first program for activating a target program. A first designator designates the first program in response to a first manipulation in a state that an external memory which saves a second program for updating the internal memory is removed and the first program is saved in the internal memory. A second designator designates the second program in response to a second manipulation in a state that the external memory is attached. An executer executes the program designated by one of the first designator and the second designator. | 05-17-2012 |
20120124360 | Method and Apparatus for Booting a Processing System - Machine-readable media, methods, apparatus and system for booting a processing system are described. In an embodiment, whether to launch an open operating system or a closed operating system to boot a processing system may be determined. A key may be retrieved from a processor register of the processing system and used to decrypt an encrypted version of the closed operating system based at least in part on a determination of booting the processing system with the closed operating system. In another embodiment, the processor register stored with the key may be flushed based at least in part on a determination of booting the processing system with the open operating system. | 05-17-2012 |
20120124361 | PLURALITY OF INTERFACE FILES USABLE FOR ACCESS TO BIOS - A system may comprise a processor ( | 05-17-2012 |
20120124362 | APPARATUS AND METHOD FOR RECORDING REBOOT REASON OF EQUIPMENT - Embodiments of the present invention provide an apparatus and a method for recording a reboot reason of equipment. Besides a first watchdog provided for triggering a global reset of the equipment, the apparatus provided by the present invention further includes a second watchdog. The second watchdog is used to trigger a logic chip to record a value representing the reboot reason of power-down in a storage array after the equipment is powered on. Thus, reboot reason of the equipment could recorded as power-down reboot. | 05-17-2012 |
20120131318 | SERVER AND METHOD FOR PERFORMING DATA RECOVERY OF THE SERVER - A method for performing data recovery of a server sends a data recovery request from a basic input output system (BIOS) of the server to a backup microchip of the server if a master operating system (OS) of an original microchip of the server is not available when the server is powered on, obtains a backup initial OS of the server from a storage unit of the backup microchip, and boots the backup initial OS according to a bootstrap of the backup initial OS. The method further obtains a backup master OS of the server from the storage unit of the backup microchip, sends the backup master OS to the original microchip of the server, and restarts the server according to the backup master OS. | 05-24-2012 |
20120131319 | SECURITY PROTECTION SYSTEM AND METHOD - A server includes a baseboard management controller (BMC). The server receives a first password and a second password input by a user. The BMC stores a first cryptograph corresponding to the first password in a field-replaceable unit (FRU) of the BMC. If a second cryptograph corresponding to the second password is the same as the first cryptograph, the server is started up. If the second cryptograph is not the same as the first cryptograph and a number of times that the second password has been input is greater than a predefined number of times, the server is locked. | 05-24-2012 |
20120131320 | BOOTING APPARATUS AND METHOD USING SNAPSHOT IMAGE - Provided are a booting apparatus and method using a snapshot image. A snapshot image may be divided into a plurality of blocks. Each of the blocks may be stored in a nonvolatile memory in a compressed or non-compressed format. The snapshot image may be incrementally loaded in units of the blocks during booting. The loading and decompression of the blocks may be performed in parallel. | 05-24-2012 |
20120131321 | Contextual History of Computing Objects - Various features for a computer operating system include mechanisms for operating where a single native application, in the form of a Web browser, exists for an operating system, and all other applications run as Web apps of the browser application. A computer-implemented object tracking method includes instantiating, a first time, an operating system object on a computing device; automatically identifying contextual meta data that defines a state of objects that are open on the computing device, other than the instantiated operating system object, when the operating system object is instantiated; and storing the identifying contextual meta data in correlation with the operating system object, wherein the contextual meta data identifies one or more objects that are active in the operating system when the operating system object is instantiated. | 05-24-2012 |
20120131322 | System and Method for Authenticating a Gaming Device - A method and system are provided for authenticating and securing an embedded device using a secure boot procedure and a full non-volatile memory encryption process that implements Elliptic Curve Pinstov-Vanstone Signature (ECPV) scheme with message recovery on a personalized BIOS and master boot record. The signature includes code that is recovered in order to unlock a key that is in turn used to decrypt the non-volatile memory. The use of ECPVS provides an implicit verification that the hardware is bound to the BIOS since the encrypted memory is useless unless properly decrypted with the proper key. | 05-24-2012 |
20120131323 | SYSTEM INCLUDING A VIRTUAL DISK - A client configured to be connected and disconnected from a network includes: a memory storing a local mirrored copy of an image stored on a virtual disk server connected to the network; and a driver configured to access both the image stored on the virtual disk server and the local mirrored copy of the image when the client is connected to the network and to access only the local mirrored copy of the image when the client is disconnected from the network without requiring a reboot of the client after connecting or disconnecting from the network. | 05-24-2012 |
20120137113 | METHOD OF POWERING ON SERVER - A method of powering on a server is provided, wherein the server includes power consumption modules with the same functions, connectors, and a BIOS (Basic Input/Output System). The power consumption modules are connected to the server via the connectors respectively. This method includes the steps as follows. At first, the BIOS detects a delay power-up setting. When the delay power-up setting is detected, the BIOS staggers initialization times of the connectors, so that the connectors can be initialized respectively. When one of the connectors has been initialized, the connector is electrically connected to the corresponding power consumption module, so that the power consumption module can be delayed to be powered on. | 05-31-2012 |
20120137114 | METHOD AND CIRCUIT FOR RESETTING REGISTER - A method for reset a register includes the following step: a computer starts to be booted and perform a booting procedure. Wherein, the computer includes at least one register. Power is supplied to the at least one register. Determine if the computer is booted successfully. If it is determined that the computer fails to be booted, the at least one register is kept to be grounded for a predetermined period of time to reset the at least one register. After the at least one register is grounded, power is supplied to the at least one register again, and the computer is rebooted. | 05-31-2012 |
20120137115 | METHOD AND DEVICE FOR SIMULATING A RESET SIGNAL IN A SIMULATED SYSTEM ON CHIP - A method and system for simulating a reset signal in a modeled system comprises a reset control module and a module to be reset. Operations of the system include emitting by a control thread of the control module a reset signal, receiving by the module to be reset the reset signal, waking up a thread of the module to be reset, and waiting for a reset signal. If the thread is woken up by the reset signal further operations include activating a reset exception by the thread, and if a reset exception is raised, making the thread wait for a reboot signal, transmitting the reboot signal by the control thread to the module to be reset, and after receiving the reboot signal, activating the thread which executes and waits for a reset signal. | 05-31-2012 |
20120137116 | COMPUTER SYSTEM AND CONTROL METHOD OF THE SAME - A computer system includes a device which transmits data through a predetermined interface and outputs first recognition information in response to a predetermined power on self test (POST) control signal, a device controller which has second recognition information about whether the device is mounted, and a system controller which outputs the POST control signal to the device when powering on, and recognizes the device on the basis of the first recognition information and the second recognition information. | 05-31-2012 |
20120137117 | SYSTEM AND METHOD FOR PROVIDING SECURE VIRTUAL MACHINES - The present invention provides improved security in a virtual machine. By extending the capabilities of modern secure processors, privacy of computation is provided from both the owner of the equipment and other users executing on the processor, which is an advantageous feature for rentable, secure computers. In addition to the hardware extensions required to secure a virtualizable computer, an infrastructure for the deployment of such processors is also provided. Furthermore, a signaling flow to establish the various relationships between the owner, user and manufacturer of the equipment is disclosed. | 05-31-2012 |
20120144177 | FAST COMPUTER STARTUP - Fast computer startup is provided by, upon receipt of a shutdown command, recording state information representing a target state. In this target state, the computing device may have closed all user sessions, such that no user state information is included in the target state. However, the operating system may still be executing. In response to a command to startup the computer, this target state may be quickly reestablished from the recorded target state information. Portions of a startup sequence may be performed to complete the startup process, including establishing user state. To protect user expectations despite changes in response to a shutdown command, creation and use of the file holding the recorded state information may be conditional on dynamically determined events. Also, user and programmatic interfaces may provide options to override creation or use of the recorded state information. | 06-07-2012 |
20120144178 | FAST COMPUTER STARTUP - Fast computer startup is provided by, upon receipt of a shutdown command, recording state information representing a target state. In this target state, the computing device may have closed all user sessions, such that no user state information is included in the target state. However, the operating system may still be executing. In response to a command to startup the computer, this target state may be quickly reestablished from the recorded target state information. Portions of a startup sequence may be performed to complete the startup process, including establishing user state. To protect user expectations despite changes in response to a shutdown command, creation and use of the file holding the recorded state information may be conditional on dynamically determined events. Also, user and programmatic interfaces may provide options to override creation or use of the recorded state information. | 06-07-2012 |
20120144179 | FAST COMPUTER STARTUP - Fast computer startup is provided by, upon receipt of a shutdown command, recording state information representing a target state. In this target state, the computing device may have closed all user sessions, such that no user state information is included in the target state. However, the operating system may still be executing. In response to a command to startup the computer, this target state may be quickly reestablished from the recorded target state information. Portions of a startup sequence may be performed to complete the startup process, including establishing user state. To protect user expectations despite changes in response to a shutdown command, creation and use of the file holding the recorded state information may be conditional on dynamically determined events. Also, user and programmatic interfaces may provide options to override creation or use of the recorded state information. | 06-07-2012 |
20120144180 | BASEBOARD MANAGEMENT CONTROLLER AND METHOD FOR SHARING SERIAL PORT - A baseboard management controller (BMC) connects with a COM serial port. The BMC includes an input queue and an output queue. If a basic input output system (BIOS) of the BMC has been initialized, the COM serial port is used by the BIOS. When a processor of the BMC sends a control command to a sharing system of the BMC, the input queue and the output queue are converted to time division multiplex (TDM) queues. The COM serial port may be used by the BIOS or by the BMC according to an ID flag of each element of the TDM queues. | 06-07-2012 |
20120144181 | MOTHERBOARD AND METHOD FOR DISPLAYING HOST SYSTEM PARAMETER - A motherboard and a method for displaying a host system parameter are provided. The motherboard includes a bridge circuit receiving the host system parameter, a microcontroller connected to the bridge circuit, and a transmitter connected to the microcontroller. The microcontroller is capable of directly capturing the host system parameter from the bridge circuit and then transmitting the system parameter to the transmitter when the motherboard is powered on. | 06-07-2012 |
20120144182 | APPARATUS AND METHOD FOR FAST BOOTING BASED ON VIRTUALIZATION TECHNIQUE - An apparatus for fast booting based on a virtualization technique includes: a hardware comprising a processor, a memory and a storage where a status information corresponding to an operating system (OS) is stored; and a virtual machine monitor (VMM) for interfacing between the OS and the hardware, wherein the VMM is operated by the processor and loads the status information on the memory. Herein, the status information may be pre-generated to include data in the memory in a state where the OS is completely booted. | 06-07-2012 |
20120151198 | System and Method for Instantiation of Distributed Applications from Disk Snapshots - A framework instantiates an application from its disk snapshots taken from a different network environment and migrated to a virtualized environment. Modifications to operating systems and hypervisors are avoided, and no special network isolation support is required. The framework is extensible and plug-in based, allowing product experts to provide knowledge about discovering, updating, starting and stopping of software components. This knowledge base is compiled into a plan that executes various interleaved configuration discovery, updates and start tasks such that a required configuration model can be discovered with minimal start and update task execution. The plan generation automatically stitches together knowledge for the various products, thus significantly simplifying the knowledge specification. Once discovery is complete, the framework utilizes the discovered model to update stale network configurations across software stack and customize configurations beyond network settings. | 06-14-2012 |
20120151199 | Secure Encrypted Boot With Simplified Firmware Update - An approach is provided in which a security module, such as a TPM, identifies a change to a boot configuration used in a secure boot operation. This identification results in a non-release of a secret value that is stored in a memory controlled by the security module. The non-release of the secret value is detected by a boot process when the boot process is initiating a session of the information handling system. In response to the detection by the boot process, the boot process retrieves an update encryption key and then decrypts an update copy of a disk encryption key stored on a nonvolatile storage area of the information handling system using the retrieved update encryption key. The nonvolatile storage area also includes a primary copy of the disk encryption key that has been encrypted with the secret value. | 06-14-2012 |
20120151200 | REMOTE MANAGEMENT OF ENDPOINT COMPUTING DEVICE WITH FULL DISK ENCRYPTION - Methods and apparatus involve protecting data encrypted by a first key on an endpoint computing asset including a drive with full disk encryption. The endpoint has both a main operating system for applications, and the like, and another operating system during a pre-boot phase of operation. During use, the pre-boot operating system prevents a user of the endpoint from accessing the encrypted data and the key. In one embodiment, an information exchange partition on the endpoint is accessible from a remote location and includes data encrypted using a second key accessible to both the pre-boot operating system and the main operating system. Another embodiment allows for the provision of a network connection to the endpoint during the pre-boot phase of operation in accordance with a security policy. | 06-14-2012 |
20120151201 | MANAGEMENT OF MULTIPLE SOFTWARE IMAGES WITH RELOCATION OF BOOT BLOCKS - A method, system and computer program product for managing multiple software images in a data processing entity. At least part of the memory blocks of each of the software images is stored into a corresponding image portion of a mass memory. A current software image stored in a current image is selected. The memory blocks stored in boot locations of the current software image are relocated to a relocation portion of the mass memory. The boot blocks of the current software image are copied into the corresponding boot location. The data processing entity is booted from the boot blocks of the current software image in the corresponding boot locations and each request to access a selected memory block of the current software image by the access function is served. | 06-14-2012 |
20120151202 | MANAGEMENT OF MULTIPLE SOFTWARE IMAGES WITH SHARED MEMORY BLOCKS - A data processing entity that includes a mass memory with a plurality of memory locations for storing memory blocks. Each of a plurality of software images includes a plurality of memory blocks with corresponding image addresses within the software image. The memory blocks of software images stored in boot locations of a current software image are relocated. The boot blocks of the current software image are stored into the corresponding boot locations. The data processing entity is booted from the boot blocks of the current software image in the corresponding boot locations, thereby loading the access function. Each request to access a selected memory block of the current software image is served by the access function, with the access function accessing the selected memory block in the associated memory location provided by the control structure. | 06-14-2012 |
20120151203 | INFORMATION PROCESSING APPARATUS AND STORAGE DEVICE CONTROL METHOD - An information processing apparatus includes: a processor configured to run an operating system; a plurality of storage devices connected to the processor; a detection module configured to detect a boot process for installing the operating system; a determination module configured to acquire device information from each of the storage devices and determine priority rank of the storage devices based on the device information when the detection module detects the boot process being originated from a device other than the storage devices; and a control module configured to install the operating system in a target storage device that is selected from among the storage devices, the target storage device having the highest priority rank determined by the determination module. | 06-14-2012 |
20120159136 | COMPUTER SYSTEM BOOT ENHANCEMENTS WITH USER OVERRIDE - Methods, systems and computer program products are disclosed for enhanced system boot processing that is faster to launch the OS because it does not interrogate I/O devices for possible interruption, but that also may be modified to interrogate such devices based on a user selection mechanism. The user selection mechanism may be, for at least one embodiment, a software mechanism such as a control panel module. For other embodiments, the user selection mechanism may be a hardware mechanism, such as a power button or other hardware button or switch. Other embodiments are described and claimed. | 06-21-2012 |
20120159137 | SECURE LOCAL BOOT USING THIRD PARTY DATA STORE (3PDS) BASED ISO IMAGE - In some embodiments, the invention involves a method and apparatus for secure/authenticated local boot of a host operating system on a computing platform using active management technology (AMT) with a third party data store (3PDS)-based ISO firmware image. A portion of non-volatile memory is hardware secured against access by the host processor and OS, and accessible only to the AMT. The AMT comprises an AT/ATAPI protocol emulator to access an ISO boot image from secured memory, while appearing to the host processor as a communication with an AT/ATAPI device. Other embodiments are described and claimed. | 06-21-2012 |
20120159138 | Mechanism for Virtual Machine Boot Speed-Up by Clock Acceleration - A mechanism for virtual machine (VM) boot speed-up by clock acceleration is disclosed. A method of the invention includes detecting that a VM managed by a hypervisor of a host machine is starting a boot up process, modifying a rate of a clock of the VM to speed up the boot up process, determining that the boot up process of the VM is complete, and returning the rate of the VM clock to a normal operational rate that is slower than the rate of the VM clock during the boot up process. | 06-21-2012 |
20120159139 | MOBILE TERMINAL AND METHOD OF CONTROLLING A MODE SWITCHING THEREIN - A mobile terminal including a communication unit configured to communicate with at least one external terminal; a memory configure to store at least first and second operating systems including at least first and second modes, respectively; and a controller configured to execute the first operating system and to activate the first mode corresponding to the first operating system, to display a first information screen on a display unit corresponding to the activated first mode, to receive a switching signal indicating the first mode is to be switched to the second mode, to activate the second mode and deactivate the first mode, and to display a second information screen on the display unit corresponding to the second mode and that is different than the first information screen. | 06-21-2012 |
20120159140 | PROACTIVE TOKEN RENEWAL AND MANAGEMENT IN SECURE CONVERSATIONS - The present invention relates to methods and systems for method of implementing proactive token renewal and management in secure conversations. The method includes transmitting an secure conversation token (SCT) bootstrap request, receiving a first SCT in response to the SCT bootstrap request, and determining a round trip time (RTT) of the SCT bootstrap request. The method further includes determining the expiration time of the first SCT, based on the combination of the RTT and the expiration of the first SCT, scheduling an SCT renew request, and initiating the SCT renew request. Further, the method includes receiving a second SCT in response to the SCT renew request, receiving an indication that the first SCT has expired, and in response to the indicating, utilizing the second SCT. | 06-21-2012 |
20120159141 | INFORMATION PROCESSING APPARATUS AND START-UP CONTROL METHOD - According to one embodiment, if start-up of an application is abnormal after starting up the application, the information processing apparatus reports the fact to the basic input/output system (BIOS), and the BIOS locks a system. | 06-21-2012 |
20120166783 | RESETTING AN LTE UNIT THAT IS NOT IN A READILY ACCESSIBLE LOCATION - A system may include a device that is in a first location that is not readily accessible. The device may detect a powering up of the device a particular quantity of times during a particular time interval. Powering up of the device may be controlled from a second location that is readily accessible. The device may also be reset, in response to detecting the device being powered up the particular quantity of times during the particular time interval, to original factory settings. | 06-28-2012 |
20120166784 | SYSTEM AND METHOD FOR RECOVERING DATA OF COMPLEMENTARY METAL-OXIDE SEMICONDUCTOR - Parameters of a complementary metal-oxide semiconductor (CMOS) and an associated system time of a server are stored in a field-replaceable unit (FRU) of a baseboard management controller (BMC) of the server. If an error occurs and the CMOS is selected recovering from the BMC, the system time is selected from the FRU. The BMC reads the parameters from the FRU corresponding to the selected system time and sets the CMOS according to the read parameters. | 06-28-2012 |
20120166785 | INFORMATION PROCESSING APPARATUS, RESTORING METHOD OF BIOS SETUP, RESTORING PROGRAM - An information processing apparatus compares a first device model information of the information processing apparatus with second device model information stored in a nonvolatile memory unit being externally connected to the information processing apparatus, and compares first device identification information of the information processing apparatus with second device identification information stored into the nonvolatile memory unit based on detection of a boot-up. When the device model information comparison process is determined to be identical and when the device identification information comparison process is determined to be non-identical, the information processing apparatus reads out second BIOS setup value stored in the nonvolatile memory unit and replaces with the first BIOS setup value stored in the BIOS information memory unit. | 06-28-2012 |
20120166786 | INTEGRATED SOFTWARE AND HARDWARE SYSTEM THAT ENABLES AUTOMATED PROVISIONING AND CONFIGURATION OF A BLADE BASED ON ITS PHYSICAL LOCATION - An integrated software and hardware system is described that functions as a communications service broker in a telecommunications (telecom) network environment. The system can be used to perform mediation and orchestration of services in the telecom network. The integrated system provides the ability of fully automated configuration and provisioning of a compute blade module based on its physical location (in a chassis enclosure). In accordance with an embodiment, each blade in the chassis is assigned either a worker or bootstrap role. The worker blades perform the core processing of the service broker functionality and the bootstrap blades are used to provide the bootstrapping and administration of the worker blades. | 06-28-2012 |
20120166787 | ELECTRONIC DEVICE HAVING AN ALTERABLE CONFIGURATION AND METHODS OF MANUFACTURING AND CONFIGURING THE SAME - An electronic device having an alterable configuration includes a non-volatile memory configurable to include at least a first partition and a second partition, the non-volatile memory storing a boot ROM. The boot ROM is operable when executed by a processor of said electronic device to, in the event that a third partition is available, boot an operating system in the third partition, the operating system operable when booted to cause the third partition to be deleted and the second partition to be expanded to encompass memory freed by the deletion; and otherwise boot an operating system in the first partition. | 06-28-2012 |
20120173857 | OVER THE AIR APPLIANCE FIRMWARE UPDATE - An appliance is placed in a bootload mode and other operations of the appliance are powered down. Data is gathered through an appliance control module which activates the bootloader mode, and then receives the data and overwrites the remainder of the appliance controller memory. In this manner, software for an appliance is updated without having to enter the home. | 07-05-2012 |
20120173858 | METHOD AND APPARATUS TO CREATE SINGLE FIRMWARE IMAGE FOR MULTIPLE SERVER PLATFORMS - According to one aspect, a computer-implemented method for managing a computer system is disclosed. In one embodiment, the computer system includes a processor that is programmed to cause the computer system to perform specific functions. The functions include: initializing a management controller operating on a management platform; detecting preloaded identification data containing a predetermined manufacturer-specific platform identifier; if no preloaded identification data is detected, determining the platform identifier based on GPIO settings, firmware data, EEPROM data, and/or sensor detection; detecting preloaded hardware data containing operating parameters for hardware components operating on the management platform and operatively coupled to the management controller; if no preloaded hardware data is detected, determining the operating parameters according to the platform identifier; causing the management controller to initialize the hardware components according to the platform identifier and operating parameters; and, flashing initialization data containing the platform identifier and operating parameters to a system memory. | 07-05-2012 |
20120173859 | TECHNIQUES FOR STOPPING ROLLING REBOOTS - Techniques for detecting rolling reboots and for taking responsive actions to stop rolling reboots. | 07-05-2012 |
20120173860 | COMPUTING DEVICE AND METHOD FOR REGISTERING IDENTIFICATION INFORMATION OF NETWORK INTERFACE CARD IN OPERATING SYSTEM - In a method for registering identification information of network interface cards (NICs) in an operating system of a computing device, each of the NICs is respectively and uniquely labeled with a number. A peripheral component interconnect (PCI) device identification (ID) of each of the NICs is allocated according to the labeled number of each NIC using a basic input output system (BIOS) of the computing device when the BIOS is booted up. Then identification information of each of the NICs is registered in the operating system according to the PCI device ID of each NIC using a NIC driver of the computing device, when the NIC driver is driven by the operating system during the booting up process of the operating system. | 07-05-2012 |
20120173861 | DATA CARD AND A BOOTING METHOD FOR THE DATA CARD - The present invention discloses a method for a data card to report a port, including: initializing a power-on startup module and a compact disk (CD) reporting and processing module in the boot phase, where the CD reporting and processing module is configured to report a data card as a CD, interact with a terminal, and realize CD reading; and reporting a data card as a CD to a terminal in the boot phase. The data card is reported as a CD after initialization of the power-on startup module and the CD reporting and processing module, rather than after the initialization of the power-on startup module in the boot phase and the user application modules in the network access phase. In this way, the terminal user can quickly find that the data card is reported as a CD after the data card is inserted, which improves the user experience. | 07-05-2012 |
20120173862 | System and Method of Delaying Power-Up of an Information Handling System - A system and method of delaying power-up of an information handling system is disclosed. According to an aspect, a method of powering an information handling system can include detecting a delay power-up setting within a basic input output system (BIOS) of a particular information handling system using a management controller. The management controller can be configured to delay power-up of the particular information handling system. The method can further include enabling a power-up of the particular information handling system in response to the delay power-up setting using the management controller. | 07-05-2012 |
20120179899 | UPGRADEABLE PROCESSOR ENABLING HARDWARE LICENSING - A technique for programming a configurable co-processor in a processing system is disclosed. The configurable co-processor includes field programmable logic and is configured using a pre-generated co-processor image. The technique involves enabling a user application to program the configurable co-processor with certain application-specific hardware based processing functions. One advantage of the present invention is that application-specific hardware design optimizations may be implemented to improve application performance after hardware for the processing system has been manufactured. | 07-12-2012 |
20120179900 | METHOD OF STARTING UP A COMPUTING DEVICE IN A NETWORK, SERVER AND NETWORK OF COMPUTING DEVICES FOR THE IMPLEMENTATION THEREOF - This method of starting up a computing device ( | 07-12-2012 |
20120185683 | SYSTEM AND METHOD FOR TAMPER-RESISTANT BOOTING - Disclosed herein are systems, methods, and non-transitory computer-readable storage media for booting a computing device having an encrypted storage medium using full disk encryption, referred to as tamper-resistant boot. The system retrieves a kernel cache and a kernel cache digest from an unencrypted storage medium and verifies the authenticity of the kernel cache based on the credentials and the kernel cache digest. Initiation and execution of the operating system is performed if the kernel cache is authentic. In one embodiment, the system verifies the authenticity of a request to disable tamper-resistant booting by utilizing a password verifier and a password proof. | 07-19-2012 |
20120185684 | BOOTING A MOBILE ELECTRONIC DEVICE WITH A LOW BATTERY BASED ON A DYNAMIC BOOT THRESHOLD - A method, an apparatus, and a computer program product for booting the apparatus with a low-energy battery are provided. In a first configuration, the apparatus monitors a level of the battery while the battery is charging. The apparatus attempts a boot of the apparatus when the level is greater than or equal to a dynamic boot threshold. The apparatus increases the dynamic boot threshold when the boot is unsuccessful and repeating the monitoring and the attempting based on the increased dynamic boot threshold. In a second configuration, the apparatus detects a connection to an external power source. The apparatus attempts a boot using an FLCB protocol that is based upon power drawn directly from the external power source upon detecting the connection to the external power source. The apparatus attempts the boot as part of an ATC protocol when the boot using the FLCB protocol is unsuccessful. | 07-19-2012 |
20120185685 | DATA PROCESSING APPARATUS AND COMPUTER-READABLE RECORDING MEDIUM - Disclosed is a data processing apparatus providing a predetermined function by executing a program for the data processing apparatus, including a first storage unit that stores encoded execution starting data for starting execution of the program; a first decode key storage unit that stores a first decode key capable of decoding the encoded execution starting data; a start up unit that obtains the first decode key from the first decode key storage unit when turning on the power is accepted and decodes the encoded execution starting data by the first decode key to start executing the program; and an authentication confirmation unit that sends a request for authentication to an external apparatus after the start up unit starts executing the program and starts providing the predetermined function when obtaining an authentication result indicating the apparatus is authenticated from the external apparatus. | 07-19-2012 |
20120185686 | Method, Apparatus and Computer Program for Loading Files During a Boot-Up Process - Embodiments of the invention relate to a method, apparatus and computer program. More particularly, embodiments relate to identifying at least one new file to be loaded in a computing device during a boot-up process of said computing device. Also, determining if loading at least one of the identified new file(s) causes the computing device to crash. Also, updating a list on the computing device in dependence on whether the loading of the identified new file(s) causes the computing device to crash. Also, loading at least one file in the computing device during a boot-up process in dependence on the list, to prevent the computing device crashing during the boot-up process. | 07-19-2012 |
20120191960 | BOOTING COMPUTING DEVICES - Example embodiments disclosed herein relate to finding a boot loader on storage. A boot process for a computing device including storage including an extensible firmware interface aware operating system is started. The storage is searched for a boot loader associated with the extensible firmware interface aware operating system. | 07-26-2012 |
20120191961 | Computer System and Operating System Switching Method Thereof - An operating system switching method is provided. The operating system switching method is for a computer system comprising a control unit, a memory unit, and a storage unit, wherein the storage unit comprises a first operating system and a second operating system. The steps of the method include: loading the first operating system and the second operating system into a first memory space and a second memory space of the memory unit, respectively, and setting the first memory space and the second memory space to a working state and a standby state, respectively; and performing a first switching of the operating systems, and setting the first memory space and the second memory space to the standby state and the working state. | 07-26-2012 |
20120191962 | SYSTEM AND METHOD FOR SIMULATING BIOS ROM OF COMPUTING DEVICE INTO VIRTUAL DISK - In a method for simulating a read only memory of a basic input/output system (BIOS ROM) of a computing device into a virtual disk, configuration information of the BIOS ROM is loaded into a disk booting sequence of the BIOS, and the BIOS ROM is set as a virtual disk that needs to be booted, when a POST program of the computing device is implemented. Free space of the BIOS ROM is obtained by scanning storage space of the BIOS ROM, and physical addresses of the free space are obtained in the BIOS ROM. The physical addresses are translated into LBA addresses. A virtual disk is created using the free space in the BIOS ROM according to the LBA addresses. Master boot record (MBR) of the computing device is read from a storage system of the computing device to bootstrap an operating system of the computing device through the virtual disk. | 07-26-2012 |
20120191963 | BIOS Updating System, BIOS Updating Method, and Related Computer Program Product - A BIOS updating system enables a computer to perform a BIOS updating process on original BIOS data. The BIOS updating system includes: an operational module that stores updating information including BIOS updating data in a memory device when the computer runs in an operating system executing stage, sets update booting parameters, and re-boots the computer; and an updating module that executes a pre-processing process, before the execution of the BIOS updating process, when the re-booted computer runs in a POST stage, including: an inspecting unit that inspects whether the update booting parameters are set and generates update commands; and an executing unit that acquires from the memory device the BIOS updating data via the updating information according to the update commands, so as to replace the original BIOS data with the BIOS updating data, and further reboot or shut off the computer after the updating of the BIOS data. | 07-26-2012 |
20120191964 | METHODS OF BOOTING INFORMATION HANDLING SYSTEMS AND INFORMATION HANDLING SYSTEMS PERFORMING THE SAME - A method of booting an information handling system including a volatile memory device to be selectively tested during a booting operation, the method comprising a step of reading current system configuration information from the information handling system, a step of comparing the current system configuration information with corresponding prestored system configuration information in a nonvolatile memory device, and a step of selectively performing a test for the volatile memory device according to a result of the comparison. | 07-26-2012 |
20120191965 | BOOT SYSTEMS AND METHODS, AND RELATED DEVICES - Boot systems and methods are provided. The boot system includes an IO (Input/Output) chip, a memory device, and a BIOS (Basic Input/Output System). The memory device is coupled to the IO chip, and includes at least a rescue OS (Operating System). The BIOS reads the rescue OS from the memory device via the IO chip, and boots an electronic device based on the rescue OS. | 07-26-2012 |
20120198219 | Component Drivers for a Component of a Device - A device including a ready only memory to include component drivers for at least one component of the device, a controller to determine whether a bootable storage device includes at least one operating system, and an embedded application to select and load component drivers onto the device for at least one of the components before installing an operating system from the bootable storage device. | 08-02-2012 |
20120198220 | METHODS AND RECONFIGURABLE SYSTEMS TO OPTIMIZE THE PERFORMANCE OF A CONDITION BASED HEALTH MAINTENANCE SYSTEM - Methods and reconfigurable systems are provided for monitoring the health of a complex system. The reconfigurable system comprises a plurality of standardized executable application modules containing instructions to perform one of a plurality of different standardized functions. The system further comprises a plurality of computing nodes arranged in a hierarchical structure comprising one or more layers of computing nodes. Each computing node of the plurality runs a host application and a workflow service module, each computing node thereby being configured by a configuration file that directs the execution of any of the standardized executable application modules in a cooperative fashion by the host application via the workflow service module. The system also comprises a loading means for populating each computing node with one or more standardized executable application modules of the plurality, a communication means, and a configuration means for programming the populated standardized executable application modules. | 08-02-2012 |
20120198221 | SPECIFIC-PURPOSE CLIENT WITH CONFIGURATION HISTORY FOR SELF-PROVISIONING OF CONFIGURATION AND OBVIATING REINSTALLATION OF EMBEDDED IMAGE - Examples of specific-purpose local clients are provided for self-provisioning of configurations and for obviating reinstallation of entire windows-based embedded images onto the specific-purpose local clients. Each local client may have a windows-based embedded image with a write-filter, and may include a configuration history memory unit configured to store a plurality of extensible markup language (XML) configuration files. The configuration history memory unit may be in a persistent storage area of the local client to allow the plurality of XML configuration files to be retained on the local client when it is shut down. The local client may include a retrieval module configured to facilitate automatically locating a remote repository server containing a new XML configuration file, to facilitate automatically obtaining the new XML configuration file from the remote repository server over a network, and to facilitate automatically obtaining a previous XML configuration file from the configuration history memory unit. | 08-02-2012 |
20120198222 | CONFIGURING AND CUSTOMIZING A SPECIFIC-PURPOSE CLIENT HAVING A WINDOWS-BASED EMBEDDED IMAGE USING EXTENSIBLE MARKUP LANGUAGE (XML) CONFIGURATION - Examples of methods and apparatus are provided for configuring and customizing a specific-purpose local client having a windows-based embedded image using extensible markup language (XML) configuration and obviating reinstallation of an entire windows-based embedded image onto the specific-purpose local client. The apparatus may include a retrieval module of the specific-purpose local client configured to automatically locate a remote repository server containing an XML configuration file and automatically obtain the XML configuration file from the remote repository server each time the specific-purpose local client boots up. The apparatus may include an apply settings module of the specific-purpose local client configured to automatically apply a configuration change to the windows-based embedded image based on the XML configuration file each time the specific-purpose local client boots up. The configuration change persists across a reboot of the specific-purpose local client while obviating reinstallation of an entire windows-based embedded image onto the specific-purpose local client. | 08-02-2012 |
20120198223 | AUTOMATIC RETRIEVAL, PARSING AND APPLICATION OF CONFIGURATION FOR A SPECIFIC-PURPOSE CLIENT HAVING A WINDOWS-BASED EMBEDDED IMAGE WITH A WRITE-FILTER - Examples of methods and apparatus are provided for automatic retrieval, parsing and application of configuration for a specific-purpose local client having a windows-based embedded image with a write-filter while obviating reinstallation of an entire windows-based embedded image onto the local client and while allowing persistent configuration change across a reboot. The apparatus may include a retrieval module of the local client configured to, each time the local client boots up, automatically locate a remote repository server containing a configuration file and automatically obtain the configuration file from the repository server over a network. The apparatus may include an apply settings module of the local client configured to, each time the local client boots up, automatically load the configuration file, automatically parse at least a portion of the configuration file, and automatically apply, to the embedded image, a configuration change based on the at least a portion of the configuration file. | 08-02-2012 |
20120198224 | Encryption Keys Distribution for Conditional Access Software in TV Receiver SOC - A method for securely generating and distributing encryption keys includes generating, by a secured server, a pair of keys including a first key and a second key and providing, by a key distributing unit, the first key to a first recipient and a second key to a second recipient. The first recipient may use the first key to encrypt a data file and send the encrypted data file via a non-volatile memory device to a target subscriber. The second recipient may program the second key into an one-time-programmable register contained in a secure element during a manufacturing process. The secure element may further include a random access memory configured to store an image of the encrypted data file, a read-only memory containing a boot code, and a processing unit coupled to the random-access memory and the read-only memory and operative to decrypt the encrypted data file. | 08-02-2012 |
20120198225 | COMPUTER SYSTEM FOR ACCESSING CONFIDENTIAL DATA BY MEANS OF AT LEAST ONE REMOTE UNIT AND REMOTE UNIT - A computer system for accessing confidential data via at least one remote unit ( | 08-02-2012 |
20120204020 | SELF REGULATION OF THE SUBJECT OF ATTESTATION - Attestation by a self-regulating attestation client. The attestation client requests a credential of health from an attestation service, which includes an ordered attestation log and proof of integrity and freshness of the log. The attestation client receives the requested credential of health, which certifies the attestation client was healthy when it requested the credential of health and that the attestation service trusts the attestation client to be healthy each time the attestation client authenticates using the credential of health. The attestation client receives a request to authenticate that it is healthy using the credential of health, verifies that it is currently healthy, and performs the requested authentication. | 08-09-2012 |
20120204021 | Updating Programmable Logic Devices - Updating programmable logic devices (‘PLDs’) in a symmetric multiprocessing (‘SMP’) computer, each compute node of the SMP computer including a PLD coupled for data communications through a bus adapter, the bus adapter adapted for data communications through a set of one or more input/output (‘I/O’) memory addresses, including configuring the primary compute node with an update of the configuration instructions for the PLDs; assigning, by the PLDs at boot time in an SMP boot, a unique, separate set of one or more I/O addresses to each bus adapter on each compute node; and providing, by the primary compute node during the SMP boot, the update to all compute nodes, writing the update as a data transfer to each of the PLDs through each bus adapter at the unique, separate set of one or more I/O addresses for each bus adapter. | 08-09-2012 |
20120210112 | MAC Filtering on Ethernet PHY for Wake-On-LAN - To improve Wake-on-LAN (WOL) functionality of a device, a Media Access Control (MAC) address filtering function may be implemented in the device's Ethernet physical layer (ePHY) block. When the ePHY detects a WOL frame, the MAC filtering function in the ePHY may perform address comparison between the MAC address associated with the device, and the MAC address contained in the WOL frame. Performing the MAC address comparison within the ePHY allows the main system components, such as the main SOC and other components to remain in standby mode (or sleep mode) until a MAC address match has been determined. Therefore, the main system components do not need to be rebooted every time the device receives a WOL frame, only when there is a match between the MAC address of the system and the MAC address contained in the detected WOL packet. | 08-16-2012 |
20120210113 | MANAGING BOOTING OF SECURE DEVICES WITH UNTRUSTED SOFTWARE - Normally, at the time of manufacturing, security may be provided to a device being manufactured through the loading of an operating system that has been cryptographically signed. The present application discloses a “factory mode” for the device. The “factory mode” allows the device to execute untrusted operating system code, such as unsigned operating system code and operating system code that has been signed, but the certificate authority is not trusted. To support execution of untrusted operating system code in a secure manner, the device may be adapted to prevent data of predetermined type from being loaded on the device while the device is in the “factory mode”. In contrast to the “factory mode”, the secure mode of the device is referred to herein as a “product mode”. There develops a need to manage, in a secure manner, transitions between the “product mode” and the “factory mode”. | 08-16-2012 |
20120210114 | LOG FILE PROCESSING SYSTEM AND METHOD - A remote server and method processes a log file generated by a cloud server of a data center. The remote server sets an operating system image file and inserts test commands into the operating system image file and installs the operating system in each cloud server using the operating system image file. The remote server executes test commands and receives a log file from each cloud server. The remote server creates a file name for each log file corresponding to the cloud server and stores the log files into a storage system. | 08-16-2012 |
20120210115 | Secure Boot Method and Method for Generating a Secure Boot Image - In a secure boot method, an initial boot loader verifies a first digital signature included in a first boot loader using a public key. The first boot loader is executed if the first digital signature is valid. The first boot loader verifies a first message authentication code included in a second boot loader using a unique key. The second boot loader is executed if the first message authentication code is valid. | 08-16-2012 |
20120210116 | METHOD AND APPARATUS FOR BOOTING FROM A FLASH MEMORY - Techniques for booting a computing device with a flash memory without knowledge of parametric information of the flash memory are described herein. In one embodiment of the invention, the computing device receives input requesting the computing device to begin operation and executes a set of one or more instructions stored in a non-volatile memory. The execution of the set of instructions configures a first read routine for accessing the flash memory based on a common denominator format of candidate flash memories, and the first read routine is not configured based on information located in a flash memory identification table. The computing device reads a bootstrapping code image based on the first read routine into a volatile memory and executes that first bootstrapping code image. Other methods and apparatuses are also described. | 08-16-2012 |
20120216026 | BOOT DETERMINING METHOD OF ELECTRONIC DEVICE FOR BOOTING AND ELECTRONIC DEVICE THEREOF - A boot determining method of an electronic device is used to determine whether to boot the electronic device having at least one storage. The boot determining method includes: receiving a start signal; detecting an ambient temperature; detecting whether the at least one storage has a heating module; comparing the ambient temperature with a temperature threshold; reading storage information; determining type(s) of the at least one storage according to the storage information; and determining whether to boot the electronic device after receiving the starting signal, according to a determining condition. The determining condition includes the type(s) of the at least one storage; whether the environment temperature is lower than the temperature threshold; and whether each of the at least one-storage has the heating module. | 08-23-2012 |
20120216027 | Malware Management Through Kernel Detection During a Boot Sequence - A system and method for managing pestware on a protected computer is described. The method in one variation includes monitoring events during a boot sequence of the computer; managing pestware-related events before native applications can run and after a kernel is loaded; managing pestware-related events when native applications can run; and scanning a registry of the computer for pestware when native applications can run. In variations, a pestware management engine is initialized after an operating system of the protected computer is initialized and the pestware management system both receives an event log of the monitored events and compiles the set of behavior rules utilized by kernel-level monitor. | 08-23-2012 |
20120221842 | PROVISIONING OF OPERATING ENVIRONMENTS ON A SERVER IN A NETWORKED ENVIRONMENT - A computer deploys an operating environment onto a provisionable server. The computer assigns an operating environment from an operating environment configuration management database to the provisionable server in response to detecting a provisioning event. The computer stores a record of the assignment in a deployment configuration management database and updates a management server with a designated operating environment identifier of the assignment. | 08-30-2012 |
20120226895 | PROTECTING OPERATING SYSTEM CONFIGURATION VALUES - In a pre-operating system environment on a device prior to loading and running an operating system on the device, a policy identifying configuration settings for the operating system is obtained. The operating system itself is prevented from changing this policy, but the policy can be changed under certain circumstances by components of the pre-operating system environment. The policy is compared to configuration values used by the operating system, and the operating system is allowed to boot with the configuration values if the configuration values satisfy the policy. However, if the configuration values do not satisfy the policy, then a responsive action is taken. | 09-06-2012 |
20120226896 | NETWORK STORAGE TARGET BOOT AND NETWORK CONNECTIVITY THROUGH A COMMON NETWORK DEVICE - The present disclosure includes systems and techniques relating to booting to a network storage target. In general, in one implementation, a bus-to-network device driver is loaded during a machine boot, where the bus-to-network device driver is capable of sending machine bus commands over a network, providing access to the network for a network device driver, and distinguishing between received responses to the machine bus commands and other network traffic corresponding to the network device driver. Loading of the bus-to-network device driver can occur in response to an operating system load of bus drivers. For example, the bus-to-network device driver can be an iSCSI driver, and the operating system load of bus drivers can be the operating system load of SCSI drivers. | 09-06-2012 |
20120226897 | COMPUTER SYSTEM WITH DUAL BIOS - A computer system including a first memory unit, a second memory unit and a switch unit is provided. The first memory unit stores a first BIOS. The second memory unit stores a second BIOS. The switch unit has a first configuration and a second configuration. Upon the computer system being started, the switch unit receives an enable signal. When the switch unit is in the first configuration, the enable signal is provided to the first memory unit to start the first basic input/output system. When the switch unit is in the second configuration, the enable signal is provided to the second memory unit to start the second basic input/output system. | 09-06-2012 |
20120233448 | MANAGING SOFTWARE CHANGES - The claimed subject matter provides a system or method for managing software changes. An exemplary method comprises creating a reset boot loader, a last known good (LKG) boot loader, and a current boot loader, then pointing the reset boot loader, LKG boot loader, and current boot loader to a parent virtual hard disk (VHD) containing a default master image. An operation to perform is determined, and a service partition is booted into. The LKG boot loader or current boot loader is pointed to a child VHD loaded with another desired image based on the operation selected, and the system is rebooted into the parent VHD or child VHD pointed to by the current boot loader. | 09-13-2012 |
20120233449 | METHODS AND SYSTEMS FOR MEASURING TRUSTWORTHINESS OF A SELF-PROTECTING DRIVE - A method for measuring the trustworthiness of a self-protecting drive includes receiving a measurement from an element within a transitive chain of trust, processing the received measurement, storing the measurement as a verification value, comparing the verification value with a reference verification value stored on the self-protecting drive, and unlocking at least a portion of the self-protecting drive when the reference verification value corresponds to the verification value. A self-protecting drive includes a boot partition, a trusted partition, a master boot partition, a primary partition, a secondary partition, and a particular table that has a verification platform configuration register and a reference platform configuration register. The primary partition is inaccessible until the self-protecting drive determines that a value stored in the verification platform configuration register corresponds to a value stored in the reference platform configuration register. | 09-13-2012 |
20120233450 | SYSTEM AND METHOD OF BOOTING A COMPUTER SYSTEM USING AN EFI PERSONALITY OF A DIFFERENT COMPUTER SYSTEM - Booting a computer system using an EFI personality of a different computer system. At least some of the illustrative embodiments are methods including: reading, by a first computer system, a plurality of parameters of an EFI personality of a second computer system different than the first computer system; modifying, by the first computer system, a first parameter of the plurality of parameters thereby creating a modified EFI personality; and booting an operating system on the first computer system based on modified EFI personality. | 09-13-2012 |
20120233451 | METHOD FOR FAST RESUMING COMPUTER SYSTEM AND COMPUTER SYSTEM - A method for fast resuming a computer system from a shutdown state is provided. The computer system comprises a basic input output system (BIOS), a system memory and a storage device storing a system memory data of the system memory and a used system memory block address table before the computer system enters the shutdown state. The method comprises receiving a starting signal for power supplying the computer system and starting the storage device. A fast boot built-in program of the BIOS is started and, according to the used system memory block address table, the fast boot built-in program sequentially reads the stored system memory data from the storage device and writes the read system memory data into the system memory with a use of an optimized read-and-write block size as a read-and-write unit. The computer system enters a suspended state and is resumed from the suspended state. | 09-13-2012 |
20120233452 | Reducing Current Draw Of A Plurality Of Solid State Drives At Computer Startup - Reducing current draw of solid state drives from a shared power supply of a computer at computer startup, each SSD including computer memory, a capacitor, a disk controller, and a charge controller, the disk controller configured to enable the charge controller to charge the capacitor upon receiving a charge command, the SSDs organized into startup groups characterized by a position in a predefined startup order. Upon startup of the computer, beginning with a first startup group in the predefined startup order and until the last startup group in the predefined startup order has received a charge command, embodiments include, sending, by a storage device initiator, a charge command to a startup group to initiate charging of the capacitor of each solid state drive in the startup group and waiting a predefined period of time before sending another charge command to a next startup group in the predefined startup order. | 09-13-2012 |
20120239917 | Secure Boot With Minimum Number of Re-Boots - Systems, methods and products are described that provide secure boot with a minimum number of re-boots. One aspect provides a method including receiving an indication to boot from a power off state at a computing device; responsive to authenticating a user at one or more input devices, releasing a value derived from authenticating the user at the one or more input devices; responsive to releasing the value, unlocking one or more encrypted drives with a previously established alternate credential; and thereafter proceeding to boot from the power off state. By not having to call the non-BIOS software each boot, this minimizes the number of reboots for each boot cycle. | 09-20-2012 |
20120239918 | EXPEDITED COMPUTER BOOT SYSTEM AND METHOD - The present invention discloses an expedited computer boot system and method. The expedited computer boot system includes: ROM, RAM, and a module for selecting a boot mode. The module for selecting a boot mode at least includes: a detecting unit and a fast boot unit. The fast boot unit reads configuration settings stored in the RAM and loads into operating system based on the configuration settings if the detecting unit detects no device changed. Otherwise, the fast boot unit reads ROM and Power-On Self Test (POST) is executed if any device is changed. Therefore, the computer system can quickly boot and the time for booting computer is shortened. | 09-20-2012 |
20120239919 | COMPUTER FACILITATING BIOS SETTING - A computer includes a mother board, a standby power source, a BIOS display, and a BIOS user input. The mother board includes a storage unit. The storage unit stores BIOS software and BIOS settings of the computer. The standby power source is configured for providing a standby voltage when the computer is powered but not started up. The controller is configured for reading the BIOS software and the BIOS settings from the storage unit, driving the BIOS display to display a BIOS UI based upon the BIOS software and the BIOS setting, and editing the BIOS settings based upon inputs from the BIOS input unit upon the condition that the controller, the BIOS display, and the BIOS input unit receive the standby voltage. | 09-20-2012 |
20120239920 | APPROACHES FOR UPDATING BIOS - Approaches for updating a Basic Input/Output System (BIOS) program used in a computer system. The computer system includes a central processing unit (CPU) and a non-volatile memory. The non-volatile memory is used to store the BIOS program, and the BIOS program includes a booting area and a program area for storing a first BIOS image file. The update method includes: duplicating a second BIOS image file from an external storage device of the computer system to a designated area of an internal non-volatile storage device of the computer system; changing a flag from a first status to a second status after the duplication is completed; checking the status of the first BIOS image file when the computer system is booted; and booting the computer system by the first BIOS image file or the second BIOS image file according to the status of the first BIOS image file. | 09-20-2012 |
20120239921 | Data Storewidth Accelerator - Data storage controllers and data storage devices employing lossless or lossy data compression and decompression to provide accelerated data storage and retrieval bandwidth. In one embodiment of the invention, a composite disk controller provides data storage and retrieval acceleration using multiple caches for data pipelining and increased throughput. In another embodiment of the invention, the disk controller with acceleration is embedded in the storage device and utilized for data storage and retrieval acceleration. | 09-20-2012 |
20120239922 | PREPARING AND PRESERVING A SYSTEM CONFIGURATION DURING A HOT UPGRADE - A planned system configuration is stored to a volatile memory coupled to a processor executing a first operating system kernel. The planned system configuration is tagged. A boot of a second operating system kernel is initiated while preserving in the volatile memory contents stored therein, and following the boot of the second operating system kernel, a set of parameters referencing the tagged planned system configuration is retrieved from the volatile memory. The planned system configuration is then used, based on the retrieved set of parameters. | 09-20-2012 |
20120246454 | ELECTRONIC DEVICE AND METHOD FOR CONTROLLING TEST PROCESS - In a method controls a test process of an electronic device, a booting mode of a test program is set as a non-preemptible mode. The method invokes system service programs from a storage device of the electronic device upon the condition that an operating system (OS) of the electronic device is booted. The method further boots a user-defined service program, loads the test program to test a target object of the electronic device using the user-defined service program, then boots system application programs and user application programs of the electronic device. | 09-27-2012 |
20120246455 | PORT THROTTLING ACROSS AN OPERATING SYSTEM RESTART DURING A HOT UPGRADE - A method includes tagging, by a processor executing a first operating system kernel, a region of a volatile memory used by a first storage area network (SAN) adapter driver coupled to a SAN adapter, and decoupling the first SAN adapter driver from the SAN adapter. A boot of a second operating system kernel is then initiated while preserving in the tagged region of the volatile memory contents stored therein. After the boot, a second SAN adapter driver is then coupled to the SAN adapter. | 09-27-2012 |
20120246456 | MEMORY TAGGING AND PRESERVATION DURING A HOT UPGRADE - A method includes tagging, by a processor executing a first operating system kernel, a region of a volatile memory coupled to the processor, and initiating a boot of a second operating system kernel while preserving in the volatile memory contents stored therein. Following the boot of the second operating system kernel, a set of parameters referencing the tagged region is retrieved from the volatile memory, and the tagged region is then used, based on the retrieved set of parameters. | 09-27-2012 |
20120246457 | BARE METAL MACHINE RECOVERY - Provided herein are systems and methodologies for bare metal machine restoration of a client computing environment over a network-based backup system. System recovery can be performed by performing a network boot from a predetermined server or set of servers on the Internet and/or an associated local network, followed by retrieving information relating to an operating system and/or environment of a system being recovered, such as incremental or full operating system images. Upon retrieval of information, the information can be used to conduct a full restore of the operating environment of the computing device. Additionally, a user can restore personal or other system data following rebuilding of the system operating environment. A cloud-based structure is provided herein as well as a hybrid peer-to-peer/cloud-based structure, wherein information used in a restore can be obtained from a global network location (e.g., cloud server(s)) and/or from one or more local peers. | 09-27-2012 |
20120254601 | DISK DRIVE BOOTING FROM VOLATILE SEMICONDUCTOR MEMORY WHEN EXITING POWER SAVE MODE - A disk drive is disclosed comprising a head actuated over a disk, a first volatile semiconductor memory (VSM), and a second VSM. When the disk drive is powered on, control circuitry first reads VSM initialization code from the disk, first initializes the first VSM using the VSM initialization code, stores the VSM initialization code in the second VSM, and then enters a power save mode. When exiting the power save mode, the control circuitry second initializes the first VSM using the VSM initialization code stored in the second VSM. | 10-04-2012 |
20120254602 | Methods, Systems, and Apparatuses for Managing a Hard Drive Security System - Methods, systems, and apparatuses for a self-encrypting drive (SED) management system configured to be loaded in a pre-boot region of an SED-based computer, the SED of the SED-based computer having a nominal space, which may be encrypted when the SED-based computer is shut down, and the pre-boot region. The SED management system comprises a pre-boot operating system (OS); at least one pre-boot library configured to support the pre-boot OS; and an unlocking software program configured to work with the pre-boot OS to transfer control directly to an operating system of the nominal space upon a successful authentication. Other embodiments are described and claimed. | 10-04-2012 |
20120260078 | APPARATUSES FOR CONFIGURING PROGRAMMABLE LOGIC DEVICES FROM BIOS PROM - An apparatus comprising programmable logic devices including a field programmable gate array (FPGA) is presented. In one embodiment, the apparatus also comprises a programmable read only memory (PROM) to store a firmware which includes at least a system boot code and a configuration code. The apparatus further includes a configuration agent to configure the FPGA by using the configuration code and to release the reset to the CPU after the FPGA is configured. In one embodiment, the configuration agent comprises a SPI-FPGA bridge (serial peripheral interface to FPGA configuration interface). In one embodiment, the configuration agent is operable to determine whether the FPGA is ready for configuration based at least on a status from the FPGA. | 10-11-2012 |
20120260079 | FAST BOOTING COMPUTER APPARATUSES AND METHODS THEREOF - A fast booting computer apparatus includes one or more processors and a memory comprising a hard disk drive and a solid state drive coupled to the one or more processors. The one or more processors are configured to execute programmed instructions stored in the memory. The solid state drive is configured to store and provide the programmed instructions for an operating system for execution by the one or more processors when requested. | 10-11-2012 |
20120260080 | Method and Apparatus for Preprocessing Operations During a Boot Process - Various methods for preprocessing operations during a boot process are provided. One example method may include determining that a priority of operations being implemented by the processor at a particular time during the boot process is less than a threshold priority, and in response to determining that the priority of operations being implemented by the processor is less than the threshold priority, performing at least one operation during the boot process, in advance of a scheduled position within a sequence of operations. Similar and related example methods, example apparatuses, and example computer program products are also provided. | 10-11-2012 |
20120265976 | Secure Network Cloud Architecture - Apparatuses, computer readable media, methods, and systems are described for requesting creation of virtual machine (VM) in a cloud environment comprising a virtual private cloud. Through various communications between a cloud DMZ, cloud provider, and/or company's network, a VM instance may be securely created, initialized, booted, unlocked, and/or monitored through a series of interactions building, in some examples, upon a root of trust. | 10-18-2012 |
20120272049 | TOUCH CONTROL METHOD FOR SETTING BASIC INPUT OUTPUT SYSTEM AND COMPUTER SYSTEM USING THE SAME - A touch control method for setting the basic input output system (BIOS) is provided. The setting method includes the following steps. The BIOS transmits an initial configuration data to a memory. An application program reads the initial configuration data from the memory and evocates an input interface displaying on a touch panel. The input interface includes a plurality of selecting items corresponding to the initial configuration data. The application program receives a setting signal from the touch panel and executes the selecting item according to the setting signal. The application program produces a renewal configuration data and the application program stores the renewal configuration data in the memory. The application program rewrites the renew configuration data back to the BIOS. | 10-25-2012 |
20120272050 | ELECTRONIC DEVICE AND BOOTING METHOD THEREOF - An electronic device and a method of booting the electronic device is provided. The electronic device and method include a power supply unit, a volatile memory, a non-volatile memory, and a controller which, in response to power being supplied by the power supply unit, performs booting in a first booting mode that uses a suspend image stored in the volatile memory; and, in response to an error occurring in the first booting mode, performs a next booting in a second booting mode that uses a suspend image stored in the non-volatile memory. In response to power being supplied by the power supply unit, performing booting in a first booting mode that uses a suspend image stored in the volatile memory; and in response to an error occurring in the first booting mode, performing a next booting in a second booting mode using a suspend image stored in the non-volatile memory. | 10-25-2012 |
20120278598 | DISABLING COMMUNICATION PORTS - Example embodiments disclosed herein relate to enabling or disabling a port by writing to a reset write-once register. A boot process for a device is initiated. The reset write-once register is set, during the boot process, to disable or enable the port. | 11-01-2012 |
20120278599 | SYSTEM AND METHOD FOR AUTOMATED NETWORK CONFIGURATION - A method of configuring a data network with a controller, the data network including a plurality of hosts each associated with at least one of a plurality of switches, the method including receiving a request to boot an operating system image on one of the plurality of hosts, the operating system image having network connectivity requirements. Further, the method includes selecting a host out of the plurality of hosts on which to boot the operating system image. The method also includes booting the operating system image on the host, and configuring a switch out of the plurality of switches associated with the host based upon the network connectively requirements of the operating system image. Additionally, the method includes configuring networking attributes of a network interface in the host based upon the network connectivity requirements of the operating system image. | 11-01-2012 |
20120278600 | SYSTEM AND METHOD FOR ACCELERATED BOOT PERFORMANCE - Systems, methods and products are described that provide accelerated boot performance. One aspect includes initiating a booting process of a user operating system of a computer system; identifying a non-critical hardware device set for start up according to the user operating system; excluding the non-critical hardware device; and completing the booting process to provide the user operating system without starting an excluded non-critical hardware device. Other embodiments are described. | 11-01-2012 |
20120278601 | POWER-ON/OFF MANAGEMENT SYSTEM AND METHOD OF COMMUNICATION DEVICE - In a power-on/off management method of a communication device, a display screen of the communication device is powered off, and a signal transmitting function of the communication device is suspended, when a power key of the communication device is pressed upon the condition that the communication device is in a power-on state. A duration time of how long the display screen is powered off is determined, and the communication device is activated according to the duration time when the power key is pressed upon the condition that the display screen is powered off. | 11-01-2012 |
20120278602 | ELECTRONIC APPARATUS AND METHOD FOR PROVIDING FIRMWARE THEREOF - An electronic apparatus and a method for providing firmware thereof are provided. The electronic apparatus includes a plurality of components which perform a function of the electronic apparatus; a common memory unit which stores respective firmware for each of the plurality of components; a system bus which connects the plurality of components with the common memory unit; and a control unit which transmits from the common memory unit, after an apparatus boot, firmware corresponding to each of the plurality of components, wherein the plurality of components each establish respective connections to the system bus by executing a boot code when the electronic apparatus is booted. | 11-01-2012 |
20120278603 | DISPLAY DEVICE, REMOTE CONTROLLER, BOOTING METHOD OF THE DISPLAY DEVICE, AND METHOD FOR TRANSMITTING BOOT CONTROL SIGNAL - A display device, a remote controller, a booting method of the display device, and a method for transmitting a boot control signal are disclosed, in which a communication module receives a first booting mode signal and a second booting mode signal, and a controller controls booting in a first booting mode, upon receipt of the first booting mode signal and controls booting in a second booting mode, upon receipt of the second booting mode signal. | 11-01-2012 |
20120278604 | CONTROL METHOD APPLIED TO COMPUTER SYSTEM IN HYBRID SLEEP MODE - A control method applied to a computer system in a hybrid sleep mode is provided. The control method includes following steps: entering a first sleep mode of the computer after a system parameter is stored in a memory and a hard drive of the computer system; determining whether the computer system is resumed or not in a predetermined first period in the first sleep mode, if true, resuming the computer system by reading the system parameter from the memory; if false, entering a second sleep mode of the computer system; determining whether the computer is resumed or not in the second sleep mode; if true, resuming the computer system by reading the system parameter from the hard drive; and if false, keeping the computer system in the second sleep mode. | 11-01-2012 |
20120278605 | PORTABLE STORAGE DEVICE COMMUNICATING VIA A USB 3.0 PROTOCOL AND A COMPUTER SYSTEM HAVING THE SAME - The present invention relates to a portable storage device communicating via a USB 3.0 protocol and a computer system having the same. The computer system according to one embodiment of the present invention comprises a portable storage device and a computer. The portable storage device includes an operating system (OS) storage region for storing OS data and boot data which are not sent to the computer through a transmission channel used for data transmission via the USB 3.0 protocol, requested by a receiving channel used for receiving data via the USB 3.0 protocol, and loaded on the computer to drive the computer. | 11-01-2012 |
20120278606 | METHODS AND APPARATUSES FOR SECURELY OPERATING SHARED HOST DEVICES WITH PORTABLE APPARATUSES - The present invention provides methods and apparatuses that utilize a portable apparatus to securely operate a host electronic device. Typically, each portable apparatus includes a data storage unit which stores an operating system and other software. In one example, a portable apparatus can provide a virtual operating environment on top of a host's operating system for a host device. In another example, a portable apparatus containing its operating system can directly boot a host device with one or more hardware profiles. Furthermore, a device-dependent protection against software piracy, a user-dependent protection against sensitive data leaks, a controllable host operating environment to prevent unwanted information exposure, and a secure restoration procedure to prevent virus infection between the host device users may be incorporated. Moreover, an authorization signature may also be utilized to authorize a connected-state guest operation environment in the host device. | 11-01-2012 |
20120284493 | BOOTING FROM A SECONDARY STORAGE DEVICE IN ORDER TO ACCUMULATE DISK DRIVE PERFORMANCE DATA - A computer system is disclosed comprising a disk drive comprising a head stack assembly (HSA), the HSA comprising a spindle motor for rotating at least one disk, and at least one head actuated over the disk. The computer system further comprises a host coupled to the disk drive, wherein the host comprises a microprocessor operable to first boot the host by reading boot data from a secondary storage device. After first booting the host, the microprocessor commands the disk drive to accumulate performance data for the HSA, and after accumulating the performance data, the microprocessor second boots the host by reading boot data from the HSA. | 11-08-2012 |
20120284494 | DYNAMICALLY REDIRECTING BOOT TO ANOTHER OPERATING SYSTEM - Various embodiments provide an ability to automatically boot a computing device with an operating system stored on a portable storage device when the portable storage device is detected to be present. The computing device can be configured to dynamically boot from the portable storage device when the portable storage device is detected, and revert to a programmed boot order in its associated boot module when the portable storage device is not detected. In some embodiments, the operating system is fully encapsulated on the portable storage device, such as the operating system being completely separate from an operating system initially booting the computing device. | 11-08-2012 |
20120284495 | System and Method for Facilitating Booting Using a Plurality of Boot Methods - Systems and methods for reducing problems and disadvantages associated with multiple boot methods are disclosed. In accordance with an embodiment of the present disclosure, an information handling system comprises a processor and a memory communicatively coupled to the processor. The information handling system also comprises an access controller communicatively coupled to the processor. The access controller is configured to retrieve non-bootable executable instructions and combine the non-bootable executable instructions with a boot loader associated with a boot method to generate a bootable image associated with the boot method. The access controller is further configured to present the bootable image to the information handling system such that the bootable image is configured to be booted by the information handling system using the boot method. | 11-08-2012 |
20120284496 | Memory affinitization in multithreaded environments - Illustrative embodiments include a method, system, and computer program product for estimating boot-time memory requirement of a data processing system. A data processing system identifies, using system configuration information associated with the data processing system, a set of components needed for booting up the data processing system. The data processing system determines a dependency of a component identified in the set of components, the component including a memory estimator program. The data processing system determines an ancestry of the component identified in the set of components. The data processing system receives, using the memory estimator program of the component, a boot-time memory requirement of the component. The data processing system calculates a total boot-time memory requirement. The data processing system determines whether an amount of real memory of the data processing system satisfies the total boot-time memory requirement. | 11-08-2012 |
20120284497 | BOOTING METHOD OF MAIN CHIP - A booting method of a main chip includes the following steps. The main chip searches a current block of a NAND Flash for reading a boot table from a current page of the current block and verifying a boot header of the boot table. When the boot header passes the verification, the main chip checks whether ID of the boot table and ID of the NAND Flash are the same. When the IDs of the boot table and the NAND Flash are the same, the main chip reads a next page of the current block and checks whether data stored in the current page and in the next page is the same. When the data stored in the current page and in the next page is the same, the main chip reads configuration information of the boot table to initialize the NAND Flash and boots. | 11-08-2012 |
20120284498 | FLASH DEVICE AND ASSOCIATED BOOTING METHOD - A flash device and a booting method thereof are provided. The booting method includes following steps: executing a basic boot program stored in a read only memory (ROM) of a flash memory micro-controller; reading a specific flash memory configuration parameter and a revision program from a flash memory; loading a main program stored in the flash memory; and executing the revision program and loading the main program stored in the flash memory when the main program fails to be loaded. | 11-08-2012 |
20120284499 | METHOD AND APPARATUS WITH CHIPSET-BASED PROTECTION FOR LOCAL AND REMOTE AUTHENTICATION OF BOOTING FROM PERIPHERAL DEVICES - Method and apparatus enabling a computing system to deter or thwart unauthorized boot-up from peripheral devices are disclosed herein. In various embodiments, a monitoring module and a managing module are employed cooperating with each other to authorize users in booting up the computing system from peripheral devices. | 11-08-2012 |
20120284500 | ABSTRACTION OF COMPUTER DISK IMAGE CLONING CAPABILITIES FROM BOOTABLE MEDIA - A computer system and computer program product for implementing a method for configuring an improved computing system containing a first computing device. The method includes: creating a logical layer and a physical layer within the first computing device; installing a software operating system (OS) in the logical layer of the first computing device; configuring a first basic input/output system (BIOS) based on installation in the physical layer of the first computing device; relocating all first hardware device drivers for the first hardware devices from an OS image in the logical layer to a first Electrically Erasable Programmable Read-Only Memory (EEPROM) in the physical layer of the first computing device; installing the first BIOS in the physical layer of the first computing device; and loading the first hardware device drivers from the first EEPROM into the first BIOS during a boot phase for the first computing device. | 11-08-2012 |
20120290825 | ELECTRONIC DEVICE AND BOOTING METHOD - An electronic device includes a first processor, a second processor for detecting the working state of the electronic device in real time, a storage unit for storing preset information and a display unit. The second processor determines that the electronic device has entered the hardware initialization process and displays the preset information. The second processor stops displaying the preset information on the display unit when the hardware initialization process is determined to be finished. A booting method for starting an electronic device is also provided. | 11-15-2012 |
20120290826 | BOOTING IN SYSTEMS HAVING DEVICES COUPLED IN A CHAINED CONFIGURATION - The present disclosure includes methods, devices, and systems for booting in systems having devices coupled in a chained configuration. One or more embodiments include a host and a number of devices coupled to the host in a chained configuration, wherein at least one of the number of devices is a bootable device and the at least one bootable device is not directly coupled to the host. | 11-15-2012 |
20120297177 | Hardware Assisted Operating System Switch - An interoperable firmware memory containing a Basic Input Output System (BIOS) and a trusted platform module (TPSM). The BIOS includes CPU System Management Mode (SMM) firmware configured as read-only at boot. The SMM firmware configured to control switching subsequent to boot between at least: a first memory and second isolated memory; and a first and second isolated non-volatile storage device. The first memory including a first operating system and the second memory including a second operating system. The first non-volatile storage device configured to be used by the first operating system and the second non-volatile storage device configured to be used by the second operating system. The trusted platform module (TPSM) configured to check the integrity of the CPU system Management Mode (SMM) during the boot process. | 11-22-2012 |
20120297178 | CONFIGURATION MODE SWITCHING SYSTEM AND METHOD - A computer and method automatically switches from a manufacture mode to a user mode in a basic input and output system (BIOS) chip of the motherboard. The computer invokes an interrupt program to switch from a manufacture mode number to a user mode number in a BIOS setting file. The computer initializes the diagnostic mode according to the parameters of the diagnostic mode and the stress mode according to the parameters of the stress mode. The computer configures the BIOS setting file to a user mode according to the user mode number, and saves configuration into the BIOS chip when the BIOS chip starts. | 11-22-2012 |
20120297179 | METHODS, DEVICES, AND SYSTEMS FOR ESTABLISHING, SETTING-UP, AND MAINTAINING A VIRTUAL COMPUTER INFRASTRUCTURE - A system and method of operating an electronic device may include loading an operating system, from a boot key, on the electronic device during turn-on of the electronic device. The operating system may be operated on the electronic device. The boot key may cause the electronic device to automatically communicate with a web-service located on a communications network to enable executable instructions from the web-service to be communicated to the electronic device for execution thereon. | 11-22-2012 |
20120297180 | METHOD OF SWITCHING BETWEEN MULTIPLE OPERATING SYSTEMS OF COMPUTER SYSTEM - A method of switching between multiple operating systems of a computer system includes the following steps. Firstly, the computer system is in an environment of a first operating system. Then, a system management interrupt is triggered to allow the computer system to enter a system management mode, and a controlling authority of the computer system is transferred from the first operating system to a basic input output system. Then, a backup of a first environmental parameter of the first operating system is created. If the second environmental parameter is not included in the computer system, a second operating system is loaded in a normal mode. On the other hand, if the second environmental parameter is included in the computer system, the second operating system is booted according to the second environmental parameter. | 11-22-2012 |
20120297181 | Persisting a Provisioned Machine on a Client Across Client Machine Reboot - Systems and methods are provided for implementing a provisioned machine that persists across a client machine reboot. For example, a bootstrap function executing on a client machine may identify a delta disk stored on a physical disk of the client machine prior to booting up the operating system of the client machine. The bootstrap function may establish the path to the delta disk during the boot up of the operating system of the client machine. A provisioned machine may then be established based on the delta disk and the remote base disk to form a virtual disk of the operating system. Subsequently, the client machine may shut down, reboot and re-establish the provisioned machine based on the delta disk stored locally on the client machine. | 11-22-2012 |
20120303941 | METHOD AND APPARATUS FOR SECURING CPUS BOOTED USING ATTACHED FLASH MEMORY DEVICES - The present disclosure describes techniques evaluating compute and/or thermal loads (among other things) to aid in managing a collection of one or more containerized or modular data centers. For example, forecasts (or real-time measurements) of environmental factors (as well as projected computing demands) may be used to tailor the compute loads, cooling strategies or other metric of data center operations for a network of containerized or modular data centers. Doing so allows an operator of such a data center network to manage specific operational goals in real time. | 11-29-2012 |
20120303942 | CACHING OF BOOT DATA IN A STORAGE DEVICE - Example embodiments relate to caching data in a storage device. In example embodiments, a storage device is configured to receive a command to access data on the storage device. In response, the storage device may determine whether a computing device to which the storage device is coupled is currently booting. When the computing device is currently booting, the storage device may cache the data in a first portion of a cache used to cache boot data. | 11-29-2012 |
20120303943 | INFORMATION PROCESSING APPARATUS AND AUTHENTICATION CONTROL METHOD - According to one embodiment, a control module determines whether a second authentication key is present in a authentication key storage device when an information processing apparatus is powered on. The control module displays an identification code input screen for inputting an identification code if the second authentication key is not present, causes a storage device to execute an identification code authentication process of determining whether the identification code which is input to the identification code input screen agrees with the first identification code, and generates a third authentication key and stores the third authentication key in the authentication key storage device if the identification code authentication process is successfully carried out. | 11-29-2012 |
20120303944 | DATA RECOVERING SYSTEM AND METHOD - A basic input output system (BIOS) chip and method recovers specific data when an update of the BIOS chip begins. The BIOS chip obtains a space from a memory of a motherboard and names the space. The BIOS chip saves specific data from a non-volatile random access memory (NVRAM) of the BIOS chip into the space when an update of the BIOS chip begins. The BIOS chip reads the specific data from the space and saves the specific data into the NVRAM of the BIOS chip when the update of the BIOS chip is completed. | 11-29-2012 |
20120311312 | Fast Boot Via State Recreation - Methods, systems, and computer program products are provided to improve performance in power-saving modes. In particular, improvements are detailed to initialization times after chip restart from a power down mode. These improved initialization times benefit many consumer electronics that rely on batteries and other onboard power supplies, while at the same time having to meet strict usability demands for system response times. | 12-06-2012 |
20120311313 | TICKET-BASED PERSONALIZATION - Securely installing and booting software of a device to run OS authorized according to a ticket that is validated by a nonce generated by application processor (AP) in booted OS stage prior to entering a restore mode is described. AP in booted OS stage generates a pre-flight nonce that is stored in a trusted location (effaceable storage). AP in booted OS stage performs one-way hash of pre-flight nonce and sends the hashed pre-flight nonce to ticket authorization server. AP enters restore mode. AP in first stage bootloader receives a ticket from the ticket authorization server including a signed copy of the hashed pre-flight nonce. AP in first stage bootloader validates the signed ticket by comparing one-way hash of the pre-flight nonce stored in the trusted location and the hashed nonce in the signed ticket. Pre-flight nonce expires after timeout period and upon reboot of AP. Other embodiments are also described. | 12-06-2012 |
20120311314 | PROCESSOR SECURITY - A device comprises a processor arranged to automatically execute boot code upon start-up or reset. The boot code comprises a code authentication procedure to verify whether additional code is authenticated for execution on the processor. A separate security unit comprises a private unlock key and cryptography logic configured to use the private unlock key to sign a portion of data, thereby generating a signed unlock file for supply to a storage location. The processor is arranged to access the unlock file from the storage location, making it available without requiring connection to the security unit. The boot code further comprises an unlocking authentication procedure configured to check for the unlock file in the storage location, and if available to verify whether the unlock file is authenticated for use on the processor based on its signature, so as to de-restrict the boot authentication procedure on condition of verifying the unlock file. | 12-06-2012 |
20120311315 | Method and Apparatus to Reset Platform Configuration Register in Mobile Trusted Module - In accordance with the exemplary embodiments of the invention there is at least a method, apparatus, and executable program of computer instructions to perform the operations of establishing and initializing a set of platform configuration registers, where a first subset of platform configuration registers is defined as being non-resettable, and a second subset of platform configuration registers is defined as being resettable, storing initial boot-up system state information in one or more non-resettable platform configuration registers, dynamically resetting ( | 12-06-2012 |
20120317405 | METHOD OF OPERATING A HETEROGENEOUS COMPUTER SYSTEM - A method of operating a heterogeneous computer system for executing tasks of software that has at least one performance processor, a processor supporting logic, and a hypervisor processor. The method either i) boots up the hypervisor processor only; or ii) boots up the at least one performance processor after the hypervisor processor; or iii) boots up the at least one performance processor only; or iv) boots up the hypervisor processor after the at least one performance processor. The hypervisor processor executes tasks that the hypervisor processor has sufficient processing power to handle and puts the at least one performance processor to power-conserving state. The hypervisor processor brings the at least one performance processor out of power-conserving state to execute tasks that the hypervisor processor has insufficient processing power to handle. The at least one performance and hypervisor processors simultaneously execute tasks that require combined processing power of all processors. | 12-13-2012 |
20120317406 | FLASH STORAGE SYSTEM AND METHOD FOR ACCESSING A BOOT PROGRAM - The subject technology relates to a flash storage system for accessing a boot program for a computing system, the flash storage system comprising a flash storage, a random access memory and a flash controller coupled to the flash storage and the random access memory, the flash controller configured to load the boot program from the flash storage into the random access memory. In certain aspects, the flash control is further configured to generate a ready signal indicating the boot program is accessible from the random access memory. Computing systems and methods are also provided. | 12-13-2012 |
20120324212 | CACHING BASED OPERATING SYSTEM INSTALLATION - An image of system software is installed by loading an executable image of the system software using a boot loader, where the executable image includes a kernel and a plurality of files used by the kernel. The kernel of the system software is executed to generate the image of the system software that includes a copy of the kernel. Generating the image of the system software involves the steps of generating a plurality of pointers that each point to a different one of the files, retrieving the files using the pointers, and storing a copy of the kernel and the files in a storage device from which the system software is to be booted as the image of the system software. | 12-20-2012 |
20120331280 | ELECTRONIC DEVICE AND METHOD FOR BURNING FIRMWARE TO EMBEDDED DEVICE - In a method of burning a firmware to an embedded device, a booting file is firstly created and saved in the firmware. The booting file includes a boot loader, a first kernel, a second kernel, a first initrd, a second initrd of a firmware, a rootfs, and an application program. The method burns the boot loader, the first kernel, the second kernel, the first initrd, and the second initrd in a flash memory of the embedded device. When the rootfs and the application program are recorded in a storage system of the embedded device, the method downloads the rootfs and the application program from a storage system of the embedded device, and burns the rootfs and the application program to a register of the flash memory. | 12-27-2012 |
20120331281 | METHOD AND SYSTEM FOR POWER MANAGEMENT FOR A HANDHELD MOBILE ELECTRONIC DEVICE - Methods and systems for trusted boot using an original design manufacturer secure partition using execute-in-place non-volatile memory (XIP NVM) can include forming a secure partition within the XIP NVM and loading an initial program load within the secure partition wherein the initial program load comprises computer instructions which when executed by a processor causes the processor to perform operations comprising a trusted boot. Other embodiments are disclosed. | 12-27-2012 |
20130007433 | SYSTEM AND METHOD FOR PROVIDING AN IMAGE TO AN INFORMATION HANDLING SYSTEM - A system and method for providing an image to an information handling system is disclosed. A method for delivering an image may include booting an information handling system with a provisioning operating system downloaded via a network into a memory of the information handling system. The method may also include calculating, by the second provisioning OS, a fingerprint of an image stored on the information handling system. The method may additionally include determining if the fingerprint matches a previously-calculated fingerprint of the image calculated prior to delivery of the information handling system to its intended destination. The method may further include enabling the information handling system to boot from a storage resource of the information handling system in response to a determination that the fingerprint matches the previously-calculated fingerprint. | 01-03-2013 |
20130007434 | LOCAL SECURITY KEY GENERATION - A calling device may obtain a first calling security parameter by registering with a network and obtain a second calling security parameter in response to causing an application authentication architecture of the network to verify that that the calling device is authorized to access a network service corresponding to a communication application stored by the calling device. The calling device may communicate the first and second calling security parameters to a called device and receive first and second called security parameters from the called device in response to communicating the first and second calling security parameters. The calling device may generate a security key based on the first calling security parameter, the second calling security parameter, first called security parameter, and the second called security parameter, and use the security key to encrypt or decrypt communication between the calling device and the called device. | 01-03-2013 |
20130007435 | SERVER MANAGEMENT WITH DYNAMIC CONSTRUCTION OF PRE-BOOT IMAGES - A request handler may receive an image capture request for an operating system (OS) executing on a server. A pre-boot image handler may generate a pre-boot image, based on the image capture request and on the executing operating system. An image handler may capture an image of the operating system, based on the pre-boot image. | 01-03-2013 |
20130007436 | INTERMEDIATION OF HYPERVISOR FILE SYSTEM AND STORAGE DEVICE MODELS - A communication model in which application(s) above a hypervisor use a file system having one data access model (e.g., a block-based file system) to access an underlying storage device having another data access model (e.g., an object-based file system). This is accomplished via an intermediary component that converts input/output requests and responses from the file system data access model into the underlying storage device data access model, and vice versa. As an example, virtual machines operating a block-based file system using a hypervisor may interface through the intermediary component with an object-based storage device. Thus, the prolific use and availability of block-based file systems may be used compatibly with highly efficient object-based storage devices. | 01-03-2013 |
20130007437 | COMPONENT UPDATE USING MANAGEMENT ENGINE - Embodiments of systems and methods for applying a component update using a management engine are disclosed. In some embodiments, the method may comprise storing a bootable image containing an update for a component of a computing device in a secured memory location and configuring the computing device to boot from the bootable image. Such configuration may include configuring the computing device for integrated device electronics redirection (IDE-R) to the bootable image. | 01-03-2013 |
20130007438 | STORAGE MEDIUM STORING MASTER BOOT RECORD, COMPUTER SYSTEM HAVING THE SAME AND BOOTING METHOD OF THE COMPUTER SYSTEM - A method and an apparatus for a storage medium implemented by at least one computer are provided. The storage medium includes a first sector to store a first master boot record including an execution code allowing the at least one computer to grasp command information and to implement a preset control according to the grasped command information, a first data storage region to store a first data file for booting, a second sector to store a second master boot record allowing the at least one computer to boot based on the first data file, a second data storage region to store a second data file for booting, and a third sector to store a third master boot record allowing the at least one computer to boot based on the second data file. | 01-03-2013 |
20130007439 | MULTICORE PROCESSOR SYSTEM, COMPUTER PRODUCT, AND NOTIFICATION METHOD - A multicore processor system includes a processor configured to detect, among cores that have booted with an old boot program in the multicore processor, a core to which no process is assigned; change upon detecting a core to which no process is assigned, a reference area from a storage area for the old boot program to a storage area for a new boot program; and notify the core to which no process is assigned of a reboot instruction specifying the reference area after the change. | 01-03-2013 |
20130013904 | MOBILE COMPUTER CONTROL OF DESKTOP INPUT/OUTPUT FEATURES WITH MINIMAL OPERATING SYSTEM REQUIREMENT ON DESKTOP - A mobile device such as a smart phone can be connected to the USB port of a computer such as a laptop to charge the battery of the mobile device and to synchronize data. Also, when a special button is pressed the computer enters a mobile device support mode in which the computer processor does not boot the full service O.S. but only a small O.S., with the mobile device sending demanded images and sounds to the larger display and speakers of the computer and receiving input from the more capable keyboard of the computer so that a user can use the resources of the computer in operating the typically more limited mobile device. | 01-10-2013 |
20130013905 | BIOS FLASH ATTACK PROTECTION AND NOTIFICATION - A system and method for BIOS flash attack protection and notification. A processor initialization module, including initialization firmware verification module may be configured to execute first in response to a power on and/or reset and to verify initialization firmware stored in non-volatile memory in a processor package. The initialization firmware is configured to verify the BIOS. If the verification of the initialization firmware and/or the BIOS fails, the system is configured to select at least one of a plurality of responses including, but not limited to, preventing the BIOS from executing, initiating recovery, reporting the verification failure, halting, shutting down and/or allowing the BIOS to execute and an operating system (OS) to boot in a limited functionality mode. | 01-10-2013 |
20130013906 | SYSTEM AND METHOD FOR VALIDATING COMPONENTS DURING A BOOTING PROCESS - A method and system for validating components during a booting process of a computing device are described herein. The method can include the steps of detecting a power up signal and in response to detecting the power up signal, progressively determining whether software components of the computing device are valid. If the software components are determined to be valid, the computing device may be permitted to move to an operational state. If, however, at least some of the software components are determined to be not valid, the computing device may be prevented from moving to the operational state. In one arrangement, if the computing device is prevented from moving to the operational state, corrective action can be taken in an effort to permit the computing device to move to the operational state. | 01-10-2013 |
20130013907 | WIRELESS ROUTER REMOTE FIRMWARE UPGRADE - A wireless router receives a firmware update from a remote server, and destructively overwrites router firmware in flash memory in a chunk-wise manner, and then writes a kernel memory before going live with upgraded firmware. Some routers authenticate the firmware image. In some cases, image chunks are re-ordered into an executable order after receipt and before finishing their final arrangement in the flash memory. In some routers, a maximum firmware image size is at least two chunk sizes smaller than the flash memory storage capacity. Some routers remap ROM to RAM memory. Some decompress data from flash into a RAM. Some save text file configuration settings in flash before rebooting. Some detect a user's inactive billing status and redirect a web browser to a billing activation page. | 01-10-2013 |
20130013908 | PARALLELIZING MULTIPLE BOOT IMAGES WITH VIRTUAL MACHINES - A system and method are presented for converting a multi-boot computer to a virtual machine. Existing boot images on a multi-boot computer are identified and converted into virtual machine instances. Each virtual machine instance represents an operating system and is capable of running at the same time. Finally, a new hosting operating system is installed. The new hosting operating system launches and manages the converted virtual machine instances. | 01-10-2013 |
20130013909 | METHOD AND APPARATUS FOR ESTABLISHING SAFE PROCESSOR OPERATING POINTS - A system and method is provided for establishing safe processor operating points. Some embodiments may include a tamper resistant storage element that stores information regarding one or more operating points of an adjustable processor operating parameter. Some embodiments may further include an element to determine what the current processor operating point is of the operating parameter, and an element to compare the current operating point of the operating parameter with the stored information. | 01-10-2013 |
20130013910 | METHOD AND DEVICE FOR OPTIMIZING LOADING AND BOOTING OF AN OPERATING SYSTEM IN A COMPUTER SYSTEM VIA A COMMUNICATION NETWORK - The subject of the invention is in particular the optimization of the loading and booting of an operating system of a computer system via a communication network to which at least one server is connected. Said server comprises at least one image of a kernel of a minimal operating system and an image of an associated file system. The method comprises steps of loading said image of said kernel ( | 01-10-2013 |
20130019088 | METHOD FOR ESTABLISHING A WIRELESS LINK FOR A COMPUTER - Establishing a wireless link for a computer includes executing a basic input output system (BIOS), using a wireless module built in the computer to scan at least one nearby access point when executing the BIOS, and linking the wireless module to an access point of the at least one access point. Because the computer can scan nearby access points with the built in wireless module when executing the BIOS, an access point can be linked by the wireless module before an operating system is initialized. | 01-17-2013 |
20130024679 | INFORMATION RECORDING APPARATUS - An information recording apparatus has a drive unit to record digital information including digital contents; and a host unit to control reading and writing of the digital information for the drive unit. The host unit has a network processing unit to communicate with a server, a shadow determination unit to determine whether a shadow boot program to be executed prior to a boot program is executable, a shadow reading unit to read the shadow program from the drive unit when the shadow determination unit determines to be executable, a shadow execution unit to execute the shadow program, a server authentication unit to perform authentication with the server in accordance with a processing of the shadow program, and a password transmitter to transmit to the drive unit a password used for unlock of the drive unit when the authentication with the server is successful. | 01-24-2013 |
20130024680 | ATOMIC SWITCHING OF IMAGES IN DESKTOP STREAMING OVER WIDE AREA NETWORKS - A method for replacing a current desktop image having a current operating system on storage media for a computing device is described. In the method, an agent process is executed on the computing device for downloading from a server to a staging area on local storage media a replacement desktop disk image having a replacement operating system. The replacement desktop image includes a prefetch set of files and metadata for additional files, the prefetch set of files including a minimal set of files necessary to boot the replacement operating system, the replacement desktop image not including contents of the additional files. The computing device is rebooted to replace the current desktop image with the replacement desktop image. The computing device is then rebooted again to load the replacement operating system using the prefetch set of files. | 01-24-2013 |
20130024681 | SYSTEMS AND METHODS FOR ACTIVATION OF APPLICATIONS USING CLIENT-SPECIFIC DATA - Example embodiments relate to activation of an application included on a shared virtual disk using client-specific data. In particular, example embodiments retrieve, from a client-specific location on a virtual disk server, activation credentials generated in response to successful activation of the application during a previous boot Example embodiments then reinstall the application activation credentials to verify activation of the application for the particular client computing device. | 01-24-2013 |
20130031341 | Hibernation and Remote Restarting Hibernation Data in a Cluster Environment - Hibernation and remote restore functions of a client logical partition (LPAR) that exists within a data processing system having cluster-aware Virtual Input/Output (I/O) Servers (VIOSes) is performed via receipt of commands via a virtual control panel (VCP) through an underlying hypervisor. The client hibernation data file is stored in a shared repository by a source/original VIOS assigned to the client. The hypervisor receives a remote restart command and assigns a target/remote client LPAR and a target VIOS. The source I/O adapters and target I/O adapters are locked and the target VIOS gathers adapter configuration information from the source VIOS and configures the target adapters to be able to perform the I/O functionality provided by the source adapters to the client LPAR. The target VIOS then retrieves the client's hibernation data file, and the client LPAR is restored at the remote LPAR with the target VIOS providing the client's I/O functionality. | 01-31-2013 |
20130031342 | STORAGE AND TRANSFER OF PHYSICAL MACHINE STATE - According to one embodiment, an apparatus comprises a physical computing device including a network interface configured to enable communications over a network, and at least one processor. The apparatus captures an operational state of the physical computing device including information pertaining to a state of the physical computing device resulting from operations performed by the physical computing device. The apparatus further configures the physical computing device with the operational state captured from a desired computing device to continue operations of the desired computing device on the physical computing device. Embodiments may further include a method and computer-readable media encoded with software for the storage and transfer of physical machine state in substantially the same manner described above. | 01-31-2013 |
20130031343 | COMPUTER SYSTEM AND OPERATION SYSTEM LOADING METHOD - A computer system and an operation system loading method thereof are provided. The computer system comprises a universal serial bus (USB) storage device storing a boot image, servers and a boot image sharer comprising USB ports, a memory, a first USB host controller and a micro-processor. The micro-processor controls the first USB host controller to emulate each USB port to the USB storage device, and stores the boot image to memory, such that the boot image is shared to the USB ports. The servers are respectively coupled to the USB ports, wherein each server comprises a second USB host controller and a basic input output system (BIOS). The second USB host controller is coupled to one of the USB ports. The BIOS reads the boot image from the emulated USB storage device and loads an operation system according to the boot image. | 01-31-2013 |
20130031344 | COMPUTER AND DISPLAY AND BOOT CIRCUIT FOR SAME - A computer system includes a display and a computer. The display includes a first data port, a boot button connected to a first pin of the first data port, and a display control circuit connected to the boot button. The computer includes a second data port connected to the first data port, a buffer connected to a second pin of the second data port, and a computer control circuit. When the boot button is turned on, the display control circuit receives a low-level signal. The display control circuit boots the display, and controls the display to operate. The computer control circuit receives the low-level signal through the first and second data ports, and the buffer. The computer control circuit boots the computer, and controls the computer to operate. | 01-31-2013 |
20130031345 | POWER SWITCHING SYSTEM, COMPUTER SYSTEM, AND REBOOT CONTROLLING METHOD THEREOF - A power switching system, a computer system, and a reboot controlling method thereof are disclosed. The power switching system is used to the computer system and includes a first power input port, a first power output port, a first linear regulator module, and a first switch module. The first power input port is used for inputting a first power signal. The first power output port is used for outputting a second power signal. The first linear regulator module includes a first transformer unit used for transforming the first power signal into the second power signal, and a first switch control unit used for controlling the first transformer unit. When the first switch module is activated, the first switch control unit is connected to a ground and controls the first transformer unit to stop outputting the second power signal. | 01-31-2013 |
20130031346 | Switching Between Processor Cache and Random-Access Memory - The present disclosure describes techniques and apparatuses for switching between processor cache and random-access memory. In some aspects, the techniques and apparatuses are able to reduce die size of application-specific components by forgoing dedicated random-access memory (RAM). Instead of using dedicated RAM, a memory having a cache configuration is reconfigured to a RAM configuration during operations of the application-specific component and then, when the operations are complete, the memory is configured back to the cache configuration. Because many application-specific components already include memory having the cache configuration, reconfiguring this memory rather than including a dedicated RAM reduces die size for the application component. | 01-31-2013 |
20130031347 | ARRANGEMENT AND METHOD - A first arrangement including an interface configured to receive transactions with an address from a second arrangement having a first memory space; a translator configured to translate an address of a first type of received transaction to a second memory space of the first arrangement, the second memory space being different to the first memory space; and boot logic configured to map a boot transaction of the received transactions to a boot region in the second memory space. | 01-31-2013 |
20130031348 | Communicating Operating System Booting Information - Disclosed embodiments relate to communicating operating system booting information. A machine-readable storage medium may include instructions for reading data related to booting of an operating system of an electronic device from a non-volatile storage, instructions for writing the read data to a volatile storage prior to the booting of an operating system on the electronic device, and instructions for communicating the data written to the volatile storage to the electronic device via a serial communication interface. The machine-readable storage medium may further include instructions for receiving data, from the electronic device via the serial communication interface, related to the booting of the operating system of the electronic device and instructions for writing the received data to the non-volatile storage. | 01-31-2013 |
20130031349 | Computing device booting utilizing dispersed storage - A computing device boot-up method begins by a processing module detecting a boot-up of the computing device. The method continues with the processing module addressing a distributed basic input/output system (BIOS) memory to retrieve a plurality of error coded BIOS data slices. The method continues with the processing module reconstructing BIOS data from the plurality of error coded BIOS data slices using an error coding dispersal function. The method continues with the computing device booting up in accordance with the BIOS data. | 01-31-2013 |
20130036299 | METHOD FOR INCREASING FREE MEMORY AMOUNT OF MAIN MEMORY AND COMPUTER THEREFORE - For increasing a free memory amount, a computer is provided with a main memory and a virtual memory area. Working sets having a predetermined size in a main memory are allocated to virtual address spaces. The area from which working sets are removed is a free memory area, and a cache area is set to a part of the area. During booting, a predetermined process not affecting the booting is suspended. The size of the working set of the suspended process is decreased by swapping out the memory page into the virtual memory area. As a result, the size of the free memory area increases, and along therewith, the OS increases the size of a cache area, thus enabling more boot files to be read ahead and reducing the boot time. | 02-07-2013 |
20130036300 | METHOD OF FIXING ERROR OF BOOT IMAGE FOR FAST BOOTING AND IMAGE FORMING APPARATUS FOR PERFORMING THE METHOD - A method of fixing an error of a boot image for fast booting an image forming apparatus. In the method, if a boot image stored in the image forming apparatus has an error, the boot image is deleted, and the error is fixed by replacing the boot image with a backup of the boot image or generating a new boot image. | 02-07-2013 |
20130042095 | Method of Initializing Operation of a Memory System - Provided is a method of initializing operation of a memory system. The method includes receiving an initialization signal, performing a first initializing operation that uses initialization data in response to the receiving of the initialization signal, setting a forced reset mode when an operation standby signal is not enabled by the first initializing operation, and performing a second initializing operation that does not use the initialization data in response to the setting of the forced reset mode. | 02-14-2013 |
20130042096 | DISTRIBUTED MULTI-CORE MEMORY INITIALIZATION - In a system having a plurality of processing nodes, a control node divides a task into a plurality of sub-tasks, and assigns the sub-tasks to one or more additional processing nodes which execute the assigned sub-tasks and return the results to the control node, thereby enabling a plurality of processing nodes to efficiently and quickly perform memory initialization and test of all assigned sub-tasks. | 02-14-2013 |
20130042097 | METHOD OF UPDATING BOOT IMAGE FOR FAST BOOTING AND IMAGE FORMING APPARATUS FOR PERFORMING THE METHOD - A method of updating a boot image for fast booting an image forming apparatus. In the method, when a request for changing software installed in the image forming apparatus is received, a boot image is deleted from the image forming apparatus and the boot image is re-generated by rebooting the image forming apparatus. | 02-14-2013 |
20130042098 | METHOD OF GENERATING BOOT IMAGE FOR FAST BOOTING AND IMAGE FORMING APPARATUS FOR PERFORMING THE METHOD, AND METHOD OF PERFORMING FAST BOOTING AND IMAGE FORMING APPARATUS FOR PERFORMING THE METHOD - A method of generating a boot image for fast booting an image forming apparatus. In the method, a boot image is generated to contain information regarding a system state after processes that are not used to execute an operating system and at least one application are terminated. Then, the image forming apparatus is fast booted using the boot image. | 02-14-2013 |
20130046966 | Preloader - This disclosure describes techniques and/or apparatuses for reducing the total time used to boot up a computer and load applications onto the computer. | 02-21-2013 |
20130054944 | Information Handling System Swappable Boot Storage Device - A storage device actuator on an information handling system accepts an end user input to eject a first non-volatile storage device that stores the operating system running on the information handling system. Boot logic running on firmware of the information handling system initiates a shutdown of the operating system at the information handling system in response to an eject actuation and then permits ejection of the first non-volatile storage device. The storage device actuator detects insertion of a second non-volatile storage device into the information handling system and in response to the detection of the insertion initiates a boot by the boot logic of an operating system stored on the second non-volatile storage device. | 02-28-2013 |
20130054945 | ADAPTIVE SENSING FOR EARLY BOOTING OF DEVICES - Automatically performing configuration or activation activities on a device. A method includes collecting at least one of operational or environmental information about a device. The at least one of operational or environmental information about a device is used to determining an anticipated usage of the device. Based on the determined anticipated usage, at least one configuration or activation action is performed putting the device into a normal use state. | 02-28-2013 |
20130054946 | DIGITAL SIGNING AUTHORITY DEPENDENT PLATFORM SECRET - In accordance with one or more aspects, a representation of a configuration of a firmware environment of a device is generated. A secret of the device is obtained, and a platform secret is generated based on both the firmware environment configuration representation and the secret of the device. One or more keys can be generated based on the platform secret. | 02-28-2013 |
20130054947 | REBOOTING INFINIBAND CLUSTERS - Methods, systems, and physical computer-readable storage media are now provided that reduce latency and improve efficiency of a system after reboot of an Infiniband (IB) cluster. A method of rebooting an Infiniband cluster includes preserving routing table configurations of each switch of the Infiniband cluster, rebooting endpoints of the Infiniband cluster, activating physical links at each endpoint, setting local identifier (LID) locally at each endpoint of the IB cluster, and activating logical links locally at each endpoint of the IB cluster. | 02-28-2013 |
20130054948 | Attestation Protocol for Securely Booting a Guest Operating System - In a cloud computing environment, a production server virtualization stack is minimized to present fewer security vulnerabilities to malicious software running within a guest virtual machine. The minimal virtualization stack includes support for those virtual devices necessary for the operation of a guest operating system, with the code base of those virtual devices further reduced. Further, a dedicated, isolated boot server provides functionality to securely boot a guest operating system. The boot server is isolated through use of an attestation protocol, by which the boot server presents a secret to a network switch to attest that the boot server is operating in a clean mode. The attestation protocol may further employ a secure co-processor to seal the secret, so that it is only accessible when the boot server is operating in the clean mode. | 02-28-2013 |
20130054949 | MEMORY COMPATIBILITY SYSTEM AND METHOD - An apparatus including a first connector configured to fit into a first socket in a processing system, the first connector and first socket conforming to a first standard, a second socket configured to accept a memory module therein, the second socket and the memory module conforming to a second standard, a memory buffer module communicatively coupled to the first connector and the second socket, the memory buffer module configured to receive signals associated with the first standard from the first connector and output signals associated with the second standard to the second socket, and a virtualization module communicatively coupled to the memory buffer module, the first connector, and the second socket, the virtualization module configured to receive first initialization data associated with the second standard from the second socket and output second initialization data associated with the first standard to the processing system. | 02-28-2013 |
20130054950 | USER-CONTROLLABLE BOOT ORDER THROUGH A HYPERVISOR - A method and system for providing a user-controllable boot order via a hypervisor in a virtual machine system. A Basic Input/Output System (BIOS) receives a boot order list associated with a guest from the hypervisor. The boot order list is an ordered list that specifies an order of device names, according to which the BIOS searches for boot software when booting up the guest. In the boot order list, devices of the same device type are identified by different device names. Upon receipt of a command to boot up the guest, the BIOS searches for the boot software following the order of the device names specified by the boot order list. The BIOS then boots up the guest using the boot software located in one of the devices. | 02-28-2013 |
20130054951 | SOFTWARE EXECUTION METHOD AND ELECTRONIC DEVICE USING THE SAME - A software execution method is provided. The software execution method includes the following steps. An operating system kernel is started, which is commonly used by a first operating system and a second operating system. One or more driver modules is loaded into the kernel of the first operating system. Under a root of one of the first and the second operating systems, the one of the first and the second operating systems can start to be performed. A procedure is forked to chroot a root of the other one of the first and second operating systems. Under the root of the other one of the first and the second operating systems, the other one of the first and the second operating systems can start to be performed. An electronic device using the same is also provided. | 02-28-2013 |
20130054952 | OPERATING METHOD FOR DUAL OPERATING SYSTEM, PORTABLE DEVICE AND DOCKING SYSTEM - An operating method of a dual operating system, adapted to switch a first operating system and a second operating system on a docking system composed of a portable electronic device and a docking station, wherein the portable electronic device stores the first operating system and the first part of the second operating system, and the docking station stores the second part of the second operating system, the operating method comprising automatically starting the first part of the second operating system when the portable device operates the first operating system and is in an idle mode of the first operating system. When the portable device is coupled to the docking system and operates the second operating system and is in the idle mode of the second operating system, the portable device automatically loads and executes the first operating system. | 02-28-2013 |
20130054953 | SERVER WITH REMOTE REBOOT AND WAKE-UP FUNCTION - A server includes a number of first and second network cards, a buffer, a restart circuit, an AND gate, and a south bridge. Each of the first network cards includes a first signal pin to transmit a wake-up signal and a restart signal. Each of the second network cards includes a second signal pin to transmit a wake-up signal. The restart circuit is connected to each of the first signal pins through the buffer to receive the restart signal, and reboots the server according to the restart signal. The south bridge is connected to each of the first and second signal pins through the AND gate to receive the wake-up signal, and wakes up the server according to the wake-up signal. | 02-28-2013 |
20130054954 | DISPLAY DEVICE AND BOOTING METHOD THEREOF - A display device and a booting method thereof are provided. The booting method includes during a standby mode, receiving a remote control signal and storing the remote control signal; and in response to a power signal being received within a predefined period of time of the receipt of the remote control signal, booting the display device to display a display screen corresponding to the remote control signal. Therefore, it is possible for a user to readily execute a desired function of the display device when booting the display device. | 02-28-2013 |
20130061029 | METHOD AND APPARATUS FOR CONSOLIDATING BOOT DRIVES AND IMPROVING RELIABILITY/AVAILABILITY/SERVICEABILITY IN HIGH DENSITY SERVER ENVIRONMENTS - The present invention is directed to a boot appliance for a data storage system. The boot appliance is a self-contained, pre-configured device that serves as a boot device for multiple servers. The boot appliance contains multiple hard drives which are configured into one or more RAID volumes. Each volume is divided into multiple partitions, with each partition serving as the boot drive for any server connected to it. The boot appliance provides its own environmental controls and Ethernet connection which may be used for providing alerts regarding the health of the components of the boot appliance and/or data storage system to a monitoring system, such as a network management system. The boot appliance may provide a boot drive and operating system image to multiple servers at the same time. | 03-07-2013 |
20130061030 | SYSTEM CAPABLE OF BOOTING THROUGH A UNIVERSAL SERIAL BUS DEVICE AND METHOD THEREOF - A system capable of booting through a Universal Serial Bus device includes a Universal Serial Bus port, an embedded controller, a platform control hub, and a basic input/output system. The embedded controller is used for generating a boot signal when the system is powered off and at least one Universal Serial Bus device is plugged into the Universal Serial Bus port. The platform control hub is restored according to the boot signal. The basic input/output system has boot sequence setting values. The basic input/output system first starts to boot the at least one Universal Serial Bus device through the platform control hub according to the boot sequence setting values when the basic input/output system is restored according to the boot signal. | 03-07-2013 |
20130061031 | SYSTEM AND METHOD FOR BIOS AND CONTROLLER COMMUNICATION - A system and method for BIOS and controller communication is provided herein. The system may include an information handling system that includes a central processing unit coupled to a memory. The memory may contain a basic input/output system (BIOS). The information handling systems may also include a controller coupled to a nonvolatile memory and a register coupled to the central processing unit and the controller. The controller may be operable to store a key in the nonvolatile memory; write the key to the register in response to a signal from the BIOS; receive a command from the BIOS; verify the command is from the BIOS using the key; and execute the command if the command is from the BIOS. | 03-07-2013 |
20130061032 | EXTERNAL BOOT DEVICE, EXTERNAL BOOT METHOD, INFORMATION PROCESSING APPARATUS, AND NETWORK COMMUNICATION SYSTEM - An external boot device includes a storage unit ( | 03-07-2013 |
20130067209 | BOOTING DEVICES VIA THE CLOUD - Methods, systems, and computer program products are provided for automatically installing an operating system on a computing device that does not have an operating system pre-installed. Identifying information for the computing device is collected from a resource of the computing device. The identifying information is transmitted to a remote service. An indication is received of an operating system for the computing device selected by the remote service based on the identifying information. The selected operating system is downloaded for installation on the computing device. | 03-14-2013 |
20130067210 | SYSTEM AND METHOD FOR RECOVERING FROM AN INTERRUPTED ENCRYPTION AND DECRYPTION OPERATION PERFORMED ON A VOLUME - Systems and methods for reducing problems and disadvantages associated with traditional approaches to encryption and decryption of data are provided. An information handling system may include a processor, a memory communicatively coupled to the processor, and a computer-readable medium communicatively coupled to the processor. The computer-readable medium may have instructions stored thereon, the instructions configured to, when executed by the processor: (i) periodically store, during an encryption or decryption operation performed on the computer-readable medium, one or more variables indicative of an encryption status of a volume of the computer-readable medium; (ii) determine, based on the one or more variables, whether the volume is in a partially encrypted or decrypted state; and (iii) in response to a determination that the volume is in a partially encrypted or decrypted state, boot from the volume and continue the encryption or decryption operation. | 03-14-2013 |
20130073839 | MEMORY DEVICE AND HOST DEVICE - According to one embodiment, a memory device includes a nonvolatile memory including a plurality of memory cells, and a controller configured to control the nonvolatile memory. At a time of a boot operation, when a request for initialization of the memory device is issued, the controller does not return a response to the request until completion of the initialization, and the controller returns a response to the request when the initialization is completed. | 03-21-2013 |
20130073840 | APPARATUS AND METHOD FOR GENERATING AND MANAGING AN ENCRYPTION KEY - A portable terminal, includes: a first hardware module to encrypt data using an encryption key; a communication module to receive the encryption key, wherein the communication module receives the encryption key if the portable terminal is in a secure mode. A method includes: entering a secure mode of the portable terminal; receiving an encryption key; forwarding the encryption key to a first hardware module, wherein the first hardware module encrypts data with the encryption key. An apparatus, includes: a booting unit to enter into a secure mode; a first hardware module to receive an encryption key to encrypt data; and a second hardware module to receive the encrypted data, and the second hardware module being disabled in the secure mode, wherein the first hardware module receives the encryption at a fixed location of the apparatus. | 03-21-2013 |
20130073841 | Method and System for Restoring System Configuration after Disorderly Shutdown - A restart controller for an information handling system includes a first latch and a second latch. An output of the second latch is coupled to an input of the first latch. The restart controller is configured to detect that the information handling system has been shut down responsive to a first disorderly shutdown, and in response to detecting the shut down, to set the first latch, initiate a first startup of the information handling system to enable a remote wake mechanism of a chipset of the information handling system, and determine, at the second latch, that a basic input/output system (BIOS) of the information handling system is operational. In response to determining that the BIOS is operational, The restart controller is further configured to initiate an orderly shutdown of the information handling system, and clear the first latch. | 03-21-2013 |
20130080754 | Service Profile Based Peripheral Component Interconnect Device Enumeration And Option ROM Loading - Techniques are provided for a computer device to receive and store data comprising information configured to indicate boot device parameters for devices to be initialized during a given boot sequence. Those devices that match the device parameters are initialized prior to loading the computer device's operating system. Devices that do not match the boot parameters are masked out by the BIOS, and Option ROM firmware is loaded and executed for those devices that match the boot parameters. | 03-28-2013 |
20130080755 | METHOD FOR SPEEDING UP THE BOOT TIME OF ELECTRIC DEVICE AND ELECTRIC DEVICE USING THE SAME - A method for speeding up the boot time of an electric device and the electric device are disclosed. The disclosed method includes measuring power consumption of the electric device and determining whether the power consumption is greater than a threshold level, wherein the measuring and the determining steps are executed during a boot process of the electric device. If the power consumption is greater than the threshold level, a connector port controller initialization procedure is performed during the boot process, to initialize the connector port controller accordingly. If the power consumption is not greater than the threshold level, a simplified form of the connector port controller initialization procedure is performed during the boot process, to speed up the boot time. | 03-28-2013 |
20130080756 | Attesting a Component of a System During a Boot Process - A method for attesting a component of a system during a boot process. The method comprises the steps of: verifying that the system is in a trusted state; in response to verifying that the system is in a trusted state, requesting an enrollment of the system wherein the requesting step further comprises the step of: retrieving enrollment data associated with the system; retrieving current input data associated with the component of the system; comparing the current input data against the enrollment data in order to determine whether the system can retain its trusted state; wherein in response to the comparing step, if the current input data matches the enrollment data, the system retains its trusted state; and accepting the trusted state until receipt of a notification, from the system having a retained trusted state, of an update to the system. | 03-28-2013 |
20130080757 | BOOTING METHOD AND BOOTING SYSTEM - A booting method is used to an electronic apparatus including a storage device having a firmware image and a firmware recovery program, and comprises the steps of: starting a booting procedure and a timer; stopping the timer when a stop signal is received; and implementing a shutdown program, and overwriting the firmware image with the firmware recovery program or overwriting a command first implemented of the firmware image with a jump command to jump to the firmware recovery program, when the timer attains a specific time and the stop signal is not received. | 03-28-2013 |
20130080758 | System and Method to Manipulate a System Setting When Booting an Information Handling System - A method of manipulating a system setting when booting an information handling system can include providing an update request repository that includes a plurality of entries. Each of the plurality of entries can correspond to a particular system setting. A system setting value associated with each entry can be included in a handoff block (HOB) of a plurality of handoff blocks associated with a cache. The method also includes receiving a command from a PEI module (PEIM) indicating a change to be made to a particular system setting at the information handling system. The method also includes creating or changing a particular entry of the update request repository based on the command. | 03-28-2013 |
20130086371 | METHOD FOR DEVICE-LESS OPTION-ROM BIOS LOAD AND EXECUTION - An invention is provided for loading an Option-ROM BIOS into memory without the need of an associated hardware device, such as a PCI card. The invention includes loading code from a boot sector of a designated boot device into memory, wherein the code includes Option-ROM location data denoting a location of an Option-ROM BIOS. The Option-ROM BIOS then is loaded into memory utilizing the Option-ROM location data. As above, the Option-ROM BIOS includes MBR location data denoting a location of the MBR associated with the OS. Thus, the MBR can be loaded into memory utilizing the MBR location data in the Option-ROM BIOS and control can be transferred to the MBR. Thereafter, the OS system files are loaded into memory utilizing the MBR. | 04-04-2013 |
20130086372 | INFORMATION PROCESSING APPARATUS AND BOOT CONTROL METHOD - According to one embodiment, an information processing apparatus, to which devices are connected, includes a device information detector, a device setting module and an information storage module. The device information detector detects device information from the devices when the apparatus is booted at a first timing. The device setting module sets the devices to be ready to use using the information. The information storage module stores the information in a nonvolatile memory. The device setting module sets the devices to be ready to use using the information in the nonvolatile memory when the apparatus is booted at a second timing after the first timing. | 04-04-2013 |
20130091344 | METHOD OF CONFIGURING MOBILE COMPUTING DEVICE - A method of storing configuration data for mobile computing devices can comprise the steps of providing a master configuration file including one or more parameter records and providing a device file including one or more device records. Each parameter record can map a parameter value to a parameter identifier. Each device record can map a parameter identifier to a mobile computing device identifier. | 04-11-2013 |
20130091345 | AUTHENTICATION OF COMPUTER SYSTEM BOOT INSTRUCTIONS - Various systems, processes, and products may be used to authenticate computer system boot instructions. In particular implementations, a system, process, and product for authenticating computer system boot instructions may include the ability to determine, according to pre-boot computer system instructions, whether a public key associated with the boot instructions is authentic using a public key associated with a central processing unit. The system, process, and product may also include the ability to determine, if the public key associated with boot instructions is authentic, whether the boot instructions are authentic using the public key associated with boot instructions. The system, process, and product may further include the ability to launch the boot instructions if the boot instructions are authentic. | 04-11-2013 |
20130091346 | Code Updates in Processing Systems - A method for updating code images in a system includes booting a first image of a code with a sub-system processor, receiving a second image of the code, performing a security and reliability check of the second image of the code with the sub-system processor, determining whether the security and reliability check of the second image of the code is successful, storing the second image of the code in a first memory device responsive to determining that the security and reliability check of the second image of the code is successful, designating the second image of the code as an active image, and sending the second image of the code to a second memory device, the second memory device communicatively connected with the first memory device and a main processor. | 04-11-2013 |
20130091347 | AUTOMATED DOUBLE FIRMWARE UPGRADE - A downstream network device is booted into a final provisioned state by retrieving a configuration file a first time from an upstream network device, and checking if a currently booted software load of the downstream device matches a first software load (EE) described by the configuration file. If the currently booted software load of the downstream device does not match the EE, the downstream network device checks if the configuration file includes a description of a second software load (NE), and if so, the downstream network device checks if the currently booted software load matches the NE, and if not, the downstream network device downloads the first software load, boots the first software load, and retrieves the configuration file a second time. | 04-11-2013 |
20130097412 | Performing A Boot Sequence In A Multi-Processor System - Methods, apparatuses, and computer program products for performing a boot sequence in a multi-processor system are provided. Embodiments include: in response to detecting initiation of a boot sequence of the multi-processor system, initializing, by a bootstrap processor (BSP), BSP memory associated with the BSP and initializing, by an application processor, memory associated with the application processor; determining, by the BSP, whether the initialization of the BSP memory is completed; and if the initialization of the BSP memory is completed, loading, by the BSP, an operating system on the BSP memory regardless of whether the application processor has completed initialization of the memory associated with the application processor. | 04-18-2013 |
20130097413 | COMPUTING DEVICE AND METHOD FOR CONTROLLING A STARTUP CURRENT OF A STORAGE SYSTEM - A method for controlling a startup current of a storage system using a computing device, the computing device detects a current of each storage device of the storage system when the storage system is turned on, and calculates the power drawn by each storage device according to the current of each storage device. If a sum of powers drawn by all the storage devices is greater than a predetermined value, the computing device turns off the storage system and determines a startup sequence of the storage devices and a startup time of each storage device. The startup time of each storage device is stored in a storage unit. | 04-18-2013 |
20130103935 | METHOD AND SYSTEM FOR PROGRAMMABLE POWER STATE CHANGE IN A SYSTEM-ON-A-CHIP DEVICE - A method and system are set forth for enabling software control of a power management unit (PMU) in a System-On-a-Chip (SoC) device to effect changes in power state without having to adjust external board level states. In one embodiment, once the SoC system controller has been booted, it communicates with the PMU over a communication bus and is able to request changes in power states without requiring external trigger events. Complete remote control of power states according to the method and system set forth herein provides flexibility when debugging and testing SoC devices because there is no need to alter external board states. Also, providing programmable changes in reset states as an alternative to full system reset preserves state data so that the system can be restarted efficiently and quickly from known conditions. | 04-25-2013 |
20130103936 | SYSTEM AND METHOD FOR PROVIDING A PARAMETER FOR AN APPLICATION OPERATING ON AN ELECTRONIC DEVICE - A system and method of activating a set up application operating on an electronic device are provided. The method comprises: upon activation of the electronic device, determining a state of initial configuration for the electronic device from configuration data stored in the electronic device; when the state of initial configuration of the electronic device indicates that the set up application had previously been initiated, presenting a GUI screen on the electronic device where an application operating on the electronic device and the set up application are displayed; and upon activation of the set up application, activating the set up application at a point in its operation based on the operation history. | 04-25-2013 |
20130103937 | INFORMATION DEVICE, STORAGE MEDIUM AND INITIAL STATE RESTORATION METHOD - An information device has a storage medium storing information items which includes a first program provided on a first partition, a second program and data provided on a second partition to restore the first program on the first partition to a predetermined state, a boot block which causes system activation from one of the first partition and the second partition, and an active-partition switching program which indicates, to the boot block, one of the first and second partitions. An input/output system activates the active-partition switching program when a specific operation is performed. The active-partition switching program indicates to the boot block that system activation is to be executed from the second partition. | 04-25-2013 |
20130111200 | RESET AND REBOOT CIRCUIT | 05-02-2013 |
20130111202 | Method and device for cold starting android mobile terminal | 05-02-2013 |
20130117549 | METHOD FOR EXECUTING MULTIPLE OPERATING SYSTEMS AND ELECTRONIC APPARATUS - A method for executing multiple operating systems (OSs) and an electronic apparatus are provided. Current hardware resources of the electronic apparatus are obtained after executing a boot process. The hardware resources are allocated to each of the OSs according to a resource allocation ratio, so as to load each of the OSs. | 05-09-2013 |
20130117550 | ACCESSING SECURE VOLUMES - A system and method for reading data from or writing data to a secure volume of a secure peripheral device. The secure peripheral device is communicatively coupled with a first host computer. The secure peripheral device includes an unsecure first volume, a secure second volume, and a secure third volume. Data is read from or written to the secure third volume either via an operating system stored on the first host computer or via an operating system stored on the secure peripheral device. | 05-09-2013 |
20130117551 | SECURITY METHOD - A security method for verifying a client device comprising: loading and executing a boot loader at the client device which establishes a connection to a boot compliance server; sending a first cryptographic element from the boot compliance server to the client device; generating a first cryptographic response with the first cryptographic element based on at least part of the boot loader and sending the first cryptographic response to the boot compliance server for verification; and continuing the boot process upon successful verification of the first cryptographic response. | 05-09-2013 |
20130124840 | SECURE BOOT UP OF A COMPUTER BASED ON A HARDWARE BASED ROOT OF TRUST - A method includes performing a boot up of a computer having a system on-chip having multiple processors and a nonvolatile read-only machine-readable medium. The boot up includes enabling a first processor of the multiple processors, while maintaining others of the multiple processors in a disabled state. The boot up includes retrieving initial stage instructions from the nonvolatile read-only machine-readable medium. The boot up also includes executing the initial stage instructions and validating multiple stages of firmware separately. The boot up includes, in response to validating the multiple stages of firmware, executing the multiple stages of firmware in consecutive stages of the boot up, wherein executing of each stage of the multiple stages of firmware enables a different set of disabled hardware components of the computer. The boot up also includes validating an operating system and, in response to validation, transferring control of the computer to the operating system. | 05-16-2013 |
20130124841 | OS Processing Method and System and Computer Readable Storage Medium Applying the Method - An operating system (OS) processing method for a host computer includes the following steps: when the host computer is booting, a boot loader is read from a boot reading device according to a boot priority order of the host computer. A signature detecting program included in the boot loader is executed to detect data stored in a specified address of a master boot record (MBR) of the host computer. When it is determined that the present version signature of the host computer does not match the preset version signature according to the data stored in the specified address, an OS image is read from the boot reading device, an OS is installed on the host computer according to the OS image. The data stored in the specified address of the MBR is amended according to an image version signature of the installed OS. | 05-16-2013 |
20130124842 | IMAGE FORMING APPARATUS AND METHOD OF BOOTING IMAGE FORMING APPARATUS HAVING HIBERNATION FUNCTION - A method of booting an image forming apparatus having a hibernation function. In the method, when booting of the image forming apparatus starts, whether a storage device has a defect is checked based on a flag indicating whether the hibernation function is activated, and a system of the image forming apparatus is booted using a stored boot image. | 05-16-2013 |
20130124843 | SECURE BOOT ADMINISTRATION IN A UNIFIED EXTENSIBLE FIRMWARE INTERFACE (UEFI)-COMPLIANT COMPUTING DEVICE - Firmware in a UEFI-compliant computing device is used to administer and alter a Secure Boot process for the computing device while continuing to provide protection from unauthorized third-party code. | 05-16-2013 |
20130124844 | Dynamic Boot Image Streaming - The present disclosure describes apparatuses and techniques for dynamic boot image streaming. In some aspects a memory controller that is streaming multiple boot images from a first memory to a second memory is stalled, a descriptor for streaming one of the multiple boot images from the first memory to a non-contiguous memory location is generated while the memory controller is stalled, and the memory controller is resumed effective to cause the memory controller to stream, based on the descriptor generated while the memory controller is stalled, the second boot image to the non-contiguous memory location. | 05-16-2013 |
20130124845 | EMBEDDED DEVICE AND CONTROL METHOD THEREOF - An embedded device including a random access memory (RAM) and a processor is provided. The processor includes a processor core and an authentication module. The RAM stores data-to-be-authenticated. The data includes a program code to be executed by the processor core. The authentication module periodically accesses and authenticates the data-to-be-authenticated in the RAM. When the authentication module deems that the program code in the RAM loses its integrity, the authentication module interrupts the processor from further executing the program code. | 05-16-2013 |
20130124846 | EXTERNAL BOOT DEVICE, PROGRAM PRODUCT, EXTERNAL BOOT METHOD, AND NETWORK COMMUNICATION SYSTEM - A USB memory ( | 05-16-2013 |
20130132712 | HANDLING DEVICE AND METHOD FOR VOLTAGE FAULTS - A handling device and method for voltage faults applicable for using in a computer system. The handling method includes acquiring a signal of voltage fault. According to the signal of voltage fault and by looking up at tables, an operating status of the computer system corresponding to the signal of voltage fault is acquired, and generating a control signal according to the operating status. Then, the computer system according to the control signal is restarted. | 05-23-2013 |
20130132713 | ELECTRONIC EQUIPMENT, METHOD OF CONTROLLING ELECTRONIC EQUIPMENT AND CONTROL PROGRAM FOR ELECTRONIC EQUIPMENT - According to one embodiment, an electronic equipment includes: an application configured to operate an electronic equipment, which serves to instruct OS to start based on settings; an OS starting discriminating module configured to discriminate as to whether or not the OS is started based on instruction of start-up of the application; and a white list object discriminating module configured to discriminate whether or not the application is an object of the white list stored in advance when the OS is started based on instruction of start-up of the application, and configured to instruct refusal of access of the application from the OS when the application is not the object of the white list. | 05-23-2013 |
20130132714 | APPARATUS AND METHOD TO DRIVE DEVICES - A device driving apparatus includes a storage unit to store a plurality of device driving programs, a plurality of devices to receive the plurality of device driving programs, and a switching unit to transfer the plurality of device driving programs. | 05-23-2013 |
20130138937 | Method And System For Managing Plant Operation - Disclosed herein are methods and systems for advising and operating a power plant and related devices. In an embodiment, a power plant operator via a client | 05-30-2013 |
20130138938 | METHOD, RECORDING MEDIUM, AND ELECTRONIC DEVICE FOR REDUCING BOOT TIME - The present invention relates to a method of reducing the boot time of an electronic device (i.e., improving the boot speed of the electronic device), such as a computer, an electronic device to which the method is applied, and a recording medium on which the method is recorded. There is provided a method of booting an electronic device includes hiding at least one first device of devices, included in the electronic device, through an initial start-up program, loading drivers corresponding to remaining devices other than the at least one first device, from among the included devices, by driving an Operating System (OS) of the electronic device, and unhiding the hidden at least one first device through the initial start-up program according to a predetermined event. | 05-30-2013 |
20130138939 | METHOD FOR PROCESSING BOOTING ERRORS - A method for processing booting errors for a computer having multiple voltage regulator downs (VRDs) includes reading a boot sequence including multiple power-on stages, and each power-on stage corresponds to a boot voltage and one of the VRDs; performing the power-on stages according to the boot sequence, and determining whether an output voltage of the VRD corresponding to each power-on stage is equal to the corresponding boot voltage; and when the output voltage of any one of the VRDs is not equal to the corresponding boot voltage, performing a debugging procedure. | 05-30-2013 |
20130138940 | COMPUTER SYSTEM AND METHOD FOR UPDATING BASIC INPUT/OUTPUT SYSTEM THEREOF - A computer system including a central processing unit (CPU), a chipset connected to the CPU, a baseboard management controller (BMC) connected to the chipset, and a basic input/output system (BIOS) unit connected to the BMC is provided. The BMC switches a connection mode which the BMC connecting to the BIOS unit between a local mode and a bypass mode. The BIOS unit communicates with the chipset directly, when the connection mode is switched to the bypass mode. The BMC switches the connection mode from the bypass mode to the local mode, when the BIOS unit should be updated. Then, the BMC communicates with the BIOS unit directly, and the BIOS updating file is written into the BIOS unit. | 05-30-2013 |
20130138941 | METHOD AND APPARATUS TO CONTROL BOOTING OF COMPUTER SYSTEM - A method of controlling booting of a computer system includes determining whether a booting mode of a basic input/output system (BIOS) set in the computer system is a first mode in which supportability of an extensible firmware interface (EFI) is automatically determined, if the booting mode of the BIOS is determined as the first mode, determining whether an operating system (OS) that is stored in a first storing unit and performs booting of the computer system supports the EFI, setting the booting mode of the BIOS as one of a mode in which the EFI is supported and a mode in which the EFI is not supported, based on the determination result regarding whether the OS supports the EFI and controlling booting of the computer system in the set booting mode. | 05-30-2013 |
20130138942 | Method for Preconfiguring an Appliance, and Method for Starting Up the Appliance - A method for preconfiguring an appliance having a configuration memory configured to have information written to it when the appliance is in a deactivated state, wherein the appliance is configured to make contact with at least one further appliance during operation, includes capturing a data record from the appliance, wherein the data record contains at least identification data from the appliance. The method further includes determining a piece of configuration information from the appliance by using the data record and at least one data record from the at least one further appliance, and writing the configuration information to the configuration memory of the appliance in order to preconfigure the appliance. | 05-30-2013 |
20130138943 | SEMICONDUCTOR INTEGRATED CIRCUIT DEVICE AND ELECTRONIC SYSTEM MOUNTED THE SEMICONDUCTOR INTEGRATED CIRCUIT DEVICE - An electronic system has a plurality of semiconductor integrated circuit deices which are connected in series via a single signal line. One semiconductor integrated circuit device of the plurality of semiconductor integrated circuit devices sequentially reads the setting data of each of the plurality of the semiconductor integrated circuit devices from a storage unit, sets the setting data of the one semiconductor integrated circuit device to a functional circuit of the one semiconductor integrated circuit device, and transfers second setting data of another semiconductor integrated circuit device to the another semiconductor integrated circuit device via the single signal line. | 05-30-2013 |
20130138944 | METHODS AND SYSTEMS FOR MODIFYING DISK IMAGES TO PROVIDE NETWORK INTERFACE CARD TEAMING CAPABILITIES - A system for modifying a virtual disk to provide network interface card (NIC) teaming capabilities to a virtual disk. The system can include a virtual disk that has access to one or more NICs. In some instances, the NICs are included in a NIC team that is also available to the virtual disk. A teaming module executing on a computer can identify the NIC team and responsively obtain a media access control (MAC) address of the NIC team. In response to obtaining the NIC team MAC address, the teaming module can obtain a network boot MAC address that was used to PXE boot the virtual disk. The teaming module can then replace the NIC team MAC address of each NIC in the NIC team with the obtained network boot MAC address. The system then boots from the virtual disk that has the modified NIC team configuration. | 05-30-2013 |
20130138945 | SYSTEMS, METHODS, AND MEDIA FOR DISABLING GRAPHIC PROCESSING UNITS - An information handling system (IHS) provides a method for managing power consumption. The method includes detecting a power-on in the IHS, wherein the IHS comprises a first graphics processing unit (GPU) and at least one additional GPU. The method also includes determining if a normal boot is implemented in the IHS and determining if an instant-on boot occurred if the normal boot is implemented. The at least one additional GPU is disabled if an instant-on boot occurred. | 05-30-2013 |
20130145139 | REGULATING ACCESS USING INFORMATION REGARDING A HOST MACHINE OF A PORTABLE STORAGE DRIVE - Described herein are techniques for regulating access to a portable storage drive, that stores an operating system securely, using information regarding a host machine. In accordance with some of the techniques described herein, when a portable storage drive that stores an operating system securely is to be accessed by a host machine, information regarding the host machine, such as information regarding the hardware of the host machine, may be retrieved and evaluated to determine whether to grant access to the host machine. When the host machine is granted access, the host machine may access secured data stored on the portable storage drive in any suitable manner. In some cases, accessing the secured data may include decrypting the secured data and transferring decrypted data to another storage of the host machine. The decrypted information may include an operating system that is booted by the host machine. | 06-06-2013 |
20130145140 | SYSTEM AND METHOD FOR TEMPORARY SECURE BOOT OF AN ELECTRONIC DEVICE - The invention discloses system and method of temporary secure boot process of an electronic device. The method comprises: generating a first token according to an identification data of the electronic device; sending a request along with the first token to a service provider, the request corresponding to a boot package; receiving a second token and a boot package from the service provider; verifying the second token and the boot package; and executing the boot package according to verification result. | 06-06-2013 |
20130145141 | INFORMATION PROCESSING APPARATUS AND UPDATE PROCESS SUPPORT SYSTEM - An information processing apparatus includes a storage unit that stores reboot necessity information for respective versions of programs that are install targets of an electronic device, the reboot necessity information indicating whether the electronic device needs to be rebooted when a first program of a first version installed in the electronic device is updated to a second program of a second version; an extracting unit that extracts difference information indicating a difference between the first program and the second program in response to a request to acquire the second program, the request specifying the first version of the first program; a determining unit that determines whether the electronic device needs to be rebooted when the second program is installed, based on the difference between the first version and the second version indicated in the difference information and the reboot necessity information; and a responding unit that returns a determination result. | 06-06-2013 |
20130151828 | CONSOLIDATED NOTIFICATIONS TO NFS CLIENTS - A computer implemented method, system and apparatus for rebooting a host having a plurality of network interfaces. A server reboots the host by stopping an NFS server process on the host. The server sends at least one consolidated notification to a plurality of clients identified in a consolidated notification table, wherein the consolidated notification comprises at least two addresses of network interfaces of the host. The server determines that an acknowledgement is received from each of the plurality of clients. The server halts resending of consolidated notifications, responsive to determining that an acknowledgement is received from the each of the plurality of clients. | 06-13-2013 |
20130151829 | Multi-Chip Initialization Using a Parallel Firmware Boot Process - Mechanisms, in a multi-chip data processing system, for performing a boot process for booting each of a plurality of processor chips of the multi-chip data processing system are provided. With these mechanisms, a multi-chip agnostic isolated boot phase operation is performed, in parallel, to perform an initial boot of each of the plurality of processor chips as if each of the processor chips were an only processor chip in the multi-chip data processing system. A multi-chip aware isolated boot phase operation of each of the processor chips is performed in parallel, where each of the processor chips has its own separately configured address space. In addition, a unified configuration phase operation is performed to select a master processor chip from the plurality of processor chips and configure other processor chips in the plurality of processor chips to operate as slave processor chips that are controlled by the master processor chip. | 06-13-2013 |
20130151830 | MOUNT-TIME RECONCILIATION OF DATA AVAILABILITY - Systems and methods are disclosed for mount-time reconciliation of data availability. During system boot-up, a non-volatile memory (“NVM”) driver can be enumerated, and an NVM driver mapping can be obtained. The NVM driver mapping can include the actual availability of LBAs in the NVM. A file system can then be mounted, and a file system allocation state can be generated. The file system allocation state can indicate the file system's view of the availability of LBAs. Subsequently, data availability reconciliation can be performed. That is, the file system allocation state and the NVM driver mapping can be overlaid and compared with one another in order to expose any discrepancies. | 06-13-2013 |
20130151831 | Virtual Machine Monitor Bridge to Bare-Metal Booting - Mechanisms for executing a bare metal boot operation for bare metal booting a control program are provided. These mechanisms boot a computing device to a hypervisor ownership phase of the bare metal boot operation. During the hypervisor ownership phase of the bare metal boot operation a hypervisor is loaded and controls and manages platform hardware of the computing device. The computing device is then booted from the hypervisor ownership phase to a transition phase in which the hypervisor releases control and management of the platform hardware of the computing device to the control program. The computing device is then booted from the transition phase to a control program ownership phase in which the control program is in full control and manages the platform hardware. The bare metal boot operation is performed without restarting the computing device and without cycling through initialization of firmware. | 06-13-2013 |
20130151832 | FLASH MEMORY STORAGE SYSTEM AND DATA PROTECTION METHOD THEREOF - A flash memory storage system includes a flash memory, a host and a controller is provided. The controller couples to the host and the flash memory, and restricts the host to access the flash memory according to a state of the host. When the host is in a booting state or in a resetting state, the controller allows the host to access the flash memory. After the host completes a booting process or a resetting process, the controller restricts the host to access the flash memory so as to protect a data stored by the flash memory. Besides, a data protection method for which applied to the above-mentioned storage system is also provided in the present invention. | 06-13-2013 |
20130151833 | BOOTING METHOD FOR LOW TEMPERATURE ENVIRONMENT AND ELECTRONIC APPARATUS THEREFOR - A booting method for low temperature environment and an electronic apparatus therefor are provided. The booting method includes the following steps: reading a booting process record from a memory unit of the electronic apparatus; executing a booting process according to the booting process record, wherein the booting process includes a plurality of booting subroutines; and when executing one of the booting subroutines, updating the booting process record stored in the memory unit of the electronic apparatus corresponding to the booting subroutine, wherein the booting subroutines include providing a power output by controlling a power supply unit of the electronic apparatus, and an output value of the power output gradually increases as executing the booting subroutines sequentially. | 06-13-2013 |
20130151834 | Deployment of a Software Image on Multiple Targets with Streaming Technique - Deploying a software image from a source data-processing system on target data-processing entities of a target data-processing system, the software image including memory blocks being individually accessible, with a predefined subset of the memory blocks defining a bootstrap module. The deploying includes downloading the bootstrap module onto a main one of the target data-processing entities from the source data-processing system, booting the main target data-processing entity from the bootstrap module thereby loading a streaming driver in the bootstrap module, and serving each request of accessing a selected memory block of the software image on the main data-processing entity by the streaming driver. | 06-13-2013 |
20130151835 | Deployment of a Software Image on Multiple Targets with Streaming Technique - Deploying a software image from a source data-processing system on target data-processing entities of a target data-processing system, the software image including memory blocks being individually accessible, with a predefined subset of the memory blocks defining a bootstrap module. The deploying includes downloading the bootstrap module onto a main one of the target data-processing entities from the source data-processing system, booting the main target data-processing entity from the bootstrap module thereby loading a streaming driver in the bootstrap module, and serving each request of accessing a selected memory block of the software image on the main data-processing entity by the streaming driver. | 06-13-2013 |
20130151836 | SEMICONDUCTOR DEVICE INCLUDING ENCRYPTION SECTION, SEMICONDUCTOR DEVICE INCLUDING EXTERNAL INTERFACE, AND CONTENT REPRODUCTION METHOD - A secure LSI device | 06-13-2013 |
20130159689 | METHOD AND APPARATUS FOR INITIALIZING EMBEDDED DEVICE - The present invention relates generally to a method and apparatus for initializing an embedded device. When a boot loader is executed and a kernel is loaded, an initialization program is executed, and a booting sequence including information about an operating sequence of a boot process is loaded. Thereafter, initialization functions which are included in a script replacement function module of the embedded device are executed, and then a state of the embedded device is set to a usable state. Accordingly, the method and apparatus can efficiently perform the operations of an initialization program that is used to solve the complexity of the initialization of an OS inevitably appearing on mobile devices and high-performance embedded devices, and an initialization script that is operated to flexibly execute the initialization program on various devices having different characteristics. | 06-20-2013 |
20130159690 | METHOD OF STARTING A COMPUTER USING A BIOMETRIC AUTHENTICATION DEVICE - A computer is made usable in a short time using a fingerprint authentication device. When a fingerprint authentication device performs authentication successfully, the fingerprint authentication device sends a startup signal to a power controller via a line. The power controller controls a DC/DC converter to supply power to devices. The fingerprint authentication device sets whether normal boot or fast boot that is completed in a shorter time than the normal boot is successful, in a register via a line. In the fast boot, initialization of a USB interface of a line and password input by a user are skipped, and a BIOS accesses a system by single sign-on using a password stored in a secure area. | 06-20-2013 |
20130166893 | AUXILIARY CARD INITIALIZATION ROUTINE - A memory system or flash card may be initialized from a protected block of flash memory as a backup process. If there is an error during regular card initialization and the firmware for the card cannot be loaded, the card may be inaccessible to a user. Booting with a protected block of memory may be used to load a different version of the firmware that can still initialize the card despite the error from loading the other firmware. | 06-27-2013 |
20130166894 | COMPUTER SYSTEM AND DETECTING-ALARMING METHOD THEREOF - A computer system and a detecting-alarming method thereof are provided. The computer system includes a device and a basic input/output system (BIOS) unit. The BIOS unit has a current device table. The BIOS unit detects the device of the computer system to obtain a detecting result in a start procedure, and compares the detecting result with the current device table. If the detecting result does not match the current device table, the BIOS unit gives an alarm. | 06-27-2013 |
20130166895 | ELECTRONIC DEVICE AND METHOD FOR SETTING BOOT PARAMETERS - A method for setting boot parameters includes: controlling a display to display an input box when detecting a boot setting signal in response to user operation; receiving boot parameters input by the user from the input box; converting the boot parameters input by the user to corresponding ASCII codes, combining the ASCII codes with an identifier identifying the boot parameter to form a data segment, and storing the data segment into the CMOS RAM; reading the ASCII codes from the CMOS RAM when detecting the identifier; setting the boot parameters according to the ASCII codes, and storing the set boot parameters into the BIOS memory. | 06-27-2013 |
20130166896 | MANAGEMENT SYSTEM FOR NETWORK CARD - A management system for controlling a communication between a baseboard management controller (BMC) and a basic input/output system (BIOS) coupled to a platform controller hub (PCH), includes a network chip coupled to the BMC, a switch unit configured to control connection between the BIOS and the BMC, and a control unit to output a first control signal or a second control signal to the switch unit. When the control unit outputs the first control signal to the switch unit, the switch unit enables the communication between the BIOS and the network chip. When the control unit outputs the second control signal to the switch unit, the switch unit disables the communication between the BIOS and the network chip. | 06-27-2013 |
20130166897 | ELECTRONIC DEVICE SYSTEM AND ELECTRONIC DEVICE - An electronic device system includes a connection device configured to store a plurality of types of boot data and an electronic device, wherein the electronic device includes a connection unit to which the connection device is connected, a selection unit configured to select boot data to be obtained from the connection device connected to the connection unit, an obtaining unit configured to obtain the boot data selected by the selection unit from the connection device, a storage unit configured to store the boot data obtained by the obtaining unit; and a boot processing unit configured to perform processing in relation to booting of the electronic device by using the boot data stored in the storage unit. | 06-27-2013 |
20130173898 | SECURE BOOT OF A DATA BREAKOUT APPLIANCE WITH MULTIPLE SUBSYSTEMS AT THE EDGE OF A MOBILE DATA NETWORK - A secure boot is provided for a breakout system having multiple subsystems at the edge of a mobile data network. The secure boot utilizes two trusted platform modules (TPM) to secure multiple subsystems. Further described is utilizing a first TPM to boot a service processor and then utilizing a second TPM to secure boot two additional subsystems. Booting of the final subsystem is accomplished in a two step process which first loads a boot loader and verifies the boot loader, and then second loads an operating system load image and verifies the operating system code. | 07-04-2013 |
20130173899 | Method for Secure Self-Booting of an Electronic Device - The present invention relates to a method for a self-boot of an electronic device, wherein an external component is accessible through an interface of the electronic device ( | 07-04-2013 |
20130173900 | KEY TRANSMISSION METHOD AND DEVICE OF A VIRTUAL MACHINE UNDER FULL DISK ENCRYPTION DURING PRE-BOOT - The disclosure provides a key transmission method and device of a virtual machine under full disk encryption during pre-boot. The method includes: pre-booting the virtual machine, where the virtual machine is in a full disk encryption state; during the pre-boot, establishing, by the virtual machine, a transmission channel with a cloud platform, where the cloud platform is configured to provide a key; requesting, by the virtual machine, the key from the cloud platform through the transmission channel, and receiving the key sent by the cloud platform; and decrypting, by the virtual machine, an operation system by using the key, and booting the operation system. In embodiments of the present disclosure, key transmission may be implemented during a pre-boot phase of the virtual machine, so as to boot the virtual machine. | 07-04-2013 |
20130173901 | MULTI-PROCESSOR COMPUTER SYSTEMS AND METHODS - Multi-processor computer systems and methods are provided. A multi-processor computer system can include a plurality of communicatively coupled processors ( | 07-04-2013 |
20130179669 | TRUSTED NETWORK BOOTING SYSTEM AND METHOD - A system for trusted network booting of a server. The system may include a booting server that may contain a booting image and a network server that may boot with the booting image from the booting server. The network server may include a trust anchor that measures the booting image. The system may further include a network controller that controls access to a network. The network controller may verify the measurement of the booting image before allowing the network server to access the network. | 07-11-2013 |
20130179670 | BOOTING METHOD OF MULTIMEDIA DEVICE AND MULTIMEDIA DEVICE - A booting method of a multimedia device and the multimedia device are provided. The multimedia device includes a storage media, and the booting method of the multimedia device includes following steps. After the multimedia device is powered on, a boot loader is executed to initialize a plurality of primary components of the multimedia device. A snapshot information is read from the storage media, wherein the snapshot information includes a plurality of state information of an operating system (OS) and a plurality of applications of the multimedia device. The snapshot information is loaded into the multimedia device to allow the multimedia device to run the OS and the applications. Thereby, the number of booting steps of the multimedia device is reduced, and the booting time of the multimedia device is effectively shortened. | 07-11-2013 |
20130179671 | SUPER I/O MODULE AND CONTROL METHOD THEREOF - A super input/output (I/O) module for controlling a universal serial bus (USB) port of a computer system is provided. The super I/O module includes a USB host, a switch and a processor. The switch selectively couples the USB port of the computer system to the USB host or a controller of the computer system according to a switching signal. When a trigger event occurs, the processor provides the switching signal to control the switch, so as to couple the USB port of the computer system to the USB host and to transmit a basic input/output system (BIOS) code to a flash memory of the computer system via the switch and the USB port. | 07-11-2013 |
20130179672 | COMPUTER AND QUICK BOOTING METHOD THEREOF - A computer and a quick booting method thereof are disclosed. The computer includes a central processing unit (CPU), a volatile memory, a basic input/output system (BIOS) and a power module. The volatile memory is coupled to the CPU and stores operation status data when the computer is power on before the computer executes a shutdown process. the BIOS is coupled to the CPU, reads the operation status data from the volatile memory when the computer executes a booting process, and initialize the computer according to the operation status data. The power module is coupled to the volatile memory and provides power to the volatile memory when the computer finishes the shutdown process. Since the operation status data stored in the volatile memory do not disappear after the computer finishes the shutdown process, they can be used to boot up the computer quickly. | 07-11-2013 |
20130179673 | METHODS AND SYSTEMS FOR PROVIDING A MODIFIABLE MACHINE BASE IMAGE WITH A PERSONALIZED DESKTOP ENVIRONMENT IN A COMBINED COMPUTING ENVIRONMENT - A method and system for modifying, in a combined computing environment, a machine base image having a personalized desktop environment includes executing an operating system associated with a base disk; intercepting, by a filter driver, an instruction from at least one of a plurality of resources to modify a setting stored in at least one of a file system and a registry, the plurality of resources executing inside an isolation environment; storing, in a delta disk, a copy of the modified setting; restarting the operating system; replacing the setting stored in the at least one of the file system and the registry with the copy of the modified setting stored on the delta disk; and restarting at least one operating system process incorporating the modified setting. | 07-11-2013 |
20130185548 | Multiple System Images for Over-The-Air Updates - In one embodiment, a mobile device performs an over-the-air firmware update by writing the updated firmware to a inactive system image partition, and rebooting the device. The security of the OTA update is maintained through checking a plurality of security signatures in an OTA manifest, and the integrity of the data is maintained by checking a hash value of the downloaded system image. | 07-18-2013 |
20130185549 | ELECTRONIC DEVICE AND BIOS UPDATING DEVICE THEREOF - An electronic device and a basic input/output system (BIOS) updating device thereof are provided. The electronic device includes a central processing unit (CPU), a chipset, a first interface circuit and a second interface circuit. The chipset is coupled to the CPU. The first interface circuit is coupled to a first memory and a second memory. The first memory includes a first BIOS file and the second memory includes a second BIOS file. The second interface circuit is coupled to the first interface circuit and an external storage device. When the external storage device includes a third BIOS file, a target memory is selected from the first memory and second memory according to a first rule and the target memory is updated using the third BIOS file. Thus, BIOS firmware of the electronic device can be safely updated. | 07-18-2013 |
20130185550 | METHOD AND SYSTEM FOR NAND FLASH SUPPORT IN AN AUTONOMOUSLY LOADED SECURE REPROGRAMMABLE SYSTEM - A system and method that enables secure system boot up with a restricted central processing unit (CPU). The system includes a memory, a segmenting device, and a security sub-system. The memory is a NAND flash memory with a block structure that comprises a guaranteed block and non-guaranteed blocks. The guaranteed block is guaranteed to be useable. A boot code is segmented into boot code segments and the boot code segments are stored separately in the guaranteed and non-guaranteed blocks. The security sub-system is configured to locate the boot code segments stored in the non-guaranteed blocks and validate them independently based on data in the guaranteed block. The security sub-system is further configured to assemble the boot code segments into the boot code and execute the boot code. | 07-18-2013 |
20130191622 | METHOD FOR BOOTING COMPUTER AND COMPUTER - Provided is a method for temporarily skipping a secure boot function. A computer is configured so that a secure boot function is set as enabled by default. Depression of a power button of the computer in a power-off state generates a startup signal. At the time of startup from S4/S5 state, a switch is turned ON and PP bit indicating physical presence is set at a register. Depression of a specific key on a keyboard causes DE bit to be set at a register. When PP bit and DE bit are found, UEFI firmware stored in a firmware ROM temporarily skips integrity validation of a boot program only for boot this time. | 07-25-2013 |
20130191623 | INFORMATION PROCESSING APPARATUS, CONTROL METHOD THEREFOR, AND STORAGE MEDIUM - An information processing apparatus capable of booting in a normal boot mode or a special boot mode includes an input unit configured to input a request for booting the information processing apparatus in the special boot mode in booting the information processing apparatus, and a control unit configured to control the information processing apparatus to be booted in the normal boot mode if the input unit has not input the request, and to control the information processing apparatus to be booted in the special boot mode if the input unit has input the request, wherein, in a case where the information processing apparatus is booted with a predetermined condition satisfied, the control unit controls the information processing apparatus to be booted in the normal boot mode even if the input unit has input the request. | 07-25-2013 |
20130191624 | FIRMWARE PROTECTION AND VALIDATION - A system for firmware protection and validation includes: a memory device, including firmware; a chipset, a microprocessor; a secure logic device in electrical communication with the chipset and the memory device; and a power on reset circuit in communication with the secure logic device, wherein, when the secure logic device receives a reset signal from the power on reset circuit, the secure logic device applies a hold signal to the chipset, when the hold signal is applied to the chipset, the power on reset circuit de-asserts the reset signal, when the reset signal is de-asserted, the secure logic device validates the content of the firmware in the memory device, and further wherein, when the content of the firmware is validated by the secure logic device, the secure logic device de-asserts the hold signal applied to the chipset. | 07-25-2013 |
20130198501 | ELECTRONIC DEVICE AND SPEED-UP BOOTING MODULE AND METHOD THEREOF - A speed-up booting module of an electronic device includes a first heat pipe with two ends connected to a first component and a second component respectively, and the first heat pipe including a first working fluid, wherein when a booting process is performed at a first environmental temperature, the heat from the first component in operation is transferred to the second component so that a temperature of the second component reaches an operating temperature; and a second heat pipe with two ends connected to the first component and a third component respectively, and the second heat pipe including a second working fluid, a boiling point of the second working fluid is higher than the boiling point of the first working fluid; wherein at a second environmental temperature, a temperature of the second component reaches the boiling point, the heat from the first component is transferred to the second component. | 08-01-2013 |
20130198502 | Method For Reducing Platform Boot Times By Providing Lazy Input/Output Abstractions - Methods, systems and computer program products are disclosed for enhanced system boot processing that is faster to launch an operating system, as certain devices such as user input hardware devices may not be initialized unless it is determined that a user-interruption to the boot process is likely. That is, although an interface for the devices is exposed, no initialization occurs unless a call to the interface occurs. Other embodiments are described and claimed. | 08-01-2013 |
20130198503 | DISPLAY APPARATUS, CONTROL METHOD THEREOF, UPGRADE APPARATUS, AND DISPLAY SYSTEM - A display apparatus including: a display device; an image processor processing an image signal received from an image source according to a preset image processing process to display an image on the display device; a connector to which an upgrade apparatus upgrades the image processing process is connected and to which a server is connected to communicate with; and a controller comparing a first pairing key with a second pairing key stored in the server and selectively allowing or blocking a booting operation according to a comparison result, the first pairing key being generated based on a pre-stored first identification of the display apparatus and a second identification of the upgrade apparatus obtained from the upgrade apparatus when the display apparatus starts booting up. | 08-01-2013 |
20130198504 | METHODS OF CONFIGURING A BIOS IN A COMPUTER SYSTEM AND COMPUTER PROGRAM PRODUCTS - A method of configuring a basic input output system (BIOS) in a computer system including creating first configuration data in the BIOS to configure the BIOS, transferring the first configuration data from the BIOS to a management unit of the computer system, and storing the first configuration data in the management unit, wherein the steps are carried out at each startup of the computer system. | 08-01-2013 |
20130198505 | REMOTE MANAGEMENT OF UEFI BIOS SETTINGS AND CONFIGURATION - In an information handling system (IHS), remote management of basic input/output system (BIOS) settings and configuration includes maintaining a BIOS setting/configuration database, providing an application to communicate a BIOS setting/configuration from the database to a BIOS system, determining whether the BIOS setting/configuration communicated from the database to the BIOS system is a special BIOS configuration capsule packet, and validating BIOS setting/configuration. | 08-01-2013 |
20130205128 | Self-Updating Functionality in a Distributed System - Described is a technology by which a distributed system of computer nodes that provides services is self-updated via a component of the distributed system. Such a self-updating run applies one or more updates to each of the member computer nodes in the distributed system while maintaining the services provided by the distributed system. The updating run may include moving workloads from each computer node to be updated, updating that node, and reinstating workloads after updating. Performing the updating run may include moving update-related responsibility, which may be a workload, from one computer node to another computer node. | 08-08-2013 |
20130205129 | BASEBOARD MANAGEMENT CONTROLLER SYSTEM - A baseboard management controller (BMC) system for an electronic device includes a BMC, a multiplex switch, a manual operation element, a main storage, and a backup storage. Manual operations applied to the manual operation element are capable of selecting electrical connection statuses of the multiplex switch. Both the main storage and the backup storage store boot program of the electronic device. The BMC is selectively electrically connected to either the main storage or the backup storage via the multiplex switch and the manual operation element, and selectively calls the boot program stored in either the main storage or the backup storage to actuate the electronic device. | 08-08-2013 |
20130205130 | OPERATING SPEED OF A COMPONENT - Booting a computing machine including increasing an operating speed of at least one component of the computing machine during a boot process in response to the computing machine including a sufficient amount of thermal credits and decreasing the operating speed of at least one of the components in response to the computing machine completing the boot process | 08-08-2013 |
20130212367 | Security Policy for Device Data - Techniques for providing security policy for device data are described. In implementations, data on a device is stored in an encrypted form. To protect the encrypted data from being decrypted by an unauthorized entity, techniques enable a decryption key to be occluded if an attempt to gain unauthorized access to device data is detected. In implementations, a decryption key can be occluded in a variety of ways, such as by deleting the decryption key, overwriting the encryption key in memory, encrypting the encryption key, and so on. Embodiments enable an occluded decryption key to be recovered via a recovery experience. For example, a recovery experience can include an authentication procedure that requests a recovery password. If a correct recovery password is provided, the occluded decryption key can be provided. | 08-15-2013 |
20130212368 | DATA PROTECTING METHOD, MEMORY CONTROLLER AND MEMORY STORAGE DEVICE - A data protecting method for a rewritable non-volatile memory module having a first storage area and a second storage area and a memory controller and a memory storage device using the same are provided. The method includes providing default configuration information in response to a boot command from a host system, wherein the host system cannot recognize the second storage area according to the default configuration information. The method also includes requesting the host system to re-boot when a user identification code and a user password receiving from the host system pass an authentication procedure, and providing first configuration information to the host system after re-booting the host system. The host system can recognize the second storage area according to the first configuration information. Accordingly, the method can effectively protect data stored in the rewritable non-volatile memory module. | 08-15-2013 |
20130212369 | ATTESTING USE OF AN INTERACTIVE COMPONENT DURING A BOOT PROCESS - A method for attesting use of an interactive component during a boot process, comprising the steps of: reading, in response to determining use of the interactive component, associated interactive input; determining whether the input should be trusted; and in response to determining that the input should be trusted, processing the input to create a trusted cryptographic value, further comprising: matching, in response to a subsequent interactive input being read, the subsequent interactive input with one or more of the trusted cryptographic values in order to determine whether the subsequent interactive input is trusted. | 08-15-2013 |
20130212370 | METHOD AND APPARATUS FOR ESTABLISHING SAFE PROCESSOR OPERATING POINTS - A system and method is provided for establishing safe processor operating points. Some embodiments may include a tamper resistant storage element that stores information regarding one or more operating points of an adjustable processor operating parameter. Some embodiments may further include an element to determine what the current processor operating point is of the operating parameter, and an element to compare the current operating point of the operating parameter with the stored information. | 08-15-2013 |
20130219159 | SINGLE-WIRE BOOTLOADER FOR TARGET DEVICE WITH SELF-PROGRAMMING CAPABILITY - A single-wire bootloader software architecture is disclosed that interfaces with any host device that has a serial port to program memory of a target device using only a single general-purpose I/O pin. The single-wire bootloader does not require any chip hardware resource modules. Instead, the single-wire bootloader implements a single-wire UART in software that monitors a single general-purpose I/O pin for commands from the host device. | 08-22-2013 |
20130219160 | SYSTEM AND METHOD FOR BOOTING UP A COMPUTER BASED ON DATA CAPTURED IN A NON-VOLATILE SEMICONDUCTOR MEMORY DURING A LEARN MODE - A system includes a timer and a control module. The control module: in response to a first request for first data, determines whether the first data is stored in a non-volatile semiconductor memory (NVSM); in response to the first data not being stored in the NVSM, (i) loads the first data from a hard disk drive (HDD) and boots up a computer a first time based on the first data, and (ii) while operating in a learn mode and while loading the first data from the HDD, captures a portion of the first data in the NVSM; in response to the timer indicating an end of a period during which the computer is booted up the first time, ceases the capturing of the first data; and based on the portion of the first data captured in the NVSM during the learn mode, boots up the computer a second time. | 08-22-2013 |
20130219161 | Direct Migration of Software Images with Streaming Technique - A mechanism is provided for migrating a software image installed on a source data-processing entity to a target data-processing entity. The target data-processing entity is booted from a preliminary bootstrap program. The software image is mounted as a remote mass memory on the target data-processing entity. A primary bootstrap program of the software image is copied onto a local mass memory of the target data-processing entity. The target data-processing entity is re-booted from the primary bootstrap program thereby loading a streaming function, and serving each request of accessing a memory block on the target data-processing entity by the streaming function. In response to the memory block missing from the local mass storage, the streaming function downloads the memory block from the software image and stores the memory block into the local mass memory. Otherwise, the streaming function retrieves the memory block from the local mass memory otherwise. | 08-22-2013 |
20130227260 | DYNAMIC OS LOAD DEVICE RESOURCE SELECTION - A method for booting is provided. A devices manager disables resources of one or more bootable devices of a list of bootable devices having resource conflicts with a selected one of the list of bootable devices. The devices manager attempts to boot the selected one of the list of bootable devices. If the selected one of the list of bootable devices fails to boot, then the devices manager selects a next bootable device of the list of bootable devices for booting and repeats disabling resources and attempting to boot the selected next bootable device until one of the list of bootable devices boots or all bootable devices of the list of bootable devices fail to boot. | 08-29-2013 |
20130227261 | System and Method For Thermally Aware Device Booting - Various embodiments of methods and systems for thermally aware booting in a portable computing device (“PCD”) are disclosed. Because bringing high power consumption processing components online when a PCD is booted under less than ideal thermal conditions can be detrimental to the health of the PCD, embodiments leverage a low power processing component early in a boot sequence to authorize, delay or modify the boot sequence based on measured thermal indicators. One exemplary method is essentially a “go/no go” method that delays or authorizes completion of a boot sequence based on the thermal indicator measurements. Another exemplary method modifies a boot sequence of a PCD based on a thermal boot policy associated with a thermal boot state. A thermal boot policy may include allowing the boot sequence to complete by modifying the power frequency to which one or more high power consumption components will be booted. | 08-29-2013 |
20130227262 | AUTHENTICATION DEVICE AND AUTHENTICATION METHOD - An authentication OS is booted from the BIOS at the power up of an information processing apparatus then executes user authentication for the information processing apparatus, by performing an authentication process using devices initialized in its own mode. When the authentication is successful, the authentication OS writes a decryption key for an operation OS in a shared memory area and reboots the BIOS, while keeping the data in the shared memory area. The BIOS retrieves the operation OS decrypted with the decryption key for the operation OS into an OS operation area, thereafter the operation OS runs in a main memory. | 08-29-2013 |
20130227263 | APPLICATION PROCESSING APPARATUS AND METHOD FOR MOBILE TERMINAL - An apparatus and a method for processing an application in a mobile terminal are provided. The method includes loading, by a bootloader upon system booting, a kernel, determining whether the kernel is modified, creating, when the kernel is modified, kernel verification information indicating a custom kernel, encrypting the kernel verification information, and sending the encrypted kernel verification information, activating, by a kernel handler, the kernel, and receiving the kernel verification information from the bootloader, and forwarding the kernel verification information, decrypting, by a rooting detector, the kernel verification information into kernel status information and delivering the kernel status information when a specified Application Programming Interface (API) is invoked, and invoking, by an application handler, the API when an application is executed and controlling an execution of the application when the kernel status information indicating the custom kernel is received. | 08-29-2013 |
20130227264 | INTEGRITY PROTECTION METHOD AND APPARATUS FOR MOBILE TERMINAL - A method and apparatus for protecting the integrity of a mobile terminal are provided. The mobile terminal includes a secure world for preventing unauthorized access to resources, and a normal world other than the secure world. The integrity protection method for the mobile terminal includes sensing a power-on of the mobile terminal, verifying, by a trusted entity in the normal world, the integrity of a first subsequent entity, and sending, when an integrity breach is detected in the first subsequent entity, by the trusted entity, a modification indication signal to the secure world. | 08-29-2013 |
20130227265 | MEDIA DATA PLAYBACK DEVICE AND REBOOT METHOD THEREOF - A media data playback device comprises first and second nonvolatile memories. The first nonvolatile memory stores a boot loader and a kernel of an operating system in a compressed format. The second nonvolatile memory serves as a main memory of the device. A processor executes the boot loader to load and decompress the kernel from the first nonvolatile memory to the second nonvolatile memory in response to a boot command. When receiving a shutdown command, the processor determines whether to perform a portion of bootstrapping processes of the device in response to the shutdown command before actually shutdown the device. | 08-29-2013 |
20130227266 | PROCESSOR BOOT SECURITY DEVICE AND METHODS THEREOF - A method of securing network authentication information at a data processing device includes determining a boot source from which to boot the device and comparing the boot source to an expected source. If the boot source is not the expected source, access to the network authentication information is inhibited, such as by disabling access to the portion of memory that stores the authentication information. Further, if the boot source is the expected source, boot code authentication information is retrieved from memory and verified during the boot sequence. If the device authentication information is not authenticated, access to the network authentication information is inhibited. Accordingly, access to the network authentication information is allowed only if the data processing device is booted from an expected source, and only if the boot code is authenticated, thereby reducing the likelihood of unauthorized access to the network authentication information. | 08-29-2013 |
20130227267 | INFORMATION PROCESSING APPARATUS, METHOD, AND COMPUTER-READABLE STORAGE MEDIUM THAT ENCRYPTS AND DECRYPTS DATA USING A VALUE CALCULATED FROM OPERATING-STATE DATA - An information processing apparatus includes a main memory unit storing while on-power; an auxiliary storage unit functionable even off-power; a control unit performing hibernation of generating operating-state data indicating a state when the power is lost, storing the data in the auxiliary storage unit, and, when restored, reading the data from the auxiliary storage unit; and a security chip that including a configuration register, encrypts data, and storing the data in the auxiliary storage unit. The control unit includes: a first registration unit performing, when the data is generated, calculation based thereon to obtain a calculated value; a second registration unit performing, when the data is read from the auxiliary storage unit at the hibernation, calculation based on the data to obtain a calculated value to write it into the configuration register; and a verification unit performing verification at boot-up from the hibernation based on the value written. | 08-29-2013 |
20130232325 | ELECTRONIC DEVICE TO RESTORE MBR, METHOD THEREOF, AND COMPUTER-READABLE MEDIUM - An electronic device includes a storage unit to store a master boot record (MBR) and an operating system, a control unit to boot the electronic device using the stored MBR and operating system, to generate and store backup data of the MBR in the storage unit when the electronic device is booted, a validity determination unit to determine validity of the MBR when a predetermined event has occurred, and a restoration unit to restore the MBR using the backup data stored in the storage unit if the MBR is not valid. | 09-05-2013 |
20130232326 | Electronic Device Booting Method and Electronic Device Applying the Same - An electronic device booting method includes following steps: booting the electronic device when a power button of the electronic device is triggered; determining if a preset button of the electronic device is triggered; initializing at least one specific hardware element of the electronic device when the preset button is triggered; and executing an operation system (OS) before the specific hardware element is initiated when the preset button is not triggered. An electronic device is also disclosed. | 09-05-2013 |
20130232327 | Operating System Context Switching - A technique for quickly switching between a first operating system (OS) and a second OS involves deactivating the first OS and booting the second OS from memory. The technique can include inserting a context switching layer between the first OS and a hardware layer to facilitate context switching. It may be desirable to allocate memory for the second OS and preserve state of the first OS before deactivating the first OS and booting the second OS from memory. | 09-05-2013 |
20130232328 | METHOD TO SAFELY REPROGRAM AN FPGA - One FPGA provides a multiplexer that allows a host CPU to directly access a second FPGA's memory for upgrading. The second FPGA acts as a buffer and does not participate directly in the upgrade. This permits safer loading and minimizes the impact of a power interruption during upgrading. The architecture can be expanded to any number of FPGA's and any type of software/firmware loading, allowing system programming with a very low risk of catastrophic failure. | 09-05-2013 |
20130232329 | Encrypting And Decrypting A Virtual Disc - A computer-readable storage medium containing machine executable instructions that when executed by a processor cause the processor to encrypt a virtual disc; wherein the virtual disc comprises a virtual disc image; and wherein execution of the machine executable instructions cause the processor to: receive the virtual disc; increase the size of the virtual disc; write a decryption-master-boot-record and a decryption program to the virtual disc; encrypt at least a portion of the virtual disc image, wherein the decryption program comprises decryption-machine-executable-instructions for decrypting the at least partially encrypted virtual disc image in accordance with a cryptographic key. | 09-05-2013 |
20130232330 | METHOD FOR ENABLING CALIBRATION DURING START-UP OF A MICRO CONTROLLER UNIT AND INTEGRATED CIRCUIT THEREFOR - A method for enabling calibration during start-up of a micro controller unit device is provided. The method comprises, within the MCU device, reading overlay initialisation data from at least one memory element within an external support device operably coupled to the MCU device, and configuring memory mapping functionality of the MCU device to overlay data stored within at least a part of device memory of the MCU device with calibration data stored within the at least one memory element of the external support device in accordance with the overlay initialisation data. | 09-05-2013 |
20130238884 | COMPUTER-READABLE RECORDING MEDIUM STORING MEMORY DUMP PROGRAM, INFORMATION PROCESSING APPARATUS, AND MEMORY DUMP METHOD - An information processing apparatus includes: a boot processing unit configured to perform a boot process performed in a prior stage that includes processes up to activation of an operating system program by using a first storage area of a storage apparatus; a storage area allocating unit configured to allocate a second storage area to the storage apparatus before the boot process is performed; and an output unit configured to output first storage area information, which is stored in the first storage area, to the second storage area when an abnormality occurs in the boot process. | 09-12-2013 |
20130238885 | Network Switch, Systems, and Servers Implementing Boot Image Delivery - Methods, systems, and computer programs are presented for providing a program to a server. One method includes an operation for receiving a request by a switching device from a first server, the request being for a boot image for booting the first server. In addition, the method includes operations for determining if the boot image is available from non-volatile storage in the switching device, and for forwarding the request to a second server when the boot image is absent from the non-volatile storage. Further, the method includes an operation for sending the boot image to the first server from the switching device when the boot image is available from the non-volatile storage. | 09-12-2013 |
20130238886 | METHODS FOR FIRMWARE SIGNATURE - A method for installing embedded firmware is provided. The method includes generating one or more firmware file instances and generating one or more digital certificate instances that are separate instances from the firmware file instances. The method includes associating the one or more digital certificate instances with the one or more firmware file instances to facilitate updating signature-unaware modules with signature-aware firmware or to facilitate updating signature-aware modules with signature-unaware firmware. | 09-12-2013 |
20130238887 | METHOD AND DEVICE FOR DISTINGUISHING BETWEEN COLD BOOT AND WARM BOOT - It is provided a method for distinguishing between cold boot and warm boot of a device, wherein the device comprises a volatile memory containing a flag used for indicating boot type, the method comprises the step of determining boot type by reading the flag; wherein, the method further comprises upon detection of a message indicating occurrence of power outage, setting data of the volatile memory in such a way that make the device fail to determine the boot type as warm boot. | 09-12-2013 |
20130246779 | Calling Firmware Runtime Services of Basic Input Output System - Approaches for calling firmware runtime services of a basic input/output system. A special globally unique identifier and a name are sent to PURE virtual variable stores by an operating system. The PURE virtual variable stores identify the special globally unique identifier and the name, for example, by checking in the PURE virtual variable stores to ascertain if the special identifier and the name correspond to a firmware runtime service of the basic input/output system. A corresponding firmware runtime service of the basic input/output system is called. The firmware runtime service of the basic input output system then executes. | 09-19-2013 |
20130254520 | METHOD AND APPARATUS FOR PROVIDING DATA MIGRATION SERVICES - A method and apparatus for providing data migration services for a device such as a computer is disclosed. The method for data migration comprises collecting a plurality of parameters from a user device, storing the plurality of parameters as migration data in a database, and imaging a new device with the migration data. | 09-26-2013 |
20130254521 | Simulated Network Boot Environment for Bootstrap Redirection - Mechanisms are provided, in a bare metal computing device, for executing a network based boot operation for booting the bare metal computing device. In response to powering-on the bare metal computing device, firmware is executed that executes a stub from a virtual media image accessible by the bare metal computing device. The configuration information of the bare metal computing device indicates that the bare metal computing device is being booted from a local media. The stub configures the firmware environment and a network boot program to utilize a network connection by modifying the configuration information of the bare metal computing device to indicate that the bare metal computing device is being booted from a network device. A control program is obtained from a remotely located boot server using the network boot program and is executed to complete the booting of the bare metal computing device. | 09-26-2013 |
20130254522 | METHOD AND APPARATUS TO SUPPORT SEPARATE OPERATING SYSTEMS IN PARTITIONS OF A PROCESSING SYSTEM - A processing system with multiple processing units may support separate operating systems (OSs) in separate partitions. During an initialization process, a preboot manager in the processing system may copy software to a sequestered area of memory in the processing system. The preboot manager may also configure the processing system to hide the sequestered area of memory from a first partition of the processing system. Also, the preboot manager may use a first processing unit in the processing system to boot an OS on the first partition, and the preboot manager may transmit a boot trigger from the first processing unit to a second processing unit in the processing system. The boot trigger may cause the second processing unit to use the software in the sequestered area of memory to boot a second partition of the processing system. Other embodiments are described and claimed. | 09-26-2013 |
20130254523 | System and Method for Supporting Full Volume Encryption Devices in a Client Hosted Virtualization System - A client hosted virtualization system includes a full volume encryption (FVE) storage device, a processor, and non-volatile memory with BIOS code and virtualization manager code. The virtualization manager initializes the client hosted virtualization system, authenticates a virtual machine image, launches the virtual machine based on the image, receives a transaction from the virtual machine targeted to the FVE storage device, sends the transaction to the FVE storage device, receives a response from the FVE storage device, and sends the first response to the first virtual machine. The client hosted virtualization system is configurable to execute the BIOS or the virtualization manager. | 09-26-2013 |
20130262847 | SWITCHING CIRCUIT FOR BASIC INPUT OUTPUT SYSTEM - A switching circuit for a basic input/output system (BIOS) chip includes a front panel connector, a first connector, a second connector, and a BIOS chip. The first connector is selectively plugged into the front panel connector, a first pin of the first connector is coupled to a first pin of the second connector, and is grounded through a first resistor. The BIOS chip coupled to a first pin of the front panel connector, and coupled to a first power terminal through a second resistor. The BIOS chip loads different system configurations based on whether the first connector is plugged into the front panel connector or not plugged into the front panel connector. | 10-03-2013 |
20130262848 | ELECTRONIC APPARATUS AND BOOTING METHOD - An electronic apparatus and a booting method are provided. The electronic apparatus comprises a processing unit, a firmware unit and a memory. In the booting method, a boot code is read from the firmware unit by the processing unit for executing a booting initialization procedure. Whether a new version firmware code exists in a first block of the memory is determined by the boot code. If the new version firmware code exists in the first block, the new version firmware code is loaded into a second block of the memory by the boot code, and the new version firmware code is read from the second block so as to execute a booting procedure for loading an operating system. | 10-03-2013 |
20130268744 | METHOD FOR DETECTING HARDWARE - A method for detecting hardware suitable for an electronic apparatus is provided. In the method, a booting signal is received. A graphical interface is started. The graphical interface includes a mainboard layout. And each connector is detected for obtaining peripheral hardware configured in the electronic apparatus. A figure corresponding to the peripheral hardware configured in the electronic apparatus and a location information of the peripheral hardware on a mainboard are obtained from a database. The figure is placed on a corresponding connector location of the mainboard layout. | 10-10-2013 |
20130268745 | CONTROL METHOD OF COMPUTER, COMPUTER AND COMPUTER SYSTEM - A computer, comprising: a processor; a memory; a communication device in which an identifier is set; and a configuration management module for managing hardware configurations, wherein the configuration management module is configured to: receive an identifier of the communication device; and compare the received identifier with the identifier set in the communication device and, when the received identifier fails to match the identifier set in the communication device, rewrite the identifier set in the communication device with the received identifier. | 10-10-2013 |
20130268746 | SYSTEM-ON-CHIP AND BOOTING METHOD THEREOF - A system-on-chip (SoC) and a booting method thereof are disclosed. The SoC is coupled to an external memory and includes a read only memory (ROM) and a processor. The ROM stores a first firmware image. The processor is coupled to the ROM. The processor reads the first firmware image from the ROM and verifies the state of the first firmware image. If the first firmware image is damaged, the processor reads a second firmware image from the external memory and verifies whether the second firmware image is legal. If the verification of the second firmware image succeeds, the processor reads and executes the second firmware image to perform a booting process. | 10-10-2013 |
20130268747 | RESET OF MULTI-CORE PROCESSING SYSTEM - An initialization core may include reset logic that may detect a global reset signal (GRS). The initialization core may generate one or more packets that enable communication with the cores. The initialization core may send reset packets to each of the cores that instruct the cores to perform a reset. In some embodiments, the reset command may power-off the cores. The initialization core may then transmit unreset packets to each of the cores that instruct the cores to perform an unreset and power-on the cores. In some embodiments, the cores may resume operation automatically without receipt of the unreset packet. The transmission of the packets may be staggered (staged) to control the power-on of the processor and enable the processor unit to more slowly increase its power state. | 10-10-2013 |
20130275738 | NOTEBOOK COMPUTER - A notebook computer is disclosed. The notebook computer comprises a display, a power switch, a proximity sensor, a memory, and a control unit. The proximity sensor and the power switch are disposed adjacent to each other for sensing an object approaching the power switch to output a sensing signal. The memory stores a basic input output system (BIOS). The control unit performs at least part of a power on self test (POST) according to the sensing signal and the BIOS before the display shows an image, and controls the display to display the image after the power switch is triggered. | 10-17-2013 |
20130275739 | ELECTRONIC APPARATUS, METHOD OF CONTROLLING THE SAME, AND COMPUTER-READABLE RECORDING MEDIUM - An electronic apparatus includes a non-volatile memory, a volatile memory to store an operation of the operating system, a user interface unit to receive an end command to terminate an operation of the operating system, and a control unit to change an operation mode of the operating system to a log off mode and to store operating system data of the log off mode stored in the volatile memory in the non-volatile memory and to cut off power supplied to the electronic apparatus, if the end command is input. | 10-17-2013 |
20130275740 | METHOD AND SYSTEM FOR BUILDING A LOW POWER COMPUTER SYSTEM - Various embodiments disclosed herein relate to an efficient computer server system comprising an efficient power supply unit utilizing a plurality of power-rails to supply electric power to the system components, a special-purpose processor configured to operate as an efficient general purpose server processor while maintaining high performance, and a platform manager configured to control the power supplied to the system components to minimize the system's overall power consumption. Some disclosed embodiments relate to a method of reducing power consumption in information handling server systems comprising configuring a special-purpose processor to be function as a general purpose server processor, selecting a set of power efficient system components based on performance and power efficiency, utilizing an efficient power supply unit and a platform manager to control the power supplied by the power supply unit, and adjusting the processor's frequency to achieve an optimal performance/power-consumption ratio. | 10-17-2013 |
20130283027 | Automatic Update of Persistent Boot Parameter Storage - A method for automatically updating persistent boot parameter storage in a computer system includes storing updated boot parameters for an operating system in the computer system in a hardware boot parameter storage area in a memory of the computer system; performing a reboot of the operating system with the updated boot parameters; determining whether the reboot of the operating system is successful; and, in the event the reboot of the operating system is successful, automatically propagating the updated boot parameters from the hardware boot parameter storage area to a persistent boot parameter storage area. | 10-24-2013 |
20130283028 | ADAPTER IDENTIFICATION SYSTEM AND METHOD FOR COMPUTER - An adapter identification system for a computer includes an embedded controller (EC) configured to simulate a 1-Wire protocol controller, an adapter including a control unit and a storage unit, and a basic input output system (BIOS) chip. The adapter is assigned a first identity (ID), which is stored in the storage unit, and the control unit is used to obtain the first ID. The BIOS chip is configured to obtain the first ID through the EC, and determine whether the first ID matches one of a number of second IDs stored in the BIOS chip. The BIOS chip boots the operation system of the computer in response to the first ID matching one of the second IDs, and the BIOS chip outputs a rejection notice to a display of the computer in response to the first ID not matching one of the second IDs. | 10-24-2013 |
20130290694 | SYSTEM AND METHOD FOR SECURE PROVISIONING OF VIRTUALIZED IMAGES IN A NETWORK ENVIRONMENT - An example method includes setting up a secure channel between a blade and a provisioning server in a network environment, downloading an image of a virtual machine monitor (VMM) from the provisioning server to the blade through the secure channel, and booting the image to instantiate the VMM on the blade. The blade and the provisioning server are mutually authenticated and authorized with a plurality of parameters. Booting the image may include loading the image on a memory element of the blade and transferring control to the image. In some embodiments, booting the image includes modifying a root file system of the image by adding the daemon such that an agent is included in the root file system. The agent can download another image corresponding to an operating system of a virtual machine. | 10-31-2013 |
20130297921 | CLOUD VIRTUAL MACHINE PROVISIONING USING VIRTUAL STORAGE - The provisioning of a virtual machine when booted from virtual storage. During virtual machine boot from an image, the virtual machine detects storage media. The virtual machine acquires a provisioning agent and provisioning data from the detected storage media. The virtual machine uses the provisioning data to provision itself, and executes the provisioning agent. The provisioning agent may monitor the progress of the provisioning and/or report a status of the provisioning. The virtual machine may operate in a cloud computing environment, the status of the provisioning agent being returned to the user through the cloud environment. The user need not generate the provisioning data in a format readable by the virtual machine. Instead, perhaps some naturally entered user input is used to automatically generate the properly formatted provisioning data using perhaps a service in the cloud. | 11-07-2013 |
20130297922 | SYSTEM AND METHOD FOR EFFICIENTLY BUILDING VIRTUAL APPLIANCES IN A HOSTED ENVIRONMENT - A system and method for efficiently building virtual appliances in a hosted environment is provided. In particular, a plurality of image archives may be stored in a build database, with each image archive including a file system having a directory structure and a plurality of files installed within the directory structure. In response to a build request containing an image description, a build engine may create a file system layout defining a directory structure for an image. The build engine may then copy the file system from one of the image archives to the file system layout of the image, wherein the copied file system may provide a subset of the file system for the image. The build engine may then build the image, which may include a file system having various files installed within various directories in accordance with the directory structure defined for the image. | 11-07-2013 |
20130297923 | METHOD OF STARTING PERFORMED BY COMPUTER AND COMPUTER APPARATUS - A method of starting performed by a computer is provided. The computer judges whether a start-up mode of the computer is a first mode or a second mode in accordance with a previous operating status of the computer when the computer is turned on. The computer performs first initializing one device or a plurality of devices included in the computer when the start-up mode is the first mode, and second initializing the one device or all or some of the plurality of devices in such a way that the second initializing is completed in a shorter amount of time than the time for the first initializing when the start-up mode is the second mode. | 11-07-2013 |
20130297924 | METHOD OF RUNNING MULTIPLE OPERATING SYSTEMS ON AN X86-BASED COMPUTER - Two or more distinct operating systems (OSs) are loaded simultaneously and run on an x86 computer system. Each OS is booted serially and in such a way that the OS resides in a separate memory footprint than the other OSs by partitioning the memory map. The partition of the memory map includes a low memory region, dedicated memory partitions for storing each OS, and dedicated regions for storing shadows of the low memory region and the ACPI for each OS. Switching between the two or more resident OSs is performed by sleeping the current OS and then resuming the desired OS using the shadow previously stored for the desired OS. None of the resident OSs require any modification in order to run in this fashion. | 11-07-2013 |
20130297925 | AUTHENTICATION SYSTEM FOR GAMING MACHINES AND RELATED METHODS - Various embodiments disclosed herein are directed to gaming devices having a secured basic input/output system (BIOS) and methods for determining the validity of the gaming device's BIOS. According to one embodiment, the gaming device includes a secured module for authenticating the BIOS of the gaming device. During the boot-up process, the secured module issues a challenge to the BIOS. The BIOS generates a response to the challenge, and the secured module determines whether the BIOS response matches the calculated response of the secured module. If the BIOS response matches the secured module response, the gaming device continues the boot process. Otherwise, the boot process is halted by the gaming device. | 11-07-2013 |
20130305025 | METHOD FOR DYNAMIC LOADING OF OPERATING SYSTEMS ON BOOTABLE DEVICES - A method for booting is provided. A devices manager of a host operating system residing on a host machine (or a boot loader) disables resources of one or more bootable devices having resource conflicts. The device manager enables resources required by one of the one or more bootable device. The device manager initiates booting of the one of the one or more bootable device. If the one of the one or more bootable device fails to boot, the failed bootable device is identified as unavailable for booting. | 11-14-2013 |
20130305026 | SYSTEM AND METHOD FOR INPUT TOOL INVOCATION AND PROXY DEVICE - A system and a method for input tool invocation and a proxy device enable an installable operating system to perform input operation by invoking the input tool of a local operating system, such as a soft keyboard of the local operating system, an input method of the local operating system, or a soft keyboard and an input method of the local operating system. Even an operating system not installed with input tools can perform input operation by invoking an input tool of a local operating system, thereby avoiding repeated installations of input tools for different operating systems, and resolving the issue of large resource usage caused by repetitive installations of input tools. | 11-14-2013 |
20130305027 | MULTI-BIOS CIRCUIT AND SWITCHING METHOD BETWEEN MULTIPLE BIOS CHIPS - The present invention relates to a multi-BIOS circuit and a BIOS switching method accomplished through the circuit. The multi-BIOS circuit comprises at least two BIOS chips, a SPI Select chip is disposed between the BIOS chips and a Southbridge chip, the BIOS chips are connected to the SPI Select chip pins, and the SPI Select chip is connected to the Southbridge chip pins. The present invention can significantly enhance the safety of computers, and increases the stability as well as the convenience in use and operation. | 11-14-2013 |
20130305028 | METHOD AND APPARATUS FOR AUTHORIZING HOST TO ACCESS PORTABLE STORAGE DEVICE - A method and apparatus for authorizing a host to access a portable storage device and a method and apparatus of providing information for authorizing a host to access a portable storage device. The method includes: verifying integrity of host software requesting to transmit data; determining whether the host is authorized to access the portable storage device; and determining whether the host software is authorized to access the portable storage device. Accordingly, user information may be stored on the portable storage device and moved with security. | 11-14-2013 |
20130305029 | METHOD FOR AUTOMATIC START UP OF A COMMUNICATION TERMINAL CONFIGURED FOR VOICE COMMUNICATION ON A COMMUNICATION TERMINAL CONFIGURED FOR TEXT COMMUNICATION - In the case of a method or an arrangement for the automatic start up of a first communication terminal (EG A, EG B) configured for voice communication on at least one second communication terminal (CL A, CL B) configured for text communication, the voice communication between communication terminals is conveyed via at least one voice communication server (SCS) and the text communication between communication terminals is conveyed via at least one text communication server (TCS). The at least one voice communication server (SCS) and the at least one text communication server (TCS) exchange information via at least one conversion device (GW). The start up of at least one first communication terminal (CL A, CL B) is effected via the at least one text communication server (TCS), the at least one conversion device (GW) and the at least one voice communication server (SCS) to at least one second voice communication terminal (EG A, EG B). | 11-14-2013 |
20130311762 | PROVIDING USER ACCESS TO SPECIFIC PROGRAMS AND DOCUMENTS BEFORE THE BOOTING PROCESS IS COMPLETED - A method, system and computer program product for providing a user access to specific programs and documents before a booting process is completed. A quick start list is generated containing a list of programs and documents that are to be provided priority in initialization during the booting process. A post-quick start list is generated that includes programs that are to be started after the initialization of the programs and documents listed in the quick start list. The programs and documents listed in the quick start list are initialized as soon as feasibly possible in light of the requirements of the booting process. Upon initializing these programs and documents, such programs and documents may be displayed as icons on the user's computer screen. As a result, the user has access to such programs and documents more quickly without having to wait for the booting process to be completed. | 11-21-2013 |
20130311763 | CUSTOMIZING OPERATING SYSTEMS - An automation manager configured to manage a plurality of sessions of operating systems implemented in a hypervisor. The automation manager includes a processor and a non-transitory computer-readable storage medium storing computer-readable instructions when executed by the processor cause the automation manager to perform: generating a compact disk image containing customization data; instructing the hypervisor to mount the compact disk image to an operating system created from an operating system template; and instructing the hypervisor to start the operating system to which the compact disk image is mounted and execute a native boot time application to read the customization data from the compact disk image and store the customization data in a predetermined location of the operating system designated for a system preparation process, which customizes the operating system based on the customization data, before the system preparation process is executed. Ejecting the compact disk image when the customization is complete. | 11-21-2013 |
20130318335 | COMPUTING DEVICE AND METHOD OF CAPTURING SHUTDOWN CAUSE IN SAME - A computing device includes an embedded controller. The embedded controller suspends a shutdown process in response to detection of a shutdown command, and obtains a shutdown cause according to the shutdown command. The embedded controller includes a memory. The embedded controller stores the shutdown cause in the memory, and resumes the shutdown process after the shutdown cause has been stored in the memory. A method of capturing shutdown cause in a computing device is also provided. | 11-28-2013 |
20130318336 | Method for Executing Bios Tool Program in Non-SMI Mechanism - A method for executing a Basic Input Output System (BIOS) tool program in a non-System Management Interrupt (SMI) mechanism is applicable to a computer and includes: bi-directionally transmitting, by an ACPI ASL module and a service module, a corresponding trigger signal; bi-directionally transmitting, by the service module and a driver, the trigger signal; bi-directionally transmitting, by the driver and a real-time service module of a BIOS, the trigger signal; and performing, by the BIOS, event processing according to the trigger signal to obtain a processing result, or performing, by the BIOS, logic operation on the data to obtain operation data. | 11-28-2013 |
20130318337 | DMI REDUNDANCY IN MULTIPLE PROCESSOR COMPUTER SYSTEMS - In accordance with various aspects of the disclosure, a method and apparatus are disclosed that includes aspects of monitoring a first processor of a computer by a monitoring module for a first processor instability; determining if the first processor is stable based on the monitored first processor instability; routing operational priority to a second processor of the computer through a multiplexer module if the first processor is determined not to be stable, wherein a first interface of the first processor and a second interface of the second processor are in communication with the multiplexer module and wherein the first processor and the second processor are in communication by a processor interconnect; and operating the computer using the second processor. | 11-28-2013 |
20130318338 | Selective Management Controller Authenticated Access Control to Host Mapped Resources - An information handling system includes a host mapped general purpose input output (GPIO), a shared memory, a board management controller, and a cryptography engine. The host mapped GPIO includes a plurality of registers. The board management controller is in communication with the host mapped GPIO and with the shared memory, and is configured to control accessibility to the plurality of registers in the GPIO, and to control write accessibility of the shared memory based on a private key received from a basic input output system requesting accessibility to the plurality of registers and write accessibility of the shared memory. The cryptography engine is in communication with the board memory controller, and is configured to authenticate the private key received from the board management controller. | 11-28-2013 |
20130326206 | REINTIALIZATION OF A PROCESSING SYSTEM FROM VOLATILE MEMORY UPON RESUMING FROM A LOW-POWER STATE - Boot configuration information is stored to a volatile memory of a processing system during a low-power state. When resuming from the low-power state, a processor device accesses configuration information for a memory controller from a non-volatile memory and restores the memory controller using the configuration information so as to permit access to the volatile memory. The processor device then configures the initial contexts one or more processor cores using the core state information maintained by the volatile memory during the low-power state and accessed via the configured memory controller, and the one or more processor cores completes the boot process by executing resume boot code maintained by the volatile memory during the low-power state and accessed via the configured memory controller, rather than accessing boot code from a non-volatile memory. | 12-05-2013 |
20130326207 | IMPLEMENTING SECURITY FUNCTIONS USING ROM - Systems, methods, and other embodiments associated with implementing security functions in a read-only memory (ROM) are described. According to one embodiment, an device includes a read-only memory (ROM) that stores (i) a plurality of security functions and (ii) a mapping of locations of the plurality of security functions in the ROM. The device also includes a processing unit configured to, in response to a request by a process being executed by the processing unit, determine a location in the ROM of a security function using the mapping, and execute the security function for the process from the ROM. | 12-05-2013 |
20130332718 | ACTIVATION-BASED REGULATORY UPDATES - The disclosed embodiments provide a system that activates an electronic device. The system includes an activation server that receives an activation request from the electronic device. Upon detecting, based on the activation request, that the electronic device requires a regulatory update, the activation server adds the regulatory update to an activation payload for the electronic device. Finally, the activation server transmits the activation payload to the electronic device. | 12-12-2013 |
20130332719 | System and Method for Providing Input/Output Functionality to a Processing Node - A remote component controller of a server rack includes a real time clock information unit to maintain real clock time and to respond to requests for real time clock information, and a communication module to receive over a communication link a request from a processing node of the server rack for real time clock information, to forward the request to the real time clock information unit, to receive from the real time clock information unit a response to the request, and to transmit the response to the request to the processing node over the communication link. | 12-12-2013 |
20130339712 | SERVICE-PROCESSOR-CENTRIC COMPUTER ARCHITECTURE AND METHOD OF OPERATION THEREOF - A computer system and a method of operating a service-processor-centric computer system. In one embodiment, the computer system includes: (1) a CPU configured to issue control signals and (2) a service processor configured for intercepting and handling the control signals, the handling including delaying, modifying or ignoring the control signals, the service processor further configuring for issuing highest-priority control signals. | 12-19-2013 |
20130339713 | ELECTRONIC DEVICE AND METHOD FOR VERIFYING FIRMWARE OF THE ELECTRONIC DEVICE - In a method for verifying firmware of an electronic device, the electronic device includes a baseboard management controller (BMC) for storing a BMC firmware, and a basic input-output system (BIOS) for storing a BIOS firmware. The method writes a first verification code into the BMC firmware, and writes a second verification code into the BIOS firmware. The method writes the BMC firmware into the BMC, and writes the BIOS firmware into the BIOS. The method further triggers the electronic device to power off if the first verification code of the BMC firmware is not identical to the second verification code of the BIOS firmware, and boots an operating system of the electronic device if the first verification code of the BMC firmware is identical to the second verification code of the BIOS firmware. | 12-19-2013 |
20130339714 | System and Method for Providing a Processing Node with Input/Output Functionality Provided by an I/O Complex Switch - A processing node of a server rack includes a processor to generate processing node management requests and to process responses to the node management requests, and a communication module to receive the processing node management requests, to transmit over a communication link to a management controller of the server rack external to the processing node a processing node management request, to receive over the communication link from the management controller processing node management information, and to transmit the processing node management information to the processor. | 12-19-2013 |
20130339715 | SYSTEM AND METHOD FOR WIPING ENCRYPTED DATA ON A DEVICE HAVING FILE-LEVEL CONTENT PROTECTION - Disclosed herein are systems, methods, and non-transitory computer-readable storage media for erasing user data stored in a file system. The method includes destroying all key bags containing encryption keys on a device having a file system encrypted on a per file and per class basis, erasing and rebuilding at least part of the file system associated with user data, and creating a new default key bag containing encryption keys. Also disclosed herein is a method of erasing user data stored in a remote file system encrypted on a per file and per class basis. The method includes transmitting obliteration instructions to a remote device, which cause the remote device to destroy all key bags containing encryption keys on the remote device, erase and rebuild at least part of the file system associated with user data, and create on the remote device a new default key bag containing encryption keys. | 12-19-2013 |
20130339716 | PORTABLE DESKTOP DEVICE AND METHOD OF HOST COMPUTER SYSTEM HARDWARE RECOGNITION AND CONFIGURATION - A portable desktop device and method for host computer system hardware recognition and configuration are provided. The portable desktop device causes on a first boot, the host computer system to recognize hardware devices connected thereto, and to configure hardware configuration files of the portable desktop O/S in accordance with the recognized hardware. Once the hardware configuration files have been configured, the system is rebooted. On the second boot, the host computer determines that the portable desktop has been configured for its hardware, and initiates start-up of the portable desktop. | 12-19-2013 |
20130339717 | Virtualized Boot Block with Discovery Volume - A file system independent virtualized boot block with discovery volume and cover files renders a volume visible when accessed by an accessing system which differs from a source system. For example, a downlevel operating system recognizes that data is present on a volume created in an uplevel operating system, even where the uplevel data itself may not be accessible. | 12-19-2013 |
20130339718 | INFORMATION PROCESSING DEVICE AND METHOD FOR CONTROLLING INFORMATION PROCESSING DEVICE - A basic input/output system (BIOS) storage unit stores therein a BIOS. An operating system (OS) storage unit stores therein a plurality of OSs. A boot control unit sequentially starts the OSs stored in the OS storage unit. When each of the OSs booted by the boot control unit starts up, a boot information acquisition unit acquires boot information transferred between the OS and the BIOS. A regression analysis processing unit compares the boot information acquired by the boot information acquisition unit with expected values which are predetermined values for the boot information to determine whether the boot information coincides with the expected values. | 12-19-2013 |
20130346735 | ENHANCED SYSTEM MANAGEMENT BUS - A method and device are provided for retrieving system data needed for boot up and/or wake-up. A bus hub is provided that retrieves needed data prior to such data being requested by the processor. The bus hub then stores the data. When a request is received for the data from the processor, the bus hub responds by sending the stored data. | 12-26-2013 |
20130346736 | SYSTEMS AND METHOD FOR BOOTING DEVICES IN A MULTIPLE-CARD COMPUTING SYSTEM - A method for booting devices in a multi-card computing system comprising a plurality of cards connected to a shared backplane may include: dynamically generating a Media Access Control (MAC) addresses for at least some of the devices in the computing system, the dynamically generated MAC address for each device including information regarding the location of that device within the multi-card computing system; a boot management system receiving a boot-related information request from a particular device in the multi-card system, the boot-related information request comprising a request for particular boot-related information for facilitating a boot process for the requesting device, and including the MAC address of the requesting device; and the boot management system determining whether to send a response to the requesting device with the requested boot-related information based at least on the information in the MAC address regarding the location of the requesting device within the multi-card computing system. | 12-26-2013 |
20130346737 | METHOD FOR REMOTELY POWERING ON HOST AND SYSTEM AND ELECTRONIC APPARATUS USING THE METHOD - A method for remotely powering on a host, a system using the method, and an electronic apparatus using the method are provided. In the method, a control apparatus is employed to connect a server and detect whether the server receives a booting command from a remote apparatus. When it is detected that the server receives the booting command, an activation signal is transmitted to the host by the control apparatus, so as to power on the host. | 12-26-2013 |
20130346738 | INFORMATION PROCESSING APPARATUS AND CONTROL METHOD FOR INFORMATION PROCESSING APPARATUS - An information processing apparatus includes a first storage storing an operating system program, a second storage including a boot program storage area, a first area and a second area, and a processor coupled to the first storage and the second storage. The processor writes the first path information, which is stored in the first area and used to boot up the operating system program, into the second area, upon first booting-up, compares the first path information in the first area and the second path information in the second area upon second booting-up subsequent to the first booting-up, determines whether the operating system program indicated by the first path information is to be booted up based on a result of the comparing, and writes the second path information into the first area when the operating system program indicated by the first path information is not to be booted up. | 12-26-2013 |
20140006764 | METHODS, SYSTEMS AND APPARATUS TO IMPROVE SYSTEM BOOT SPEED | 01-02-2014 |
20140006765 | INFORMATION PROCESSING APPARATUS AND START-UP CONTROL METHOD | 01-02-2014 |
20140006766 | INFORMATION PROCESSING APPARATUS, METHOD FOR CONTROLLING INFORMATION PROCESSING APPARATUS, AND STORAGE MEDIUM | 01-02-2014 |
20140006767 | BOOT STRAP PROCESSOR ASSIGNMENT FOR A MULTI-CORE PROCESSING UNIT | 01-02-2014 |
20140013093 | PINOUT ADJUSTMENT RESPONSIVE TO SYSTEM ORIENTATION - A unit of information technology equipment (ITE), such as a compute node or a network switch, comprises a system board in communication with network connectors that selectively connect to a network interconnect, a gravity sensor for detecting a first orientation and a second orientation of the system board, and a basic input/output system (BIOS) in communication with the gravity sensor to receive a signal identifying whether the system board is in the first or second orientation. The ITE further comprises a network ASIC (application specific integrated circuit) that inverts the pinout of transmit and receive signals in the network connectors in response to a command from the BIOS indicating that the system board is in the second orientation. A system may comprise a first ITE in a first orientation that interlocks with a second ITE in a second orientation that is inverted 180 degrees from the first orientation. | 01-09-2014 |
20140013094 | SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT FOR DETERMINING SETTINGS FOR A DEVICE - A system, method, and computer program product are provided for determining settings for a device. In use, a plurality of parameters associated with a device is identified. Additionally, one or more settings associated with the device are determined, based on the plurality of parameters. | 01-09-2014 |
20140013095 | Providing Silicon Integrated Code For A System - In one embodiment, a semiconductor integrated code (SIC) may be provided in a binary format by a processor manufacturer. This SIC may include platform independent code of the processor manufacturer. Such code may include embedded processor logic to initialize the processor and at least one link that couples the processor to a memory, and embedded memory logic to initialize the memory. Other embodiments are described and claimed. | 01-09-2014 |
20140013096 | BOOTING A COMPUTING DEVICE TO HAVE A PREDEFINED FUNCTIONALITY - In a method for booting a computing device to have a predefined functionality, in which the computing device has stored thereon a limited functionality operating system (OS) having an operating file system, the limited functionality OS is booted and a characteristic file system with a predefined functionality is located. In addition, the characteristic file system is merged into the operating file system and the limited functionality OS is implemented with the merged file system to cause the computing device to have the predefined functionality. | 01-09-2014 |
20140013097 | Retrieving Boot Instructions From Nonvolatile Memory - Systems and processes for booting a device can be implemented by detecting a reset signal associated with the device and retrieving a predetermined page of data from a nonvolatile memory location into a register associated with the nonvolatile memory. The nonvolatile memory may be designed and implemented such that each page of data is retrieved from the nonvolatile memory as a unit, and the page of data includes instructions for use in booting the device. A command to read data stored in the register is received, and the command can include an address identifying a location of one or more instructions within the register. In response, the one or more instructions are retrieved from the register for execution by a processor. | 01-09-2014 |
20140019741 | METHOD AND SYSTEM FOR BOOTING ELECTRONIC DEVICE FROM NAND FLASH MEMORY - A method and system for booting an electronic device from a NAND flash memory includes a NAND flash controller that receives an event trigger for fetching a pre-boot code stored in the NAND flash memory. Based on the event trigger type, booting parameters are loaded into the controller including a boot frequency of the NAND flash memory. The controller searches for a good memory block in which the pre-boot code is stored by checking the first and second or the first and last pages of a memory block and fetches a portion or the entire pre-boot code based on the event trigger type at the boot frequency. | 01-16-2014 |
20140025939 | METHODS AND APPARATUS FOR TRUSTED BOOT OPTIMIZATION - A data processing system may include a high integrity storage (HIS) device with a partition or cache that is protected from updates. The data processing system may perform a boot process in response to being reactivated. The boot process may include the operation of executing a boot object. During the boot process, before executing the boot object, the data processing system may retrieve a digest for the boot object from the protected cache of the HIS device. The digest may be a cryptographic hash value for the boot object. During the boot process, the retrieved digest may be extended into a platform configuration register in a trusted platform module of the data processing system. Other embodiments are described and claimed. | 01-23-2014 |
20140025940 | UPDATING AN OPERATING SYSTEM FOR SECURE ELEMENT - A secure element includes a boot program comprises instructions for the execution a startup step to determine if a non-volatile memory stores an active operating system, and, in the affirmative, to launch execution of the operating system, an authentication step of a updater device, as a function of first authentication data determined by a secure element and second authentication data received from the updater device, and, in response to the authentication step, a storage step of a new operating system received from the update, device in the non-volatile memory and an activation step of the new operating system, when said instructions are executed by a microprocessor. | 01-23-2014 |
20140025941 | PROVIDING AN IMMUTABLE ANTIVIRUS PAYLOAD FOR INTERNET READY COMPUTE NODES - In one embodiment, a method includes initializing a portion of a computing system in a pre-boot environment using a basic input/output system (BIOS) stored in a non-volatile storage of the computing system, launching a boot manager to enable a launch of an operating system (OS) payload, and if the OS payload is not successfully launched, executing an OS payload portion and an antivirus stack stored in the non-volatile storage to restore an integrity of the mass storage. Other embodiments are described and claimed. | 01-23-2014 |
20140025942 | INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND PROGRAM - An information processing apparatus, method and computer program product offer alternative ways to power-up an information processing device. Depending on which of multiple triggering devices are actuated, the information processing device performs either a fast power-up sequence or a more lengthy, but more complete power-up sequence. | 01-23-2014 |
20140025943 | BOOTING IN SYSTEMS HAVING DEVICES COUPLED IN A CHAINED CONFIGURATION - The present disclosure includes methods, devices, and systems for booting in systems having devices coupled in a chained configuration. One or more embodiments include a host and a number of devices coupled to the host in a chained configuration, wherein at least one of the number of devices is a bootable device and the at least one bootable device is not directly coupled to the host. | 01-23-2014 |
20140032888 | Integrated Circuit Boot Code and Fuse Storage Implemented on Interposer-Mounted Non-Volatile Memory - A method and apparatus for replacing a boot ROM and programmable fuses using a non-volatile memory and an interposer is disclosed. In one embodiment, an apparatus includes an integrated circuit (IC) implementing one or more processor cores. The apparatus further includes a non-volatile memory configured to store configuration settings and boot code for the IC. The apparatus further includes an interposer. Both of the IC and the non-volatile memory are mounted on a substrate of the interposer. The IC and the non-volatile memory are electrically coupled to one another through the substrate. During a system boot, the IC may access boot code and configuration settings from the non-volatile memory via electrical connections in the substrate that are externally inaccessible. | 01-30-2014 |
20140032889 | NETWORK BOOTING A MACHINE COUPLED TO THE NETWORK BY A LINK AGGREGATION GROUP - A technique includes network booting a physical machine coupled to a network by a link aggregation group. The technique includes selectively disabling ports of the physical machine associated with the link aggregation group in connection with the network booting until a driver of an operating system to group the ports together is installed on the physical machine. | 01-30-2014 |
20140032890 | STORAGE DEVICE COMPRISING VARIABLE RESISTANCE MEMORY AND RELATED METHOD OF OPERATION - A storage device includes a nonvolatile memory device including a variable resistance memory, and a controller configured to control the nonvolatile memory device. At a booting operation, the controller stores booting information in the variable resistance memory of the nonvolatile memory device. At a rebooting operation, the controller selectively performs a warm boot operation using the booting information stored in the variable resistance memory, based on a comparison result between a booting setting condition associated with the booting operation and a rebooting condition associated with the rebooting operation. | 01-30-2014 |
20140032891 | Direct Binary File Transfer based Network Management System Free of Messaging, Commands and Data Format Conversions - Telecommunication network management operations are performed based on accessing network management data (NMD) files via GUIs and general purpose computers including a network management system (NMS) server, and automatic routines for transferring binary NMD files between the general purpose computers and remote network elements (NEs) being managed. A system user produces configuration files at the NMS server for NEs using a network management GUI, and the hardware of NEs automatically complete the network management operations indicated by the NMD files transferred to them from the NMS server and produce their status files to the NMS server. The network management GUI displays network status based on the latest NE status files at the NMS server. This provides direct, binary file transfer based NMS communication that avoids the complexity and restrictions of intermediate messaging protocols or transaction languages and conversions thereof. | 01-30-2014 |
20140032892 | METHOD AND APPARATUS FOR BOOTSTRAPPING GATEWAY IN DEVICE MANAGEMENT SYSTEM - The present invention discloses a method and an apparatus for bootstrapping a gateway in a device management system, where the method includes: acquiring, from a terminal device by a gateway, server information saved by the terminal device; determining, by the gateway, a target server according to the acquired server information, and initiating a bootstrap request; and performing, by the gateway, a bootstrap according to bootstrap information received from the target server. The present invention enables the gateway to accomplish a bootstrap process in a use process. | 01-30-2014 |
20140032893 | SECURE VIRTUALIZATION ENVIRONMENT BOOTABLE FROM AN EXTERNAL MEDIA DEVICE - Methods and systems for creating a secure virtualization environment on a host device, without modifying the host device, the secure virtualization environment bootable from an external media device. A host computing device loads and boots a common operating system image stored on an external media device. A client agent stored on the external media device and executing in the common operating system image creates an adapted operating system image by copying the operating system of the host computing device, eliminating all unnecessary files and data and storing the adapted operating system image to the external media device. The host computing device provides a secure virtualized environment by booting the adapted operating system image. | 01-30-2014 |
20140040605 | METHODS AND APPARATUS FOR PERFORMING SECURE BIOS UPGRADE - A data processing system may comprise a primary basic input/output system (BIOS) image in a primary BIOS region and a rollback BIOS image in a rollback BIOS region. In one example method for upgrading the BIOS, the data processing system may establish a measured launch environment (MLE). In response to a BIOS update request, the data processing system may replace the primary BIOS image with a new BIOS image while running the MLE. After a reset operation, the data processing system may automatically boot to the rollback BIOS image and may use the rollback BIOS to automatically determine whether the new BIOS image is authentic. In response to a determination that the new BIOS image is authentic, the data processing system may copy the new BIOS image from the primary BIOS region to the rollback BIOS region. Other embodiments are described and claimed. | 02-06-2014 |
20140040606 | Method of Proactively Event Triggering and Related Computer System - A method of proactively event triggering in a computer system is disclosed. The computer system includes an application unit and an interface. The method includes the application unit sending a setting signal to change a voltage level of a pin of a control chip module; the pin generating a triggering event to the interface unit when the voltage level of the pin changes; and the interface accessing a controller according to the triggering event to allow the application unit to communicate with the controller proactively. | 02-06-2014 |
20140040607 | Universal Microcode Image - Systems and methods for creating universal microcode images and for reconstructing a microcode image from a universal microcode image are described in the present disclosure. One method, among others, comprises receiving a plurality of microcode images each configured to initialize hardware within an electronic device before the electronic device is booted up. The method also includes separating each microcode image into sections and comparing the sections to determine whether or not two or more sections contain identical code. The method also includes creating a universal microcode image from the sections that are unique. | 02-06-2014 |
20140040608 | Power Management Methods and Systems Using an External Power Supply - A method for managing power to an information handling system (IHS) is disclosed wherein the method includes providing a battery and an external power supply operable to supply power to the IHS. The method also includes providing an application programming interface (API) to the IHS, wherein the API is configured to monitor a first parameter and a second parameter. The method further includes supplying power to the IHS via the external power supply if the first parameter reaches a first threshold level and supplying power to the IHS via the battery if the second parameter reaches a second threshold level. An information handling system (IHS) is further disclosed including an external power supply, a battery, and a controller operable to select between the external power supply and the battery to supply power to the IHS. The IHS further includes an application programmable interface (API) operable to monitor a first parameter and direct the controller to select the external power supply to supply power to the IHS if the first parameter reaches a first threshold level, and wherein the API is further operable to monitor a second parameter and direct the controller to select the battery to supply power to the IHS if the second parameter reaches a second threshold level. | 02-06-2014 |
20140047227 | SYSTEM AND METHOD FOR CONFIGURING BOOT-TIME PARAMETERS OF NODES OF A CLOUD COMPUTING SYSTEM - The present disclosure relates to a method and system for configuring a computing system, such as a cloud computing system. A method includes providing a user interface comprising selectable boot-time configuration data and selecting, based on at least one user selection of the boot-time configuration data, a boot-time configuration for at least one node of a cluster of nodes of the computing system. The method further includes configuring the at least one node of the cluster of nodes with the selected boot-time configuration to modify at least one boot-time parameter of the at least one node. | 02-13-2014 |
20140047228 | Configuring a System with Various System Components Utilizing a Configuration Profile - According to an embodiment of the present invention, a computer system for configuring a system with at least two different system components based on a target computing environment includes at least one processor. The computer system generates a profile to configure each of the different system components for the target computing environment. The profile identifies the corresponding tasks to be performed and properties to configure each of the different system components for the target computing environment. The computer system processes the profile and performs the tasks in the order listed in the profile and in accordance with the properties to configure the system for the target computing environment. Embodiments of the present invention further include a method and computer program product for configuring a system with at least two different system components based on a target computing environment in substantially the same manner described above. | 02-13-2014 |
20140047229 | USING A TRUSTED PLATFORM MODULE FOR BOOT POLICY AND SECURE FIRMWARE - Embodiments of apparatuses and methods for using a trusted platform module for boot policy and secure firmware are disclosed. In one embodiment, a trusted platform module includes a non-volatile memory, a port, and a mapping structure. The port is to receive an input/output transaction from a serial bus. The transaction includes a system memory address in the address space of a processor. The mapping structure is to map the system memory address to a first location in non-volatile memory. | 02-13-2014 |
20140047230 | COMPUTING DEVICE AND METHOD FOR WIRELESS REMOTE BOOT IN A NETWORKED ENVIRONMENT - In some embodiments, a secure authenticated remote boot of computing device over a wireless network is performed in a pre-boot execution environment (PXE) using active management technology (AMT) for remote discovery. In these embodiments, a management engine (ME) may maintain full control of a wireless interface and a wireless connection as booting begins. The ME may relinquish control of the wireless interface after a PXE timeout, in response to a shutdown command, or once the device has booted. The ME controls the use of an operating system received from a remote location. | 02-13-2014 |
20140052975 | PROTECTING SECURE SOFTWARE IN A MULTI-SECURITY-CPU SYSTEM - A computing system includes a first central processing unit (CPU) and a second CPU coupled with the first CPU and with a host processor. In response to a request by the host processor to boot the second CPU, the first CPU is configured to execute secure booting of the second CPU by decrypting encrypted code to generate decrypted code executable by the second CPU but that is inaccessible by the host processor. | 02-20-2014 |
20140052976 | WIRELESS ROUTER REMOTE FIRMWARE UPGRADE - A wireless router receives a firmware update from a remote server, and destructively overwrites router firmware in flash memory in a chunk-wise manner, and then writes a kernel memory before going live with upgraded firmware. Some routers authenticate the firmware image. In some cases, image chunks are re-ordered into an executable order after receipt and before finishing their final arrangement in the flash memory. In some routers, a maximum firmware image size is at least two chunk sizes smaller than the flash memory storage capacity. Some routers remap ROM to RAM memory. Some decompress data from flash into a RAM. Some save text file configuration settings in flash before rebooting. Some detect a user's inactive billing status and redirect a web browser to a billing activation page. | 02-20-2014 |
20140052977 | ELECTRONIC APPARATUS AND METHOD FOR BOOTING THE SAME - An electronic apparatus includes an operating system and a control circuit. The operating system is driven by an output command signal to execute one of plural different boot procedures. The control circuit detects an input command signal correspondingly generated when a power push-button is pressed down in a condition of the operating system being deactivated, and generates the output command signal according to the detected input command signal. Moreover, a method for booting an electronic apparatus is also disclosed herein. | 02-20-2014 |
20140059336 | PROBING THE BOOT SEQUENCE OF A COMPUTER SYSTEM - Probes are instrumented into a boot sequence of a computer system to enable probing of the boot sequence. As part of the boot sequence, a value stored in a predetermined storage location within a boot device is read and, if the value indicates that probing of the boot sequence has been enabled, executable code for probing the boot sequence is injected into the boot sequence. Outputs of the probing during the boot process are collected into a buffer and analyzed after the completion of the boot process. | 02-27-2014 |
20140059337 | COMPUTING PERFORMANCE AND POWER MANAGEMENT WITH FIRMWARE PERFORMANCE DATA STRUCTURE - In some embodiments, a PPM interface for a computing platform may he provided with functionality to facilitate, to an OS through the PPM interface, firmware performance data. | 02-27-2014 |
20140059338 | METHOD FOR SECURE BOOTING OF A PRINTER CONTROLLER - A printing system is provided with a secure boot program and a detachable memory device with an installable secure boot program. Upon switching on the printer controller, the secure boot program will check if a detachable memory device containing the secure boot program is plugged in. If this is the case, the controller will boot from the detachable memory device, otherwise the controller will invoke the printer control program to bring the printer in its normal operational mode. | 02-27-2014 |
20140059339 | APPARATUS AND METHOD FOR DOWNLOADING CONTENTS USING AN INTERIOR MASS STORAGE IN A PORTABLE TERMINAL - A method and apparatus for downloading content to a large-capacity internal memory in a portable terminal are provided. The method includes performing a booting process of the portable terminal at the occurrence of a booting event, examining whether a Universal Serial Bus (USB) port is enabled during the booting process, if the USB port is enabled, receiving data through the USB port before driver loading, and storing the received data into the large-capacity internal memory and performing the booting process. | 02-27-2014 |
20140068238 | Arbitrary Code Execution and Restricted Protected Storage Access to Trusted Code - A method comprises signing boot code with a public/private cryptographic key pair, and writing to storage the boot code, the public cryptographic key, and the signed boot code. | 03-06-2014 |
20140068239 | METHOD FOR BOOTING ICON LOCKOUT - The present invention relates to a method for booting icon lockout and comprises steps as follows: (1) Configure a display mode of a host computer's graphic chip as “graphic” in order to define memory addresses in the host computer to be a memory pool for icon display; (2) Decompress the zip file for a customized booting icon which is saved in the BIOS chip as one file; (3) Load the file to the memory pool and map the file to the graphic chip's memories for displaying the customized booting icon on a monitor; (4) Change content of the call function (INT10H) in order to smoothly display nothing except the identical customized booting icon on a monitor by INT10H in a boot process from power-on self-test to desktop display before OS is completely loaded. | 03-06-2014 |
20140068240 | LAYOUT AND EXECUTION OF OPERATING SYSTEMS USING BPRAM - A software layout system is described herein that speeds up computer system boot time and/or application initialization time by moving constant data and executable code into byte-addressable, persistent random access memory (BPRAM). The system determines which components and aspects of the operating system or application change infrequently. From this information, the system builds a high performance BPRAM cache to provide faster access to these frequently used components, including the kernel. The result is that kernel or application code and data structures have a high performance access and execution time with regard to memory fetches. Thus, the software layout system provides a faster way to prepare operating systems and applications for normal operation and reduces the time spent on initialization. | 03-06-2014 |
20140068241 | MEMORY DEVICE, MEMORY SYSTEM INCLUDING THE SAME, AND METHOD FOR OPERATING THE MEMORY SYSTEM - A memory device includes a non-volatile memory configured to store a repair data and output the repair data in response to an initialization signal, a plurality of registers configured to store the repair data outputted from the non-volatile memory, a plurality of memory banks configured to replace normal cells with redundant cells by using the repair data stored in corresponding registers among the plurality of registers, a verification circuit configured to generate a completion signal for informing that transfer of the repair data from the non-volatile memory to the plurality of registers is completed, and an output circuit configured to output the completion signal to a device other than the memory device. | 03-06-2014 |
20140068242 | IMAGE FORMING APPARATUS, METHOD FOR CONTROLLING IMAGE FORMING APPARATUS, AND STORAGE MEDIUM - An image forming apparatus, which is configured to perform image processing while managing a resource of a system, includes a memory, a detection unit configured to detect a brightness level around a main body of the image forming apparatus, and a control unit configured to reboot the resource of the system, check a state in which the system should be rebooted to determine which level this state has shifted to, reserve reboot processing according to the determined level, and control whether the reboot processing should be performed by the reboot unit according to the detected brightness level and a level of the reserved reboot processing. | 03-06-2014 |
20140075169 | ACCESSORY BOOTING OVER USB - Methods, systems, and apparatuses for booting an accessory with an accessory firmware image received from a host device are described. When the host device detects a connection between the accessory and the host device, the host device may send a request for an accessory identifier to the accessory. The accessory may send an accessory identifier to the host device in response. The host device may select an accessory firmware image that is suitable for the accessory, and may transmit the accessory firmware image to the accessory. The accessory firmware image may include information that the accessory can use to enable the accessory to exchange application data with the host device. | 03-13-2014 |
20140075170 | AUTOMATED FIRMWARE VOTING TO ENABLE MULTI-ENCLOSURE FEDERATED SYSTEMS - One embodiment provides a method of initializing a federated computer system from a fabric of nodes connected by a federated interface. Each node casts a vote to the federated interface for a candidate firmware version supported by the node casting the vote. The candidate firmware version having received the greatest number of votes is identified, and the computer system is initialized as a federated system of the nodes that support the firmware version identified as having received the greatest number of votes. A process of iterative voting may be used to identify a greater number of nodes supporting a compatible firmware version. | 03-13-2014 |
20140075171 | MULTI-PURPOSE POWER CONTROLLER AND METHOD - The present invention provides a multi-purpose power controller and application specific standard product (ASSP) with improved block unification, reduced size and power, boot strapping, and power management. A multi-purpose field programmable non-volatile system power controller and ASSP initializing block may be embedded in a processor, such as a central processing unit (CPU), graphics processing unit (GPU), accelerated processing unit (APU), or other chipset. This controller and initializing block may be a configurable, while maintaining specialization, hardware block. This block may be implemented as a complex mid-size complex programmable logic devices (CPLD) or as a simple cascaded programmable logic array block, such as being the equivalent of a few hundred logic gates, for example. | 03-13-2014 |
20140075172 | Operating System Hardware Configuration State Specialization - In one or more embodiments, hardware configuration state data for specialization of a portable installation of an operating system may be stored on a per hardware configuration basis. Specializations may include designation of boot start drivers, driver settings, device settings, and other state data that may vary based on hardware configurations of different machines on which the portable operating system is loaded. In a pre-boot environment, an identity of the current computing device is resolved and used to look-up corresponding hardware configuration state data that is available. When booting of the operating system on a new computing device is detected, the operating system is loaded using default state settings. An optimization routine may then be performed to create and store hardware specific hardware configuration state data for the computing device that defines specializations for subsequent boots of the operating system on the computing device. | 03-13-2014 |
20140075173 | AUTOMATED FIRMWARE VOTING TO ENABLE A MULTI-ENCLOSURE FEDERATED SYSTEM - A method initializes a federated computer system from a fabric of nodes connected by a federated interface. Each node casts a vote to the federated interface for a candidate firmware version supported by the node casting the vote. The candidate firmware version having received the greatest number of votes is identified, and the computer system is initialized as a federated system of the nodes that support the firmware version identified as having received the greatest number of votes. A process of iterative voting may be used to identify a greater number of nodes supporting a compatible firmware version. | 03-13-2014 |
20140075174 | Boot State Restore from Nonvolatile Bitcell Array - A processing device using a plurality of volatile storage elements to execute a boot process for and stores in a plurality of non-volatile logic element arrays a boot state representing a state of the processing device after a given amount of the boot process is completed. When it is determined that the processing device needs to restart from a boot state, energy can be saved by restoring the machine state at that boot state instead of re-booting. The stored boot state will not change, and given the nature of certain non-volatile storage elements, the data read from the NVL storage elements needs to be re-written to the elements after read out. Accordingly, a round-trip data restoration operation is executed that automatically writes back data to an individual non-volatile logic element after reading data from the individual non-volatile logic element without completing separate read and write operations. | 03-13-2014 |
20140075175 | Control of Dedicated Non-Volatile Arrays for Specific Function Availability - A device's configuration is controlled through control of its pre-boot process. Protected non-volatile logic element arrays store a machine state configuration of a processing device configured to backup data from volatile storage elements in a plurality of non-volatile logic element arrays. The machine state configuration is read in response to the processing device's entering a pre-boot process. The processing device's configuration is then set to the machine state configuration. This setting of the device configuration can be done by receiving instructions from the protected non-volatile logic element arrays to direct an order in which data for individual device functions are restored from non-volatile logic element arrays in response to the processing device's entering a wakeup or recovery mode. In one approach, the instructions arrange configuration bits that direct operation of a non-volatile logic controller during the wakeup or recovery mode to control the order of data restoration. | 03-13-2014 |
20140075176 | INFORMATION PROCESSING APPARATUS - An information processing apparatus includes a processor that executes an instruction stored in a fixed address area in a storage part; the storage part that stores a first startup program and a second startup program, contents of the second startup program being different at least partially from those of the first startup program; and an address conversion part that, when the processor carries out a predetermined startup different from an ordinary startup that is carried out at a time of starting power supply to the information processing apparatus, converts an address included in a read instruction issued by the processor indicating a storage area that stores the first startup program into an address indicating an other storage area that stores the second startup program, and sends the converted address to the storage part. | 03-13-2014 |
20140075177 | ELECTRONIC CONTROL APPARATUS - An electronic control apparatus as one of nodes connected to a communication line includes a microcomputer, a power integrated circuit for controlling power supply to the microcomputer, and a timer adjuster. The power integrated circuit has a timer for measuring a time period during which no data flows through a communication line. The timer is reset, when no data flows through the communication line and then data flows through the communication line. The power integrated circuit starts power supply to the microcomputer, when data flows through the communication line. The power integrated circuit stops the power supply when the timer reaches a threshold value. The timer adjuster prevents the timer from reaching the threshold value until the microcomputer completes a shutdown process. | 03-13-2014 |
20140082341 | METHOD FOR GENERATING REDUCED SNAPSHOT IMAGE FOR BOOTING AND COMPUTING APPARATUS - Method for generating a reduced snapshot image for booting and a computing apparatus are provided. An embodiment of the method includes the following. In response to a shutdown request, it is determined whether a specific boot mode is enabled. When the specific boot mode is enabled, a threshold parameter set for process killing is assigned. If a first memory unit of the computing apparatus has at least one process satisfying a process killing condition, the at least one process satisfying the process killing condition is killed. The process killing condition includes a criterion based on the threshold parameter set. A hibernation process is entered, wherein the hibernation process generates a snapshot image for booting and stores the snapshot image in a second memory unit of the computing apparatus and the snapshot image includes at least one process reserved in the first memory after the killing step. | 03-20-2014 |
20140082342 | AUDIO/VIDEO ELECTRONIC EQUIPMENT, SUCH AS A MULTIMEDIA CAR RADIO, INSTALLABLE IN AN AUTOMOTIVE VEHICLE - The equipment comprises a digital processor implementing an operating system requiring a previous boot before the equipment is in an operational state. A start module is operable, when the device is initially in a power-off state, for: producing a triggering signal upon detection ( | 03-20-2014 |
20140082343 | INFORMATION PROCESSING APPARATUS - The present disclosure provides an information processing apparatus effective in detecting an unauthorized use or misuse of the information processing apparatus from when the OS is shut down to when the OS is started. An information processing apparatus controlled by an operating system comprises: an operation history generating section which creates an operation history of the information processing apparatus after the operating system is shut down before the operating system is started; and a storage unit which stores information including the created operation history. | 03-20-2014 |
20140082344 | CASE SECURE COMPUTER ARCHITECTURE - Two computing subsystems are disclosed, one a control subsystem, the other a user subsystem, each using engines with augmented conventional instruction sets, together with hardware and/or firmware, to compartmentalize execution of user programs to insure their behavior does not exceed defined bounds. Programs hidden in data cannot execute. User programs cannot alter the control program that manages the overall system. | 03-20-2014 |
20140082345 | SEMICONDUCTOR DEVICE - On a single semiconductor package PK | 03-20-2014 |
20140082346 | Method and System for Managing Basic Input/Output System (BIOS) Configuration Data of BIOS - Disclosed in the present invention are a method and a system for managing basic input/output (BIOS) configuration data of a BIOS. The method includes: reading a BIOS program code, and executing a BIOS program; when executing the BIOS program, executing different code segments in the BIOS program according to read BIOS configuration data; and when new BIOS configuration data is required for executing the BIOS program, using a value in a new storage area as the new BIOS configuration data. Through the solution provided by the present invention, it can be ensured that, after the BIOS program is upgraded and when the number of configuration items is increased, current BIOS configuration data in a storage medium is still read effectively. | 03-20-2014 |
20140089649 | System and Method of Server Re-provisioning via a Service Processor and Virtual Initiators - A method includes determining, by a management controller of a first server in a storage network, if a first virtual initiator is used by a second server in the storage network, wherein the first virtual initiator includes first boot information for allocating a first storage resource of the storage network, aborting a boot up of the first server in response to determining that the first virtual initiator is being used by the second server, and proceeding with the boot up of the first server in response to determining that the first virtual initiator is not used by the second server, wherein the boot up proceeds using the first boot information to allocate the first storage resource to the first server. | 03-27-2014 |
20140089650 | Security Enclave Processor Boot Control - An SOC implements a security enclave processor (SEP). The SEP may include a processor and one or more security peripherals. The SEP may be isolated from the rest of the SOC (e.g. one or more central processing units (CPUs) in the SOC, or application processors (APs) in the SOC). Access to the SEP may be strictly controlled by hardware. For example, a mechanism in which the CPUs/APs can only access a mailbox location in the SEP is described. The CPU/AP may write a message to the mailbox, which the SEP may read and respond to. The SEP may include one or more of the following in some embodiments: secure key management using wrapping keys, SEP control of boot and/or power management, and separate trust zones in memory. | 03-27-2014 |
20140089651 | COMPUTING DEVICE BOOT SOFTWARE AUTHENTICATION - Various embodiments are generally directed to authenticating a chain of components of boot software of a computing device. An apparatus comprises a processor circuit and storage storing an initial boot software component comprising instructions operative on the processor circuit to select a first set of boot software components of multiple sets of boot software components, each set of boot software components defines a pathway that branches from the initial boot software component and that rejoins at a latter boot software component; authenticate a first boot software component of the first set of boot software components; and execute a sequence of instructions of the first boot software component to authenticate a second boot software component of the first set of boot software components to form a chain of authentication through a first pathway defined by the first set of boot software components. Other embodiments are described and claimed herein. | 03-27-2014 |
20140089652 | CUSTOMIZING PROGRAM LOGIC FOR BOOTING A SYSTEM - A method and system are provided for generating customized program logic operable to control hardware devices of a target system and to boot said target system. The system is connected to one or more target systems via a network, the server system being adapted for: receiving a first list of device identifiers from one of the target systems; automatically selecting, for each of the device identifiers in the received first list, at least one driver operable to control the identified device from a set of drivers, thereby generating a sub-set of said set of drivers; providing a core program logic to the target system; and providing the sub-set of drivers to the target system, wherein a combination of the sub-set of drivers and the core program logic constitutes a customized program logic operable to control the devices of said target system. | 03-27-2014 |
20140089653 | ELECTRONIC APPARATUS, METHOD OF RESTORING GUID PARTITION TABLE (GPT) AND COMPUTER-READABLE RECORDING MEDIUM - An electronic apparatus comprising a storage unit to store a first (primary) GPT, a second (secondary) GPT, and an OS, a controller boots the electronic apparatus using the first GPT and the OS, an effectiveness determination unit determines effectiveness of the first GPT if a predetermined event occurs, and a restoration unit restores the first GPT using the second GPT if the first GPT is not effective. | 03-27-2014 |
20140089654 | NETWORK STORAGE TARGET BOOT AND NETWORK CONNECTIVITY THROUGH A COMMON NETWORK DEVICE - The present disclosure includes systems and techniques relating to booting to a network storage target. In general, in one implementation, a bus-to-network device driver is loaded during a machine boot, where the bus-to-network device driver is capable of sending machine bus commands over a network, providing access to the network for a network device driver, and distinguishing between received responses to the machine bus commands and other network traffic corresponding to the network device driver. Loading of the bus-to-network device driver can occur in response to an operating system load of bus drivers. For example, the bus-to-network device driver can be an iSCSI driver, and the operating system load of bus drivers can be the operating system load of SCSI drivers. | 03-27-2014 |
20140089655 | SYSTEM AND METHOD FOR AUTO-FAILOVER AND VERSION MATCHING OF BOOTLOADER IN AN ACCESS CONTROLLER - In accordance with embodiments of the present disclosure, an information handling system may include a processor and an access controller communicatively coupled to the processor. The access controller may include a memory having a bootloader portion including a first memory address and a second memory address a second processor communicatively coupled to the memory. The second processor may be configured to: (i) attempt to execute the a first copy of a bootloader stored at the first memory address; (ii) in the event of a failure to execute the first copy of the bootloader, copy a second copy of the bootloader stored at the second memory address to the first memory address; and (iii) subsequent to copying the second copy to the first memory address, attempt to execute the second copy of the bootloader stored at the first memory address. | 03-27-2014 |
20140089656 | DATA PROCESSING APPARATUS AND COMPUTER-READABLE RECORDING MEDIUM - Disclosed is a data processing apparatus providing a predetermined function by executing a program for the data processing apparatus, including a first storage unit that stores encoded execution starting data for starting execution of the program; a first decode key storage unit that stores a first decode key capable of decoding the encoded execution starting data; a start up unit that obtains the first decode key from the first decode key storage unit when turning on the power is accepted and decodes the encoded execution starting data by the first decode key to start executing the program; and an authentication confirmation unit that sends a request for authentication to an external apparatus after the start up unit starts executing the program and starts providing the predetermined function when obtaining an authentication result indicating the apparatus is authenticated from the external apparatus. | 03-27-2014 |
20140095855 | SECURE SYSTEM FLASH SHARING - Systems and methods may provide for securely transferring data from a flash component. In one example, the method may include receiving a download request from an embedded controller chip, obtaining information from the flash component in response to the download request, and transferring the information to the embedded controller chip. | 04-03-2014 |
20140095856 | PINNING BOOT DATA FOR FASTER BOOT - Methods and apparatus are provided for reducing computer system boot up times in systems with composite HDD-SSD storage devices. Booting a computer system having a composite storage device that includes a magnetic storage device (HDD) and a solid state storage device (SSD) includes identifying boot data read from the magnetic storage device during an initial boot process, pinning the boot data to the solid state storage device, wherein pinning causes the boot data to be retained on the solid state storage device during movement of infrequently-used data from the solid state storage device to the magnetic storage device, and reading, by the computer system, the boot data from the solid state storage device during a subsequent boot process. Booting can also include moving infrequently accessed data from the solid state storage device to the magnetic storage device, and the boot data on the solid state storage device. | 04-03-2014 |
20140095857 | Multiple System Images for Over-The-Air Updates - In one embodiment, a mobile device performs an over-the-air firmware update by writing the updated firmware to a inactive system image partition, and rebooting the device. The security of the OTA update is maintained through checking a plurality of security signatures in an OTA manifest, and the integrity of the data is maintained by checking a hash value of the downloaded system image. | 04-03-2014 |
20140095858 | CUSTOMIZING PROGRAM LOGIC FOR BOOTING A SYSTEM - A method and system are provided for generating customized program logic operable to control hardware devices of a target system and to boot said target system. The method includes determining the hardware devices operatively connected with the target system; sending a first list of identifiers of the determined hardware devices to a server system; receiving the first list of device identifiers; automatically selecting at least one driver operable to control the identified device, thereby generating a sub-set of said set of drivers; and complementing a core program logic with said driver sub-set to generate the customized program logic. | 04-03-2014 |
20140101424 | Cooperative Boot Techniques for an Enterprise Computing System - Cooperative boot techniques enable sharing of information in an enterprise computing system so as to optimize performance of the system. For example, in an enterprise computing system comprising a management server, one or more server computers, and a storage subsystem, the management server monitors the one or more server computers for a notification that a server computer has started boot operations. The management server determines that a first server computer has started boot operation, and notifies the storage subsystem that a boot-data request is forthcoming from the first server computer. The storage subsystem is notified that the first server computer has started boot operations before the first server computer has completed boot operations so that that the storage subsystem can prepare data likely to be requested in the boot-data request. | 04-10-2014 |
20140101425 | MANAGING OPERATING SYSTEM COMPONENTS - A plurality of operating system (OS) components is stored in a storage location on a computing device. A user may selected a set of OS components to use when the computing device boots. A boot location is created and links to the set of OS components are stored in the boot location. The computing device may boot using any one of a plurality of boot locations. | 04-10-2014 |
20140101426 | PORTABLE, SECURE ENTERPRISE PLATFORMS - A portable, secure enterprise computing platform is provided by a device having a storage or memory, including a firmware module, a processor and an interface for interfacing with a host platform. The interface may be a USB interface and the device may have the form factor of a USB thumb drive. The storage may include a public partition, secure partition, operating system partition and command partition. A boot load manager in the firmware module causes the processor to load an operating system on the operating system partition and selectively enables access to the operating system by the host platform. The operating system partition may be formatted as a CDFS device such that the host platform recognizes the device as a bootable CD drive. The device provides for secure booting to the operating system partition by the host platform, without risk of corruption or malware from the host platform. A user may select from multiple operating systems. Multiple devices may be managed by a policy management application, which may assign groups of users and applications to one or more devices across an enterprise. | 04-10-2014 |
20140101427 | AUTOMATIC UPDATE OF PERSISTENT BOOT PARAMETER STORAGE - A computer system includes a memory, the memory comprising a hardware boot parameter storage area; an operating system running on the computer system; and reboot logic configured to: store updated boot parameters for the operating system in the hardware boot parameter storage area in the memory; perform a reboot of the operating system with the updated boot parameters; determine whether the reboot of the operating system is successful, and, in the event the reboot of the operating system is successful, automatically propagate the updated boot parameters to a persistent boot parameter storage area. | 04-10-2014 |
20140108774 | DYNAMICALLY RECOMMENDING CHANGES TO AN ASSOCIATION BETWEEN AN OPERATING SYSTEM IMAGE AND AN UPDATE GROUP - Dynamically recommending changes to an association between an operating system image and an update group includes monitoring a configuration of a deployed copy of a first master operating system (OS) image; detecting a modification in the configuration of the deployed copy; determining that the configuration of the deployed copy with the modification more closely matches a configuration of a second master OS image than a configuration of the first master OS image; in response to determining that the configuration of the deployed copy with the modification more closely matches the configuration of the second master OS image, generating an association recommendation that recommends associating the deployed copy with a second update group of the second master OS image; and associating the deployed copy with the second update group of the second master OS image instead of the first update group of the first master OS image. | 04-17-2014 |
20140108775 | MAINTAINING RESOURCE AVAILABILITY DURING MAINTENANCE OPERATIONS - One or more aspects of this disclosure may relate to using a configurable server farm preference for an application, desktop or other hosted resource. Additional aspects may relate to moving server farm workloads based on the configurable server farm preference. Further aspects may relate to performing reboot cycles, a reboot schedule and on-demand rebooting. Yet further aspects may relate to staggering individual machine reboot operations over a specified period of time and performing reboot operations such that some machines are available for user sessions during a reboot cycle. | 04-17-2014 |
20140108776 | INFORMATION PROCESSING APPARATUS, VIRTUAL MACHINE MANAGEMENT METHOD, AND VIRTUAL MACHINE MANAGEMENT PROGRAM - An interface unit holds an activation code including information indicating an access destination storage device among storage devices. A storage unit stores activation codes, each including information indicating an access destination storage device. A controller selects, when activating a program on a virtual machine, an activation code according to the virtual machine from the storage unit, and provides the virtual machine with the selected activation code, in place of the activation code of the interface unit. A program is read from a storage device according to the selected activation code. | 04-17-2014 |
20140108777 | SYSTEM AND METHOD FOR AUTOMATED NETWORK CONFIGURATION - A method of configuring a data network with a controller, the data network including a plurality of hosts each associated with at least one of a plurality of switches, the method including receiving a request to boot an operating system image on one of the plurality of hosts, the operating system image having network connectivity requirements. Further, the method includes selecting a host out of the plurality of hosts on which to boot the operating system image. The method also includes booting the operating system image on the host, and configuring a switch out of the plurality of switches associated with the host based upon the network connectively requirements of the operating system image. Additionally, the method includes configuring networking attributes of a network interface in the host based upon the network connectivity requirements of the operating system image. | 04-17-2014 |
20140115309 | VALIDATION OF STORAGE ARRAYS BASED ON INFORMATION STORED IN GLOBAL METADATA - A director node of a plurality of nodes determines a plurality of data arrays, where the plurality of data arrays have been discovered at boot time. The director node determines global metadata information, based on reading boot sectors of at least one of the plurality of data arrays discovered at boot time. A determination is made from the global metadata information as to how many data arrays had been previously configured. In response to determining that the plurality of data arrays discovered at boot time is not equal in number to the previously configured data arrays, the director node determines that all configured data arrays have not been discovered. | 04-24-2014 |
20140115310 | METHOD AND APPARATUS FOR GRACELESS REBOOT - Implementations of the present disclosure involve a system and/or method for gracelessly rebooting a storage appliance. The method and system includes a storage appliance in association with an event that will result in the loss of a state table from volatile memory that halts changes to at least one state table of the storage appliance. The state tables describe a plurality of file system states of one or more clients connected to the first storage appliance. The state information is written to a persistent memory of the storage appliance. The state table may then be repopulated using the state table information stored in persistent memory. | 04-24-2014 |
20140115311 | ELECTRONIC APPARATUS AND METHOD FOR DETERMINING A RESET THEREOF - An electronic apparatus and method for determining a reset thereof are provided. The electronic apparatus includes a switch, a sensor, a reset circuitry and a control circuitry. The switch generates a trigger signal as being triggered. The sensor senses a property of an object or an environment external to the electronic apparatus and to provide a sensing information based on the sensed property. The reset circuitry is coupled to the switch and counts from an initial value to a predetermined value when keep receiving the trigger signal from the switch, wherein the reset circuitry further resets the electronic apparatus when counting to the predetermined value. The control circuitry is coupled to the switch, the sensor and the reset circuit and generates a control signal, based on the sensing information, for controlling the reset circuit to re-count from the initial value to the predetermined value. | 04-24-2014 |
20140115312 | SERVER AND BOOTING METHOD THEREOF - The present invention discloses a server and a booting method thereof. The booting method includes the following steps. A motherboard and a hard disk driver backplane coupled to multiple hard disk drivers are provided, and a working voltage is provided for the hard disk driver backplane, wherein a power-up normal signal is generated when the hard disk driver backplane is powered up normally, and the motherboard includes a booting control circuit and a controller. In response to the power-up condition of the hard disk driver backplane, the hooting control circuit receives the power-up normal signal and outputs a power-up control signal to the controller. When receiving the power-up control signal, the controller controls the motherboard to be booted or maintained as off by determining the condition of the power-up control signal, for the data exchange between the motherboard and the hard disk driver. | 04-24-2014 |
20140115313 | ELECTRONIC DEVICE AND START-UP METHOD THEREOF - An electronic device and a method for starting up the same, wherein the electronic device includes a firmware control unit, a power supply state storage unit, a basic input output unit, and an Ethernet interface coupled to power supply apparatus to a Power over Ethernet to receive a power supply via a network cable. The firmware control unit determines whether the power supply state of the power supply is in a first power mode, by checking a power supply state signal. When the power supply state is not in the first power mode, the basic input output unit executes a second power booting program. The firmware control unit communicates with the power supply apparatus via a network, increases the rated power of the power supply, sets the power supply state signal for controlling the power supply state to be in the first power mode, and restarts the electronic device. | 04-24-2014 |
20140115314 | ELECTRONIC DEVICE AND SECURE BOOT METHOD - An embodiment of the invention provides a secure boot method for an electronic device including an embedded controller and a processor. The method includes the steps of verifying a secure loader by the embedded controller, unlocking a peripheral hardware of the electronic device by the embedded controller, and executing the secure loader by the processor. | 04-24-2014 |
20140115315 | OPTIMIZED COLD BOOT FOR NON-VOLATILE MEMORY - Various embodiments are directed to apparatuses and methods for faster solid state drive (SSD) boot-up. On boot-up, SSD control algorithms may load non-logical to physical (L2P) parts of a context and signal the system that the SSD is ready. The context may comprise various state data pertaining to the SSD. After signaling that the SSD may be ready to receive access requests, the SSD control algorithms may begin loading segments of the L2P table sequentially. Access to the L2P table may be blocked, however, when a requested segment has not yet been loaded. In such cases, the SSD control algorithms may then load the requested segment out of turn and then service the access request. | 04-24-2014 |
20140115316 | BOOT LOADING OF SECURE OPERATING SYSTEM FROM EXTERNAL DEVICE - A device for establishing a secure computing environment on a host computer. The device can include an interface configured to couple to the host computer. The device can also include a configuration module configured to identify a file that comprises configuration settings of the host computer's native boot loader that is used to load the host computer's native operating system. The configuration module can create a backup copy of the configuration settings of the native boot loader. The device includes a memory that holds a secure operating system. The device can also include a modification module configured to modify the configuration settings of the host computer's native boot loader to cause the secure operating system to be loaded from the device in place of the native operating system. | 04-24-2014 |
20140122857 | APPARATUS, SYSTEM AND METHOD FOR MOTHERBOARD PERSONALIZATION - An apparatus, system, and method are disclosed for motherboard personalization. An access module | 05-01-2014 |
20140122858 | METHOD FOR ACCELERATING BOOT-UP AND COMPUTER SYSTEM DEVICE - A method for accelerating boot-up and a computer system device are provided. The method includes following steps. An adjusting procedure/program is executed, and the adjusting procedure/program includes adjusting at least one target procedure/program to be at least one delay-executing procedure/program according to a default list. After a boot-up process of the computer system device is completed, and after a default waiting period has passed, the at least one delay-executing procedure/program is executed. Since the service and/or application procedures/programs irrelevant to the boot-up process are not executed during the boot-up process, the boot-up of the computer system device is accelerated effectively. | 05-01-2014 |
20140122859 | CONFIGURING CONFIGURATION SETTINGS USING A USER CONTEXT - An illustrative embodiment of a computer-implemented process for configuring configuration settings authenticates a user of a predetermined system to form an authenticated user and obtains configurable configuration settings associated with the authenticated user for the predetermined system to form obtained settings. The obtained settings are used in a further portion of a power-on process to configure the predetermined system, whereby configuring the predetermined system alters available resources and associated resource consumption of the predetermined system subject to the obtained settings. | 05-01-2014 |
20140122860 | CLOUD SYSTEM AND BOOT DEPLOYMENT METHOD FOR THE CLOUD SYSTEM - A cloud system and boot deployment method is provided to offer flexible and rapid host allocation and operating environment deployment. The cloud system comprises a boot server, a storage machine and a host. The required data for the boot deployment procedure is saved in the storage machine in advance. When the host is assigned the boot operation, a user makes a boot request via the management interface of the boot server to the host. The boot server sets up or transfers the file system according to user request and accesses corresponding images and root file system in the storage machine for performing the boot deployment procedure on the host. When there are different application service requests, the boot server respectively applied shared or proprietary images and root file systems for executing boot deployment operations according to each application request. | 05-01-2014 |
20140129815 | VALIDATION AND/OR AUTHENTICATION OF A DEVICE FOR COMMUNICATION WITH NETWORK - A device may include a trusted component. The trusted component may be verified by a trusted third party and may have a certificate of verification stored therein based on the verification by the trusted third party. The trusted component may include a root of trust that may provide secure code and data storage and secure application execution. The root of trust may also be configured to verify an integrity of the trusted component via a secure boot and to prevent access to the certain information in the device if the integrity of the trusted component may not be verified. | 05-08-2014 |
20140129816 | System and Method for Booting Multiple Servers from Snapshots of an Operating System Installation Image - The disclosure is directed to a system and method for booting a plurality of servers from at least one of a primary storage drive and a secondary storage drive. An operating system installation image is stored in a primary storage drive. Snapshots including modifications to the operating system installation image are stored in a plurality of partitions of a secondary storage device. A lookup table directs servers to read unmodified portions of the operating system installation image from the primary storage drive. The lookup table further directs servers to read modified portions of the operating system installation image from the secondary storage drive. | 05-08-2014 |
20140129817 | DEVICE BOOTING WITH AN INITIAL PROTECTION COMPONENT - Booting a computing device includes executing one or more firmware components followed by a boot loader component. A protection component for the computing device, such as an anti-malware program, is identified and executed as an initial component after executing the boot loader component. One or more boot components are also executed, these one or more boot components including only boot components that have been approved by the protection component. A list of boot components that have been previously approved by the protection component can also be maintained in a tamper-proof manner. | 05-08-2014 |
20140129818 | ELECTRONIC DEVICE AND BOOTING METHOD - The present invention provides an electronic device including a write-once-then-read-only register, a chipset, a read-only memory, a flash memory and a central processor. The write-once-then-read-only register is arranged to store a determination value. The chipset is arranged to produce a CPU reset signal. The read-only memory is implemented in the chipset, and has a first memory block which corresponds to a predetermined address and is used to store a first instruction. The flash memory is coupled to the chipset, and has a second memory block which corresponds to the predetermined address and is used to store a second instruction. The central processor is arranged to determine the location of the predetermined address according to the CPU reset signal and the determination value. | 05-08-2014 |
20140129819 | CLOUD CLUSTER SYSTEM AND BOOT DEPLOYMENT METHOD FOR THE SAME - A cloud cluster system and a boot deployment method for the same are disclosed, wherein the cloud cluster system comprises a boot server, a management server, a system storage pool and at least one host. After the host is powered on, the host executes a network boot procedure according to a netboot policy. Next, the host connects to the system storage pool for accessing the corresponding root file system, and downloads the golden image from the boot server in order to complete the network boot procedure. After booted, the host is deployed by the management server. The management server enables the corresponding content of the host according to configurations thus the deployed host acting as the corresponding role in a cloud cluster system. | 05-08-2014 |
20140129820 | METHOD OF UPDATING BOOT IMAGE FOR FAST BOOTING AND IMAGE FORMING APPARATUS FOR PERFORMING THE SAME - An image forming apparatus for updating a boot image for fast booting includes an interface unit to receive a new version of firmware to update a previous version of firmware installed in the image forming apparatus, a non-volatile memory to store a first boot image that is a previous version for the fast booting, and a processor updating a boot image by controlling the stored first boot image to be replaced with a second boot image that is a new version when the received new version of firmware includes the second boot image. | 05-08-2014 |
20140129821 | TEST SYSTEM AND METHOD FOR COMPUTER - A test system for a computer includes a basic input/output system (BIOS) chip, a platform controller hub (PCH) chip, and a baseboard management controller (BMC) chip. The PCH chip performs a test on a component of the computer according to a control instruction outputted by the BIOS chip to determine an operation state of the component. The PCH chip outputs state signals to the BMC chip through a corresponding general purpose input output (GPIO) pin according to a test result of the component. The BMC chip obtains test information according to the state signals received from the corresponding GPIO pin. | 05-08-2014 |
20140136828 | BIOS USER INTERFACE CONTROL USING MOBILE DEVICE - A technique for managing a Unified Extensible Firmware Interface (UEFI) Basic Input/Output System (BIOS)-controlled computing device from a separate mobile computing device is discussed. | 05-15-2014 |
20140136829 | Method, Network Card, and Hard Disk Card for Accessing Shut-Down Hard Disk - A method, a network card, and a hard disk card for accessing a shut-down hard disk are provided. The method includes: after receiving a shutdown instruction sent by a central processing unit (CPU), a coprocessor is powered up and takes over a network card and a secondary hard disk controller; the coprocessor creates an operation instruction according to a data operation request received by the network card; and the coprocessor sends the operation instruction to the secondary hard disk controller, so that the secondary hard disk controller performs a read/write operation on a hard disk. When a computer is shut down, a coprocessor takes over management work of a network and hard disk reading and writing, and a secondary hard disk controller takes responsibility for controlling a read/write operation on a hard disk. Thus, energy is minimized when accessing of a shut-down hard disk is implemented. | 05-15-2014 |
20140136830 | CUSTOMIZING OPERATING SYSTEM BASED ON DETECTED CARRIER - Technology disclosed herein includes a method for loading a carrier specific OS onto a computing device depending on what network the computing device is connected to. The computing device detects an identity of a network to which a computing device is connected or is to be connected during a network identification process executed on the computing device. The network can be identified, e.g., by examining a subscriber identification module (SIM) card electronically connected to the computing device. The device then sends a request including the identity of the network to a remote registration service. In turn the device receives an instruction from the remote registration service identifying a distribution of an operating system (OS) specific for the network. After retrieving the OS distribution, the device loads the distribution of the operating system on the computing device. | 05-15-2014 |
20140136831 | Portable Lightweight LDAP Directory Server and Database - A lightweight embedded directory server with portable LDAP data is disclosed. The directory server and database comprises a processing chip, an on-chip processing unit, an on-chip memory system, and an on chip input/output system. The memory system stores an embedded operating system and an embedded directory server, and is also used for storing data to be processed by the processing unit. The input/output system is provided for connecting the processor chip to one or more applications for supplying directory services to the one or more applications. A portable memory device stores a directory database, and, in use, this memory device is releasably connected to the on chip input/output system. An on-chip driver is used to perform read and write operations on the portable memory device; and a boot loader software program is used for starting execution of the embedded directory service. | 05-15-2014 |
20140143530 | SYSTEMS AND METHODS FOR ISOLATION OF INFORMATION HANDLING RESOURCES IN RESPONSE TO EXTERNAL STORAGE RESOURCE BOOT - An information handling system may include a processor, at least one information handling resource, at least one external port configured to receive an external information handling resource and couple the external information handling resource to the processor, and a basic input/output system. The basis input/output system may comprise a program of instructions executable by the processor and configured to cause the processor to determine whether a current boot session of the information handling system was initiated by a boot from an external storage resource coupled to the at least one external port, and in response to a determination that the current boot session of the information handling system was initiated by a boot from an external storage resource coupled to the at least one external port, disable one or more of the at least one information handling resource for the current boot session. | 05-22-2014 |
20140149730 | SYSTEMS AND METHODS FOR ENFORCING SECURE BOOT CREDENTIAL ISOLATION AMONG MULTIPLE OPERATING SYSTEMS - A method may include designating a key exchange key as an active key exchange key for a boot session of the information handling system. The method may further include during the boot session, in response to a call for updating a value of an authorized database of keys associated with executable code permitted to execute on the information handling system or an authorized database of keys associated with executable code forbidden to execute on the information handling system: determining whether the value is digitally signed with the active key exchange key, determining whether the update is to a database or database entry associated with the active key exchange key, and processing the update in response to determinations that the value is digitally signed with the active key exchange key and that the update is to a database or database entry associated with the active key exchange key. | 05-29-2014 |
20140149731 | DATA DRIVEN HARDWARE CHIPS INITIALIZATION VIA HARDWARE PROCEDURE FRAMEWORK - A method provides processor initialization in different platform environments via a single code set. The method includes: in response to detecting a power-on operation of the processor, a microcontroller retrieving hardware procedures (HWP) framework code from a storage and triggering execution of the HWP framework code on the processor. The execution of the HWP framework code generates a HWP framework that comprises a plurality of application programming interfaces (APIs) which govern how all communication processes involving hardware procedures can be accomplished. The method further includes performing one or more initialization procedures by communicating one or more attribute data via the HWP framework to configure the processor for operation within a specific platform environment in which the processor is to be operated. The HWP framework includes standard interfaces and enables direct updates to hardware procedures without requiring a new flash code or a firmware patch. | 05-29-2014 |
20140149732 | SYSTEM AND METHOD FOR INITIALIZING PROCESSOR CORES IN A MULTIPROCESSOR SYSTEM - A method for initializing processor cores in a multiprocessor system. The method includes a microcontroller initializing a first processor utilizing a common initialization image for all processor cores within the first processor. The first processor detects and executes system firmware. All remaining processors are initialized utilizing the common initialization image. The executing firmware detects a system configuration of the multiprocessor system. A customized processor initialization image for each of the processor cores in the multiprocessor system is generated and stored to a storage device. The processor cores are triggered to enter a power save state in which all initialization settings of the processor cores are lost. In response to all the processor cores entering the power save state, the first processor core of the first processor is re-initialized using a first customized initialization image generated for the first processor core. | 05-29-2014 |
20140156981 | PREBOOT ENVIRONMENT WITH SYSTEM SECURITY CHECK - Booting an operating system that includes a secure preboot environment that performs integrity checks against security threats. A computer system boots to a preboot environment, which performs integrity checks and other anti-malware operations. Once the preboot environment finishes, the system reboots into a regular environment. The preboot environment can reside on a secure portion of a flash memory, with a computer system booting therefrom; or the preboot environment can reside securely in the computer system. The preboot environment includes integrity checks for a regular environment, and anti-malware programming. Once the preboot environment is done, the computer system reboots into a regular environment, such as from the flash memory or on the computer system. The integrity checks confirm that files in the regular environment are unchanged or uninfected. The integrity checks include determining the accuracy of a trusted system configuration on the computer system, such as using a TPM. | 06-05-2014 |
20140156982 | BOOTABILITY WITH MULTIPLE LOGICAL UNIT NUMBERS - Bootability of a computer system with multiple LUNs. A flash device powers-on into a default LUN, from which the system boots, maintaining any other LUNs unavailable. The first LUN reconfigures the system to remove itself as the available LUN, to load a second LUN as the only available LUN, and to reboot the computer system into the newly available second LUN. The second LUN reconfigures the system to load any additional LUNs, such as removable storage on the flash drive. Upon reconfiguration, the system includes multiple LUNs. The second LUN includes an interpolated LUN driver, which exposes additional LUNs before operation of other device drivers. The interpolated LUN driver takes control during boot-up, exposing any available LUNs before the regular environment's operating system. | 06-05-2014 |
20140156983 | Stateless Flexible Boot Control - Techniques are provided herein for optimizing boot order for devices in a data center environment. These techniques may be embodied as a method, apparatus and instructions in a computer-readable storage media to perform the method. A computing apparatus having connectivity to a network receives instructions from a management device in the network. The instructions comprise attributes that are associated with boot devices hosted by the computing apparatus. The attributes are analyzed to determine a priority order for the boot devices. One or more boot devices hosted by the computing apparatus is removed from an initialization process when the one or more boot devices do not match the attributes in the instructions. The remaining boot devices, other than the one or more boot device removed from the initialization process, are initialized in accordance with the priority order. | 06-05-2014 |
20140156984 | MULTI-PROCESSOR SYSTEMS AND BOOTING METHODS THEREOF - Multi-processor systems and methods thereof are provided. In an example, the multi-processor system may include a boot memory including a plurality of boot codes, each of the plurality of boot codes configured to facilitate an initialization process at one of a plurality of intellectual property (IP) blocks, each of the plurality of IP blocks having shared access to the boot memory. In another example, the multi-processor system may receive, from a first processor, a request to provide one of a plurality of boot codes from a boot memory, the received request sent in response to a system initializing signal, may read the requested boot code from the boot memory and may transfer, from a second processor, the read boot code to the first processor. | 06-05-2014 |
20140156985 | IMAGE FORMING APPARATUS, PROGRAM UPDATING METHOD AND COMPUTER-READABLE STORAGE MEDIUM - An image forming apparatus which executes a program and updates the program, and is provided with an updating part configured to store a program prior to updating or a copy of the program prior to the updating and to generate an updating program by executing an updating process of the program, to thereby set the updating program as a boot target, a boot judging part configured to judge whether or not a booting of the updating program was successful and to record information indicating a result of judgement in a storage part, and a restoring part configured to confirm whether or not the booting of the updating program was successful based on the information, and to set the stored, program prior to the updating, as the boot target, if the booting of the updating program failed. | 06-05-2014 |
20140164752 | SYSTEM AND METHOD FOR SELECTING A LEAST COST PATH FOR PERFORMING A NETWORK BOOT IN A DATA CENTER NETWORK ENVIRONMENT - A method is provided in one example embodiment and includes logging in to a multipath target via first and second boot devices instantiated on a network device, the first and second boot devices respectively connected to the multipath target via first and second paths; determining which of the first and second paths comprises a least cost path; and booting the operating system via the least cost path. The determining may include comparing network statistics of the first path with network statistics of the second path, the network statistics comprising at least one of packet loss on the path, errors encountered via the path, and congestion on the path. | 06-12-2014 |
20140164753 | SYSTEM ON CHIP FOR PERFORMING SECURE BOOT, IMAGE FORMING APPARATUS USING THE SAME, AND METHOD THEREOF - A system on chip is provided. The system on chip includes: a first memory in which a plurality of encryption keys are stored, a second memory, a third memory in which an encryption key setting value is stored, and a CPU which decrypts encrypted data which is stored in an external non-volatile memory using an encryption key corresponding to the encryption key setting value from among the plurality of encryption keys, stores the decrypted data in the second memory, and performs boot using data stored in the second memory. Accordingly, security of boot can be improved. | 06-12-2014 |
20140164754 | DEVICE IN COMPUTER SYSTEM - A device includes a PCH including a reset control pin and a disable control pin. A BIOS chip to control the PCH to send a low logic level from the reset control pin to the reset pin to reset a Ethernet controller. A timing adjusting circuit and the Ethernet controller. The Ethernet controller includes a rest pin and a disable pin, the rest pin is connected to the reset control pin via the timing adjusting circuit, and the disable pin is connected to the disable control pin via the timing adjusting circuit. The PCH sends a low logic level from the disable control pin to the disable pin to disable the Ethernet controller, and the timing adjusting circuit delays the low logic level, which makes the low logic level of the disable pin come later than the high logic level of the reset pin. | 06-12-2014 |
20140164755 | EXTERNAL ELECTRONIC DEVICE - A computer system and its booting and setting method are disclosed. Power supplying and a booting process of the computer system are controlled by a basic input/output system (BIOS). The computer system includes a super input/output chip, a south bridge chipset, and a power supply module. The super input/output chip includes a timer. A counting time is set by the BIOS and the timer counts down when booting the computer system, wherein the counting time is longer than a normal booting time. The south bridge chipset is electrically connected with the super input/output chip and exchanges data between a south bridge chipset and a peripheral device. The power supply module is used for providing power to the computer system. The BIOS controls the timer to stop counting down when the computer system is capable of booting normally. | 06-12-2014 |
20140173263 | BOOTING FROM A TRUSTED NETWORK IMAGE - The present invention extends to methods, systems, and computer program products for booting from a trusted network image. The image can be executed from a trusted source on a Wide Area Network (“WAN”) to perform a maintenance operation, such as, for example, malware scanning, operating system repair, factory reset, etc. at the computer system. Trust can be established using a Certificate Authority or an out of band communication channel (e.g., voice communication, text message, electronic mail, etc.) to retrieve a one-time pad (“OTP”). Using the OTP the computer can validate that it is connected to the trusted source. The trusted source can chain to additional images hosted on a third-party server. The additional images can provide a user with options for various different maintenance operations or various different implementations of the same maintenance operation. For example, the trusted source can link to multiple different malware scanners. | 06-19-2014 |
20140173264 | PRIORITY ACTIVATION OF METROLOGY DRIVER IN BOOT SEQUENCE - The techniques described herein implement an operating system that can reliably process time sensitive information in non real-time manner. Thus, the operating system described herein is capable of processing an instance of time sensitive input during a time period after the instance of time sensitive input is received (e.g., at a future point in time). To accomplish this, the techniques timestamp each instance of time sensitive input when it is received at a device. The techniques then store the timestamped instance of time sensitive input in a temporary queue, and make the timestamped instance available to the operating system at a time period after the time period when it is received, as indicated by the timestamp. Additional techniques described herein prioritize the activation of a driver configured to receive the time sensitive information during a bootup sequence or a reboot sequence. | 06-19-2014 |
20140173265 | Protecting Memory Contents During Boot Process - Embodiments include methods, systems, and computer storage devices directed to identifying that a trusted boot mode (TBM) control bit is set in an input/output memory management unit (IOMMU) and configuring the IOMMU to block a DMA request received by the IOMMU from a peripheral in response to the identifying. | 06-19-2014 |
20140173266 | INFORMATION PROCESSING APPARATUS AND INFORMATION PROCESSING METHOD - One embodiment provides an information processing apparatus including: a setting module configured to allow an administrator to set usable-date/time information during which a user is allowed to use the information processing apparatus; a storage module configured to store the usable-date/time information which is set by the administrator; and a control module configured to control use of the information processing apparatus by the user based on the stored usable-date/time information. | 06-19-2014 |
20140173267 | COMPUTING DEVICE AND METHOD FOR ACCESSING BIOS USING MIDDLEWARE CONTROLLER OF THE COMPUTING DEVICE - A computing device includes a first BIOS chip and a second BIOS chip. Each of the first and second BIOS chips store a BIOS image and comprises a plurality of data blocks to store BIOS data of the BIOS image. During a booting process of the computing device, the BIOS data stored in odd data blocks of the first BIOS chip and the BIOS data stored in even data blocks of the second BIOS chip are respectively accessed and are stored in a cache of a middleware controller. A processor of the computing device accesses the BIOS data from the cache of the middleware controller during the booting process. | 06-19-2014 |
20140173268 | INFORMATION PROCESSING APPARATUS, METHOD FOR CONTROLLING INFORMATION PROCESSING APPARATUS, NON-TRANSITORY RECORDING MEDIUM STORING CONTROL TOOL, HOST DEVICE, NON-TRANSITORY RECORDING MEDIUM STORING PERFORMANCE EVALUATION TOOL, AND PERFORMANCE EVALUATION METHOD FOR EXTERNAL MEMORY DEVICE - According to the embodiments, a nonvolatile memory device is configured to store a normal operating system, and store a bootloader. A host device is capable of initiating the normal operating system by using the bootloader. The host device is configured to determine whether a first condition is established based on information obtained from the nonvolatile memory device; and rewrite, when determined the first condition is established, the bootloader so that an emergency software is initiated when booting the host device. The emergency software is executed on the host device. The host device is capable of issuing only a read command to the nonvolatile memory device under a control of the emergency software. | 06-19-2014 |
20140181489 | CLOUD TRANSFORMABLE DEVICE - Technologies for performing a platform transformation on a computing device include transforming a transformable component of the computing device from a first hardware configuration in which a first set of hardware features is enabled to a second hardware configuration in which different hardware features are enabled. The computing device has a first capability when in the first configuration and a different capability when in the second configuration. In performing the platform transformation, the computing device determines a platform transformation build, establishes a communication connection with a cloud-based platform transformation service, and identifies and retrieves relevant platform definitions from the cloud-based platform transformation service. The platform definitions are used in effecting the desired platform transformation. | 06-26-2014 |
20140181490 | BOOT FROM MODIFIED IMAGE - A new image being hosted by the device is modified. The modification is based on a main image operating the device. The device is booted from the modified image. | 06-26-2014 |
20140181491 | FIELD-PROGRAMMABLE MODULE FOR INTERFACE BRIDGING AND INPUT/OUTPUT EXPANSION - One or more specialized field programmable modules (e.g. CPLD and FPGA blocks) and their programming interface are embedded into a processing system (e.g. a CPU, GPU, APU and/or chipset). The field programmable modules are in-system programmable, in contrast to the application specific integrated circuit (ASIC) modules that perform the core functions of the processing system. The programmable flexibility of the field programmable modules can have various benefits during different stages of the integrated circuit life cycle for the processing system, such as reconfigurable interface bridging and two-way I/O expansion. | 06-26-2014 |
20140181492 | METHOD OF BOOTING AN ELECTRONIC SYSTEM AND AN ELECTRONIC SYSTEM APPLYING THE SAME - In a method of booting an electronic system, a processor generates a booting request signal in response to an external control signal, and a memory controller enables the processor to read and execute a first boot program stored in a first memory in response to the booting request signal. The processor generates a booting success signal when booting using the first boot program is successful. The memory controller enables the processor to change, from reading and executing the first boot program stored in the first memory to reading and executing a second boot program stored in a second memory for booting of the electronic system, according to at least one of the booting request signal and the booting success signal. | 06-26-2014 |
20140181493 | TECHNIQUE FOR DEPLOYING OPERATING SYSTEMS IN A VIRTUALIZED ENVIRONMENT - Systems and methods are disclosed herein to a method of deploying a guest disk comprising: creating a plurality of virtual disks; partitioning each virtual disk into at least an OS partition and a data partition; launching virtualization software; booting the restore environment; downloading a OS partition image file and a data partition image file, wherein the OS partition image file and the data partition image file are smaller than a final system's OS and data partitions; expanding the OS partition image file onto the guest disk's OS partition to create an OS file system; expanding the data partition image file onto the guest disk's data partition to create a data file system; and resizing an OS file system and the data file system to access unused. portions of the OS and data partitions. This resizing results in increased efficiencies in the area of engineering development, manufacturing, and customer usage | 06-26-2014 |
20140181494 | SETTING METHOD, PROGRAM, AND INFORMATION PROCESSING APPARATUS - According to one embodiment, a setting method, includes storing, in a first partition of a storage which stores a first file causing a processor to execute a first program to booting an operating system, a second file having a same path as a path of the first file and causing the processor to execute a second program. The second program is executed by the processor at activation of an information processing apparatus and causing the processor to execute the first program. | 06-26-2014 |
20140181495 | SYSTEM ON CHIP INCLUDING BOOT SHELL DEBUGGING HARDWARE AND DRIVING METHOD THEREOF - A system on chip (SOC) includes a first memory configured to store a primary bootloader for providing an environment in which a boot shell is to be executed; and a processor configured to execute the primary bootloader to initialize hardware. The boot shell includes at least one instruction for debugging the hardware, and the processor executes the boot shell and debugs the hardware before a platform is loaded. | 06-26-2014 |
20140181496 | Method, Apparatus and Processor for Reading Bios - An embodiment method for reading a BIOS includes receiving a reset signal of a processor, and generating a first start address or a second start address according to the reset signal, and reading a BIOS in a storage chip according to the first start address or the second start address. The first start address corresponds to a storage address of a primary BIOS stored in the storage chip, and the second start address corresponds to a storage address of a backup BIOS stored in the storage chip. When reading the BIOS, the processor may generate the first start address or the second start address according to the reset signal, so as to read the primary BIOS or the backup BIOS, which may improve universality of BIOS reading. | 06-26-2014 |
20140181497 | USER INTERFACE WITH SPLASH SCREEN - A user interface for a host data processing system includes a display screen and a display controller adapted to receive image data from the host processing system and to display them on the screen. The display controller has access to a non-volatile screen memory storing data for generating a splash screen at least during a start-up of the host processing system when image data from the host processing system are not yet available. The display controller is adapted to update the screen memory in response to commands received from the host processing system, and to display an updated splash screen upon the next start-up. | 06-26-2014 |
20140181498 | METHOD AND APPARATUS FOR SUPPORTING DYNAMIC CHANGE OF AUTHENTICATION MEANS SECURE BOOTING - A method for supporting change of the authentication means for secure booting with the change of the trust root (root of trust) of the readymade electronic device and the electronic device therefor is provided. The secure boot generation method of an electronic device of the present disclosure includes storing plural initial certificates including a first initial certificate and a second initial certificate, designating the first initial certificate as a root certificate for secure booting of the electronic device, and switching the initial certificate from the first initial certificate to the second initial certificate in response to a request. Various other embodiments are possible. | 06-26-2014 |
20140181499 | METHOD FOR IMPROVING BOOTING OF A COMPUTING DEVICE - It is disclosed a method for a non-volatile digital data storage optimization for a computing device. A source physical data layout is first generated which comprises computer executable instructions. A bootup test of the computing device with the source physical data layout is then executed and the sequence of access to memory blocks of a non-volatile memory is recorded. A final physical data layout is then obtained by organizing data of the source physical data layout according to the recorded sequence. A mapping table is then generated which maps memory blocks of the source physical data layout to memory blocks of the final physical data layout. The mapping table is stored in a non-volatile memory unit so that the computing device can execute the computer executable instructions of the final physical data layout by retrieving data in data blocks whose physical position is defined by the mapping table. | 06-26-2014 |
20140181500 | BIOS Network Access - Embodiments provide devices and operations which enable a computing device to access a network. The computing device may execute a basic input/output system (BIOS). In response to the BIOS, the computing device may establish a wireless link with a client device and receive, from the client device, network access information. | 06-26-2014 |
20140189335 | FIRMWARE UPGRADE ERROR DETECTION AND AUTOMATIC ROLLBACK - A system includes a utility meter. The utility meter includes a network interface and a processor. The processor is configured to determine whether the network interface is operational subsequent to a bootup of the utility meter. The processor is also configured to initiate a reboot of the utility meter using known valid firmware instruction set of the utility meter if the network interface is determined to be non-operational. | 07-03-2014 |
20140189336 | METHODS AND APPARATUS TO SUPPORT AUTHENTICATED VARIABLES - Methods and apparatus to support authenticated variables are disclosed. An example method includes, in response to an update request directed to an authenticated variable of a computing platform and received during a second stage of a first instance of a booting process, the booting process including a first stage and the second stage, restricting the update request from accessing the authenticated variable during the second stage of the first instance of the booting process and storing the update request in a queue. | 07-03-2014 |
20140189337 | ELECTRONIC DEVICE HAVING UPDATABLE BIOS AND BIOS UPDATING METHOD THEREOF - An electronic device having updatable BIOS is used to perform a BIOS updating method. The electronic device electrically connects to a server, in which update data is stored. The electronic device includes a Basic Input/Output System (BIOS), a network connection module and a switch. A BIOS program is stored in the BIOS, and a connecting program is stored in the network connection module for connecting to the server. When the electronic device is updating, the BIOS switches to electrically connect to the network connection module via the switch, and the network connection module connects to the server by executing the connecting program, downloads the update data applying to the BIOS, and overwrites the update data to the BIOS to update the BIOS program. | 07-03-2014 |
20140189338 | ELECTRONIC DEVICE AND METHOD FOR DETECTING BOOTING TIME PERIOD FOR ELECTRONIC DEVICE - An electronic device includes a boot controlling chip, a power switch, a display unit, a power management unit and a processing unit. The power switch generates an electronic signal to the boot controlling chip while being triggered by a user. The boot controlling chip includes a boot sequence controlling module and a timer. The boot sequence controlling module controls the electronic device to boot in preset steps when the electronic signal is received. The timer starts timing when the electronic signal is received and ends timing when the boot sequence controlling module controls the electronic device to finish a login step of the boot steps, and the timer obtains a time of the interval. The processing unit controls the display unit to show the time value. A method for detecting boot time of an electronic device is also provided. | 07-03-2014 |
20140189339 | Method For Switching Between Virtualized and Non-Virtualized System Operation - A method performed by an embedded system controlled by a CPU and capable of operating as a virtualized system under supervision of a hypervisor or as a non-virtualized system under supervision of an operating system, is provided. The embedded system is executed in a normal mode if no execution of any security critical function is required, where the normal mode execution is performed under supervision of the operating system. If a security critical function execution is required, where protected mode execution is performed under supervision of the hypervisor, the operating system is switching execution of the embedded system from normal mode to protected mode, by handing over the execution of the embedded system from the operating system to the hypervisor. When execution of the security critical function is no longer required by the system is switched from protected mode to normal mode, under supervision of the hypervisor. | 07-03-2014 |
20140189340 | SECURE BOOT INFORMATION WITH VALIDATION CONTROL DATA SPECIFYING A VALIDATION TECHNIQUE - Examples disclosed herein relate to secure boot information with validation control data specifying a validation technique. Examples include determining, with the specified validation technique, whether validation data is consistent with the secure boot information. | 07-03-2014 |
20140195791 | METHODS AND SYSTEMS FOR INSTANT RESTORE OF SYSTEM VOLUME - Techniques are disclosed for restoring a system volume on a computing system without requiring the system volume to be fully restored prior to being used or requiring the use of a dedicated recovery environment (e.g., the WinPE or BartPE environments). Instead, the computing system is booted directly from the restore image or by redirecting I/O interrupts to the restore image. That is, when user initiates a restore process, the system boots from the backup itself. Once booted, a background process can complete the restore process. | 07-10-2014 |
20140195792 | HIDING BOOT LATENCY FROM SYSTEM USERS - Methods and systems may provide for identifying a proximity condition between a system and a potential user of the system. In addition, one or more boot components of the system can be activated in response to the proximity condition, wherein one or more peripheral devices associated with the system are maintained in an inactive state. In one example, at least one of the one or more peripheral devices is placed in an active state in response to detecting an activation condition of the system. | 07-10-2014 |
20140201511 | METHOD AND APPARATUS FOR OPTIMIZING OUT OF BAND JOB EXECUTION TIME - A method of performing an out of band (OOB) job at a host is disclosed. A boot option query is transmitted from the host to a service processor. It is then determined if a current boot option is an OOB job. At least one of a job type and a device type associated with the OOB job is identified if the current boot option is an OOB job. An Option ROM and a driver relating to the identified job type and the identified device type is then selectively loaded and the OOB job is performed. | 07-17-2014 |
20140201512 | DATA STORAGE FOR REMOTE ENVIRONMENT - A method can include receiving operating system environment settings via a network; storing the received operating system environment settings to a storage device; establishing an operating system environment according to the stored operating system environment settings; receiving information via the network; instructing the established operating system environment according to the received information; and, in response to the instructing, transmitting via the network information generated at least in part by the established operating system environment. Various other apparatuses, systems, methods, etc., are also disclosed. | 07-17-2014 |
20140201513 | POWER MANAGEMENT CIRCUIT, SERVER, AND POWER MANAGEMENT METHOD THEREOF - A server is provided in the present disclosure, and the server includes a power module, a motherboard circuit, and a power management circuit. The power management circuit is coupled to the motherboard circuit and the power module. The motherboard circuit receives a remote control signal through a network module and outputs a power-off command to the power management circuit according to the remote control signal. The power management circuit causes the power module to stop supplying power to the motherboard circuit for a predetermined time according to the power-off command. After the predetermined time, the power management circuit causes the power module to supply power again to the motherboard circuit to execute an initialization procedure. | 07-17-2014 |
20140201514 | COMPUTER DEVICE AND BOOT METHOD THEREOF - A computer device and a boot method thereof are provided. The method is applicable to a computer with a Basic Input Output System (BIOS) and an Operating System (OS). The computer includes a chassis and a memory. In the boot method, after the computer is started, it is judged whether the chassis is opened in an interval from the last boot time to the current boot time. If the chassis is not opened in the interval from the last boot time to the current boot time, the BIOS does not detect hardware elements connected to the computer to obtain setting and parameter values of each hardware element, but reads directly the setting and parameter values of each hardware element that are stored in the memory last time, initializes each hardware element, transmits the setting and parameter values to the OS, and executes the OS to complete the boot process. | 07-17-2014 |
20140201515 | Imaging process - A user-friendly system, method, and program product for installing an image on a computer, the method comprising: booting the computer ( | 07-17-2014 |
20140208089 | System and Method for Dynamically Changing System Behavior by Modifying Boot Configuration Data and Registry Entries - A method includes booting an information handling system, starting a BIOS on the information handling system, storing configuration information for the information handling system, retrieving, by an operating system (OS) loader, the configuration information, determining, by the OS boot manager, that a configuration of the information handling system indicated by the configuration information is incompatible with an OS loaded on the information handling system by the OS boot manager, determining, by the OS boot manager, that the incompatibility can be mitigated by changing a setting of the information handling system, changing, by the OS boot manager, the setting in response to determining that the incompatibility can be mitigated, and launching, by the OS boot manager, the OS in response to changing the setting. | 07-24-2014 |
20140208090 | SYSTEMS AND METHODS FOR COMMAND-BASED ENTRY INTO BASIC INPUT/OUTPUT SYSTEM SETUP FROM OPERATING SYSTEM - In accordance embodiments of the present disclosure, a method may include, during execution of an operating system on an information handling system and responsive to a user input indicating a desire to invoke a basic input/output system (BIOS) setup program for configuring a BIOS, prompting for and receiving user-provided credentials via a user interface communicatively coupled to the processor. The method may also include, during execution of the operating system, passing BIOS credentials to the BIOS based on the user-provided credentials. The method may additionally include, during execution of the operating system determining, by the BIOS, if the BIOS credentials are valid. The method may further include, responsive to determining that the BIOS credentials are valid, setting a flag to a value indicating that the BIOS setup program is to be invoked on a subsequent boot of the information handling system. | 07-24-2014 |
20140208091 | METHOD AND SYSTEM FOR DYNAMICALLY RESIZING ENCLOSED STORAGE DEVICE PARTITIONS - A computer-implemented method for updating a recovery operating system (OS) stored in a boot partition of a storage device. The method involves booting, via host operating system (OS) boot files stored in the boot partition, a host OS that is stored in a host partition of the storage device, receiving a request to update a recovery OS also stored in the boot partition, determining the recovery OS update requires additional storage space of size Z to be added to the boot partition, decreasing the size of the host partition by the size Z, increasing the size of the boot partition by the size Z, and updating the recovery OS. | 07-24-2014 |
20140208092 | Method For Updating Firmware of a Battery Included in a Rechargeable Battery Module, Portable Electronic Device, and Rechargeable Battery Module - In a method for updating firmware of a battery included in a rechargeable battery module of a portable electronic device, the portable electronic device stores a booting instruction set of the firmware in a battery monitoring unit of the rechargeable battery module, and stores a basic input/output system (BIOS) of the portable electronic device in a non-volatile memory disposed externally of the rechargeable battery module. In response to BIOS update information that includes an updated main instruction set of the firmware, the portable electronic device updates the BIOS, including the main instruction set of the firmware using the BIOS update information. | 07-24-2014 |
20140208093 | ELECTRONIC DEVICE WITH A PLUALITY OF BOOTING MODES - An electronic device with a plurality of booting modes comprises at least a button unit, a control module, a control chip unit, a super I/O unit and a Basic Input/Output System (BIOS). One of the button units outputs a first signal according to a trigger event. The control module includes a buffer unit connected to the button units. The control module sets the buffer unit according to the first signal. The control module outputs a status signal and copies the first signal and outputs the first signal after a delay time. The control chip unit receives the status signal. The super I/O unit receives the first signal outputted from the control module and transmits the first signal to the control chip unit. When the control chip unit receives the status signal and the first signal, the BIOS executes the corresponding booting procedure according to the status signal. | 07-24-2014 |
20140215196 | BOOT DRIVER VERIFICATION - An example system in accordance with the present disclosure includes a secure hash calculation engine to intercept and calculate a secure hash for a pre-boot driver before the pre-boot driver is executed, wherein the pre-boot driver is executed based on the computed secure hash being successfully verified, and wherein the pre-boot driver is not executed based on the computed secure hash not being successfully verified. | 07-31-2014 |
20140215197 | Network Booting System and Method - A target machine in a sub-network requires network booting. The target machine broadcasts messages in the sub-network indicating that the target machine needs booting, and which are detected by other machines in the sub-network which are capable of booting the target machine. The other machines respond to the messages by electing one of them as a master boot control for the target machine. The elected machine controls booting of the target machine. | 07-31-2014 |
20140215198 | METHOD AND SYSTEM TO PROVIDE A VARIABLE TICK RATE FOR THE KERNEL - A system and a method are disclosed for providing a variable tick rate for the kernel of an operating system. In one example, the method includes receiving, by a processing device, a desired tick rate for a kernel of an operating system, comparing the desired tick rate with a default tick rate, and updating a tick rate parameter of the kernel with the desired tick rate when the desired tick rate is different from the default tick rate. | 07-31-2014 |
20140215199 | FAST-BOOT LIST TO SPEED BOOTING AN OPERATING SYSTEM - A method for booting to an operating system stored on a solid state drive. The method comprises the steps of (A) determining if a boot list has one or more entries, (B) pre-reading one or more logical block addresses of each of the entries from the boot list, (C) receiving a command from a host, (D) reading the command from a memory internal to the solid state drive if the command is in a cache area of the pre-read logical block addresses and (E) reading the command from a main portion of the solid state drive if the command is not in the cache. | 07-31-2014 |
20140215200 | DATA PROCESSING DEVICE WITH SERIAL BUS THAT NEEDS INITIALIZATION BEFORE USE - A data processing device | 07-31-2014 |
20140223154 | COMPUTER SYSTEM - A computer system is disclosed. The computer system comprises a near field communication (NFC) tag and a computer. The computer comprises a flash read only memory (ROM), a chipset, an NFC module and a central processing unit (CPU). The flash ROM stores a basic input/output system (BIOS) having a default user identification (UID) and a default entry key data. The chipset comprises a keyboard buffer. The NFC module reads a UID seed from the NFC tag when the NFC tag is close to the NFC module. The CPU generates a current UID according to the UID seed and a function, and determines whether the current UID is equal to the UID. The CPU writes the default entry key data to the keyboard buffer if the current UID is equal to the UID. | 08-07-2014 |
20140223155 | FAST LEARNING TO TRAIN LEARNING MACHINES USING SMART-TRIGGERED REBOOT - In one embodiment, a triggered reboot of a field area router (FAR) of a computer network is initiated, and gathered states of the FAR are saved. The nodes in the computer network are informed of the triggered reboot, and then feedback may be collected from the nodes in response to the triggered reboot. As such, it can be determined whether to complete the triggered reboot based on the feedback, and the FAR is rebooted in response to determining to complete the triggered reboot. In another embodiment, a node receives information about the initiated triggered reboot of the FAR, and determines whether it has critical traffic. If not, the node buffers non-critical traffic and indicates positive feedback in response to the triggered reboot, but if so, then the node continues to process the critical traffic and indicates negative feedback in response to the triggered reboot. | 08-07-2014 |
20140223156 | METHOD AND APPARATUS TO SUPPORT SEPARATE OPERATING SYSTEMS IN PARTITIONS OF A PROCESSING SYSTEM - A processing system with multiple processing units may support separate operating systems (OSs) in separate partitions. During an initialization process, a preboot manager in the processing system may copy software to a sequestered area of memory in the processing system. The preboot manager may also configure the processing system to hide the sequestered area of memory from a first partition of the processing system. Also, the preboot manager may use a first processing unit in the processing system to boot an OS on the first partition, and the preboot manager may transmit a boot trigger from the first processing unit to a second processing unit in the processing system. The boot trigger may cause the second processing unit to use the software in the sequestered area of memory to boot a second partition of the processing system. Other embodiments are described and claimed. | 08-07-2014 |
20140223157 | COMPUTER SYSTEM HAVING VOICE-CONTROL FUNCTION AND VOICE-CONTROL METHOD - The invention discloses a computer system having voice-control function. The computer system includes a voice-recognition module, a shared memory, a microcontroller, a power-management module and a central processing unit. The voice-recognition module receives an external voice signal via a microphone and determines whether the external voice signal corresponds to an operation instruction. The shared memory is used for storing shared state information. The microcontroller is used for setting the shared state information according to the operation instruction when the external voice signal corresponds to the operation instruction. The power-management module generates a power-management signal according to the shared state information in the shared memory. When the power-management module transmits the power-management signal, the central processing unit executes a processing operation corresponding to the operation instruction according to the shared state information in the shared memory. | 08-07-2014 |
20140223158 | BOOTING DISPLAY CONTROL METHOD AND RELATED PROCESSOR CHIP - A booting display control method and a processor chip are disclosed in the present invention. The processor chip includes at least a first processor, a second processor and a display control module. The second processor is coupled to the first processor. The display control module is coupled to the first processor and the second processor. After the first processor and the second processor are activated, the first processor will load an image file of an operating system and start the operating system, and the second processor will control the display control module to realize a booting display function. The booting display control method and the processor chip can be implemented in the fast display during the booting process. | 08-07-2014 |
20140223159 | BOOTING METHOD AND ELECTRONIC DEVICE - A booting method is provided. In the booting method, a basic input/output system (BIOS) is activated to check a first set value. When the first set value corresponds to a fast boot mode, the BIOS performs a fast boot process, in which the fast boot process is interrupted when the BIOS receives a system control interrupt. The BIOS changes a second set value and the first set value according to the system control interrupt, so that the first set value corresponds to a normal boot process. Next, the BIOS is reactivated. Further, the BIOS performs a normal boot process when the first set value corresponds to the normal boot mode, in which the BIOS checks the second set value, so as to execute an operating process corresponding to the second set value and recover the second set value and the first set value. | 08-07-2014 |
20140223160 | ELECTRONIC DEVICE AND FIRMWARE UPGRADING METHOD THEREOF - A firmware upgrading method for an electronic device is provided. The electronic device includes a storage section which stores a firmware image and a controller which executes a boot loader of the electronic device to determine whether the firmware image is damaged, performs a restoration function for the firmware image if the firmware image is damaged, and executes an operating system (OS) to perform normal operations if the firmware image is not damaged. | 08-07-2014 |
20140223161 | ELECTRONIC DEVICE AND BOOTING METHOD THEREOF - An electronic device includes: a clock divider configured to divide a received main clock signal and generate a plurality of divided clock signals; a storage configured to store booting data; and a controller which, upon supply of power, is configured to generate the main clock signal and output the main clock signal to the clock divider, and output a control signal to read the booting data based on the divided clock signals after a predetermine time for stabilizing the divided clock signals has elapsed. | 08-07-2014 |
20140223162 | System and Method for an Access Controller Assisted Boot - Systems and methods for reducing problems and disadvantages associated with network boots are disclosed. In accordance with an embodiment of the present disclosure, an information handling system comprises a processor, a memory communicatively coupled to the processor, and an access controller communicatively coupled to the processor. The access controller has stored thereon a general pre-boot file and configured to receive boot configuration information from a management server. The access controller further configured to generate a boot script according to the boot configuration information and generate a specific pre-boot file based on the general pre-boot file and the boot script. The access controller is further configured to configure the information handling system to boot to a target based on the specific pre-boot file. | 08-07-2014 |
20140223163 | SECURE RECOVERY APPARATUS AND METHOD - A system and method is disclosed for recovering a boot image from a secure location. Hardware instructions initiate a sequence of boot cycles to launch a computer operating system on a computer-enabled device. During the boot cycles, multiple levels of boot code are verified and a determination is made whether each level is usable by the device. If a level of boot code is determined to be unusable, a secure copy of the boot code is loaded from a secure read-only location to repair the unusable code to launch the computer operating system. | 08-07-2014 |
20140237223 | SYSTEM BOOT WITH EXTERNAL MEDIA - Various aspects of the present disclosure provide for a system that is able to boot from a variety of media that can be connected to the system, including SPI NOR and SPI NAND memory, universal serial bus (“USB”) devices, and devices attached via PCIe and Ethernet interfaces. When the system is powered on, the system processor is held in a reset mode, while a microcontroller in the system identifies an external device to be booted, and then copies a portion of boot code from the external device to an on-chip memory. The microcontroller can then direct the reset vector to the boot code in the on-chip memory and brings the system processor out of reset. The system processor can execute the boot code in-place on the on-chip memory, which initiates the system memory and the second stage boot loader. | 08-21-2014 |
20140237224 | NETWORK BOOT SYSTEM - [SUBJECTS] In a network boot system having a read cache mechanism, the subject is to suppress a decreased boot time of a terminal due to an access with respect to a local disk. | 08-21-2014 |
20140237225 | INFORMATION PROCESSING APPARATUS, CONTROL METHOD FOR INFORMATION PROCESSING APPARATUS, AND PROGRAM - An information processing apparatus includes a first processing unit, a second processing unit which is different from the first processing unit, a supply unit configured to supply a clock to the first processing unit and the second processing unit, and a control unit configured to control the supply unit in such a manner as to stop a supply of the clock to the second processing unit in response to completion of activation of the second processing unit, and to resume the supply of the clock to the second processing unit in response to completion of activation of the first processing unit. | 08-21-2014 |
20140237226 | OPTION READ-ONLY MEMORY USE - Example embodiments disclosed herein relate to altered option read-only memory. A copy of an option read-only memory is stored. The copy is used during a boot process based on a determination that the option read-only memory has been altered. | 08-21-2014 |
20140244988 | SELF-HEALING OF OPERATING SYSTEM COMPONENTS - Aspects of the subject matter described herein relate to operating system technology. In aspects, a mechanism is described that allows self-healing actions to correct operating system problems. The self-healing actions may be performed at virtually any time during the loading and executing of operating system components. Earlier placement of the self-healing actions may allow correction of more operating system component problems than later placement. In one implementation, while self-healing actions are occurring, the instantiating of additional operating system components is not allowed. After the self-healing actions have completed, the instantiating of additional operating system components may continue. | 08-28-2014 |
20140244989 | PEER-TO-PEER NETWORK BOOTING - A technique for booting a computing device using a boot image that is downloaded from a distributed network booting system involves identifying a tracker computing device that manages a plurality of computing devices that store all or a portion of the boot image, receiving from the tracker computing device information about one or more computing devices from which to download the boot image, and downloading the boot image from the one or more computing devices. | 08-28-2014 |
20140244990 | METHOD AND APPARATUS FOR PREFETCHING PERIPHERAL DEVICE DRIVERS FOR SMART PHONES AND OTHER CONNECTED DEVICES PRIOR TO HLOS BOOT - Apparatus and methods for booting a user equipment are described. A device boot of the user equipment may be performed. Peripherals and associated drivers for the user equipment may be configured. A high-level operating system (HLOS) may be booted. The configuring may occur before the booting of the HLOS. Apparatus and methods for loading peripheral device drivers for a user equipment are also described. Peripherals that can be associated with a user equipment may be determined. Drivers for the determined peripherals may be loaded. The loaded drivers may be associated with a high-level operating system (HLOS) architecture regardless of a type of user equipment on which the HLOS is provided. | 08-28-2014 |
20140244991 | Patching Boot Code of Read-Only Memory - The present disclosure describes apparatuses and techniques for patching boot code of read-only memory (ROM). In some aspects, execution of boot code from a ROM is initiated to start a boot process of a device. Execution of the boot code from the ROM is then interrupted to enable execution of other boot code, such as corrected boot code or additional boot code, from another memory. Once the other boot code is executed, execution of the boot code from the ROM is resumed to continue booting the computing device. By so doing, the corrected boot code or additional boot code can be executed during the boot process effective to patch the boot code stored in the ROM. | 08-28-2014 |
20140244992 | Extensible Firmware Interface External Graphic Card, Mainframe System, and Extensible Firmware Interface BIOS Booting Method - A central processing unit of a mainframe system is configured to load a physical graphic card driver into a memory of the mainframe system for performing a display function when the mainframe system is not connected to an Extensible Firmware Interface (EFI) external graphic card. The central processing unit is further configured to load a virtual graphic card driver into the memory of the mainframe system for performing the display function when the mainframe system is connected to the EFI external display card. | 08-28-2014 |
20140244993 | METHOD OF UPDATING THE OPERATING SYSTEM OF A SECURE MICROCIRCUIT - A method of loading an operating program in a secure microcircuit, includes the steps of: downloading and installing in the microcircuit a boot program, which is launched upon activation of the microcircuit, loading into the microcircuit initialization data including a first public key, performing a mutual authentication procedure between the microcircuit and a first server having a private key corresponding to the first public key, and if the mutual authentication is successful, loading from the first server operating program profile data holding a second public key, performing a mutual authentication procedure between the microcircuit and a second server having a private key corresponding to the second public key, and if the mutual authentication is successful, loading an operating program from the second server and installing it in the microcircuit, and activating the operating program when it is in the microcircuit. | 08-28-2014 |
20140244994 | Method, apparatus and system for binding MTC device and UICC - A method for binding a Machine Type Communication (MTC) device and a Universal Integrated Circuit Card (UICC) is disclosed. The method includes: during a process of establishment of a shared key, a Network Application Function (NAF) acquires identity information of the MTC device and identity information of the UICC ( | 08-28-2014 |
20140250290 | Method for Software Anti-Rollback Recovery - A temporary anti-rollback table—which is cryptographically signed, unique to a specific device, and includes a version number—is provided to an electronic device requiring a replacement anti-rollback table. The table is verified by the device, and loaded to memory following a reboot. The memory image of the table is used to perform anti-rollback verification of all trusted software components as they are loaded. After booting, the memory image of the table is written in a secure manner to non-volatile memory as a replacement anti-rollback table, and the temporary anti-rollback table is deleted. The minimum required table version number in OTP memory is incremented. The temporary anti-rollback table is created and signed using a private key at authorized service centers; a corresponding public key in the electronic device verifies its authenticity. | 09-04-2014 |
20140250291 | CONTINUATION OF TRUST FOR PLATFORM BOOT FIRMWARE - This disclosure is directed to continuation of trust for platform boot firmware. A device may comprise a processing module and a memory module including read-only memory (ROM) on which is stored platform boot firmware. On activation, the processing module may load the platform boot firmware. The platform boot firmware may cause the processing module to first load a trusted pre-verifier file to load and verify the signature of a hash table loaded from the platform boot firmware. The processing module may then load firmware program files from the platform boot firmware, calculate a hash for each file, and verify whether each program hash is in the hash table. Firmware program files with hashes in the hash table may be allowed to execute. If any firmware program file hash is not in the hash table, the processing module may perform platform specific security actions to prevent the device from being compromised. | 09-04-2014 |
20140250292 | SERVER INFORMATION HANDLING SYSTEM CONFIGURATION FROM AN END STATE DEFINITION FILE - One step server information handling system configuration reduces complexities associated with remote server maintenance through a management network. A configuration end state sent through the management network, such as an XML file, is parsed by a management processor to automatically initiate and complete configuration of the server to the end state without further commands through the management network. | 09-04-2014 |
20140250293 | METHOD, APPARATUS, SYSTEM, AND MACHINE READABLE STORAGE MEDIUM FOR PROVIDING SOFTWARE SECURITY - Technologies are provided in example embodiments for determining that a module is to be loaded, the module being associated with module code, determining that the module is a frozen module, the frozen module being associated with frozen module code, determining that a module fingerprint of the module fails to correspond with a frozen module fingerprint of the frozen module, and causing loading of the frozen module code instead of the module code. | 09-04-2014 |
20140250294 | Router And A Virtual Trusted Runtime BIOS - An implementation may include a virtual trusted runtime BIOS managed by the virtual machine monitor. A replacement portion of the virtual trusted runtime BIOS may be included. A router can replace an address to a resource of the virtual trusted runtime BIOS with the address to the resource of the replacement portion of the virtual trusted runtime BIOS. | 09-04-2014 |
20140250295 | LOAD BOOT DATA - Embodiments herein relate to loading boot data. In an embodiment, a device loads boot data from a first portion of a first non-volatile memory to complete a first booting of the device. The first portion of the first non-volatile memory is then released to allow the device to overwrite the first portion. Next, the boot data is written to the first non-volatile memory before the device enters a reduced power state. The written boot data is to be loaded from the first non-volatile memory to complete a second booting of the device, if the second booting is initiated. | 09-04-2014 |
20140258699 | BOOT FAULT TOLERANT DEVICE AND METHOD THEREOF - An auto firmware update device and method for fault-tolerance is provided. According to an embodiment of the invention, the auto firmware update device includes a serial port, a processor, a timer, a memory and a control unit. The serial port is used for coupling to an external device and updating firmware. The processor fetches instructions to boot. The timer is configured to start counting when the processor boots or restart each time, wherein the timer generates an alarm signal if the timer expires before the processor successfully boots. The memory stores a copy of firmware for booting. The control unit receives the alarm signal to stop the processor, downloads another copy of firmware for booting through the serial port to write to the memory, and restarts the processor. | 09-11-2014 |
20140258700 | DYNAMICALLY LOADED MEASURED ENVIRONMENT FOR SECURE CODE LAUNCH - A “Secure Code Launcher” establishes platform trustworthiness, i.e., a trusted computing base (TCB), and uses hardware or firmware based components to securely launch one or more software components. The Secure Code Launcher measures and loads software components by interfacing with security extension functionality integral to one or more hardware or firmware-based components in the computing device. For example, various embodiments of the Secure Code Launcher include firmware-based components that interface with security extension functionality integral to the computing device to measure and load boot managers, operating system (OS) loaders, or other OS components including OS kernels. Similarly, the Secure Code Launcher is capable of measuring and loading software components responsible for installing an instance of an OS. In addition, various embodiments of the Secure Code Launcher provide a hypervisor loader that measures and loads a hypervisor which in turn measures and loads operating system components including virtual machines. | 09-11-2014 |
20140258701 | COMPUTING PLATFORM PERFORMANCE MANAGEMENT WITH RAS SERVICES - In some embodiments, a PPM interface may be provided with functionality to facilitate to an OS RAS services for one or more hardware components, regardless of a particular platform hardware configuration, as long as the platform hardware and OS are in conformance with the PPM interface. | 09-11-2014 |
20140258702 | OPERATING METHODS FOR A COMPUTER SYSTEM AND COMPUTER SYSTEM - An operating method for a computer system having system firmware and an operating element to switch on the computer system includes monitoring the operating element for an actuation, immediately after starting actuation of the operating element, performing a first part of a boot sequence, determining a time period for which the operating element is actuated, executing a remaining part of full boot sequence with the system firmware if the determined time period exceeds a predetermined time period, where the full boot sequence includes activation of a keyboard and mouse through the firmware, and executing a remaining part of limited boot sequence with the system firmware if the determined time period does not exceed the predetermined time period, wherein the limited boot sequence does not include at least one of activation of a keyboard and mouse through the firmware. | 09-11-2014 |
20140281448 | SYSTEM AND METHOD TO REDUCE SERVICE DISRUPTION IN A SHARED INFRASTRUCTURE NODE ENVIRONMENT - A method of reducing downtime in a node environment is disclosed. The method includes identifying an originating system board of a plurality of system boards that requires service where the originating system board includes a node operating on a processor. The method further includes identifying a target system board of the plurality of system boards where the target system board includes a target processor. The method further includes transferring operation of the node to the target processor before the originating system board is serviced, and operating the node on the target processor. | 09-18-2014 |
20140281449 | METHOD OF INSTALLING VIRTUAL SERVICE PROCESSOR (VSP) TO COMPUTING DEVICE AND APPLICATION OF THE SAME - Method, system, and storage media for remotely installing a virtual service processor (VSP) to a computing device are disclosed. The computer device initiates a preboot execution environment (PXE) client and receives a VSP installation file from a PXE server. The VSP installation file includes a VSP file, a universal plug and play (UPnP) service file, and a remote procedure call (RPC) service file. The UPnP service is discoverable by a management station in a network through UPnP. The computer device initiates a RPC service based on the RPC service file, sends hardware information of the computing device to the management station through the RPC service, receives configuration parameters for the VSP through the RPC service. The RPC service installs the VSP based on the VSP installation file and the configuration parameters. | 09-18-2014 |
20140281450 | LIVE INITIALIZATION OF A BOOT DEVICE - Apparatus and computer program products implement embodiments of the present invention that include executing, by a processor, a software stack. A writeable boot device such as a storage device with a removable medium is detected, and upon reaching a boot level threshold for the software stack, the software stack is saved to the writeable boot device as a boot image. | 09-18-2014 |
20140281451 | RECOVERING FROM A DEFECTIVE BOOT IMAGE - Apparatus and computer program products implement embodiments of the present invention that include detecting, by a first computer having a first memory, a software stack in a second memory of a second computer coupled to the first computer via a network. The software stack is copied from the second memory to the first memory, and the copied software stack is executed by the first computer. | 09-18-2014 |
20140281452 | SELF-HEALING USING AN ALTERNATE BOOT PARTITION - Apparatus and computer program products implement embodiments of the present invention that enable a computer system comprising networked computers to self-heal from a boot failure of one of the computers. In some embodiments, upon detecting a first computer failing to successfully load a first boot image, a second computer configures the first computer to boot a second boot image. Subsequent to configuring the first computer, the first computer is power cycled, and upon the power cycling, the first computer loads the second boot image. | 09-18-2014 |
20140281453 | SELF-HEALING USING A VIRTUAL BOOT DEVICE - Apparatus and computer program products implement embodiments of the present invention that enable a computer system comprising networked computers to self-heal from a boot failure of one of the computers. In some embodiments, upon detecting a first computer having a memory and a physical boot device failing to successfully load a boot image, a second computer defines a virtual boot device in communication with the first computer and the second computer and having a boot image for the first computer. Subsequent to defining the virtual boot device, the second computer can configure the first computer to boot from the virtual boot device. | 09-18-2014 |
20140281454 | FAST HOT BOOT OF A COMPUTER SYSTEM - Apparatus and computer program products implement embodiments of the present invention that enable a computer that is executing a first operating system kernel to load a second operating system kernel and one or more software components to a region in a memory. Using functions incorporated in the kernel, the region in the memory is tagged, and the computer initiates a boot of a second operating system kernel while preserving in the tagged region contents stored therein. Following the boot of the second operating system kernel, the computer executes the one or more software components from the tagged region that was preserved during the boot. | 09-18-2014 |
20140281455 | MULTI-BOOT OR FALLBACK BOOT OF A SYSTEM-ON-CHIP USING A FILE-BASED BOOT DEVICE - A method includes initiating a boot of a system-on-chip coupled to a boot device. The boot is initiated from boot code stored in nonvolatile memory responsive to a power-on-reset. Under control of the boot code: a first register value is loaded into a register; a name string from the boot code is accessed; the first register value is obtained from the register; and the first register value and name string are converted to a first string value, which is provided as a first filename. The boot device is searched for a boot image file with the first filename. If the first filename is not found in the boot device, the first register value is incremented to provide a second register value. The obtaining, converting, and searching are repeated using a second filename generated using the second register value, and a valid filename for the boot image file is iteratively generated. | 09-18-2014 |
20140281456 | METHOD AND APPARATUS FOR IMPLEMENTING A SECURE BOOT USING MULTIPLE FIRMWARE SOURCES - Technologies for implementing a secure boot using multiple firmware sources are described. One or more fuses of a processing device can be configured. Based on such configuration, one or more keys can be generated. Based on the configuration of the various fuses, an operation of a firmware device can be initiated. Using the generated key(s), a protected section of the firmware device can be accessed. | 09-18-2014 |
20140281457 | METHOD FOR BOOTING A HETEROGENEOUS SYSTEM AND PRESENTING A SYMMETRIC CORE VIEW - A heterogeneous processor architecture and a method of booting a heterogeneous processor is described. A processor according to one embodiment comprises: a set of large physical processor cores; a set of small physical processor cores having relatively lower performance processing capabilities and relatively lower power usage relative to the large physical processor cores; and a package unit, to enable a bootstrap processor. The bootstrap processor initializes the homogeneous physical processor cores, while the heterogeneous processor presents the appearance of a homogeneous processor to a system firmware interface. | 09-18-2014 |
20140281458 | SYSTEM AND METHOD FOR PREDICTING AND IMPROVING BOOT-UP SEQUENCE - A method for optimizing a boot up sequence includes, during a host idle time or during data transfer: obtaining a predicted read address from the a prediction table, prefetching from the non-volatile data store, and saving the prefetched data in memory. Also included is receiving a current read command issued by the host and if the read address matches the predicted read address, providing to the host the prefetched data saved in temporary memory, and indicating a match. If a match is not indicated, obtaining current data from the non-volatile data store corresponding to the read address of the current read command, and providing the current data to the host. If a match was not indicated, searching the data prediction table for the predicted read address that matches the read address corresponding to the current read command, and if found in the data prediction table, recording the offset value. | 09-18-2014 |
20140281459 | LIVE INITIALIZATION OF A BOOT DEVICE - Methods, apparatus and computer program products implement embodiments of the present invention that include executing, by a processor, a software stack. A writeable boot device such as a storage device with a removable medium is detected, and upon reaching a boot level threshold for the software stack, the software stack is saved to the writeable boot device as a boot image. | 09-18-2014 |
20140281460 | RECOVERING FROM A DEFECTIVE BOOT IMAGE - Methods, apparatus and computer program products implement embodiments of the present invention that include detecting, by a first computer having a first memory, a software stack in a second memory of a second computer coupled to the first computer via a network. The software stack is copied from the second memory to the first memory, and the copied software stack is executed by the first computer. | 09-18-2014 |
20140281461 | SELF-HEALING USING AN ALTERNATE BOOT PARTITION - Methods, apparatus and computer program products implement embodiments of the present invention that enable a computer system comprising networked computers to self-heal from a boot failure of one of the computers. In some embodiments, upon detecting a first computer failing to successfully load a first boot image, a second computer configures the first computer to boot a second boot image. Subsequent to configuring the first computer, the first computer is power cycled, and upon the power cycling, the first computer loads the second boot image. | 09-18-2014 |
20140281462 | SELF-HEALING USING A VIRTUAL BOOT DEVICE - Methods, apparatus and computer program products implement embodiments of the present invention that enable a computer system comprising networked computers to self-heal from a boot failure of one of the computers. In some embodiments, upon detecting a first computer having a memory and a physical boot device failing to successfully load a boot image, a second computer defines a virtual boot device in communication with the first computer and the second computer and having a boot image for the first computer. Subsequent to defining the virtual boot device, the second computer can configure the first computer to boot from the virtual boot device. | 09-18-2014 |
20140281463 | FAST HOT BOOT OF A COMPUTER SYSTEM - Methods, apparatus and computer program products implement embodiments of the present invention that enable a computer that is executing a first operating system kernel to load a second operating system kernel and one or more software components to a region in a memory. Using functions incorporated in the kernel, the region in the memory is tagged, and the computer initiates a boot of a second operating system kernel while preserving in the tagged region contents stored therein. Following the boot of the second operating system kernel, the computer executes the one or more software components from the tagged region that was preserved during the boot. | 09-18-2014 |
20140281464 | METHOD OF IMPLEMENTING MAGNETIC RANDOM ACCESS MEMORY (MRAM) FOR MOBILE SYSTEM-ON CHIP BOOT - A method of booting a system on chip (SoC) includes using an on-chip MRAM located in the SoC, to store a boot software that includes a start-up software, boot loaders, and kernel and user-personalized information in an on-chip magnetic random access memory (MRAM) located in and residing on the same semiconductor as the SoC. The method further includes directly executing the boot software from the on-chip MRAM by the SoC and directly accessing the user-personalized information from the MRAM by the SoC. | 09-18-2014 |
20140281465 | Dual Boot Panel SWAP Mechanism - A central processing unit with dual boot capabilities is disclosed comprising an instruction memory further comprising a first and second memory area which are configured to be individually programmable, wherein first and second memory area can be assigned to an active memory from which instructions are executed and an inactive memory, respectively. The instruction set for the central processing unit comprises a dedicated instruction that allows to perform a swap from the an active memory area to an inactive memory area, wherein the swap is performed by executing the dedicated instruction in the active memory followed by a program flow change instruction in the active memory, whereupon the inactive memory becomes the new active memory and the active memory becomes the new inactive memory and execution of instructions continues in the new active memory. | 09-18-2014 |
20140281466 | Boot Sequencing for Multi Boot Devices - A multi-boot device capable of booting from a plurality of boot devices, each storing a boot image. The multi-boot device determines which boot device to load based on sequence numbers assigned to each of the boot devices. Some embodiments will make this determination using only hardware operations. The multi-boot device compares the sequence numbers of the available boot devices in order to determine the boot image to be loaded. The address of the selected boot image is then mapped to the device's default boot vector. The remaining images are likewise mapped to a secondary boot memory. The device then boots from the default boot vector. The user can change the boot device to be loaded by modifying one or more of the boot sequence numbers. The boot images can be updated without resetting the device by switching execution to and from boot images in the secondary boot memory. | 09-18-2014 |
20140281467 | SYSTEM AND METHOD FOR EXECUTION OF A SECURED ENVIRONMENT INITIALIZATION INSTRUCTION - A method and apparatus for initiating secure operations in a microprocessor system is described. In one embodiment, one initiating logical processor initiates the process by halting the execution of the other logical processors, and then loading initialization and secure virtual machine monitor software into memory. The initiating processor then loads the initialization software into secure memory for authentication and execution. The initialization software then authenticates and registers the secure virtual machine monitor software prior to secure system operations. | 09-18-2014 |
20140281468 | Virtual Bus Device Using Management Engine - A management engine may be used to trap configuration cycles during the boot process and thereafter in response to operating system enumeration. As a result, a virtual bus device can be created. The bus device may be used to provision software to the platform even when the operating system is corrupted or non-functional. | 09-18-2014 |
20140281469 | PROVIDING A FUNCTION OF A BASIC INPUT/OUTPUT SYSTEM (BIOS) IN A PRIVILEGED DOMAIN - A privileged domain includes a function of a Basic Input/Output System (BIOS). A request to access the function of the BIOS is routed to the privileged domain. | 09-18-2014 |
20140289504 | COMPUTER WITH STARTING UP KEYBOARD - A computer includes a keyboard, a PCB, a south bridge chip, a BIOS chip, a buffer circuit, and a USB switch. The PCB includes a USB connector connected to the keyboard. The BIOS chip is connected to the south bridge. The USB switch includes a control pin and a first output pin. The BIOS chip sends a dormancy command to the keyboard via the south bridge chip after the computer receives a shut-down signal. The south bridge chip sends a first control signal to the control pin to enable the USB switch to turn on the first output pin after the computer is powered off. The keyboard sends a triggering signal to the USB switch. The first output pin sends the triggering signal to the south bridge chip via the buffer circuit to enable the computer to start up. | 09-25-2014 |
20140289505 | BOOT PARTITIONS IN MEMORY DEVICES AND SYSTEMS - The present disclosure includes boot partitions in memory devices and systems, and methods associated therewith. One or more embodiments include an array of memory cells, wherein the array includes a boot partition and a number of additional partitions. Sequential logical unit identifiers are associated with the additional partitions, and a logical unit identifier that is not in sequence with the sequential logical unit identifiers is associated with the boot partition. | 09-25-2014 |
20140298000 | System and Method for Pre-Operating System Memory Map Management to Minimize Operating System Failures - A method includes booting an information handling system, providing by an EFI of the information handling system a memory segment for a first EFI type memory access, reserving a first portion of the segment from access by an operating system of the information handling system, determining a size of the first portion, determining a size of a second portion of the segment based upon the size of the first portion, allocating a third portion of the segment for the first EFI type memory access, the third portion including the first portion and the second portion, and passing a memory map to the operating system, the memory map including the third portion, wherein the third portion is reserved from access by the operating system. | 10-02-2014 |
20140298001 | DETECTING A COMPUTING SYSTEM BASIC INPUT/OUTPUT SYSTEM ISSUE - A method begins where a processing module accesses at least some of a set of basic input/output system (BIOS) memories to retrieve a decode threshold number of encoded BIOS slices, where a BIOS program is dispersed storage error encoded to produce the set of encoded BIOS slices. The method continues with the processing module reconstructing the BIOS program from the decode threshold number of encoded BIOS slices. The method continues with the processing module detecting a BIOS issue based on one or more of an operational issue with one or more BIOS memories of the set of BIOS memories, a rebuild issue with one or more encoded BIOS slices of the one or more sets of encoded BIOS slices, and a modification to the BIOS program. The method continues with the processing module determining a BIOS change regarding the BIOS issue and implementing the BIOS change. | 10-02-2014 |
20140298002 | METHOD AND DEVICE FOR IDENTIFYING A DISK BOOT SECTOR VIRUS, AND STORAGE MEDIUM - The present disclosure discloses a method and a device for identifying a disk boot sector virus, and a storage medium. The method comprises steps of: obtaining a known behavior pattern that is prestored, and obtaining a master boot record (MBR) and disk data called when the MBR is executed; establishing a simulated execution environment according to the MBR and the disk data obtained, and simulating an execution process of the MBR; analyzing and recording a simulated behavior pattern of the MBR during the process of simulating the execution process of the MBR; and identifying a disk boot sector virus via a contrast analysis between the recorded simulated behavior pattern and the known behavior pattern. The solution of the present disclosure has the beneficial effect that a new boot sector virus can be identified timely and accurately. | 10-02-2014 |
20140298003 | WEB-BASED INTERFACE TO ACCESS A FUNCTION OF A BASIC INPUT/OUTPUT SYSTEM - A web-based interface in an electronic device receives a request to access a function of a Basic Input/Output System. | 10-02-2014 |
20140304495 | SYSTEM AND METHOD FOR EXPEDITING VIRTUAL I/O SERVER (VIOS) BOOT TIME IN A VIRTUAL COMPUTING ENVIRONMENT - An approach for management of boot time of a virtual machine is provided. In one aspect, a system boot time application identifies assigned resources of a virtual I/O server (VIOS) of a computing system. In addition, the system boot time application allocates additional resources from client logical partitions (LPARs) of the computing system to the assigned resources of VIOS during boot time of VIOS. The system boot time application further identifies cores of the computing system during the boot time of VIOS. The system boot time application also sets the cores in turbo core mode until boot time of VIOS is completed. In one aspect, the system boot time application reallocates the allocated additional resources from VIOS to the client LPARs once boot time of VIOS is completed. | 10-09-2014 |
20140304496 | ELECTRONIC DEVICE - According to one embodiment, an electronic device includes a non-volatile storage, a button, a rebooting module, a memory, a control module. The rebooting module reboots the device if continuous operation time of the button exceeds a first time. Date and time information indicating date and time is stored in the memory. The date and time information becomes an initial value at a time of rebooting the device by the rebooting module. The control module stores the date and time information in the non-volatile storage if continuous operation time of the button exceeds a second time which is shorter than the first time. | 10-09-2014 |
20140304497 | ELECTRONIC DEVICE HAVING FUNCTION OF BOOTING OPERATING SYSTEM BY BOOTLOADER, METHOD OF PERFORMING THE SAME FUNCTION, AND STORAGE MEDIUM - An electronic device configured to perform a function of booting an operating system by a bootloader which boots the operating system by loading the bootloader on a memory, a method of performing the same function, and a storage medium. The electronic device includes: a first memory including a boot partition region for storing at least one piece of bootloader data including the function of booting the operating system, and a user partition region for copying and storing at least some bootloader data among entire bootloader data stored in the boot partition region; and a controller that loads initial program loader data stored in the boot partition region of the first memory to a second memory to execute the loaded initial program loader data, and loads the at least some bootloader data copied in the user partition region of the first memory to the second memory and executes the loaded bootloader data according to execution of the initial program loader data. | 10-09-2014 |
20140310509 | HOST RECOVERY USING A SECURE STORE - Approaches are described for enabling a host computing device to store credentials and other security information useful for recovering the state of the host computing device in a secure store, such as a trusted platform module (TPM) on the host computing device. When recovering the host computing device in the event of a failure (e.g., power outage, network failure, etc.), the host computing device can obtain the necessary credentials from the secure store and use those credentials to boot various services, restore the state of the host and perform various other functions. In addition, the secure store (e.g., TPM) may provide boot firmware measurement and remote attestation of the host computing devices to other devices on a network, such as when the recovering host needs to communicate with the other devices on the network. | 10-16-2014 |
20140310510 | REMOTE ATTESTATION OF HOST DEVICES - Approaches are described for enabling a host computing device to store credentials and other security information useful for recovering the state of the host computing device in a secure store, such as a trusted platform module (TPM) on the host computing device. When recovering the host computing device in the event of a failure (e.g., power outage, network failure, etc.), the host computing device can obtain the necessary credentials from the secure store and use those credentials to boot various services, restore the state of the host and perform various other functions. In addition, the secure store (e.g., TPM) may provide boot firmware measurement and remote attestation of the host computing devices to other devices on a network, such as when the recovering host needs to communicate with the other devices on the network. | 10-16-2014 |
20140310511 | COMPUTER SYSTEM AND CONTROL METHOD THEREOF - A computer system and a control method thereof are described. The computer system includes a first memory, a second memory, and a control module. The first memory is configured to store a Basic Input Output System (BIOS) program. The second memory includes a first memory block and a second memory block. The control module, when a scan function is initiated, is configured to execute the BIOS program to generate a first restart program, wherein the control module is configured to store the first restart program into the first memory block and scan the second memory block, and stop using an abnormal cell in the second memory block. | 10-16-2014 |
20140317391 | METHOD FOR CHANGING A SYSTEM PROGRAM AND PROCESSING DEVICE UTILIZING THE SAME - A processing device includes a program memory and a processor. The program memory includes at least a first memory partition for storing a system program and a second memory partition for storing an application program. The processor is coupled to the program memory for executing the programs stored in the program memory. The processor executes the application program to enable the processing device to provide at least a predetermined function, and executes the system program to enable the processing device to update the application program. When the system program has to be changed, the processor further receives a first program from a host, stores the first program in the second memory partition, triggers a reboot procedure to reboot from the second memory partition and thereafter execute the first program to change the system program based on the first program. | 10-23-2014 |
20140317392 | OPERATING SYSTEM MANAGEMENT OF SECOND OPERATING SYSTEM - The present invention provides a method of easily managing two or more OSs. A host OS, a guest OS, and a virtualization module are loaded into a primary physical address area of a main memory. The guest OS is executed in a virtual environment in a primary physical address area. A memory image of the guest OS loaded in the primary physical address area is copied to a secondary physical address area. The right of access to a processor is transferred to the guest OS copied in the secondary physical address area to execute the guest OS in a physical environment. | 10-23-2014 |
20140317393 | Method and Apparatus for Integrating Personal Computer and Electronic Device Functions - An apparatus and a method for integrating personal computer and electronic device functions. An input device, personal computer host, and encoder in turn integrate hardware, operating system, and application programs to provide personal computer and electronic device functions at the same time. | 10-23-2014 |
20140317394 | PROVISIONING OF OPERATING SYSTEMS TO USER TERMINALS - Methods and apparatus are provided for provisioning an operating system image from a server ( | 10-23-2014 |
20140317395 | MICROPROCESSOR, AND METHOD OF MANAGING RESET EVENTS THEREFOR - A microprocessor comprises at least one reset management module. The at least one reset management module is arranged to detect a reset event, determine if at least one reset condition has been met upon detection of the reset event, and cause at least a part of the microprocessor to remain in a reset state upon determining that the at least one reset condition has been met. | 10-23-2014 |
20140325196 | System and Method for Inventory Collection Optimization by Selective Binding of the Pre-Boot Drivers - A solution to optimize system boot-up time by selectively collecting device inventory for only the devices that have configuration changes and for skipping for all other devices. More specifically, the solution includes a selective driver binding operation which in certain embodiments executes within an inventory application. After the selective driver binding operation gathers data for a certain device, the selective driver binding operation gathers data for that certain device again only when data relating to the particular device has changed. Instead of binding to every device, the selective driver binding operation selectively binds only to devices with changes, thus executing system management code only for specific devices and saving boot time. | 10-30-2014 |
20140325197 | SPECIALIZED BOOT PATH FOR SPEEDING UP RESUME FROM SLEEP STATE - A specialized boot path for speeding up resume from a sleep state is discussed. In a UEFI-compliant system, a specially constructed alternate firmware volume is created which contains only the code modules used during resumption from an S3 sleep state. This alternate firmware volume is copied into Random Access Memory (RAM) during a normal boot. When the system subsequently enters the S3 sleep state and then begins the resume boot process, code in the boot sequence detects it is a resume from an S3 sleep state, restores a RAM configuration and jumps execution to a Pre-EFI Initialization (PEI) core entry point in the alternate firmware volume in RAM instead of to a firmware volume in ROM. This alternate firmware volume performs specified S3 resume tasks and then returns control to the operating system. | 10-30-2014 |
20140325198 | ELECTRONIC DEVICE AND LOADING METHOD OF CONTROL PROGRAM - An electronic device comprises a first memory unit, a processing unit and an operating interface. The processing unit is electronically connected to the first memory unit. The operating interface is electronically connected to the processing unit. When the processing unit is communicated with a host device via the operating interface, the processing unit executes a loading program and transmits a notification signal to the host device. The host device transmits at least one control program to the first memory unit according to the notification signal. When the control program is transmitted, the processing unit is reset and then executes the control program stored in the first memory unit. The stored firmware can be added or modified, and the circuit layout is simplified. | 10-30-2014 |
20140325199 | INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING APPARATUS AND START UP CONTROL METHOD - An information processing system includes an operation part that receives an operation performed by a user; and a body part that operates based on a request from the operation part. The operation part includes a power control part that, when receiving a power turning off instruction from the body part, reboots the operation part and causes the operation part to stand by in a power saving state in which some of operations are stopped, and, when receiving a start up notification from the body part, causes the operation part to return from the power saving state. | 10-30-2014 |
20140325200 | Memory Access Control Performing Efficient Access - A memory access control system includes a plurality of operators, a first memory, and a second memory. The plurality of operators are configured to execute different arithmetic operations. The first memory has a shared region accessible from the plurality of operators. The second memory is configured to cause any one of the plurality of operators to access. One of the operators is configured to access the second memory to load required data and execute a process concurrently with loading data required for a separate other process to cause the first memory to hold the data required for the separate other process. | 10-30-2014 |
20140325201 | AUTOMATIC ENTRANCE DEVICE AND METHOD FOR UPGRADE BOOT MODE - An automatic entrance device in accordance with the present invention performs software upgrade by starting up a terminal in an upgrade boot mode by holding operation of a memory when a USB interface of a terminal is connected to an external device, and starts up the terminal in a normal boot mode by a processor accessing memory by disabling hold of operation of memory when the USB interface and external device are disconnected. | 10-30-2014 |
20140325202 | INTELLIGENT BOOT DEVICE SELECTION AND RECOVERY - Techniques for recovering virtual machine state and boot information used to boot an installed guest operating system on systems where the information has either been lost or is not present are described. | 10-30-2014 |
20140325203 | BACKING UP FIRMWARE DURING INITIALIZATION OF DEVICE - Example embodiments disclosed herein relate to backing up firmware. An operating system can be initialized. During the initialization process, memory can be set. The firmware can be backed up to storage based on the set memory. | 10-30-2014 |
20140331036 | DATA RELAY BY SERVER - Example embodiments relate to data relay by a server. In one example implementation, a master server may load a temporary operating system and a slave server may load a temporary operating system. The master server may then receive a command from a user via a user interface of a computing device. The master server may relay the command received from the user to the slave server. | 11-06-2014 |
20140331037 | SECURE BOOT OVERRIDE IN A COMPUTING DEVICE EQUIPPED WITH UNIFIED-EXTENSIBLE FIRMWARE INTERFACE (UEFI)-COMPLIANT FIRMWARE - A firmware-based system and method for detecting an indicator of an override condition during a Unified Extensible Firmware Interface (UEFI) Secure Boot sequence. The indicator of the override condition may be detected based upon the pressing of a specialized button, designated key or keys or other received input that indicates both physical presence of the user and the desire, on the current boot, to bypass UEFI Secure Boot. An embodiment may work for only a single boot, not require access into a setup application, and may be accessed by externally accessible features of the computer system. | 11-06-2014 |
20140331038 | METHODS FOR FIRMWARE SIGNATURE - A method for installing embedded firmware is provided. The method includes generating one or more firmware file instances and generating one or more digital certificate instances that are separate instances from the firmware file instances. The method includes associating the one or more digital certificate instances with the one or more firmware file instances to facilitate updating signature-unaware modules with signature-aware firmware or to facilitate updating signature-aware modules with signature-unaware firmware. | 11-06-2014 |
20140331039 | DATA CENTER POWER ADJUSTMENT - A power cap agent establishes a power cap. The power cap agent throttles a first power priority virtual machine. The power cap agent determines that the first power priority virtual machine and the additional power priority virtual machine contribute to power consumption above the power cap among the plurality of servers. The power cap agent throttles the additional power priority virtual machine, wherein the first power priority virtual machine has a first power priority lower than an additional power priority of the additional power priority virtual machine. The power cap agent determines that the first power priority virtual machine and the additional power priority virtual machine contribute to power consumption above the power cap, responsive to throttling the first power priority virtual machine and throttling the additional virtual machine. | 11-06-2014 |
20140337609 | OS BOOTLOADER CACHING IN NON-VOLATILE MEMORY - An OS bootloader or other code or data requested by firmware during a boot sequence is cached inside ROM or another non-volatile memory location. Firmware uses this cached version, instead of retrieving the OS bootloader or other code from a peripheral location to speed up the boot sequence. Embodiments also create additional room in the cache based on pre-determined rules if the cache doesn't already include the requested data and doesn't have enough room to store the requested data at the time of the firmware's read request. | 11-13-2014 |
20140337610 | ARRANGEMENT FOR SECURE INDEPENDENT OPERATING ENVIRONMENTS IN A COMPUTER - The present invention protects a memory image of an OS in a sleep state. A CPU executes a first OS or a second OS while switching there between. The first OS is loaded into a main memory, and the second OS is loaded into an auxiliary memory. The auxiliary memory may be connected to a chipset through a PCIe interface. The main memory and the auxiliary memory are configured such that, when one is in an active state where the right of access to the CPU is obtained, the other makes a transition to the sleep state where there is no right of access to the CPU while maintaining the memory image. In order to prevent one OS in the active state from accessing the main memory or the auxiliary memory in which the memory image of the other OS in the sleep state is stored, the BIOS may set a corresponding controller to disabled during a POST. | 11-13-2014 |
20140344560 | DRIVER FILE CONVERSION SYSTEM - A method for creating an offline script format driver file from an INF file includes replacing variables with associated value data. Version data and a unique identifier are captured and stored. Disk identification data is retrieved and combined with data that references the disk identification data in order to create and store a list of disk names and files within those disk names. A list is created of all possible models sections from value data included in a manufacturer value name to determine which models sections support which operating systems. Information that describes which models section is compatible with which operation system is created and stored. For DDInstall sections that include device driver installation details, sections directives that include registry actions or file actions are processed. The method provides an offline script format driver file that is operable to provide for offline driver installation in an information handling system (IHS). | 11-20-2014 |
20140344561 | COMPUTER - A computer host comprises a first system control chip and a control unit. The file sharing circuit comprises a second system control chip, a bus switch, a power switch and a sharing button. The bus switch controlled by the control unit couples a storage apparatus to the first or the second system control chip. The power switch is controlled by the control unit to supply power to the storage apparatus, the second system control chip and the bus switch. The sharing button enables or disables a file sharing procedure and electrically connects to the first system control chip and the second system control chip. When the file sharing procedure is enabled, the control unit controls the bus switch to switch to a first state, such that the second system control chip accesses the storage apparatus. | 11-20-2014 |
20140344562 | METHOD AND DEVICE FOR PREVENTING ACCESS TO ADMINISTRATIVE PRIVILEGE - A method and a device for preventing access to an administrative privilege are provided. The method includes acquiring a flash memory identifier from a flash memory, starting kernel loading, decoding an encrypted administrative privilege granting code using the flash memory identifier, and completing booting when the decoding succeeds. According to an embodiment of the present disclosure, the code for accessing the administrative privilege is encrypted using the identifier of the flash memory so that the unique password code can be loaded for each device, thereby enhancing the system security. | 11-20-2014 |
20140344563 | MOBILE DEVICE AND METHOD FOR SUPPORTING HIBERNATION FUNCTION - A method and an apparatus for supporting a hibernation function in a mobile device are provided. The method includes receiving an input at an electronic device, loading, using one or more processors, a snapshot image for the electronic device in response to the input, comparing at least one portion of the snapshot image with data indicating a state of the electronic device, and updating the snapshot image using the data, based at least in part on a determination that the state of the electronic device has been changed. | 11-20-2014 |
20140344564 | Retrieving Boot Instructions From Nonvolatile Memory - Systems and processes for booting a device can be implemented by detecting a reset signal associated with the device and retrieving a predetermined page of data from a nonvolatile memory location into a register associated with the nonvolatile memory. The nonvolatile memory may be designed and implemented such that each page of data is retrieved from the nonvolatile memory as a unit, and the page of data includes instructions for use in booting the device. A command to read data stored in the register is received, and the command can include an address identifying a location of one or more instructions within the register. In response, the one or more instructions are retrieved from the register for execution by a processor. | 11-20-2014 |
20140351571 | OUT OF BAND MANAGEMENT OF BASIC INPUT/OUTPUT SYSTEM SECURE BOOT VARIABLES - A method is provided in one example embodiment and includes storing secure boot variables in a baseboard management controller; and sending the secure boot variables to a basic input/output system (BIOS) during a power on self-test, where the BIOS utilizes the secure boot variables during runtime to authenticate drivers and an operating system loader execution. In particular embodiments, the secure boot variables may be included in a white list, a black list, or a key list and, further, stored in erasable programmable read only memory. | 11-27-2014 |
20140359263 | BOOT FROM LOGICAL VOLUME SPANNING PLURALITY OF PCI DEVICES - A first driver may interface with an operating system (OS). A second driver may interface with a plurality of Peripheral Component Interconnect (PCI) devices. The first driver may expose the plurality of PCI devices as a single logical volume to the OS. The OS may boot from the single logical volume that spans the plurality of PCI devices. | 12-04-2014 |
20140359264 | METHOD FOR LOW POWER BOOT FOR MICROCONTROLLER - A microcontroller includes a clock generator having an internal reference clock, a system mode controller establishing an operating mode, a flash memory having an internal clock and a non-volatile option register, and a boot mode selection logic circuit coupled to the system mode controller and the flash memory. The logic circuit outputs a boot mode selection signal instructing the microcontroller to boot in a very low power run (VLPR) mode or a RUN mode. The system mode controller enters the VLPR or RUN mode in response. The flash memory bypasses and disables its internal clock prior to calibration of the flash memory in the VLPR mode and prior to initialization of the flash memory in the RUN mode. The flash memory subsequently uses an external clock signal based on the output of the internal reference clock. | 12-04-2014 |
20140359265 | FAST MODELING USING INTERPOLATED STARTING POINTS - Techniques are disclosed relating to forward and inverse modeling of geophysical formations using interpolation. In one embodiment, a method includes generating a system of equations based on a background model that describes a geophysical formation. In this embodiment, the method also includes generating a first set of solutions for the system of equations using an initial set of base points from geophysical survey data obtained from the geophysical formation and interpolating, using the first set of solutions, to produce a set of solution approximations for a second set of data points from the geophysical survey data. In this embodiment, the method also includes generating a model of the geophysical formation, using the second set of data points and the set of solution approximations, where the model includes a second set of solutions for the system of equations. | 12-04-2014 |
20140359266 | OPTIMIZING BOOT TIME OF A STORAGE SYSTEM - Systems and methods herein provide a storage system that optimizes the boot time when the storage system is rebooted. One embodiment includes a storage controller operable to determine a topology of one or more storage devices. The storage controller stores the topology in memory. When the storage controller detects a system reboot event, it provides the stored topology to the host and directs the host to reboot with the stored topology. | 12-04-2014 |
20140359267 | METHOD OF CONTROLLING COMPUTER SYSTEM AND COMPUTER SYSTEM - A computer system with a plurality of processors having a hardware-assisted virtualization and a memory, the computer system including a first processor group of the processors having hardware-assisted virtualization set disabled, and a second processor group of the processors and having hardware-assisted virtualization set enabled, the method having: booting a first OS by assigning the first processor group to the first OS; booting a virtual machine monitor to boot a virtual machine by assigning the second processor group to the virtual machine monitor; performed by the virtual machine monitor, booting a second OS by assigning a certain area of the memory to the second OS; and performed by the virtual machine monitor, setting a data path through which the first OS and second OS communicate with each other, the data path being set in the memory. | 12-04-2014 |
20140359268 | Methods of Securely Changing the Root Key of a Chip, and Related Electronic Devices and Chips - Disclosed are methods and apparatus for changing a security key on a computer chip that has a CPU, a first OTPROM (OTPROM1) storing a root key of the chip or derivative thereof (RKPUB1), and a second OTPROM (OTPROM2) on which the chip manufacturer stores nothing. A ROM of the chip stores a first software program (SW1). A device manufacturer can take that chip and interface it to a mass memory of a memory block of an electronic device, then execute a second software program (SW2) that is stored on the mass memory only if SW2 is authenticated by SW1 using the RKPUB1. Then a new root key of the chip or derivative thereof (RKPUB2) is provided (via SW2 or a USB connection for example) which is stored to the OTPROM2 via a security service portion of SW1. Thereafter RKPUB2 can be used to authenticate SW2. | 12-04-2014 |
20140359269 | TECHNIQUES FOR DYNAMIC SYSTEM PERFORMANCE TUNING - Systems and methods consistent with the present disclosure include techniques for dynamic system performance tuning (DSPT). Techniques for DSPT include identifying an active software application during a user session and applying an application-specific profile that defines different system-hardware operating states of a computing system to enhance the performance of the active software application. | 12-04-2014 |
20140359270 | ATTESTATION PROTOCOL FOR SECURELY BOOTING A GUEST OPERATING SYSTEM - In a cloud computing environment, a production server virtualization stack is minimized to present fewer security vulnerabilities to malicious software running within a guest virtual machine. The minimal virtualization stack includes support for those virtual devices necessary for the operation of a guest operating system, with the code base of those virtual devices further reduced. Further, a dedicated, isolated boot server provides functionality to securely boot a guest operating system. The boot server is isolated through use of an attestation protocol, by which the boot server presents a secret to a network switch to attest that the boot server is operating in a clean mode. The attestation protocol may further employ a secure co-processor to seal the secret, so that it is only accessible when the boot server is operating in the clean mode. | 12-04-2014 |
20140365755 | FIRMWARE AUTHENTICATION - Firmware authentication in Information Handling Systems (IHSs) are disclosed. In some embodiments, an IHS may include a controller having a memory, the memory configured to store a plurality of firmware volumes, each of the plurality of firmware volumes including a plurality of firmware files. The IHS may also include a Basic Input/Output System (BIOS) operably coupled to the controller, the BIOS having program instructions stored thereon that, upon execution, cause the BIOS to authenticate two or more firmware files within a given one of the plurality of firmware volumes using a single digital signature. In another embodiment, a method may include creating a firmware volume, adding a plurality of firmware files to the firmware volume, and creating a digital signature based upon at least one of the plurality of firmware files, where the digital signature, upon being authenticated, allows a BIOS to load any of the plurality of firmware files. | 12-11-2014 |
20140365756 | MANAGING HOST COMPUTING DEVICES WITH A HOST CONTROL COMPONENT - Systems and methods are disclosed which facilitate the management of host computing devices through the utilization of a host computing device control component. The host computing device control component includes a state monitoring component that monitors operating states of the control component and a group of associated host computing devices. Based on a determination of a power event, the state monitoring component causes the initiation of a reboot of the grouping of host computing devices based on exchange priority information and additional reboot parameters. | 12-11-2014 |
20140365757 | INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING METHOD, AND COMPUTER-READABLE STORAGE MEDIUM - An information processing system includes an operating unit that receives an input in response to a user operation and that runs under a first operating system; and a main body that runs under a second operating system and operates in response to the input received by the operating unit. The main body includes a generation unit that generates a command to direct rendering of a screen corresponding to an application being executed, and a command transmission control unit that provides control to transmit the command to the operating unit. The operating unit includes a receiving unit that receives the command from the main body, a screen rendering unit that renders the screen in accordance with the command received by the receiving unit, a display unit that displays the screen rendered by the screen rendering unit, and a reboot unit that reboots the operating unit in asynchronization with the main body. | 12-11-2014 |
20140365758 | TECHNIQUES FOR BOOTING AN INFORMATION PROCESSING SYSTEM - A technique for booting an information processing system includes storing a boot sequence table in a storage unit. The boot sequence table includes a specific boot sequence defining a boot sequence of a setup utility and a bootable subject during booting. The boot sequence table is accessed via the operating system firmware interface. A subject to be booted is determined in accordance with the boot sequence. | 12-11-2014 |
20140372738 | PROVIDING A TRUSTWORTHY INDICATION OF THE CURRENT STATE OF A MULTI-PROCESSOR DATA PROCESSING APPARATUS - A data processing apparatus formed on an integrated circuit comprising: a plurality of processors; power control circuitry configured to control power up and power down of the processors; a read only memory for storing boot up software for booting up each of the processors. The power control circuitry is configured to respond to receipt of a check state request, to control one of the processors that is currently powered down to power up and to access the boot up software. The boot up software accessed in response to the check state request controls the processor to perform a measurement indicative of a current state of the data processing apparatus and to output a value indicative of the measurement. | 12-18-2014 |
20140372739 | IMPLEMENTING CONCURRENT ADAPTER FIRMWARE UPDATE FOR AN SRIOV ADAPTER IN A VIRTUALIZED SYSTEM - A method, system and computer program product are provided for implementing concurrent adapter firmware update of a Single Root Input/Output Virtualization (SRIOV) adapter in a virtualized system. An adapter driver is used to update adapter firmware concurrent with normal I/O operations. When configuration is stored in a scratchpad buffer, the adapter driver detects virtual functions (VFs) configured and operating. An enhanced error handling (EEH) process is initiated, freezing the VFs, and an updated adapter firmware image is loaded to the adapter. The adapter driver completes the EEH recovery, the adapter is restarted using the new updated adapter firmware. The VFs device drivers unfreeze the VFs, and complete the EEH recovery. | 12-18-2014 |
20140372740 | SECURELY OBTAINING MEMORY CONTENT AFTER DEVICE MALFUNCTION - One or more techniques and/or systems are provided for securely obtaining memory content after a device malfunction. For example, applications, components, and/or an operating system of a device may maintain information within volatile memory in a secure manner (e.g., using encryption). When the device malfunctions, such information may be useful for diagnosing what caused the malfunction. Accordingly, memory content within volatile memory may be securely retrieved, encrypted, and/or stored before such memory content is flushed/removed from volatile memory. For example, a warm reset is performed to initially reboot the device without removing memory content from volatile memory. The memory content may be retrieved and encrypted to create encrypted memory content that may be stored within nonvolatile memory for later access. After a second reboot, device malfunction information may be obtained by decrypting the encrypted memory content using a private key matching a public key used to encrypt the memory content. | 12-18-2014 |
20140372741 | Opaque Bridge for Peripheral Component Interconnect Express Bus Systems - A host system may couple to a PCIe subsystem. During setup of the PCIe subsystem, the BIOS in the host system may first be informed that the devices to be coupled are not PCIe devices, and certain amount of memory is required for these devices. The BIOS may therefore not attempt to configure the devices, and may instead allocate the required memory space. When the operating system boots up, it may not attempt to configure the devices, loading a custom driver instead of an existing PCI driver to configure the bus. Once loaded, the custom driver may configure the devices, then inform the OS that there are PCIe devices in the system at the specified addresses, which may cause the OS to load and execute existing PCIe device drivers to operate/use the devices. The proprietary driver may also be used to handle traffic between the PCIe drivers and the OS. | 12-18-2014 |
20140372742 | COMPUTER SYSTEM AND STARTUP METHOD - A computer system comprising a plurality of computers on which a plurality of operating systems run, wherein a memory stores a first hardware control unit, wherein a storage device stores a first OS image, a second OS image, a second hardware control unit for executing start processing of the second OS, and an address rewrite unit, wherein the second hardware control unit includes a start unit for starting the second hardware control unit, wherein the address rewrite unit which is started by the first OS is configured to: obtain an address of a storage area, in which address data to be rewritten is stored, as a target address, rewrite the address data stored in the storage area corresponding to the obtained target address and start the start unit, wherein the start unit is configured to start the second hardware control unit by using the rewritten address data. | 12-18-2014 |
20140372743 | METHOD AND SYSTEM FOR RENDERING A STOLEN MOBILE COMMUNICATIONS DEVICE INOPERATIVE - A method and system for rendering a stolen mobile communications device inoperative is presented. A determination that the mobile communications device is in a first state is made at a security component on the mobile communications device. A removal of a cryptographic key is affected at the security component on the mobile communications device. | 12-18-2014 |
20140372744 | Bootstrapping From A Remote Disk Image Via A Network - A method of bootstrapping from a remote image file comprising loading, by a processor, an initial bootloader, employing the initial bootloader to download a final bootloader from the remote image file via a network, employing the final bootloader to mount the remote image file as a block device, downloading a kernel and root file system mounting data from the remote image, and executing the kernel to bootstrap the processor based on the root file system mounting data. | 12-18-2014 |
20140372745 | BOOTING A SERVER USING A REMOTE READ-ONLY MEMORY IMAGE - Systems, methods, and computer-readable and executable instructions are provided for booting a server using a remote read-only memory image. Booting a server using a remote read-only memory (ROM) image can include accessing a remote ROM image from a second server for the first server, wherein the first server does not have a complete ROM image | 12-18-2014 |
20140372746 | PORT THROTTLING ACROSS AN OPERATING SYSTEM RESTART DURING A HOT UPGRADE - A method includes tagging, by a processor executing a first operating system kernel, a region of a memory used by a first storage area network (SAN) adapter driver coupled to a SAN adapter, and decoupling the first SAN adapter driver from the SAN adapter. A boot of a second operating system kernel is then initiated while preserving in the tagged region of the memory contents stored therein. After the boot, a second SAN adapter driver is then coupled to the SAN adapter. | 12-18-2014 |
20140380030 | AUTOMATIC TURNING ON OF A DATA PROCESSING DEVICE DURING CHARGING OF A BATTERY SOURCE THEREOF - A method includes monitoring, through a charge monitor circuit associated with a data processing device and/or a battery source of the data processing device, a charge level of the battery source during charging thereof. The method also includes triggering, through a driver component provided in a non-volatile memory associated with the data processing device and/or a memory associated with the charge monitor circuit, loading of booting instructions onto the data processing device to initiate automatic turning on of the data processing device when the charge level of the battery source exceeds a threshold. | 12-25-2014 |
20140380031 | SYSTEM WIDE ROOT OF TRUST CHAINING VIA SIGNED APPLICATIONS - A processing device searches executing at least one of a boot loader or a kernel for the operating system searches for an extensible firmware interface (EFI) binary object. Responsive to finding a first EFI binary object, the processing device verifies that a first signature associated with the first EFI binary object is valid using a platform key. Responsive to verifying that the first signature for the first EFI binary object is valid, the processing device performs the following comprising: identifying a first public key encapsulated in the first EFI binary object, wherein the first public key is associated with a non-EFI certificate authority; extracting the first public key from the first EFI binary object; and performing at least one of a) passing the first public key to a kernel of an operating system (OS) or b) exposing the first public key to a user space of the OS. | 12-25-2014 |
20140380032 | ELECTRONIC DEVICE, METHOD FOR CONTROLLING ELECTRONIC DEVICE, AND PROGRAM - There is provided an electronic device including a manipulation unit configured to acquire manipulation by a user, and a control unit configured to selectively execute one of a plurality of controls of the electronic device which are associated with a duration of the manipulation and to perform switching of at least one of the plurality of controls according to information indicating a state of the electronic device. | 12-25-2014 |
20140380033 | OFFLOADING THE PROCESSING OF A NETWORK PROTOCOL STACK - A computer system is partitioned during a pre-boot phase of the computer system between a first partition and a second partition, wherein the first partition to include a first processing unit and the second partition to include a second processing unit. An Input/Output (I/O) operating system is booted on the first partition. A general purpose operating system is booted on the second partition. Network transactions are issued by the general purpose operating system to be performed by the I/O operating system. The network transactions are performed by the I/O operating system. | 12-25-2014 |
20140380034 | SYSTEM AND METHOD FOR REDIRECTING INPUT/OUTPUT (I/O) SEQUENCES - A method for redirecting I/O (Input/Output) sequences. A computer platform is initialized. If the computer platform is enabled for command packet rerouting, the platform firmware may be used to install a runtime enable block I/O interface and a standard UNDI (Universal Network Device Interface) interface for routing I/O requests to a network controller or an out-of-band processor may be used to route I/O requests to a network interface controller. The routing of the I/O requests to the network controller or network interface controller enables the computer platform to boot from a remote block I/O storage device. | 12-25-2014 |
20140380035 | ENCRYPTING AND DECRYPTING A VIRTUAL DISC - A computer-readable storage medium containing machine executable instructions that when executed by a processor cause the processor to encrypt a virtual disc; wherein the virtual disc comprises a virtual disc image; and wherein execution of the machine executable instructions cause the processor to: receive the virtual disc; increase the size of the virtual disc; write a decryption-master-boot-record and a decryption program to the virtual disc; encrypt at least a portion of the virtual disc image, wherein the decryption program comprises decryption-machine-executable-instructions for decrypting the at least partially encrypted virtual disc image in accordance with a cryptographic key. | 12-25-2014 |
20150012735 | Techniques to Initialize from a Remotely Accessible Storage Device - Examples are disclosed for remotely initializing or booting a client or host device. In some examples, a network (NW) input/output (I/O) device coupled to a host device may connect to a remote server via a NW communication link. For these examples, modules of the network I/O device may establish a control path to a non-volatile memory express (NVMe) controller maintained at the remote server using a remote direct memory access (RDMA) protocol. Properties of a storage device controlled by the NVMe controller as well has an RDMA service tag (STag) to indicate allocated portions of the storage device may be obtained. A system basic I/O system (BIOS) may be capable of using the RDMA STag to access the storage device and load an operating system (OS) kernel and one or more device drivers to remotely boot the host device. Other examples are described and claimed. | 01-08-2015 |
20150012736 | SERVER AND BOOTING METHOD - A server including a basic input output system (BIOS), a control unit and a plurality of central processing units (CPUs), and a booting method are provided. The BIOS outputs a booting signal. One of the CPUs receives the booting signal to execute a booting program, and outputs a successful signal after being booted. The control unit is coupled between the BIOS and the CPUs, and receives the successful signal to control a connection between the BIOS and the one of the CPUs. When the control unit receives the successful signal, the control unit replaces a connection between the BIOS and current one of the CPUs with a new connection between the BIOS and next one of the CPUs according to the successful signal, and the next CPU then receives the booting signal. | 01-08-2015 |
20150012737 | Secure Boot for Unsecure Processors - A method for securely booting a target processor in a target system from a secure root of trust includes computing a message authentication code from boot code to be provided to the target processor, including an obfuscated algorithm for recreating the message authentication code in the target processor, serving the boot code to the target processor, executing the boot code to recreate the message authentication code in the target processor, serving the message authentication code back to the root of trust, comparing the returned message authentication code with the message authentication code generated in the root of trust, continuing execution of the boot code data if the returned message authentication code matches the message authentication code, and applying at least one penalty to the target system if the returned message authentication code does not match the message authentication code generated in the root of trust. | 01-08-2015 |
20150012738 | FIRMWARE VERIFIED BOOT - Methods and apparatus for verifying a boot process of a computing system are disclosed. An example computer-implemented method includes reading, by a computing system during a boot process, a header section of a read-write portion of firmware of the computing system. The example method further includes generating, using a first cryptographic hash algorithm, a message digest corresponding with the header. The example method also includes decrypting, using a first public-key, an encrypted signature corresponding with the header. The example method still further includes comparing the message digest corresponding with the header and the decrypted signature corresponding with the header. In the event the message digest corresponding with the header and the decrypted signature corresponding with the header match, the example method includes continuing the boot process. In the event the message digest corresponding with the header and the decrypted signature corresponding with the header do not match, the example method includes halting the boot process. | 01-08-2015 |
20150019851 | STATE DEPENDENT OPTIMIZATION FOR SEQUENTIAL BOOTING OF HETEROGENEOUS SYSTEMS - A method and computer program product for implementing the method, where the method comprises obtaining boot dependencies among a plurality of systems, wherein a boot dependency identifies a dependent system, a service system that provides a service to the dependent system, a provide state of the service system, and a need state of the dependent system that requires the service system to have reached the provide state. The method further comprises obtaining historical measurements of the time periods between states for each of the systems. Then, during a process of booting the plurality of systems, the method initiates boot of each dependant system at a time that is determined, based on the historical measurements, to allow the dependent system to reach the need state no earlier than the time at which the service system is determined, based on the historical measurements, to reach the provide state. | 01-15-2015 |
20150019852 | VERIFICATION METHOD FOR SYSTEM EXECUTION ENVIRONMENT - The present invention provides a verification method for system execution environment. According to the present invention, at least an algorithm is used for operating a basic input/output system (BIOS) and loaded program check information, a first characteristic code and operation system check information, a second characteristic code and file system check information, a third characteristic system library check information, and a fourth characteristic code and application program check information for acquiring the first to fifth characteristic codes. After verifying the first to fourth characteristic codes, unlocking a storage, loading an operational system, loading a file system, and loading a system library are executed. After all characteristic codes have passed verification, the application program is executed. Thereby, whether the execution environment for the system or program is reliable can be confirmed. | 01-15-2015 |
20150019853 | BOOT-UP METHOD OF E-FUSE, SEMICONDUCTOR DEVICE AND SEMICONDUCTOR SYSTEM INCLUDING THE SAME - A semiconductor device includes a power-up signal generation unit suitable for receiving a first power supply voltage and a second power supply voltage higher the first power supply voltage and generating a power-up signal when the first and second power supply voltage increase to reach target levels, respectively, a voltage level adjusting unit suitable for generating a third power supply voltage by adjusting a voltage level of the second power supply voltage, a boot-up signal generation unit suitable for generating a boot-up signal in response to the power-up signal, and a circuit operation unit suitable for performing a boot-up operation using the third power supply voltage in response to the boot-up signal. | 01-15-2015 |
20150019854 | Booting Display Control Method And Associated Apparatus - Booting display control method and associated apparatus are disclosed. The apparatus includes a processor chip, wherein the processor chip includes a processor and a display. After the processor chip is activated, the processor loads the leading program and displays control program; the processor detects whether a vehicle backing indicator indicates vehicle backing; when the vehicle backing indicator indicates vehicle backing, the processor controls the display controller to realize the vehicle backing video display function through the display control program; and when the vehicle backing indicator does not indicate vehicle backing, the processor loads the operating system program. Through the method, the present invention is capable of displaying vehicle backing video display when loading the operating system program. | 01-15-2015 |
20150019855 | System Platform Supporting Infrared Receiver/Transmitter and Operation Method Thereof - An operation method of a system platform includes steps of: transmitting, by an infrared receiver, a received infrared signal to a transmission interface; transmitting, by the transmission interface, an interrupt notification signal to an operation system power management agent (OSPM) through an advanced configuration and power interface (ACPI); receiving, by an infrared application program of an operating system, the interrupt notification signal from the OSPM, so as to generate a system management interrupt (SMI) in a universal extensible firmware interface (UEFI) basic input output system (BIOS) to execute a system management mode (SMM) program; and executing, by the UEFI BIOS, a decoding driver program, and receiving the infrared signal from the transmission interface, so as to decode the infrared signal into event data, and store the event data in a storage device. | 01-15-2015 |
20150019856 | SECURE DOWNLOAD AND SECURITY FUNCTION EXECUTION METHOD AND APPARATUS - A method and electronic device for executing secure download and security function is provided. The method includes storing a unique identifier (ID) of the electronic device, receiving a binary update request, determining whether the stored unique ID matches a unique ID signed to the binary, and downloading the binary depending on whether the unique IDs match. | 01-15-2015 |
20150026448 | DYNAMIC NIC BINDING - In one embodiment, a network boot program is received from a server via a first network interface controller associated with a first network identifier. The network boot program is executed. An operating system loader comprising an operating system driver is received from the server via the first network interface controller. The operating system driver identifies a second network interface controller associated with a second network identifier. The operating system driver associates the first network interface controller with the second network identifier and associates the second network interface controller with the first network identifier. | 01-22-2015 |
20150026449 | METHOD OF MANAGING A SOLID STATE DRIVE, ASSOCIATED SYSTEMS AND IMPLEMENTATIONS - One embodiment of a method includes loading, by a memory controller, a boot image from a solid state drive to an operating memory of a computing system during an initialization operation of the computing system. The initialization operation initializes components of the computing system. | 01-22-2015 |
20150033004 | Processing Device - Disclosed herein is a processing device comprising a secured execution environment comprising means for bringing the processing device into a predetermined operational state; and a timer; a communication interface for data communication between the processing device and a remote device management system external to the processing device; wherein the secured execution environment is configured, responsive to an expiry of the timer, to bring the processing device into said predetermined operational state; and responsive to a receipt, from the remote device management system via said communications interface, of a predetermined signal, to restart the timer. | 01-29-2015 |
20150033005 | SYSTEM AND METHOD FOR BOOT ACCELERATION OF A DATA PROCESSING SYSTEM - A system and method to reduce the boot time of a data processing system by informing a memory device to send data prior to the boot time. The data processing system includes: a host system having a host processor and host memory; and (2) the memory device. The memory device is preconfigured in advance prior to the boot time with one or more Read commands with one or more corresponding physical addresses of host memory. This preconfiguration can be done at the time of system integration or before every boot operation. Once the system power-on occurs, the memory device sends the data in packets to the host memory. Whenever the host processor needs data it will be available in host memory which significantly reduces the boot time. | 01-29-2015 |
20150033006 | HIDING LOGICAL PROCESSORS FROM AN OPERATING SYSTEM ON A COMPUTER - Hiding logical processors from an operating system (OS) of a computer is described. In an example, a method of hiding at least one logical processor in a computer having a plurality of logical processors includes: initializing the plurality of logical processors by executing a pre-boot routine in system firmware; identifying at least one logical processor of the plurality of logical processors to be hidden from an operating system (OS) of the computer to provide at least one hidden logical processor and at least one visible logical processor; placing each of the at least one hidden logical processor into a system management mode (SMM) by executing a park routine in the system firmware; and booting the OS of the computer to use the at least one visible logical processor. | 01-29-2015 |
20150039874 | SYSTEM ON A CHIP HARDWARE BLOCK FOR TRANSLATING COMMANDS FROM PROCESSOR TO READ BOOT CODE FROM OFF-CHIP NON-VOLATILE MEMORY DEVICE - Translation of boot code read request commands from an on-board processor of a system on a chip (SoC) from a bus protocol (e.g., advanced high-performance bus (AHB) protocol) into a sequence of commands understandable by a serial interface of the SoC to read boot code from an off-board (e.g., flash or other non-volatile) memory device. The serial interface of the memory device may include a relatively low pin count (e.g., 5 pins) and boot code of the memory device may be modified after tape-out of the SoC free of necessitating a subsequent tape-out of the SoC. | 02-05-2015 |
20150039875 | Deployment of Software Images with Distinct Configuration Logic - A solution for deploying a software image comprising a target operating system on a target computing machine is proposed. A corresponding method comprises mounting the software image as a storage device, identifying each software program comprised in the software image, downloading a configuration logic for configuring each software program, applying each configuration logic against the software image, and booting the target computing machine from the target operating system. | 02-05-2015 |
20150039876 | Parallelizing Boot Operations - The present disclosure describes apparatuses and techniques for parallelizing boot operations. In some aspects, an operation transferring a boot image from a non-volatile memory to a volatile memory is initiated prior to completion an operation validating another boot image previously-transferred into the volatile memory. This can be effective to enable transfer operations and validation operations of boot images to be performed in parallel. By so doing, delays between the transfer and validation operations can be minimized thereby reducing device boot times. | 02-05-2015 |
20150039877 | SYSTEM AND METHODS FOR AN IN-VEHICLE COMPUTING SYSTEM - Embodiments are disclosed for controlling power modes of a computing system. In some embodiments, a method for an in-vehicle computing system includes, while the vehicle is shut down, operating the system in a suspend mode with volatile memory on standby, and determining whether a reboot may be completed before a next anticipated vehicle start. The method may further include, if it is determined that a reboot may be completed before the next anticipated vehicle start, performing a reboot of the system. | 02-05-2015 |
20150039878 | METHOD OF PROGRAMMING THE DEFAULT CABLE INTERFACE SOFTWARE IN AN INDICIA READING DEVICE - An indicia reading apparatus includes an interconnect cable and an indicia reading device. The indicia reading device is configured so that, if the indicia reader device is not configured to any interconnect cable and detects an indicia which does not contain one of a plurality of specified sequences of data elements that the indicia reading device will recognize and use to configure itself to operate with the interconnect cable, the indicia reading device will indicate to the user of the indicia reading device that the indicia reading device needs to be configured to operate with the interconnect cable. | 02-05-2015 |
20150039879 | CubeSat System, Method and Apparatus - A satellite system includes a chassis, an avionics package included within an upper portion of the chassis. The avionics package includes a main system board, a payload interface board, at least one daughter board and a battery board. The main system board, the payload interface board, the at least one daughter board, and the battery board reside in substantially parallel planes. The payload interface board, the at least one daughter board, and the battery board are coupled to the main system board through one or more stackable connectors. A method of operating a satellite is also described. | 02-05-2015 |
20150046692 | SYSTEM ON CHIP FOR REDUCING WAKE-UP TIME, METHOD OF OPERATING SAME, AND COMPUTER SYSTEM INCLUDING SAME - A system on chip (SoC) includes an internal read-only memory (ROM) configured to store a first boot loader; a first internal static random access memory (SRAM) configured to receive a second boot loader output from a booting device, store the second boot loader, and perform a booting sequence according to control of the first boot loader; a second internal SRAM configured to receive a third boot loader output from the booting device, store the third boot loader, and perform a wake-up sequence according to control of the first boot loader; and a dynamic random access memory (DRAM) controller configured to load an operating system (OS) from the booting device into a DRAM according to control of the second boot loader. | 02-12-2015 |
20150052341 | INFORMATION PROCESSING APPARATUS ENABLING HIGH-SPEED START-UP, CONTROL METHOD THEREFOR, AND STORAGE MEDIUM STORING CONTROL PROGRAM THEREFOR - An information processing apparatus that can execute a start-up process properly, even when electric power is cut off without performing a normal power turn-OFF process. A first storage unit stores a program. A second storage unit continues holding information even when a power supply stops. A third storage unit stores information showing a power-OFF-timing state of the information processing apparatus. A control unit determines whether the information showing the power-OFF-timing state obtained from the third storage unit needs read-out of a program at a power ON timing of the information processing apparatus, performs a start-up process after reading and developing the program from the first storage unit to the second storage unit when the read-out of the program is needed, and performs the start-up process without reading and developing the program from the first storage unit to the second storage unit when the read-out of the program is not needed. | 02-19-2015 |
20150052342 | METHOD OF IDENTIFYING SECURITY AND ELECTRONIC DEVICE THEREOF - An apparatus and a method for identifying security of an electronic device are provided. The method includes identifying a security state of a system binary loaded to a memory of the electronic device based on booting of the electronic device in a second operating system of the electronic device, and sending security state information to a first operating system in the second operating system based on a request from the first operating system of the electronic device. | 02-19-2015 |
20150052343 | METHOD AND SYSTEM FOR PROVIDING HYBRID-SHUTDOWN AND FAST STARTUP PROCESSES - In an example, in a method for providing a shutdown process for a computer system including an operating system (OS), basic input/output system (BIOS) firmware may capture a request from the OS to hardware of the computer system to enter into a hibernate state. In addition, the BIOS firmware may determine whether a hybrid-shutdown process is in process and in response to a determination that the hybrid-shutdown process is in process, may turn off the computer system instead of entering the computer system into the hibernate state. | 02-19-2015 |
20150058612 | DECRYPTION KEY MANAGEMENT SYSTEM - A decryption key management system includes a memory, a memory controller, a decryption engine, and an on-chip crypto-accelerator. A key blob and an encrypted code are stored in the memory. The memory controller fetches the key blob and stores it in a memory buffer. The decryption engine fetches the key blob and decrypts it using an OTP key to generate a decryption key. The decryption key is used to decrypt the encrypted code and generate a decrypted code. | 02-26-2015 |
20150058613 | METHOD OF BOOTING SYSTEM HAVING NON-VOLATILE MEMORY DEVICE WITH ERASE CHECKING AND CALIBRATION MECHANISM AND RELATED MEMORY DEVICE - A method of booting a system with a non-volatile memory device includes at least the following steps: when the system is powered on, reading a status flag of at least a memory block of the non-volatile memory device, wherein the status flag indicates whether an erase operation applied to the memory block is successfully completed; selectively performing a leakage calibration process upon the memory block according to the status flag; and booting the system according to a boot code stored in the non-volatile memory device. | 02-26-2015 |
20150067311 | METHOD AND SYSTEM FOR VERIFYING PROPER OPERATION OF A COMPUTING DEVICE AFTER A SYSTEM CHANGE - A method and system for applying a system change in an automated fashion and verifying the correct operation of a computing device after the system change includes allowing the computing device an opportunity to at least temporarily apply the system change, determine whether the system change is successful, and discard the system change if not successful, using operating system and BIOS components. | 03-05-2015 |
20150067312 | AUTOMATED POWER CYCLING UNIT OF A DATA PROCESSING DEVICE - A method, a system, and a device to provide an automated power cycling operation to a data processing device are disclosed. In one embodiment, a method includes receiving an error signal of a data processing device, through a processor of a power cycle unit, wherein the power cycle unit is coupled to the data processing device. In another embodiment, the power cycle unit may disconnect electrical power from a power supply to the data processing device. For example, the data processing device may require a power cycling operation to improve performance and the power cycle unit may comprise one or more routines for a power cycle operation. The power cycle unit may include a processor to detect computational errors and trigger the power cycling operation. Further, an administration server may be in communication with the power cycle unit and may allow a remote triggering of the power cycling operation. | 03-05-2015 |
20150067313 | SYSTEMS AND METHODS FOR SECURE BOOT ROM PATCH - A data processing system includes a boot read only memory (ROM) configured to store boot code; one time programmable (OTP) storage circuitry configured to store patch instructions; a random access memory (RAM); and a processor coupled to the boot ROM, the OTP storage circuitry, and the RAM. The processor is configured to: in response to a reset of the data processing system, copy one or more patch instructions from the OTP storage circuitry into the RAM, and during execution of the boot code, execute a patch instruction from the RAM in place of a boot instruction of the boot code. | 03-05-2015 |
20150067314 | SECURE FIRMWARE FLASH CONTROLLER - A microcontroller that includes a secure firmware flash controller is provided. The secure firmware flash controller utilizes a hardware assisted boot sequence that performs a firmware code validation. If the firmware code fails validation for any reason, the firmware flash controller locks out access to the firmware RAM and firmware flash controller, and passes control back to the microcontroller for further measures that are protected by security protocols on the microcontroller. | 03-05-2015 |
20150067315 | MEMORY APPARATUS AND COMPUTER SYSTEM INCLUDING THE SAME - A semiconductor device includes a memory bank, a data line and a data line control unit. The memory bank stores data. The data line transfers data to be stored in or output from the memory bank. The data line control unit initializes the data line in response to a power-up signal and a write command. | 03-05-2015 |
20150067316 | ELECTRONIC DEVICE AND TESTING METHOD - In a method of testing stability of updating firmware of a baseboard management controller (BMC) of an electronic device, the electronic device comprises a first storage device that stores original firmware data of the BMC, and a second storage device that stores update data of the firmware. The electronic device tests the stability by repeatedly erasing the original firmware data and writing the update data into the first storage device. Once the electronic device updates the firmware of the BMC for a predetermined number of times, the process is ended. | 03-05-2015 |
20150067317 | DEVICE-LESS AND SYSTEM AGNOSTIC UNIFIED EXTENSIBLE FIRMWARE INTERFACE (UEFI) DRIVER - Loading and executing a device-less and system agnostic Unified Extensible Firmware Interface (UEFI) driver configured to filter inputs/outputs (I/O) to storage devices without requiring dependency on a Peripheral Component Interconnect (PCI) type device and/or modifying a system UEFI Basic Input/Output System (BIOS), thereby enabling a software only product supporting booting of an Operating System (OS). | 03-05-2015 |
20150067318 | SELECTIVE DESIGNATION OF MULTIPLE CORES AS BOOTSTRAP PROCESSOR IN A MULTI-CORE MICROPROCESSOR - A microprocessor includes an indicator and a plurality of processing cores. Each of the plurality of processing cores is configured to sample the indicator. When the indicator indicates a first predetermined value, the plurality of processing cores are configured to collectively designate multiple of the plurality of processing cores to be a bootstrap processor. When the indicator indicates a second predetermined value distinct from the first predetermined value, the plurality of processing cores are configured to collectively designate a single processing core of the plurality of processing cores to be the bootstrap processor. | 03-05-2015 |
20150067319 | SNAPSHOTS IN A HYBRID STORAGE DEVICE COMPRISING A MAGNETIC DISK AND A SOLID STATE DISK - One or more snapshots of data stored over a period of time are maintained in a hybrid storage device comprising a magnetic disk and a solid state disk, wherein a selected snapshot stores information that allows recovery of data that is stored in the hybrid storage device at a selected point in time of the period of time. The hybrid storage device receives an input/output (I/O) command from a computational device. A category of a plurality of categories to which the I/O command belongs is determined, wherein the plurality of categories comprise writing to an unused block, writing to a used block, reading from an unused block, and reading from a used block. In response to determining the category to which the I/O command belongs, the I/O command is handled by one of the magnetic disk and the solid state disk based on the determined category. | 03-05-2015 |
20150074384 | SECURE BOOT METHOD, SEMICONDUCTOR DEVICE AND RECORDING MEDIUM - A secure boot method for a system, the system including a processor and a storage medium configured to store a program, a plurality of first partial hash values calculated based on a plurality of first partial programs into which the program is divided, and a first legitimate hash value which is a hash value calculated based on a plurality of first legitimate partial hash values, the plurality of first legitimate partial hash values being calculated based on a plurality of legitimate partial programs. The secure boot method includes calculating, a second calculated hash value based on the plurality of first partial hash values, and determining, whether or not the second calculated hash value matches the first legitimate hash value to continue the start-up processing of the system when the determination indicates match, and suspend the start-up processing of the system when the determination does not indicate match. | 03-12-2015 |
20150074385 | SERVER SYSTEM - A server system includes a PCH, a BMC, a BIOS with a write protect end, and a controlling circuit. The BIOS includes a write protect end. The BMC includes a memory portion storing updated server data. The BIOS is electrically connected to the PCH and is electrically connected to the BMC. The controlling circuit includes a first input end and an output end. The first input end is electrically connected to the PCH. The output end is electrically connected to the write protect end. The controlling circuit is configured so that when an error in the BIOS is detected, the write protect end is opened and the BIOS is updated from the memory portion of the BMC. | 03-12-2015 |
20150074386 | BOOT METHOD AND BOOT SYSTEM - A boot method for a platform system including a Universal Extensible Firmware Interface (UEFI) Basic Input/Output System (BIOS) is provided. The UEFI BIOS includes partitions storing an initial boot program code, a factory setting boot program code, a first customized boot program code, a second customized boot program code and boot information respectively. The provided method comprises steps of: loading the initial boot program code stored in one of the partitions of the UEFI BIOS into a memory, and executing the initial boot program code stored in the memory by a CPU to perform a first phase of boot; and loading one of the factory setting boot program code, the first customized boot program code and the second customized boot program code stored in the partitions of the UEFI BIOS into the memory according to data in the boot information, and executing the program code loaded in the memory to perform a second phase of boot by the CPU. | 03-12-2015 |
20150074387 | SYSTEM AND METHOD FOR AUTO-ENROLLING OPTION ROMS IN A UEFI SECURE BOOT DATABASE - A mechanism for automatically enrolling option ROMs into the system security database used for a UEFI Secure Boot is discussed. A request is received by a computing device to auto-enroll one or more option ROMs for one or more respective devices on the next boot of the system. Upon receiving the request, a flag or other type of indicator indicative of an auto-enroll status is changed to an active mode. The indicator is stored in non-volatile memory and may be stored as a UEFI Authenticated Variable. Following the changing of the indicator, the system is either reset or shut down. During the next boot only, after identifying the indicator indicative of an active mode auto-enroll status, the signatures for the option ROMs of all discovered devices whose signatures do not exist in the system security database are calculated(hashed) and added to the UEFI Secure Boot database without user interaction. | 03-12-2015 |
20150082012 | SYSTEMS AND METHODS FOR PROVISIONING AN INFORMATION HANDLING SYSTEM FOR OPERATING SYSTEM STREAMING BASED ON INFORMATION HANDLING RESOURCE INVENTORY - In accordance with embodiments of the present disclosure, a method for provisioning an information handling system for operating system streaming, the information handling system having one or more information handling resources, may be provided. The method may include receiving from the information handling system a boot request to boot a streaming operating system. The method may also include, responsive to determining that an operating system image associated with the information handling system is not available, instructing the information handling system to boot a service operating system for generating an inventory of the one or more information handling resources. The method may additionally include receiving the inventory from the information handling system. The method may further include generating a new operating system image including drivers for supporting the one or more information handling resources identified in the inventory. | 03-19-2015 |
20150082013 | BOOTSTRAP OS PROTECTION AND RECOVERY - A method, system, and computer program product for protecting a computer system provides bootstrap operating system detection and recovery and provides the capability to detect malware, such as rootkits, before the operating system has been loaded and provides the capability to patch malfunctions that block the ability of the computer system to access the Internet. A method for protecting a computer system includes reading stored status information indicating whether network connectivity was available the last time an operating system of the computer system was operational, when the stored status information indicates that network connectivity was not available, obtaining a software patch, and executing and applying the software patch. | 03-19-2015 |
20150082014 | Virtual Storage Devices Formed by Selected Partitions of a Physical Storage Device - Disclosed is a computer system with a physical storage device. The physical storage device has a plurality of partitions and allows a user to select and combine at least two partitions to form a virtual storage device to be accessed by the operating system and makes unselected partitions inaccessible to the operating system. | 03-19-2015 |
20150082015 | LOW-POWER STARTUP METHOD AND USER EQUIPMENT - The present invention discloses a low-power startup method and a user equipment. The method includes: running, by a user equipment UE, a first subprogram in a boot load program bootloader, so as to determine whether the UE is charged through a universal serial bus interface USB; if the UE is charged through the USB and battery power is lower than a starting threshold, initializing, by the UE, the USB; when the USB successfully enumerates the UE, running, by the UE, a second subprogram in the bootloader to initialize an off-chip random memory in the UE; running, by the UE, a third subprogram in the bootloader to read a system mirror from an off-chip flash memory in the UE and load the system mirror to the off-chip random memory; and running, by the UE, the system mirror to complete a startup. | 03-19-2015 |
20150089210 | ELECTRONIC DEVICE AND LOW BATTERY BOOT-UP METHOD - In a low battery boot-up method executed in an electronic device, boot configurations of the electronic device for low battery boot-up are set and stored in a storage device. When a user command to turn on the electronic device is received after the electronic device has shut down automatically due to low battery, the boot configurations are read from the storage device. The electronic device is controlled to boot-up according to the boot configurations and enter a low battery power-on state. | 03-26-2015 |
20150095631 | SYSTEMS AND METHODS FOR BINDING A REMOVABLE CRYPTOPROCESSOR TO AN INFORMATION HANDLING SYSTEM - In accordance with these and other embodiments of the present disclosure, an information handling system may include a processor and a basic input/output system (BIOS) comprising a program of instructions. The BIOS may be configured to, when read and executed by the processor, calculate a binding secret for binding a cryptoprocessor to a motherboard of the information handling system, the binding secret based on unique identifying information of both the cryptoprocessor and the motherboard, store the binding secret in a non-volatile memory integral to the cryptoprocessor, and validate binding of the cryptoprocessor to the motherboard by comparing a subsequently-calculated binding secret to the binding secret. | 04-02-2015 |
20150095632 | COMPUTER BOOTING SYSTEM AND METHOD FOR COMPUTER SYSTEM - In a computer booting method for a computer system, the computer system includes a serial peripheral interface (SPI) ROM and a supper I/O (SIO) controller. The method initializes a backup BIOS booting block of the SIO controller when the computer system is powered on, and detects whether an original BIOS booting block of the SPI ROM is damaged. A memory address for obtaining the backup BIOS booting block is changed from the SPI ROM to the SIO controller when the original BIOS booting block of the SPI ROM is damaged. The method further restarts the computer system, and executes a main BIOS of the SPI ROM to perform a power-on self test (POST) procedure of the computer system using the backup BIOS booting block of the SIO controller, to make sure that the computer system boots normally. | 04-02-2015 |
20150095633 | TRUSTED BOOT AND RUNTIME OPERATION - An embodiment includes an apparatus comprising: an out-of-band cryptoprocessor including secure non-volatile storage that couples to a root index, having a fixed address, and comprises first and second variables referenced by the root index; and semiconductor integrated code (SIC) including embedded processor logic to initialize a processor and embedded memory logic to initialize a memory coupled to the processor; wherein (a) the SIC is to be executed responsive to resetting the processor and prior to providing control to boot code, and (b) the SIC is to perform pre-boot operations in response to accessing at least one of the first and second variables. Other embodiments are described herein. | 04-02-2015 |
20150106605 | POWER-ON SCHEDULING OF MULTIPLE BLADES REQUIRING A PREBOOT IMAGE FROM A REMOTE DISK - A computer program product includes computer readable program code for obtaining an inventory of hardware devices in each of a plurality of blades, and for calculating, for each of the plurality of blades, an amount of boot time to power-on the blade and reach a condition in which the blade is ready to receive a preboot image. The amount of boot time is calculated as a function of the inventory of hardware devices in the blade. Further computer readable program code is provided for identifying a preboot image load time for each of the blades, and for scheduling power-on of each blade so that a subsequent blade in an order is ready to mount the remote disk and receive the preboot image when a previous blade in the order has received the preboot image and released the remote disk. | 04-16-2015 |
20150106606 | PLUGGABLE CLOUD ENABLEMENT BOOT DEVICE AND METHOD THAT DETERMINES HARDWARE RESOURCES VIA FIRMWARE - A pluggable cloud enablement boot device (PCEBD) is a bootable device that includes all information needed to automatically provision hardware and software to create a computing solution that meets customer requirements. This allows for quickly deploying a computing solution in a manner that eliminates many manual steps that are typically performed today. The PCEBD uses firmware to verify a given platform has sufficient resources to deploy the PCEBD. The computing solution, once provisioned and running, can be modified, and these modifications may be reflected in the definition of the PCEBD. In addition, a computing solution may include multiple resources provisioned from multiple PCEBDs, which can be packaged into a PCEBD that will include other PCEBDs. The result is a way to deploy computing solutions that is much more efficient than the manual methods used in the prior art. | 04-16-2015 |
20150106607 | AUTOMATICALLY REFLECTING CHANGES TO A COMPUTING SOLUTION INTO AN IMAGE FOR THE COMPUTING SOLUTION - A pluggable cloud enablement boot device (PCEBD) is a bootable device that includes all information needed to automatically provision hardware and software to create a computing solution that meets customer requirements. This allows for quickly deploying a computing solution in a manner that eliminates many manual steps that are typically performed today. The PCEBD uses firmware to verify a given platform has sufficient resources to deploy the PCEBD. The computing solution, once provisioned and running, can be modified, and these modifications may be reflected in the definition of the PCEBD. In addition, a computing solution may include multiple resources provisioned from multiple PCEBDs, which can be packaged into a PCEBD that will include other PCEBDs. The result is a way to deploy computing solutions that is much more efficient than the manual methods used in the prior art. | 04-16-2015 |
20150106608 | POWER-ON SCHEDULING OF MULTIPLE BLADES REQUIRING A PREBOOT IMAGE FROM A REMOTE DISK - A method includes obtaining an inventory of hardware devices in each of a plurality of blades, and calculating, for each of the plurality of blades, an amount of boot time to power-on the blade and reach a condition in which the blade is ready to receive a preboot image, wherein the amount of boot time is calculated as a function of the inventory of hardware devices in the blade. In addition, a preboot image load time is identified for each of the plurality of blades. The method then further comprises scheduling power-on of each of the plurality of blades so that a subsequent blade in an order is ready to mount the remote disk and receive the preboot image when a previous blade in the order has received the preboot image and released the remote disk. | 04-16-2015 |
20150106609 | MULTI-THREADED LOW-LEVEL STARTUP FOR SYSTEM BOOT EFFICIENCY - Methods, computer-readable media and devices for executing a plurality of startup instructions are disclosed. For example, a method includes a first processor of a device accessing a plurality of startup instructions in response to a startup of the device. The first processor then executes a first startup instruction of the plurality of startup instructions to perform a first task and executes a second startup instruction of the plurality of startup instructions. The executing the second startup instruction causes the first processor to send a further instruction to a second processor of the device to perform a second task. At least a portion of the first task and at least a portion of the second task are performed at a same time. | 04-16-2015 |
20150106610 | PLUGGABLE CLOUD ENABLEMENT BOOT DEVICE AND METHOD THAT DETERMINES HARDWARE RESOURCES VIA FIRMWARE - A pluggable cloud enablement boot device (PCEBD) is a bootable device that includes all information needed to automatically provision hardware and software to create a computing solution that meets customer requirements. This allows for quickly deploying a computing solution in a manner that eliminates many manual steps that are typically performed today. The PCEBD uses firmware to verify a given platform has sufficient resources to deploy the PCEBD. The computing solution, once provisioned and running, can be modified, and these modifications may be reflected in the definition of the PCEBD. In addition, a computing solution may include multiple resources provisioned from multiple PCEBDs, which can be packaged into a PCEBD that will include other PCEBDs. The result is a way to deploy computing solutions that is much more efficient than the manual methods used in the prior art. | 04-16-2015 |
20150106611 | PLUGGABLE CLOUD ENABLEMENT BOOT DEVICE AND METHOD - A pluggable cloud enablement boot device (PCEBD) is a bootable device that includes all information needed to automatically provision hardware and software to create a computing solution that meets customer requirements. This allows for quickly deploying a computing solution in a manner that eliminates many manual steps that are typically performed today. The PCEBD uses firmware to verify a given platform has sufficient resources to deploy the PCEBD. The computing solution, once provisioned and running, can be modified, and these modifications may be reflected in the definition of the PCEBD. In addition, a computing solution may include multiple resources provisioned from multiple PCEBDs, which can be packaged into a PCEBD that will include other PCEBDs. The result is a way to deploy computing solutions that is much more efficient than the manual methods used in the prior art. | 04-16-2015 |
20150106612 | AUTOMATICALLY REFLECTING CHANGES TO A COMPUTING SOLUTION INTO AN IMAGE FOR THE COMPUTING SOLUTION - A pluggable cloud enablement boot device (PCEBD) is a bootable device that includes all information needed to automatically provision hardware and software to create a computing solution that meets customer requirements. This allows for quickly deploying a computing solution in a manner that eliminates many manual steps that are typically performed today. The PCEBD uses firmware to verify a given platform has sufficient resources to deploy the PCEBD. The computing solution, once provisioned and running, can be modified, and these modifications may be reflected in the definition of the PCEBD. In addition, a computing solution may include multiple resources provisioned from multiple PCEBDs, which can be packaged into a PCEBD that will include other PCEBDs. The result is a way to deploy computing solutions that is much more efficient than the manual methods used in the prior art. | 04-16-2015 |
20150106613 | Multi-Chip Initialization Using a Parallel Firmware Boot Process - Mechanisms, in a multi-chip data processing system, for performing a boot process for booting each of a plurality of processor chips of the multi-chip data processing system are provided. With these mechanisms, a multi-chip agnostic isolated boot phase operation is performed, in parallel, to perform an initial boot of each of the plurality of processor chips as if each of the processor chips were an only processor chip in the multi-chip data processing system. A multi-chip aware isolated boot phase operation of each of the processor chips is performed in parallel, where each of the processor chips has its own separately configured address space. In addition, a unified configuration phase operation is performed to select a master processor chip from the plurality of processor chips and configure other processor chips in the plurality of processor chips to operate as slave processor chips that are controlled by the master processor chip. | 04-16-2015 |
20150113258 | Trust Transference From a Trusted Processor to an Untrusted Processor - A trusted processor is pre-booted using a secure pre-boot loader integrated with the trusted processor. The trusted processor verifies whether an external boot loader is valid, and when valid, the trusted processor is booted using the external boot loader, thereby enabling trusted operation of the trusted processor. The trusted processor verifies whether a firmware image for a field programmable device is valid, and when valid, a firmware image loading process for the field programmable device is triggered. When the firmware image loading process is triggered, the firmware image is loaded into the field programmable device and the field programmable device is released to execute of the firmware image. The field programmable device verifies whether an external boot loader for an untrusted processor is valid, and when valid, the untrusted processor is booted using the external boot loader for the untrusted processor, thereby enabling trusted operation of the untrusted processor. | 04-23-2015 |
20150113259 | Computer with Flexible Operating System - Computer with flexible operating system, referred to the FOS Computer, it is an invention of the electronic information field, aimed at creating a unique mechanism to run the computer. | 04-23-2015 |
20150113260 | INSTALLATION SYSTEM FOR INSTALLING GUEST OPERATING SYSTEM AND METHOD THEREOF - A method for installing a guest operating system on a virtual machine (VM) includes: providing a management interface provided for a user to input or select a command for a VM, and transmitting the command input or selected by the user to a communication module associated with the VM; starting up the VM when the command is a startup command; running a cloudboot system of the VM when the VM is starting up; and downloading an installation file from the server and executing the installation file to install the guest operating system corresponding to the installation file on the VM when the command is a download command. | 04-23-2015 |
20150121053 | Loading An Operating System Of A Diskless Compute Node Using A Single Virtual Protocol Interconnect ('VPI') Adapter - Loading an operating system of a diskless compute node using a single Virtual Protocol Interconnect (VPI) adapter, including: setting, by a VPI firmware module during startup of the compute node, an operational mode of the VPI adapter to operate in accordance with a first data communications protocol, the VPI adapter including a preboot execution environment module that supports the first data communications protocol prior to loading an operating system and a driver for the first data communications protocol; retrieving, by the VPI firmware module from a network source via the VPI adapter in accordance with the first data communications protocol, the operating system and a driver for the second data communications protocol; and responsive to loading the operating system and the driver for the second data communications protocol, switching the operational mode of the VPI adapter to operate in accordance with the second data communications protocol. | 04-30-2015 |
20150121054 | Platform Secure Boot - A system and method for securing a boot process on the electronic device using a hardware-based secure processor are provided. The hardware-based secure processor receives a boot instruction. In response to the received boot instruction, the hardware-based secure processor authenticates the boot code in hardware while stalling the processor. Once the boot code is authenticated, the processor is released from the stall and processes the boot code. | 04-30-2015 |
20150121055 | FLEXIBLE BOOTSTRAP CODE ARCHITECTURE - The present disclosure is directed to flexible bootstrap code architecture. A device may comprise equipment for operating the device and an operating system (OS) for operating the equipment A boor, module may also be included in the device to execute boot operations. At least one flexible boot (FB) module in the boot module may interact with the equipment and/or OS during the boot operations to cause the boot operations to become device-specific. An example boot module may comprise a plurality of FB modules. An example FB module may verify a device/chipset identification and may control the boot operations based on the identification. Other example FB modules may select resources to load based on an OS type, may provide a boot configuration table location for use in OS runtime boot configuration or may load variables from a preload variable directory for use in configuring boot operations. | 04-30-2015 |
20150121056 | INFORMATION PROCESSING SYSTEM, MANAGEMENT APPARATUS, AND MANAGEMENT METHOD - By causing information processing apparatuses belonging to a same group to be in a same state and transmitting operation information received from an input unit to the information processing apparatuses belonging to the same group simultaneously or approximately simultaneously, the operations of the information processing apparatuses belonging to the same group are synchronized with each other, and operation results received from the synchronized information processing apparatuses belonging to the same group are output by an output unit. In this way, the plurality of grouped information processing apparatuses can be simultaneously operated. | 04-30-2015 |
20150127930 | AUTHENTICATED DEVICE INITIALIZATION - Apparatus and method for performing authentication processing during device initialization. In accordance with some embodiments, a data storage device has a main memory which stores user data from a host, and a controller with initialization programming stored in a boot memory. The initialization programming is executed by the controller to transition the data storage device from an inactive state to a normal operational mode. During a bootstrap mode, the controller generates a first authentication token, receives a second authentication token responsive to the first authentication token, and authorizes use of new system programming responsive to the second authentication token. The new system programming is stored in a local memory of the data storage device and executed by the controller during the normal operational mode. | 05-07-2015 |
20150127931 | INFORMATION PROCESSING APPARATUS, BOOT UP METHOD, AND COMPUTER-READABLE STORAGE MEDIUM STORING BOOT UP PROGRAM - A SBSP writes a log into a spad in a log processor and the writing of the log from the spad to a serial port is performed by the log processor. When initialization of a main memory has been completed, the log processor temporarily writes the data read from the spad into a logmem and then clears the spad. Furthermore, when an output of the log performed by the log processor has been completed, the SBSP adds, in cooperation with the BIOS and the OS, the log processor and the logmem as the resources. | 05-07-2015 |
20150127932 | APPARATUS AND METHOD FOR BOOTING IN COMPUTER DEVICE WITH BUILT-IN COMMUNICATION MODULE - An apparatus and method control booting in a mobile device with a built-in communication module to prevent a service user from using the mobile device for other purposes and to prevent the service user from subscribing to another service provider. A method includes determining, during a booting operation, whether the communication module is mounted with a USIM. A forced booting termination message is displayed if the communication module is not mounted with the USIM. And power supply is interrupted after a predetermined time from displaying the forced booting termination message. | 05-07-2015 |
20150134941 | CONTROL CENTER DEPLOYMENT METHOD FOR CLOUD-BASED SYSTEM - A control center deployment method for a cloud-based system is provided. The cloud-based system includes a first appliance. The control center deployment method is applied to the first appliance and includes the following steps: (a) storing an image file corresponding to a virtual machine combined with a first control center and installing an operating system simultaneously; (b) defining a management network port connected with the management LAN for the first control center during installing the operating system; and (c) creating a virtual switch to connect the first control center with the management network port upon installing the operating system so that the first control center controls the cloud-based system through the virtual switch, the management network port and the management LAN. | 05-14-2015 |
20150134942 | HARDWARE ROOTED ATTESTATION - Computing devices that perform hardware rooted attestation are described, as are methods for use therewith, wherein such devices include a system integrated TPM (e.g., a firmware-based TPM), with m boot chain components loaded and executed prior to the system integrated TPM. Between powering-up of a device and the system integrated TPM being loaded and executed, seed morphing is performed for n=0 to m. This involves an n | 05-14-2015 |
20150134943 | SYSTEM AND A METHOD OF BUILDING A PRIMARY SYSTEM - According to one exemplary embodiment, a system of building a primary environment may comprises an external storage module and a smart device. The external storage module stores multiple digital data. Data transmission for the multiple digital data is provided between the external storage module and the smart device. The multiple digital data at least includes external data of an operation system (OS)/Application OS (AppOS), and resident data of the OS/AppOS. After the smart device starts up, at least one first loader of the storage module is duplicated as a second loader of the smart device. The second loader loads the external data and the resident data respectively to integrate as an AppOS image file, and activates the image file to launch an AppOS environment. | 05-14-2015 |
20150134944 | DATA TERMINAL RUNNING MODE SWITCHING METHOD, DEVICE, AND DATA TERMINAL - Disclosed is a data terminal running mode switching method, a device and a data terminal. The method comprises: a data terminal booting into a first running mode, the data terminal judging whether the first running mode matches with a type of an operating system running on a computer or not, if yes, the data terminal continuing to normally run under the first running mode; if no, switching to a second running mode that matches with the type of the operating system running on the computer, and running under the second running mode. Embodiments of the present invention document solve the problems of incompatibility and nonsupport between a running mode of a data card and an operating system running on a computer. | 05-14-2015 |
20150134945 | INFORMATION PROCESSING DEVICE, INFORMATION PROCESSING METHOD, AND RECORDING MEDIUM STORING CONTROL PROGRAM - An information processing device, includes: a storage to store a program to be booted; a central processing unit to start a plurality of booting programs and read the program stored in the storage using a virtual address; a main memory to store the program based on a read instruction of the program; and a controller, including an address translator that translates a virtual address into a physical address, to read the program from the storage according to the read instruction, and write the read program in a plurality of discontinuous areas of the main memory on the physical address, wherein the central processing unit executes a start module which sets a virtual address space in the central processing unit and the controller before the plurality of booting programs are booted, and reads the written program from the main memory using the virtual address which is designated by the reading instruction. | 05-14-2015 |
20150134946 | SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCT FOR SELECTING AND OFFERING COMPUTATIONAL FUNCTIONALITIES TO A USER - A method system and computer product are provided to drive a process that includes powering up the computer; executing a basic input output system procedure; requesting information about and/or from a user; receiving information about and/or from the user; offering access to at least one computational functionality by the computer at least partly on the basis of the received information; and fulfilling the boot-up procedure. The offering of access to at least one computational functionality may include visually presenting an image to the user that when selected directs the computer to launch an associated software program and/or initiate a web service or a communications session. The computational functionality may include or provide accessibility to a web service via the Internet and/or establishing and maintaining a communications session. | 05-14-2015 |
20150143094 | System and Method to Perform an OS Boot Using Service Location Protocol and Launching OS Using a Dynamic Update of Network Boot Order Without a Reboot - A system, method, and computer-readable medium are disclosed for a boot mapping system. More specifically, in certain embodiments, BIOS of an information handling system includes a boot mapping system which allows the information handling system to boot up regardless of a boot order change in a network mode of operation or a BIOS boot order change. Additionally, in certain embodiments, the boot mapping system further includes a service location protocol (SLP) which locates operating system images based on the type of network protocol selected for deployment. | 05-21-2015 |
20150143095 | BIOS FAILOVER UPDATE WITH SERVICE PROCESSOR - Certain aspects direct to basic input/output system (BIOS) failover update with a service processor (SP). In certain embodiments, the system includes a host computer and a SP. A CPU of the host computer loads and executes a current BIOS image stored in a BIOS chip to a memory as a BIOS instance. The SP receives, from the executed BIOS instance at the host computer, a BIOS image as a failover backup image, and stores the failover backup image in the volatile memory of the SP. When an error occurs at the host computer, the executed BIOS instance sends a request for the failover backup image to the SP. In response, the SP sends a copy of the failover backup image to the host computer such that the executed BIOS instance may replace the current BIOS image stored in the BIOS chip with the copy of the failover backup image. | 05-21-2015 |
20150143096 | METHOD AND CHIP CARD FOR TRANSMITTING INFORMATION - A card including a data transmission mechanism using annex transmission channels. A method is described for the transmission of data by a chip card at an end of its life using hidden communication channels different from standard communication channels of the card. The data are transmitted by modulating a binary signal that results from a modification of a hardware parameter of the card. | 05-21-2015 |
20150143097 | INFORMATION PROCESSING APPARATUS THAT SAVES DATA IN MAIN STORAGE DEVICE AND CONTROL METHOD THEREFOR, AND STORAGE MEDIUM - An information processing apparatus that can flexibly change an amount of data to be saved. A determining unit determines, at a time when the information processing apparatus is started up, whether termination processing has abnormally ended last-time or not. A detecting unit detects an instruction indicating processing that should be performed at the time of the start-up when the determining unit determines that the termination processing has abnormally ended last-time. A saving unit saves, under the instruction detected by the detecting unit, data stored in a save area determined by the instruction from among storage areas of a nonvolatile main storage device, to a save destination determined by the instruction. | 05-21-2015 |
20150143098 | METHOD FOR UPDATING FIRMWARE OF AN ELECTRONIC DEVICE WITHIN A COMPUTER - A method for updating firmware of a hard disk drive (HDD) within a computer. In order to use the firmware that has been updated without rebooting the computer, the old identification information of the old firmware is loaded into a random-access memory (RAM) of the HDD. The new firmware containing new identification information is written in the non-volatile memory of the HDD during a power-on state of the computer. The new firmware containing new identification information is loaded into the RAM, and the new identification information is rewritten with the old identification information. The old identification information at the RAM of the HDD is sent back in response to a request of identification information from the operating system prior to cold boot. | 05-21-2015 |
20150143099 | METHOD AND APPARATUS FOR ENHANCING A HIBERNATE AND RESUME PROCESS USING USER SPACE SYNCHRONIZATION - Before hibernating a computing device ( | 05-21-2015 |
20150149750 | BIOS UPDATE WITH SERVICE PROCESSOR WITHOUT SERIAL PERIPHERAL INTERFACE (SPI) ACCESS - Certain aspects direct to BIOS update with a service processor (SP) without access through a serial peripheral interface (SPI). In certain embodiments, the system includes a SP, which includes a processor, a non-volatile memory, a volatile memory and a system interface. The SP receives a BIOS image from a remote management computer, and stores the BIOS image in the volatile memory. When the SP receives, from a BIOS executed at a central processing unit (CPU) of a host computer through the system interface, a request for the BIOS image, the SP sends a copy of the BIOS image in response to the request for the BIOS image to the host computer through the system interface such that the BIOS executed at the CPU of the host computer replaces a current BIOS image stored in a BIOS chip with the copy of the BIOS image. | 05-28-2015 |
20150149751 | CPU-BASED MEASURED BOOT - A measured boot process for an electronic device includes taking a measurement of the early system start up instructions of the electronic device upon a reboot or start-up of the device. A representation of the measurement is stored in a trusted platform module of the electronic device prior to initialization of the trusted platform module. Access is granted to the representation of the measurement stored in the trusted platform module prior to initialization of the trusted platform module thereby enabling the representation of the measurement to serve as the core root of trust for measurement. | 05-28-2015 |
20150149752 | SERVER AND CONTROL METHOD THEREOF - The disclosure provides a server and a control method thereof, and the server includes a memory unit and a basic input/output system (BIOS). The memory has an address space into which a specific string is written. When the server is booted, the BIOS is started to inquire the address space and determine whether the address space has the specific string or not, to determine whether to load a BIOS default setup. When the address space has the specific string, the BIOS loads the BIOS default setup and deletes the specific string in the address space. | 05-28-2015 |
20150149753 | SERVER AND INSPECTING METHOD THEREOF - Disclosed herein are a server and a inspecting method thereof. The server comprises a baseboard management controller, a field-replaceable unit coupled with the baseboard management controller, and a basic input/output system (BIOS). After the server is powered on, the BIOS starts running, performs power-on self-test for the server to generate current hardware configuration data, and obtains preset hardware configuration data from the field-replaceable unit through the baseboard management controller. The BIOS then determines whether the current and the preset hardware configuration data agree. | 05-28-2015 |
20150149754 | SERVER AND INSPECTING METHOD THEREOF - Disclosed herein are a server and an inspecting method thereof. The server comprises a baseboard management controller (BMC), a non-volatile memory coupled with the baseboard management controller, and a basic input/output system. After the server is powered on, the basic input/output system starts running, performs power-on self-test for the server to generate current hardware configuration data. The BMC then determines whether preset hardware configuration data, stored beforehand in the non-volatile memory, and the current one agree. If the preset and the current hardware configuration data have one or more mismatches, the BMC records the mismatch or mismatches in an event log. | 05-28-2015 |
20150149755 | PROJECTOR AND BOOT UP METHOD THEREOF - A projector comprises an environment detecting module and a processing module. The environment detecting module detects a predetermined environmental information at a first time and a real-time environmental information at a second time. The processing module is coupled to the environment detecting module, receives the predetermined environmental information and the real-time environmental information and executes a boot up method. The boot up method includes the steps of: storing and defining the predetermined environmental information as a comparison reference; and comparing the predetermined environmental information with the real-time environmental information, wherein when the predetermined environmental information and the real-time environmental information are substantially the same, a boot up program is executed, and when the predetermined environmental information and the real-time environmental information are substantially different, an authorization command request is outputted. A boot up method of a projector is also disclosed. | 05-28-2015 |
20150149756 | SYSTEM AND METHOD FOR SETTING UP A BOOTABLE STORAGE DEVICE USING IMAGE - A system and method for setting up a bootable storage device using an image are disclosed, a booting image supporting the network file system service is built up in an OS installed into a temporary device, the booting image and the kernel of the OS are copied to a pre-boot execution environment (PXE) root directory of the target device, and a bootable storage device is built up on the target device with the PXE root directory of the target device after the target device is booted, afterwards, whereby solving the issue encountered in the prior art, and achieving the technical efficacy of installing software in the OS booted through the network. | 05-28-2015 |
20150149757 | System and Method for Validating Components During a Booting Process - A method and system for validating components during a booting process of a computing device are described herein. The method can include the steps of detecting a power up signal and in response to detecting the power up signal, progressively determining whether software components of the computing device are valid. If the software components are determined to be valid, the computing device may be permitted to move to an operational state. If, however, at least some of the software components are determined to be not valid, the computing device may be prevented from moving to the operational state. In one arrangement, if the computing device is prevented from moving to the operational state, corrective action can be taken in an effort to permit the computing device to move to the operational state. | 05-28-2015 |
20150149758 | METHOD, COMPUTER READABLE MEDIUM AND DEVICE FOR THE CONFIGURATION OR MAINTENANCE OF A COMPUTER SYSTEM IN A CLUSTER - The configuration and maintenance of a computer system in a cluster, where the computer system is configured to allow booting from data stored in an administration computer system is disclosed. In one aspect, after obtaining a boot disk image making it possible to boot an operating system and configuration data from the administration computer system, the operating system is booted and configured and a virtual storage disk is created. The configuration data received are analyzed in order to obtain and store in the virtual disk a program for the configuration of the computer system. The program for the configuration of the computer system is then executed. | 05-28-2015 |
20150149759 | Electronic Device Including a Memory Technology Device - The electronic device may include a RAM, a nonvolatile storage device as an MTD, and firmware that may be stored on the nonvolatile storage device. The firmware may include a kernel that is expanded onto the RAM and a root disk image as a root file system. The kernel mounts the root disk image on the nonvolatile storage device as the root file system when a boot mode of the electronic device is a normal boot mode. The kernel, when the boot mode is an update mode for updating the firmware on the nonvolatile storage device, may i) generate a RAM disk as an MTD in an area of the RAM not under management of the kernel, ii) expand the root disk image on the nonvolatile storage device into the RAM disk, and iii) mount the root disk image on the RAM disk as the root file system. | 05-28-2015 |
20150149760 | Context Agent Injection Using Virtual Machine Introspection - A computer implemented method, apparatus, and computer usable program code for executing a process within a virtual machine. A module is injected into an operating system for the virtual machine to form an injected module. The injected module is executed to load an agent process within an application space within the virtual machine. Execution of the agent process is initiated by the injected module. | 05-28-2015 |
20150294119 | BOOTING A MULTI-NODE COMPUTER SYSTEM FROM A PRIMARY NODE DYNAMICALLY SELECTED BASED ON SECURITY SETTING CRITERIA - A computer program product including a computer readable storage medium having program instructions embodied therewith. The program instructions are executable by a processor to cause the processor to perform a method including identifying, from among nodes within a multi-node system, a node that has a security setting satisfying a security setting criteria, booting the multi-node system with the identified node as the primary node; and operating the multi-node system using the security setting of the identified node. Accordingly, the method may provide dynamic selection of a primary node based upon the security setting criteria and the security settings of the nodes within the multi-node system. In non-limiting examples, the security setting criteria may be the highest security setting among all nodes within the multi-node system or a predetermined minimum security setting, such as a trusted execution technology setting. | 10-15-2015 |
20150301836 | DISPLAY DEVICE AND METHOD OF CONTROLLING THEREFOR - A method of controlling an operation of a display device is described. The display device includes a memory including a self-refresh memory block, a display module and a controller configured to control the operation of the display device. The controller is configured to receive a power-off signal, store a system booting file and a predetermined snapshot image in a self-refresh memory block based on a predetermined self-refresh mode, receive a power-on signal, boot a system by extracting the system booting file from the self-refresh memory block, and control the display module to display the predetermined snapshot image. A content is contiguously displayed by the display module when the power-off signal is received. An image configured by default is displayed by the display module after the power-on signal is received. A specific content is executed which is selected according to a user access frequency. | 10-22-2015 |
20150301874 | SYSTEMS AND METHODS OF SECURE DOMAIN ISOLATION INVOLVING SEPARATION KERNEL FEATURES - Systems and methods are disclosed for providing secure information processing. In one exemplary implementation, there is provided a method of secure domain isolation. Moreover, the method may include configuring a computing component with data/programming associated with address swapping and/or establishing isolation between domains or virtual machines, processing information such as instructions from an input device while keeping the domains or virtual machines separate, and/or performing navigating and/or other processing among the domains or virtual machines as a function of the data/programming and/or information, wherein secure isolation between the domains or virtual machines is maintained. | 10-22-2015 |
20150302203 | COMPUTER SYSTEM AND METHOD OF SECURELY BOOTING A COMPUTER SYSTEM - A computer system includes a data network connection, a reading device, an input component and a security device, wherein the security device establishes a data network link via the data network connection as the computer system is starting up and said security device further receives access data either via the data network link or via the reading device and the input component, and said security device compares the received access data with a data record stored in a firmware on a memory element and boots the computer system if the comparison was successful. | 10-22-2015 |
20150309804 | DECOALESCING RESOURCE UTILIZATION AT BOOT - An embodiment provides a method, including: in a system, determining a set of processes which run at system boot; monitoring the processes at system boot for system resource utilization; categorizing processes of the set of processes based on said monitoring; and changing a start time during boot of at least one process based on said categorizing. Other aspects are described and claimed. | 10-29-2015 |
20150309805 | Booting a Physical Device Using Custom-Created Frozen Partially-Booted Virtual Machines - In one embodiment, a physical device (e.g., packet switching device, computer, server) is booted using custom-created frozen partially-booted virtual machines, avoiding the time required for an end-to-end boot process. In one embodiment while the system is operating under a current version, a partially-booted virtual image of a new operating version for each of multiple processing elements of the device is produced according to static configuration information specific to the device, with each of these partially-booted virtual machines frozen. The device is rebooted to a fully operational device by unfreezing these partially-booted virtual machines, thus removing this portion of a boot process from the real-time booting of the device. The generation of the frozen partially-booted virtual machines is advantageously performed by the device itself based on current static configuration information and the availability of the specific hardware configuration of the device. | 10-29-2015 |
20150309806 | DISPLAY APPARATUS AND CONTROLLING METHOD THEREOF - A display apparatus and a controlling method thereof are provided. The controlling method of a display apparatus includes receiving a power-off command through a control apparatus to control the display apparatus, storing image content information and identification information, the image content information being about an image content which is displayed by the display apparatus at a time at which the power-off command is input, and the identification information being about the control apparatus, in response to a power-on command being input, determining whether information included in the power-on command matches the stored identification information, and in response to the information included in the power-on command matching the stored identification information, displaying the stored image content information. | 10-29-2015 |
20150310214 | ENABLING AN EXTERNAL OPERATING SYSTEM TO ACCESS ENCRYPTED DATA UNITS OF A DATA STORAGE SYSTEM - The present invention is notably directed to a method for allowing an operating system, or OS, to access an encrypted data storage system of a computer ( | 10-29-2015 |
20150317165 | LIVE INITIALIZATION OF A BOOT DEVICE - Embodiments of the present invention are provided that include executing, by a processor, a software stack received from a first boot image, and retrieving and executing, by the processor, a second software stack. A writeable boot device such as a storage device with a removable medium is detected, and the second software stack is saved by replacing, on the writeable boot device, the first boot image with a second boot image comprising the second software stack. | 11-05-2015 |
20150317166 | ELECTRONIC DEVICE AND OPEN DETECTING DEVICE FOR ENCLOSURE - An electronic device includes an enclosure, a cover for closing the enclosure, a detecting module, a timer, and a system controller. The detecting module can detect if the cover is opened relative to the enclosure. The timer is coupled to the detecting module. The system controller is coupled to the timer. The timer is configured to time an open period of the cover. The system controller can shut down an operating system of the electronic device when the open period exceeds a predefined period. | 11-05-2015 |
20150317168 | Self-Service Terminal (SST) Secure Boot - A Basic Input/Output System (BIOS) of a device is modified to: obtain a first value from a medium interfaced to the device, produce a second value from boot data resident on the medium, compare the first value to the second value, and boot from the boot data of the medium when the first value is equal to the second value. | 11-05-2015 |
20150317169 | CONSTRUCTING AND OPERATING HIGH-PERFORMANCE UNIFIED COMPUTE INFRASTRUCTURE ACROSS GEO-DISTRIBUTED DATACENTERS - Systems and methods are disclosed for provisioning and managing cloud-computing resources, such as in datacenters. One or more network controllers enable the creation of a unified compute infrastructure and a private cloud from connected resources such as physical and virtual servers. Such controller instances can be virtual or physical, such as a top-of-rack switch, and collectively form a distributed control plane. | 11-05-2015 |
20150324137 | Method and Computing Device for Using Both Volatile Memory and Non-Volatile Swap Memory to Pre-Load a Plurality of Applications - The following embodiments generally relate to the use of a “swap area” in a non-volatile memory as an extension to volatile memory in a computing device. These embodiments include techniques to use both volatile memory and non-volatile swap memory to pre-load a plurality of applications, to control the bandwidth of swap operations, to encrypt data stored in the swap area, and to perform a fast clean-up of the swap area. | 11-12-2015 |
20150324209 | Operating System Switching Method and Dual-Operating System Electronic Device Using the Same - An operating system switching method and a dual operating system electronic device using this method are disclosed. The dual operating system electronic device includes a storage unit, a booting process and a processing unit. The operating system switching method includes the following steps: receiving a launch command corresponding to the representative icon to read the application program data under the status of running the first operating system; creating an operating command in the shared partition for executing the application program and opening the user designated file; writing a switching command in the booting process for booting with the second operating system; rebooting with the second operating system according to the switching command; and executing the application program and opening the user designated file under the status of running the second operating system according to the operating command. | 11-12-2015 |
20150324588 | PRE-BOOT SOFTWARE VERIFICATION - Methods and systems for implementing pre-boot software verification may involve using an embedded controller (EC) and a basic input/output system (BIOS) to confirm each other's firmware using hash values. The hash values may be generated from certain portions of the firmware, which may overlap and may be specific to a particular firmware version. | 11-12-2015 |
20150331692 | SYSTEMS AND METHODS FOR LIVE OPERATING SYSTEM UPGRADES OF INLINE CLOUD SERVERS - An upgrade method for a Unix or Unix-like operating system, a server, and a cloud-based system include operating a server with an old operating system with a partition structure for media, wherein the partition structure includes a root partition and a usr partition; copying media to the root partition and the usr partition associated with a new operating system while the old operating system is operating; rebooting the server with the new operating system set to load; and subsequent to the rebooting, making the root partition persistent using memory and the usr partition persistent using a NULL file system. | 11-19-2015 |
20150331693 | AUTOMATIC RECONFIGURATION OF A PRE-CONFIGURED HYPER-CONVERGED COMPUTING DEVICE - In a computer-implemented method for automatic reconfiguration of a computing device for supporting a virtualization infrastructure, wherein the computing device comprises independent server nodes, upon initialization of the computing device, functioning independent server nodes of the independent server nodes self-register with one another, wherein one of the independent server nodes is a default primary independent server node comprising virtualization infrastructure management software. In response to the default primary independent server node not self-registering with the functioning independent server nodes, one of the functioning independent server nodes is automatically reconfigured as a new primary independent server node. | 11-19-2015 |
20150331694 | INSTALLATION OF OPERATING SYSTEM ON HOST COMPUTER USING VIRTUAL STORAGE OF BMC - Certain aspects of present disclosure are directed the present disclosure relates to a baseboard management controller (BMC) implemented method of installation of operating system (OS) on a host computer using virtual storage of BMC. The method includes: (a) receiving a device request from the host computer to access a storage device, (b) simulating the storage device to host computer according to the device request, (c) receiving a data request command from host computer, (d) transferring requested data to the host computer according to the data request command, (e) receiving a data storage command from host computer directed to the simulated storage device and writing a status file at request of the data storage command, (f) determining if the status file exists in the simulated storage, and (g) stopping emulating the storage device to the host computer through the first communication interface if it is determined that the status file exists. | 11-19-2015 |
20150331698 | METHOD FOR LOADING AN APPLICATION CONSISTING OF A PLURALITY OF COMPONENTS INTO A DEVICE CONSISTING OF A PLURALITY OF COMPONENTS - The invention provides a method for loading an application unit into a device, with the device comprising a plurality of device components, and the application unit comprising two or more application components, and one application component being intended for one device component in each case. The application unit is loaded into a selected device component of the device components. Starting out from the selected device component, each application component is loaded into that device component for which the application component is intended. | 11-19-2015 |
20150332050 | BOOT MECHANISMS FOR BRING YOUR OWN MANAGEMENT - The present invention is notably directed to a user portable device ( | 11-19-2015 |
20150332052 | ENABLING AN EXTERNAL OPERATING SYSTEM TO ACCESS ENCRYPTED DATA UNITS OF A DATA STORAGE SYSTEM - A method for allowing an operating system (OS), to access an encrypted data storage system of a computer, wherein: the data storage system comprises: a partition; and first encrypted data units that comprise partition table data of said data storage system; and said computer is connectable to an external device comprising: a boot loader for an external OS that is not installed on the computer; and partitioning information capturing an expected location of said partition in the data storage system; and wherein second encrypted data units that comprise reference partition table data for said data storage system are available from said computer or said external device, the method comprising: upon connection of said external device to the computer, instructing to boot the computer from said boot loader; and during or after booting of the computer: comparing the first and second encrypted data units; and if the first and second encrypted data units match, allow the external OS to access, based on the partitioning information stored on the external device, one or more data units of said partition on the data storage system. | 11-19-2015 |
20150339129 | SYSTEM AND METHOD THEREOF TO OPTIMIZE BOOT TIME OF COMPUTERS HAVING MULTIPLE CPU's - A method and system is provided for optimizing a boot time of a computer system with at least one CPU, in response to a boot command. The system comprises of a memory and a processor. The processor executes a set of instructions stored in the memory to access a task description chart (TDC) comprising a set of essential tasks related to the booting of the system. The TDC is processed offline to create two sets of scheduling charts: an independent task chart (ITC) and a dependent task chart (DTC). The ITC includes all the independent tasks and the DTC includes all the dependent tasks. The DTC is further divided into DTC | 11-26-2015 |
20150339134 | PROGRAM STARTUP METHOD, APPARATUS AND TERMINAL - A program startup method, apparatus and terminal are provided. The method includes: determining at least one target program from programs according to history startup information of the plurality of programs in a prefetch database, where the history startup information comprises startup moments of the plurality of programs; loading prefetch data corresponding to the target program into internal memory and locking the prefetch data in startup of an automatic startup item of an operating system; unlocking the prefetch data corresponding to the target program in the case where a startup event of the target program is detected; accessing the prefetch data corresponding to the target program in the internal memory; and running code of the target program according to the prefetch data corresponding to the target program to start up the target program. | 11-26-2015 |
20150339481 | ELECTRONIC DEVICE HAVING WAKE UP VERIFICATION AND ELECTRONIC SYSTEM HAVING THE ELECTRONIC DEVICE - An electronic system having wake up verification comprises an electronic device and a mobile device. The electronic device wirelessly connects to the mobile device. When the mobile device executes a verification program, the mobile device provides a sampling signal input interface on which a user can input a sampling signal. When the sampling signal is input, the mobile device transforms the sampling signal into sampling data and transmits the sampling data to the electronic device. The electronic device verifies the sampling data. When the sampling data are correct, the electronic device executes an operation system. When the sampling data are incorrect, the electronic device cannot execute the operation system. Therefore, information stored in the electronic device can be protected by two factor authentication to increase reliability for safeguarding information. | 11-26-2015 |
20150346806 | System on a Chip with Fast Wake from Sleep - In an embodiment, a system on a chip (SOC) includes a component that remains powered when the remainder of the SOC is powered off. The component may include a sensor capture unit to capture data from various device sensors, and may filter the captured sensor data. Responsive to the filtering, the component may wake up the remainder of the SOC to permit the processing. The component may store programmable configuration data, matching the state at the time the SOC was most recently powered down, for the other components of the SOC, in order to reprogram them after wakeup. In some embodiments, the component may be configured to wake up the memory controller within the SOC and the path to the memory controller, in order to write the data to memory. The remainder of the SOC may remain powered down. | 12-03-2015 |
20150346808 | START-UP ARCHITECTURE OF REDUNDANT POWER SUPPLY SYSTEM - A start-up architecture of a redundant power supply system is provided. The redundant power supply system is electrically connected to a load, and includes N+M power supplies, where N≧1 and M≧1. The start-up architecture includes a power integration backboard electrically connected to the power supplies, and a mode switching member. The power integration backboard includes an activation circuit, and has a synchronous booting mode in which the power supplies are simultaneously activated and a sequential booting mode in which the power supplies are sequentially activated. The mode switching member is electrically connected to the activation circuit, and receives a manual switching of a user to output a synchronous booting signal that controls the power integration backboard to enter the synchronous booting mode and to output a sequential booting signal that controls the power integration backboard to enter the sequential booting mode. | 12-03-2015 |
20150347151 | SYSTEM AND METHOD FOR BOOTING FROM A NON-VOLATILE MEMORY - A method of booting a computer system using a non-volatile memory of a memory module of the computer system is disclosed. According to one embodiment, a memory controller driver of a memory module of the computer system is stored in a non-volatile memory of the memory module. A memory controller of the memory module has a register that is set to indicate a location of the memory controller driver in the non-volatile memory of the memory module. The memory controller determines the location of the memory controller driver of the memory module using the register. The memory controller driver is transferred from the non-volatile memory to a buffer of the memory controller and subsequently from the buffer of the memory controller to a main memory of the computer system. The computer system initializes the memory module using the memory controller driver. | 12-03-2015 |
20150347152 | SYSTEM AND METHOD AND FOR SELECTING BOOT CONFIGURATION USING NEAR FIELD COMMUNICATION - A system and method to select boot configuration utilizes a processor, a near field communication (NFC) module coupled to the processor, and a near field communication (NFC) tag proximately located to the NFC module. The NFC tag operates as a system configuration tag to configure boot mode of the processor. | 12-03-2015 |
20150347154 | LIVE INITIALIZATION OF A BOOT DEVICE - Various embodiments of the present invention that include executing, by a processor, a software stack. A writeable boot device such as a storage device with a removable medium is detected, and a second software stack is saved by replacing, on the writeable boot device, a first boot image with a second boot image comprising a second software stack. | 12-03-2015 |
20150347155 | SWITCHING BETWEEN OPERATIONAL CONTEXTS - Multiple operational contexts are called up from a Standby power state of a computing device. The operational contexts run on one or more operating systems of the computing device. When a desired operational context is chosen, such as by activation through a user initiated act or hot key, the operating system supporting the desired operational context is booted up from the Standby power state. | 12-03-2015 |
20150347757 | SYSTEM AND METHOD FOR ENCRYPTION OF DISK BASED ON PRE-BOOT COMPATIBILITY TESTING - Disclosed are systems, methods and computer program products for encryption of disk based on pre-boot compatibility testing. An example method includes upon determining, by a processor, no test booting of the computer, performing one or more pre-boot compatibility tests to boot an operating system of the computer; upon detecting a successful test booting, performing booting the operating system of the computer or performing the one or more pre-boot compatibility tests again; upon detecting an unsuccessful test booting, restoring a process of ordinary booting of the operating system and performing an ordinary booting of the operating system; determining one or more encryption policies applicable to a pre-boot execution stage of the computer; and comparing results of the one or more pre-boot compatibility tests with the encryption policies to determine whether to apply a full disk encryption to the boot disk. | 12-03-2015 |
20150355910 | ELECTRONIC APPARATUS, NON-TRANSITORY COMPUTER READABLE MEDIUM, AND INFORMATION PROCESSING METHOD - An electronic apparatus includes a first boot unit and a boot management unit. The first boot unit performs a first boot process for booting a first program. The boot management unit performs control of the first boot unit so as not to boot the first program in the first boot process next time when an interruption of the first boot process occurs and the interruption is caused by the first program being booted. The boot management unit does not perform the control when the interruption is caused by a factor other than the first program. | 12-10-2015 |
20150355911 | MECHANISM FOR OBVIATING THE NEED FOR HOST-SIDE BASIC INPUT/OUTPUT SYSTEM (BIOS) OR BOOT SERIAL PERIPHERAL INTERFACE (SPI) DEVICE(S) - The present disclosure describes several embodiments, e.g., a method, a baseboard management controller (BMC) system, a computer-readable non-transitory medium, for managing boot images for a computer system. These embodiments may include obtaining, by a BMC of the BMC system, a first boot image for the processor-based system, storing, by the BMC of the BMC system, the first boot image at a first location in a memory element of BMC system, and informing, by the BMC of the BMC system to a bus-to-memory bridge, first location information indicating a first location at which the first boot image is stored. The present disclosure also describes the bus-to-memory bridge which interfaces between a bus of the processor-based system and the memory element of the BMC system to allow one or more processors of the processor-based system to access the memory element of the BMC system to obtain boot image(s). | 12-10-2015 |
20150355913 | COMPUTER SYSTEM AND METHOD FOR SETTING BIOS - A computer system and a method for setting basic input/output system (BIOS) are disclosed. The computer system comprises a remote computer and servers. The remote computer transmits a setting command. Each of the servers comprises a first management unit and a motherboard. The motherboard comprises a storage device and a processor. The storage device stores the BIOS. The processor executes the BIOS. The processor communicates with the first management unit to determine whether the BIOS configuration needs to be updated after the server rebooted. The processor updates the BIOS according to the setting command when the BIOS configuration must to be updated. | 12-10-2015 |
20150356299 | BIOS SECURE DATA MANAGEMENT SYSTEM - A Basic Input/Output System (BIOS) secure data management system includes a BIOS that is configured to perform a boot process. At least one memory system is configured to provide a System Management (SM) memory location that is only accessible by the BIOS. A trusted platform module (TPM) includes at least one register and is configured to store sealed first secure data. The TPM is configured to use at least one first value in the at least one register that depends on the boot process to unseal the sealed first secure data to provide unsealed first secure data, and provide that unsealed first secure data to the BIOS for storage in the SM memory location. The BIOS is configured to retrieve the unsealed first secure data from the SM memory location and use the unsealed first secure data to perform a security function. | 12-10-2015 |
20150363187 | SYSTEMS AND METHODS FOR INSTALLING UPGRADED SOFTWARE ON ELECTRONIC DEVICES - Systems, methods, and computer-readable media for upgrading electronic devices are provided. An exemplary method executed by a hardware processor may comprise providing a management agent on an electronic device for communicating with one or more device drivers associated with the electronic device. The management agent may be installed, for example, using a downloaded upgrade package. The method may further comprise upgrading the one or more device drivers to enable a direct connection between the management agent and the one or more device drivers. This direct connection, in some embodiments, may enable the management agent to access, using the one or more device drivers, persistent storage associated with the electronic device. The method may further comprise providing a new boot loader to the management agent, and overwriting, by the management agent, an existing boot loader in the persistent storage with the received new boot loader, using the one or more device drivers. | 12-17-2015 |
20150363209 | INFORMATION PROCESSING APPARATUS AND COMPUTER-READABLE RECORDING MEDIUM - An information processing apparatus receives, in a state of an electrical power saving mode that limits a function, a control packet that includes therein control information indicating a device or an application that is a startup target by an arbitrary number of times within a predetermined time period. Then, when the control packet is received, the information processing apparatus starts up a control program that starts up each device or each application. Thereafter, when the information processing apparatus receives the control packet after the control program is started up, the information processing apparatus starts up, by using the control program, the device or the application that is the startup target specified by the control information included in the control packet. | 12-17-2015 |
20150363211 | SYSTEMS AND METHODS FOR MANAGING DISTRIBUTED SALES, SERVICE AND REPAIR OPERATIONS - The systems and methods of the present disclosure are generally related to managing distributed sales, service and repair operations. In particular, the systems and methods of the present disclosure relate to managing a distributed network of sales, service and/or repair operations that include automated features. | 12-17-2015 |
20150370575 | LICENSE MANAGEMENT USING A BASIC INPUT/OUTPUT SYSTEM (BIOS) - Methods and systems for license management using a basic input/output system (BIOS) may involve performing license activation, monitoring, and enforcement. The BIOS may store license information to manage licenses for hardware and/or software components of an information handling system. License management by the BIOS may include monitoring a system clock of the information handling system for changes to avoid tampering with license durations. | 12-24-2015 |
20150370576 | Method to Facilitate Rapid Deployment and Redeployment of an Inforamtion Handling System - An information handling system includes a processor, a Unified Extensible Firmware Interface (UEFI) boot volume, and a memory including UEFI code and a setup module. The UEFI code is executable by the processor to boot the information handling system, determine if the UEFI boot volume includes a setup data file, and launch the setup module in response to determining that the UEFI boot volume includes the setup data file. The setup module is executable by the processor to read first information from the setup data file, and set a first configuration setting of the information handling system based upon the first information. | 12-24-2015 |
20150371046 | PREVENTING CODE MODIFICATION AFTER BOOT - The subject disclosure is directed towards protecting code in memory from being modified after boot, such as code used in a dedicated microprocessor or microcontroller. Hardware, such as in logic or in a memory protection unit, allows a range of memory to be made non-writeable after being loaded, e.g., via a secure boot load operation. Further, startup code that is used to configure the hardware/memory may be made non-executable after having run once, so that no further execution may occur in that space, e.g., as a result of an attack. A function in the runtime code may allow for a limited, attack-protected reconfiguration of sub-regions of memory regions during the runtime execution. | 12-24-2015 |
20150378715 | SYSTEMS AND METHODS FOR UPDATING SOFTWARE IN A HAZARD DETECTION SYSTEM - Systems and methods for updating software in a hazard detection system are described herein. Software updates may be received by, stored within, and executed by a hazard detection system, without disturbing the system's ability to monitor for alarm events and sound an alarm in response to a monitored hazard event. The software updates may be received as part of a periodic over-the-air communication with a remote server or as part of a physical connection with a data source such as a computer. The software updates may include several portions of code designed to operate with different processors and/or devices within the hazard detection system. The software updates may also include language specific audio files that can be accessed by the hazard detection system to play back language specific media files via a speaker. | 12-31-2015 |
20150378743 | Systems and Methods for Enhancing the Availability of Multi-Tier Applications on Cloud Computing Platforms - Systems and methods for enhancing the availability of multi-tier applications on cloud computing platforms are disclosed. An example method comprises identifying, using a processor, dependencies among application components in a multi-tier application; generating, using the processor, an application blueprint defining the multi-tier application based on the identified dependencies; generating a remediation policy based on the identified dependencies in the application blueprint, the remediation policy comprising instructions to restore availability of the multi-tier application; detecting unavailability of the multi-tier application; identifying, using the processor, one of the application components as being responsible for the unavailability of the multi-tier application; and restarting, using the processor, the identified one of the application components based on the remediation policy to restore availability of the multi-tier application. | 12-31-2015 |
20150378744 | BOOTING A COMPUTER FROM A USER TRUSTED DEVICE WITH AN OPERATING SYSTEM LOADER STORED THEREON - In an approach to allowing a computer to boot from a user trusted device (UTD), the computer comprises a data storage device storing operating system (OS) services, and a version of an OS loader. The UTD is connectable to the computer and stores a boot loader, detectable by a firmware executing at the computer, and an OS loader, and wherein the UTD prevents an unauthenticated user to modify the boot loader and the OS loader stored thereon. The computer then, upon connection, lets the boot loader be detected by the firmware for execution of the boot loader at least partly at the computer, to cause to transfer the OS loader from the UTD to the computer, and executes the transferred OS loader at least partly from the computer, to execute at least one crypto driver for the OS, to start the OS services and complete booting of the computer. | 12-31-2015 |
20150378747 | TECHNOLOGIES FOR PRE-MEMORY PHASE INITIALIZATION OF A COMPUTING DEVICE - Technologies for pre-memory phase initialization include a computing device having a processor with a cache memory. The computing device may determine whether a temporary memory different from the cache memory of the processor is present for temporary memory access prior to initialization of a main memory of the computing device. In response to determining that temporary memory is present, a portion of the basic input/output instructions may be copied from a non-volatile memory of the computing device to the temporary memory for execution prior to initialization of the main memory. The computing device may also initialize a portion of the cache memory of the processor as Cache as RAM for temporary memory access prior to initialization of the main memory in response to determining that temporary memory is not present. After initialization, the main memory may be configured for subsequent memory access. Other embodiments are described and claimed. | 12-31-2015 |
20150378748 | SYSTEM STANDBY EMULATION WITH FAST RESUME - Systems and methods may provide for assuming control over a processor in response to an operating system (OS) request to transition the processor into a sleeping state and transitioning the processor into an intermediate state that has a shorter wake latency than the sleeping state. Additionally, the processor may be maintained in the intermediate state until a wake event is detected. In one example, one or more power lowering operations may be reversed in response to the wake event. | 12-31-2015 |
20150379270 | KEY VERSIONING INCLUDING HASH STICK TECHNOLOGY - The subject disclosure is directed towards providing a computing device with access to key that depends on the current software version, e.g., the software version of a security processor. If the software is compromised, another key becomes available with release of each new (non-compromised) software version. Keys for future versions cannot be derived, while keys for earlier versions can be derived from the current key. A secure boot process uses a secret to generate a first key, after which access to the secret is turned off. The first key is used with key blob data to compute a second key used for data decryption (and encryption) as needed. The key blob data may be global for all devices, and/or device specific; a hash stick comprising a set of derivable keys may be used at manufacturing time to generate the device-specific key blob data. | 12-31-2015 |
20160004540 | FAST BOOTING A COMPUTING DEVICE TO A SPECIALIZED EXPERIENCE - Described is a technology by which independent computing functions such as corresponding to separate operating systems may be partitioned into coexisting partitions. A virtual machine manager, or hypervisor, manages the input and output of each partition to operate computer system hardware. One partition may correspond to a special purpose operating system that quickly boots, such as to provide appliance-like behavior, while another partition may correspond to a general purpose operating system that may load while the special purpose operating system is already running. The computer system that contains the partitions may transition functionality and devices from one operating system to the other. The virtual machine manager controls which computer hardware devices are capable of being utilized by which partition at any given time, and may also facilitate inter-partition communication. | 01-07-2016 |
20160004542 | BOOTING METHOD FOR COMPUTER SYSTEM WITH MULTIPLE CENTRAL PROCESSING UNITS - A booting method for computer system with multiple central processing units is provided. The method includes: initializing at least two CPUs of the multiple CPUs at start of a booting process; accessing, by each of the at least two initialized CPUs, a task description chart (TDC) stored in the computer system, wherein the TDC includes information of at least two tasks of the booting process; and selecting, by each of the at least two initialized CPUs, a task from at least two tasks according to selection information of the at least two tasks in the TDC; obtaining, by each of the at least two initialized CPUs, the selected task according to address information of the selected task in the TDC; and executing, by the initialized CPUs, the selected tasks at least partially in parallel. | 01-07-2016 |
20160004867 | SYSTEMS AND METHODS FOR DETECTING HARDWARE TAMPERING OF INFORMATION HANDLING SYSTEM HARDWARE - A method comprising may include storing, in a BIOS comprising a program of instructions executable by the processor and configured to cause the processor to initialize one or more information handling resources of an information handling system, a hardware profile of the information handling system, the hardware profile comprising identifying information of one or more information handling resources of the information handling system recorded during creation of the hardware profile. The method may also include, during a boot of the information handling system in a hardware verification mode, creating a new hardware profile comprising identifying information of the one or more information handling resources, comparing the new hardware profile to the hardware profile stored in the BIOS, and if the new hardware profile differs from the hardware profile stored in the BIOS, issuing an alert indicating potential tampering with hardware of the information handling system after creation of the profile. | 01-07-2016 |
20160011881 | INFORMATION PROCESSING DEVICE, INFORMATION PROCESSING METHOD, AND STORAGE MEDIUM | 01-14-2016 |
20160011882 | RESOURCE ADVISOR FOR AUTOMATED BARE-METAL OPERATING SYSTEM INSTALLATION | 01-14-2016 |
20160011883 | Instant Messaging Communication System and Method | 01-14-2016 |
20160011887 | Firmware Update Method and Power System Thereof | 01-14-2016 |
20160012231 | COMPUTER SECURITY RESPONSIVE TO AN OPERATING ENVIRONMENT | 01-14-2016 |
20160012232 | SYSTEMS AND METHODS FOR SECURE DELIVERY OF PUBLIC KEYS FOR OPERATING SYSTEM DRIVERS | 01-14-2016 |
20160012234 | PROTECTING OPERATING SYSTEM CONFIGURATION VALUES | 01-14-2016 |
20160014073 | METHODS AND APPARATUS TO CONFIGURE HARDWARE MANAGEMENT SYSTEMS FOR USE IN VIRTUAL SERVER RACK DEPLOYMENTS FOR VIRTUAL COMPUTING ENVIRONMENTS | 01-14-2016 |
20160019069 | Cloud Firmware - A network element (NE) comprising a receiver configured to couple to a cloud network; and a multi-core central processing unit (CPU) coupled to the receiver and configured to receive a first partition configuration from an orchestration element, partition a plurality of processor cores into a plurality of processor core partitions according to the first partition configuration, and initiate a plurality of virtual basic input/output systems (vBIOSs) such that each vBIOS manages a processor core partition. | 01-21-2016 |
20160019393 | Trusted Boot of a Virtual Machine - A method, system and program product for performing a trusted boot of a virtual machine comprises the steps of executing, in turn, a series of components of the trusted boot, performing a function on each component prior to the execution of the respective component, storing the output of the functions in a virtual trusted platform module, detecting that the virtual trusted platform module has not responded to the storing of the output of a function in the virtual trusted platform module, and generating a request that the virtual trusted platform module be disabled. | 01-21-2016 |
20160026454 | CIRCUIT AND METHOD FOR WRITING PROGRAM CODES OF BASIC INPUT/OUTPUT SYSTEM - A circuit for writing program codes of a basic input/output system (BIOS) is connected to a main circuit and a BIOS. The BIOS stores a BIOS program code and has a BIOS identifier. The circuit includes a data source connection interface, a judgment trigger module and a write module. The data source connection interface stores an available BIOS program code matching with the BIOS. The judgment trigger module judges whether the BIOS is capable of, after a power-on initialization phase starts, completing loading the BIOS program code and performing system initialization in a preset time. If the BIOS is incapable of completing loading the BIOS program code and performing system initialization within the preset time, the judgment trigger module sends a trigger signal. After receiving the trigger signal, the write module downloads the available BIOS program codes according to the BIOS identifier, and writes to the BIOS, to overwrite the current data. | 01-28-2016 |
20160026473 | SYSTEM MANAGEMENT CONTROLLER - For system management applied to a computer system, a power supply of the computer system starts to power a motherboard and a CPU thereon. A reset holding module in a system management controller holds the CPU in a Power-on Reset (PoR) state. The system management controller executes an operation requested by a user. The reset holding module releases the CPU from the PoR state in response to the system management controller completing the operation. | 01-28-2016 |
20160026474 | CACHING BASED OPERATING SYSTEM INSTALLATION - An image of system software is installed by loading an executable image of the system software using a boot loader, where the executable image includes a kernel and a plurality of files used by the kernel. The kernel of the system software is executed to generate the image of the system software that includes a copy of the kernel. Generating the image of the system software involves the steps of generating a plurality of pointers that each point to a different one of the files, retrieving the files using the pointers, and storing a copy of the kernel and the files in a storage device from which the system software is to be booted as the image of the system software. | 01-28-2016 |
20160026477 | OUT-OF-BAND RETRIEVAL OF NETWORK INTERFACE CONTROLLER INFORMATION - In some implementations, network interface controller (NIC) configuration information can be obtained from a NIC prior to booting up an operating system. For example, a Basic Input Output System (BIOS) can obtain the NIC configuration information from the NIC during the execution of a system check (e.g., Power-On Self-Test). A system controller can receive the NIC configuration information from the BIOS. The system controller can store the NIC configuration information in memory associated with the system controller. A management system can request the NIC configuration information from the system controller using an out-of-band communication channel. For example, the management system can send the request for NIC configuration information to the system controller prior to powering on a server using a dedicated network interface of the system controller. | 01-28-2016 |
20160026480 | SUBSTRATE PROCESSING SYSTEM, STORAGE MEDIUM AND METHOD OF REGISTERING NEW DEVICE - A substrate processing system includes a main control unit having a configuration file in which ID information and detail information about devices for processing a substrate is recorded, the detail information includes information needed for controlling the devices, and a module controller having a list file obtained by converting the configuration file into a readable form, the module controller controlling the devices described in the list file on the basis of instructions from the main control unit. The module controller automatically adds, to the list file, ID information and detail information about a new device newly connected to the module controller to establish a condition under which the new device can be controlled. | 01-28-2016 |
20160034283 | GLOBAL DATA ESTABLISHMENT FOR STORAGE ARRAYS CONTROLLED BY A PLURALITY OF NODES - A plurality of data arrays are coupled to a plurality of nodes via a plurality of adapters. The plurality of adapters discover the plurality of data arrays during startup, and information about the plurality of data arrays are communicated to corresponding local nodes of the plurality of nodes, wherein the local nodes broadcast the information to other nodes of plurality of nodes. A director node of the plurality of nodes determines which data arrays of the plurality of data arrays are a current set of global metadata arrays, based on the broadcasted information. | 02-04-2016 |
20160041829 | System and Method for Optimizing Bootup Performance - A system and method of optimizing the performance of an information handling system is disclosed herein. One or more data samples are generated by rebooting an information handling system and identifying one or more files accessed during the bootup of the information handling system. An identifier and access frequency for each of the identified files are stored in a data sample. One or more data samples are merged into a merged data sample. A compression ratio is calculated for each of the identified files. One or more of the files identified in the merged data sample are selected for uncompression. The files selected for uncompression are uncompressed. | 02-11-2016 |
20160048397 | SYSTEMS FOR SECURELY CONNECTING TO REMOTE NETWORKS - Systems enable secure communication links with classified or unclassified networks using a single mobile computing device. In one embodiment, the system includes: a mobile computing device without an integrated data storage device that is configured to interchangeably receive an unclassified or classified data storage device; an encrypter device in signal communication with the mobile computing device; network security device in signal communication with the encrypter device; a classified data storage device loaded with a computer readable code configured for booting the mobile computing device when the classified data storage device is connected to the mobile computing device; and an unclassified data storage device loaded with a computer readable code configured for booting the mobile computing device when the unclassified data storage device is connected to the mobile computing device. | 02-18-2016 |
20160048436 | METHOD AND APPARATUS FOR VERIFYING CONFIGURATION - A computation unit detects booting of a virtual machine or a physical machine in a system. The computation unit collects configuration parameters from virtual machines or physical machines in the system. The computation unit retrieves information about a constraint on the system from a storage device, in relation to the detected booting of a virtual machine or physical machine. The computation unit determines whether the collected configuration parameters satisfy the retrieved constraint, and it controls whether to continue or discontinue the boot process of the virtual machine or physical machine, depending on the result of the determination. | 02-18-2016 |
20160048684 | SECURE BOOT WITH RESISTANCE TO DIFFERENTIAL POWER ANALYSIS AND OTHER EXTERNAL MONITORING ATTACKS - A computing device includes a secure storage hardware to store a secret value and processing hardware comprising at least one of a cache or a memory. During a secure boot process the processing hardware loads untrusted data into at least one of the cache or the memory of the processing hardware, the untrusted data comprising an encrypted data segment and a validator, retrieves the secret value from the secure storage hardware, derives an initial key based at least in part on an identifier associated with the encrypted data segment and the secret value, verifies, using the validator, whether the encrypted data segment has been modified, and decrypts the encrypted data segment using a first decryption key derived from the initial key to produce a decrypted data segment responsive to verifying that the encrypted data segment has not been modified. | 02-18-2016 |
20160055006 | DISPLAY APPARATUS AND CONTROL METHOD THEREOF - A display apparatus and method for bending a display panel automatically during booting are provided. According to an exemplary embodiment, the display apparatus may include a display module; an input unit configured to receive a command from a user; a storage configured to store a booting sequence; a driver configured to change a curvature of the display module; and a processor configured to, in response to a power-on command being received through the input unit, control the driver to bend the display module, while performing booting according to the booting sequence. | 02-25-2016 |
20160055007 | INFORMATION PROCESSING APPARATUS AND SETTING METHOD FOR INFORMATION PROCESSING APPARATUS - An information processing apparatus includes a control device. The control device includes a storage device including a first storage field to store a procedure for a control process of the information processing apparatus and a second storage field to store a procedure for a setting process corresponding to a user of the information processing apparatus, a memory storing a boot flag to specify whether the setting process is to be executed, and a processor configured to set the boot flag so as to restrain the execution of the setting process after executing the setting process. | 02-25-2016 |
20160055008 | OPERATING METHOD OF DATA STORAGE DEVICE - An operating method of a data storage device includes determining whether the data storage device is in a main boot mode or a sub boot mode, based on data stored in a boot mode register; executing a main boot code stored in a ROM, when the data storage device is determined to be in the main boot mode; and executing a sub boot code loaded on a working memory, when the data storage device is determined to be in the sub boot mode, and then, executing the main boot code. | 02-25-2016 |
20160055031 | Dual-System Architecture With Fast Recover And Switching Of Operating System - Examples of a dual-system architecture capable of fast switching between the operating systems are provided. A first operating system may perform one or more operations associated with an apparatus as an active operating system of the apparatus. The active operating system may be switched from the first operating system to a second operating system for the second operating system to perform a task responsive to a determination that the second operating system is required to perform the task. | 02-25-2016 |
20160055338 | Configuring a System - In response to starting a system including a first non-volatile memory containing system boot code, and a second non-volatile memory, provisioning of the second non-volatile memory is performed. The provisioning includes checking that the second non-volatile memory is uninitialized, and in response to determining that the second non-volatile memory is uninitialized, the system boot code is copied from the first non-volatile memory to the second non-volatile memory. | 02-25-2016 |
20160062772 | INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND NON-TRANSITORY COMPUTER READABLE MEDIUM - An information processing apparatus includes a first boot unit, a first image display, a second boot unit, a second image display, a memory, and an image processing unit. The first boot unit boots the information processing apparatus. The first image display performs image display while the first boot unit boots the information processing apparatus. The second boot unit boots the information processing apparatus. The second image display performs image display while the second boot unit boots the information processing apparatus. The memory stores image information. The image processing unit performs image processing on the image information. The first image display performs the image display based on the image information stored in the memory. The second image display performs the image display based on the image information image-processed by the image processing unit. | 03-03-2016 |
20160062774 | METHOD, USER DEVICE AND STORAGE MEDIUM FOR CONTROLLING BOOT SCREEN TO BE PLAYED - Some embodiments of the disclosure provide a method, user device and storage medium for controlling a boot screen to be played, where the method for controlling the boot screen to be started includes: playing, by a user device, a boot screen upon being powered on; detecting, by the user device, in real time whether a booting preparation of a booting signal source is completed; and stopping, by the user device, the boot screen from being played upon detecting that the booting preparation of the booting signal source is completed. | 03-03-2016 |
20160062775 | INFORMATION PROCESSING APPARATUS INCLUDING MAIN SYSTEM AND SUBSYSTEM - An information processing apparatus according to an exemplary embodiment of the present invention includes a main system and a subsystem. The main system includes a first control unit configured to, before the information processing apparatus shifts to a power-saving state, develop a boot image to be executed by the subsystem in a memory of the subsystem. The subsystem includes a second control unit configured to, in a case where the information processing apparatus returns from the power-saving state, issue an instruction to execute the boot image developed in the memory. The subsystem further includes a third control unit configured to execute the boot image developed in the memory according to the instruction issued by the second control unit. | 03-03-2016 |
20160063254 | Retrieving System Boot Code from a Non-Volatile Memory - A controller monitors for an indication from core logic indicating that the core logic is in a state in which the core logic does not access a bus. In response to detecting the indication, the controller retrieves the system boot code from a non-volatile memory over the bus. | 03-03-2016 |
20160063255 | Event Data Structure to Store Event Data - An event data structure is stored in a non-volatile memory that is electrically isolated from a bus accessible by a processor. In response to an event relating to operation of a controller that is separate from the processor, the controller adds event data for the event into an entry of the event data structure. | 03-03-2016 |
20160063256 | Methods, Systems, and Apparatuses for Managing a Hard Drive Security System - A system for use with a computer is provided, the computer including a self-encrypting drive (SED), the SED including a nominal space and a pre-boot region, wherein the nominal space can be locked to prevent access to the nominal space. The system includes SED management software configured to be loaded in the pre-boot region of the SED. The SED management software includes a pre-boot operating system (OS) and an unlocking program. The unlocking program is configured (a) to execute within the pre-boot OS, and (b) upon successful authentication of a user, to unlock the nominal space of the SED. Other embodiments are described and claimed. | 03-03-2016 |
20160063259 | Methods, Systems, and Apparatuses for Managing a Hard Drive Security System - A system for use with a computer is provided, the computer including a self-encrypting drive (SED), the SED including a nominal space and a pre-boot region, wherein the nominal space can be locked to prevent access to the nominal space. The system includes SED management software configured to be loaded in the pre-boot region of the SED. The SED management software includes a pre-boot operating system (OS) and an unlocking program. The unlocking program is configured (a) to execute within the pre-boot OS, and (b) upon successful authentication of a user, to unlock the nominal space of the SED. Other embodiments are described and claimed. | 03-03-2016 |
20160070554 | SYSTEMS AND METHODS FOR PERSISTENT CACHED IMAGE DOWNLOAD - In accordance with embodiments of the present disclosure, a device for persistent cached image download may include a memory, an input/output interface, and a network interface. The memory may be configured to store therein an image database, the image database comprising a boot image for each of one or more information handling systems. The input/output interface may be communicatively coupled to the memory and configured to couple to a corresponding input/output port of an information handling system. The network interface may be configured to couple to an image server. In response to an information handling system coupled to the input/output interface determining that the updated version of the particular boot image exists at the image server, the memory may store the updated version in the memory as the particular boot image. | 03-10-2016 |
20160070577 | BOOTING AN OPERATING SYSTEM OF A SYSTEM USING A READ AHEAD TECHNIQUE - In one embodiment, the present invention includes a method for generating a list of files accessed during an operating system (OS) boot process to profile the OS boot process, and optimizing the list of files to generate an optimized file list for use in future OS boot processes, where the optimizing is according to a first optimization technique if the files were accessed from a solid state medium and according to a second optimization technique if the files were accessed from a rotating medium. Other embodiments are described and claimed. | 03-10-2016 |
20160070913 | Method for Authenticating Firmware Volume and System Therefor - A first firmware volume of a Unified Extensible Firmware Interface (UEFI) compliant information handling system is accessed. Authentication information is retrieved from the first firmware volume using a UEFI Secure Architecture Protocol. Based on the authentication information, it is determined if the first firmware volume is a first type of firmware volume. If the first firmware volume is the first type of firmware volume, the first firmware volume is authenticated using the first authentication information and an authentication procedure other than Secure Boot authentication. If the first firmware volume is a second type of firmware volume, the second type different than the first type, the first firmware volume is authenticated using the first authentication information and the Secure Boot authentication. | 03-10-2016 |
20160070914 | SECURE EXECUTION OF SOFTWARE MODULES ON A COMPUTER - A system and method for executing software modules on a computer, the method comprising: executing (S | 03-10-2016 |
20160077839 | INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND NON-TRANSITORY RECORDING MEDIUM - An information processing apparatus providing a specific function includes a non-volatile function program memory that stores a function program for providing the specific function, a main memory, and an arithmetic device that reads and stores the function program from the function program memory into the main memory at startup of the information processing apparatus and performs an arithmetic operation based on the function program to execute the function program. The arithmetic device operates at a start frequency set for startup as a clock frequency for accessing the function program memory when reading and storing the function program from the function program memory into the main memory at the startup, and operates at a frequency lower than the start frequency as the clock frequency for accessing the function program memory after reading and storing the function program into the main memory. | 03-17-2016 |
20160077840 | WORKLOAD OPTIMIZED SERVER FOR INTELLIGENT ALGORITHM TRADING PLATFORMS - Systems and methods for a workload optimized server for intelligent algorithm trading platforms. In an illustrative, non-limiting embodiment, an Information Handling System (IHS) may include a plurality of Central Processing Units (CPUs) and a control circuit coupled to the plurality of CPUs, the control circuit having a memory configured to store program instructions that, upon execution by the control logic, cause the IHS to: set a first number of enabled cores in a first CPU to operate with a first all-core turbo frequency, and set a second number of enabled cores in a second CPU to operate with a second all-core turbo frequency, where the first number of enabled cores is different from the second number of enabled cores, and where at least one of the first or second all core turbo frequencies is selected to cause the IHS to operate with reduced execution jitter. | 03-17-2016 |
20160077841 | SYSTEMS AND METHODS FOR IN-SITU FABRIC LINK OPTIMIZATION IN A MODULAR INFORMATION HANDLING SYSTEM CHASSIS - In accordance with embodiments of the present disclosure, a method may include, during boot of a modular information handling system disposed in a chassis configured to receive a plurality of modular information handling systems and a plurality of modular information handling resources, pausing execution of a basic input/output system. The method may also include communicating a first indicator, wherein the first indicator causes a chassis management controller of the chassis to perform link optimization operations of a communication link between the modular information handling system and a modular information handling resource. The method may further include, in response to communication by the chassis management controller of a second indicator, the second indicator indicating completion of link optimization operations by the chassis management controller, unpausing execution of the basic input/output system. | 03-17-2016 |
20160078230 | CLIENT AUTHENTICATION AND DATA MANAGEMENT SYSTEM - Methods and systems for performing an authenticated boot; performing a continuous data protection; performing automatic protection and optionally a consolidation; and performing other defenses and protection of a protected computing device (such as a computer system) are provided. The aspects include integrating security mechanisms (which may include a “call home” function, role and rule-based policies, validating technologies, encryption and decryption technologies, data compression technologies, protected and segmented boot technologies, and virtualization technologies. Booting and operating (either fully or in a restricted manner) are permitted only under a control of a specified role-set, rule-set, and/or a controlling supervisory process or server system(s). The methods and systems make advantageous use of hypervisors and other virtual machine monitors or managers. | 03-17-2016 |
20160085558 | UPDATING BOOT CODE - It is determined whether an updated first boot phase code is present. The updated first boot phase code is validated. In response to the validating, a current version of the first boot phase code is updated using the updated first boot phase code. | 03-24-2016 |
20160085560 | METHOD AND SYSTEM FOR NETWORK DEVICE MAINTENANCE - A method for maintaining a switch. The method includes identifying a first phase to enter in a boot-up process for the switch, where the boot-up process includes a number of phases and the first phase is one of the phases. The method further includes determining a phase exit condition from a first snapshot of the switch, where the first snapshot includes state information for each of the of phases. The method further includes transitioning to the first phase and after transitioning to the first phase: starting a first countdown timer for the first phase, and executing, on the switch, a first networking protocol for the first phase. The method further includes determining, in response to the executing, that a first current state of the switch satisfies the phase exit condition, and exiting the first phase, where the first countdown timer is not expired when exiting the first phase. | 03-24-2016 |
20160085561 | MACHINE-TO-MACHINE BOOTSTRAPPING - Methods, devices, and systems allow for bootstrapping of a machine- to-machine device. In an embodiment, a bootstrap erase architecture allows the machine-to-machine server to manage bootstrap erase policies, detect access network specific events, initiate a bootstrap erase based on these policies and events, and allow for machine-to-machine server handover. A device or gateway service capability layer ( | 03-24-2016 |
20160085969 | USING A TRUSTED PLATFORM MODULE FOR BOOT POLICY AND SECURE FIRMWARE - Embodiments of apparatuses and methods for using a trusted platform module for boot policy and secure firmware are disclosed. In one embodiment, a trusted platform module includes a non-volatile memory, a port, and a mapping structure. The port is to receive an input/output transaction from a serial bus. The transaction includes a system memory address in the address space of a processor. The mapping structure is to map the system memory address to a first location in non-volatile memory. | 03-24-2016 |
20160092201 | Method and Device for Updating Program Data - A method is provided which includes receiving an input instruction of a user, and determining a startup mode of a terminal device according to the input instruction of the user, and sending, to the terminal device, a control instruction that is used to control the terminal device to enter the determined startup mode. A host device determines that a startup mode of a terminal device is a forcibly loading startup mode, and the terminal device performs data updating according to program data acquired from a storage card, so as to implement program data updating of the terminal device by means of forcibly loading without updating using a network or updating by dismantling a housing. | 03-31-2016 |
20160092242 | Fast Start - Aspects of the disclosure relate to methods, systems, and apparatuses of a fast start system. A computing device may automatically restart itself based on a restart schedule from a fast start network server. The computing device may initiate a booting sequence and retrieve login credentials of a user stored in the computing device. Using the stored login credentials, the computing device can login the user to the system. In response to successfully logging in the user, the computing device may initialize at least one startup application on the computing device. Once the user is successfully logged in, the computing device may automatically lock the computing device to the user to prevent any unauthorized use of the workstation. | 03-31-2016 |
20160092243 | HARDWARE SECURITY MODULE ACCESS MANAGEMENT IN A CLOUD COMPUTING ENVIRONMENT - Trusted firmware on a host server is used for managing access to a hardware security module (HSM) connected to the host server. The HSM stores confidential information associated with an operating system. As part of access management, the firmware detects a boot device identifier associated with a boot device configured to boot the operating system on the host server. The firmware then receives a second boot device identifier from the HSM. The boot device identifier and the second boot device identifier are then compared by the firmware. Based on the comparison, the firmware determines that the boot device identifier matches with the second boot device identifier. Based on this determination, the firmware grants the operating system access to the HSM. | 03-31-2016 |
20160092244 | CONFIGURATION GRADING AND PRIORITIZATION DURING REBOOT - Various exemplary embodiments relate to a method of configuring a device in a network, the method including loading one or more system configuration commands into an active memory; processing the one or more system configuration commands; loading one or more blocks of customer commands into an active memory; and processing each of the one or more blocks of customer commands, wherein each block is processed as soon as it is loaded into the active memory. | 03-31-2016 |
20160092687 | HARDWARE SECURITY MODULE ACCESS MANAGEMENT IN A CLOUD COMPUTING ENVIRONMENT - Trusted firmware on a host server is used for managing access to a hardware security module (HSM) connected to the host server. The HSM stores confidential information associated with an operating system. As part of access management, the firmware detects a boot device identifier associated with a boot device configured to boot the operating system on the host server. The firmware then receives a second boot device identifier from the HSM. The boot device identifier and the second boot device identifier are then compared by the firmware. Based on the comparison, the firmware determines that the boot device identifier matches with the second boot device identifier. Based on this determination, the firmware grants the operating system access to the HSM. | 03-31-2016 |
20160098280 | SEMICONDUCTOR DEVICE AND SEMICONDUCTOR SYSTEM INCLUDING THE SAME - A semiconductor device includes a boot-up signal generator suitable for generating a boot-up signal based on an external reset signal and a specific mode signal; and an internal circuit suitable for performing a boot-up operation based on the boot-up signals | 04-07-2016 |
20160098283 | Platform Configuration Management Using a Basic Input/Output System (BIOS) - Methods and systems for platform configuration management may use a platform configuration register (PCR) stored on a trusted platform module (TPM) included with an information handling system. A basic input/output system (BIOS) may include instructions to generate a first PCR value based on BIOS settings while a user is operating the BIOS. When the first PCR value indicates a change from a previous PCR value stored in the PCR, an alert may be displayed to the user and sent to a network administrator. The BIOS may display an indication of a mapping of BIOS settings to the first PCR value. | 04-07-2016 |
20160103688 | Method of Starting Computing System - The present disclosure provides a method of starting a computer system. The method includes rebooting a baseboard management controller of the computer system; the baseboard management controller loading a real time clock driver, wherein the real time clock driver is used for enabling a real time clock function; checking a field of a real time clock register after the real time clock driver loaded; enabling a real time clock update filed and clearing a time tag of the real time clock register if a state of the field of the real time clock register is disable; the baseboard management controller obtaining the time tag from the real time clock register; and the baseboard management controller completing a start process if the time tag is later than a predefined time. | 04-14-2016 |
20160103692 | FAST REBOOT FOR A SWITCH - One embodiment of the present invention provides a switch. The switch includes a packet processor, a persistent storage module, and a boot-up management module. The packet processor identifies a switch identifier associated with the switch in the header of a packet. The persistent storage module stores configuration information of the switch in a first table in a local persistent storage. This configuration information is included in a configuration file, and the first table includes one or more columns for the attribute values of the configuration information. The boot-up management module loads the attribute values to corresponding switch modules from the first table without processing the configuration file. | 04-14-2016 |
20160103995 | OUT OF BAND MANAGEMENT OF BASIC INPUT/OUTPUT SYSTEM SECURE BOOT VARIABLES - A method is provided in one example embodiment and includes storing secure boot variables in a baseboard management controller; and sending the secure boot variables to a basic input/output system (BIOS) during a power on self-test, where the BIOS utilizes the secure boot variables during runtime to authenticate drivers and an operating system loader execution. In particular embodiments, the secure boot variables may be included in a white list, a black list, or a key list and, further, stored in erasable programmable read only memory. | 04-14-2016 |
20160105315 | INFORMATION PROCESSING APPARATUS, CONTROL METHOD FOR INFORMATION PROCESSING APPARATUS, AND RECORDING MEDIUM - An information processing apparatus includes a management unit configured to manage configuration information indicating a device configuration of the information processing apparatus, a receiving unit configured to receive setting information to be used by the information processing apparatus to perform an operation, from a server, and a control unit configured to control, in a case where setting information stored in the information processing apparatus is updated by using the received setting information, whether to execute processing for causing the information processing apparatus to reflect the update of the setting information, based on a type of the setting information to be updated and the configuration information. | 04-14-2016 |
20160109914 | WEARABLE DEVICE WITHOUT A POWER BUTTON - An example of a wearable device, such as a head mounted device, without a power button while still implementing the functions of a typical power button is provided. A sensor may be positioned adjacent to a hinge so as to detect the orientation thereof, such as detecting whether the hinge is in the opened or closed position. The sensor may output a signal that indicates the detected orientation of the hinge to a microcontroller. The microcontroller may then output a signal to a power management integrated circuit that alters the current state of the device. For instance, the signal sent to the power management integrated circuit may power on or off the head mounted device, or place the device in a sleep state. In this regard, the head mounted device is capable of switching between states without the use of a typical power button. | 04-21-2016 |
20160110204 | BOOTING AN OPERATING SYSTEM OF A SYSTEM USING A READ AHEAD TECHNIQUE - In one embodiment, the present invention includes a method for generating a list of files accessed during an operating system (OS) boot process to profile the OS boot process, and optimizing the list of files to generate an optimized file list for use in future OS boot processes, where the optimizing is according to a first optimization technique if the files were accessed from a solid state medium and according to a second optimization technique if the files were accessed from a rotating medium. Other embodiments are described and claimed. | 04-21-2016 |
20160110205 | BOOTING AN OPERATING SYSTEM OF A SYSTEM USING A READ AHEAD TECHNIQUE - In one embodiment, the present invention includes a method for generating a list of files accessed during an operating system (OS) boot process to profile the OS boot process, and optimizing the list of files to generate an optimized file list for use in future OS boot processes, where the optimizing is according to a first optimization technique if the files were accessed from a solid state medium and according to a second optimization technique if the files were accessed from a rotating medium. Other embodiments are described and claimed. | 04-21-2016 |
20160116974 | METHODS AND SYSTEMS TO BOOT UP SMARTPHONES IN ULTRA LOW POWER MODES - Systems and methods for booting up a mobile device involve segmenting a boot sequence of the mobile device into a plurality of boot sequence segments and determining a first boot sequence segment from the plurality of boot sequence segments, battery power consumed by the first boot sequence segment exceeds a predetermined battery power threshold. In addition, systems and methods further include selecting a target boot mode from a plurality of boot modes. The target boot mode is configured to be executed when the first boot sequence segment of the boot sequence is to be executed, and each of the plurality of boot modes corresponds to at least some but not all resources of the mobile device. Furthermore, systems and methods involve executing the first boot sequence segment based on the target boot mode and executing at least one of the plurality of boot sequence segments other than the first boot sequence segment based on a normal mode. The normal mode corresponds to all resources of the mobile device. | 04-28-2016 |
20160117176 | PRE-BOOT DIAGNOSTIC DISPLAY - A pre-boot diagnostic display may be controlled by an embedded controller of an information handling system. The embedded controller may generate pre-boot diagnostic content during power on self-test (POST) of the information handling system. The pre-boot diagnostic content may be displayed to a user on a primary display of the information handling system during POST and before the information handling system is booted to an operating system. | 04-28-2016 |
20160124750 | Power-On Method and Related Server Device - A power-on method for a server device includes generating a stand-by power to a server module of the server device when a blade enable signal is asserted; asserting, by the server module, a power-on signal to a storage module of the server device; performing, by the storage module, a first boot-on process when the storage module receives the asserted power-on signal; transmitting, by the storage module, an asserted ready signal to the server module when the first boot-on process finishes; and performing, by the server module, a second boot-on process via a normal power when the server module receives the asserted ready signal. | 05-05-2016 |
20160124752 | ELECTRONIC APPARATUS AND TEMPERATURE CONTROL METHOD THEREOF - An electronic apparatus and a temperature control method are provided. The steps of the temperature control method include: setting a preset temperature information, wherein the preset temperature information comprises a plurality of application program names and a plurality of respectively corresponding heat dissipation setting information about a heat dissipation ability of a heat dissipation apparatus; checking whether a name of an executed application program is one of the application program names or not, and selecting one of the heat dissipation setting information corresponding to the executed application program to be a selected heat dissipation information; and, driving the heat dissipation apparatus according to the selected heat dissipation setting information. | 05-05-2016 |
20160124753 | OPERATING SYSTEM LOAD DEVICE RESOURCE SELECTION - A method for booting is provided. A devices manager disables resources of a bootable device of a list of bootable devices having resource conflicts with a selected one of the list of bootable devices. The devices manager attempts to boot the selected bootable device. If the selected bootable device fails to boot, then the devices manager selects a next bootable device of the list of bootable devices for booting and repeats disabling resources and attempting to boot the selected next bootable device until one of the list of bootable devices boots or all bootable devices of the list of bootable devices fail to boot. | 05-05-2016 |
20160125187 | System and Method for a Renewable Secure Boot - Embodiments of systems and methods disclosed herein include renewable secure boot systems for renewing and booting a target device. Systems and methods include techniques by which a secure boot may be implemented in a renewable fashion on a reprogrammable device. More specifically, in certain embodiments, systems and methods are described where target devices securely receive an encrypted boot image and one or more authorization codes from a third party. The one or more authorization codes are derivatives of a target device hardware secret, allowing the authorization codes to be changed at will, thus increasing flexibility and security of the system. | 05-05-2016 |
20160132339 | SYSTEMS AND METHODS INVOLVING CONTROL-I/O BUFFER ENABLE CIRCUITS AND/OR FEATURES OF SAVING POWER IN STANDBY MODE - Systems and methods are disclosed involving control I/O buffer enable circuitry and/or features of saving power in standby mode. In illustrative implementations, aspects of the present innovations may be directed to providing low standby power consumption, such as providing low standby power consumption in high-speed synchronous SRAM and RLDRAM devices. | 05-12-2016 |
20160132340 | DUAL-PROCESSOR ELECTRONIC DEVICE AND METHOD FOR QUICK BOOT UP - A dual-processor electronic device is provided. The dual-processor electronic device includes a first processor, a second processor and a dynamic random access memory. The first processor sends a wake-up command to the second processor to wake up the second processor after performing local initialization. The second processor wakes up, then performs local initialization, copies and decompresses the image file to the dynamic random access memory and sends a ready message to the first processor after the image file is decompressed. The first processor delays startup, and starts the startup process according to the decompressed image file when the ready message is received and the delay-start time is expired. The present disclosure also provides a method for booting up dual-processor electronic device quickly. | 05-12-2016 |
20160132369 | MULTI-PROCESSOR DEVICE - An electronic device includes a first processor; and a second processor; and a third processor. The second processor is configured to detect an event, select one of the first and third processors to perform one or more operations associated with the event, and cause the selected processor to perform the one or more operations. | 05-12-2016 |
20160132681 | METHOD FOR PERFORMING A SECURE BOOT OF A COMPUTING SYSTEM AND COMPUTING SYSTEM - A method for performing a secure boot of a mobile device computing system that includes a tamper-resistant hardware that provides secure storage of at least a cryptographic private key includes performing a measurement on each system and/or application specific file before said file is being loaded or launched by a kernel module or an application loader of the computing system, directing the measurement results to the tamper-resistant hardware, maintaining an extend-only global counter at the tamper-resistant hardware, increasing the extend-only global counter upon receiving a measurement result, executing a signing process in which the tamper-resistant hardware signs the extend-only global counter together with the measurement result using the cryptographic private key, and keeping a measurement list at the computing system that includes signatures generated by the tamper-resistant hardware. | 05-12-2016 |
20160132682 | TECHNIQUES FOR SECURE DATA MANAGEMENT IN A DISTRIBUTED ENVIRONMENT - Techniques for secure data management in a distributed environment are provided. A secure server includes a modified operating system that just allows a kernel application to access a secure hard drive of the secure server. The hard drive comes prepackaged with a service public and private key pair for encryption and decryption services with other secure servers of a network. The hard drive also comes prepackaged with trust certificates to authenticate the other secure servers for secure socket layer (SSL) communications with one another, and the hard drive comes with a data encryption key, which is used to encrypt storage of the secure server. The kernel application is used during data restores, data backups, and/or data versioning operations to ensure secure data management for a distributed network of users. | 05-12-2016 |
20160139935 | LIVE INITIALIZATION OF A BOOT DEVICE - Embodiments of the present invention are provided that include executing, by a processor, a software stack received from a first boot image, and retrieving and executing, by the processor, a second software stack. A writeable boot device such as a storage device with a removable medium is detected, and the second software stack is saved by replacing, on the writeable boot device, the first boot image with a second boot image comprising the second software stack. The second software stack is saved upon detecting the boot device having no boot image. | 05-19-2016 |
20160139936 | Method and apparatus for multi-mode mobile computing devices and peripherals - Embodiments of a method and apparatus are described for operating a mobile computing device in different modes using different operating systems. An apparatus may comprise, for example, a memory operative to store multiple operating systems, a processor operative to execute the multiple operating systems, an operating system management module operative to select a first operating system when the mobile computing device is in a first mode or a second operating system when the mobile computing device is in a second mode and the mobile computing device is coupled to one or more external devices. Other embodiments are described and claimed. | 05-19-2016 |
20160140343 | Secure Creation of Encrypted Virtual Machines from Encrypted Templates - Booting a machine in a secure fashion in a potentially unsecure environment. The method includes a target machine beginning a boot process. The method further includes the target machine determining that it needs provisioning data to continue booting. The target machine contacts a secure infrastructure to obtain the provisioning data. The target machine provides an identity claim that can be verified by the secure infrastructure. As a result of the secure infrastructure verifying the identity claim, the target machine receives a request from the secure infrastructure to establish a key sealed to the target machine. The target machine provides the established key to the secure infrastructure. The target machine receives the provisioning data from the secure infrastructure. The provisioning data is encrypted to the established key. The target machine decrypts the encrypted provisioning data, and uses the provisioning data to finish booting. | 05-19-2016 |
20160147286 | CIRCUIT FOR SELECTABLE POWER SUPPLY - A power supply circuit providing selectable voltages, includes a signal input control circuit, a power output control circuit, and a power output switching circuit. The signal input circuit is for connecting external devices to the motherboard. The output control circuit includes a first output control circuit for outputting a first voltage, a second output control circuit for outputting a second voltage and a third output control circuit for outputting a third voltage. The power output switching circuit is used for switching between the first output control circuit and the second output control circuit. | 05-26-2016 |
20160147542 | INFORMATION PROCESSING APPARATUS, SERVER APPARATUS, INFORMATION PROCESSING SYSTEM, CONTROL METHOD, AND COMPUTER PROGRAM - An information processing apparatus having a function of entering and returning from a hibernation state and communicable with a server apparatus performing device certification includes a storage unit configured to, in a case where a software module is activated, store a hash value of the activated software module in a volatile memory, a request unit configured to request device certification based on a hash value stored in the volatile memory from the server apparatus, and an excluding unit configured to, in a case where the device certification is requested after returning from the hibernation state, exclude a software module activated before entering the hibernation state from a target of the device certification. | 05-26-2016 |
20160147996 | Method for Generating and Executing Encrypted BIOS Firmware and System Therefor - A firmware image is received at an information handling system. A symmetric key is generated and stored at a trusted platform module (TPM). The firmware image is encrypted using the symmetric key. The encrypted firmware image is stored in a non-volatile memory. | 05-26-2016 |
20160147997 | SELF-MEASURING NONVOLATILE MEMORY DEVICE SYSTEMS AND METHODS - One embodiment describes a computing system that includes a boot device. The boot device includes nonvolatile memory that stores startup routine instructions and a first pointer, in which the first pointer identifies a first one or more memory addresses in the nonvolatile memory where at least a portion of the startup routine instructions are stored, and a microcontroller that retrieves the startup routine instructions from the nonvolatile memory using the first pointer and determines whether the startup routine instructions are corrupted before executing any portion of the startup routine instructions. The computing system further includes a central processor communicatively coupled to the boot device, in which the central processor executes the startup routine instructions to initialize the computing system when the microcontroller determines that the startup routine instructions are not corrupted. | 05-26-2016 |
20160154655 | PROVIDING A TRUSTWORTHY INDICATION OF THE CURRENT STATE OF A MULTI-PROCESSOR DATA PROCESSING APPARATUS | 06-02-2016 |
20160162297 | Thermal Profile Based on Temperature Information for Computing Device Location - A computing device may detect an ambient temperature and receive temperature information for a location of the computing device. The computing device may select a thermal profile for the computing device based on the ambient temperature. The computing device may modify the thermal profile based on the received temperature information. | 06-09-2016 |
20160162299 | Communication with a Virtual Trusted Runtime BIOS - A secure communication channel is established between a virtual trusted runtime basic input output system (BIOS) and a virtual machine that includes a virtual BIOS. The virtual trusted runtime BIOS communicates with the virtual machine according to a web-based protocol over the secure communication channel using a secure socket layer. | 06-09-2016 |
20160162300 | SEMICONDUCTOR DEVICE AND METHOD FOR DRIVING THE SAME - A semiconductor device includes an internal signal processing block suitable for generating an internal enable signal and an internal control signal that correspond to an external enable signal and an external control signal, and a monitoring unit suitable for outputting a monitoring signal that corresponds to a predetermined internal signal, based on the internal enable signal and the internal control signal, in an initial operation period. | 06-09-2016 |
20160162302 | FAST INITIATION OF WORKLOADS USING MEMORY-RESIDENT POST-BOOT SNAPSHOTS - A method includes, in a computing system including one or more compute nodes that run workloads, booting a workload of a given type, and creating a post-boot snapshot of the workload at a point at which the workload completed booting but did not yet begin running user applications. In response to a request to initiate a new workload of the given type, the new workload is initiated starting from the post-boot snapshot. | 06-09-2016 |
20160162303 | CENTRALIZED ADMINISTRATION METHOD FOR OPERATING SYSTEM OF THIN CLIENT AND METHOD THEREOF - A centralized administration system for operating system (OS) of thin client and method thereof are disclosed, where the thin client is accessed a preboot execution environment (PXE) OS, an administration program installed in the PXE OS installs, updates or snapshot captures OS of the thin client, and a monitor message is feedback by the administration program to an administration server to be displayed immediately, so that an administration may acquire a progress, state and result of OS of the thin client installing, updating or snapshot capturing immediately and centrally. Therefore, the improving efficiency of OS of thin client management may be achieved. | 06-09-2016 |
20160162379 | SATA RECEIVER EQUALIZATION MARGIN DETERMINATION/SETTING METHOD AND APPARATUS - Apparatuses, methods and storage medium associated with automatic SATA receiver equalization margin determination and setting, are disclosed. In embodiments, an apparatus may comprise a BIOS configured to determine, during POST, whether a device is attached to one of the SATA ports, and on determination that a device is attached to one of the SATA ports, further determine whether a receiver equalization margin has been set for the device. Additionally, the BIOS may be configured to perform a DTLE training to dynamically determine and set the receiver equalization margin for the device, on determination that a receiver equalization margin has not been set for the device. Other embodiments may be described and/or claimed. | 06-09-2016 |
20160162669 | MEDIA CLIENT DEVICE AUTHENTICATION USING HARDWARE ROOT OF TRUST - A client device for media playback includes a user-installable media client application which implements the client-side of a digital rights management (DRM) system. The client device employs secure boot and verifies the user-installed application. The application is hardened against reverse engineering, and it utilizes a special API provided by the client device to tie into the secure boot, bridging the gap between the secure boot and the client-side of the DRM system contained within the application. | 06-09-2016 |
20160170773 | DATA PROCESSING | 06-16-2016 |
20160170786 | DYNAMICALLY MANAGING A SERIAL PORT INTERFACE OF VIRTUALIZATION SOFTWARE | 06-16-2016 |
20160171210 | IMPLEMENTING SECURITY FUNCTIONS USING ROM | 06-16-2016 |
20160179500 | FIRMWARE VARIABLE UPDATE METHOD | 06-23-2016 |
20160179553 | EXECUTION OF MULTIPLE OPERATING SYSTEMS WITHOUT REBOOTING | 06-23-2016 |
20160179555 | SYSTEM AND METHOD FOR NETWORK-BASED ISCSI BOOT PARAMETER DEPLOYMENT | 06-23-2016 |
20160179705 | METHOD OF PROGRAMMING THE DEFAULT INTERFACE SOFTWARE IN AN INDICIA READING DEVICE | 06-23-2016 |
20160180095 | MEASURED BOOT CAPABILITY | 06-23-2016 |
20160188345 | Method of a UEFI firmware and Computer System thereof - A computer system includes a memory storing an UEFI firmware and a processor. The UEFI firmware supports pre-boot initialization of a plurality of different bootloader programs, wherein the UEFI firmware has a plurality of instructions and a plurality of configuration data for different bootloader programs. The processor is operatively coupled to the memory and is used to execute the instructions of the UEFI firmware, wherein the instructions include performing the steps of: detecting type of instruction set of the processor; determining, by the processor, a bootup selection mode according to a mode selection, wherein the bootup selection mode corresponds to the detected type of instruction set, and the mode selection corresponds to the type of a bootloader program for execution after the UEFI firmware; retrieving, by the processor, a common configuration data from a plurality of configuration data of the UEFI firmware from the memory; retrieving, by the processor, a distinct configuration data from the plurality of configuration data of the UEFI firmware corresponding to the bootup selection mode from the memory, wherein the distinct configuration data comprises processor instruction sets and runtime services; generating a bootloader address corresponding to the bootup selection mode; and executing, according to the common configuration data and the distinct configuration data, the bootloader program located in a storage corresponding to the bootloader address. | 06-30-2016 |
20160188347 | OPTION READ-ONLY MEMORY USE - Example embodiments disclosed herein relate to altered option read-only memory. A copy of an option read-only memory is stored. The copy is used during a boot process based on a determination that the option read-only memory has been altered. | 06-30-2016 |
20160188349 | Client Authentication During Network Boot - A mechanism for performing a network boot sequence and provisioning a device may generate a command by a server and have the command executed by the device. The command may be used to verify the authenticity of the device, and may be used to establish ownership of the device. After authenticity and, in some cases ownership is established, bootable software may be downloaded and executed. The device may be provisioned with software applications. | 06-30-2016 |
20160188881 | SECURITY CO-PROCESSOR BOOT PERFORMANCE - Technologies for improving platform initialization on a computing device include beginning initialization of a platform of the computing device using a basic input/output system (BIOS) of the computing device. A security co-processor driver module adds a security co-processor command to a command list when a security processor command is received from the BIOS module. The computing device establishes a periodic interrupt of the initialization of the platform to query the security co-processor regarding the availability of a response to a previously submitted security co-processor command, forward any responses received by the security co-processor driver module to the BIOS module, and submit the next security co-processor command in the command list to the security co-processor. | 06-30-2016 |
20160191246 | SYSTEM AND METHOD FOR PROVIDING GLOBAL PLATFORM COMPLIANT TRUSTED EXECUTION ENVIRONMENT - Method of providing a Global Platform (GP) compliant Trusted Execution Environment (TEE) starts with main processor executing an application stored in memory device. Application includes client application (CA) and trusted application (TA). Executing the application includes running CA in client process and TA in TEE host process. Client process and TEE host process are separate. Using TEE host process, a request including identifier of the TA is received from client process to open session. Using GP Trusted Services enclave included in TEE host process, TA enclave associated with the identifier is determined and loaded in the TEE host process using the GP Trusted Services enclave to establish the session. Using TEE host process, commands to be invoked in TA enclave and set of parameters needed for commands are received from client process. Using GP Internal APIs, commands in TA enclave associated with identifier are executed. Other embodiments are also described. | 06-30-2016 |
20160196145 | BOOT FROM MODIFIED FACTORY IMAGE | 07-07-2016 |
20160196154 | MICROMINIATURE PERSONAL COMPUTER AND METHOD OF USING THEREOF | 07-07-2016 |
20160202742 | ELECTRONIC DEVICE | 07-14-2016 |
20160202746 | INDICATING CRITICAL BATTERY STATUS IN MOBILE DEVICES | 07-14-2016 |
20160202995 | TECHNIQUES FOR COMPUTER SYSTEM RECOVERY | 07-14-2016 |
20160202997 | PORTABLE DEVICE OPERATING SYSTEM | 07-14-2016 |
20160202998 | SYSTEM AND METHOD FOR WIPING ENCRYPTED DATA ON A DEVICE HAVING FILE-LEVEL CONTENT PROTECTION | 07-14-2016 |
20160203000 | OPERATING SYSTEM SOFTWARE INSTALL AND BOOT UP FROM A STORAGE AREA NETWORK DEVICE | 07-14-2016 |
20160203085 | CACHE OPERATIONS FOR MEMORY MANAGEMENT | 07-14-2016 |
20160253183 | APPARATUS AND METHOD FOR COMPILE TIME CONSTRUCTION OF MEMORY STRUCTURES | 09-01-2016 |
20160253184 | FAST COMPUTER STARTUP | 09-01-2016 |
20160253204 | FAST-BOOTING APPLICATION IMAGE | 09-01-2016 |
20160255079 | METHODS AND SYSTEMS FOR PERFORMING SECURE AUTHENTICATED UPDATES OF AUTHENTICATION CREDENTIALS | 09-01-2016 |
20160378135 | COMPUTING APPARATUS WITH REAL TIME CLOCK WITHOUT A BATTERY - The present disclosure describes embodiments of apparatuses and methods related to a computing apparatus with a real time clock (RTC) coupled to a bus, where the RTC does not have a backup power source to maintain time and date of the RTC. The computing apparatus may have firmware coupled to the bus, and the firmware may contain boot logic with network time protocol (NTP) logic. The computing apparatus may have persistent memory coupled to the bus with configuration parameters. The computing apparatus may have a controller coupled to the bus, where the controller is to retrieve the configuration parameters from the persistent memory and processes the boot logic with the NTP logic using the configuration parameters to transmit an NTP request over the bus and receives a coordinated universal time (UTC) over the bus and stores the UTC in the RTC. | 12-29-2016 |
20160378507 | FIRMWARE BLOCK DISPATCH BASED ON FUSING - The present disclosure is directed to firmware block dispatch based on fusing. A device may determine firmware blocks to load during initialization of the device based on fuses set in a processing module in the device. A firmware module may comprise at least a nonvolatile (NV) memory including boot code and a firmware information table (FIT). During initialization the boot code may cause the processing module to read fuse information from a fuse module and to determine at least one firmware block to load based on the fuse information. For example, the fuse information may comprise a fuse string and the processing module may compare the fuse string to the FIT table, determine at least one pointer in the FIT table associated with the fuse string and load at least one firmware block based on a location (e.g., offset) in the NV memory identified by the at least one pointer. | 12-29-2016 |
20160378509 | SYSTEMS AND METHODS FOR REDUCING BIOS REBOOTS - In accordance with embodiments of the present disclosure, a method may include during boot of an information handling system, obtaining from a management controller integral to the information handling system information regarding resource requirements for one or more peripheral devices communicatively coupled to the one or more processor sockets integral to the information handling system and the management controller. The method may also include determining whether a default allocation of resources for the one or more peripheral devices among the one or more processor sockets by a basic input/output system integral to the information handling system satisfies the resource requirements. The method may further include, in response to determining the default allocation does not satisfy the resource requirements, rebalancing resources among the one or more processor sockets to satisfy the resource requirements prior to enumeration of the one or more peripheral devices. | 12-29-2016 |
20160378511 | ELECTRONIC DEVICE HAVING AN EXTERNAL MEMORY AND METHOD FOR OPERATING THE SAME - An electronic device having an external memory according to various embodiments of the present disclosure may include a communication unit; an internal memory configured to store a first electronic device information of the electronic device and a first booting data in a first booting area, said first booting data is loaded when an electric power is supplied to the electronic device; an external memory configured to store a second electronic device information of the electronic device, firmware corresponding to the electronic device in a firmware storage area, and updated firmware received via the communication unit in a firmware update information storage area; and a controller configured to compare the second electronic device information stored in the external memory and the first electronic device information stored in the internal memory and configured to control to change the firmware in the firmware storage area based on the updated firmware stored in the firmware update information storage area during booting of the electronic device when the first and second electronic device information are not identical. | 12-29-2016 |
20160378686 | MEMORY ENCRYPTION EXCLUSION METHOD AND APPARATUS - Apparatuses, methods and storage medium associated with memory encryption exclusion are disclosed herein. In embodiments, an apparatus may include one or more processors, memory, and firmware to provide basic input/output services to an operating system. Additionally, the apparatus may include a memory controller to control access to the memory, wherein the memory controller includes an encryption engine to encrypt data, using an encryption key, before the data are stored into an encrypted area of the memory, wherein the encryption engine regenerates the encryption key on a reset transferring execution from the operating system operated by the one or more processors to a pre-boot phase of the firmware. Further, the apparatus may include one or more storage locations to store one or more memory parameters to set aside one or more ranges of the memory as one or more encryption excluded areas. Other embodiments may be described and/or claimed. | 12-29-2016 |
20160378991 | SYSTEM AND METHOD FOR REGAINING OPERATIONAL CONTROL OF COMPROMISED REMOTE SERVERS - An apparatus is described herein. The apparatus includes a secure enclave, and the secure enclave comprises a scanning mechanism and a reboot mechanism. The apparatus also includes a negotiation module, wherein the negotiation module is to negotiate a packet type and a payload for a reboot packet and in response to the scanning mechanism detecting the reboot packet the reboot mechanism is to reboot a computing device. | 12-29-2016 |
20170235928 | LICENSE MANAGEMENT IN PRE-BOOT ENVIRONMENTS | 08-17-2017 |
20180024615 | Power Saving Mode Control Method and Device for Multiple Operating Systems, and Terminal | 01-25-2018 |
20180024839 | BOOTING A COMPUTER FROM A USER TRUSTED DEVICE WITH AN OPERATING SYSTEM LOADER STORED THEREON | 01-25-2018 |
20180024840 | BOOTING COMPUTER FROM USER TRUSTED DEVICE WITH AN OPERATING SYSTEM LOADER STORED THEREON | 01-25-2018 |
20180024843 | METHOD AND ASSOCIATED APPARATUS FOR PERFORMING WAKE-UP MANAGEMENT ON NETWORK DEVICES | 01-25-2018 |
20180024849 | METHOD, TERMINAL AND STORAGE MEDIUM FOR STARTING SOFTWARE | 01-25-2018 |
20180024895 | CREATING CUSTOMIZED BOOTABLE IMAGE FOR CLIENT COMPUTING DEVICE FROM BACKUP COPY | 01-25-2018 |
20180025150 | AUTHENTICATED ACCESS TO MANAGEABILITY HARDWARE COMPONENTS | 01-25-2018 |
20180025159 | INTEGRITY VALUES FOR BEGINNING BOOTING INSTRUCTIONS | 01-25-2018 |
20190146804 | METHOD FOR SYNCHRONIZATION OF SYSTEM MANAGEMENT DATA | 05-16-2019 |
20190146805 | REBOOTING TIMING ADJUSTMENT FOR IMPROVED PERFORMANCE | 05-16-2019 |
20190146818 | DEPLOYMENT OF PARTIALLY PROVISIONED VIRTUAL MACHINES | 05-16-2019 |
20190147193 | METHOD FOR A FIRST START-UP OPERATION OF A SECURE ELEMENT WHICH IS NOT FULLY CUSTOMIZED | 05-16-2019 |
20220137980 | CONFIGURABLE MEDIA STRUCTURE - Systems, apparatuses, and methods related to configurable media structure are described. A memory device can be configured to boot up in a variety of configurations. The variety of configurations can include using the memory device for persistent memory storage, for non-persistent memory storage, etc. For instance, an apparatus can include a first memory array and a second memory array. The apparatus can include a memory controller coupled to the first memory array and the second memory array. The second memory array can be configured to store at least two boot images. The first memory array can be configured to operate based on which of the at least two boot images is used. | 05-05-2022 |
20220137981 | SYSTEM FOR AUTOMATICALLY GENERATING ELECTRONIC ARTIFACTS USING EXTENDED FUNCTIONALITY - A system is provided for automatically generating electronic artifacts using extended functionality. In particular, the system may use a template-based process to automatically generate artifacts based on a defined set of parameters and/or variables. The system may further use one or more plugins which may provide extended functionality with respect to the artifact generation process. Accordingly, the artifact generation process may include initializing a parameter list based on application parameters and/or plugin parameters, processing the parameters, generating variables based on the parameters, and replacing variables in scheme template files with appropriate values (e.g., user supplied or plugin generated values) to output an artifact file to a predetermined location. In this way, the system provides a robust and efficient way to automatically generate artifacts. | 05-05-2022 |
20220137982 | SYSTEMS AND METHODS FOR ACHIEVING FASTER BOOT TIMES USING BIOS ATTRIBUTE MITIGATION - A BIOS may include a plurality of BIOS attributes associated with the information handling system, each attribute of the plurality of BIOS attributes having metadata defining a priority for such attribute. The BIOS may also include an attribute engine configured to execute a preboot process prior to booting of an operating system of the information handling system, wherein the preboot process is configured to identify boot-critical attributes of the plurality of BIOS attributes based on the metadata and load the boot-critical attributes. The attribute engine may also execute a steady-state process after booting of the operating system of the information handling system, wherein the steady-state process is configured to load attributes of the plurality of BIOS attributes other than the boot-critical attributes in an order based on the metadata. | 05-05-2022 |