Boot Up Procedures (epo) Patents (Class 714/E11.133)
-
Patent number: 12189486Abstract: A device that can efficiently manage capacity of a backup auxiliary storage device in an auxiliary storage device and a method of managing backup auxiliary storage device are disclosed. The auxiliary storage device includes an original auxiliary storage device, a backup auxiliary storage device, and a user input device. A controller that controls these devices is disclosed. The backup auxiliary storage device stores recovery information about the original auxiliary storage device. The user input device receives a user input for switching between a normal mode and a backup mode. When in the normal mode, the controller controls the auxiliary storage device so that a host computer boots using an OS in the original auxiliary storage device and is not able to access the backup auxiliary storage device.Type: GrantFiled: April 21, 2020Date of Patent: January 7, 2025Inventor: Deok Woo Kim
-
Patent number: 12189802Abstract: Provided is a device information management system capable of preventing unnecessary information disclosure to competitors.Type: GrantFiled: September 6, 2021Date of Patent: January 7, 2025Assignee: FANUC CORPORATIONInventors: Masato Yamamura, Takahiro Kouji, Daisuke Suzuki, Yuusaku Nishimura, Ken Miyawaki
-
Patent number: 12113813Abstract: Provided is a system for blocking a phishing attack including: a phishing attack prevention storage device; wherein a user terminal or a service server is connected with the phishing attack prevention storage device via a network, wherein a storage area in the phishing attack prevention storage device is mounted in a network drive at the user terminal or the service server, wherein when there is an open request for a real file stored in the storage area in the phishing attack prevention storage device from the user terminal or the service server, the phishing attack prevention storage device checks a storage operation mode and creates a fake file other than the open-requested original file when the storage operation mode corresponds to a list-only mode to return the fake file to the user terminal or the service server via the network.Type: GrantFiled: October 4, 2023Date of Patent: October 8, 2024Assignee: NAMUSOFT CO., LTDInventor: Jong Hyun Woo
-
Patent number: 12086610Abstract: A boot image cloud deployment system and method are provided. The system includes an electronic device and a server. The server includes a storage medium and a control circuit. The electronic device is configured to issue a request instruction. The storage medium is configured to store a plurality of boot images. Each boot image includes a plurality of object files, and a combination sequence of the object files of each boot image is different from a combination sequence of the object files of the other boot images. The control circuit is configured to send back one of the boot images to the electronic device according to the request instruction. The electronic device executes the received boot image.Type: GrantFiled: October 27, 2020Date of Patent: September 10, 2024Assignee: REALTEK SEMICONDUCTOR CORP.Inventor: Tse-Ta Tseng
-
Patent number: 12004824Abstract: A modular energy system for use in a surgical environment includes a plurality of functional modules including at least an initial module, a functional module, and a terminal module. Each of the plurality of modules has a module control circuit, and a local data bus. An internal data bus is composed of a serial array of the local data busses of the modules. The local data bus may includes a communication switch, a first switch data path between the communication switch and the module control circuit, a second switch data path in communication with the communication switch, and a third switch data path in communication with the communication switch. The third switch data path of a module N is in communication with a second switch data path of a module N+1. The system further includes a termination unit in communication with the third data path of the terminal module.Type: GrantFiled: March 30, 2021Date of Patent: June 11, 2024Assignee: Cilag GmbH InternationalInventors: Daniel C. Herman, Joshua P. Morgan, Andrew W. Carroll, Jonathan T. Samuel, Joshua M. Henderson, James M. Vachon, Jeffrey L. Aldridge, Eitan T. Wiener
-
Patent number: 11960372Abstract: An information handling system includes a memory and a processor. The memory stores a basic input/output system (BIOS). The processor monitors the BIOS for a unified extensible firmware interface (UEFI) event. In response to a detection of the UEFI event, the processor reads a preauthorized event callback order. The processor compares a callback order for the UEFI event with the preauthorized event callback order. Based on the callback order for the UEFI event not matching the preauthorized event callback order, the processor detects a potential vulnerability in the UEFI event. In response to the detected potential vulnerability in the UEFI event, the processor dispatches one or more callback functions from the preauthorized event callback order.Type: GrantFiled: March 4, 2022Date of Patent: April 16, 2024Assignee: Dell Products L.P.Inventors: Balasingh P. Samuel, Sungsup Lee
-
Patent number: 11960369Abstract: A method for generating a copy of a database using a data streaming protocol is disclosed. The method comprises setting up a structure of a secondary database, prioritizing data objects to be copied from a primary database to the secondary database, copying data objects from the primary database to the secondary database using a data streaming protocol, restoring data corresponding to the data object in the secondary database in parallel to copying data objects from the primary database to the secondary database, applying changes made to the data corresponding to the data object in the primary database during the time of copying, after the data object has been copied, and making available the secondary database for usage once all data objects have been copied from the primary database to the secondary database so that a usable copy of the primary database is created.Type: GrantFiled: October 26, 2021Date of Patent: April 16, 2024Assignee: International Business Machines CorporationInventors: Hans-Jürgen Zeltwanger, Karl Fleckenstein, Jens Peter Seifert, Martin Jungfer, Thomas Rech, Alexander Zietlow, Dirk Nakott, Holger Hellmuth
-
Patent number: 11953983Abstract: The present disclosure refers to apparatuses and methods for initializing electronic devices. An electronic device according to various embodiments includes a memory, and a processor operatively connected to the memory. The processor is configured to record, in the memory, software binaries received from an external device during a download mode. The processor is further configured to, when the download mode has ended, perform booting in a normal mode using a bootloader based on a determination indicating that a predetermined software binary is present among the software binaries recorded in the memory, and perform booting in a recovery mode using the bootloader based on the determination indicating that the predetermined software binary is absent from among the software binaries recorded in the memory.Type: GrantFiled: August 10, 2022Date of Patent: April 9, 2024Assignee: SAMSUNG ELECTRONICS CO., LTD.Inventors: Byungchul Kim, Kiseok Kim, Mingyu Kim, Jaemin Oh, Sanghyun Lee
-
Patent number: 11934254Abstract: In certain aspects, a memory device includes a non-volatile memory storing firmware, a control logic coupled to the non-volatile memory, and an array of memory cells coupled to the control logic, the array of memory cells is embedded with instructions that are executable by the control logic. The control logic is configured to perform a power-on reset (POR) initialization operation to control an initialization of the memory device based on the firmware, repair the firmware based on execution of the instructions embedded on the array of memory cells, and perform a remaining POR initialization operation based on the repaired firmware.Type: GrantFiled: May 28, 2021Date of Patent: March 19, 2024Assignee: YANGTZE MEMORY TECHNOLOGIES CO., LTD.Inventors: Zhuo Chen, Yue Sheng
-
Patent number: 11886595Abstract: Embodiments of this application describe a computer boot method, a controller, a storage medium, and a system, to improve a boot security level of a computer, and avoid a security risk caused by using a tampered boot program file. In a method, a controller is separately connected to a computer hardware system and a BIOS file storage apparatus. The controller obtains a first boot program file in the BIOS file storage apparatus when the controller is powered on and run. The controller establishes a connection between the BIOS file storage apparatus and the computer hardware system when the first boot program file is successfully checked, so that when the connection between the BIOS file storage apparatus and the computer hardware system is successfully established, the computer hardware system completes power-on and running by using the first boot program file.Type: GrantFiled: December 29, 2021Date of Patent: January 30, 2024Assignee: XFUSION DIGITAL TECHNOLOGIES CO., LTD.Inventor: Shichao Wang
-
Patent number: 11862958Abstract: Systems, devices, and methods include protection functions in an electrical power system. For example, a processing subsystem may include a processor. A memory subsystem may comprise a first memory section and a second memory section. A memory management subsystem may enable memory access only between the processor and only the first memory section to initialize the at least one protection function and, after initialization of the at least one protection function, enable memory access between the processor and the second memory section. Such a configuration may enable the protection functions as fast as possible without waiting for the functions of lesser criticality to be fully loaded and become operational.Type: GrantFiled: October 4, 2021Date of Patent: January 2, 2024Assignee: Schweitzer Engineering Laboratories, Inc.Inventors: Sreenivas Dingari, Angelo D'Aversa, Veselin Skendzic, Greg Rzepka
-
Patent number: 11811790Abstract: Provided is a system for blocking a phishing attack including a phishing attack prevention storage device, and an agent program which is installed in a user terminal or a service server and performs an interworking operation with the phishing attack prevention storage device when the user terminal or the service server is connected with the phishing attack prevention storage device via a network. According to the embodiment of the present invention, when there is an open request for the file stored in the phishing attack prevention storage device from the user terminal or the service server, the phishing attack prevention storage device may check a storage operation mode and create a fake file other than the open-requested original file when the storage operation mode corresponds to a list-only mode to return the fake file to the user terminal or the service server.Type: GrantFiled: November 27, 2019Date of Patent: November 7, 2023Assignee: NAMUSOFT CO., LTDInventor: Jong Hyun Woo
-
Patent number: 11797682Abstract: An information handling system may include a physical storage resource having a portion thereof that includes files that are usable during boot of the information handling system; at least one processor; and a Basic Input/Output System (BIOS) including instructions that are executable by the at least one processor for: during a boot process, determining whether any of a plurality of BIOS events have taken place during a previous boot process, wherein the plurality of BIOS events are indicative of malicious behavior during the previous boot process; and in response to a determination that at least a predetermined number of the plurality of BIOS events have taken place during the previous boot process, carrying out a remedial action during the boot process.Type: GrantFiled: July 14, 2021Date of Patent: October 24, 2023Assignee: Dell Products L.P.Inventors: Ibrahim Sayyed, Daniel L. Hamlin
-
Patent number: 11706024Abstract: In a storage system that includes a plurality of storage devices configured into one or more write groups, quorum-aware secret sharing may include: encrypting a device key for each storage device using a master secret; generating a plurality of shares from the master secret such that a minimum number of storage devices required from each write group for a quorum to boot the storage system is not less than a minimum number of shares required to reconstruct the master secret; and storing the encrypted device key and a separate share of the plurality of shares in each storage device.Type: GrantFiled: August 13, 2021Date of Patent: July 18, 2023Assignee: PURE STORAGE, INC.Inventors: Andrew Bernat, Ethan Miller
-
Patent number: 11706366Abstract: An information processing apparatus includes a control unit, a storage unit configured to store a program to be executed by the control unit, a verification unit configured to read the program from the storage unit and to verify the read program, and a light-emitting unit configured to be changed to a predetermined light-emitting state or to be changed from the predetermined light-emitting state based on a result of the verification of the program by the verification unit.Type: GrantFiled: June 23, 2022Date of Patent: July 18, 2023Assignee: Canon Kabushiki KaishaInventor: Shinichi Ono
-
Patent number: 11615001Abstract: Techniques are provided for incrementally restoring a virtual machine hosted by a computing environment. In response to receiving an indication that the virtual machine is to be incrementally restored, a snapshot of the virtual machine may be created while the virtual machine is shut down into an off state. The snapshot is transmitted to a storage environment as a common snapshot. The snapshot and the common snapshot are common snapshots comprising a same representation of the virtual machine. The common snapshot and a prior snapshot of the virtual machine are evaluated to identify a data difference of the virtual machine between the common snapshot and the prior snapshot. An incremental restore is performed of the virtual machine by transmitting the data difference from the storage environment to the computing environment to restore the virtual machine to a state represented by the prior snapshot.Type: GrantFiled: April 23, 2020Date of Patent: March 28, 2023Assignee: NetApp, Inc.Inventors: Abhishek Naidu, Jose Mathew, Ling Zheng, Ravindra Kuramkote
-
Patent number: 11586504Abstract: An electronic apparatus and a boot method thereof are provided. The electronic apparatus includes a first controller, a basic input output system (BIOS), and a second controller. The first controller is configured to receive a boot code and provides the boot code to the electronic apparatus for performing a boot operation. The BIOS is configured to provide the boot code. The second controller has at least one communication interface. The at least one communication interface is configured to be connected to at least one external apparatus. The at least one external apparatus provides a backup boot code to the second controller. When the boot operation performed by the electronic apparatus according to the boot code provided by the BIOS fails, the second controller replaces the first controller to receive the backup boot code and provides the backup boot code to enable the electronic apparatus to perform the boot operation.Type: GrantFiled: March 9, 2021Date of Patent: February 21, 2023Assignee: ITE Tech. Inc.Inventors: Shang-Heng Lin, Pi-Chiang Lin, Chao-An Chang
-
Patent number: 11567844Abstract: A storage device can include at least one nonvolatile (NV) memory array that includes a first section having a first physical address range, and a second section having a second physical address range. A nonvolatile fault indication can be set to at least a fault state or a no-fault state. A memory watchdog circuit configured to set the fault indication to the fault state in response to an expiration of a predetermined watchdog period, the watchdog period being reset in response to a defer indication. An address mapping circuit can be configured to, in response to the fault indication having the no fault state, mapping input addresses to the first physical addresses range, and in response to the fault indication having the fault state, mapping the same input addresses to the second physical address range. Corresponding methods and systems are also disclosed.Type: GrantFiled: June 23, 2021Date of Patent: January 31, 2023Assignee: INFINEON TECHNOLOGIES LLCInventors: Sergey Ostrikov, Florian Schreiner
-
Patent number: 11500649Abstract: A coordinated initialization system includes a computing system with first and second initialization subsystems coupled to a coordinated initialization subsystem. The coordinated initialization subsystem receives first and second initialization progress information associated with respective first and second initialization subsystem operations performed by the respective first and second initialization subsystems.Type: GrantFiled: September 24, 2020Date of Patent: November 15, 2022Assignee: Dell Products L.P.Inventors: Elie Jreij, Robert W. Hormuth, Gaurav Chawla, Mark Steven Sanders, William Price Dawkins, Jimmy D. Pike
-
Patent number: 11461178Abstract: An information handling system includes a plurality of persistent memory devices and a basic input/output system (BIOS). The BIOS begins a power-on self-test (POST) of the information handling system. During the POST, the BIOS may call a block input/output (I/O) driver to access a memory region within the first persistent memory device. The access of the memory region within the first persistent memory device is to determine whether the first persistent memory device is a bootable persistent memory device. The BIOS may determine whether blocks of the memory region contain bad memory locations. In response to the memory region containing bad memory locations, the BIOS may return a device error message without performing the access of the blocks of the memory region within the first persistent memory device and may boot to an operating system of the information handling system via another bootable device.Type: GrantFiled: May 15, 2019Date of Patent: October 4, 2022Assignee: Dell Products L.P.Inventors: Ching-Lung Chao, Shih-Hao Wang, Hsin-Chieh Wang, Hung-Tah Wei
-
Patent number: 11386219Abstract: An aspect includes monitoring storage of a computer system. Upon detecting an unauthorized modification to an original storage component in response to the monitoring, an aspect includes retrieving a backup component corresponding to the original storage component and repairing the original storage component using the backup component. In embodiments, the repair occurs in real-time without interruption to computer operation.Type: GrantFiled: August 24, 2020Date of Patent: July 12, 2022Assignee: Raytheon CompanyInventors: Paul Gryting, Cody L. Tankersley, Christopher Browning
-
Patent number: 9824229Abstract: A controller with enhanced reliability of access to a database system. A programmable logic controller (PLC) accessible to a database accesses a database (DB) server in response to an event in which a user program calls a DB access processing program. The DB access processing program stores status information indicating a status of accesses to the DB server in a nonvolatile memory, in accordance with an instruction of the user program. When a power interruption occurs, the PLC can obtain a status of accesses to the DB server at the timing of the occurrence of the power interruption by referring to the status information. Then, the PLC, for example, re-sends a structured query language (SQL) sentence, depending on the access status.Type: GrantFiled: November 13, 2013Date of Patent: November 21, 2017Assignee: OMRON CORPORATIONInventors: Kotaro Okamura, Yoshihide Nishiyama, Masanori Ota, Koji Yaoita
-
Publication number: 20130212430Abstract: An electronic device with firmware recovery function includes a connecting port to connect the electronic device to an external device and a BMC. The BMC includes a firmware memory storing firmware data of the BMC and a microprocessor. The microprocessor determines whether the BMC is able to execute the firmware data in the firmware memory, and determines whether a download command for downloading firmware data is received from the external device when the BMC is not able to execute the firmware data in the firmware memory. The microprocessor further reads the firmware data from the external device into a memory space of the microprocessor upon receiving the download command, and recovers the firmware data in the firmware memory by writing the firmware data from the memory space of the microprocessor into the firmware memory. A related method is also provided.Type: ApplicationFiled: September 13, 2012Publication date: August 15, 2013Applicants: HON HAI PRECISION INDUSTRY CO., LTD., HONG FU JIN PRECISION INDUSTRY(ShenZhen) CO., LTD.Inventors: Lei DENG, Wei-Min HE
-
Publication number: 20130061090Abstract: A partial rebooting recovery apparatus is provided. The partial rebooting recovery apparatus may store a system state of a predetermined booting point in time, may receive a failure signal of a system, may call a failure recovery processing function, may recover the system to the system state of the predetermined booting point in time, based on the failure signal, and may reboot the system from a point in time at which the system is recovered.Type: ApplicationFiled: September 5, 2012Publication date: March 7, 2013Applicant: ELECTRONICS AND TELECOMMUNICATIONS RESEARCH INSTITUTEInventor: Kwang Yong LEE
-
Publication number: 20130055009Abstract: A system and method for providing reliable storage are provided. A method for initiator operations includes storing information associated with an access attempt in a store, and accessing a storage system responsive to the access attempt, wherein the storage system includes a first storage node and a second storage node arranged in a sequential loop, and where the first storage node is accessed by an initiator. The method also includes determining if the access attempt completed successfully, deleting the information from the store if the access attempt completed successfully, and indicating an error if the access attempt did not complete successfully.Type: ApplicationFiled: August 23, 2011Publication date: February 28, 2013Applicant: FutureWei Technologies, IncInventors: Andrew Patterson, James Hughes, Hao Zhang
-
Publication number: 20120239972Abstract: A system and method for correcting a boot error is disclosed. The system comprises a solid-state nonvolatile memory device, the solid-state nonvolatile memory device storing a boot loader at a predetermined block having a first address on the solid-state nonvolatile memory device. The system further comprises a main controller that retrieves the boot loader from the predetermined block upon powering up. The system also includes a monitoring module configured to monitor an initial boot sequence of the main controller and to determine when the predetermined block has a read inability error. The main controller obtains a backup boot loader from a backup block when the monitoring module determines that the predetermined block is corrupted.Type: ApplicationFiled: March 18, 2011Publication date: September 20, 2012Applicants: DENSO CORPORATION, DENSO INTERNATIONAL AMERICA, INC.Inventors: Hiroaki Shibata, Koji Shinoda, Wan-ping Yang
-
Patent number: 8271754Abstract: A system, method and computer-usable medium are disclosed for recovering data from a memory storage device. The operating system (OS) of an IPS comprising a source memory storage device, further comprising stored data, is monitored to detect a defective operating state. If a defective operating state of the OS is detected, then operation of the IPS is terminated, followed by the initiation of IPS boot operations to recover data from the source memory storage device. The OS is bypassed, and initial boot operations are performed from a management controller or from the BIOS of the IPS. Additional boot operations are performed, and once the IPS has been brought to an operative state, a data recovery module is used to transfer data from the source memory storage device to a target storage device.Type: GrantFiled: October 5, 2009Date of Patent: September 18, 2012Assignee: Advanced Micro Devices, Inc.Inventors: Terry L. Cole, Paul W. Vancil
-
Publication number: 20120210165Abstract: In accordance with embodiments of the present disclosure, an information handling system may include a processor and an access controller communicatively coupled to the processor. The access controller may include a memory having a bootloader portion including a first memory address and a second memory address a second processor communicatively coupled to the memory. The second processor may be configured to: (i) attempt to execute the a first copy of a bootloader stored at the first memory address; (ii) in the event of a failure to execute the first copy of the bootloader, copy a second copy of the bootloader stored at the second memory address to the first memory address; and (iii) subsequent to copying the second copy to the first memory address, attempt to execute the second copy of the bootloader stored at the first memory address.Type: ApplicationFiled: February 14, 2011Publication date: August 16, 2012Applicant: DELL PRODUCTS L.P.Inventors: Timothy M. Lambert, Brian L. Brelsford, Elie Jreij, Wade Butcher
-
Publication number: 20120173922Abstract: An apparatus for handling a failed processor of a multiprocessor system including at least two processors interconnected by processor interconnects for facilitating transactions of the processors. The at least two processors include a first processor set as a default boot processor in response to a boot up operation of the multiprocessor computer, and a second processor. The apparatus includes: a baseboard management module for detecting and receiving health information of the processors; a multiplexer coupled to the baseboard management module and respectively to the processors, the multiplexer being operative to switch between the processors; and a processor ID controller coupled to the baseboard management module and respectively to the processors. In response to the health information indicating the first processor has failed, the processor ID controller sets the second processor as the default boot processor and the baseboard management module enables the multiplexer to switch to the second processor.Type: ApplicationFiled: December 2, 2011Publication date: July 5, 2012Applicant: International Business Machiness CorporationInventors: Yao-Chun Cheng, Yuan-Ning Lien, Chuan Yung Liu, Feng-I Liu, Kuei Huang Liu, Michael J. Peters
-
Publication number: 20120054540Abstract: In one embodiment, an intelligent communications device for operating in a network is disclosed. The device includes a storage device having a plurality of partitions storing images for performing boot operations. The device also includes a detection module that is operative to detect a boot failure, and a first restoration module that is operative to restore an active image with a first backup image, in response to a detected boot failure from an active image. The device further includes a second restoration module that is operative to restore a second backup image in response to a detected boot failure after restoration from a first backup image. The device also includes a programmable processor that is programmed to cause execution of boot operations and functions performed by the detection module, first restoration module, and second restoration module.Type: ApplicationFiled: October 6, 2010Publication date: March 1, 2012Applicant: SmartSynch, Inc.Inventors: Edward G. Howard, Thomas H. Cobbs
-
Publication number: 20120042195Abstract: A method for managing operating system deployment failure includes, with an operating system deployment server, running an operating system deployment process that comprises running a progressive hardware discovery process of a target machine to which an operating system is deployed, the discovery process to capture inventory information related to the target machine, monitoring the operating system deployment to detect failure in a pre-operating system environment running on the target machine for a predefined period of time, and executing a remediation action in response to generation of a failure code during the period of time, the remediation action related to a Basic Input Output System (BIOS) of the target machine.Type: ApplicationFiled: June 30, 2011Publication date: February 16, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Claudio Marinelli, Antonio Perrone, Luigi Pichetti, Randa Salem
-
Publication number: 20110302444Abstract: An information processing apparatus includes a process monitor configured to monitor the status of processes executed in accordance with respective monitored driver programs which are to be monitored among driver programs associated with respective devices, an error processor configured to operate when a processing error is detected by the process monitor, to register, in a nonvolatile memory, driver information indicating the driver program with respect to which the error has been detected, and an execution controller configured to call and execute the driver programs, wherein when the information processing apparatus is started, the execution controller skips execution of the driver program indicated by the driver information registered in the nonvolatile memory.Type: ApplicationFiled: March 30, 2011Publication date: December 8, 2011Applicant: FUJITSU LIMITEDInventor: Keisuke Tashima
-
Publication number: 20110167049Abstract: Disclosed file system management techniques can augment and/or enhance a file management system (e.g., a conventional file system) provided for organizing data stored in computer readable storage medium (e.g., a HDD). Data and metadata can be written to a file system space of a file system without using a file management system and without incorporating the data into the file system. However, the metadata can include information allowing the written data to be (later) incorporated into the file system and without having to use the file system, thereby allowing write performance to be enhanced. Generally, metadata can provide additional information including data (e.g., integrity data) that cannot be provided or efficiently provided by the file management system to augment a limited or reduced file system. Integrity data can be especially useful for error recovery (e.g., after a system failure).Type: ApplicationFiled: January 5, 2010Publication date: July 7, 2011Applicant: APPLE INC.Inventor: Shachar RON
-
Publication number: 20110154133Abstract: A technique for performing a system dump in a data processing system that implements active memory sharing includes assigning, via a hypervisor, a logical partition to a portion of a shared memory. One or more virtual block storage devices are also assigned by the hypervisor to the logical partition to facilitate active memory sharing of the shared memory. When a hypervisor-aided firmware-assisted system dump is indicated and a failure of the logical partition is detected, firmware initiates a system dump of information from the assigned portion of the shared memory to the one or more virtual block storage devices. An operating system of the logical partition is rebooted when enough of the assigned portion of the shared memory is freed to facilitate a reboot of the operating system and the hypervisor-aided firmware-assisted system dump is indicated.Type: ApplicationFiled: December 22, 2009Publication date: June 23, 2011Applicant: International Business Machines CorporationInventors: Veena Ganti, David Nevarez, Jacob J. Rosales, Morgan J. Rosas
-
Publication number: 20100251014Abstract: A computer system including a plurality of PCIe paths is configured such that a failed PCIe path only is disabled, thereby preventing the computer system from system resetting. The computer comprises a root port for detecting a failure on a PCIe path, and then for issuing a SMI (System Maintenance Interrupt) to a CPU; and the CPU for, on the receipt of the SMI, executing BIOS to issue, through the root port, a PCIe reset to the PCIe path on which the failure has occurred.Type: ApplicationFiled: January 12, 2010Publication date: September 30, 2010Inventor: Nobuo YAGI
-
Publication number: 20100115333Abstract: In one embodiment a computing device comprises at least one storage media, at least one storage media, a processor, and a memory module comprising logic instructions stored on a computer-readable medium which, when executed by a computer processor, configure the processor to detect, in the computing device, at least one file to support a communication connection with the computing device, store the at least one file on a persistent storage media, and link the at least one file to a restore library.Type: ApplicationFiled: October 30, 2008Publication date: May 6, 2010Inventors: David H. Hanes, Bryce Carl Wemple
-
Publication number: 20100083041Abstract: Disclosed are a file update system of a mobile communication terminal which is capable of recovering Same Owner ID Error caused by damage of a file header in an EFS (Embedded File System) area of the mobile communication terminal, a boot management system of a mobile communication terminal which is capable of preventing a fatal error caused by damage of a file header in an EFS area of the mobile communication terminal, a method of updating a file in the mobile communication terminal, and a method of booting the mobile communication terminal which is capable of preventing a fatal error caused by damage of a file header in an EFS area of the mobile communication terminal.Type: ApplicationFiled: December 4, 2009Publication date: April 1, 2010Applicant: Pantech&Curitel Communications, Inc.Inventor: Hyun-keun LIM
-
Publication number: 20100070800Abstract: In general, techniques are described for hardware-based detection and automatic restoration of a computing device from a compromised state. Moreover, the techniques provide for automatic, hardware-based restoration of selective software components from a trusted repository. The hardware-based detection and automatic restoration techniques may be integrated within a boot sequence of a computing device so as to efficiently and cleanly replace only any infected software component.Type: ApplicationFiled: March 9, 2009Publication date: March 18, 2010Applicant: Juniper Networks, Inc.Inventor: Stephen R. Hanna
-
Publication number: 20090276656Abstract: A storage device including a plurality of storage units for storing data dispersively among the storage units, includes: a processor for controlling boot-up of the storage units; and a memory for storing operation history indicative of the sequence of any failure causing any of the storage units to become inoperative, the processor controlling reboot-up of the storage units, when a plurality of the storage units becomes inoperative on account of a plurality of failures, in accordance with process including: determining the order of the reboot up of the storage units that is reversal of the sequence of the failures causing the storage units to become inoperative in reference to the operation history in the memory; rebooting the inoperative storage units successively in accordance with the determined order.Type: ApplicationFiled: July 10, 2009Publication date: November 5, 2009Inventor: Hiroshi Sakurai
-
Publication number: 20090217023Abstract: In a method for equipping a microprocessor-controlled device with new software code via a communication network, the device has a non-volatile program memory, with two memory areas, a first memory area and a second memory area. The first memory area (boot sector) is provided for a basic program, which provides a first operating system and first functionalities of the device, and the second memory area (update sector) is provided for the software code to be transferred. The first memory area is protected by hardware means against overwriting. The following method steps are performed. First, there is a system boot with the basic program from the first memory area. In such case, a system variable UPDATE is read. In case this has the value “perform update”, an invocation of a function “perform firmware update” occurs. Then this variable is set to the value “invalid firmware”. Next, a connection is established to a superordinated unit and the new software code is transferred into the device.Type: ApplicationFiled: April 21, 2006Publication date: August 27, 2009Applicant: Endress + Hauser GmbH + Co. KGInventors: Reinhard Griech, Christian Seiler
-
Publication number: 20090172472Abstract: A computer has a first BIOS unit, a second BIOS unit, a bus, a detecting unit, and a first delay unit. The detecting unit is connected to the bus, the first BIOS unit, and the second BIOS unit operationally. In addition, the first delay unit is electrically connected to the detecting unit for controlling the detecting unit to check a status of a bus signal on the bus after a predetermined delay time. Accordingly, the detecting unit may enable the first BIOS unit or the second BIOS unit to boot the computer system according to the state of the bus signal.Type: ApplicationFiled: October 23, 2008Publication date: July 2, 2009Applicant: ASUSTeK COMPUTER INC.Inventors: Pei-Hua Sun, Chung-Ta Chin
-
Publication number: 20090158086Abstract: The present invention provides an embedded system and method for recovering the file system of flash memory when damage has occurred to the file system of the flash memory. The embedded system is equipped with NOR flash memory. The embedded system includes boot Programmable Read-Only Memory (PROM) and a Central Processing Unit (CPU). The boot PROM stores a normal state check value for a Cyclic Redundancy Check (CRC), and performs the recovery of the NOR flash memory if it is determined that a failure has occurred in the NOR flash memory through failure detection. The CPU is set such that it jumps to the boot PROM at the time of startup of the embedded system.Type: ApplicationFiled: July 18, 2008Publication date: June 18, 2009Applicant: Hyundai Motor CompanyInventor: Hae Young Kwon
-
Publication number: 20090031166Abstract: In one embodiment, a method of a kernel dumper module includes generating a dump file associated with a kernel when the kernel crashes, storing the dump file to a functional memory upon applying an overwrite protection to a core dump of the dump file, restarting the kernel through a warm reboot of the kernel such that the core dump is not erased from the functional memory, and transferring the core dump to a system file using the kernel.Type: ApplicationFiled: September 24, 2007Publication date: January 29, 2009Inventors: Pradeep Kumar Kathail, Vignesh Dayanand Shetty, Navneet Agarwal
-
Publication number: 20080313489Abstract: A method, apparatus, and system are disclosed. In one embodiment, the method determines whether one or more manageability conditions are present in a computer system, and then invokes an out-of-service manageability remediation environment stored within a portion of a flash device in the computer system when one or more manageability conditions are present.Type: ApplicationFiled: June 14, 2007Publication date: December 18, 2008Inventors: Selim Aissi, Hani Elgebaly, Venkat Gokulrangan, Ayeshwarya B. Mahajan, Jasmeet Chhabra
-
Publication number: 20080209262Abstract: The present invention is directed to systems and methods for remotely booting a server computer system. A boot request is received from the server computer. An access request is transmitted to a boot management system via a secondary communication channel in response to the received boot request. An access response is received from the boot management system. The access response includes boot data from a boot image accessible via the boot management system and compatible with the server computer. In response to the received access response, the boot data is extracted from the access response and forwarded to the server computer for processing and booting. Multiple responses may be required in certain instances to accumulate the entirety of the boot image.Type: ApplicationFiled: December 17, 2007Publication date: August 28, 2008Inventors: Sanjoy Maity, Samvinesh Christopher
-
Publication number: 20080086657Abstract: Methods and systems for software security in a secure communication system are disclosed and may include verifying downloaded code in a reprogrammable system and reloading prestored unmodifiable first stage code upon failure. The prestored unmodifiable first stage code, which may comprise boot code for the reprogrammable system, may be stored in locked flash, and the downloaded software code may be stored in unlocked flash. The downloaded software code may be verified by comparing a signature of the downloaded code to a private key. A first sticky bit may be utilized to indicate a failure of the verification and a second sticky bit may be utilized to indicate passing of the verification and the use of the downloaded software code. Whether to reset the reprogrammable system and reload the prestored unmodifiable first stage code may be determined from within the reprogrammable system, which may comprise a set-top box.Type: ApplicationFiled: May 24, 2007Publication date: April 10, 2008Inventors: Xuemin Chen, Andrew Dellow, Iue-Shuenn Chen, Stephane Rodgers